entry_id
stringlengths 33
33
| published
stringlengths 14
14
| title
stringlengths 17
179
| authors
list | primary_category
stringlengths 5
18
| categories
list | text
stringlengths 15
240k
|
|---|---|---|---|---|---|---|
http://arxiv.org/abs/2303.07155v1
|
20230313142903
|
Quantum Maximal Correlation for Gaussian States
|
[
"Salman Beigi",
"Saleh Rahimi-Keshari"
] |
quant-ph
|
[
"quant-ph"
] |
School of Mathematics, Institute for Research in Fundamental Sciences (IPM), P.O. Box 19395-5746, Tehran, Iran
School of Physics, Institute for Research in Fundamental Sciences (IPM), P.O. Box 19395-5531, Tehran, Iran
Department of Physics, University of Tehran, P.O. Box 14395-547, Tehran, Iran
We compute the quantum maximal correlation for bipartite Gaussian states of continuous-variable systems. Quantum maximal correlation is a measure of correlation with the monotonicity and tensorization properties that can be used to study whether an arbitrary number of copies of a resource state can be locally transformed into a target state without classical communication, known as the local state transformation problem. We show that the required optimization for computing the quantum maximal correlation of Gaussian states can be restricted to local operators that are linear in terms of phase-space quadrature operators. This allows us to derive a closed-form expression for the quantum maximal correlation in terms of the covariance matrix of Gaussian states. Moreover, we define Gaussian maximal correlation based on considering the class of local hermitian operators that are linear in terms of phase-space quadrature operators associated with local homodyne measurements. This measure satisfies the tensorization property and can be used for the Gaussian version of the local state transformation problem when both resource and target states are Gaussian. We also generalize these measures to the multipartite case. Specifically, we define the quantum maximal correlation ribbon and then characterize it for multipartite Gaussian states.
Quantum Maximal Correlation for Gaussian States
Saleh Rahimi-Keshari
March 30, 2023
===============================================
§ INTRODUCTION
The problem of preparing a desired bipartite quantum state from some available resource states under certain operations is of great foundational and practical interest in quantum information science. This problem has been extensively studied under the class of local operations and classical communication in the context of entanglement distillation, where two parties aim to prepare a highly-entangled state using copies of a weakly entangled state <cit.>. The optimal rate of entanglement distillation for pure states equals the entanglement entropy <cit.>, and there are mixed entangled states that are not distillable <cit.>.
A more recent version of this problem is local state transformation under local operations and without classical communication <cit.>. See Figure <ref> for a precise description of the problem. This problem is highly non-trivial even if the goal is to generate only a single copy of the target state σ_A'B'
using arbitrarily many copies of the resource state ρ_AB. The difficulty remains even if the target state is not entangled, or even in the fully classical setting <cit.>; see also <cit.>.
To study the local state transformation problem we need measures of correlation that are monotone under local operations and remain unchanged when computed on multiple copies of a bipartite state. The latter crucial property is called tensorization, and is required since in local state transformation we assume the availability of arbitrary many copies of the resource state while we aim to generate only a single copy of the target. There are resource measures, based on certain free operations, for Gaussian states <cit.>, quantum coherence <cit.>, and nonclassicality of quantum states <cit.> that satisfy the tensorization property. However, this property is not satisfied by most measures of correlation, such as mutual information and entanglement measures, which makes them inapplicable to the local state transformation problem. Quantum maximal correlation was introduced as a measure that satisfies both the monotonicity and the tensorization properties, and therefore is suitable for proving bounds on this problem <cit.>. In particular, based on these properties, one can see that local state transformation is not possible if the maximal correlation of the target state is larger than that of the resource state; see Section <ref> for more details.
Quantum maximal correlation of a bipartite quantum state ρ_AB is defined as sup |(ρ_AB X_A^†⊗ Y_B)|, where the supremum is taken over all local operators X_A, Y_B that satisfy (ρ_A X_A) = ρ(ρ_BY_B) =0 and (ρ_A X_A^† X_A) = ρ(ρ_BY_B^† Y_B) =1. It is shown that computing quantum maximal correlation is a tractable problem for systems with a finite-dimensional Hilbert space <cit.>. However, in general, it is not clear how to calculate quantum maximal correlation for states of continuous-variable systems with infinite-dimensional Hilbert spaces, as the space of local operators X_A, Y_B becomes intractable. Of particular interest is the class of Gaussian states that are readily available in the laboratory and can be used as resource states to prepare other states.
In this paper, we compute the quantum maximal correlation for Gaussian states of continuous-variable systems. This measure enables us to study the local state transform problem when either the resource state or the target state is Gaussian. In this case, we show that for Gaussian states it is sufficient to optimize over local operators X_A, Y_B that are linear in terms of phase-space quadrature operators. This turns the inherently infinite-dimensional problem of computing quantum maximal correlation into a finite dimensional one; see Theorem <ref> for the statement of our main result. Moreover, we define Gaussian maximal correlation, as a measure based on hermitian and linear local operators in terms of quadrature operators, corresponding to local homodyne measurements. This measure can be used in the Gaussian local state transform scenarios, where the target and resource states are Gaussian. In particular, this shows that copies of weakly-correlated Gaussian states cannot be locally transformed to a highly-correlated Gaussian state. This result should be compared to previous results showing that entanglement in Gaussian states cannot be distilled using Gaussian operations <cit.>.
We also generalize the quantum maximal correlation to the multipartite setting. We define an invariant of multipartite quantum states called quantum maximal correlation ribbon that, similar to the bipartite case, satisfies the monotonicity and the tensorization properties. We also show that to compute the maximal correlation ribbon for multipartite Gaussian states it suffices to restrict to local operators that are linear in terms of quadrature operators.
Structure of the paper: In Section <ref>, we review the notion of quantum maximal correlation from <cit.>. In Section <ref>, we review the definition of Gaussian states and some of their main properties. We note that the objective function in quantum maximal correlation is a bilinear form which can be thought of as an inner product. Then, to compute maximal correlation it would be useful to find orthonormal bases for the space of local operators X_A, Y_B. Following this point of view, Section <ref> is devoted to introduce such an orthonormal basis for Gaussian states which might be of independent interest. Results of this section will be used to prove our main result in Section <ref>. We introduce the Gaussian maximal correlation in Section <ref>. Considering examples of Gaussian states in Section <ref>, we further illustrate various features of these correlation measures. We also generalize the definition of maximal correlation for multipartite states in Section <ref> by introducing the quantum maximal correlation ribbon. We show that maximal correlation ribbon satisfies the monotonicity and the tensorization properties, and compute it for multipartite Gaussian states. Detailed proofs of the results in the multipartite case are left for the appendices. We conclude the paper in Section <ref>.
§ REVIEW OF QUANTUM MAXIMAL CORRELATION
Given a bipartite probability distribution p_AB, its maximal correlation is defined as the maximum of the Pearson correlation coefficient over all functions of random variables A and B <cit.>. That is, the classical maximal correlation is given by[In the classical literature, maximal correlation is usually denoted by ρ. Here in the quantum case, following <cit.>, we save ρ for density matrices and denote maximal correlation by μ.]
μ(A, B) = sup[f_A g_B],
where the supremum is taken over all real functions f_A and g_B with zero mean and unit variance, i.e., [f_A]=[g_B] =0 and [f_A^2] = [g_B^2]=1. The classical maximal correlation is zero if and only if the two random variables are independent, and equals one if they have a “common bit," meaning that there are non-trivial functions f, g such that f(A)= g(B).
Maximal correlation for Gaussian distributions is first computed in <cit.>. The main result of <cit.> is that in the computation of maximal correlation for a Gaussian distribution p_AB over ℝ^2, it suffices to restrict the optimization in (<ref>) to functions f_A and g_B that are linear in A and B, respectively. Based on this, there are essentially unique choices of linear functions f_A and g_B and then μ(A, B) for such a Gaussian distribution p_AB equals
μ(A, B) =|Cov[A,B]|/√(Var[A]Var[B]),
where Cov[A,B]=[A B]-[A][B] and Var[A]=Cov[A,A] is the variance.
Maximal correlation in the quantum case can be defined by replacing functions in Eq. (<ref>) with local operators <cit.>. Given a density operator ρ_AB describing the joint state of a bipartite quantum system, quantum maximal correlation is defined as
μ(A, B) := sup_X_A, Y_B |(ρ_AB X_A^†⊗ Y_B)|
(ρ_A X_A) = ρ(ρ_BY_B) =0,
(ρ_A X_A^† X_A) = ρ(ρ_BY_B^† Y_B) =1,
where the supremum is over all choices of local operators X_A, Y_B. Note that, in this definition, these operators are not necessarily hermitian, hence we maximize over the modulus of the objective function (ρ_AB X_A^†⊗ Y_B). In fact, as shown in <cit.>[See the updated arXiv version of <cit.>.] and discussed in Section <ref>, for some quantum states non-hermitian operators are required to further optimize the quantum maximal correlation.
An application of the Cauchy-Schwarz inequality shows that 0≤μ(A, B)≤ 1. It can be shown that μ(A, B)=0 if and only if ρ_AB=ρ_A⊗ρ_B is a product state. Note that if ρ_AB is not product, there always exist local measurements whose outcomes are correlated and hence their maximal correlation is nonzero. Also, restricting X_A and Y_B to local hermitian operators, one can verify that μ(A, B)=1 if and only if there exist non-trivial local measurements described by operators {Π_A,n}_n=1^d and {Π_B,m}_m=1^d, where d≥2, such that the joint outcome probability distribution is perfectly correlated <cit.>:
p(n,m)=(ρ_ABΠ_A,n⊗Π_B,m)=p_nδ_n,m.
This form means that the shared state between two parties can be used to extract perfect shared randomness through local measurements.
Based on this, we can see that μ(A, B)=1 for any pure entangled state |ψ_AB⟩=∑_n c_n|n_A,n_B⟩ with {|n_A⟩} and {|n_B⟩} being the Schmidt bases, and its completely dephased version in the Schmidt bases, ρ_AB=∑_n |c_n|^2 |n_A⟩⟨n_A|⊗|n_B⟩⟨n_B|, which is a separable state. In these cases, considering observables N_A=∑_n h_n|n_A⟩⟨n_A| and N_B=∑_n h_n|n_B⟩⟨n_B| for subsystems A and B, the optimal local operators in (<ref>) can be found as X_A=(N_A-⟨ N_A⟩)/Δ N_A and Y_B=(N_B-⟨ N_B⟩)/Δ N_B with the identical means ⟨ N_A⟩=⟨ N_B⟩=∑_n |c_n|^2 h_n, and the identical standard deviations, Δ N_A=Δ N_B=(∑_n |c_n|^2 h_n^2-⟨ N_A⟩^2)^1/2.
Maximal correlation satisfies two crucial properties
<cit.>:
* (Data processing) If σ_A'B' = Φ_A→ A'⊗Ψ_B→ B'(ρ_AB), where Φ_A→ A' and Ψ_B→ B' are local quantum operations (quantum completely-positive trace preserving (cptp) super-operators) then
μ(A', B') ≤μ(A, B).
* (Tensorization) For any bipartite density matrix ρ_AB and any integer n we have
μ(A^n, B^n) = μ(A, B),
where the left hand side is the maximal correlation of the state ρ_A^nB^n=ρ_AB^⊗ n considered as a bipartite state.
The first property says that maximal correlation is really a measure of correlation, and does not increase under local operations. The second property, however, is an intriguing property saying that no matter how many copies of ρ_AB are shared between two parties, their maximal correlation remains the same. This is unlike most measures of correlations (such as mutual information and entanglement entropy) that scale when the number of copies increase.
The above two properties of maximal correlation make it suitable for proving impossibility of certain local state transformations. Suppose that ρ_AB and σ_A'B' are two bipartite state with μ(A, B)<μ(A', B'). Then, it is not possible to transform ρ_AB to σ_A'B' under local operations even if an arbitrary many copies of ρ_AB is available.
This is because if there exist local operations Φ_A^n→ A', Ψ_B^n→ B' acting on n copies of ρ_AB such that σ_A'B' = Φ_A^n→ A'⊗Ψ_B^n→ B'(ρ_AB^⊗ n), then we must have
μ(A, B) = μ(A^n, B^n)≥μ(A', B'),
where the equality is due to the tensorization property and the inequality follows from the data processing inequality.
Let us examine the example of noisy Bell states. Let
ρ_AB^(κ) = κ|ψ⟩⟨ψ| + (1-κ) 1/4 I,
be a mixture of the Bell state |ψ⟩= 1/√(2) (|00⟩ + |11⟩) and the maximally mixed state I/4 for two qubits with 0≤κ≤1. It is not hard to verify that μ(A, B) = κ; see <cit.>. Thus, by the above observation, local transformation of ρ_AB^(κ) to ρ_AB^(κ') is impossible if κ'>κ even with arbitrary many copies of ρ_AB^(κ).
It is shown in <cit.> that the maximal correlation μ(A, B) of ρ_AB is equal to the second Schmidt coefficient of some vector associated to ρ_AB in a tensor product Hilbert space. This makes the problem of computing μ(A, B) tractable when the dimensions of the local Hilbert spaces of A, B are finite. In the infinite dimensional case, however, computation of maximal correlation remains a challenge in general.
Our main result in this paper is to compute the maximal correlation for Gaussian quantum states, which are of great practical interest in quantum information processing. Similar to the classical maximal correlation for Gaussian probability distributions, we show that in the computation of μ(A, B) for Gaussian state ρ_AB, the optimization in (<ref>) can be restricted to operators X_A, Y_B that are linear in local creation and annihilation operators.
§ GAUSSIAN QUANTUM STATES
In this section we review the definition and some basic properties of Gaussian states. For more details we refer to <cit.>.
The Hilbert space of an m-mode bosonic quantum system is the space of square-integrable functions on ℝ^2m. We denote the annihilation and creation operators of the j-th mode by _j = (_j+i_j)/√(2) and _j^† = (_j-i_j)/√(2), where _j and _j are the phase-space quadrature operators, similar to the position and momentum operators of the quantum harmonic oscillator, that satisfy the commutation relations[We assume that ħ=1.]
[_j, _k] = iδ_jk.
We denote by
𝐑=(_1, _1, …, _m, _m)^⊤,
the column-vector consisting of quadrature operators. Then, the above commutation relations can be summarized as
[, ^⊤] = iΩ_m,
where [, ^⊤] is understood as coordinate-wise commutataion and Ω_m= Ω_1⊕⋯⊕Ω_1 with
Ω_1 = [ 0 1; -1 0 ].
For 𝐫 =(r_1, …, r_2m)^⊤∈ℝ^2m, the m-mode displacement operator (also called the Weyl operaator) D_𝐫 is defined by
D_ = e^-i^⊤Ω_m
= e^i∑_j=1^m (r_2j_j-r_2j-1_j )
= ⊗_j=1^m e^(r_2j_j-r_2j-1_j)
= ⊗_j=1^m D_(r_2j-1, r_2j),
which is the tensor product of the displacement operators for each mode, and hence is local. We note that D_^† = D_-. Moreover, as a consequence of the Baker-Campbell-Hausdorff (BCH) formula[If [X, [X, Y]]=[Y, [X, Y]]=0, then e^X+Y = e^Xe^Y e^-1/2[X, Y].] we have
D_D_ = e^-i 1/2^⊤Ω_m D_+.
This, in particular, means that D_D_^†=D_D_- = D_0= I, i.e., the displacement operator is unitary.
A crucial property of D_ is that[For the proof note that if [X, [X, Y]] = 0, then e^XYe^-X= Y+[X, Y]. Also, see <cit.>.]
D_ D_^†= -.
This means that D__j D_^† = _j - r_2j-1 and D__j D_^† = _j - r_2j, i.e., D_ displaces quadrature operators under conjugation, thus the name.
For an arbitrary m-mode density operator ρ = ρ_A_1, …, A_m, the vector of first-order moments in ℝ^2m is defined as
(ρ) = (ρ),
which contains the canonical mean values (ρ)_2j-1 = (ρ_j) and (ρ)_2j = (ρ_j). The covariance matrix, containing the second-order moments, is defined by
(ρ) = [ρ{(- (ρ)), (- (ρ))^⊤}],
where {·, ·} denotes anti-commutation, and as before {(- (ρ)), (- (ρ))^⊤} is understood as coordinate-wise anti-commutation. Thus, (ρ) is a (2m)× (2m) matrix, that by definition is real and symmetric. Furthermore, it can be shown (see <cit.>) that as a consequence of the canonical commutation relations (<ref>) we have
(ρ)+iΩ_m≥ 0.
This, in particular, means that (ρ) is positive definite.[Taking the transpose of (<ref>) we find that (ρ)-iΩ_m≥ 0. Summing this with the original equation gives (ρ)≥ 0. To verify that (ρ) does not have a zero eigenvalue, suppose that (ρ)=0 and for = - ϵ i Ω_m write down the condition ^†(ρ)≥ -i^†Ω_m to conclude that =0.]
Let _j(ρ) be the j-th 2× 2 block on the diagonal of (ρ). Then, by definition, the covariance matrix of ρ_A_j, the marginal state on the j-th mode, equals (ρ_A_j)=_j(ρ). Similarly, (ρ_A_j), the first-order moments of the marginal state, equals the j-th pair of components of (ρ).
Let us examine the effect of the displacement operator on the first and second moments of a density operator. Let ρ'=D_^†ρ D_. Then, by (<ref>) we have
(ρ') = (ρ')=(ρ D_ D_^†)= (ρ)- .
This implies that D_(-(ρ')) D_^† = - (ρ) and therefore by (<ref>) we get (ρ')=(ρ). Thus, the application of the local unitary D_ shifts the first-order moment of ρ but does not change the covariance matrix.
Let H be a real symmetric matrix. Then 1/2^⊤ H is a Hamiltonian that is quadratic in terms of the position and momentum operators. A unitary operator associated to this Hamiltonian equals
U_H = e^-i1/2^⊤ H .
Then, we have
U_H^† U_H = S_H ,
where S_H = e^Ω_m H. This equation can be proven by putting a time parameter t into the picture (replacing H with tH) and thinking of U_H^† U_H as the time evolution of in the Heisenberg picture. Then, applying Schrödinger's equation and computing [1/2 H ^⊤, ], the desired result follows (see <cit.> for more details). We note that since U_H is unitary,
[U_H^† U_H, (U_H^† U_H)^⊤] = [^⊤, ]=iΩ_m.
Therefore,
iΩ_m=[S_H , (S_H )^⊤] = S_H [, ^⊤] S_H^⊤ = iS_H Ω_m S_H^⊤.
This means that S_HΩ_m S_H^⊤ = Ω_m and S_H is a symplectic matrix. Thus, for any quadratic Hamiltonian there is an associated symplectic matrix such that (<ref>) holds. Conversely, it can be shown that for any symplectic matrix there is a related quadratic Hamiltonian through (<ref>).
Let us now compute the effect of U_H on the first and second moments. Define ρ' = U_H ρ U_H^†. Then, using (<ref>) it can be shown that
(ρ') = S_H (ρ),
and
(ρ') = S_H (ρ)S_H^⊤.
The following proposition, that is a special case of <cit.>, summarizes the above findings.
Let ρ=ρ_A_1, …, A_m be an m-mode full-rank density operator. Then there is a local unitary V such that for ρ'=Vρ V^† we have (ρ') = 0 and the 2× 2 blocks on the diagonal of (ρ') are multiples of identity of the form λ_j I with λ_j≥ 1. Thus, the covariance matrix of the marginal state ρ'_A_j equals (ρ'_A_j) = λ_j I.
We note that when H is block-diagonal with 2× 2 blocks on the diagonal (one block for each mode), the unitary operator U_H defined in (<ref>) is local. The associated symplectic matrix S_H to such an H is also block diagonal since Ω_m is block-diagonal. This means that block-diagonal symplectic matrices correspond to local unitaries.
Now, if S_j is the j-block on the diagonal of a block-diagonal S_H, and _j is the j-th 2× 2 block on the diagonal of the covariance matrix, then by (<ref>) the application of the local unitary U_H would change _j to S_j _j S_j^⊤. On the other hand, it is well-known that for any 2× 2 positive definite matrix _j there is a symplectic matrix S_j such that '_j=S_j_j S_j^⊤ is a multiple of identity (see <cit.>). We note that if '_j = λ_j I, then by (<ref>) we have λ_j I+iΩ_1≥ 0 meaning that λ_j≥ 1.
Putting these together we find that there is a local unitary operator U_H that brings the covariance matrix to the desired form.
Next, applying an appropriate displacement operator, that is a local unitary, we can shift the first moment to the zero vector. We note that displacement operators do not change the covariance matrix.
The characteristic function of a density operator ρ is defined by
χ() = (ρ D_).
Characteristic function fully determines a density operator via
ρ = 1/(2π)^m∫_ℝ^2mχ() D_- ^2m.
The Wigner function function <cit.> is then defined as the Fourier transform of the characteristic function
W() = 1/(2π)^2m∫_ℝ^2mχ() e^i^⊤Ω_m ^2m.
Applying the inverse Fourier transform we obtain
(ρ e^-i^⊤Ω_m ) =χ() = ∫_ℝ^2m W() e^-i^⊤Ω_m ^2m.
We note that this equation holds for any ∈ℝ^2m. Thus, thinking of both sides as functions of , considering their Taylor expansion and comparing corresponding terms, we realize that the same equation holds for all beyond real ones. That is, for any
complex ∈ℂ^2m, we have
(ρ e^^⊤) = ∫_ℝ^2m W() e^^⊤^2m.
A quantum state is called Gaussian if its Wigner function is Gaussian. In this case, the Wigner function is specified by the first-order moments =(ρ) and the covariance matrix =(ρ):
W() = 1/π^m √() e^-(-)^⊤^-1(-).
By using the Wigner function, one can verify that the purity of Gaussian states can be calculated as (ρ^2)=(2π)^m∫_ℝ^2m W^2() ^2m=1/√(γ). Therefore, pure Gaussian states have γ=1.
The Wigner function of a marginal state is the marginal distribution of the Wigner function of the joint state. Hence, marginal states of Gaussian state are also Gaussian. Note also that, due to the uncertainty principle, the Wigner function cannot be viewed as the joint probability distribution associated with local measurements.
Coherent states are well-known examples of a single-mode Gaussian states, which are displaced vacuum states. For a complex number α=(x+ip)/√(2) let |α⟩=D_α|0⟩ where D_α=exp(α^†-α̅)=D_(x, p). Then, (|α⟩)=(x,p)^⊤ and (|α⟩)=I, where I is the 2×2 identity matrix[In this paper, I_n denotes the n× n identity matrix but we drop the subindex for n=2.]. Other important examples are squeezed-vacuum states |z⟩=exp(z(^†2-^2)/2)|0⟩ with squeezing parameter z and thermal states ρ_th=∫ e^-|α|^2/n̅/(n̅π)|α⟩⟨α| d^2α with mean-photon number n̅. The first-order moments of these states are zero and their covariance matrices are (|z⟩)=diag(e^2z,e^-2z) and (ρ_th)=(2n̅+1)I.
In general, Gaussian unitary operators that map Gaussian states to Gaussian ones can be described in terms of a displacement operator and a unitary operator associated to Hamiltonians that are quadratic in terms of quadrature operators <cit.>. The latter
can be written in the form of U_H=e^-1/2 i^⊤ H in which H is a (2m)× (2m) real symmetric matrix. Letting ρ' = U_H ρ U_H^†, it can be shown that
(ρ') = S_H (ρ),
and
(ρ') = S_H (ρ)S_H^⊤,
where S_H = e^Ω_m H is a symplectic matrix (satisfying S_HΩ_m S_H^⊤ = Ω_m).
Examples of single-mode unitary operators are the phase rotation with H_Ro=θ(I-Y) and the symplectic matrix S_Ro=cos(θ) I+isin(θ) Y, and squeezing with H_Sq=zX and the symplectic matrix S_Sq=diag(e^z,e^-z), where here Y and X are the Pauli matrices. Using these two unitary operations and displacement, any single-mode pure Gaussian state can be transformed to the vacuum state.
The following proposition provides a standard form for Gaussian states under local unitaries.
Let ρ=ρ_A_1, …, A_m be an m-mode Gaussian state. Then, there exists a local Gaussian unitary V such that for ρ'=Vρ V^† we have (ρ') = 0 and _j(ρ') = (ρ'_A_j) =λ_j I with λ_j≥ 1. If m=2 we can further assume that the covariance matrix can be in the standard form
(ρ') = [ λ_1 I ; ^⊤ λ_2 I ],
with =diag(ν_1,ν_2).
First, by applying an appropriate displacement operator, that is a local unitary, we can shift the first-order moments to zero without changing the covariance matrix. Next, to bring the state into the desired form, we use a local unitary operator U_H=e^-1/2 i^⊤ H, where H is block-diagonal with 2× 2 blocks on the diagonal (one block for each mode). This means that block-diagonal symplectic matrices correspond to local unitaries.
Now, suppose that S_H = diag(S_1, …, S_m) is a block-diagonal symplectic matrix with S_j's being 2× 2 symplectic matrices to be determined. Also, let _j(ρ) = (ρ_A_j) be the j-th 2× 2 block on the diagonal of the covariance matrix. By (<ref>) we know that the application of the local unitary U_H would change _j(ρ) to S_j _j(ρ) S_j^⊤. By choosing each local unitary to be a phase rotation that diagonalizes _j(ρ), followed by a squeezing operator that makes the diagonal elements equal, we get '_j=S_SqjS_Roj_j S_Roj^⊤ S_Sqj^⊤ =λ_j I with λ_j≥ 1. Note that λ_j=1 means that the marginal state ρ'_A_j is the vacuum state, which is pure and hence cannot be correlated with the other modes. Also,
λ_j>1 implies a thermal marginal state with mean-photon number n̅=(λ_j-1)/2.
Putting these together we find that there is a local Gaussian unitary operator V= U_H D_, consisting of local displacements, phase rotations and squeezing, that brings the covariance matrix to the desired form with marginal thermal states.
For m=2, the above procedure gives a covariance matrix of the form
[ λ_1 I '; '^⊤ λ_2 I ].
However, by including further local phase-rotation operations with the block-diagonal symplectic matrix S_H'=diag(S'_Ro1,S'_Ro2) into V, we can get
[ λ_1 I S'_Ro1' S'_Ro2^⊤; S'_Ro2'^⊤S'_Ro1^⊤ λ_2 I ],
where S'_Ro1' S'_Ro2^⊤= is diagonal. Thus, we obtain the standard form of the covariance matrix for bipartite Gaussian states.
Another useful phase-space quasiprobability distribution is the Glauber-Sudarshan P-function <cit.> that, in terms of the characteristic function, is given by
P() = 1/(2π)^2m∫_ℝ^2mχ() e^^⊤/4 e^i^⊤Ω_m ^2m.
Using this distribution, a density operator of an m-mode system can be expressed in terms of m-mode coherent states
ρ=∫_ℂ^mP(α) |α⟩⟨α| ^2mα,
where α=(α_1,α_2,…,α_m)^⊤∈ℂ^m and by using α_j=(s_2j-1+is_2j)/√(2) we have P(α)=2^m P(). For most quantum states the Glauber-Sudarshan P-function either takes negative values or is a highly-singular function, existing as a generalized distribution <cit.>; these states are known as nonclassical states <cit.>. Quantum states whose P(α) is a probability density distribution are known as classical states <cit.>. For Gaussian states, if
(ρ)=(ρ)- I_2m≥0,
where I_2m is the 2m× 2m identity matrix, then the Fourier transform (<ref>) exists and the Glauber-Sudarshan P-function is a Gaussian distribution,
P() = 1/π^m √() e^-(-)^⊤^-1(-).
In this case, the state is classical and separable.
§ AN ORTHONORMAL BASIS FOR LOCAL OPERATORS
In this section, we derive an orthonormal basis for the space of (local) operators with respect to a Gaussian state. Let ρ be an arbitrary quantum state which for the sake of simplicity, is assumed to be full-rank. Then, for any pair of operators X, X' we define
⟨ X, X'⟩_ρ:= (ρ X^† X').
⟨·, ·⟩_ρ satisfies all the properties of an inner product: it is linear in the second argument and anti-linear in the first argument; also, ⟨ X, X⟩_ρ≥ 0 and equality holds iff[Note that we assume that ρ is full-rank] X=0. Note that the objective function in the maximal correlation (<ref>) can be written in terms of this inner product:
|⟨ X_A, Y_B ⟩_ρ_AB|.
Thus, to compute the maximization in (<ref>) it would be helpful to compute an orthonormal basis for the space of local operators X_A, Y_B with respect to the inner products associated to
the marginal states ρ_A=_B(ρ_AB) and ρ_B=_A(ρ_AB), respectively.
Let ρ_AB be a two-mode Gaussian state. It is clear from the definition that local unitaries do not change the maximal correlation. Therefore, by using Proposition <ref> and without loss of generality, we assume that the covariance matrix of ρ_AB is in the standard form (<ref>) with (ρ_AB)=0.
In the following, we consider a single-mode thermal state with ()=0 and ()=λ I with λ> 1. This can be either of the marginal states ρ_A or ρ_B of the Gaussian state ρ_AB.
For any ∈ℝ^2, let
C_ =exp(^⊤Υ -λ/4^⊤ΥΥ^⊤),
where Υ is a 2× 2 matrix to be determined. Using the BCH formula, we have
C_^† C_ = η e^(^⊤Υ̅+^⊤Υ),
where Υ̅ is the entry-wise complex conjugate of Υ, and
η=exp( -λ/4(^⊤Υ̅Υ̅^⊤ + ^⊤ΥΥ^⊤) + i/2^⊤Υ̅Ω_1 Υ^⊤).
Then, by using (<ref>) and (<ref>), we have
( C_^† C_) = η∫_ℝ^2 W() e^(^⊤Υ̅+^⊤Υ) ^2
=exp(λ/2^⊤Υ̅Υ^⊤ + i/2^⊤Υ̅Ω_1 Υ^⊤),
where W()=exp(-^⊤/λ)/(πλ) is the Wigner function of the thermal state.
Now let
Υ= 1/√(2)[ 1 -i; 1 i ],
which is unitary and gives
Υ̅Ω_1 Υ^⊤ = [ -i 0; 0 i ].
This choice of Υ simplifies (<ref>) as
( C_^† C_)
=exp((λ+1)r_1 s_1/2+(λ-1)r_2 s_2/2)
= ∑_k, ℓ=0^∞1/k! ℓ!((λ+1)r_1 s_1/2)^ k((λ-1)r_2 s_2/2)^ℓ.
On the other hand, we define the operators H_k, ℓ by expanding C_ as a function of =(r_1, r_2)^⊤:
C_ = ∑_k, ℓ=0^∞1/√(k!ℓ!)ζ_0^k(λ)ζ_1^ℓ(λ) r_1^k r_2^ℓ H_k, ℓ,
with
ζ_0(λ) = √((λ+1) /2), ζ_1(λ) = √((λ-1) /2).
We note that H_k, ℓ is a polynomial of the
quadrature operators and of degree k+ℓ. For instance, H_0,0=I and
H_1, 0 = 1/√(λ+1)(-i), H_0, 1 = 1/√(λ-1)(+i).
By using the expansion (<ref>), we can then write
( C_^† C_)
= ∑_k, ℓ, k', ℓ'ζ_0^k+k'(λ)ζ_1^ℓ+ℓ'(λ)/√(k!ℓ!k'!ℓ'!) r_1^k r_2^ℓ s_1^k's_2^ℓ'( H^†_k, ℓ H_k', ℓ').
Comparing this equation with (<ref>) we find that
⟨ H_k, ℓ, H_k', ℓ'⟩_ = ( H_k, ℓ^† H_k', ℓ') = δ_k, k'δ_ℓ, ℓ'.
Let be a single-mode thermal state with ()=0 and ()= λ I with λ> 1. Define operators H_k, ℓ via (<ref>) where C_ is given in (<ref>). Then,
Γ={H_k, ℓ: k, ℓ≥ 0},
is an orthonormal basis for the space of operators with respect to the inner product ⟨·, ·⟩_.
We have already shown in (<ref>) that {H_k, ℓ: k, ℓ≥ 0} is an orthonormal set. It remains to show that {H_k, ℓ: k, ℓ≥ 0} span the whole space of operators.
Let 𝒱_t be the space of of polynomials of operators , of degree at most t. In other words,
𝒱_t = span{I, , , ^2, , ^2, …, ^t-1,^t}.
We note that, as mentioned above, H_k, ℓ is a polynomial of operators , of degree k+ℓ. Thus,
span{H_k, ℓ: k+ℓ≤ t}⊆𝒱_t.
On the other hand, by the orthogonality relations already established, we know that {H_k, ℓ: k+ℓ≤ t} is an independent set. Thus, computing the dimensions of both sides in the above inclusion, we find that span{H_k, ℓ: k+ℓ≤ t}= 𝒱_t. Thus, taking union over t≥ 1, we find that span(Γ) is equal to 𝒱_∞=∪_t 𝒱_t, i.e., the space of all polynomials of the quadrature operators. On the other hand, we know that the later set spans the whole space of operators.[This is essentially the content of the Stone-von Neumann theorem <cit.>.] In fact, 𝒱_∞ contains the displacement operators, and any bounded operator can be expressed in terms of displacement operators <cit.>.
§ MAXIMAL CORRELATION FOR BIPARTITE GAUSSIAN STATES
As discussed, the maximal correlation is invariant under local unitary transformations. Hence, in order to compute the maximal correlation for bipartite Gaussian states, we can restrict to Gaussian states in the standard form (<ref>) through Proposition <ref>. Let ρ_AB be a bipartite Gaussian state that is in the standard form with first moment (ρ_AB)=0 and the covariance matrix
_AB = (ρ_AB) = [ λ_A I ; ^⊤ λ_B I ], ν=[ ν_1 0; 0 ν_2 ].
Hence, the marginal states are thermal states with the covariance matrices (ρ_A) =λ_A I, (ρ_A) =λ_B I and (ρ_A) = (ρ_B)=0.
According to Theorem <ref>, we know that the sets
{H_k, ℓ^A: k, ℓ≥ 0} and {H_k, ℓ^B: k, ℓ≥ 0},
are orthonormal bases with respect to the inner products ⟨·, ·⟩_ρ_A and ⟨·, ·⟩_ρ_B, respectively. Here H_k, ℓ^A's and H_k, ℓ^B's are defined in terms of the corresponding quadrature operators and the parameter λ_A and λ_B, respectively. To compute the maximal correlation μ(A, B), we use the above bases to expand the local operator X_A and Y_B. Then, the objective function in the definition (<ref>), which is equal to |⟨ X_A, Y_B⟩_ρ_AB|, can be expressed in terms of the inner products ⟨ H_k, ℓ^A, H_k', ℓ'^B⟩_ρ_AB, which we compute in the following.
Let C_^A and C_^B be the operator (<ref>) in terms of the modal quadrature operators _A=(_A, _A)^⊤ and _B=(_B, _B)^⊤, respectively.
As C_^A and C_^B are local operators and commute, we have
(C_^A)^† C_^B = τ e^^⊤Υ_AB,
where
τ=exp(-λ_A/4^⊤Υ̅Υ̅^⊤-λ_B/4^⊤ΥΥ^⊤),
and
=[ ; ], and Υ= [ Υ̅ 0; 0 Υ ].
Thus, by using the Wigner function (<ref>), we can compute the following inner product
⟨ C_^A, C_^B⟩_ρ_AB = τ (ρ_AB e^^⊤Υ_AB)
= τ∫_ℝ^4 W_ρ_AB() e^^⊤Υ^4
= τ e^1/4^⊤Υ_ABΥ^⊤
= e^1/2^⊤Υ̅Υ^⊤
= ∑_p_00, p_01
p_10, p_11ω_00^p_00ω_01^p_01ω_10^p_10ω_11^p_11/p_00!p_01!p_10!p_11!
r_1^p_00+p_01 r_2^p_11+p_10
× s_1^p_00+p_10 s_2^p_01+p_11
where ω_00, …, ω_11 are entries of 1/2Υ̅Υ^⊤ given by
[ ω_00 ω_01; ω_10 ω_11 ] = 1/2Υ̅Υ^⊤ = 1/4[ ν_1+ν_2 ν_1-ν_2; ν_1-ν_2 ν_1+ν_2 ].
On the other hand, using the expansion (<ref>), we have
⟨ C_^A, C_^B⟩_ρ_AB
= ∑_k, ℓ
k', ℓ'α_0^kα_1^ℓβ_0^k'β_1^ℓ'/√(k!ℓ!k'!ℓ'!) r_1^kr_2^ℓ s_1^k's_2^ℓ'⟨ H_k, ℓ^A, H_k', ℓ'^B⟩_ρ_AB ,
where α_0=ζ_0(λ_A), α_1=ζ_1(λ_A), β_0=ζ_0(λ_B) and β_1=ζ_1(λ_B) are given in (<ref>). Comparing the above equations
yields
⟨ H_k, ℓ^A, H_k', ℓ'^B⟩_ρ_AB=0, if k+ℓ≠ k'+ℓ'.
Moreover, if k+ℓ = k'+ℓ', then
⟨ H_k, ℓ^A, H_k', ℓ'^B⟩_ρ_AB = √(k!ℓ!k'!ℓ'!)/α_0^kα_1^ℓβ_0^k'β_1^ℓ' ∑_p_00+ p_01=k
p_10+p_11=ℓ
p_00+ p_10=k'
p_01+p_11=ℓ' ω_00^p_00ω_01^p_01ω_10^p_10ω_11^p_11/p_00!p_01!p_10!p_11!.
Now let X_A, Y_B be arbitrary operators that satisfy the conditions (ρ_AX_A)=(ρ_B Y_B)=0 and (ρ_AX_A X_A^†)=(ρ_B Y_B Y^†_B)=1. Consider the expansion of these operators in the orthonormal bases {H_k, ℓ^A: k, ℓ≥ 0} and {H_k', ℓ'^B: k', ℓ'≥ 0} as follows:
X_A = ∑_k, ℓ f_k, ℓ H_k, ℓ^A, and Y_B = ∑_k', ℓ' g_k, ℓ H_k', ℓ'^B.
The first condition on X_A, Y_B means that ⟨ I_A, X_A⟩_ρ_A= ⟨ I_B, Y_B⟩_ρ_B=0. As I_A=H_0,0^A and I_B=H_0,0^B, we find that f_0,0=g_0,0=0. The second condition on X_A, Y_B can also be written as ⟨ X_A, X_A⟩_ρ_A =⟨ Y_B, Y_B⟩_ρ_B=1. Thus,
^2= ^2=1,
where = (f_0,1, f_1, 0, f_1, 1, …)^⊤ and = (g_0,1, g_1, 0, g_1, 1, …)^⊤ are the vectors of coefficients excluding the first ones f_0,0, g_0,0 that are zero.
Hence, the inner product can be written as
⟨ X_A, Y_B⟩_ρ_AB = ∑_k, ℓ
k', ℓ'f̅_k, ℓ g_k', ℓ'⟨ H_k, ℓ^A, H_k', ℓ'^B⟩_ρ_AB.
Let 𝒬 be the matrix whose rows and column are indexed by pairs {(k, ℓ): k+ℓ≥ 1}, and whose ((k', ℓ'), (k, ℓ) )-th entry is equal to
_(k', ℓ'), (k, ℓ) =⟨ H_k, ℓ^A, H_k', ℓ'^B⟩_ρ_AB.
We note that by (<ref>), is a block-diagonal matrix whose t-th block ^(t) is associated with pairs (k, ℓ) with k+ℓ=t and is of size (t+1)× (t+1):
= [ ^(1) 0 0 ⋯; 0 ^(2) 0 ⋯; 0 0 ^(3) ⋯; ⋮ ⋮ ⋮ ⋱ ].
The matrix elements in the t-th block, for 0≤ℓ, ℓ' ≤ t, are given by
(^(t))_ℓ, ℓ' = ⟨ H_t-ℓ, ℓ^A, H_t-ℓ', ℓ'^B⟩_ρ_AB
= √((t-ℓ)!ℓ!(t-ℓ')!ℓ'!)/α_0^kα_1^ℓβ_0^k'β_1^ℓ'∑_ p_10+p_11=ℓ
p_01+p_11=ℓ'
p_00+p_01+p_10+p_11=t ω_00^p_00ω_01^p_01ω_10^p_10ω_11^p_11/p_00!p_01!p_10!p_11!.
In particular,
the first block reads
^(1)
= [ ω_00/α_0β_0 ω_01/α_0β_1; ω_10/α_1β_0 ω_11/α_1β_1 ]
=1/2[ (ν_1+ν_2)/√((λ_A+1)(λ_B+1) ) (ν_1-ν_2)/√((λ_A+1)(λ_B-1) ); (ν_1-ν_2)/√((λ_A-1)(λ_B+1) ) (ν_1+ν_2)/√((λ_A-1)(λ_B-1) ) ]
=1/2[ α_0^-1 0; 0 α_1^-1 ]Υ̅Υ^⊤[ β_0^-1 0; 0 β_1^-1 ].
Now we can state the main result of this paper.
Let ρ_AB be a Gaussian state with (ρ_AB)=0 and covariance matrix (<ref>). Let {H_k, ℓ^A: k, ℓ≥ 0} and {H_k', ℓ'^B: k', ℓ'≥ 0} be orthonormal bases for the spaces of local operators of modes A and B, respectively, constructed
in Theorem <ref>. Let be the matrix consisting of inner products of operators in {H_k, ℓ^A: k+ ℓ> 0} and {H_k', ℓ'^B: k'+ ℓ'> 0} defined as in (<ref>) and with the block structure given in (<ref>) and (<ref>). Then, the maximal correlation for the Gaussian state is given by
μ(A, B) = ^(1).
Equivalently, this means that in computing the maximal correlation in (<ref>) we may restrict to X_A, Y_B that are linear in quadrature operators.
By using (<ref>) and (<ref>), the maximal correlation (<ref>) for a Gaussian state reads
μ(A, B) = =max_==1 |^†|,
where is the operator norm of . Given the block structure of we know that = max_t ^(t). Thus, to prove the theorem we need to show that
^(1)≥^(t), ∀ t>1.
To this end, we derive an equivalent representation of the matrices ^(t).
For 0≤ℓ≤ t and =(b_1, …, b_t)∈{0,1}^t with ||=∑_i b_i define
s_ℓ, = δ_ℓ, ||√(ℓ! (t-ℓ)!/t!),
and let S be the matrix of size (t+1)× 2^t with entries s_j,.
Observe that
(SS^†)_ℓ, ℓ' = ∑_ s_ℓ, s_ℓ',
= ∑_δ_ℓ, ||δ_ℓ', ||ℓ! (t-ℓ)!/t!
= δ_ℓ, ℓ'∑_: ||=ℓℓ! (t-ℓ)!/t!
=δ_ℓ, ℓ'.
Thus SS^†=I_t+1 with I_t+1 being (t+1)×(t+1) identity matrix. Next, to simplify the notation we use
=^(1),
and compute
(S ^⊗ t S^†)_ℓ, ℓ'
= ∑_, ' s_ℓ , s_ℓ' , '^⊗ t_, '
= ∑_, 'δ_ℓ, ||δ_ℓ', |'|√(ℓ! (t-ℓ)!ℓ'!(t-ℓ')!)/t!^⊗ t_, '.
For a given , '∈{0,1}^t define p_aa'
as follows:
p_aa' = {i: (b_i, b'_i) = (a,a')}, (a, a')∈{0,1}^2.
Hence, by using (<ref>), we get
^⊗ t_, ' = _00^p_00_01^p_01_10^p_10_11^p_11
= ω_00^p_00ω_01^p_01ω_10^p_10ω_11^p_11/α_0^p_00+p_01α_1^p_10+p_11β_0^p_00+p_10β_1^p_01+p_11.
On the other hand, we note that if ||=ℓ and |'|=ℓ', then
ℓ=p_10+p_11, and ℓ'=p_01+p_11.
For a fixed tuple (p_00, p_01, p_10, p_11) satisfying these equations, we can see that there are
tp_00, p_01, p_10, p_11 = t!/p_00! p_01! p_10! p_11!,
pairs of (, ') that satisfy (<ref>). Therefore, putting these together and comparing with (<ref>), we obtain
(S^⊗ t S^†)_ℓ, ℓ' = ∑_p_10+p_11=ℓ
p_01+p_11=ℓ'
p_00+p_01+p_10+p_11=t tp_00, p_01, p_10, p_11√(ℓ! (t-ℓ)!ℓ'!(t-ℓ')!)/t!_11^p_00_12^p_01_21^p_10_22^p_11
= ∑_p_10+p_11=ℓ
p_01+p_11=ℓ'
p_00+p_01+p_10+p_11=t √(ℓ! (t-ℓ)!ℓ'!(t-ℓ')!)/p_00! p_01! p_10! p_11!ω_00^p_00ω_01^p_01ω_10^p_10ω_11^p_11/α_0^p_00+p_01α_1^p_10+p_11β_0^p_00+p_10β_1^p_01+p_11
= ^(t)_ℓ, ℓ'.
Therefore, S^⊗ t S^†= ^(t) and
^(t) =S^⊗ t S^†
≤S·S^†·^⊗ t
= ^⊗ t = ^t,
where in the second line we use the fact that SS^†=I_t+1 which gives S=S^†= 1. Next, we note that ≤ 1 because
=max_, ≠ 0| ^† |/·
= max_, ≠ 0| ⟨ f_0H_1,0^A + f_1H_0,1^A, g_0H_1,0^B + g_1H_0,1^B⟩_ρ_AB |/·
≤max_, ≠ 0 f_0H_1,0^A + f_1H_0,1^A ·g_0H_1,0^B + g_1H_0,1^B /·
= 1,
where in the third line we use the Cauchy-Schwarz inequality and in the last line we use the fact that {H_1,0^A + H_0,1^A} and {H_1,0^B + H_0,1^B} are orthonormal. Thus,
^(t)≤^t ≤= ^(1),
and
therefore the maximal correlation for a Gaussian state in the standard form becomes
μ(A, B) =^(1)=max_==1 | ^†^(1) |.
This implies that the optimal local operators by using (<ref>) can be expressed as a linear combination of quadrature operators
X_A =f_0H_1,0^A + f_1H_0,1^A = α_x _A + α_p _A,
Y_B =g_0H_1,0^B + g_1H_0,1^B = β_x _B + β_p _B,
where the coefficients are determined by (<ref>). Note that, in general, the coefficients may be complex numbers, and hence the optimal operators may not correspond to local physical observables.
§ GAUSSIAN MAXIMAL CORRELATION
In this section, we define another measure of correlation for bipartite Gaussian states by restricting the optimization in (<ref>) to Gaussian observables <cit.>, i.e., operators that are Hermitian and linear in terms of quadrature operators and correspond to homodyne measurements. We refer to this new correlation measure as the Gaussian maximal correlation which is given by
μ_G(A, B) = sup_X_A, Y_B(ρ_AB X_A⊗ Y_B),
where ρ_AB is a bipartite Gaussian state, and X_A, Y_B are local Hermitian observables that are linear in terms of quadrature operators and satisfy (ρ_A X_A)= (ρ_B Y_B)=0 and (ρ_AX_A^2)=(ρ_B Y_B^2)=1. Note that by definition, μ_G(A, B)≤μ(A, B).
Suppose that the covariance matrix of ρ_AB is
_AB = (ρ_AB) = [ _A _AB; _AB^⊤ _B ],
and for simplicity assume that (ρ_AB)=0. By the restrictions on X_A, Y_B, there are real vectors _A, _B such that X_A=_A^⊤_A, Y_B=_B^⊤_B and
1 =(ρ_A X_A^2)
=1/2( ρ_A {X_A, X_A})
=1/2_A^⊤( ρ_A {_A, _A})_A
=1/2_A^⊤_A _A,
and similarly _B^⊤_B _B =2. Note that (ρ_A X_A) = (ρ_B Y_B)=0 is automatically satisfied since (ρ_AB)=0.
Next, similar to the above computation, it is easily verified that 2(σ_AB X_A⊗ Y_B)=_A^⊤_AB_B. Therefore, rescaling _A, _B by a factor of √(2), the Gaussian maximal correlation reads
μ_G(A, B) = max__A, _B _A^⊤_AB_B
_A^⊤_A _A=1
_B^⊤_B _B=1.
Writing the above optimization in terms of _A= _A^1/2_A and _B= _B^1/2_B, we find that
μ_G(A, B)=_A^-1/2_AB_B^-1/2.
Therefore, for a Gaussian state in the standard form (<ref>) with |ν_1|≥|ν_2|, which can always be accomplished by relabeling the phase-space quadratures, the Gaussian maximal correlation becomes
μ_G(A, B) = |ν_1|/√(λ_A λ_B).
Note that the joint probability distribution p(x_A,x_B) associated with local homodyne measurements on the x-quadratures is Gaussian with Cov[x_A,x_B]=ν_1, Var[x_A]=λ_A, and Var[x_B]=λ_B. Therefore, comparing this equation with (<ref>), we observe that the Gaussian maximal correlation is in fact the classical maximal correlation of the outcome probability distribution of optimal local homodyne measurements. However, unlike the classical case, (<ref>) shows that μ_G(A, B) cannot be equal to one, as due to the uncertainty relation (<ref>) the covariance matrix of physical states cannot have a zero eigenvalue.
Considering the characterization of Gaussian cptp maps <cit.>, one can verify that μ_G(A, B) is monotone under local Gaussian cptp maps; the point is that under such local super-operators in the Heisenberg picture, linear operators are mapped to linear operators. Therefore, correlations between phase-space quadratures cannot be increased under Gaussian operations. Gaussian maximal correlation also satisfies the tensorization property. To verify this, it suffices to use (<ref>), the fact that (ρ_AB⊗ρ_A'B') = (ρ_AB)⊕(ρ_A'B') and ξ⊕η= max{ξ, η}. Therefore, the Gaussian maximal correlation satisfies both the monotonicity and tensorization properties, and therefore can be used to study the local state transformation problem when both resource and target states are Gaussian. For example, this result shows that n copies of a Gaussian in the standard form with the Gaussian maximal correlation (<ref>), cannot be locally transformed into another Gaussian state with the same marginal states but with |ν_1'|>|ν_1|.
We state yet another reformulation of the Gaussian maximal correlation. Note that
(_A⊕_B)^-1/2 _AB (_A⊕_B)^-1/2
= [ I_A _A^-1/2_AB_B^-1/2; _B^-1/2_AB^⊤_A^-1/2 I_B ].
Then, using (<ref>) we fine that (_A⊕_B)^-1/2_AB (_A⊕_B)^-1/2≥ 1- μ_G(A, B). Therefore, we can write
μ_G(A, B)=1-V(A,B) where V(A,B)=max{q≤1:_AB≥ q(_A⊕_B)}. This formulation of the Gaussian maximal correlation is related to the measure for Gaussian resources <cit.> and is reminiscent of the entanglement measure introduced in <cit.> for Gaussian states.
Indeed, the measure of <cit.> is defined by V'(A, B)=max{q≤1:_AB≥ q('_A⊕'_B)} where '_A, '_B are covariance matrices of some quantum states, while in our case they are the covariance matrices of the marginal states of ρ_AB.
We finish this section by emphasizing on the fact that the Gaussian maximal correlation is monotone only if we restrict to local Gaussian operations, while the quantum maximal correlation studies in previous sections is monotone under all local operations.
§ EXAMPLES
In this section, we further illustrate various features of the correlation measures by considering examples of Gaussian states. We consider two classes of bipartite Gaussian states that are in the standard form with symmetric marginal states and zero first-order moments.
The first class of Gaussian states is described by the covariance matrix (<ref>) with λ_A=λ_B=λ>1 and ν_1=-ν_2=ν≥0. The physicality condition (<ref>) implies that ν≤√(λ^2-1), and the state is entangled for λ-1<ν<√(λ^2-1). We refer to these states as correlated-anticorrelated (CA) Gaussian states. The maximal correlation for these states, using (<ref>) and (<ref>), is given by
μ__CA(A,B) = max_==1[ f̅_0 f̅_1 ][ 0 ν/√(λ^2-1 ); ν/√(λ^2-1 ) 0 ][ g_0; g_1 ]
=ν/√(λ^2-1),
where the maximum is attained for f_0=f_1=g_0=g_1=1/√(2). Hence, optimal local operators using (<ref>) and (<ref>) can be found as X_A=_A^†/√(λ+1)+_A/√(λ-1) and Y_A=_B^†/√(λ+1)+_B/√(λ-1), which are not hermitian and cannot be viewed as physical observables.
Note that for ν=√(λ^2-1), the Gaussian state corresponds to a two-mode squeezed vacuum state,
|ψ_AB⟩=√(2/λ+1)∑_n (λ-1/λ+1)^n/2|n_A,n_B⟩,
which is a pure entangled state with μ__CA(A,B)=1. Here {|n_A⟩} and {|n_B⟩} are the Fock states. Thus, following Section <ref>, one can easily verify that for two-mode squeezed vacuum states the maximal correlation of μ=1 can be achieved using local hermitian operators X_A=(_A^†_A-n̅)/Δ n=H_1,1^A and Y_B=(_B^†_B-n̅)/Δ n=H_1,1^B, where n̅=(λ-1)/2 and Δ n=√(λ^2-1)/2 are the mean and the standard deviation of photon-number distribution of the marginal states. This implies that the same maximal correlation can be obtained for two-mode squeezed vacuum states by using local hermitian operators that are quadratic in the phase-space quadrature operators. This means that, in general, optimal local operators for the maximal correlation are not unique.
As discussed, the maximal correlation for Gaussian states can be used to study the local state transformation problem when the target state is not Gaussian. For example, by using (<ref>), it can be seen that any arbitrary number of copies of CA Gaussian states cannot be locally transformed into the noisy Bell state (<ref>) without classical communication if ν<κ√(λ^2-1). Note, however, that if two states have the same amount of the maximal correlation, it is not clear whether or how the two states can locally be transformed into one another in general.
We also consider a second class of Gaussian states described by the covariance matrix (<ref>) with λ_A=λ_B=λ>1 and ν_1=ν_2=ν≥0. Note that for all physical values of ν≤λ-1, these states are separable with a nonnegative Glauber-Sudarshan P-function. We refer to these states as correlated-correlated (CC) Gaussian states. Using (<ref>) and (<ref>), the maximal correlation is given by
μ__CC(A,B) = max_==1[ f̅_0 f̅_1 ][ ν/λ+1 ; 0 ν/λ-1 ][ g_0; g_1 ]
=ν/λ-1.
Here, for g_0=f_0=0 and g_1=f_1=1, we can see that optimal local operators X_A=_A√(2/(λ-1)) and Y_B=_B/√(2/(λ-1)) are not hermitian again. Of particular interest is the case of ν=λ-1 where μ__CC(A,B)=1. In this case, the Gaussian state can be written as
ρ_AB=∫2e^-2|α|^2/(λ-1)/(λ-1)π|α⟩⟨α|⊗|α⟩⟨α|^2α.
Using this representation, we can see that for any local measurements {Π_A,n: n} and {Π_B,m: m},
(ρ_ABΠ_A,n⊗Π_B,m)=∫ 2e^-2|α|^2/(λ-1)/(λ-1)π⟨α|Π_A,n|α⟩
×⟨α|Π_B,m|α⟩^2α≠0,
for any n and m.
Note that here the positivity of measurement operators implies ⟨α|Π_B,n|α⟩≥0 and ⟨α|Π_A,m|α⟩≥0. Also, ⟨α|Π|α⟩ is, in general, an everywhere convergent power series in terms of α and α̅ and cannot be identical to zero on some nontrivial region, unless Π=0 <cit.>. Therefore, ⟨α|Π_A,n|α⟩⟨α|Π_B,m|α⟩ cannot be zero almost everywhere. As the joint outcome probability distribution (<ref>) is not in the form of (<ref>), μ__CC(A,B)=1 for ν=λ-1 cannot be achieved using hermitian local operators. This example shows that the maximal correlation of continuous-variable systems must be optimized over all hermitian and non-hermitian local operators.
It is easy to verify that even for non-Gaussian bipartite states of this form
ρ_AB=∫ P(α) |α⟩⟨α|⊗|α⟩⟨α|^2α,
where P(α) is not necessarily Gaussian, the quantum maximal correlation of one is achieved using non-hermitian local operators X_A=(_A-⟨_A⟩)/Δ_A and Y_B=(_B-⟨_B⟩)/Δ_B with ⟨_A⟩=⟨_A⟩=∫ P(α)α ^2α and Δ_A^2=∫ P(α)|α|^2 ^2α-⟨_A⟩^2=Δ_B^2. This fact can also be verified by examples of two-qubit states; see the updated arXiv version of <cit.>.
Comparing the maximal correlation of the CC and CA states for the same marginal states and 0≤ν≤λ-1, in which case both states are separable, we can see that μ__CC(A,B)<μ__CA(A,B). Although the only difference between the two classes is the sign of the correlation, this shows that any arbitrary number of copies of the CC state cannot be transformed to the CA state by local operations and without classical communication. We note, however, that these two states have the same amount of Gaussian maximal correlation since by (<ref>)
μ_G_CA(A,B)=μ_G_CC(A,B)=ν/λ.
Hence, although the maximal correlation gives impossibility of local state transformation of the CC state to the CA state, the Gaussian maximal correlation cannot detect this. We also note that for these states the Gaussian maximal correlation is strictly less than the maximal correlation given by (<ref>) and (<ref>).
As an application of the Gaussian maximal correlation measure, suppose that a third party prepares a CA state ρ_AB and sends one subsystem to Alice and the other one to Bob through lossy channels. The covariance matrix of the shared state between Alice and Bob is given by <cit.>
[ (τ_Aλ+1-τ_A) I √(τ_Aτ_B)ν Z; √(τ_Aτ_B)ν Z (τ_Bλ+1-τ_B)I; ],
where 0≤τ_A≤1 and 0≤τ_B≤1 are the transmissivities of lossy channels to Alice and Bob, and Z=diag(1,-1). We can then see that, if τ_A<1 and/or τ_B<1, the Gaussian maximal correlation of the shared state is less than the Gaussian maximal correlation of the initial state,
√(τ_Aτ_B)ν/√((τ_Aλ+1-τ_A)(τ_Bλ+1-τ_B))<ν/λ.
Therefore, using any arbitrary number of copies of the shared state and without classical communication, Alice and Bob cannot locally retrieve the initial state ρ_AB.
§ MULTIPARTITE GAUSSIAN STATES
Classical maximal correlation for multipartite probability distributions is first defined in <cit.>. The maximal correlation of an m-partite distribution is a subset of [0,1]^m, called the maximal correlation ribbon. This subset for m=2 is fully characterized in terms of a single number that is the (bipartite) maximal correlation <cit.>. Thus, the maximal correlation ribbon is really a generalization of the (bipartite) maximal correlation. Moreover, maximal correlation ribbon satisfies the data processing and tensorization properties, which are required for the local state transformation problem in the multipartite case.
In this section, we first generalize the classical notion of the maximal correlation ribbon for multipartite quantum states. Then, we characterize the quantum maximal correlation ribbon for multipartite Gaussian states. Here, we briefly discuss these results and give the details in Appendix <ref> and Appendix <ref>.
Following the definition of the maximal correlation ribbon in the classical case <cit.>, in order to define a quantum maximal correlation ribbon we first need a notion of quantum conditional expectation. Let ρ_A^m=ρ_A_1, …, A_m be an m-partite quantum state, and let ρ_A_j, j=1, …, m be its marginal states. For simplicity we assume that ρ_A_j is full-rank for all j. Then, for any 1≤ j≤ m define the super-operator (·) by
_j(X) = _ j (Xρ_A^mρ_A_j^-1),
where by _ j we mean tracing out all the subsystems except the j-th one. _j(·) behaves like a “conditional expectation" whose properties are given in Lemma <ref> in Appendix <ref>.
Next, recall that the variance of an operator X is defined by
(X) = ⟨ X, X⟩_ρ_A^m - |(ρ_A^mX)|^2
= ⟨ X-(ρ_A^mX) I, X-(ρ_A^mX) I⟩_ρ_A^m
= X-(ρ_A^mX) I^2,
where as before ⟨ X, Y⟩_ρ_A^m = (ρ_A^m X^† Y).
For an m-partite quantum state ρ_A_1, …, A_m let (A_1, …, A_m)⊆ [0,1]^m be the set of tuples (θ_1, …, θ_m) such that for any operator X=X_A^n we have
(X)≥∑_j θ_j (_j(X)).
We call (A_1, …, A_m) the maximal correlation ribbon (MC ribbon) of ρ_A_1, …, A_m.
Remark that since (X)≥ 0, in the definition of (A_1, …, A_m) we restrict to θ_j≥ 0. Moreover, as shown in Lemma <ref> in Appendix <ref>, we have
(X)≥(_j(X)), ∀ j.
Thus, (<ref>) implies θ_j≤ 1. This is why (A_1, …, A_m) is defined as a subset of [0,1]^m. Moreover, by (<ref>), any (θ_1, …, θ_m)∈ [0,1]^m with ∑_j θ_j≤ 1 belongs to (A_1, …, A_m) for any ρ_A^m. Thus, the interesting part of (A_1, …, A_m) is the subset [0,1]^m beyond the above trivial subset. Finally, from the definition, it is clear that (A_1, …, A_m) is a convex set. See Figure <ref> for a typical shape of the MC ribbon.
It can be shown that for product states ρ_A^m= ρ_A_1⊗⋯⊗ρ_A_m, the MC ribbon is the largest possible set: (A_1, …, A_m)= [0,1]^m. On the other hand, for the maximally entangled state 1/√(2)(|00⟩ +|11⟩), the MC ribbon consists of only trivial points: (A_1, A_2)= {(θ_1, θ_2)∈ [0,1]^2: ∑_j θ_j≤ 1 }. See Appendix <ref> for more details.
In particular, as shown in Theorem <ref> in Appendix <ref> when m=2, the pair (θ_1, θ_2)∈ [0,1]^2 belongs to (A_1, A_2) if and only if
(1/θ_1 -1 )(1/θ_2 -1 )≥μ^2(A_1, A_2),
where μ(A_1, A_2) is the maximal correlation of the bipartite state. This shows that the MC ribbon can be viewed as the generalization of the maximal correlation.
As shown in Theorem <ref> in Appendix <ref>, maximal correlation ribbon also satisfies the data processing and the tensorization properties:
* (Data processing) For local quantum operations Φ^(j)_A_j→ A'_j, if
σ_A'^m = Φ^(1)_A_1→ A'_1⊗⋯⊗Φ^(m)_A_m→ A'_m(ρ_A^m),
then (A_1, …, A_m)⊆(A'_1, …, A'_m).
* (Tensorization) For any ρ_A^m and any integer n we have
(A_1^n,…, A_m^n) = (A_1,…, A_m),
where the left hand side is the MC ribbon of ρ_A^m^⊗ n.
These two properties show that the MC ribbon is a relevant invariant for the local state transformation problem in the multipartite case.
Now we get to our main problem, namely, how to compute the MC ribbon for multipartite Gaussian states. The following theorem, that is a generalization of Theorem <ref>, is our main result in this direction.
(Informal)
To compute the MC ribbon for Gaussian state it suffices to restrict X in (<ref>) to operators that are linear in phase-space quadrature operators.
For a formal statement of this result and its proof see Appendix <ref>.
Motivated by the definition of the Gaussian maximal correlation (<ref>), we can define a Gaussian maximal correlation ribbon for multipartite Gaussian states as follows. For an m-mode Gaussian state ρ_A_1, …, A_m let _G(A_1, …, A_m) be the set of tuples (θ_1, …, θ_m)∈ [0,1]^m satisfying
(∑_j=1^m X_j) ≤∑_j=1^m 1/θ_j(X_j),
for all local operators X_1, …, X_m that are hermitian and linear in terms of phase-space quadrature operators. We note that, by Theorem <ref> in Appendix <ref>, removing the latter constraints on X_j's, we recover (A_1, …, A_m). Therefore, we have (A_1, …, A_m)⊆_G(A_1, …, A_m). Moreover, it is not hard to verify that _G(A_1, …, A_m) is monotone under the action of local Gaussian operations and satisfies tensorization (in the sense of Theorem <ref>).
To find an equivalent characterization of _G(A_1, …, A_m),
a straightforward computation as in the bipartite case shows that (θ_1, …, θ_m) belongs to _G(A_1, …, A_m) if and only if
[ 1/θ_1_A_1 0 ⋯ 0; 0 1/θ_2_A_2 ⋯ 0; ⋮ ⋮ ⋱ ⋮; 0 0 ⋯ 1/θ_m_A_m ]≥_A_1, …, A_m,
where _A_1, …, A_m is the covariance matrix of ρ_A_1, …, A_m and _A_j is the covariance matrix of its marginal ρ_A_j.
§ DISCUSSION
The maximal correlation is of particular interest for the local state transformation problem, where two parties are restricted to local operations but do not have access to classical communication.
We have shown that the maximal correlation for bipartite Gaussian states can be simply calculated by restricting the optimization to local operators that are linear in terms of the phase-space quadrature operators. These optimal local operators may not be hermitian and therefore the maximal correlation, in general, is an upper bound on the classical maximal correlation of the joint outcome probability distribution associated with optimal local measurements (local hermitian observables). Using our results, one can investigate the problem of local state transformation with local operations when either the resource or the target state is Gaussian.
We have also introduced the Gaussian maximal correlation, as another measure of correlation for Gaussian states, by restricting the optimization to the class of hermitian and linear operators in terms of quadrature operators. This measure corresponds to performing optimal homodyne measurements on the phase-space quadratures, and is relevant to the local state transformation when both the resource and the target states are Gaussian. Nevertheless, we have shown through examples, that sometimes the maximal correlation gives stronger bounds on the local state transformation
compared to the Gaussian maximal correlation even if both the states are Gaussian.
An interesting question, motivated by the definition of the Gaussian maximal correlation, is whether one can define other variants of maximal correlation by considering hermitian local operators that are quadratic or higher order in terms of quadrature operators. As we have shown for two-mode squeezed vacuum states, the optimal local measurements yielding the maximal correlation of one are photon-counting measurements that are non-Gaussian. This suggests that the maximization in the Gaussian maximal correlation can be further optimized using hermitian and quadratic operators in terms of quadrature operators. We leave the study of the properties of such invariants for future works.
We have also generalized the maximal correlation to the quantum maximal correlation ribbon for the multipartite case. We have shown that the quantum maximal correlation ribbon of Gaussian states can also be computed by restricting to local operators that are linear in terms of quadrature operators. Further, we have discussed its Gaussian version based on using Gaussian local observables.
In this paper, both in the bipartite and multipartite cases, in the computation of maximal correlation for Gaussian states we assume that each subsystem consists of a single mode. Another interesting problem it to generalize our results to cases where each party can have more than one mode of the shared Gaussian state. For example, one can consider the maximal correlation of a Gaussian state ρ_AB in which each subsystem A, B consists of two modes.
Hypercontractivity ribbon is another invariant of quantum states that gives bounds on the local state transformation problem <cit.>. It would be interesting to compute the hypercontractivity ribbon for Gaussian states.
Finally, the quantum maximal correlation is really a measure of correlation and not a measure of entanglement, as it can take its maximum value on separable states. It is desirable to find a measure of entanglement that satisfies the tensorization property; see <cit.> for an attempt in this direction.
35
fxundefined [1]
ifx#1
fnum [1]
#1firstoftwo
secondoftwo
fx [1]
#1firstoftwo
secondoftwo
noop [0]secondoftwo
ref[1]@startlink#1@href
href[1]#1@endlink
anitize@url [0]`
12`$12`&12`#12`1̂2`_12`%12
startlink[1]
endlink[0]
rl [1]href #1
@bib@innerbibempty
[Bennett et al.(1996a)Bennett, Bernstein, Popescu, and Schumacher]BennettPRA1996
author author C. H. Bennett, author H. J. Bernstein, author S. Popescu, and author B. Schumacher, title title Concentrating partial entanglement by
local operations, https://doi.org/10.1103/PhysRevA.53.2046
journal journal Phys. Rev. A volume 53, pages 2046 (year
1996a)NoStop
[Bennett et al.(1996b)Bennett, Brassard, Popescu, Schumacher,
Smolin, and Wootters]BennettPRL1996
author author C. H. Bennett, author G. Brassard,
author S. Popescu, author B. Schumacher, author
J. A. Smolin, and author
W. K. Wootters, title
title Purification of noisy entanglement and faithful
teleportation via noisy channels, https://doi.org/10.1103/PhysRevLett.76.722 journal journal Phys. Rev. Lett. volume 76, pages 722 (year 1996b)NoStop
[Bennett et al.(1996c)Bennett, DiVincenzo, Smolin, and Wootters]BennettPRA1996-2
author author C. H. Bennett, author D. P. DiVincenzo, author J. A. Smolin, and author W. K. Wootters, title title Mixed-state entanglement
and quantum error correction, https://doi.org/10.1103/PhysRevA.54.3824 journal journal Phys. Rev. A volume 54, pages 3824 (year 1996c)NoStop
[Horodecki et al.(2009)Horodecki, Horodecki, Horodecki, and Horodecki]HorodeckiRMP2009
author author R. Horodecki, author P. Horodecki, author M. Horodecki, and author K. Horodecki, title title Quantum entanglement, https://doi.org/10.1103/RevModPhys.81.865 journal
journal Rev. Mod. Phys. volume 81, pages 865 (year 2009)NoStop
[Horodecki et al.(1998)Horodecki, Horodecki, and Horodecki]HorodeckiPRL98
author author M. Horodecki, author P. Horodecki, and author R. Horodecki, title title Mixed-state
entanglement and distillation: Is there a “bound” entanglement in
nature?, https://doi.org/10.1103/PhysRevLett.80.5239 journal journal Phys. Rev. Lett. volume 80, pages 5239 (year
1998)NoStop
[Beigi(2013)]Beigi13
author author S. Beigi, title title A new quantum data
processing inequality, https://doi.org/10.1063/1.4818985
journal journal Journal of Mathematical Physics volume 54, pages 082202 (year 2013)NoStop
[Ghazi et al.(2016)Ghazi,
Kamath, and Sudan]GhaziFOCS2016
author author B. Ghazi, author P. Kamath, and author M. Sudan, title title Decidability of non-interactive simulation of
joint distributions, in https://doi.org/10.1109/FOCS.2016.65
booktitle 2016 IEEE 57th Annual Symposium on Foundations
of Computer Science (FOCS) (year 2016) pp. pages 545–554NoStop
[Qin and Yao(2021)]QinYao2021
author author M. Qin and author P. Yao, title title Nonlocal games with noisy maximally
entangled states are decidable, https://doi.org/10.1137/20M134592X
journal journal SIAM Journal on Computing volume 50, pages 1800 (year
2021)NoStop
[Lami et al.(2018)Lami,
Regula, Wang, Nichols,
Winter, and Adesso]LamiPRA2018
author author L. Lami, author B. Regula,
author X. Wang, author
R. Nichols, author A. Winter, and author G. Adesso, title title Gaussian
quantum resource theories, https://doi.org/10.1103/PhysRevA.98.022335 journal journal Phys. Rev. A volume 98, pages 022335 (year 2018)NoStop
[Lami et al.(2019)Lami,
Regula, and Adesso]LamiPRL2019
author author L. Lami, author B. Regula, and author G. Adesso, title title Generic bound coherence under strictly incoherent
operations, https://doi.org/10.1103/PhysRevLett.122.150402
journal journal Phys. Rev. Lett. volume 122, pages 150402 (year
2019)NoStop
[Lee et al.(2022)Lee,
Baek, Park, Kim, and Nha]LeePRR2022
author author J. Lee, author K. Baek, author J. Park, author
J. Kim, and author
H. Nha, title title Fundamental limits on concentrating and preserving tensorized
quantum resources, https://doi.org/10.1103/PhysRevResearch.4.043070 journal
journal Phys. Rev. Research volume
4, pages 043070 (year 2022)NoStop
[Eisert et al.(2002)Eisert,
Scheel, and Plenio]EiserScheelPlenio
author author J. Eisert, author S. Scheel, and author M. B. Plenio, title title Distilling gaussian states with
gaussian operations is impossible, https://doi.org/10.1103/PhysRevLett.89.137903 journal
journal Phys. Rev. Lett. volume 89, pages 137903 (year 2002)NoStop
[Giedke and Ignacio Cirac(2002)]GiedkeCirac02
author author G. Giedke and author J. Ignacio Cirac, title title Characterization of
gaussian operations and distillation of gaussian states, https://doi.org/10.1103/PhysRevA.66.032316 journal journal Phys. Rev. A volume 66, pages 032316 (year 2002)NoStop
[Fiurá ššek(2002)]FiurasekPRL2002
author author J. Fiurá ššek, title
title Gaussian transformations and distillation of entangled
gaussian states, https://doi.org/10.1103/PhysRevLett.89.137904
journal journal Phys. Rev. Lett. volume 89, pages 137904 (year
2002)NoStop
[Giedke and Kraus(2014)]GiedkeKraus14
author author G. Giedke and author B. Kraus, title title Gaussian local unitary equivalence of
n-mode gaussian states and gaussian transformations by local operations
with classical communication, https://doi.org/10.1103/PhysRevA.89.012335 journal journal Phys. Rev. A volume 89, pages 012335 (year 2014)NoStop
[Hirschfeld(1935)]Hirschfeld1935
author author H. O. Hirschfeld, title title A connection between
correlation and contingency, https://doi.org/10.1017/S0305004100013517 journal journal Mathematical Proceedings of the Cambridge Philosophical Society volume 31, pages 520 (year
1935)NoStop
[Gebelein(1941)]Gebelein1941
author author H. Gebelein, title title Das statistische problem
der korrelation als variations- und eigenwertproblem und sein zusammenhang
mit der ausgleichsrechnung, https://doi.org/https://doi.org/10.1002/zamm.19410210604 journal journal ZAMM - Journal of Applied Mathematics and
Mechanics / Zeitschrift für Angewandte Mathematik und Mechanik volume 21, pages 364 (year
1941)NoStop
[Rényi(1959)]Renyi1959Measures
author author A. Rényi, title title On measures of
dependence, https://doi.org/10.1007/BF02024507 journal journal Acta Mathematica Academiae Scientiarum
Hungarica volume 10, pages 441
(year 1959)NoStop
[Witsenhausen(1975)]Witsenhausen1975
author author H. S. Witsenhausen, title title On sequences of
pairs of dependent random variables, https://doi.org/10.1137/0128010 journal journal
SIAM Journal on Applied Mathematics volume 28, pages 100 (year 1975)NoStop
[Lancaster(1957)]Lancaster
author author H. O. Lancaster, title title Some properties of the
bivariate normal distribution considered in the form of a contingency
table, https://doi.org/10.1093/biomet/44.1-2.289 journal journal Biometrika volume
44, pages 289 (year 1957)NoStop
[Serafini(2017)]Serafini17
author author A. Serafini, https://doi.org/10.1201/9781315118727 title Quantum Continuous Variables: A Primer of Theoretical Methods (publisher CRC press, year 2017)NoStop
[Adesso et al.(2014)Adesso,
Ragy, and Lee]Adesso+14
author author G. Adesso, author S. Ragy, and author A. R. Lee, title title Continuous variable quantum information: Gaussian
states and beyond, https://doi.org/10.1142/S1230161214400010
journal journal Open Systems & Information
Dynamics volume 21, pages 1440001
(year 2014)NoStop
[Wigner(1932)]Wigner
author author E. Wigner, title title On the quantum correction
for thermodynamic equilibrium, https://doi.org/10.1103/PhysRev.40.749 journal journal Phys. Rev. volume 40, pages
749 (year 1932)NoStop
[Glauber(1963)]Glauber1963
author author R. J. Glauber, title title Photon correlations, https://doi.org/10.1103/PhysRevLett.10.84 journal
journal Phys. Rev. Lett. volume 10, pages 84 (year 1963)NoStop
[Sudarshan(1963)]Sudarshan1963
author author E. C. G. Sudarshan, title title
Equivalence of semiclassical and quantum mechanical descriptions of
statistical light beams, https://doi.org/10.1103/PhysRevLett.10.277 journal journal Phys. Rev. Lett. volume 10, pages 277 (year 1963)NoStop
[Cahill(1965)]Cahill1965
author author K. E. Cahill, title title Coherent-state
representations for the photon density operator, https://doi.org/10.1103/PhysRev.138.B1566 journal journal Phys. Rev. volume 138, pages
B1566 (year 1965)NoStop
[Mandel(1986)]Mandel1986
author author L. Mandel, title title Non-classical states of
the electromagnetic field, https://doi.org/10.1088/0031-8949/1986/t12/005 journal
journal Physica Scripta volume T12, pages 34 (year 1986)NoStop
[Titulaer and Glauber(1965)]Titulaer1965
author author U. M. Titulaer and author R. J. Glauber, title title Correlation functions for
coherent fields, https://doi.org/10.1103/PhysRev.140.B676
journal journal Phys. Rev. volume 140, pages B676 (year
1965)NoStop
[Hall(2013)]Hall13
author author B. C. Hall, https://doi.org/10.1007/978-1-4614-7116-5 title Quantum Theory for Mathematicians, Vol. volume
267 (publisher Springer New York, NY, year
2013)NoStop
[Cahill and Glauber(1969)]Cahill1969-I
author author K. E. Cahill and author R. J. Glauber, title title Ordered expansions in
boson amplitude operators, https://doi.org/10.1103/PhysRev.177.1857 journal journal Phys. Rev. volume 177, pages
1857 (year 1969)NoStop
[Holevo(2019)]Holevo2019
author author A. S. Holevo, https://doi.org/doi:10.1515/9783110642490 title A Mathematical Introduction (publisher De
Gruyter, address Berlin, Boston, year
2019)NoStop
[Beigi and Gohari(2018)]BeigiGohari18
author author S. Beigi and author A. Gohari, title title ϕ-entropic measures of
correlation, https://doi.org/10.1109/TIT.2018.2806965 journal journal IEEE Transactions on Information Theory volume 64, pages 2193 (year
2018)NoStop
[Delgosha(2014)]DelgoshaBeigi2014
author author B. S. Delgosha, P., title title
Impossibility of local state transformation via hypercontractivity, https://doi.org/https://doi.org/10.1007/s00220-014-2105-y journal journal Commun. Math. Phys. volume 332, pages 449 (year
2014)NoStop
[Beigi(2014)]beigi14
author author S. Beigi, title title Maximal entanglement – a
new measure of entanglement, in https://doi.org/10.1109/IWCIT.2014.6842486 booktitle
2014 Iran Workshop on Communication and Information Theory (IWCIT) (publisher IEEE, year 2014) pp. pages 1–6NoStop
[Bhatia(2007)]Bhatia-P
author author R. Bhatia, https://doi.org/https://doi.org/10.1515/9781400827787
title Positive Definite Matrices (publisher Princeton University Press, year
2007)NoStop
§ QUANTUM MAXIMAL CORRELATION RIBBON
In this appendix we discuss in details some properties of the quantum maximal correlation ribbon mentioned in Section <ref>. We start with the conditional expectation operator defined by
_j(X) = _ j (Xρ_A^mρ_A_j^-1),
where _ j means partial trace with respect to all subsystems except the j-th one. We note that _j maps an operator acting on the whole system A^m to an operator acting only on the j-th subsystem.
* If Y is an operator acting on the j-th subsystem, then for any X we have
⟨ Y, X⟩_ρ_A^m = ⟨ Y, _j(X)⟩_ρ_A_j,
where the inner product is given in (<ref>).
* _j is a projection, i.e., _j^2=_j.
* _j is self-adjoint with respect to the inner product ⟨·, ·⟩_ρ_A^m.
* For an operator X define its variance by
(X) = X-(ρ_A^mX) I_ρ_A^m^2
= ⟨ X-(ρ_A^mX) I, X-(ρ_A^mX) I⟩_ρ_A^m
= ⟨ X, X⟩_ρ_A^m - |(ρ_A^mX)|^2.
Then, we have
(X) = (_j(X)) + (X-_j(X)).
Moreover, since (X-_j(X))≥ 0 we have (X)≥(_j(X)).
Equation (<ref>) can be understood as a quantum generalization of the law of total variance.
(i) Since Y acts on the j-th subsystem we have
⟨ Y, X⟩_ρ_A^m = (ρ_A^m Y^† X) = (Y^† X ρ_A^m) = (Y^†_ j(X ρ_A^m) ) = ( ρ_A_jY^†_ j(X ρ_A^m) ρ_A_j^-1)
= ( ρ_A_jY^†_ j(X ρ_A^mρ_A_j^-1) )= ⟨ Y, _j(X)⟩_ρ_A_j.
(ii) We need to show that for Y_A_j, acting on the j-th subsystem, we have _j(Y)=Y. We compute
_j(Y)= _ j(Yρ_A^mρ_A_j^-1) = Y _ j(ρ_A^m) ρ_A_j^-1=Y ρ_A_jρ_A_j^-1=Y.
(iii) We need to show that ⟨_j(X), Y⟩_ρ_A^m = ⟨ X, _j(Y)⟩_ρ_A^m. We compute
⟨_j(X), Y⟩_ρ_A^m = (ρ_A^m_j(X)^† Y) = ( ρ_A^m_ j(Xρ_A^mρ_A_j^-1)^† Y )
= ( _ j(Xρ_A^mρ_A_j^-1)^†_ j (Yρ_A^m) ) = ( _ j( ρ_A_j^-1ρ_A^m X^†) _ j (Yρ_A^m) )
= ( ρ_A_j^-1_ j( ρ_A^m X^†) _ j (Yρ_A^m) ) = ( _ j( ρ_A^m X^†) _ j (Yρ_A^m) ρ_A_j^-1)
= ( _ j( ρ_A^m X^†) _ j (Yρ_A^mρ_A_j^-1) )
= ( ρ_A^m X^†_ j (Yρ_A^mρ_A_j^-1) )
= (ρ_A^m X^†_j(Y))
= ⟨ X, _j(Y)⟩_ρ_A^m.
(iv) Let Y=X-_j(X). By (i) and the fact that I_A^m can be considered as an operator acting on the j-th subsystem, we have ⟨ I_A^m, X⟩_ρ_A^m = ⟨ I_A_j, _j(X)⟩_ρ_A_j
and (ρ_A^mY) = ⟨ I_A^m, Y⟩_ρ_A^m = 0. This, in particular, means that (ρ_A^mX)= (ρ_A_j_j(X)). Therefore,
(Y) = ⟨ Y, Y⟩_ρ_A^m= ⟨ X-_j(X), X-_j(X)⟩_ρ_A^m
= ⟨ X, X⟩_ρ_A^m -⟨ X, _j(X)⟩_ρ_A^m - ⟨_j(X), X⟩_ρ_A^m +⟨_j(X), _j(X)⟩_ρ_A_j
= ⟨ X, X⟩_ρ_A^m -⟨_j(X), _j(X)⟩_ρ_A_j
= ⟨ X, X⟩_ρ_A^m + |(ρ_A^mX)|^2 - |(ρ_A_j_j(X))|^2 -⟨_j(X), _j(X)⟩_ρ_A_j
= (X) - (_j(X)),
where in the third line we use (i).
Now recall that the maximal correlation ribbon is defined by
(A_1, …, A_m) = {(θ_1, …, θ_m): (X)≥∑_j θ_j (_j(X)), ∀ X}.
In the above definition (when the underlying Hilbert space is infinite dimensional), X runs over the space _A^m of operators for which ⟨ X, X⟩_ρ_A^m is finite. We note that for such an X∈_A^m, by the Cauchy-Schwarz inequality (ρ_A^m X)=⟨ I, X⟩_ρ_A^m is also finite. Moreover, by the low of total variance established in Lemma <ref>, _j maps _A^m to _j, the space of operators X_j acting on the j-th subsystem with ⟨ X_j, X_j⟩_ρ_j<∞. Thus, (A_1, …, A_m) is well-defined even in the infinite dimensional case.
To establish (θ_1, …, θ_m)∈(A_1, …, A_m) we need to verify an inequality for all operators X∈_A^m acting on the whole system A^m. In the following we show that we may restrict X to be a linear combination of local operators belonging to _j. We note that
=_1+⋯ + _m⊂_A^m,
is a subspace of _A^m, where _1+⋯ + _m is the closure of the subspace _1+⋯ + _m. Moreover, _A^m is equipped with the inner product ⟨·, ·⟩_ρ_A^m. Thus, we may consider the orthogonal complement of in _A^m:
= ^⊥, _A^m = ⊕=(_1+⋯ + _m)⊕.
Let Y∈. Then, by the orthogonality condition and part (i) of Lemma <ref> for X_A_j∈_j⊂ we have
0=⟨ Y, X_A_j⟩_ρ_A^n= ⟨_j(Y), X_A_j⟩_ρ_A_j.
Thus, _j(Y) is an operator acting on the j-th subsystem that is orthogonal to all local operators in _j. This means that _j(Y)=0 for all j and Y∈. Moreover, since I_A^m∈ we have (ρ_A^mY)=⟨ I_A^m, Y⟩_ρ_A^m =0.
In the definition of the MC ribbon in (<ref>) we may restrict to X∈. That is, we may restrict to operators that are linear combinations of local ones. Moreover, we may assume that (ρ_A^mX)=0.
First, by continuity we may assume that X belongs to (_1+⋯ + _m)⊕⊆(_1+⋯ + _m)⊕ = _A^m.
Such an X can be written as
X = X_1+⋯ + X_m + Y,
where X_j∈_j and Y∈. Let X'=X_1+⋯ + X_m∈. Then, by the above discussion we have _j(X) = _j(X'). Moreover, using ⟨ X', Y⟩_ρ_A^m=0 and (ρ_A^mY) we have
(X) = (X' + Y) =⟨ X'+Y - (ρ_A^mX'), X'+Y - (ρ_A^mX')⟩_ρ_A^m
=⟨ X' - (ρ_A^mX'), X' - (ρ_A^mX')⟩_ρ_A^m + ⟨ Y , Y ⟩_ρ_A^m
= (X') + (Y)
≥(X').
Putting these together we find that if the inequality in (<ref>) holds for X', then it holds for X.
We also note that (X) = (X+ cI_A^n) and (_j(X)) = (_j(X) + cI_A_j)=(_j(X+ cI_A^n)). Thus, without loss of generality we can assume that X in (<ref>) satisfies (ρ_A^mX)=0.
For any 1≤ j≤ m let
_j^0 = {X∈_j: (ρ_A_j X)=0},
and ^0 = _1^0+⋯+ _m^0. Observe that _j^0 is the orthogonal complement of the identity operator in _j, and we have
_A^m = ℂI⊕_m^0⊕.
By the above proposition, in the definition of the MC ribbon we may restrict to X∈_1^0+⋯+ _m^0.
For any 1≤ j≤ m let
{F_j,k: k=1, 2, …}⊂_j^0,
be an orthonormal basis for _j^0, where _j^0 is defined in (<ref>). Define
g_jk, j'k':= ⟨ F_j, k, F_j', k'⟩_ρ_A^m,
and let 𝒢=(g_jk, j'k') be the Gram matrix associated with the set ⋃_j {F_j,k: k=1, 2, …}. Also for (θ_1, …, θ_m)∈ [0,1]^m let Θ be the diagonal matrix
Θ_jk, j'k'=δ_j, j'δ_k, k'θ_j.
Then (θ_1, …, θ_m)∈(A_1, …, A_m) if and only if
Θ^-1≥,
meaning that Θ^-1- is positive semidefinite. Equivalently, (θ_1, …, θ_m)∈(A_1, …, A_m) if and only if for every X_j∈_j^0, j=1, …, m, we have
(∑_j=1^m X_j) ≤∑_j=1^m 1/θ_j(X_j).
By assumption any X∈^0 can be written as
X= ∑_j=1^m ∑_k c_jk F_j, k.
Since (ρ_A^mX)=0 we have
(X) =⟨ Y, Y⟩_ρ_A^m = ∑_j, j'=1^m ∑_k, k'c̅_jk c_j'k'⟨ F_j, k, F_j', k'⟩_ρ_A^m = ^†,
where is the vector of coefficients c_jk. Next, using _j(X)∈_j^0 we have
(_j(X)) = ⟨_j(X), _j(X)⟩_ρ_A^m
= _j(X)^2
= ∑_k |⟨ F_j, k, _j(X)⟩_ρ_A_j |^2
= ∑_k |⟨ F_j, k, X⟩_ρ_A^m |^2
= ∑_k |∑_j', k' c_j'k' g_jk, j'k'|^2.
Also, a simple computation shows that
∑_j=1^m θ_j (_j(X)) =∑_j=1^m θ_j (∑_k |∑_j', k' c_j'k' g_jk, j'k'|^2) = ^† G^†Θ.
Therefore, (θ_1, …, θ_m)∈(A_1,…, A_m) if and only if
^†≥^†Θ.
Equivalently, this means that ≥^†Θ. Now note that is the Gram matrix of a linearly independent set, and is invertible. Hence, multiplying both sides from left and right by ^-1=(^†)^-1, we find that ≥Θ is equivalent to ^-1≥Θ. Next, using the fact that t↦ 1/t is operator monotone <cit.>, we obtain the equivalence of (θ_1, …, θ_m)∈(A_1, …, A_m) and
Θ^-1≥.
This equation means that for any we have ^†Θ^-1≥^†. Then, thinking of as the vector of coefficients of the expansions of operators X_j∈_j^0 in bases {F_j, k: k=1, 2, …} for j=1, …, m, and following similar calculations as above, it is not hard to verify that the above equation is equivalent to (<ref>).
Let us use this theorem to compute the MC ribbon for the example of a product state ρ_A^m=ρ_A_1⊗⋯ρ_A_m. In this case, for basis operators F_j, k, F_j', k' with j≠ j' we have
⟨ F_j, k, F_j', k'⟩_ρ_A^m = (ρ_A_j⊗ρ_A_j' F_j, k^†⊗ F_j', k' )
= (ρ_A_j F_j, k^†)(ρ_A_j' F_j', k' )=0.
Thus, the Gram matrix is the identity matrix. In this case, for any (θ_1, …, θ_m)∈ [0,1]^m and its associated matrix Θ we have Θ^-1≥. This means that (A_1, …, A_m) =[0,1]^m. That is, for product states, the MC ribbon is the largest possible set.
The following theorem shows that MC ribbon is really a generalization of the maximal correlation in the bipartite case.
In the case of m=2 we have
(A_1, A_2) = {(θ_1, θ_2)∈ [0,1]^2: (1/θ_1 -1 )(1/θ_2 -1 )≥μ^2(A_1, A_2))}.
By Theorem <ref>, (θ_1, θ_2)∈ [0,1]^2 belongs to (A_1, A_2) iff for any X_j∈_j^0, j=1, 2 we have
(X_1+X_2)≤1/θ_1(X_1) +1/θ_2(X_2).
We note that since (ρ_A_1X_1)=(ρ_A_2X_2)=0 we have
(X_1+X_2) = ⟨ X_1, X_1⟩_ρ_A_1+⟨ X_2, X_2⟩_ρ_A_2 + 2Re⟨ X_2, X_1⟩_ρ_A^2.
Then, (θ_1, θ_2)∈(A_1, A_2) iff for every X_j∈_j^0, j=1, 2 we have
2Re⟨ X_2, X_1⟩_ρ_A^2≤(1/θ_1-1) (X_1) +(1/θ_2-1) (X_2).
Scaling X_1, X_2 and replacing them with c_1X_1, c_2X_2 we obtain
2Re(c_1c̅_2 ⟨ X_2, X_1⟩_ρ_A^2)≤ |c_1|^2 (1/θ_1-1) (X_1) + |c_2|^2(1/θ_2-1) (X_2), ∀ c_1, c_2.
This is equivalent to
[ (1/θ_1-1) (X_1) - ⟨ X_1, X_2⟩_ρ_A^2; -⟨ X_2, X_1⟩_ρ_A^2 (1/θ_2-1) (X_2) ]≥ 0,
being positive semidefinite, that itself is equivalent to
|⟨ X_1, X_2⟩_ρ_A^2| ≤√((1/θ_1-1)( 1/θ_2-1) )√((X_1)(X_2)).
Therefore, (θ_1, θ_2)∈(A_1, A_2) iff
max|⟨ X_1, X_2⟩_ρ_A_2|/√((X_1)(X_2))≤√((1/θ_1-1)( 1/θ_2-1) ),
where the maximum is taken over X_1∈_1^0 and X_2∈_2^0. We note that by definition the left hand side is equal to μ(A_1, A_2).
Recall that for |ψ⟩_A_1A_2 = 1/√(2) (|00⟩+|11⟩) we have μ(A_1, A_2)=1. Thus, by the above theorem, (θ_1, θ_2)∈(A_1, A_2) iff (1/θ_1-1)(1/θ_2-1)≥ 1 that is equivalent to θ_1+θ_2≤ 1.
Therefore, the MC ribbon for |ψ⟩_A_1A_2 is the smallest possible set.
For the next result we first need a lemma.
Let X, X', Y, Y' be positive semidefinite matrices with the block forms X=(X_ij), X'=(X'_ij), Y=(Y_ij), Y'=(Y'_ij).
Suppose that X≥ Y and X'≥ Y', meaning that X-Y and X'-Y' are positive semidefinite. Then,
X⊠ X'≥ Y⊠ Y',
where X⊠ X' is a matrix whose ij-th block equals X_ij⊗ X'_ij, and Y⊠ Y' is defined similarly.
Since X-Y and X'-Y' as well as X', Y are positive semidefinite, (X-Y)⊗ X' and Y⊗ (X'-Y') are positive semidefinite. This means that (X-Y)⊗ X'+Y⊗ (X'-Y')= X⊗ X'-Y⊗ Y' is positive semidefinite. Now, we note that X⊠ X'-Y⊠ Y' is a principal submatrix of X⊗ X'-Y⊗ Y', so is positive semidefinite.
We now prove the main properties of the MC ribbon, namely the data processing inequality and the tensorization.
* (Data processing) Suppose that Φ_A_j→ A'_j is a quantum operator acting on the subsystem A_i. Then for ρ_A_1, …, A_m and σ_A'_1, …, A'_m we have
(A_1, …, A_m) ⊆(A'_1, …, A'_m).
* (Tensorization) For any ρ_A_1, …, A_m, σ_A'_1, …, A'_m we have
(A_1A'_1, …, A_mA'_m) = (A_1, …, A_m)∩(A'_1, …, A'_m),
where the left hand side is the MC ribbon of the state ρ_A_1, …, A_m⊗σ_A'_1, …, A'_m considered as an m-partite state.
(Data processing) Any quantum operation is a combination of an isometry and a partial trace. Clearly, local isometries do not change the MC ribbon. Thus, it suffices to prove data processing under partial traces. To this end, we need to show that for a state ρ_A_1B_1, …, A_mB_m we have
(A_1B_1, …, A_mB_m) ⊆(A_1, …, A_m).
This inclusion is immediate once we note that in the definition of the MC ribbon in (<ref>), we may restrict X_A_1B_1, …, A_mB_m to act non-trivially only on the subsystems (A_1, …, A_m).
(Tensorization)
Let {F_j,k: k=0, 1, …} be orthonormal bases for _A_j with F_j, 0=I_A_j. We note that {F_j,k: k=1, 2, …} is an orthonormal basis for _A_j^0 = {X∈_A_j: ⟨ I_A_j, X⟩_ρ_A_j =0}.
Then, the Gram matrix of the set ⋃_j {F_j,k: k=1, 2, …} can be decomposed into blocks =(_jj') where the block _jj' consists of the inner products of elements of {F_j,k: k=1, 2, …} and {F_j',k: k=1, 2, …}.
Similarly, letting {F'_j,k': k'=0, 1, …} be an orthonormal basis for _A'_j with F_j, 0=I_A'_j, we can consider the associated Gram matrix '=('_jj') as above.
We note that the space of operators acting on A_jA'_j is equal to _A_jA'_j = _A_j⊗_A'_j. Then,
{F_j,k⊗ F'_j, k': k, k'=0, 1, …} is an orthonormal basis for _A_jA'_j. Moreover, since F_j, 0⊗ F'_j, 0 = I_A_jA'_j, the set {F_j,k⊗ F'_j, k': (k, k')≠ (0,0) } is an orthonormal basis for ^0_A_jA'_j.
Thus, following Theorem <ref>, we need to compute the Gram matrix of the set ⋃_j {F_j,k⊗ F'_j, k': (k, k')≠ (0,0) }. This set can be decomposed into ⋃_j {F_j,k⊗ F'_j, k': (k, k')≠ (0,0) } = ℱ∪ℱ'∪ℱ, where
ℱ = ⋃_j {F_j,k⊗ I_A'_j: k=1, 2,…},
ℱ' = ⋃_j {I_A_j⊗ F'_j, k': k'=1, 2,…},
ℱ = ⋃_j{F_j,k⊗ F'_j, k': k, k'=1, 2,…}.
Observe that, first, these three sets are orthogonal to each other. Second, the Gram matrix of ℱ equals , the Gram matrix of ⋃_j {F_j,k: k=1, 2,…}, and similarly the Gram matrix of ℱ' equals '. Third, a straightforward computation shows that the Gram matrix of ℱ is equal to ⊠', defined in Lemma <ref>. Putting these together, we find that the Gram matrix of the union is given by
[ 0 0; 0 ' 0; 0 0 ⊠' ].
Now, suppose that (θ_1, …, θ_m)∈(A_1, …, A_m)∪(A'_1, …, A'_m). Then, by Theorem <ref> we have Θ^-1≥ and Θ'^-1≥', where Θ' is defined similarly to Θ but probably with a different size. Thus, by Lemma <ref> we have
[ Θ^-1 0 0; 0 Θ'^-1 0; 0 0 Θ^-1⊠' ]≥[ 0 0; 0 ' 0; 0 0 ⊠' ].
Next, we note that Θ^-1 is diagonal, so
Θ^-1⊠' = Θ^-1⊠diag('_11, …, '_mm),
where diag('_11, …, '_mm) is a the block-diagonal matrix with blocks '_jj on the diagonal. On other hand, recall that '_jj is the Gram matrix of the set {F'_j, k': k'=1, 2, …}, that is orthonormal. Thus, '_jj is the identity matrix. Therefore,
Θ^-1⊠' = Θ^-1⊠diag(I^(1), …, I^(m)),
where I^(j) is the identity matrix of an appropriate size. Then, using Theorem <ref>, equation (<ref>) implies that (θ_1, …, θ_m) ∈(A_1A'_1, …, A_mA'_m) and
(A_1, …, A_m)∩(A'_1, …, A'_m)⊆(A_1A'_1, …, A_mA'_m).
Inclusion in the other direction is a consequence of the data processing property proven in the first part.
§ MAXIMAL CORRELATION RIBBON FOR GAUSSIAN STATES
In this appendix we compute the MC ribbon for multipartite Gaussian states. We show that, similar to the bipartite case, in order to compute the MC ribbon via (<ref>), it suffices to consider only observables X_1, …, X_m that are linear in the position and momentum operators. To prove this result, we follow similar ideas used in Section <ref>.
Let ρ_A^m=ρ_A_1,…,A_m be an m-mode Gaussian state. We note that, as is clear from its definition, the MC ribbon does not change under local unitaries. Thus, by Theorem <ref> we may assume that (ρ_A^m)=0 and
=(ρ_A^m) = [ λ_1 I _12 ⋯ _1m; _21 λ_2 I ⋯ _2m; ⋮ ⋮ ⋱ ⋮; _m1 _m2 ⋯ λ_m I ],
where (ρ_A_j) = λ_j I and _jj' =_j'j^⊤.
Let ρ_A^m be an m-mode Gaussian state with first moment (ρ^m)=0 and covariance matrix given by (<ref>). Let
Λ = diag(√(λ_1+1/2), √(λ_1-1/2), …, √(λ_m+1/2), √(λ_m-1/2)),
and Υ_m=Υ⊕⋯⊕Υ,
where Υ is given in (<ref>). Then, (θ_1, …, θ_m)∈ [0,1]^m belongs to (A_1, …, A_m) if and only if
1/2Λ^-1Υ̅_m ( + iΩ_m) Υ_m^⊤Λ^-1≤Θ^-1⊗ I_2,
where Θ= diag( θ_1, …, θ_m) and I_2 is the 2× 2 identity matrix.
In particular, to compute the MC ribbon of ρ_A^m, it suffices to consider X_1, …, X_m in (<ref>) that are linear in terms of
phase-space quadrature operators.
We follow similar steps as in the proof of Theorem <ref>. First, we note that the set {H_k, ℓ^(j): k, ℓ≥ 0} defined via (<ref>), for λ=λ_j, forms an orthonormal basis for _j, the space of operators acting on A_j. Moreover, we have H_0,0^(j) = I_A_j, so {H_k, ℓ^(j): (k, ℓ)≠ 0} is an orthonormal basis for _A_j^0. Thus, to apply Theorem <ref> we need to compute the Gram matrix of the set ⋃_j {H_k, ℓ^(j): (k, ℓ)≠ 0}. To this end, we decompose this set in terms of the total degrees:
⋃_j {H_k, ℓ^(j): (k, ℓ)≠ 0} = ⋃_t=1^∞(⋃_j {H_k, ℓ^(j): k+ℓ=t}).
We note that by (<ref>), basis operators with different degrees are orthogonal to each other. Then, the associated Gram matrix takes the form
diag(^(1), ^(2), …),
where ^(t) is the Gram matrix of ⋃_j {H_k, ℓ^(j): k+ℓ=t}. As computed in (<ref>), the inner products of elements of {H_k, ℓ^(j): k+ℓ=1} and {H_k, ℓ^(j'): k+ℓ=1} equals
^(1)_jj' = 1/2[ ζ_0^-1(λ_j) 0; 0 ζ_1^-1(λ_j) ]Υ̅_jj'Υ^⊤[ ζ_0^-1(λ_j') 0; 0 ζ_1^-1(λ_j') ],
where ζ_0(λ), ζ_1(λ) are defined in (<ref>). On the other hand, a simple computation shows that
1/2[ ζ_0^-1(λ_j) 0; 0 ζ_1^-1(λ_j) ]Υ̅(λ_j I + iΩ) Υ^⊤[ ζ_0^-1(λ_j) 0; 0 ζ_1^-1(λ_j) ]=I_2,
is the identity matrix, i.e., the Gram matrix of {H_k, ℓ^(j): k+ℓ=1}. Putting these together, we conclude that
^(1)=1/2Λ^-1Υ̅_m ( + iΩ_m) Υ_m^⊤Λ^-1,
which is the left hand side of (<ref>). Thus, the statement of the theorem says that (θ_1, …, θ_m)∈(A_1, …, A_m) if and only if
^(1)≤Θ^-1⊗ I_2.
We note that by Theorem <ref>, (θ_1, …, θ_m)∈(A_1, …, A_m) if and only if for any t we have
^(t)≤Θ^-1⊗ I_t+1,
where Θ=diag(θ_1, …, θ_m) and I_t+1 is the (t+1)× (t+1) identity matrix. Thus, to prove the theorem we need to show that if the above inequality holds for t=1, then it holds for all t.
We note that t=1 corresponds to degree-one basis operators, that are linear in terms of quadrature operators.
Let S be the matrix of size (t+1)× 2^t used in the proof of Theorem <ref> whose entries are given by (<ref>). Also, let
S_m = S⊕⋯⊕ S = I_m⊗ S.
Based on the computations in the proof of Theorem <ref> we have SS^†=I. Moreover, letting ^(t)_jj' be the jj'-th block of ^(t) that consists of the inner products of elements of {H_k, ℓ^(j): k+ℓ=t} and {H_k, ℓ^(j'): k+ℓ=t}, we have S(^(1)_jj')^⊗ tS^† = ^(t). Therefore, using the notation of Lemma <ref> we have
S_m (^(1))^⊠ t S^†_m = ^(t).
Thus, to prove the theorem we need to show that if ^(1)≤Θ^-1⊗ I_2, then S_m (^(1))^⊠ t S^†_m ≤Θ^-1⊗ I_t+1. Starting from ^(1)≤Θ^-1⊗ I_2 and using Lemma <ref> we have
(^(1))^⊠ t≤(Θ^-1⊗ I_2)⊠(^(1))^⊠ (t-1) = Θ^-1⊗ I_2^⊗ t,
where the equality follows from the fact that Θ^-1⊗ I_2 is diagonal and the blocks on the diagonal of (^(1))^⊠ (t-1) are equal to I_2^⊗ (t-1). Next, conjugating both sides with S_m=I_m⊗ S and using (<ref>) yield
^(t)≤ S_m(Θ^-1⊗ I_2^⊗ t)S_m^† = (I_m⊗ S)(Θ^-1⊗ I_2^⊗ t)(I_m ⊗ S^†) = Θ^-1⊗ SS^† =Θ^-1⊗ I_t+1,
which proves the theorem.
|
http://arxiv.org/abs/2303.06960v1
|
20230313100129
|
Compressible turbulence in the interstellar medium: New insights from a high-resolution supersonic turbulence simulation
|
[
"Renaud Ferrand",
"Sébastien Galtier",
"Fouad Sahraoui",
"Christoph Federrath"
] |
astro-ph.GA
|
[
"astro-ph.GA",
"astro-ph.SR",
"physics.flu-dyn"
] |
#1#1
#1#1
#1#1
u
#1#2#1#2#10#10,4pt 0 -0
-0,2pt 0,3pt 0
[email protected]^1 Laboratoire de Physique des Plasmas, CNRS, École polytechnique, Université Paris-Saclay, Sorbonne Université, Observatoire de Paris-Meudon, F-91128 Palaiseau Cedex, France^2 Institut Universitaire de France (IUF)^3 Research School of Astronomy and Astrophysics, Australian National University, Canberra, ACT 2611, Australia
The role of supersonic turbulence in structuring the interstellar medium (ISM) remains an unsettled question. Here, this problem is investigated using a new
exact law of compressible isothermal hydrodynamic turbulence, which involves two-point correlations in physical space. The new law is shown to have a compact expression that contains a single flux term reminiscent of the incompressible case and a source term with a simple expression whose sign is given by the divergence of the velocity.
The law is then used to investigate the properties of such a turbulence at integral Mach number 4 produced by a massive numerical simulation
with a grid resolution of 10,048^3 points.
The flux (resp. source) term was found to have positive (resp. negative) contribution to the total energy cascade rate, which is interpreted as a direct cascade amplified by compression, while their sum is constant in the inertial range. Using a local (in space) analysis it is shown that the source is mainly driven by filamentary structures in which the flux is negligible. Taking positive defined correlations reveals the existence of different turbulent regimes separated by the sonic scale, which determines the scale over which the non-negligible source modifies the scaling of the flux. Our study provides new insight into the dynamics and structures of supersonic interstellar turbulence.
Compressible turbulence in the interstellar medium: New insights from a high-resolution supersonic turbulence simulation
R. Ferrand1, S. Galtier1,2, F. Sahraoui1 and C. Federrath3
March 30, 2023
========================================================================================================================
§ INTRODUCTION
Understanding turbulent space and astrophysical plasmas is an ongoing physical challenge that drove a lot of attention through the recent years. As these plasmas are present in a wide range of astrophysical media, from the Earth's magnetosphere to distant star-forming clouds, being able to properly describe them would allow us to make significant progress in understanding the physics controlling the shape and evolution of these media. Among these recent findings, it has been shown that the introduction of compressibility in magnetohydrodynamic (MHD) and Hall-MHD models of space plasmas leads to a higher estimate of the mean dissipation rate of total energy (used as a proxy for measuring plasma heating) <cit.> compared to the incompressible case <cit.>.
For the interstellar medium (ISM) where observations indicate that turbulence is supersonic <cit.>, numerical simulations performed in the framework of compressible (isothermal) HD <cit.> have shown the presence of filaments that resemble the structures observed in the ISM <cit.>. It was found that incompressible predictions can be restored in some cases if one considers the density-weighted fluid velocity ρ^1/3 instead of the simple velocity <cit.>, a behavior that can be understood dimensionally with an exact law <cit.>.
What makes this kind of study difficult is that the mechanisms governing fluid turbulence are still not fully understood.
Due to its chaotic nature, the favored way of studying turbulence is to resort to a statistical approach allowing for the use of specific tools <cit.>, such as exact laws.
Kolmogorov was among the pioneers in this field with his so-called four-fifth law <cit.>, an exact relation for homogeneous incompressible isotropic hydrodynamic (HD) turbulence that paved the way to new advances in the study of nonlinear physics.
This statistical law allows one to express the mean rate of kinetic energy transfer per unit volume as a function of a two-point third-order longitudinal structure function in the limit of a high Reynolds number.
In the wake of Kolmogorov's work, several other exact laws were derived for HD <cit.>, quasi-geostrophic flows <cit.>, thin elastic plates <cit.> or plasmas <cit.>.
The influence of compressibility being important for the description of space and astrophysical plasmas, efforts have been made during the last years to derive exact laws for compressible turbulence in HD <cit.> and magnetohydrodynamics (MHD) <cit.>.
In the quest of exact laws for compressible turbulence, the complexity may increase significantly <cit.>.
It is therefore relevant to ask whether it is possible to find a compact form of these laws that reveals the most salient feature of turbulence.
<cit.> recently showed that several different – yet equivalent – exact laws can be derived for Hall MHD, with some being more compact and easier to compute and interpret. Following the same method, it is the first main goal of this paper to demonstrate that such a compact form – called hereafter the generalized Kolmogorov law – exists in isothermal compressible HD turbulence. In the second part, this new relation is used to study such a turbulence, at integral Mach number 4, using a massive numerical simulation with a grid resolution of 10,048^3 points <cit.>. We proceed to a global computation of the law on the whole system and to a local computation along filamentary structures. Our analysis reveals supersonic turbulence properties that can be used to better understand ISM turbulence and star formation <cit.>.
Section <ref> contains the main steps of the derivation of the new exact law for compressible HD turbulence, along with a first theoretical interpretation. In section <ref> we apply this model to our numerical simulation and expose the results obtained. These results are discussed in section <ref> and we give an overall conclusion in section <ref> in the context of ISM turbulence and star formation.
§ GENERALIZED KOLMOGOROV LAW
Our analysis is based on the compressible HD equations
_t ρ + ∇· (ρ ) = 0 ,
∂_t (ρ )+ ∇· (ρ) = - ∇ P
+ d + f ,
where ρ is the density, P the pressure, d≡μΔ + (μ / 3) ∇θ the dissipation, θ≡∇· the dilatation, μ the coefficient of viscosity, and f a stationary homogeneous external force assumed to act on
large scales. The system is closed with the isothermal equation of state P= c^2_s ρ with c_s the sound speed, assumed to be constant (In practice we only use the density in the numerical code and set c_s = 1.)
The energy equation takes the form
_t ⟨ E ⟩ = ⟨· d⟩ + ⟨· f⟩ ,
with ⟨ ⟩ an ensemble average, E=ρ u^2 / 2 + ρ e the total energy, e=c_s^2 ln(ρ/ρ_0) the internal energy
(ρ_0 = ⟨ρ⟩ is the average density), ⟨· f⟩ = ε the mean rate of total energy injection
into the system, and ⟨· d⟩ = - μ⟨ (∇×)^2 ⟩ - 4 3μ⟨θ^2 ⟩.
We define the spatial increment connecting two points x and x' as x' = x+ and, for any given field ξ, ξ(x) ≡ξ and ξ(x') ≡ξ'.
We follow the same idea as <cit.> and <cit.> and search for a dynamical equation of a structure function for the fluctuating energy:
⟨ S⟩ = ⟨δ̅ρ (δ)^2 + δρδ e ⟩ ,
where for any given field ξ, δξ≡ξ'-ξ and δ̅ξ≡ (ξ+ξ')/2. The use of this structure function represents the main difference between this approach and the one of <cit.>. Developing S leads to
⟨ S⟩ = 2⟨ E ⟩ - 2⟨δ̅ρ·' ⟩ - ⟨ρ'e + ρ e' ⟩
+ 1/2⟨ρ u'^2 + ρ' u^2 ⟩ .
Therefore, finding the temporal evolution of S is akin to finding the temporal evolution of every term on the RHS of Eq. (<ref>).
The rest of the derivation is similar to the one given in <cit.>. Most of the terms have been derived in <cit.>, therefore we only give the details for the calculation of the new term ⟨ρ u'^2 ⟩ (from which the symmetric contribution can be obtained immediately).
We obtain the following expressions:
∂_t ⟨ρ·' ⟩ = ∇_·⟨ - ρ (·') δ + P ' - ρ e' ⟩ + ⟨ρθ' (·') ⟩ + ⟨' · d + ' · f + ρ/ρ'· ( d' + f') ⟩ ,
∂_t ⟨ρ e' ⟩ = ∇_·⟨ - ρ e' δ - P ' ⟩ + ⟨ρ e' θ' ⟩ ,
∂_t ⟨ρ u'^2 ⟩ = ⟨ 2 ρ' ·∂_t ' + u'^2 ∂_t ρ⟩
= ⟨ - ' ·∇' (ρ u'^2) - 2 ρρ'' ·∇' P' ⟩
+ ∇_·⟨ρ u'^2 ⟩
+ ⟨ 2 ρρ'' · d' + 2 ρρ'' · f'⟩
= ∇_·⟨ -ρ u'^2 ' + ρ u'^2 ⟩ + ⟨ρ u'^2 θ'
-2ρρ'' ·∇' P' ⟩
+ ⟨ 2 ρρ'' · d' + 2 ρρ'' · f'⟩ ,
where ∇_ is the derivative along the direction. The combination of the different contributions gives after simplification,
_t ⟨ S⟩ = 2_t ⟨ E ⟩ - ∇_·⟨δ̅ρ (δ)^2 δ⟩
+ 1 2⟨ (ρθ' + ρ' θ) (δ )^2 ⟩
-F - D ,
with, by definition,
F ≡ ⟨· f' + ' · f + ρρ'· f' + ρ' ρ' · f.
. - ρ' ρ· f - ρρ'' · f'⟩ ,
D ≡ ⟨· d' + ' · d + ρρ'· d' + ρ' ρ' · d.
. - ρ' ρ· d - ρρ'' · d'⟩ .
The stationarity assumption leads to the cancellation of the term on the LHS and the energy term on the RHS of Eq. (<ref>).
In this situation, all the energy injected by the forcing must necessarily be dissipated at the same rate ε, so that we have the relationship ε = ⟨· f⟩ = -⟨· d⟩. The content of the forcing and dissipative terms F and D can then be broken down into three parts: first, since the forcing is assumed to act on large scales only, its variations across the simulation domain should remain small. Thus, forcing cross-terms like · f' are expected to behave like · f=ε so we may write (see <cit.>)
⟨· f' + ' · f + ρρ'· f' + ρ' ρ' · f⟩≃ 4 ε .
Second, the stationarity assumption states that mean forcing and dissipation should balance each-other with · f=-· d=ε, leading to
⟨ρ' ρ· f + ρρ'' · f' +
ρ' ρ· d + ρρ'' · d'⟩≃ 0 .
Third, as the dissipation is assumed to act on small scales only dissipative cross-terms such as · d' are expected to be uncorrelated and of null statistical mean, hence (limit of small μ)
⟨· d' + ' · d + ρρ'· d' + ρ' ρ' · d⟩≃ 0 .
With these different estimates, the generalized Kolmogorov law for three-dimensional compressible isothermal turbulence reads
- 4 ε = ∇_·⟨δ̅ρ (δ)^2 δ⟩
- 1 2⟨ (ρθ' + ρ' θ) (δ )^2 ⟩ .
Expression (<ref>) is the first main result of this paper. This compact law is valid for homogeneous – but not necessarily isotropic –
turbulence. As explained above, to derive this expression we have assumed the existence of an inertial range where the forcing and the
dissipation are negligible <cit.>. The expression found is much simpler than the one proposed in <cit.> because
(i) the flux, F≡⟨δ̅ρ (δ)^2 δ⟩, is constructed as a single term that resembles its incompressible
version (that we recover by taking δ̅ρ = ρ_0, with ρ_0 a constant mass density), and (ii) the source is simply written as
S ≡ - (1/2) ⟨ (ρθ' + ρ' θ) (δ )^2 ⟩. It is a purely compressible term, which goes to zero when the
incompressible limit is taken; then, we recover the original form of the well-known four-third law <cit.>.
The sign of S is directly given by the sign of the dilatation: when the flow is mainly in a phase of dilatation (θ>0) the source is negative,
whereas in a phase of compression (θ<0) the source is positive.
We can also see that the source tends to zero on small scales along with the (δ u)^2 factor, as (ρθ' + ρ' θ) remains finite as ℓ goes to zero. This contrasts with the flux term that can still have a non-trivial contribution because of the –derivative introducing a 1/ℓ scaling.
A natural scale below which the source would be negligible is the sonic scale, i.e., the scale where the turbulence transitions from supersonic to subsonic <cit.>.
Finally, note that expression (<ref>) is Galilean invariant as the primitive equations (<ref>)–(<ref>).
The generalized Kolmogorov law can be interpreted as if we had an effective cascade driven only by the flux term -4 ε_ eff≡∇_· F (such that ε_ eff=ε+S/4) that involves the usual energy injection/dissipation rate (ε) known in incompressible theory and a new purely compressible component (source) that reflects contraction and dilatation of the turbulent structures. If we assume that the cascade driven by the flux term is direct (i.e., ε_ eff>0) then a dilatation (compression) will tend to oppose (sustain) the energy cascade, preventing (enforcing) the formation of smaller structures. Furthermore, the dilatation of the structures (S<0) can annihilate the cascade to small scales (if ε=-S/4) or even reverse it (if ε+S/4<0) leading to the formation of large-scale structures via an inverse cascade. Note, however, that if S is scale dependent then compressible turbulence is not characterized by constant energy flux solutions as in incompressible theory <cit.>. As we will see below, the numerical simulation will be very useful to go further in our interpretation.
§ NUMERICAL SIMULATION
In this section the exact law (<ref>) derived above is used to investigate supersonic turbulence produced by a massive numerical simulation with a grid resolution of 10,048^3 points and at Mach number 4. The Mach number is defined as ℳ=σ_v / c_s with σ_v the velocity dispersion at the main forcing scale L/2 and L the simulation side length. The simulation was performed using a modified version of the FLASH code <cit.>, solving the isothermal compressible HD equations in a triply periodic box.
Following the methods in <cit.> the simulation uses a naturally mixed driving (ζ=0.5) with an Ornstein-Uhlenbeck process acting on large scales.
The forcing amplitude is a paraboloid spanning k = 1..3, peaking at k = 2 and reaching zero at both k = 1 and k = 3, where the wavenumber k is in units of 2π/L. Thus, the forcing acts on scales larger than L/3 which are well above the ones we study in this paper. The data used here are 7 snapshots of the 10,048^3 simulation, sampled at a resolution of 2,512^3, of the density and the three components of the velocity field, taken at 2, 3, 4, 5, 6, 7 and 8 turbulence turnover times T (downsampling the data eases its handling without affecting the results reported in this paper). Fig. <ref> shows through rms Mach number and minimum and maximum densities that statistics for both velocity and density have converged after 2 turnover times, indicating that the simulation has reached a statistically stationary state <cit.>, hence the use of snapshots for times t ≥ 2T.
For each snapshot the two terms of the exact law are computed along the three main axes x, y and z, and then averaged spatially
over the full box. The four signals obtained for different turnover times were eventually averaged to obtain the result displayed in Fig.<ref>.
First, we see that the mean rate of energy injection/dissipation ε (in red) is approximately constant over more than a decade.
This observation indicates that the assumptions made to derive the law are well satisfied on these scales of the simulation.
The changes in ε observed on larger scales will be discussed in the next section in light of subsequent observations.
Second, we see that the contribution of the flux term (in blue) is significantly higher than ε which means that the source (in green) brings a correction to its contribution with an opposite sign, which is confirmed by the green dashed curve.
For a better interpretation we can make a distinction between ε and ε_ eff introduced above, i.e., the energy transferred between scales through the usual (incompressible) turbulence cascade driven by the flux term, in which case we have ε = ε_ eff. Here, we see that ε < ε_ eff with a non-negligible contribution from the source.
This behavior contrasts with the one reported from direct numerical simulations of subsonic (compressible) MHD turbulence, where the overall contribution of the non-flux terms was found to be negligible with respect to the flux term <cit.>. Note that in space plasma data, where it is not always possible to measure precisely the source <cit.>, the variation of ε^IHD in the inertial range may indicate the presence of non-negligible compressible effects, especially in media where density fluctuations are high <cit.>.
We further investigate the properties of this supersonic simulation in order to understand the origin of the source contribution and its influence on turbulence. As we have seen above, the source is globally positive which reflects the dominance of compression.
Therefore, for a given snapshot we searched for the grid point of minimal dilatation θ (maximum contraction of the fluid).
In Fig. <ref> we show a slice of the data cube containing this point in the (yz) plane (other slices along (xy) or (xz) containing this point give a similar qualitative behavior). More precisely, we show the density-dilatation (top) and the modulus of the vorticity w = ∇× (bottom).
These cuts reveal the existence of turbulent filamentary structures (elongated dark red structures for ρθ) in which both |θ| and | w| are up to several orders of magnitude higher than in the rest of the plane. A zoom on such structures is shown in Fig. <ref>.
These structures are typically delimited by very thin boundaries of strong contraction (dark blue lines for ρθ) in which a high turbulent activity with many vorticity tubes is observed.
It is thought that the density-dilatation and the vorticity highlight the turbulence structures better than the previously used quantities θ and ρ<cit.>, which are less relevant to investigate the physics involved in the generalized Kolmogorov law.
Regions with high density-dilatation are expected to drive most of the (average) source term.
We therefore selected a sample of these regions (filaments) in which the mean density was high, and computed the source and flux term for increments along the main orientation of the filamentary structure. The results obtained were then averaged over the selected samples.
In Fig. <ref> we show the result for a given filamentary structure and a “blank" region of weaker activity (top), and an average over 8 filamentary structures (bottom).
For all these filaments we observe a similar trend: the source is dominant, positive and increases with spatial lag of the increments until it reaches approximately the sonic scale ℓ_s ≃ 0.01235 L, the scale where the scale-dependent Mach number is ℳ(ℓ_s/L)=1 (see <cit.> for the original determination of ℓ_s in these simulations).
The flux term does not have a constant sign but remains negligible with respect to the source on most scales.
We note that, because of the sample size effect, the interpretation of the largest scales of the structures are subject to caution.
A comparison with a blank region gives a quite different result: the values of both the flux and the source terms are up to five orders of magnitude lower than their counterparts in filamentary structures. One should note that we only evaluate here the specific contribution of small pieces of the flow. Consequently one would not expect to retrieve any form of theoretical scaling predicted by the exact law, which would only apply to the full statistical average on the whole simulation domain.
We complement our analysis by taking the absolute value of the flux and the source before performing their statistical averages.
Therefore, we define F̃ = ⟨δ̅ρ (δ)^2 |δ| ⟩ and
S̃ = 1 2⟨ |ρθ' + ρ' θ| (δ )^2 ⟩ and compute them on the entire simulation domain at a given time. These two quantities represent the total activity due to the flux and the source respectively, disregarding the sign of the local contributions and so the direction of the resulting turbulent cascade (direct or inverse). Note that, again, these results do not have to comply to any theoretical prediction brought by the exact law, as the terms computed here are not the ones forming the exact law per se. Yet, the non-signed quantities have the advantage of converging faster than their signed counterpart, and can lend some information about the mechanisms dominating on different scales.
The results are reported in Fig. <ref>. First, a clear power law S̃∼ℓ^1/2 emerges over two decades for the compressible source.
By equalizing dimensionally the flux term and the source, we find δ u ∼ℓ^1/2 (we do not include the density that appears as a local average and not as a pure fluctuating quantity). This scaling is actually compatible with the one reported in <cit.> on supersonic scales using the second-order structure function (which is positive definite and therefore comparable to our calculation using absolute values), while a classical (incompressible) scaling δ u ∼ℓ^1/3 was approximately found on subsonic scales. Note that the supersonic law is dimensionally compatible with the velocity spectrum E^u∼ k^-2, a scaling often attributed to a purely compressible (Burgers) turbulence <cit.>. In the framework of the generalized Kolmogorov law we see, however, that the change of slope reported previously can find a precise origin: it marks a transition towards a regime/scale where the absolute activity of the source becomes non-negligible.
Second, we see that the modified flux exhibits a plateau on small scales, as expected for a subsonic turbulent cascade mainly driven by the flux, which means that most of the energy transiting in either direction through these scales is transfered by a flux-driven process. A transition appears around the sonic scale above which the flux starts to drop: this behavior can be attributed to the dominance of the compressible source activity on supersonic scales.
§ DISCUSSION
Based on a single simulation, realized however at an unprecedented spatial resolution, some conclusions can be drawn.
By directly applying the new exact law derived analytically to the data we found that the amplitude of the source in the turbulent filamentary structures (Fig. <ref>) is much higher (up to two orders of magnitude) than when it is computed on the whole simulation (Fig. <ref>).
As the overall turbulent activity is less intense in the other regions we can conclude that these filaments drive the global behavior of S. On the contrary, it has been impossible to identify a recurring behavior in specific parts of the system for the flux term as we did for the source.
At intermediate, transonic scales both the flux and the source contributions reach a peak. Furthermore the sign of S in both the global and local computations is positive, leading to a value of ε_ eff higher than ε, which is fixed externally by the forcing.
We thus suggest that the energy cascade in supersonic HD turbulence reaches its maximum efficiency (i.e. ε_ eff is maximal) around the transition from the subsonic to supersonic regimes.
This efficiency decreases with scales such that ε_ eff tends to be closer to ε on subsonic scales where S becomes sub-dominant. On supersonic scales, however, the exact law shows a decrease in the energy cascade rate ε, which is no longer constant.
Since the law is exact under several assumptions, that means that at least one of them is not verified. For example we cannot exclude a non-local
effect of the forcing that would modify the scaling law mostly on large scales.
An anomalous dissipation on supersonic scales originating from the irregularities of the fields, which is not accounted for in our theory, could also contribute to the energy budget <cit.>.
On the other hand, Fig. <ref> shows that the total, non-signed activity of the compressible source grows higher than the one of the flux: this suggests that density-dilatation acts strongly on supersonic scales, but in such a way that local contributions of opposite signs cancel each others in the scope of the exact law. This strong compressible activity, coupled to the flux activity becoming non-constant at supersonic scales, suggests a transition between two regimes around the sonic scale: a subsonic turbulent cascade driven by both the compressible flux and the source, and a highly compressible regime at supersonic scales which does not feature a conservative cascade. The vorticity distribution shown in Fig. <ref> reinforces this interpretation since stronger vorticity is only observed inside the small-scale turbulent structures. Similar conclusions were drawn by <cit.> who reported for subsonic and transonic simulations that pressure-dilatation acts essentially on large scales, whereas at small scales, below a transitional “conversion” scale range, a conservative cascade appears. Here we shed a new light onto those findings using a different approach that helps better understand how various mechanisms shape supersonic turbulence.
A spectral analysis of the velocity field u (not shown in this paper) reveals the existence of two distinct power-law scalings, separated roughly by the sonic scale. On supersonic scales the scaling is close to k^-2 , which is usually attributed to Burgers turbulence <cit.> ; on subsonic scales the scaling becomes close to k^-3/2 which is compatible with a theory of weak acoustic turbulence <cit.>. This brings another evidence of the existence of two distinct regimes at supersonic and subsonic scales, respectively a more shock-driven compressible regime and a (possibly acoustic) turbulent regime. If we assume that the cascade rate computed here is representative of (if not identical to) the energy dissipation rate in the system, the observation that cascade/dissipation rate peaks near the sonic scale (Fig. <ref>) where turbulence transitions from shock-like (k^-2) to fluctuation/vortex-like (k^-3/2) dominated regimes would be an indication of strong shock dissipation at that scale.
It is interesting to note that using a model of acoustic turbulence with weak shocks at Mach number close to unity, <cit.> reported that a scaling relation similar to the incompressible Kolmogorov law could be retrieved for a modified energy cascade rate. In the framework of said model, our scaling relation (<ref>) still holds considering a similar modified energy cascade rate. This remark with the previous one mean that sub-sonic turbulence could be composed of a mixture of weak shocks, acoustic waves and vortices.
A final remark can be made about the exact law: given the high resolution of the simulation one would expect the energy cascade rate to form a steady plateau over more than one decade. This small inertial range may be attributed to two possible effects not included in our exact law (<ref>): i) non-local effects due to the large-scale forcing; ii) additional local dissipation (in the supersonic range) through shocks/discontinuities <cit.>, since our exact law assumes smoothness of the turbulent fields. This shortcoming calls for a new theory of compressible HD turbulence where such singular fields and non local effects due to large scale forcing can be accounted for, and which would be very relevant to supersonic turbulence. In addition, it would be interesting to investigate the question of intermittency in supersonic turbulence by evaluating separately the contributions of the flux and the source. Such theories are beyond the scope of this paper and are left to future studies.
§ CONCLUSION
The theory developed in this paper and applied to high resolution numerical simulations allows us to gain deep insight into supersonic ISM turbulence. The filamentary structures observed in the ISM seem to be characterized by a universal thickness of the order of the sonic scale <cit.>. Their shape is supposed to be mainly due to HD turbulence and to be little affected by other factors such as gravity or magnetic fields <cit.>. These studies associated with our work suggest that this universality could be explained by the existence of the two distinct regimes reported here:
i) a supersonic regime dominated by shock-like structures where the energy cascade rate ε is not constant; ii) a subsonic regime with a lower and mainly constant ε where vortices (and acoustic waves) are produced and in which a classic conservative cascade is formed.
In between, the transonic scales where turbulence reaches its peak of effective energy transfer would correspond to the size
of the filaments. Our interpretation is thus that filaments are stuck on the smallest scale of the supersonic regime, which is the sonic scale, while the weaker subsonic cascade produces vorticity tubes on smaller scales.
Applications of the law to more complete simulations, featuring for instance gravitational forces or magnetic fields, would help refine this interpretation and may provide new clues on the interplay between ISM turbulence and the problem of star formation <cit.>.
For example, <cit.> were able for the first time to observationally derive the fractions of momentum density contained in the solenoidal and compressive modes of turbulence. It was in the Orion B molecular cloud where the mean Mach number is ∼ 6. They showed that the compressive modes are dominant in regions with a high star formation rate (as predicted in <cit.>). According to our analysis the source term is the dominant component of compressible turbulence inside filaments.
Future work that would directly link the formalism of exact laws (and thus the source and flux terms) to the star formation rate could significantly advance our understanding of how turbulence controls the formation of structures on different scales in the ISM.
We thank the anonymous referee for their valuable suggestions, which helped to improve this work. C. F. acknowledges funding provided by the Australian Research Council (Discovery Project DP170100603 and Future Fellowship FT180100495), and the Australia-Germany Joint Research Cooperation Scheme (UA-DAAD). We further acknowledge high-performance computing resources provided by the Leibniz Rechenzentrum and the Gauss Centre for Supercomputing (grants pr32lo, pr48pi and GCS Large-scale project 10391), the Australian National Computational Infrastructure (grant ek9) in the framework of the National Computational Merit Allocation Scheme and the ANU Merit Allocation Scheme. The simulation software FLASH was in part developed by the DOE-supported Flash Center for Computational Science at the University of Chicago.
aasjournal
|
http://arxiv.org/abs/2303.06766v1
|
20230312220535
|
Next-Best-View Selection for Robot Eye-in-Hand Calibration
|
[
"Jun Yang",
"Jason Rebello",
"Steven L. Waslander"
] |
cs.RO
|
[
"cs.RO"
] |
Next-Best-View Selection for Robot Eye-in-Hand Calibration
Jun Yang, Jason Rebello, Steven L. Waslander
Institute for Aerospace Studies and Robotics Institute
University of Toronto
Toronto, Canada
{jun.yang, jason.rebello, steven.waslander}@robotics.utias.utoronto.ca
========================================================================================================================================================================================================================
Robotic eye-in-hand calibration is the task of determining the rigid 6-DoF pose of the camera with respect to the robot end-effector frame. In this paper, we formulate this task as a non-linear optimization problem and introduce an active vision approach to strategically select the robot pose for maximizing calibration accuracy. Specifically, given an initial collection of measurement sets, our system first computes the calibration parameters and estimates the parameter uncertainties. We then predict the next robot pose from which to collect the next measurement that brings about the maximum information gain (uncertainty reduction) in the calibration parameters. We test our approach on a simulated dataset and validate the results on a real 6-axis robot manipulator. The results demonstrate that our approach can achieve accurate calibrations using many fewer viewpoints than other commonly used baseline calibration methods.
Hand-eye calibration; active vision; next-best-view; non-linear optimization
§ INTRODUCTION
With the rapid advance in 3D computer vision techniques, perception systems have become an essential component in many industrial applications, such as robotic bin-picking <cit.> and on-machine inspection <cit.>. Historically, for these applications, the sensor is installed in a static position. For example, in robotic bin-picking, the camera is mounted above the bin. However, the camera often fails to acquire a complete representation of the task space from a single viewpoint due to occlusions and limited sensor resolution. To overcome these limitations, we can attach the camera to the end-effector of a robotic manipulator, which is also known as the eye-in-hand system.
The proper functioning of an eye-in-hand system relies on accurate calibration. The goal is to estimate a rigid 6-DoF pose of the camera with respect to the robot end-effector frame. As introduced in <cit.>, this problem can be solved with a hand-eye calibration formulation 𝐀𝐗=𝐗𝐁, where 𝐀 and 𝐁 represent the relative robotic arm and camera motions between two different time instants, respectively, and 𝐗 is the unknown rigid transformation from the robot end-effector frame to the camera coordinate frame. To use this formulation, we need to convert absolute poses into relative ones and solve the 𝐀𝐗=𝐗𝐁 problem using closed-form approaches <cit.> or optimization-based solutions <cit.>. Alternatively, the eye-in-hand calibration can be solved with the robot-world-hand–eye formulation 𝐀𝐗=𝐘𝐁 <cit.>. In this formulation, 𝐘 represents the transformation from the robot end-effector to the camera frame, and 𝐗 is the transformation from the robot base to the world frame. The transformations 𝐀 and 𝐁 represent the absolute transformation from the robot base to the robot end-effector, as well as the transformation from the camera to the world coordinate. The goal of robot-world-hand–eye calibration is to determine both 𝐗 and 𝐘 from either closed-form solutions <cit.> or optimization-based approaches <cit.>.
As studied in <cit.>, optimization-based approaches with 𝐀𝐗=𝐘𝐁 formulation achieve the highest accuracy since they use absolute measurements and are more tolerant to the measurement noise and errors. These approaches generally take the initial estimates from any fast closed-form methods, such as Tsai <cit.> or Zhuang <cit.>, and iteratively minimize the formulated cost function (e.g., 2-D reprojection errors) with non-linear optimizers. Although the optimization-based solution can provide accurate calibration, it requires sufficient measurement sets to ensure high accuracy. As illustrated in Figure <ref>, different robot poses are needed to create measurement sets for the optimization-based methods, and the calibration accuracy heavily relies on the selection of the measurement sets. Manual selection of the robot poses has two major limitations. First, it requires a large volume of the robot motions to collect sufficient measurements for accurate calibration. Second, even if a large volume of measurement sets is collected, it does not guarantee that a good calibration can be estimated. The addition of poor measurements may even degrade the calibration accuracy due to the biased distribution of the robot poses and measurement noise.
To this end, we propose an active vision method for eye-in-hand calibration. Our method follows the 𝐀𝐗=𝐘𝐁 formulation and uses an information theoretic next-best-view (NBV) policy <cit.>. For each iteration, we determine the next best robot pose from where to collect measurements, such that it brings about the maximum reduction in calibration parameter uncertainty. We evaluate our approach on a simulated dataset and verify it on a real 6-axis robot manipulator. The results demonstrate that our next-best-view approach can achieve high calibration accuracy using significantly fewer viewpoints when compared with heuristic-based baselines, such as random and maximum distance sampling strategies. The contributions are summarized as follows:
* An information-theoretic formulation for the estimation of the eye-in-hand calibration parameters and prediction of the information gain for a future viewpoint.
* An active vision system that exploits the proposed information-theoretic formulation for rapid and accurate eye-in-hand calibration.
The rest of the paper is structured as follows. Section <ref> reviews the relevant literature. Section <ref> formulates our eye-in-hand calibration problem. Section <ref> describes the autonomous active calibration system. Section <ref> presents the evaluation results, and section <ref> concludes the paper.
§ RELATED WORK
§.§ Robotic Hand-Eye Calibration
In robotics, hand-eye calibration is the problem of determining the rigid transformation between a camera and a robot reference frame and includes two different camera setups: eye-in-hand and eye-to-hand. The eye-in-hand calibration is the process of estimating the relative 6D pose of a robot-mounted camera with respect to the robot’s end-effector. In comparison, for eye-to-hand calibration, the camera is mounted statically, and the calibration determines the 6D pose of the camera with respect to the robot’s base. Both camera setups employ the 𝐀𝐗=𝐗𝐁 hand–eye formulation <cit.> or 𝐀𝐗=𝐘𝐁 robot-world-hand–eye formulation <cit.>. For both the 𝐀𝐗=𝐗𝐁 or 𝐀𝐗=𝐘𝐁 formulation, the earliest approaches solved the problem in the closed-form manner by estimating the rotation and translation separately <cit.>, which is also known as the separable closed-form method. Another class of closed-form methods solves the rotation and translation simultaneously <cit.>. To further improve the calibration accuracy for high-precision tasks, such as robot pick-and-assembly, some recent works proposed optimization-based approaches <cit.>. These approaches take the initial estimates from a fast closed-form method <cit.>, and iteratively minimize a cost function to yield better calibration accuracy. While the core problem has been well addressed, the majority of existing works perform the calibration in a passive way, where the robot motions and camera poses are given in advance, which limits the resulting calibration accuracy. Only a few approaches exist <cit.> that can perform hand-eye calibration in an active manner.
§.§ Active Vision and Next-Best-View
Active vision <cit.>, and more specifically
Next-Best-View (NBV) <cit.> refers to the approach of actively manipulating the camera to gather more informative measurements in a greedy fashion. Active vision technologies have been successfully applied to a wide range of robotic applications, such as localization <cit.>, 3D reconstruction <cit.>, robot grasping <cit.> and calibration <cit.>. Among these works, a typical scheme for NBV is to maximize the Fisher information or minimize the entropy for the robot state parameters <cit.>. Specifically, for a robot state estimation problem, the "informativeness" of a viewpoint (i.e., how much parameter uncertainties can be reduced) is quantified by the Fisher information. In <cit.>, the authors leverage the Fisher information to select informative trajectories to improve localization quality and avoid pose tracking loss. From these examples, the closest one to our work is from <cit.>, where the Fisher information is used to select the next best robot mechanism inputs for calibrating a dynamic camera cluster with one static camera <cit.>. In this work, we formulate the active robot eye-in-hand calibration problem with the Fisher information objective and automate the calibration process using a next-best-view strategy.
§ EYE-IN-HAND CALIBRATION FORMULATION
In this section, we present our problem formulation for eye-in-hand calibration. We use the robot-world-hand–eye calibration formulation, 𝐀𝐗=𝐘𝐁, and solve the problem using an iterative non-linear optimization-based approach. We define the rigid transformation 𝐓 in the 𝕊𝔼(3) Lie Group:
𝕊𝔼(3) := {𝐓=[ 𝐑 𝐭; 0^T 1 ] | 𝐑∈𝕊𝕆(3),𝐭∈ℝ^3
}
where 𝕊𝕆(3) is the special orthogonal group (i.e., 𝐑𝐑^T = 𝐈, 𝖽𝖾𝗍(𝐑)=1). The associated Lie Algebra space to the 𝕊𝔼(3) Lie Group is indicated as 𝔰𝔢(3). The calibration process aims to determine two rigid transformations in 𝕊𝔼(3): the transformation 𝐓_ce from the robot end-effector frame, ℱ_e, to the camera frame, ℱ_c, as well as the transformation 𝐓_bw from the world frame, ℱ_w, to the robot base frame, ℱ_b. Note that the world frame, ℱ_w, is defined by a static calibration board with a known marker size (e.g., a checkerboard). For each robot pose, 𝐓_eb, the camera captures the pixel measurements, 𝐮∈ℝ^2. We define the measurement set, 𝐙_k, from the k^th robot pose as:
𝐙_k = {𝐮_k , 𝐓_eb,k}
where the robot pose, 𝐓_eb,k, represents the transformation from the robot base frame, ℱ_b, to the robot end-effector frame, ℱ_e, which is obtained from the robot's forward kinematics. The pixel measurement, 𝐮_k ∈ℝ^2, is the set of the 2D projections of the 3D marker points, 𝐏_w∈ℝ^3, from the calibration board.
Given the measurement set, 𝐙_k, estimating the transformations 𝐓_ce and 𝐓_bw can be formulated as a non-linear optimization problem. We name these two unknown transformations as the set of calibration parameters and represent them as:
Θ = {𝐓_ce , 𝐓_bw}
The optimization is constructed by defining the re-projection error between the measured pixel positions, 𝐮_k, and the projected target locations, 𝐮_k^', through the calibration parameters on the image plane:
r^j(Θ, 𝐙_k ) = u_k^j - u_k^j'
= u_k^j - π(T_cw, kP_w^j)
= u_k^j - π(T_ceT_eb, kT_bwP_w^j)
where u_k^j is the measurement of the j^th 3D marker point P_w^j from the k^th robot pose, and r^j(Θ, 𝐙_k ) is the residual between them. π represents the perspective projection function for a camera model. The loss function is then defined as:
L(Θ) = ∑_k ∑_j=1^| P_w |r^j(Θ, 𝐙_k )^T (Σ_k^j)^-1 r^j(Θ, 𝐙_k )
where Σ_k^j is the corresponding measurement covariance matrix. For a calibration process, the calibration target is usually provided with high contrast, and the 2D measurements (e.g., corner detection) of the 3D marker points can be obtained accurately. Therefore, we assume the measurement noise is constant for different marker positions across all the camera viewpoints and change the loss function in Equation (<ref>) to:
L(Θ) ≈∑_k ∑_j=1^| P_w |r^j(Θ, 𝐙_k )^T r^j(Θ, 𝐙_k )
To compute the optimal calibration parameters Θ^*, we perform an unconstrained optimization for Equation (<ref>) and minimize the re-projection errors over all the collected measurement sets, 𝐙_1:K. To ensure a stable solution, we can provide a good initial estimate Θ from any closed-form methods <cit.> for the non-linear optimization. The iterative algorithms, such as Levenberg–Marquardt or Gauss-Newton, can finally be used to optimize the calibration parameters. For example, the update equation with the Gauss-Newton method is:
( J_Θ, Z_1:K^T J_Θ, Z_1:K) δΘ = J_Θ, Z_1:K^T r(Θ, Z_1:K)
where r(Θ, Z_1:K) is the residual vector over all the collected measurements Z_1:K. The stacked Jacobian matrix J_Θ, Z_1:K of the measurements is represented as:
J_Θ, Z_1:K =
[ J_Θ, Z_1; ⋮; J_Θ, Z_K ]
Each row-block of Equation (<ref>), J_Θ, Z_k, corresponds to the Jacobian matrix with the k^th measurement set. It composes of two parts:
J_Θ, Z_k = [F_k E_k]
where Jacobian matrices F_k and E_k are the derivative of the overall cost function with respect to the poses ξ_ce and ξ_bw on the tangent space:
F_k = -∂u_k^'/∂ξ_ce = -∂u_k^'/∂P_c,k∂P_c,k/∂ξ_ce
E_k = -∂u_k^'/∂ξ_bw = -∂u_k^'/∂P_c,k∂P_c,k/∂P_e,k∂P_e,k/∂P_b,k∂P_b,k/∂ξ_bw
where ξ_ce , ξ_bw∈𝔰𝔢(3) are the Lie algebra representations of the transformations 𝐓_ce and 𝐓_bw, respectively. The Hessian, J_Θ, Z_k^T J_Θ, Z_k is constructed by:
J_Θ, Z_k^T J_Θ, Z_k = [ F_k^T F_k F_k^T E_k; E_k^T F_k E_k^T E_k ]
Note that, for the multiple measurement sets, Z_1:K, the Hessian, J_Θ, Z_1:K^T J_Θ, Z_1:K, is a 12 × 12, square matrix. The operation complexity of its inversion is constant.
§ ACTIVE CALIBRATION USING NEXT-BEST-VIEW
In Section <ref>, we formulate the eye-in-hand calibration as a non-linear optimization problem and solve it using the iterative approaches. However, the calibration accuracy relies heavily on the collected measurement sets from the selected robot poses. Even if a large volume of the measurement sets is collected, it does not ensure calibration accuracy due to the biased distribution of the robot poses, redundant measurements, and possible measurement noises. Hence, in this section, we present our active calibration process that can estimate the uncertainty of the calibration parameters and predict the next-best-view for maximizing the information gain (uncertainty reduction). An overview of our proposed active calibration system is illustrated in Figure <ref>.
§.§ Initialization and Uncertainty Estimation
We initialize our active calibration with a collection of measurement sets 𝐙_1:K from K viewpoints. To uniquely determine the set of the calibration parameters Θ and provide the initial estimate, at least K=3 sets with non-parallel rotation axes are required <cit.>. We then perform the iterative optimization, described in Section <ref>, to refine the calibration parameters. To assess the calibration quality with collected measurement sets, we assume the set of the calibration parameter is distributed with a uni-modal Gaussian and compute its covariance matrix, Σ_Θ, Z_1:K, with a first-order approximation of the Fisher information matrix (FIM):
Σ_Θ, Z_1:K = ( J_Θ, Z_1:K^T J_Θ, Z_1:K)^-1
Such an inverse of the FIM defines the Cramer-Rao lower bound, which is the smallest covariance that can be achieved by an unbiased estimator. To quantify the calibration parameter uncertainty, we use the differential entropy h_e( Σ_Θ, Z_1:K):
h_e( Σ_Θ, Z_1:K) = 1/2ln((2π e)^n | Σ_Θ, Z_1:K| )
Note that the uncertainty computation is not limited to the differential entropy and can be superseded by other metrics, such as the trace <cit.> or the sum of the eigenvalues <cit.> of the covariance matrix.
§.§ Next-Best-View Prediction
To improve the quality of the calibration parameters, we aim to find the next best robot forward kinematics θ^* from a set of candidates, {θ}, that governs the robot pose 𝐓_eb and will be used to maximize the information gain of the calibration parameters. The information gain is defined as the uncertainty (entropy) reduction after including the measurement set from a candidate robot kinematics. For a candidate robot kinematics, θ, after including the measurement set, 𝐙, the stacked Jacobian matrix becomes:
J_Θ, Z =
[ J_Θ, Z_1:K; J_Θ, Z ]
where Z = {Z_1:K, Z} represents the set of measurements from the robot forward kinematics θ_1:K and the candidate kinematics θ. Using the FIM approximation, the parameter covariance can be calculated as follows:
Σ_Θ, Z = ( J_Θ, Z^T J_Θ, Z)^-1
Note that we compute the Jacobian matrix (Equation (<ref>)) and the predicted parameter covariance (Equation (<ref>)) before actually applying the robot kinematics θ and including the measurement 𝐙. The computation of the Equation (<ref>) is based on the estimated calibration parameters using measurement sets Z_1:K only.
For a robot kinematics θ, we define the corresponding information gain I_Θ, Z as the entropy reduction of the parameter covariance:
I_Θ, Z = h_e(Σ_Θ, Z_1:K) - h_e(Σ_Θ, Z)
To find the next-best-view, θ^*, we maximize the information gain over the entire candidate set, {θ}:
θ^* = _θI_Θ, Z
Once the next-best-view, θ^*, is determined, we apply the robot motion. A new measurement set 𝐙^* is collected and the total collection 𝐙_1:K+1 will be updated as:
𝐙_1:K∪𝐙^*→𝐙_1:K+1
We finally optimize the calibration parameters Θ^* using the newly updated measurement sets, 𝐙_1:K+1, and predict the next-best-view again. We repeat this process until it reaches user-defined criteria, i.e., after a fixed number of iterations or when the highest information gain of a subsequent robot kinematics falls below a user-defined threshold:
I_Θ, Z < I_τ
The architecture of NBV for eye-in-hand calibration is shown in Algorithm <ref>.
§ EXPERIMENTS
§.§ Datasets
Real-World Dataset. To demonstrate the effectiveness of our proposed approach, we capture a real dataset using an EPSON C4L 6-Axis robot manipulator with an industrial Ensenso N35 camera. As shown in Figure <ref>, we mount the camera on the end-effector of the robot arm and move the robot to capture the monochrome images with varying robot poses. In our experiments, we use a precisely manufactured calibration board with a 4×4 symmetrical circle grid pattern. We calibrated the camera's intrinsic parameters using the calibration toolbox provided by the camera vendor. We program the robot arm to move the camera to different viewpoints. Since the calibration pattern is symmetrical, we make the robot end-effector stay pointed towards the center of the workstation, and the camera in-plane rotation remains unchanged. The examples of the captured calibration images are shown in Figure <ref>-<ref>. With such a workstation setup, we captured a total of seven sets. Each calibration set includes one training set and one validation set. We perform the calibration using the training set only and evaluate the calibration results on the validation set.
Simulated Dataset. The real dataset can represent the true uncertainties (e.g., measurement noise) for a calibration system in the real world. However, it is not possible to acquire the ground truth information for quantifying the absolute pose errors. The main advantage of using a simulated dataset is the availability of ground truth transformations (e.g., robot end-effector to camera frame, robot base to world frame). In our experiments, we use a public dataset <cit.>. It includes three simulated datasets with a different number of robot poses and synthetic images. The dataset is injected with pseudo-realistic robot pose noise and visual noise for synthetic images.
§.§ Baselines and Evaluation Metrics
For robot hand-eye calibration, existing works use heuristic-based policies, such as random selection or linear spacing, to select viewpoints. To demonstrate the effectiveness of our approach, we compare our system against two heuristic-based viewpoint selection strategies. The first baseline, "Random", selects random robot poses from the set of candidates. The second baseline, "Maximum Distance", moves the robot end-effector to the position of the furthest distance from previous positions in the Euclidean space ℝ^3. Figure <ref> depicts the trajectories generated by our approach and these two baselines. In our experiments, we assume the robot can teleport from one location to the next without the path planning restriction. This will allow us to explore the theoretical upper bounds of our method.
To evaluate the results on the simulated datasets, we take two metrics from <cit.>. We use absolute translation error (mm), e_𝐚𝐭, and absolute rotation error (deg), e_𝐚𝐑, to quantify the absolute pose errors:
Δ𝐓_ce = Ť_ce^-1 𝐓_ce
e_𝐚𝐭 = d(Δ𝐓_ce), e_𝐚𝐑 = ∠(Δ𝐓_ce)
where Ť_ce and 𝐓_ce are the estimated and ground truth transformation (from robot end-effector to camera frame), respectively. The function d( Δ𝐓) extracts the translation part from Δ𝐓 and computes the Euclidean norm. ∠( Δ𝐓) extracts the rotation part from Δ𝐓 and gets the absolute angle value with angle-axis representation with Lie algebra representation in 𝔰𝔬(3).
For the real dataset, due to the missing ground truth poses, we use three metrics from <cit.> for the evaluation: relative translation error (mm), e_𝐫𝐭, relative rotation error (deg), e_𝐫𝐑, and reprojection error (px), e_𝐑𝐌𝐒𝐄. The relative translation and rotation errors are derived from 𝐀𝐗=𝐘𝐁 formulation:
Δ𝐓_k = Ť_bw 𝐓_wc,k Ť_ce 𝐓_eb,k
e_𝐫𝐭 = 1/K∑_k=1^K d( Δ𝐓_k ), e_𝐫𝐑 = 1/K∑_k=1^K ∠( Δ𝐓_k )
where Ť_bw and Ť_ce are the estimated calibration parameters. The per-frame camera pose 𝐓_wc,k is obtained by solving the perspective-n-point (PnP) problem. The metric re-projection error, e_𝐑𝐌𝐒𝐄, is the re-projection root mean squared error between the measured pixel positions and the projected locations over the test set:
e_𝐑𝐌𝐒𝐄 = √(1/K-1∑_k=1^K ‖u_k - π(T_ce^*T_eb, kT_bw^*P_w) ‖_2^2 )
where u_k is the pixel measurement of the 3D marker point set P_w from the robot pose T_eb, k.
§.§ Results
For our system and the baselines, we initialize the calibration parameters with the same set of robot poses (3 sets in our experiments). Table <ref> shows the experimental results on the simulated dataset <cit.>. We can observe that, although the proposed approach is not advantageous to the baselines in terms of the absolute rotation error, it can achieve much higher accuracy for the translation estimation using the same number of the collected measurement sets (28.4% and 37.7% error reduction compared to the "random" and "max-distance" baselines, respectively).
For the real dataset, we performed the evaluation on the collected validation sets, which were not used in the calibration process. Figure <ref> presents the results for the baselines and our proposed NBV system when using different metrics. It can be seen that, with the first few additional viewpoints, the "max-distance" achieves higher accuracy than the "random" policy and has a similar performance to our proposed NBV approach. However, the performance using both "max-distance" and "random" policies becomes less obvious when visiting more viewpoints. Compared to the baselines, our approach is able to achieve the same level of parameter uncertainties and accuracy with much fewer robot poses. Moreover, we measure the Pearson correlation coefficient <cit.> between our predicted information gain and the reduction of the re-projection error. As illustrated in Figure <ref>, the predicted information gain accurately reflects the true error reduction, thus making them well suited to our goal. Table <ref> further demonstrates the advantage of our approach with the same number of additional robot poses. To obtain the results, we use 5 additional measurement sets for each view selection strategy. We can see that, compared to the baselines, our proposed NBV achieves the lowest error for all three metrics.
§ CONCLUSION
In this work, we have presented a viewpoint selection framework for eye-in-hand calibration. We first formulate the calibration problem with the 𝐀𝐗=𝐘𝐁, robot-world-hand–eye representation, and estimate the set of calibration parameters using a non-linear optimization process. Our approach estimates the parameter uncertainty and predicts the information gain of future measurement sets. This allows us to reduce the parameter uncertainty by selecting the robot kinematics with the highest information gain. We evaluate our method on a synthetic dataset and a real robot manipulator. The results demonstrate that our proposed next-best-view approach can achieve high calibration accuracy with much fewer robot poses when compared against baselines that use heuristic-based policies.
§ ACKNOWLEDGMENT
This work was supported by Epson Canada Ltd.
ieeetr
|
http://arxiv.org/abs/2303.07319v1
|
20230313174139
|
Observations of GRB 230307A by TESS
|
[
"Michael M. Fausnaugh",
"Rahul Jayaraman",
"Roland Vanderspek",
"George R. Ricker",
"Christopher J. Burke",
"Knicole D. Colon",
"Scott W. Fleming",
"Hannah M. Lewis",
"Susan Mullally",
"Allison Youngblood",
"Thomas Barclay",
"Eric Burns",
"David W. Latham",
"S. Seager",
"Joshua N. Winn",
"Jon M. Jenkins"
] |
astro-ph.HE
|
[
"astro-ph.HE"
] |
0000-0002-9113-7162]Michael M. Fausnaugh
Department of Physics and Kavli Institute for Astrophysics and Space Research, Massachusetts Institute of Technology, Cambridge, MA 02139, USA
Michael M. Fausnaugh
[email protected]
0000-0002-7778-3117]Rahul Jayaraman
Department of Physics and Kavli Institute for Astrophysics and Space Research, Massachusetts Institute of Technology, Cambridge, MA 02139, USA
Department of Physics and Kavli Institute for Astrophysics and Space Research, Massachusetts Institute of Technology, Cambridge, MA 02139, USA
Department of Physics and Kavli Institute for Astrophysics and Space Research, Massachusetts Institute of Technology, Cambridge, MA 02139, USA
0000-0002-7754-9486]Christopher J. Burke
Department of Physics and Kavli Institute for Astrophysics and Space Research, Massachusetts Institute of Technology, Cambridge, MA 02139, USA
0000-0001-8020-7121]Knicole D. Colón
NASA Goddard Space Flight Center, 8800 Greenbelt Rd, Greenbelt, MD 20771, USA
0000-0003-0556-027X]Scott W. Fleming
Space Telescope Science Institute, 3700 San Martin Dr, Baltimore, MD 21218, USA
0000-0002-7871-085X]Hannah M. Lewis
Space Telescope Science Institute, 3700 San Martin Dr, Baltimore, MD, 21218, USA
0000-0001-7106-4683]Susan Mullally
Space Telescope Science Institute, 3700 San Martin Dr, Baltimore, MD 21218, USA
0000-0002-1176-3391]Allison Youngblood
NASA Goddard Space Flight Center, 8800 Greenbelt Rd, Greenbelt, MD 20771, USA
0000-0001-7139-2724]Thomas Barclay
University of Maryland, Baltimore County, 1000 Hilltop Circle, Baltimore, MD 21250, USA
NASA Goddard Space Flight Center, 8800 Greenbelt Rd, Greenbelt, MD 20771, USA
0000-0002-2942-3379]Eric Burns
Department of Physics and Astronomy, Louisiana State University, Baton Rouge, LA 70803 USA
Center for Astrophysics | Harvard & Smithsonian, 60 Garden Street, Cambridge, MA 02138
0000-0002-6892-6948]S. Seager
Department of Physics and Kavli Institute for Astrophysics and Space Research, Massachusetts Institute of Technology, Cambridge, MA 02139, USA
Department of Earth, Atmospheric, and Planetary Sciences, Massachusetts Institute of Technology, Cambridge, MA 02139, USA
Department of Aeronautics and Astronautics, MIT, 77 Massachusetts Avenue, Cambridge, MA 02139, USA
0000-0002-4265-047X]Joshua N. Winn
Department of Astrophysical Sciences, Princeton University, 4 Ivy Lane, Princeton, NJ 08544, USA
NASA Ames Research Center, Moffett Field, CA, 94035, USA
We present the TESS light curve of GRB 230307A. We find two distinct components: a bright, prompt optical component at the time of the Fermi observation that peaked at TESS magnitude (averaged over 200 seconds), followed by a gradual rise and fall over 0.5 days, likely associated with the afterglow, that peaked at mag. The prompt component is observed in a single 200s Full Frame Image and was undetectable in the next TESS image (T_ mag > 17.79). Assuming that the onset of the optical transient was coincident with the gamma-ray emission, the prompt emission lasted less than 73.6 seconds, which implies the true peak was actually brighter than T_ mag = . We also fit parametric models to the afterglow to characterize its shape.
The TESS light curve can be retrieved at <https://tess.mit.edu/public/tesstransients/light_curves/lc_grb230307A_cleaned.txt>.
§ INTRODUCTION
GRB 230307A was a long gamam-ray burst discovered by Fermi at BJD-2,460,000=11.15549 days (15:44:06 UT on 2023 March 7, GCN33405; ).
A fading optical afterglow was observed 9–56 hours after the GRB trigger by ULTRACAM (GCN33439; ), GMOS-S on Gemini South (GCN33447; ), RASA36, and KMTnet (GCN33449; ). The coordinates reported by <cit.> are RA = 04:03:25.83, Dec = -75:22:42.7.
The Transiting Exoplanet Survey Satellite (TESS, ) observed the optical afterglow of GRB 230307A in the Full Frame Images (FFIs), sampled at 200 seconds.
In this research note, we present the TESS light curve and observed properties of the optical emission.
§ OBSERVATIONS AND DATA REDUCTION
TESS observed GRB 230307A as part of its normal operations in Sector 62, which lasted from 2023 February 12 to March 10. The FFI data from March 3–10 were downloaded from the spacecraft on 2023 March 10, processed by the Payload Operations Center (POC) at MIT, and delivered to the Mikulski Archive for Space Telescopes (MAST) as a TICA High Level Science product <cit.>.[<https://archive.stsci.edu/hlsp/tica>] The order of processing events was
* March 10, 16:23 UTC—Deep Space Network (DSN) begins contact with the TESS spacecraft to downlink the data.
* March 11, 10:56 UTC—Compressed data arrive at POC from the DSN; POC begins decoding data delivery and writing image files.
* March 11, 16:35 UTC—POC begins calibrating data and fitting World Coordinate Solutions as part of the TICA data delivery.
* March 11, 18:42 UTC—POC begins staging and verifying the TICA delivery to MAST.
* March 12, 1:50 UTC—MAST begins data ingest.
* March 12, 6:40 UTC—GRB data are made public on MAST, announced on the MAST holdings page,[<https://outerspace.stsci.edu/display/TESS/TESS+Holdings+Available+by+MAST+Service>] and announced on MAST social media.
Once the data were public, we processed the images with the difference imaging analysis pipeline described by <cit.>.
We identified a transient point source in the TESS difference image overlapping with the Fermi trigger at BJD-2,460,000=11.15518 days, close to the coordinates reported by <cit.>. We measured the position of the source using flux-weighted centroids in a 5x5 square pixel aperture. We found a position of RA = 04:03:25.36, Dec = -75:22:41.31, which agrees with the position from ULTRACAM to 1.8 arcseconds. This difference is consistent with the typical 1σ precision of TICA World Coordinate Solutions, about 2 arcseconds. These coordinates are also consistent with those reported in GCN33453 ().
We extracted light curves from the difference images using forced PSF photometry at the location of the afterglow reported by <cit.>. Figure <ref> shows the resulting light curve. Based on the scatter of the light curve prior to the GRB discovery, we estimate a 5σ limiting magnitude of 18.63 in 1600 seconds. The TESS light curve is available at <https://tess.mit.edu/public/tesstransients/light_curves/lc_grb230307A_cleaned.txt>. Information on the file format and processing steps is available on the same website.[<https://tess.mit.edu/public/tesstransients/pages/readme.html>]
The light curve shows two distinct components. First is a prompt rise from zero flux to TESS mag T_ mag = in a single FFI at BJD-2,460,000 = 11.15518 days (mid exposure). The quoted uncertainty includes a statistical uncertainty of 0.02 mag, but is dominated by uncertainty in the TESS instrument absolute flux calibration <cit.>. The source is not detected in the next FFI, with a 3σ upper limit of 17.79 mag. The second emission component starts just after the prompt emission, and consists of a gradual rise and fall in the TESS light curve over 0.5 days, likely associated with the afterglow.
§ ANALYSIS OF THE AFTERGLOW
We fit two parametric models to the afterglow light curve, a fast-rise exponential-decay (FRED) model and a double power law model. We fit the original data sampled at 200 seconds (the binned data shown in Figure <ref> are binned to 1600 seconds for display purposes). We excluded the prompt emission at T_ mag = 14.49 from the fits to the afterglow emission. The reported uncertainties correspond to the 68% confidence intervals of the fits. For both models, we fit a residual background error as a nuisance parameter, which is consistent with zero at 1σ.
From the FRED model, we find that
* the peak magnitude of the afterglow is ,
* the rise-time t_ rise = ,
* the time containing 90% of the flux t_90 = ,
* and the exponential decay timescale t_ exp = .
For the double power law model, we used the parameterization of <cit.>:
F = F_02[ ( t/t_ break)^α_1 ω + ( t/t_ break)^α_2 ω]^-1/ω
where F_02 is the flux normalization at the break time t_ break, while α_1, and α_2 are slope parameters. We fixed the smoothing parameter ω to a value of 5.0. The best-fit model yields
* t_ break = ,
* α_1 = ,
* and α_2 = .
We also fit the TESS light curve with the deep r-band magnitudes reported by <cit.> and <cit.>, and found consistent results.
§ DISCUSSION
The end time of the FFI with the prompt emission is BJD-2,460,000=11.15634 days, while the Fermi trigger is at BJD-2,460,000=11.15549 days. Assuming that the onset of the optical light curve is coincident with the onset of the gamma-ray emission observed by Fermi, the prompt emission observed by TESS lasted less than 73.6 seconds. A shorter duration implies a higher peak magnitude for the same fluence; we find T_ mag = mag for a 73.6 second burst, and the peak could be even brighter if the duration of the prompt emission is shorter. For a given luminosity distance D, the isotropic monochromatic luminosity at 7839 Å (the pivot wavelength of the TESS filter) would be greater than 9× 10^44(D/1 Gpc)^2 erg s^-1. This calculation is corrected for Galactic extinction at 7839 Å assuming a extinction law and E(B-V) = 0.0758 mag from , but does not take into account the unknown spectral shape of the GRB in the broad TESS filter (6,000–10,000 Å).
These data demonstrate the utility of wide-field, continuous monitoring for studies of fast extragalactic transients. TESS data released approximately every 7 days as TICA High Level Science Products will facilitate these studies over the next several years.
§ ACKNOWLEDGMENTS
We thank the TESS-POC team at MIT and MAST for facilitating fast release of TESS FFIs through the TICA HLSP. This note includes data collected by the TESS mission, funding for which is provided by NASA’s Science Mission directorate.
Matplotlib <cit.>,
Numpy <cit.>,
Scipy <cit.>,
Astropy <cit.>,
Astroquery <cit.>,
gwcs[<https://doi.org/10.5281/zenodo.4271727>],
TICA <cit.>
|
http://arxiv.org/abs/2303.07214v1
|
20230313154919
|
New insight into the massive eccentric binary HD 165052: self-consistent orbital solution, apsidal motion, and fundamental parameters
|
[
"Sophie Rosu",
"Edwin A. Quintero",
"Gregor Rauw",
"Philippe Eenens"
] |
astro-ph.SR
|
[
"astro-ph.SR"
] |
firstpage–lastpage
Parallel Vertex Diffusion for Unified Visual Grounding
Zesen Cheng^1 Corresponding Author. Kehan Li^1 Peng Jin^1 Xiangyang Ji^3
Li Yuan^1,2 Chang Liu^3 Jie Chen^1,2 ^1 School of Electronic and Computer Engineering, Peking University
^2 Peng Cheng Laboratory ^3 Tsinghua University
March 30, 2023
============================================================================================================================================================================================================================================================
HD 165052 is a short-period massive eccentric binary system that undergoes apsidal motion. As the rate of apsidal motion is directly related to the internal structure constants of the binary components, its study allows to get insight into the internal structure of the stars.
We use medium- and high-resolution spectroscopic observations of HD 165052 to provide constraints on the fundamental properties of the binary system and the evolutionary state of its components.
We apply a spectral disentangling code to reconstruct artefact-free spectra of the individual stars and derive the radial velocities (RVs) at the times of the observations. We perform the first analysis of the disentangled spectra with the non-LTE model atmosphere code to determine the stellar properties. We derive the first self-consistent orbital solution of all existing RV data, including those reported in the literature, accounting for apsidal motion. We build, for the very first time, dedicated stellar evolution tracks with the code requesting the theoretical effective temperatures and luminosities to match those obtained from our spectroscopic analysis. The binary system HD 165052, consisting of an O6.5 V((f)) primary (T_eff,P=37 500 ± 1000 K) and an O7 V((f)) secondary (T_eff,S=36 000 ± 1000 K), displays apsidal motion at a rate of (11.30^+0.64_-0.49)^∘ yr^-1. Evolutionary masses are compared to minimum dynamical masses to constrain the orbital inclination.
Evolutionary masses M_ev,P=24.8±1.0 M_⊙ and M_ev,S=20.9±1.0 M_⊙ and radii R_ev,P=7.0^+0.5_-0.4 R_⊙ and R_ev,S=6.2^+0.4_-0.3 R_⊙ are derived, and the inclination is constrained to 22.1^∘≤ i ≤ 23.3^∘. Theoretical apsidal motion rates, derived assuming an age of 2.0±0.5 Myr for the binary, are in agreement with the observational determination. The agreement with theoretical apsidal motion rates enforces the inferred values of the evolutionary stellar masses and radii.
stars: early-type – stars: evolution – stars: individual (HD 165052) – stars: massive – binaries: spectroscopic
§ INTRODUCTION
Massive stars play a key role in many processes in the Universe, notably through their winds and powerful supernova explosions that contribute to the chemical enrichment of the Universe. It is nowadays thought that the majority of the massive stars (i.e. O and B-type stars having a mass larger than 8 M_⊙) are, or have been, part of a binary or higher multiplicity system <cit.>. According to current estimates, more than 70% of the massive stars inhabiting our Galaxy have spent some part of their existence in a binary system <cit.>. The simple fact of being bound to another star by gravitational attraction can deeply modify the evolutionary track of the considered star, as its evolution is now driven not only by its own properties – initial mass, mass-loss rate (a problem that has not been self-consistently solved in stellar structure and evolution models yet), and rotation rate <cit.> –, but also by the binary orbit's parameters <cit.>. The study of detached eclipsing and/or spectroscopic binaries is the most accurate way to obtain reliable physical properties of O and B stars. Among these systems, those showing evidence for apsidal motion (i.e. slow precession of the binary system major axis) offer additional possibilities to sound the interior of these massive stars. Indeed, the apsidal motion rate is directly related to the internal structure constant of the stars that make up the binary system <cit.>. The internal structure constant is a sensitive indicator of the density stratification inside a star and its value strongly changes as the star evolves away from the main sequence. Measuring the rate of apsidal motion in a binary system hence not only provides a diagnostic of the – otherwise difficult to constrain – internal structure of the stars, but also offers a test of our understanding of stellar structure and evolution <cit.>.
The massive eccentric binary HD 165052 is a well-known early-type double-lined spectroscopic (SB2) binary system of the very young open cluster NGC 6530. NGC 6530 is itself located in the centre of the H ii region M8, also known as the Lagoon Nebula. This cluster is one of the most studied clusters in our Galaxy, notably for its interesting history of ongoing star formation <cit.>. The age of NGC 6530 was estimated by several authors <cit.>. Most authors agree about an age estimate around 2 Myr: <cit.> and <cit.> both derived an age of 2 Myr, <cit.> set a lower limit of 2 Myr though star formation would have continued as recently as 0.25 Myr ago, <cit.> estimated the age to range from 1 to 3 Myr, <cit.> estimated the age to 1.5 Myr with an age spread of 4 Myr, <cit.> derived a median age of cluster stars in the central region of 0.8 Myr, with a maximum age spread for the whole NGC 6530 cluster of 4 Myr, and <cit.> derived an age of 2.3 Myr with an age spread compatible with 2 Myr. Only <cit.> derived a much larger age of 5±2 Myr.
<cit.> was the first to report evidence for binarity of HD 165052 through the discovery of a variable radial velocity (RV). <cit.> pointed out the double-lined binary nature of HD 165052. The very first orbital solution was proposed by <cit.>. However, due to the apparent similarity in the optical region between the two components of the binary, the authors did not unambiguously identify the two components and derived an orbital period of 6.14 days that appeared to be erroneous. <cit.> revisited the orbital period P_orb=2.96 days of the system, among other properties (see Table <ref>), based on 15 high-resolution IUE spectra. The binary system was classified as O6.5 V + O6.5 V by <cit.>, modified to O6.5 V(n)((f)) + O6.5 V(n)((f)) by <cit.>, and to O6 V + O6 V by <cit.>. <cit.> presented a new optical spectroscopic study of HD 165052 based on intermediate and high-resolution CCD observations. The authors derived a new orbital solution for the system (see Table <ref>) and found, for the first time, evidence of apsidal motion in the system from the comparison with previous RV determinations <cit.>. <cit.> investigated the Struve-Sahade effect that was originally pointed out in the system by <cit.> and also derived a new orbital solution for the system (see Table <ref>). Finally, <cit.> presented a new set of RV measurements of HD 165052 which they obtained through the disentangling of high-resolution optical spectra using the method described by <cit.>. They provided a new orbital solution for the system (see Table <ref>) and confirmed the variation of the longitude of periastron with time. The authors derived the first estimate of the apsidal motion rate in the system: ω̇=(12.1 ± 0.3)^∘ yr^-1.
In this article, we perform a new, in-depth spectroscopic investigation of the binary HD 165052 through the analysis of both old and new medium- and high-resolution spectra. We reassess the fundamental and orbital parameters of the system making use of the most advanced disentangling method proposed by <cit.> that allows the reconstruction of artefact-free individual spectra. We further analyse those reconstructed spectra with, for the first time, a non-LTE model atmosphere code, namely . We derive the first self-consistent orbital solution of all existing RV data, including those reported in the literature, accounting for the change of the longitude of periastron with time. Given that the rate of apsidal motion is directly related to the internal stellar structure constants of the binary components, its determination allows us to infer additional constraints to perform critical tests of stellar structure and evolution models <cit.>. Finally, we also compute dedicated stellar structure and evolution tracks to derive evolutionary masses and radii for the stars and to put a robust constraint on the value of the inclination of the orbit, as well as to see how the theoretical apsidal motion rates compare to the observational value.
The set of spectroscopic data we use is introduced in Sect. <ref>. In Sect. <ref> we perform the spectral disentangling, reassess the spectral classification of the stars, and analyse the reconstructed spectra by means of the CMFGEN non-LTE model atmosphere code <cit.>. The RVs deduced from the spectral disentangling are combined with data from the literature in Sect. <ref> to derive values for the orbital period, the mass ratio, the rate of apsidal motion, and the orbital eccentricity of the system, among others. The stellar structure and evolution tracks computed with the Code Liégeois d'Évolution Stellaire are presented in Sect. <ref>. We provide our conclusions in Sect. <ref>.
§ OBSERVATIONAL DATA
§.§ Spectroscopy
We extracted a total of 47 medium- and high-resolution échelle spectra of HD 165052 in the optical domain from the ESO science archive. Those spectra were collected between May 1999 and July 2017 using different instruments. Twenty-one spectra were obtained with the Fiber-fed Extended Range Optical Spectrograph (FEROS) mounted on the European Southern Observatory (ESO) 1.5 m telescope in La Silla, Chile <cit.>, between May 1999 and April 2002, three spectra were obtained with the FEROS instrument mounted on the ESO 2.2 m telescope between May 2004 and April 2007. FEROS has a spectral resolving power of 48 000. The FEROS data were reduced using the FEROS pipeline of the MIDAS software. Ten spectra were obtained with the ESPaDOns spectrograph attached to the Canada-France-Hawaï observatory (CFH) 3.6 m telescope in Hawaï <cit.>. These data were collected during a single night in June 2010. ESPaDOnS has a spectral resolving power of 68 000. The reduced ESPaDOnS data were retrieved from the CFHT archive. Four spectra were obtained with the Ultraviolet and Visual Echelle Spectrograph (UVES) mounted on the ESO Very Large Telescope (VLT) at Cerro Paranal, Chile <cit.>, during a single night in November 2002. UVES has a spectral resolving power of 65 030 in the blue arm and of 74 450 in the red arm. The wavelength domain ranges from 3000 to 5000 Å (blue arm) and from 4200 to 11 000 Å (red arm). Nine spectra were obtained with the XSHOOTER instrument mounted on the VLT <cit.>, in July 2016 and July 2017. The wavelength domain ranges from 3000 to 5595 Å (UVB) and from 5595 to 10 240 Å (VIS). The spectral resolving power of XSHOOTER is, depending on the observations, 4112 or 5453 (UVB) and 6505, 8935, or 11 333 (VIS). The ESPaDOns, UVES, and XSHOOTER spectra provided in the archive were already reduced using the dedicated pipelines. We complemented those spectra with 24 high-resolution échelle spectra obtained with the HEROS instrument mounted on the TIGRE telescope between April 2019 and April 2021 <cit.>. The wavelength domain ranges from 3500 to 5600 Å (blue channel) and from 5800 to 8800 Å (red channel). The spectral resolving power is 20 000. For all the spectra, we removed cosmic rays and telluric absorption lines using MIDAS and the telluric tool within IRAF, respectively. We normalised the spectra with MIDAS by fitting low-order polynomials to the continuum as in <cit.>. The journal of the spectroscopic observations is presented in Table <ref>, together with the radial velocities computed in Sect. <ref> and the phase computed using the orbital period derived in Sect. <ref>.
§ SPECTRAL ANALYSIS
§.§ Spectral disentangling
As a first step, we performed the spectral disentangling of all data using our disentangling code based on the method described by <cit.>. We derived the individual spectra of the binary components as well as their RVs at the times of the observations. We refer to <cit.>, <cit.>, and <cit.> for detailed information about the methodology and its limitations, and to Appendix <ref> for a detailed description of the method adopted in the present context.
The resulting RVs of both stars are reported in Table <ref> together with their 1σ errors.
We confirm the observations of <cit.> who reported artefacts in the spectra of the stellar components of HD 165052 after disentangling using the version of the “shift and add” technique of <cit.>, a precursor of the code proposed by <cit.>. <cit.> demonstrated that the shift and add method produces artefacts when the spectra contain broad lines with low Doppler shifts. These artefacts distort the spectral line profiles, producing uncertainties in the flux and the profile of the spectral lines of the stellar components.
The novel QER20 spectral disentangling algorithm proposed by <cit.> combines the advantages of the shift and add method (versatility and ease of implementation) with artefact-free reconstructed spectra. The fundamental principle of the QER20 Package consists in considering the integrated flux of a given spectral line as a free parameter <cit.>.
Hence, as a second step, we used the QER20 algorithm, fixing the RVs of the stars to those computed previously and reported in Table <ref>. In order to illustrate the reliability of this novel disentangling method in the case of the binary HD 165052, Figure <ref> compares the reconstructed Hγ line of both stellar components, obtained with the shift and add method and the QER20 Package. The former shows the artefacts mentioned above: emission wings in the spectrum of the primary, and absorption wings in the secondary. In contrast, the QER20 Package yields profiles free of these artefacts. The difference in integrated flux of the lines amounts to 5% to 7% between the two methods.
§.§ Spectral classification and absolute magnitudes
We reassessed the spectral classification of the binary components of HD 165052 based on their reconstructed spectra.
To determine the spectral types of the stars, we used Conti's criterion <cit.> complemented by <cit.>. We found that log W' = log[EW(He iλ 4471)/EW(He iiλ 4542)] amounts to -0.17± 0.01 for the primary star and to -0.05 ± 0.01 for the secondary star, which correspond to spectral types O6.5 and O7 (with spectral type O7.5 within the error bars), respectively. We also followed the Walborn criterion <cit.> based on the strengths of the He ii λ 4686 line and the N iii λλ 4634-40-42 triplet to asses the luminosity classes of the stars. Given that He ii λ 4686 is seen in strong absorption and N iii λλ 4634-40-42 in weak absorption, both stars are of luminosity class V((f)).
We estimated the brightness ratio of HD 165052 in the visible domain based on the ratio between the equivalent widths (EWs) of the spectral lines of the secondary star and TLUSTY spectra of similar effective temperatures. We used the Hβ, Hγ, He i λλ 4026, 4471, 5016, and He ii λ 4542 lines. The ratio EW_ TLUSTY/EW_sec = (l_P+l_S)/l_S amounts to 2.42± 0.39 and 2.43±0.37 when spectra of T_eff of 37 500 and 35 000 K, respectively, are used. Both results give us l_S/l_P = 0.70±0.19.
<cit.> derived a distance of 1212.7^+42.8_-31.5 pc from the parallax of ϖ = 0.7893± 0.0297 mas quoted by the Gaia early data release 3 <cit.>. This leads to a distance modulus of 10.42^+0.08_-0.06 for the binary system. Mean V and B magnitudes of 6.87 and 6.98, respectively, are reported by <cit.>, for which we estimated errors of 0.01. We adopted a value of -0.27±0.01 for the intrinsic colour index (B-V)_0 of an O6.5-O7 V star <cit.> and assumed the reddening factor in the V-band R_V equal to 3.15±0.06 for NGC 6530 <cit.>. In this way, we obtained an absolute magnitude in the V-band of the binary system M_V=-4.75^+0.10_-0.08. Using the brightness ratio, we then derived individual absolute magnitudes M_V,P =-4.17±0.15 and M_V,S =-3.79^+0.20_-0.19 for the primary and secondary stars, respectively.
From the comparison with the magnitudes reported by <cit.>, we observe that the primary star is slightly less luminous than a `typical' O6.5 V star while the secondary star is fainter than expected for O7-O7.5 V type stars.
§.§ Projected rotational velocities
We used the Fourier transform method <cit.> and proceeded as in <cit.> to derive the projected rotational velocities of both stars. The results are summarised in Table <ref>, and the Fourier transforms of the C iv λ 5801 line for the primary star and of the Si iv λ 4631 line for the secondary star are illustrated in Fig. <ref>.
The results presented in Table <ref> show that the mean v sin i_rot computed on metallic lines alone or on all the lines agree very well. We adopted a mean v sin i_rot of 67±8 km s^-1 for the primary star and of 62±7 km s^-1 for the secondary star. Our values are compatible, within the error bars, with those derived by <cit.>, <cit.>, <cit.>, and <cit.> but are slightly lower than those quoted by <cit.>.
§.§ Model atmosphere fitting
We analysed the reconstructed spectra of the binary components by means of the non-LTE model atmosphere code CMFGEN <cit.> to constrain the fundamental properties of the stars. We broadened the CMFGEN spectra by the projected rotational velocities determined in Sect. <ref> and adjusted the stellar and wind parameters following the procedure outlined by <cit.>.
Given that the surface gravity derived in the adjustment is underestimated for a binary star <cit.>, we decided to fix the value of the surface gravity log g_spectro to 3.92 cgs for both stars following Tables 1 and 4 in <cit.>. We fixed the microturbulence value at the level of the photosphere, v_micro^min, to 15 km s^-1. The clumping parameters of the wind were fixed: the volume filling factor f_1 was set to 0.1, and the f_2 parameter controlling the onset of clumping was set to 100 km s^-1, as in <cit.>. Likewise, the β parameter of the velocity law was fixed to 1.0 as suggested by <cit.> for O6.5-O7 V type stars. The wind terminal velocity v_∞ was fixed to 2335 km s^-1 for both stars, as derived from the combined IUE spectra by <cit.>.
We adjusted the macroturbulence velocity v_macro on the wings of the O iii λ 5592 and Balmer lines and derived values of 120± 20 km s^-1 and 65±10 km s^-1 for the primary and secondary stars, respectively.
The stellar and wind parameters of the best-fit CMFGEN model atmosphere are summarised in Table <ref>. The normalised disentangled spectra of HD 165052 are illustrated in Fig. <ref> along with the best-fit CMFGEN adjustments.
We derived the effective temperature based on the adjustment of the He i λλ 4121, 4471, 4713, 4922, 5016, 5874, 7065 and He ii λλ 4200, 4542, 5412 lines. This was clearly a compromise as we could not find a solution that perfectly fits all helium lines simultaneously. We discarded the He i λ 4026 line because of its blend with the weak but non-zero He ii λ 4026 line. We derived effective temperatures T_eff,1 = 37 500 ± 1000 K and T_eff,2 = 36 000 ± 1000 K for the primary and secondary stars, respectively.
The mass-loss rate was derived based on the adjustment of the Hα and He ii λ 4686 lines. We derived values of (1.5± 0.5)× 10^-7 M_⊙ yr^-1 and (9.0± 1.0)× 10^-8 M_⊙ yr^-1 for the primary and secondary stars, respectively.
We set the surface chemical abundances of all elements, including helium, but excluding carbon and oxygen, to solar as taken from <cit.>. We derived the oxygen abundance based on the O iii λ 5592 line as it is the sole oxygen line free of blends. We derived sub-solar oxygen abundances in number O/H of (3.0± 0.2)× 10^-4 and (4.0± 0.2)× 10^-4 for the primary and secondary stars, respectively. For both stars, with these oxygen abundances, the weak O iii λλ 4368, 4448, 4454, 4458 lines are well-reproduced, while the O iii λ 5508 line is slightly overestimated. We derived the carbon abundance based on the C iii λ 4070 line as it is the sole reliable carbon line free of blends. Indeed, as stated by <cit.>, the C iii λλ 4647-51 blend and the C iii λ 5696 line are known to be problematic because their formation processes are controlled by a number of far-UV lines, hence their strength and nature critically depend upon subtle details of the stellar atmosphere model. The C iii λ 4379 line is heavily blended with the N iii λ 4379 and therefore useless, while the C iii λ 4388 line is not significantly affected by a change in carbon abundance. We also know the C iv λ 5801, 5812 lines to be problematic and rarely correctly reproduced <cit.>. We derived a sub-solar carbon abundances in number C/H of (2.0± 0.2)× 10^-4 for both stars.
Finally, we set the nitrogen abundance to solar as taken from <cit.> as we could not adjust the nitrogen abundance based on the nitrogen lines. Indeed, N iii λ 4379 is heavily blended with C iii λ 4379, the N iii λλ 4510-4540 blend is not significantly affected by a change in nitrogen abundance, and the spectra display the N iii λλ 4634-4640 complex in emission. We tested a nitrogen abundance 4.83 (respectively 3.35) times solar for the primary (respectively secondary) star – such that, combined with the depleted C and O abundances, the CNO abundance is solar – and observed that the nitrogen lines in the spectra were much deeper than in the observational spectra. This results suggests that the initial metallicity of the stars is (at least slightly) sub-solar.
We computed the bolometric magnitudes of the stars assuming the bolometric correction depends only on the effective temperature through the relation
BC = -6.89log(T_eff)+28.07
<cit.> and got M_bol,P = -7.61± 0.17 and M_bol,S = -7.11± 0.21, which then converted into bolometric luminosities give us L_bol,P = 89 000± 14 000 L_⊙ and L_bol,S = 56 000 ± 11 000 L_⊙. Combined with the effective temperatures derived from the analysis, we inferred spectroscopic radii R_spectro,P=7.1 ± 0.7 R_⊙ and R_spectro,S=6.1 ± 0.7 R_⊙. The surface gravities, corrected for both the centrifugal force and radiation pressure, amount to 3.99± 0.01 and 3.98^+0.02_-0.01 for the primary and secondary stars, respectively. Spectroscopic masses M_spectro,P=17.7^+3.5_-3.4 M_⊙ and M_spectro,S=12.9±2.9 M_⊙ were then inferred.
§ RADIAL VELOCITY ANALYSIS
Our total set of RV measurements consists of our 71 primary and secondary RVs determined as part of the disentangling process (see Sect. <ref>) complemented by 94 primary and secondary RVs coming from the literature. Twelve RVs come from <cit.> but we adopted the corrected values by <cit.>. The latter authors do not report uncertainties on their measurements, and we therefore assumed symmetric uncertainties of 15 km s^-1, as representative of the O-C. Fifteen RVs come from <cit.>, and we assumed symmetric uncertainties on these RVs of 10 km s^-1 as representative of the O-C. Thirty RVs come from <cit.> and (J. I. Arias, private communication, 2021), for which we adopted the uncertainties quoted by the authors. The remaining 37 RVs come from <cit.> that we recalculated here (see Appendix <ref>). We ended up, in total, with a series of 165 RVs spanning about 46 years. For the RVs derived from the spectral disentangling, we adopted formal errors of 3 km s^-1, as the small errors derived as part of the disentangling method would bias the adjustment given our high number of RVs compared to those coming from the literature. We then processed in the adjustment of the RVs along three different avenues.
First, for each time of observation t, we adjusted the primary RV data with the following relation
RV_P(t) = γ_P + K_P [cos(ϕ(t)+ω(t)) +ecosω(t)],
where γ_P, K_P, e, and ω are the primary apparent systemic velocity, the semi-amplitude of the primary RV curve, the eccentricity, and the argument of periastron of the primary orbit, respectively. The true anomaly ϕ is inferred from the eccentric anomaly, itself computed through Kepler's equation, which involves both e and the anomalistic orbital period P_orb of the system. We accounted for the apsidal motion through the variation of ω with time following the relation
ω(t) = ω_0 + ω̇(t-T_0),
where ω̇ is the apsidal motion rate and ω_0 is the value of ω at the time of periastron passage T_0. Given that different spectral lines give potentially slightly different values of the apparent systemic velocities, and given that the different RVs were obtained based on different sets of lines, the systemic velocity of each subset of our total dataset was adjusted so as to minimise the sum of the residuals of the data about the curve given by Eq. (<ref>).
Second, we adjusted the secondary RV data with a relation similar to Eq. (<ref>) corresponding to the secondary star, with K_S and γ_S having straightforward definitions.
Third, we made use of the linear relation
RV_P(t)=-qRV_S(t)+B
relating the primary and secondary RVs of an SB2 system, where q=M_S/M_P is the mass ratio and B=γ_P+qγ_S, to convert the RVs of both stars into equivalent RVs of the primary star with
RV_eq(t)=RV_P-qRV_S+B/2.
to which we associate corresponding K_eq and γ_eq. We derived a value q =0.902 ± 0.009 from the RVs coming from the disentangling process.
In the three cases, we scanned the 6-D parameter space in a systematic way to find the values of the free parameters (P_ orb, e, T_0, ω_0, ω̇, and K_ P or K_ S or K_ eq) that provide the best fit to the whole set of corresponding RV data. The projections of the 6-D parameter space onto the 2-D planes is illustrated in Fig. <ref> for the equivalent RVs. The corresponding orbital parameters are given in Table <ref>. a_Psin i and a_Ssin i stand for the minimum semi-major axis of the primary and secondary stars, respectively, M_Psin^3 i and M_Ssin^3 i stand for the minimum mass of the primary and secondary stars, respectively, and χ^2_ν is the reduced χ^2. We note that in the case of the primary (respectively secondary) RVs, we used the mass ratio derived previously to convert K_P (respectively K_S) into a value for K_S (respectively K_P) and compute the associated minimum masses but we did not adjust the secondary (respectively primary) RVs directly. Figure <ref> illustrates the best fit of the RV data with the equivalent RVs solution at 16 different epochs.
The eccentricities we obtained for the three solutions are compatible, within the error bars, with those coming from the literature (see Table <ref>), except with the value of <cit.> as these authors explicitly assumed a zero eccentricity for the system. Our orbital periods are longer and not compatible, within the error bars, with those coming from the literature (we did not consider the one of <cit.>, see discussion in Sect. <ref>). Our value of K_P is compatible, within the error bars, with those of <cit.>, <cit.>, and <cit.>, but slightly larger than the one quoted by <cit.>. Our value of K_S is compatible with those of <cit.>, and <cit.> but slightly larger than the one quoted by <cit.> and slightly smaller than the one quoted by <cit.>. Our mass ratio is compatible, within the error bars, with those coming from the literature, except for the one quoted by <cit.>. Finally, our apsidal motion rates are slightly smaller than the value of (12.1±0.3)^∘ yr^-1 reported by <cit.> but, in the cases of the primary and equivalent RVs solutions, still in agreement within the error bars.
§ STELLAR STRUCTURE AND EVOLUTION TRACKS
We computed stellar structure and evolution tracks with the Code Liégeois d'Évolution Stellaire[The code is developed and maintained by Richard Scuflaire at the STAR Institute at the University of Liège.] <cit.>. The first goal of this theoretical analysis is to derive evolutionary masses for the stars and, hence, to put a constraint on the value of the inclination of the orbit through the confrontation with the minimum stellar masses derived in Sect. <ref>. The second goal of this analysis is to see how the theoretical apsidal motion rates derived for two stellar models of the same age compare to the observational apsidal motion rate. In the present analysis, we assumed that HD 165052 has an age of 2.0±0.5 Myr (see Sect. <ref>).
The apsidal motion rate of a binary system, in the simple two-body case, is the sum of a Newtonian contribution (N) and a general relativistic correction (GR), which expressions were introduced by <cit.> for the former one, and <cit.> and <cit.> for the latter one. We here adopt the same conventions and notations as in <cit.> (see Sects. 3 and 4, and Equations (17) to (20) and (5) to (9)).
We built a grid of stellar evolution tracks having an initial mass M_init ranging from 18 to 27 M_⊙ and a turbulent diffusion coefficient D_T of 0, 10^7, 2×10^7, and 3×10^7 cm^2 s^-1, and for which we adopted a standard mass-loss scaling factor ξ=1 and an overshooting parameter α_ov=0.30 <cit.>. We present in the Hertzsprung-Russell diagrams in Figs. <ref> and <ref> the evolutionary tracks for the primary and secondary stars, respectively. For better visibility in the diagrams, we decided to only present the tracks that cross the observational boxes defined by the observational effective temperatures and bolometric luminosities of the stars. Among these selected models, we discarded those having an age lower than 1.5 Myr or higher than 2.5 Myr when crossing the observational box in the Hertzsprung-Russel diagram. Given the conclusions reached by <cit.> about the necessity to include enhanced turbulent mixing in the stellar evolution models to reproduce the internal structure of the massive stars they studied, it is highly unlikely that a model without any turbulent diffusion would be representative of the stars of HD 165052. Hence, we further discarded the tracks having D_T=0 cm^2 s^-1. We were thus left with nine tracks for the primary star and seven tracks for the secondary star.
For each selected evolutionary track, we report in Table <ref> the evolutionary mass, radius, effective temperature, and internal stellar structure constant corrected for the effects of rotation following <cit.> at the ages of 1.5, 2.0, and 2.5 Myr. The comparison between models of same initial mass and same current age shows us that the turbulent diffusion coefficient has a negligible impact on the current mass of the model and has only a small impact on the current radius and internal stellar structure constant of the model. This behaviour is not surprising given that the star is very young and, hence, the turbulent mixing occurring in its interior did not act for a long enough time to produce important changes to both the radius and the internal stellar structure constant.
Assuming that the primary model with M_init=25 M_⊙ and D_T=2× 10^7 cm^2 s^-1 and the secondary model with M_init=21 M_⊙ and D_T=2× 10^7 cm^2 s^-1, both at ages 2 Myr, are representative of the stars, we infer evolutionary masses M_ev,P=24.8±1.0 M_⊙ and M_ev,S=20.9±1.0 M_⊙, where the subscript P and S stand for the primary and secondary stars, respectively, evolutionary radii R_ev,P=7.0^+0.5_-0.4 R_⊙ and R_ev,S=6.2^+0.4_-0.3 R_⊙, and internal stellar structure constants corrected for the stellar rotation following <cit.> k_2,P= 1.20^+0.13_-0.16× 10^-2 and k_2,S= 1.26^+0.09_-0.12× 10^-2, where the angular rotation velocities Ω were computed using the projected rotational velocities derived in Sect. <ref> corrected for the inclination. The error bars include the differences coming from a difference of 1.0 M_⊙ in M_init, of 1×10^7 cm^2 s^-1 in D_T, and of 0.5 Myr in the stellar age. The evolutionary mass ratio of the binary amounts to 0.84^+0.08_-0.07, slightly smaller than but still within the error bars of the observational mass ratio. Combined with the minimum masses obtained in Sect. <ref> (see last column of Table <ref>), the evolutionary masses put a constraint on the orbital inclination: 22.1^∘≤ i ≤ 23.3^∘. This small value of the inclination indicates that eclipses are very unlikely to be seen in photometric observations of this binary system (see also Fig. <ref>).
We then computed theoretical values for the apsidal motion rate. We adopted models for the primary and secondary stars of the same age and combined all the possible pairs given in Table <ref>. The semi-major axis is computed through the Kepler's third law for the corresponding combination of primary and secondary masses whilst the rotational periods of the stars are computed using the projected rotational velocities derived in Sect. <ref> corrected for the inclination. The results are provided in Table <ref>: We adopted the models having an age of 2.0 Myr as our reference models and computed the error bars based on models of 1.5 and 2.5 Myr. All theoretical apsidal motion rates agree with the observational determination (see last column in Table <ref>) except those computed combining the pairs of models PM24DT2-SM20DT3 and PM24DT3-SM20DT3 that slightly underestimate the apsidal motion rate compared to the observational value. This confrontation between observational and theoretical apsidal motion rates allows us to confirm the inferred evolutionary masses and radii of the stars.
Finally, we computed the observational weighted-average mean of the internal structure constants of the stars, k_2,obs, as defined by Equations (18) and (19) in <cit.>, adopting an inclination of 22.7^∘± 0.6^∘ while all other parameters are taken from observational determinations. We obtained k_2,obs = 1.36^+0.44_-0.43× 10^-2, a value slightly larger but still compatible with the theoretical determinations for the two stars within the error bars.
§ CONCLUSION
We presented a new, in depth spectroscopic analysis of medium- and high-resolution spectra of the massive eccentric binary system HD 165052 and derived the first self-consistent orbital solution of all existing RV data, including those reported in the literature, accounting for the change of the longitude of periastron with time.
We applied our disentangling code based on the method of <cit.> to derive the RVs of the stars at each time of observations. Then, we applied the advanced disentangling method proposed by <cit.>, that allows the reconstruction of artefact-free individual spectra, to the spectroscopic observations to reconstruct the spectra of the components. These latter were analysed, for the first time, with the non-LTE model atmosphere code to derive fundamental stellar and wind parameters.
We performed the RV analysis of all data, including those coming from the literature, along three avenues: considering the primary RVs only, the secondary RVs only, and converting the primary and secondary RVs into primary-equivalent RVs. In all three cases, we obtained orbital solutions which were in agreement within their error bars. We adopted the equivalent RVs solution as the final solution and hence, concluded that the apsidal motion rate in the system amounts to (11.30^+0.64_-0.49)^∘ yr^-1. We conclude that our analysis of the spectroscopic observations of HD 165052 and the analysis of the RVs of the stars explicitly accounting for the apsidal motion allow us to derive a consistent measure of the apsidal motion rate in the binary. Our analysis of all available RV data also allowed us to determine more reliably the orbital parameters of the binary. Our values differ from those of <cit.>, <cit.>, and <cit.> mainly because we explicitly accounted for the apsidal motion in the RV analysis. Our results differ from those of <cit.> mainly due to the increased number of RV data available at the time of our study.
We computed dedicated stellar structure and evolution tracks with assuming the stellar effective temperatures and luminosities obtained as part of the analysis, and an age of 2.0± 0.5 Myr for the binary. We derived evolutionary masses M_ev,P=24.8±1.0 M_⊙ and M_ev,S=20.9±1.0 M_⊙ and evolutionary radii R_ev,P=7.0^+0.5_-0.4 R_⊙ and R_ev,S=6.2^+0.4_-0.3 R_⊙ for the primary and secondary stars, respectively. Through the confrontation with the minimum stellar masses, we constrained the orbital inclination: 22.1^∘≤ i ≤ 23.3^∘. We computed theoretical apsidal motion rates adopting two stellar models of the same age and observed that these were in agreement with the observational apsidal motion rate, therefore enforcing the inferred values of the evolutionary stellar masses and radii, and putting some constraints on the density stratification inside the stars through the internal stellar structure constants.
Whilst our results exclude the possibility of photometric eclipses, it would nevertheless be worth to acquire high-precision space-borne photometry to look for low-level photometric variability due to a phase-dependent tidal distortion of the stars and/or tidally-induced pulsations <cit.>. Adopting our best estimates of the stellar parameters, we used the Nightfall code to simulate synthetic lightcurves of HD 165052 for different values of the orbital inclination between 17.5^∘ and 27.5^∘ (see Fig. <ref>). In all cases, we found that the lightcurve is dominated by the so-called heartbeat variations due to the orbital eccentricity rather than by ellipsoidal variations. For the most likely inclination near 22.5^∘, we expect peak-to-peak amplitudes of about 0.01 mag which are certainly within reach of sensitive space-borne photometry. We inspected both ASAS and Hipparcos photometric data. No significative variation is observed for the ASAS lightcurve and the error bars on the data are larger than the expected variations. Whilst the Hipparcos data have lower error bars than the ASAS data, the errors remain quite large and the data do not sample the most interesting parts of the orbit, namely the phases close to periastron passage. Unfortunately, there exist currently no other high-precision space-borne photometric data. Hence, the existing data cannot be used to study the light curve of this system. Whereas heartbeat variations could help confirming the estimate of the orbital inclination that we have obtained, the detection of pulsations would offer the possibility to gain further insight into the internal structure of the stars that would offer a powerful tool for comparison with the models that we have tested here.
§ ACKNOWLEDGEMENTS
S. Rosu acknowledges support from the Fonds de la Recherche Scientifique (F.R.S.- FNRS, Belgium). We thank Dr John Hillier for making his code CMFGEN publicly available. This research uses optical spectra collected with the TIGRE telescope (La Luz, Mexico). TIGRE is a collaboration of Hamburger Sternwarte, the Universities of Hamburg, Guanajuato, and Liège. The authors thank the referee for his/her suggestions and comments towards the improvement of the manuscript.
§ DATA AVAILABILITY
The ESO and CFHT data used in this study are available from the corresponding archives, whilst the TIGRE spectra can be made available upon reasonable request.
99
[Arias et al.(2002)]arias02
Arias, J. I., Morrell, N. I., Barbá, R. H., et al. 2002, , 333, 202
[Asplund et al.(2009)]asplund09
Asplund, M., Grevesse, N., Sauval, A. J., & Scott, P. 2009, , 47, 481
[Bailer-Jones et al.(2021)]bailer21
Bailer-Jones, C. A. L., Rybizki, J., Fouesneau, M., Demleitner, G., & Andrae, R. 2021, , 161, 147
[Böhm-Vitense et al.(1984)]boehm84
Böhm-Vitense, E., Hodge, P., & Boggs, D. 1984, , 287, 825
[Brott et al.(2011)]brott11
Brott, I., de Mink, S. E., Cantiello, M., et al. 2011, , 530, A115
[Claret(1999)]claret99
Claret, A. 1999, , 350, 56
[Claret & Giménez(2010)]claret10
Claret, A., & Giménez, A. 2010, , 519, A57
[Claret et al.(2021)]claret21
Claret, A., Giménez, A., Baroch, A., et al. 2021, , 654, A17
[Claret & Torres(2019)]claret19
Claret, A., & Torres, G. 2019, , 876, 134
[Conti(1974)]conti74
Conti, P. S. 1974, , 187, 539
[Conti & Alschuler(1971)]Conti71
Conti, P. S., & Alschuler, W. R. 1971, , 170, 325
[Conti & Ebbets(1977)]conti77
Conti, P. S., & Ebbets, D. 1977, , 213, 438
[Damiani et al.(2004)]damiani04
Damiani, F., Flaccomio, E., Micela, et al. 2004, , 608, 781
[Dekker et al.(2000)]dekker00
Dekker, H., D'Odorico, S., Kaufer, A., Delabre, B., & Kotzlowski, H. 2000, Proceedings SPIE, 4008, 534
[Donati et al.(2003)]donati03
Donati, J.-F. 2003, ASP Conference Series, 307, 41
[Duchêne & Kraus(2013)]Duchene13
Duchêne, G., & Kraus, A. 2013, , 51, 269
[Ekström et al.(2012)]ekstrom12
Ekström, S., Georgy, C., Eggenberger, P., et al. 2012, , 537, A146
[Ferrero et al.(2013)]FER
Ferrero, G., Gamen, R., Benvenuto, O., & Fernández-Lajús, E. 2013, , 433, 1300
[Gaia Collaboration(2021)]EDR3
Gaia Collaboration, Brown, A. G. A., Vallenari, A., Prusti, T., et al. 2021, , 649, A1
[Giménez(1985)]gimenez85
Giménez, A. 1985, , 297, 405
[González & Levato(2006)]GL
González, J. F., & Levato, H. 2006, , 448, 283
[González-Pérez et al.(2022)]gonzalez22
González-Pérez, J. N., Mittag, M., Schmitt, J. H. M. M., et al. 2022, FrASS, 9, 912546
[Gray(2005)]gray05
Gray, D. F. 2005, The Observation and Analysis of Stellar Photospheres (Cambridge University Press)
[Gray(2008)]Gray08
Gray, D. F. 2008, The Observation and Analysis of Stellar Photospheres, 3rd edn. (Cambridge University Press)
[Hejlesen(1987)]Hejlesen
Hejlesen, P. M. 1987, , 69, 251
[Hillier & Miller(1998)]Hillier
Hillier, D. J., & Miller, D. L. 1998, , 496, 407
[Howarth et al.(1997)]howarth97
Howarth, I. D., Siebert, K. W., Hussain, G. A. J., & Prinja, R. K. 1997, , 284, 265
[Kaufer et al.(1999)]Kaufer
Kaufer, A., Stahl, O., Tubbesing, S., et al. 1999, The Messenger, 85, 8
[Kilambi(1977)]kilambi77
Kilambi, G. C. 1977, , 178, 423
[Kołaczek-Szymański et al.(2021)]Kolaczek21
Kołaczek-Szymański, P. A., Pigulski, A., Michalska, G., Moździerski, D., & Różański, T. 2021, , 647, A12
[Linder et al.(2007)]linder07
Linder, N., Rauw, G., Sana, H., De Becker, M., & Gosset, E. 2007, , 474, 193
[Marchenko et al.(1998)]marchenko98
Marchenko, S. V., Moffat, A. F. J., & Eenens, P. 1998, , 110, 1416
[Martins(2011)]Martins11
Martins, F. 2011, Bulletin de la Société Royale des Sciences de Liège, 80, 29
[Martins & Hillier(2012)]Martins12
Martins, F., & Hillier, D. J. 2012, , 545, A95
[Martins & Plez(2006)]MP
Martins, F., & Plez, B. 2006, A&A, 457, 637
[Martins et al.(2005)]Martins05
Martins, F., Schaerer, D., & Hillier, D. J. 2005, , 436, 1049
[Mathys(1988)]Mathys88
Mathys, G. 1988, , 76, 427
[Mayne & Naylor(2008)]mayne08
Mayne, N. J., & Naylor, T. 2008, , 386, 261
[Mazeh(2008)]mazeh08
Mazeh, T. 2008, EAS Publications Series, 29, 1
[Morrison & Conti(1978)]morrison78
Morrison, N. D., & Conti, P. S. 1978, , 224, 558
[Muijres et al.(2012)]muijres12
Muijres, L. E., Vink, J. S., de Koter, A., Müller, P. E., & Langer, N. 2012, , 537, A37
[Palate & Rauw(2012)]palate12
Palate, M., & Rauw, G. 2012, , 537, A119
[Plaskett(1924)]plaskett24
Plaskett, J. S. 1924, PDAO, 2, 287
[Penny(1996)]penny96
Penny, L. R. 1996, PhD thesis, Georgia State University
[Prisinzano et al.(2005)]prisinzano05
Prisinzano, L., Damiani, F., Micela, G., & Sciortino, S. 2005, , 430, 941
[Quintero et al.(2020)]quintero20
Quintero, E. A., Eenens, P., & Rauw, G. 2020, Astronomische Nachrichten, 341, 628
[Rosu et al.(2020a)]rosu20a
Rosu, S., Noels, A., Dupret, M.-A., et al. 2020a, , 642, A221
[Rosu et al.(2020b)]rosu20b
Rosu, S., Rauw, G., Conroy, K. E., et al. 2020b, , 635, A145
[Rosu et al.(2022a)]rosu22a
Rosu, S., Rauw, G., Farnir, M., Dupret, M.-A., & Noels, A. 2022a, , 660, A120
[Rosu et al.(2022b)]rosu22b
Rosu, S., Rauw, G., Nazé, Y., Gosset, E., & Sterken, C. 2022b, , 664, A98
[Sagar & Joshi(1978)]sagar78
Sagar, R., & Joshi, U. C. 1978, , 184, 467
[Sana et al.(2012)]sana12
Sana, H., de Mink, S. E., de Koter, A., et al. 2012, Science, 337, 444
[Sana et al.(2003)]sana03
Sana, H., Hensberge, H., Rauw, G., & Gosset, E. 2003, , 405, 1063
[Scuflaire et al.(2008)]scuflaire08
Scuflaire, R., Théado, S., Montalbán, J., et al. 2008, , 316, 83
[Shakura(1985)]shakura
Shakura, N. I. 1985, Sov. Astron. Lett., 11, 224
[Simón-Díaz & Herrero(2007)]Simon-Diaz
Simón-Díaz, S., & Herrero, A. 2007, , 468, 1063
[Sterne(1939)]sterne
Sterne, T. E. 1939, , 99, 451
[Stickland et al.(1997)]stickland97
Stickland, D. J., Lloyd, C., & Koch, R. H. 1997, The Observatory, 117, 295
[Sung et al.(2000)]sung00
Sung, H., Chun, M., Bessell, M. 2000, , 120, 333
[Topasna et al.(2020)]topasna20
Topasna, G. A., Jones, R. H., & Kaltcheva, N. T. 2020, , 132, 044301
[van Altena & Jones(1972)]vanaltena72
van Altena, W. F., & Jones, B. F. 1972, , 20, 425
[Vernet et al.(2011)]vernet11
Vernet, J., Dekker, H., D'Odorico, S., et al. 2011, , 536, A105
[Walborn(1972)]walborn72
Walborn, N. R. 1972, , 77, 312
[Walborn(1973)]walborn73
Walborn, N. R. 1973, , 78, 1067
[Walborn & Fitzpatrick(1990)]walborn90
Walborn, N. R., & Fitzpatrick, E. L. 1990, , 102, 379
[Wellstein et al.(2001)]wellstein01
Wellstein, S., Langer, N., & Braun, H. 2001, , 369, 939
[Zacharias et al.(2013)]Zacharias13
Zacharias, N., Finch, C. T., Girard, T. M., et al. 2013, , 145, 44
§ SPECTRAL DISENTANGLING BASED ON THE METHOD DESCRIBED BY <CIT.>
This appendix provides the journal of the spectroscopic observations of HD 165052 (Table <ref>) and a detailed description of the spectral disentangling performed to derive the RVs of the stars.
For the disentangling, we used synthetic TLUSTY spectra with T_eff = 35 000 K, log g = 4.0, and v sin i_rot = 70 km s^-1 as cross-correlation templates in the determination of the RVs.
We performed the disentangling on 15 separate wavelength domains: B1[3810:4150] Å, B2[4150:4250] Å, B3[4300:4570] Å, B4[4600:5040] Å, B5[4600:4980] Å, B6[4800:5040] Å, B7[5380:5610] Å, B8[5380:5840] Å, B9[5790:5840] Å, B10[5380:5450] Å, B11[5380:5750] Å, and B12[5560:5840] Å in the blue domain, and R1[5860:5885] Å, R2[6500:6700] Å, and R3[7000:7100] Å in the red domain. As a first step, we only considered the FEROS, ESPaDOns, and TIGRE spectra as these spectra have a better resolution than the UVES and XSHOOTER spectra. We processed the wavelength domains (B1, B2, B3, B4, B7, B8, B9, R1, R2, and R3) to reproduce the individual spectra and simultaneously estimate the RVs of the stars. The TIGRE spectra cover all above-mentioned domains except for B8, and three FEROS spectra (taken at 2 451 304.7434, 2 451 304.7507, and 2 451 304.9309 HJD) do not cover the B2 domain due to instrumental artefacts in that wavelength domain. We averaged the RVs from the individual wavelength domains using weights corresponding to the number of strong lines present in these domains (five lines for B1, one for B2, three for B3, two for B4, two for B7, three for B8, two for B9, one for R1, one for R2, and one for R3). The resulting RVs of both stars are reported in Table <ref> together with their 1σ errors. We then performed the disentangling on the ten domains covered by the XSHOOTER and UVES spectra (B1, B2, B3, B5, B6, B10, B11, B12, R2, and R3) with the RVs of XSHOOTER and UVES observations free to vary, and the RVs of the FEROS, ESPaDOns, and TIGRE spectra fixed to their previously computed weighted averages. Two UVES observations (taken at 2 452 584.5002 and 2 452 584.5161 HJD) cover the B1, B2, B3, and B5 domains only, the other two UVES observations (taken at 2 452 584.5216 and 2 452 584.5234 HJD) cover the B6, B10, B11, and R2 domains only, four XSHOOTER observations (taken at 2 457 583.7901, 2 457 583.7916, 2 457 954.7756, and 2 457 954.7772 HJD) cover the B1, B2, B3, B5, B6, and B10 domains only, and the remaining five XSHOOTER observations (taken at 2 457 583.7902, 2 457 583.7916, 2 457 583.8401, 2 457 954.7757, and 2 457 954.7773 HJD) cover the B12, R2, and R3 domains only. We averaged the RVs from the individual wavelength domains using weights corresponding to the number of strong lines present in these domains (five lines for B1, one for B2, three for B3, two for B5, one for B6, one for B10, two for B11, two for B12, one for R2, and one for R3). The resulting RVs of both stars are reported in Table <ref> together with their 1σ errors.
§ JOURNAL OF THE RVS OF HD 165052 COMING FROM <CIT.>
This appendix provides the journal of the RVs of HD 165052 from <cit.>. Given that the authors do not provide any error bar on their mean RVs, we computed both the mean RVs and standard deviation based on their individual measurements given in their Table B2, which we provide in Table <ref>.
|
http://arxiv.org/abs/2303.06783v1
|
20230312235151
|
Asynchronous Decentralized Federated Lifelong Learning for Landmark Localization in Medical Imaging
|
[
"Guangyao Zheng",
"Michael A. Jacobs",
"Vladimir Braverman",
"Vishwa S. Parekh"
] |
cs.LG
|
[
"cs.LG",
"cs.CV",
"eess.IV"
] |
Asynchronous Decentralized Federated lifelong Learning
Zheng et al.
Department of Computer Science, Rice University, Houston, TX, USA Department Of Diagnostic And Interventional Imaging, McGovern Medical School, UTHealth Houston, Houston, TX The Russell H. Morgan Department of Radiology and Radiological Science, The Johns Hopkins University School of Medicine, Baltimore, MD the University of Maryland Medical Intelligent Imaging (UM2ii) Center
Department of Diagnostic Radiology and Nuclear Medicine
University of Maryland School of Medicine
Baltimore, MD
[email protected]
Asynchronous Decentralized Federated Lifelong Learning for Landmark Localization in Medical Imaging
Guangyao Zheng1 Michael A. Jacobs2,3 Vladimir Braverman1 Vishwa S. Parekh3,4
March 30, 2023
===================================================================================================
Federated learning is a recent development in the machine learning area that allows a system of devices to train on one or more tasks without sharing their data to a single location or device. However, this framework still requires a centralized global model to consolidate individual models into one, and the devices train synchronously, which both can be potential bottlenecks for using federated learning. In this paper, we propose a novel method of asynchronous decentralized federated lifelong learning (ADFLL) method that inherits the merits of federated learning and can train on multiple tasks simultaneously without the need for a central node or synchronous training. Thus, overcoming the potential drawbacks of conventional federated learning. We demonstrate excellent performance on the brain tumor segmentation (BRATS) dataset for localizing the left ventricle on multiple image sequences and image orientation. Our framework allows agents to achieve the best performance with a mean distance error of 7.81, better than the conventional all-knowing agent's mean distance error of 11.78, and significantly (p=0.01) better than a conventional lifelong learning agent with a distance error of 15.17 after eight rounds of training. In addition, all ADFLL agents have comparable or better performance than a conventional LL agent. In conclusion, we developed an ADFLL framework with excellent performance and speed-up compared to conventional RL agents.
§ INTRODUCTION
Medical imaging, MRI (Magnetic Resonance Imaging), PET (Positron Emission Tomography), CT (Computerized Tomography), X-ray, and Ultrasound, play a critical role in the diagnosis, prognosis, and preventative care of patients. The use of machine learning methods in medical imaging, such as classification, segmentation, noise reduction, and landmark localization, has been used in different completing complicated environments and settings <cit.>. However, these methods are usually done on single tasks, without the ability to generalize to other tasks. They often require a full dataset on a device for training, which may cause privacy concerns about patient data and computational constraints for the device specifications <cit.>.
To address these challenges, Federated Learning (FL) has emerged as a promising approach that enables multiple agents to collaboratively train a model without sharing their data <cit.>. A federated learning system aims to protect data privacy and reduce computational costs by distributing the computation to multiple agents to train the model on their local data and sharing only the model updates with a central server. Federated learning implementations have shown promising results in various medical applications <cit.>. However, federated learning frameworks often rely on synchronized learning schedules, meaning all participating agents start training at the same time. They also require agents to have the same architecture in order for the central server to aggregate the model weights. Data and agent heterogeneity influence the training speed which greatly reduces the efficiency and challenges the robustness of these approaches <cit.>. Additionally, Federated learning approaches cannot perform Lifelong Learning (LL), which is an important aspect of machine learning applied to medical imaging. Works have shown the ability to improve accuracy, have excellent performance on multiple tasks, and generalize <cit.>. With medical imaging tasks involving constant and rapid altering in imaging environments, such as new imaging sequences or abnormal patient conditions, a federated learning framework that is trained in an older environment may not perform well when evaluated in an unseen environment. One way to address this issue is to train the model again on the new dataset. However, new environment data can potentially be scarce, and this approach may lead to catastrophic forgetting, where the model loses its ability to operate effectively in the older environment. Federated lifelong learning implementation such as Liu et. al. exist <cit.>, but it is limited applied to robotics, and the synchronous and centralized nature still remains an issue.
To address all the limitations mentioned above, we propose an asynchronous decentralized federated lifelong learning (ADFLL) approach to landmark localization in medical imaging. This framework leverages Federated learning's ability to protect data privacy and reduce computational constraints, while also permitting data and agent heterogeneity to be in the system. This framework does not require a central node, and can together lifelong learn multiple tasks without catastrophic forgetting. We provide a flexible, efficient, and robust framework that can be deployed in real-world applications. This paper presents experimental results demonstrating the efficacy of our framework on the 2017 brain tumor segmentation (BraTS) dataset consisting of 8 different image environments and imaging sequences, highlighting its potential to revolutionize landmark localization in the medical imaging field while also maintaining data privacy and reducing computational costs.
§ METHOD
§.§ Deep Reinforcement Learning
We created a deep reinforcement learning framework that utilizes the deep Q-network (DQN) algorithm, which is depicted in Figure <ref>. The 3D DQN model we used in this paper was adapted from existing works <cit.>. The environment was represented by a 3D imaging volume with x, y, and z dimensions. The agent was represented by a 3-dimensional bounding box with six possible actions: moving in the positive or negative in the x, y, or z axis. The state was defined by the current location (or a chain of locations) of the agent, each represented by a 3-dimensional bounding box. The reward was calculated by the change in distance to the target landmark location before and after the agent takes an action. The agent's exploration within the environment generated state-action-reward-resulting state [s,a,r,s'] tuples, which were recorded in the experience replay buffer (ERB) over multiple episodes.
§.§ Lifelong Learning
We implemented lifelong learning using selective experience replay <cit.>. The goal of selective experience replay is to avoid catastrophic forgetting by focusing on selected experiences from previous tasks. Additionally, this technique is agnostic to the model being used and enables the sharing of experiences across different models. To achieve lifelong learning, we utilized a selective experience replay buffer that collects a sequence of experience samples throughout the model's training process. In order to learn a generalized representation of both current and past tasks, the model selects a batch of experiences from both the ERB of its current task and from the replay buffers of previous tasks during training.
§.§ Asynchronous Decentralized Federated Lifelong Learning
We developed the Asynchronous Decentralized Federated lifelong Learning (ADFLL) by constructing a network of lifelong deep reinforcement learning agents. Each agent shares their database of personal experiences with each other to facilitate learning from each other experiences. More specifically, once an agent finishes training with a dataset and an ERB, the resulting experience from the training is shared with the network. Furthermore, we modified the training setup for each agent to sample experiences from the current dataset ERB, the agent's personal experiences and the incoming experiences from other agents, as shown in Fig. <ref>. As a result, every agent in the network can learn from each other's experiences, thereby integrating federated lifelong learning capability.
In a naive setup, every agent would communicate their experiences with every other agent in the network. However, such an all-to-all communication setup is highly inefficient and not scalable as it would require a large amount of communication bandwidth. To address this issue, we implemented a homogeneous distributed database system as illustrated in Fig. <ref>. As shown in Fig. <ref>, our network consists of a predefined set of hub nodes that act as communication hubs for spatially adjacent nodes in the network. Subsequently, every agent in the network exclusively communicates with their nearest hub node at the end of each personal training round. The experience sharing between an agent and a hub node is bidirectional. Finally, every hub node maintains a shared experience database on the network as shown in Fig. <ref>. The hub nodes periodically communicate with each other to synchronize their databases. The agents in the system are not required to have standardized training speed or start training at the same time. The hub will regulate and preserve the experiences in the system and agents in the system can train on different tasks. An example of this system is demonstrated in Fig. <ref>.
The advantage of our system setup is that it is robust against node or hub failures. When a node fails, the only loss is the training information from that node, and when a hub fails, the loss is the ERBs it contains but other hubs do not. Moreover, the communication complexity is linear with respect to the number of nodes, each node only needs to communicate with its respective hub, and hubs sync periodically. Compared to other federated learning systems, centralized or not, they either are prone to system-wide failure caused by a node failure, or sacrifice communication complexity to prevent system-wide failures.
§ EXPERIMENT AND RESULT
§.§ Dataset and Experimental Setup
§.§.§ Clinical Data
For evaluation of our ADFLL framework, we utilized the 2017 brain tumor segmentation (BraTS) dataset <cit.>. This dataset consisted of 285 patients and included pre-contrast T1-weight, post-contrast T1-weighted, T2-weighted, and Fluid Attenuated Inversion Recovery (FLAIR) sequences in the axial orientation. From this dataset, we randomly sampled a subset of 100 patients to use as our experiment dataset. 60 patients have high-grade glioma (HGG) and 40 patients have low-grade glioma (LGG). We split the 100 patients into two parts 80:20, 80 were used for training and 20 for evaluation, with the training set consisting of 48 HGG and 32 LGG tumors, and the test set consisting of 12 HGG and 8 LGG tumors. We reconstructed the dataset to include all three imaging orientations (coronal, sagittal, and axial). As a result, we obtained a total of twenty-four imaging environments with combinations of two pathologies, 4 imaging sequences, and 3 image orientations. The top left ventricle was chosen as the task for this experiment, and 8 task-environment pairs were sampled as shown in Fig. <ref>.
§.§.§ Experimental Setup
Every agent implements a multi-task lifelong reinforcement learning algorithm for localizing landmarks across the human anatomy. The federated lifelong learning component is implemented by integrating experience replay buffers from previous experiences shared by agents across the network for training. There are four agents in this experimental system: we implemented two on an NVIDIA DGX-1 each with an NVIDIA V100 and two on Google Cloud each with an NVIDIA T4. The topology of the system is shown in Fig. <ref>. The two agents A1, and A2 on Google Cloud have their individual hubs H1 and H2. The two agents A3, and A4 on the DGX-1 are connected to the third hub H3 with a total of three hubs for 4 agents. Since the GPUs on DGX-1 are much more powerful than the GPUs on Google Cloud, A3 and A4 will run significantly faster than A1 and A2. We also implemented asynchronous learning, meaning when the agent finishes training on a task, as long as there are new ERBs that they have not learned from, they will start a new round and learn from those ERBs. Each agent will also get a different image training dataset each round. This process is continued until all four agents complete three rounds of training, guaranteeing all 8 sampled tasks for this experiment will be learned by the system.
All-knowing agent and partially-knowing agent: To better compare our framework with non-lifelong learning ones, we ran two different deep reinforcement learning agents. Agent X is the all-knowing agent, with all 8 datasets available to it at the start of training, then it trained on them for one round. Agent Y is the partially-knowing agent, which only has access to one dataset and can therefore only train for one round.
Traditional lifelong deep reinforcement learning agent:
To better compare our framework with the traditional lifelong learning framework, we ran an Agent M that has access to the dataset sequentially and is therefore trained for eight rounds to account for learning eight different environments.
Experimental Metric:
The performance metric was set as the terminal Euclidean distance between the agent's prediction and the target landmark. We performed paired t-tests to compare the performance of the decentralized federated lifelong learning framework with the traditional lifelong learning framework and all-knowing deep reinforcement learning agent and partial-knowing deep reinforcement learning agent. The p-value for statistical significance was set to p ≤ 0.05.
§.§ Results
We conducted an experiment based on 8 sub-task-environment pairs: Axial HGG t1ce, Sagittal HGG t1ce, Coronal HGG t1ce, Axial HGG flair, Sagittal LGG flair, Coronal LGG flair, Coronal LGG t2, Sagittal LGG t1. We sampled one image from each task to test the performance of our model and baseline models. Each round the four federated lifelong learning will receive a new task. They will begin the next round when there is also ERB to train from. Since the agents' training speeds are very different, A1 and A2 will finish their tasks slower, allowing them to learn from more ERBs at once. As shown in <ref>, after three rounds of training, A2 was able to achieve a mean distance error of 7.81 on all 8 tasks, compared to the all-knowing agent's 11.78 (p=0.22), but significantly lower compared to partially-knowing agent's 54.58 (p<0.001), and the traditional lifelong learning agent's 15.17 (p=0.01) after eight rounds of training. Note that the all-knowing agent and the partially-knowing agent only train for 1 round for this experiment because they have no lifelong learning capability.
Compared to the All-knowing agent shown in <ref>, our framework is able to achieve an excellent performance boost. Compared to the traditional lifelong learning agent, our framework is able to achieve a significant performance boost and an outstanding speedup.
§ CONCLUSION
Previous works have explored the application of federated learning to the medical field <cit.>. They have shown decentralized federated learning system setups, each demonstrating good performance in their experiment tasks. But because of their system topology implementation, one node failure can potentially collapse the entire system. Moreover, the learning tasks examined were limited, binary classifications or MNIST dataset classification, resulting in limited potential applications. Additionally, their implementation offers a synchronous training procedure, which means in a real application scenario, users of their framework will have to coordinate the training process.
Asynchronous federated learning has also been explored in other areas <cit.>. They offer the ability to deal with nodes with different computational power but lack the decentralization that allows the system to be more flexible.
Asynchronous decentralized federated learning has also been explored in other areas <cit.>. However, they are still limited in their system implementation. The cost of removing a central node is a quadratic complexity communication scheme in that every node communicates with every node.
We have demonstrated a privacy-aware, asynchronous decentralized federated learning system with robust and efficient system topology. We have demonstrated excellent performance on landmark localization tasks on the BraTS image dataset. Our framework also performs better than all-knowing deep reinforcement learning agents and traditional lifelong learning agents. In the future, we will optimize our approach, expand the system, and conduct more experiments.
§.§.§ Acknowledgements
***
splncs04
|
http://arxiv.org/abs/2303.07030v1
|
20230313114548
|
$\nabla$SD: Differentiable Programming for Sparse Tensors
|
[
"Amir Shaikhha",
"Mathieu Huot",
"Shideh Hashemian"
] |
cs.PL
|
[
"cs.PL",
"cs.LG",
"cs.MS"
] |
[email protected]
University of Edinburgh
United Kingdom
[email protected]
University of Oxford
United Kingdom
[email protected]
Amirkabir University of Technology
Iran
Sparse tensors are prevalent in many data-intensive applications, yet existing differentiable programming frameworks are tailored towards dense tensors.
This presents a significant challenge for efficiently computing gradients through sparse tensor operations, as their irregular sparsity patterns can result in substantial memory and computational overheads.
In this work, we introduce a novel framework that enables the efficient and automatic differentiation of sparse tensors, addressing this fundamental issue. Our experiments demonstrate the effectiveness of the proposed framework in terms of performance and scalability, outperforming state-of-the-art frameworks across a range of synthetic and real-world datasets. Our approach offers a promising direction for enabling efficient and scalable differentiable programming with sparse tensors, which has significant implications for numerous applications in machine learning, natural language processing, and scientific computing.
: Differentiable Programming for Sparse Tensors
Shideh Hashemian
March 30, 2023
===============================================
§ INTRODUCTION
Sparse tensors are essential in many scientific and engineering applications, such as natural language processing, computer vision, and graph analytics. Unlike dense tensors, which store all of their elements regardless of their value, sparse tensors only store non-zero values, resulting in significant memory savings and computational efficiency. Sparse tensors also enable efficient representation and manipulation of high-dimensional data structures, which are often encountered in modern machine learning and scientific computing, such as sparse tensors representing the frequency of words in a document or corpus in natural language processing, adjacency matrices of large and sparse graphs in network/relational analysis, or sparse user-item interaction matrices for collaborative filtering in recommender systems.
This has inspired recent interest in developing better support for sparse tensors <cit.>.
Automatic differentiation (AD) is a fundamental technique in modern machine learning and scientific computing that enables efficient computation of the gradient of a function. This is crucial for optimization, parameter estimation, and many other applications in which gradient-based optimization methods are employed. While AD tools for dense tensors are abundant and well-established, the lack of efficient AD tools for sparse tensors hinders the wider adoption of these techniques and represents a major research challenge in this field. Libraries such as TensorFlow, PyTorch, and JAX provide efficient and scalable implementations of gradient computation for dense tensor operations, but their support for sparse operations is limited <cit.>. As a result, there have been various efforts to manually provide differentiation for particular sparse tensor kernels <cit.>.
AD for sparse tensor algebra is more challenging than for dense tensor algebra for several reasons. Firstly, the structure of sparse tensors is more complex than that of dense tensors, and their sparsity patterns are often irregular and vary across different operations. This can make it challenging to efficiently propagate gradients through the computation graph and to identify which elements of the sparse tensor are relevant for the gradient computation. Secondly, sparse tensor operations often require the use of specialized data structures and algorithms, such as compressed sparse row (CSR) or compressed sparse column (CSC) formats, which are not natively supported by most AD-enabled frameworks or have incomplete AD rules.
This paper presents , a novel differentiable programming framework that supports the automatic differentiation of arbitrary sparse computations. To the best of our knowledge, is the first framework that provides this capability.
As opposed to the existing frameworks that offer AD support for a limited number of sparse kernels <cit.>, allows the AD of an arbitrary sparse computation expressible in tensor algebra.
The key insight is to perform differentiation over a logical representation of a sparse tensor.
This means that there is a clear separation of concerns between the semantics of differentiation over a program on the one hand, and optimizations and data layout representations on the other (cf. Figure <ref>). To see the simple example of the dot product of two vectors, see Example 1 (cont.) for its logical form before differentiation in <ref>, after differentiation in <ref>, its physical coordinate format (COO) representation in <ref>, and in <ref> for the generated code.
The physical representation of sparse tensors (e.g., COO/CSR/CSC) involves multiple arrays storing a compressed representation of the matrix (cf. Figure <ref>). The computations over such representations involve imperative nested loops over these arrays. However, our logical representation uses a nested dictionary, where sparse computations are expressed functionally as nested summations over them. The logical representation can be later fused with a concrete physical storage format (cf. Section <ref>).
In more detail, the contributions of this paper are as follows:
* We present , the first framework with systematic support for the automatic differentiation of sparse tensors. is based on <cit.>, a recently introduced intermediate language that can express sparse tensor workloads by separating the tensor computations from the storage specifications (Section <ref>).
* We introduce a novel tensorized forward-mode AD that computes the gradients in a batch (Section <ref>). Our automatic differentiation transform is over the logical part of the language, which we call Logical , without worrying about the physical storage formats.
* The differentiated program is then optimized by leveraging the following AD-agnostic transformations: (1) sparsity-aware rewrite rules, (2) composing with the physical storage formats, and (3) algebraic rewrite rules applied in a cost-based manner using equality saturation <cit.> (Section <ref>). In addition, performs low-level transformations for removing unnecessary intermediate tensors appearing in nested loops before generating low-level C++ code.
* We show the correctness of our approach (Section <ref>). That is, AD is a well-typed transformation, computes derivatives of programs, and our optimizations are sound with respect to our denotational semantics.
* We experimentally validate the effectiveness of in comparison with the state-of-the-art frameworks (Section <ref>). We demonstrate that scales the gradient computation to large matrices with many zero elements over both real-world and synthetic datasets.
§ BACKGROUND
§.§ Automatic Differentiation
Automatic differentiation (AD) is a powerful and widely used technique in machine learning and scientific computing that enables efficient computation of the gradient of a function. The gradient is a crucial quantity in many optimization, parameter estimation, and machine learning algorithms, and its computation is often a bottleneck in the training process. AD provides a computationally efficient and accurate way of computing the gradient by breaking down a function into a series of elementary operations and applying the chain rule to compute the derivatives of each operation. The result is an exact gradient that is computed with a similar computational cost as the original function, with no need for approximate methods such as finite differences, or manual derivation.
Forward Mode
One method of computing the gradient of a function is the forward-mode AD which involves computing the derivatives of each operation in the forward direction through the computational graph. The method starts with the input variables and propagates the values and their derivatives through the graph, one operation at a time, until the output variable is reached. At each operation, the derivative of the output variable with respect to each input variable is computed using the chain rule, and these derivatives are stored in a computational graph that can be used to compute the gradient of the function.
Example 1 - Vector Dot Product Consider the following function:
f([x_1, x_2], [y_1, y_2]) = x_1y_1 + x_2y_2
which takes two pairs of input variables x_1, x_2 and y_1, y_2 and computes the dot product of the vectors x = [x_1, x_2] and y = [y_1, y_2]. To compute the gradient of f with respect to the inputs using forward-mode AD, we start by converting the program into ANF <cit.>:
f([x_1, x_2], [y_1, y_2])=
t_1 = x_1y_1
t_2 = x_2y_2
t_3 = t_1 + t_2
t_3
The forward-mode AD lifts every variable to a dual number by associating a tangent variable v' to each input and intermediate variable v. Then, each intermediate tangent variable is computed by following the chain rule. In the previous example, the function f is transformed as follows:
f'([x_1, x_2], [y_1, y_2], [x_1', x_2'], [y_1', y_2'])=
t_1 = x_1y_1
t_1' = x_1'y_1 + x_1y_1'
t_2 = x_2y_2
t_2' = x_2'y_2 + x_2y_2'
t_3 = t_1 + t_2
t_3' = t_1' + t_2'
t_3'
To compute the partial derivative of f with respect to each input we need to set the corresponding tangent variable to 1 and the other input tangent variables to 0. For example, the gradient of f with respect to the first vector is computed by the following partial derivative computations:
f'([a_1,a_2],[b_1,b_2],[1,0],[0,0]) →^* b_1 = ∂ f/∂ x_1(a_1,a_2,b_1,b_2)
f'([a_1,a_2],[b_1,b_2],[0,1],[0,0]) →^* b_2 = ∂ f/∂ x_2(a_1,a_2,b_1,b_2)
Reverse-mode AD
Forward mode AD is computationally expensive for the derivative computation of scalar-valued functions with tensor inputs, which among other use cases appear in training machine learning models by optimizing an objective function. This is due to the fact that when differentiating a program representing a function ℝ^n→ℝ, as is often the case in these contexts, one needs n runs of the program transformed by forward-mode to obtain the whole gradient.
The reverse-mode technique, which computes the gradient of such functions in one run, is then more appropriate, and is massively used in deep learning frameworks <cit.>. There has been recent interest on bridging the gap between theoretical correctness guarantees and more practical, efficient implementations with complexity guarantees <cit.>.
Example 1 (cont.) Consider a generalization of the previous function, where · denotes the dot product of two vectors:
f(V_1, V_2) = V_1 · V_2
If each input vector has m elements, then the cost of forward-mode AD is O(m^2) as it requires m forward passes, each costing O(m). However, reverse-mode AD can compute the gradient by one forward pass to compute the primal values and one reverse pass to compute the gradient values, resulting in an O(m) overall complexity.
Vector Forward-mode AD
Inspired by the use cases that require the computation of the full Jacobian matrix <cit.>, there have been efforts on batch computations of forward-mode AD <cit.>. It has been experimentally demonstrated that by leveraging rewrite rules, one can even recover the asymptotic performance of reverse-mode AD on vectorized forward-mode AD <cit.>.
§.§ Sparse tensors and semi-ring dictionaries
Sparse Tensors Sparse tensors are a type of data structure that is commonly used to represent high-dimensional data that have a majority of zero values. Sparse tensors have a compact representation that only stores the non-zero values and their corresponding indices, which makes them more memory-efficient than dense tensors for large-scale data. Sparse tensors are used in many domains, including natural language processing, computer vision, and scientific computing. For example, in natural language processing, sparse tensors can be used to represent text data as a bag-of-words or term frequency-inverse document frequency (TF-IDF) matrix, where the rows correspond to documents and the columns correspond to words (Figure <ref>).
Sparse tensors can be manipulated using a variety of specialized algorithms and data structures, such as compressed sparse row (CSR) and compressed sparse column (CSC) formats, which enable efficient matrix-vector multiplication and other operations. However, the irregular sparsity patterns of sparse tensors pose significant challenges for automatic differentiation.
Example 1 (cont.)
In the previous example, if the majority of the elements of the input vectors of sizxe m are zeros (the number of non-zero elements, denoted by nnz, is such that nnz<<m), one can use the CSR representation shown in Figure <ref>. In this representation, the array !pos! is a compressed representation of rows, whereas !idx! and !val! show the columns and values of non-zero elements. For example, !pos(0)=0,pos(1)=7! depicts that the indices 0 to 6 of !idx!/!val! correspond to the column/value of the elements in the row=0 of the matrix, and 7 to 14 for the positions of the row=1. However, existing linear algebra frameworks do not support gradients over this representation. Thus, rather than computing the gradient in O(nnz), they compute it over the dense representation in O(m).
Semi-ring Dictionaries Semi-ring dictionaries are data structures that subsume sets, multisets, and dense/sparse tensors <cit.>. A semi-ring is a set with two binary operations that satisfy certain axioms, such as associativity, distributivity, and commutativity. For example, the set of non-negative integers with addition and multiplication forms a semi-ring, and the set of Booleans with logical ∨ and ∧ forms another semi-ring. Semi-ring dictionaries are designed to represent sparse tensors as key-value pairs. In sparse vectors, the keys correspond to the vector indices and the values correspond to the non-zero elements. In sparse matrices, the keys correspond to the row indices and the values correspond to the sparse vector associated with that row. The semi-ring operations are then defined in terms of the corresponding operations on the values, such as addition or multiplication. The multiplication operator for semi-ring dictionaries has a semantics of tensor outer product, as can be observed in the next example.
Example 2 - Scalar-Vector Product Consider the scalar-vector product between a scalar value !s! and a vector value !V! represented using a semi-ring dictionary. The equivalent semi-ring dictionary representation is !s * V!, where !*! has the semantics of tensor outer product.
SDQL <cit.> is a functional language for querying against semi-ring dictionaries. SDQL is expressive enough to capture database queries and linear algebra expressions; this makes it appropriate as an intermediate language for hybrid database and machine learning workloads. SDQL provides the following constructs for manipulating semi-ring dictionaries:
* !dict(k)! accesses the value associated with the key !k! in !dict!, and if the key does not exist, it returns the addition identity of semi-ring (0 in the case of real and natural numbers).
* !k -> v! constructs a dictionary with a single key-value pair of !k! and !v!.
* !sum(<k,v> in dict) f(k,v)! folds over each key-value pair of !dict! and computes the summation of !f(k,v)! starting from the addition identity of the corresponding semi-ring.
Example 1 (cont.) The equivalent expression for V1 · V2 can be one of the following two:
sum(<i, a> in V1) a * V2(i)
sum(<i, a> in V2) V1(i) * a
The preferred choice depends on the number of non-zero elements of !V1! and !V2!. If !V1! (resp. !V2!) has fewer non-zero elements, the left (resp. right) variant is more efficient. Otherwise, if both have the same number of non-zero elements (e.g., both are dense), both variants have the same performance.
<cit.> is a dialect of SDQL tailored for sparse tensor processing; it restricts SDQL to the types required for sparse tensors while extending it with constructs required for different sparse storage formats (e.g., CSR, CSC). The following constructs are central to :
* !(st:en)! specifies a dense array holding the range of numbers from !st! to !en! (excluding).
* !arr(st:en)! specifies the sub-array of !arr! ranging from !st! to !en! (excluding).
* Additional annotations for guiding rewrite rules such <cit.>.
§ LANGUAGES
In this section, we give an overview of the languages used in .
We divide in two. The smaller fragment, Logical , on which AD will be performed, and the full fragment, Physical , which augments the logical subset of the language with the constructs for expressing the different sparse storage formats. The grammar and most important typing rules of these languages are shown in Figure <ref>.
Logical Initially, the program is expressed in a subset of that is sufficient for expressing tensor programs at the logical level, i.e., without worrying about the storage format.
Thus, at this stage, we do not require the support for dense arrays. Furthermore, there is no need for expressing tuples. Nevertheless, for convenience, we use tupled let-binding as a syntactic sugar for multiple let bindings.
Logical is expressive enough to capture Einstein summations <cit.>. For example, the matrix-matrix product for two matrices !M1! and !M2! (both represented as nested dictionaries) is expressed as:
sum(<i,row> in M1) i ->
sum(<j, v1> in row)
sum(<k, v2> in M2(j)) k ->
v1 * v2
However, the expressiveness goes beyond Einstein summations. As an example, !map! of function !f! over the values of a tensor !e! is expressed as !sum(<k,v> in e) k -> f(v) !.
Physical The storage specifications require dense-array-related constructs such as range (!st:end!) and subarray (!arr(st:end)!). Thus, after combining the differentiated program with the storage specification, we need to include these constructs for the Physical . We go back to this intermediate language in Section <ref>. The next section focuses primarily on Logical and the differentiation rules over its constructs.
§ DIFFERENTIATION
In this section, we present the differentiation transformations applied to Logical expressions. First, for exposition purposes, we present a variant of traditional forward-mode AD (FAD).
Then, we show a tensorized FAD that not only subsumes the traditional FAD, but also computes gradients more efficiently.
Finally, we show the high-level API exposed to the programmers.
§.§ Scalar Forward-Mode Transformation
Traditional FAD uses dual numbers to compute the tangent (derivative) component along with the actual (original) computation. We refer to it as scalar FAD because for each scalar expression, it stores a scalar tangent component.
Similar to other FAD frameworks, precedes the differentiation transformation with an ANF conversion <cit.>.
This allows for sharing sub-expressions and avoids duplication of computations for non-unary constructs such as multiplication.
Logical does not allow function definitions nor higher-order functions; all functions need to be inlined <cit.>.
Scalar Constructs Figure <ref> shows the forward-mode transformation rules.
As opposed to existing functional AD systems, does not use explicit pair construction and projection for dealing with dual numbers.
Instead, the construct only computes the tangent part of differentiation and refers to the expressions in the ANF transformed program for primal components (cf. the rule for let binding).
This avoids the need to extend the target language of differentiation with pairing constructs. Furthermore, this makes the differentiation rules simpler. For every unary real operation !op!, we assume that the language has a unary real operation !op'! representing its derivative.
Finally, the differentiation for all discrete types (!int! and !bool!) is !0!.
Example 1 (cont.) Consider again the case of the dot-product of two unrolled vectors of size two initially used in Section <ref>. Applying differentiation over the ANF transformed program in is as follows:
ℱ
let t1 = x1*y1 in
let t2 = x2*y2 in
let t3 = t1+t2 in
t3
After applying the rules in Figure <ref>, we obtain the following program:
let <t1, t1'> = <x1*y1, x1*y1' + x1'*y1> in
let <t2, t2'> = <x2*y2, x2*y2' + x2'*y2> in
let <t3, t3'> = <t1+t2, t1'+t2'> in
t3'
Note that the let-binding constructs are syntactic sugar; there is no pair created (cf. Figure <ref>).
Tensor Constructs By choosing not to incorporate pairs in the language, we have eliminated the option of differentiating vectors as vectors of pairs (i.e., arrays of structs). Instead, an expression of type !tensor n! is differentiated as an expression with the same type. One of the interesting tensor-based differentiation rules is our rule for summation, where we need to access the corresponding element from the differentiated range, as we can observe in the following example.
Example 1 (cont.) Let us go back to the dot-product for two vectors !V1! and !V2!. The differentiation transformation is expressed as follows:
sum(<i,a> in V2) V1(i) * a
Applying differentiation rules results in the following program:
sum(<i,a> in V2)
let <i',a'> = <0,V2'(i)>
V1(i) * a' + V1'(i) * a
In order to compute the gradient of this function with respect to one of its vector inputs, say !V1!, we need to repeatedly set !V1'! into a one-hot vector that is !1! at index !j! and !0! everywhere else, and set !V2'! to be the zero vector.
This requires multiple rounds of running the forward-mode AD for different one-hot vectors, which is computationally expensive. Previous research <cit.> has shown how this can be optimized by wrapping the vector construction around the forward-mode AD and applying loop optimizations.
Example 2 (cont.) Consider the case of scalar-vector product, represented as !s * V! in .
Applying the scalar FAD rules on this program results in:
s * V' + s' * V
In the case of differentiation with respect to !V!, similar to the dot-product example, one needs to repeatedly pass all different one-hot vectors as !V'!.
However, the differentiation with respect to !s! can be done by setting !s'! to 1 and !V'! to !zero[tensor 1]!.
Next, we show an alternative differentiation transformation that enables native tensorized forward-mode AD.
§.§ Tensorized Forward-Mode Transformation
As tensors are first-class citizens in , one can directly express the differentiation with respect to tensor variables of type τ, represented by . This means that the derivative of an expression of type !tensor n! with respect to a tensor of type !tensor m!, will be a !tensor (n + m)!, which is the same as the outer tensor product type (cf. Figure <ref>, the rules for types).
Figure <ref> shows the rules for tensorized FAD.
They generalize the rules for scalar forward-mode AD, which one recovers by setting τ to be !real!. The key differences are in the rules for constant reals and multiplication. Rather than just returning a real-valued !0!, tensorized FAD returns the zero value of type τ represented as !zero[τ]!.
For multiplication, if τ is a tensor type with a non-zero order, the first term still computes the multiplication of !e1! and the differentiation of !e2!. However, the second term requires re-arranging the indices of the tensors. This complication can be avoided by only allowing for the multiplication of real numbers in the input program. This is achieved by applying multiplication normalization (cf. Section <ref>).
Example 1 (cont.) In our running example, tensorized FAD transformation is represented as
!sum(<i,a> in V2) V1(i) * a!.
By applying the rules in Figure <ref> we have:
sum(<i,a> in V2)
let <i',a'> = <0,V2'(i)>
V1(i) * a' + V1'(i) * a
As one can see, this program looks identical to the version generated by scalar FAD. The difference is in the type of !V1'! and !V2'!. In scalar FAD, their type is the same as !V1! and !V2!, i.e., !tensor 1!.
In tensorized FAD, their type is !tensor 2!. Thus, the multiplications in the last expression are now scalar-vector multiplications.
As opposed to scalar FAD, we need to assemble the zero and one-hot vectors of all iterations together; instead of passing them vector by vector, we pass them as an entire matrix in which each row represents one of the one-hot vectors. The definition of !onehot[tensor 1]! in Figure <ref> specifies how one can build such a matrix for variable !x!.
Example 3 Consider the case of computing the trace of the matrix !M!. The tensorized FAD over this expression in is represented as
!sum(<i,r> in M) r(i)!.
For each row !r! of matrix !M! at index !i!, we compute the summation of diagonal elements specified by !r(i)!. After our tensorized FAD transformation, we obtain the following program:
sum(<i,r> in M)
let <i',r'> = <0,M'(i)>
r'(i)
To compute the one-hot input for a matrix, we need to generalize the case of a vector. In the case of differentiating with respect to a vector (!tensor 1!), we were passing a matrix (!tensor 2!) for the one-hot inputs. Here, in the case of differentiating w.r.t. a matrix (!tensor 2!), we need to pass an order-4 tensor (!tensor 4!). The definition of !onehot[tensor 2]! can also be found in Figure <ref>.
|
http://arxiv.org/abs/2303.06780v1
|
20230312234200
|
Waring decompositions of special ternary forms with different Hilbert functions
|
[
"Elena Angelini",
"Luca Chiantini",
"Alessandro Oneto"
] |
math.AG
|
[
"math.AG",
"math.AC",
"Primary: 14C20, 14N07, Secondary: 13A02, 13C40, 14N05, 15A69"
] |
Waring decompositions with different Hilbert functions]Waring decompositions of special ternary forms
with different Hilbert functions
Dip. di Ingegneria dell'Informazione e Scienze Matematiche, U. di Siena, Italy
[email protected], [email protected]
Dip. di Mathematics, U. of Trento, Via Sommarive 14, 38123 Povo (Trento), Italy
[email protected]
The authors are members of the Italian GNSAGA-INDAM
[2020]Primary: 14C20, 14N07; Secondary: 13A02, 13C40, 14N05, 15A69
We prove the existence of ternary forms admitting apolar sets of points of cardinality equal to the Waring rank, but having different Hilbert function and different regularity. This is done exploiting liaison theory and Cayley-Bacharach properties for sets of points in the projective plane.
[
Alessandro Oneto
====================
§ INTRODUCTION
§.§ Waring decompositions
Let S = ⊕_d∈S_d = [x_0,…,x_n] be the standard graded polynomial ring in n variables with complex coefficients.
Given a degree-d homogeneous polynomial f ∈ S_d, a Waring decomposition of f is an expression as sum of d-th powers of linear forms, i.e.,
f = ∑_i=1^r ℓ_i^d, ℓ_i ∈ S_1.
The minimal length r of such a decomposition is the Waring rank, denoted (f).
The study of Waring decompositions has its roots in the XIX century thanks to the works of Sylvester <cit.>, Clebsch <cit.>, Richmond <cit.>, Palatini <cit.>, Terracini <cit.>, among many others. The question regained a lot of interest in the last decades. The celebrated theorem by Alexander and Hirschowitz in 1995 established the general Waring rank in any number of variables and degrees <cit.>. The attention to Waring decompositions has been motivated also by its connection to tensor decompositions; in this case, symmetric tensors. Indeed, tensor decompositions find a lot of uses in several applications, see for example <cit.>. The computation of most tensor decompositions is known to be an NP-hard problem and the same is conjectured fo symmetric tensors <cit.>. Therefore, a theoretical study of related algebraic and geometric structures can be useful to shed lights on them.
§.§ Apolar sets of points
Waring decompositions have a geometric interpretation in terms of Veronese varieties. Consider the Veronese embedding given by
ν_d : S_1 ⟶ S_d, [ℓ] ↦ [ℓ^d].
Given f ∈ S_d and a set of points A ⊂ S_1, we say that A is apolar to f if [f] ∈⟨ν_d(A) ⟩. If there is no subset A' ⊂ A such that [f] ∈⟨ν_d(A') ⟩ we say that A is non-redundant. If the cardinality of A equals the Waring rank of f we say that A computes (the rank of) f.
Any Waring decomposition of a polynomial f ∈ S_d has a geometric counterpart given by a set of points A ⊂ S_1 apolar to f, i.e., the equation (<ref>) is equivalent to say that [f] ∈⟨ν_d(A) ⟩ for A = {[ℓ_1],…,[ℓ_r]}⊂ S_1. This geometric interpretation allows us to define a notion of rank with respect to any algebraic variety X ⊂^N. I.e., the rank of any p ∈^N with respect to X is the minimal cardinality of a set of points A ⊂ X such that p ∈⟨ A ⟩.
A more algebraic way to relate Waring decompositions with sets of points is through apolarity theory. By Macaulay <cit.> (see also <cit.>), there is a one-to-one correspondence between artinian Gorenstein graded algebras with socle degree d and homogeneous polynomials of degree d. Let R = ⊕_d∈ R_d = [y_0,…,y_n] be a second polynomial ring and consider the apolar action of R over S by partial derivatives, i.e., for any g ∈ R_e, f ∈ S_d, we define g ∘ f := g(∂_0,…,∂_n)f ∈ S_d-e. Given f ∈ S_d, the apolar ideal of f is the annihilator of f with respect to the apolar action, i.e.,
(f) := {g ∈ R : g ∘ f = 0}⊂ R.
Macaulay's duality affirms that an artinian algebra A = R/J is Gorenstein of socle degree d if and only if J = (f) for some f ∈ R_d. The Apolarity Lemma, see <cit.>, affirms that Waring decompositions of a polynomial f ∈ S_d correspond to sets of points A ⊂ S_1 such that I(A) ⊂(f), i.e., the equation (<ref>) is equivalent to say that I(A) ⊂(f) for A = {[ℓ_1],…,[ℓ_r]}⊂ S_1. In other words, the study of Waring decompositions is equivalent to study ideals of sets of points in S_1, i.e., radical homogeneous ideals of height one, contained in artinian Gorenstein ideals.
§.§ Hilbert function of apolar sets of points
Most of algebraic invariants of algebraic varieties are encoded by the Hilbert function. Given a homogeneous ideal I ⊂ R, let I_d = I ∩ R_d be its degree-d homogeneous part. The Hilbert function of R/I is the numerical function _R/I : → with
_R/I(d) := _[R_d/I_d] = _ R_d - _ I_d
If A ⊂ S_1 is a set of points, then we write _A for the Hilbert function of R/I(A) where I(A) is the defining homogeneous ideal of A.
The study of Hilbert functions of reduced sets of points has been successfully used to compute Waring ranks. For example, the Hilbert function of the apolar ideal of a given polynomial provides a lower bound for the Waring rank of the polynomial. In some cases, these were shown to be optimal, see e.g. <cit.>.
If a polynomial admits a unique minimal Waring decomposition, then we say that the polynomial is identifiable. It is worth to mention that the general homogeneous polynomial with rank r strictly smaller than the general one is identifiable except for the special cases (n,d,r) ∈{(2,6,9),(3,4,8),(5,3,9)}, see <cit.>. In <cit.>, Cayley-Bacharach properties and liaison theory of sets of points in the projective plane were exploited to provide a criterion to certify that a form is identifiable. On the other hand, when the polynomial is not identifiable, it is interesting to study the family of apolar sets of points computing the rank of the polynomial, see <cit.>. In <cit.>, a classification of low rank polynomials is given in terms of the possible Hilbert functions of apolar sets of points computing the rank of the polynomials.
It is well-known that the Hilbert function of a set of points is strictly increasing until it reaches its cardinality. We call regularity of A the smallest integer i for which the Hilbert function of A stabilizes, i.e., such that _A(i) = _A(i+1).
§.§ The question.
In this short note, we address the following question.
[<cit.>]
Let f ∈ S_d. Do all sets of points computing the rank of f share the same regularity? More generally, do they share the same Hilbert function?
The answer is known to be positive for binary forms (n = 2), because all sets of points with same cardinality on the projective line share the same Hilbert function, and for monomials x_0^d_0⋯ x_n^d_n because all sets of points computing the rank are known to be complete intersections with generators of degrees d_1+1,…,d_n+1 if d_0 ≤ d_i for all i, see <cit.>. In the present note, we prove that the answer to Question <ref> is negative for ternary forms (n=3) if the degree is sufficiently large. We provide two cases. In Section <ref>, we consider degree-10 ternary forms having rank 22, that is the general rank. Among them, we consider the special ones which admit a unique quintic in the apolar ideal. We show in Theorem <ref> that the general such form has a decomposition lying on the quintic and one not contained in the quintic. Along with this proof, we notice that there exist degree-10 ternary forms of rank 22 and with a unique quintic in the apolar ideal which have higher rank with respect to such quintic curve, see Remark <ref>. We recall that the study of the connection between catalecticant matrices and the Hilbert function of certain decompositions was also used in <cit.> where a complete stratification of ternary sextics of rank nine. In Section <ref>, we consider degree-13 ternary forms having rank 30, that is strictly subgeneric. In Theorem <ref>, we show that there exist two sets of 30 points which compute the rank of a degree-13 ternary form and have different regularity. Our proofs follow the ideas of <cit.>, by exploiting properties of Hilbert functions of points in the projective plane and, in particular, liaison theory. In Section <ref>, we show an explicit construction with the support of the algebra software Macaulay2 <cit.>.
§ ALGEBRAIC PROPERTIES OF POINTS IN ^N
§.§ Hilbert function of points in ^n
Let A ⊂^n be a set of points of cardinality ℓ(A). We recalled in (<ref>) the definition of the Hilbert function of A. The first difference is the numerical function given by
Dh_A : →, D_A(i) := _A(i)-_A(i-1).
We recall some elementary properties of Hilbert functions of points in ^n that will be used later. We refer to <cit.> for an extensive exposition including proofs.
<cit.>
Let A ⊂^n be a set of points of cardinality ℓ(A).
* h_A(j) ≤ℓ(A), for all j;
* Dh_A(j) = 0, for j < 0;
* h_A(0) = Dh_A(0) = 1;
* Dh_A(j) ≥ 0, for all j;
* h_A(i) = ∑_j=0^i Dh_A(j);
* h_A(j) = ℓ(A), for all j ≫ 0;
* Dh_A(j) = 0, for j ≫ 0;
* ∑_j=0^∞ Dh_A(j) = ℓ(A);
* for any A' ⊂ A, h_A'(j) ≤ h_A(j) and Dh_A'(j) ≤ Dh_A(j) for any j;
* if Dh_A(j) < j, then Dh_A(j) ≥ Dh_A(j+1).
Finally, we denote
h^1_A(d) := ℓ(A) - _A(d) = ∑_i=d+1^∞ Dh_A(i).
The following proposition allows us to understand if, given two sets of points, there exists a homogeneous polynomial of given degree to which they are both apolar.
<cit.>
Let A,B ⊂^n be finite sets of points and let Z = A ∪ B. Then, for any d ∈,
(⟨ν_d(A) ⟩∩⟨ν_d(B) ⟩) = ℓ(A ∩ B) - 1 + h^1_Z(d).
§.§ Liaison for points in ^2
We describe here some construction that will be used in Section <ref> to construct the examples replying to Question <ref>. These are basic constructions from liaison theory; we refer to <cit.> for a complete presentation of the theory.
Let A,B ⊂^2 be two sets of points. We say that A and B are linked if there exists a complete intersection Z such that I_B = I_Z : I_A. When A ∩ B = ∅, this is equivalent to say that Z = A ∪ B. We say that B is the residue of A with respect to Z.
A set of points in ^2 is arithmetically Cohen-Macaulay of codimension 2, hence a minimal free resolution is provided by the Hilbert-Burch Theorem, see <cit.>. If A and B are linked, then a Hilbert-Burch matrix of B can be recovered from one of A by the mapping cone construction, see <cit.>.
Let S(i) be the polynomial ring with the gradation shifted by i, i.e., S(d)_i := S_d+i. A similar notation is used for every graded S-module. If A and B are linked through a complete intersection Z of type (d_1,d_2), then we have the following free resolutions
[ 0 → S(-d_1-d_2) → S(-d_1) ⊕ S(-d_2) → I_Z → 0; ↓ ↓ϕ ↓; 0 ⟶ F_1 F_0 ⟶ I_A ⟶ 0; ]
where ϕ : S(-d_1) ⊕ S(-d_2) → F_0 is the map induced by the right-most vertical arrow which corresponds to the inclusion I_Z ⊂ I_A and M is a Hilbert-Burch matrix of A. Then, by the mapping cone construction, a resolution of I_B is given by
[ 0 → F_0(-d_1-d_2)^∨ [ S(-d_1) ⊕ S(-d_2); ⊕; F_1(-d_1-d_2)^∨ ] → I_B → 0. ]
The Hilbert functions between the two linked sets of points are linked by the following formula on their first differences:
Dh_B(i) + Dh_A(d_1+d_2-i-2) = Dh_Z(i),
see <cit.> or <cit.>.
§.§ Cayley-Bacharach properties
We recall here also some basic fact about Cayley-Bacharach properties for sets of points in projective space. They are used to understand the possible Hilbert functions of sets of points A ∪ B where A and B are apolar to the same homogeneous form. These properties have been crucial to provide certificates for identifiability of forms in <cit.>.
Let Z ⊂^n be a set of points. We say that it satisfies the Cayley-Bacharach property in degree d (CB(d)) if, for all p ∈ Z, it holds that every form of degree d vanishing at Z ∖{p} also vanishes at p.
<cit.>
Let f ∈ S_d and let A be a non-redundant set of points apolar to f. Let B a second non-redundant set of points apolar to f such that A ∩ B = ∅. Then, the set Z = A ∪ B satisfies CB(d).
<cit.>
Let Z ⊂^n be a set of points satisfying CB(d). Then, for any i ∈{0,…,d+1},
∑_j=0^i Dh_Z(j) ≤∑_j=0^i Dh_Z(d+1-j).
§.§ Secant varieties and Terraccini loci
The geometric framework to deal with Waring decompositions is the one of secant varieties of Veronese varieties, see <cit.>. Given an irreducible algebraic variety X ⊂^N, the r-th secant variety is an irreducible variety defined as the Zariski closure of the union of linear spaces spanned by r-tuples of points on X, i.e.,
σ_r(X) := ⋃_p_1,…,p_r ∈ X⟨ p_1,…,p_r ⟩⊂^N.
If X is the d-th Veronese embedding of S_1, then, by Definition <ref>,
σ_r(ν_d(^n)) = {[f] ∈ S_d : (f) ≤ r}⊂ S_d.
Secant varieties are clearly nested into each other by definition, but, if the variety X is non-degenerate, then we have that its secant varieties eventually fill the ambient space, see <cit.>. For example, the minimal r such that σ_r(ν_d(^n)) = S_d is the Waring rank of the general degree-d form in n+1 variables.
Understanding which secant variety fills the ambient space reduces to the computation of dimensions of secant varieties. By a simple parameter count, the expected dimension of the r-th secant variety of an algebraic variety X ⊂^N is
exp.σ_r(X) := min{r(X) + r - 1, N}.
The expected dimension is always an upper bound for the actual dimension and if σ_r(X) < exp.σ_r(X) then we say that X is r-defective. The classification of defective varieties is a very classical problem with roots in the late XIX century. By Palatini <cit.>, if σ_r(X) is not an hypersurface and does not fill the ambient space, then it is at least of codimension 2 inside σ_r+1(X). As an immediate corollary, projective curves are never defectives. A classification of defective surfaces is due to Severi and Terracini, see <cit.>, while the classification of defective threefolds is due to Scorza <cit.>. The case of fourfolds has been treated first by Scorza in <cit.> (see also <cit.>) and then completed in the recent preprint <cit.>.
If we denote by X^(r) the r-th symmetric product of the variety X, the r-th abstract secant variety of X is
abσ_r(X) := {((p_1,…,p_r),q) : q ∈⟨ p_1,…,p_r ⟩}⊂ X^(r)×^N.
Throughout the paper, we always denote by π_i the projection onto the i-th factor from a cartesian product. The r-th abstract secant variety is irreducible of dimension r(X)+r-1. Hence, if σ_r(X) ⊊^N, non-defectiveness is equivalent to say that the projection π_2 : abσ_r(X) →^N has generically finite fibers. The r-th Terracini locus of X is
𝕋_r(X) := {(p_1,…,p_r) : p_i ∈ X^ smooth, {p_1,…,p_r} are linearly independent,
T_p_1(X),…,T_p_r(X) are linearly dependent}⊂ X^(r).
The main tool to study dimensions of secant varieties is the Terracini's Lemma which describes the general tangent space to secant varieties, see <cit.>. In particular, it claims that, given general points p_1,…,p_r ∈ X and a general point p ∈⟨ p_1,…,p_r ⟩, then
T_pσ_r(X) = ⟨ T_p_1(X),…,T_p_r(X) ⟩.
If X is not r-defective and σ_r(X) does not fill the space, then 𝕋_r(X) is a proper subvariety of X^(r). In other words, the preimage of the Terracini's locus π_1^-1(𝕋_r(X)) is contained in the locus where the differential of the projection π_2 : abσ_r(X) →^N drops rank.
The complete classification of defective Veronese varieties is known as the Alexander-Hirschowitz Theorem <cit.>. In the 1980s, Alexander and Hirschowitz defined a very powerful machinery to deal with problems on polynomial interpolation such as the computation of the dimension of the linear system of degree-d hypersurfaces of ^n having r singularities at general points. The latter problem is equivalent to compute dimensions of secant varieties of the Veronese varieties and, a posteriori, to compute the general Waring rank in S_d.
The r-th secant variety of the Veronese variety ν_d(^n) is non-defective except for
* d = 2, n ≥ 2 and 2 ≤ r ≤ n;
* d = 3, n = 4, r = 7;
* d = 4, (n,r) ∈{(2,5), (3,9), (4,14)}.
§ THE EXAMPLES
In this section, we give a negative answer to Question <ref> by showing that there exist ternary forms admitting apolar sets of points computing their Waring rank with different Hilbert function as well as different regularity.
The idea is to start from a special set of points Z_1 and, by means of liaison theory, to construct a second set of points of the same cardinality Z_2, but different Hilbert function, such that ⟨ν_d(Z_1) ⟩∩⟨ν_d(Z_2) ⟩ is non-empty, i.e., there is a degree-d form f whose Z_1 and Z_2 are both apolar to. After the construction, we prove that indeed Z_1 and Z_2 compute the rank of f.
§.§ First example. Degree-10 ternary forms of rank 22.
There exists a form f ∈ S_10 of rank 22 having two sets of points computing its rank and presenting different Hilbert functions.
Let Z_1 ⊂^2 be a set of 22 general points on a quintic curve. Then,
h_Z_1 : 1 3 6 10 15 20 22 22 ⋯
D h_Z_1 : 1 2 3 4 5 5 2 -
Let L ⊂^2 be a general line and let Y be a set of five general points on L. Consider A = Z_1 ∪ Y. Clearly there are no quintics through A since there is a unique quintic through Z_1 and the line L is chosen generically. Moreover, Y imposes independent conditions on the space of sextics through Z_1: indeed, it is enough to observe that I(Z_1)_6 - I(Z_1)_5 = 5 ≥#Y, see e.g. <cit.>. Hence,
h_A : 1 3 6 10 15 21 27 27 ⋯
D h_A : 1 2 3 4 5 6 6 -
Let X be a complete intersection of two general septics containing A. Then, we define Z_2 to be the residue of A through X. Hence, by (<ref>), we have
[ 0 1 2 3 4 5 6 7 8 9 10 11 12; Dh_X(i) : 1 2 3 4 5 6 7 6 5 4 3 2 1; Dh_Z_2(i) : 1 2 3 4 5 6 1 - - -; Dh_A(12-i) : 6 6 5 4 3 2 1 ]
Note that, since we are considering a linkage through a complete intersection of two curves both of degree at least the regularity of Z_1 plus one, which is seven, then, by the Peskine-Szpiro Theorem, see <cit.>, Z_2 is smooth and Z_1 ∩ Z_2 = ∅. Hence, Z_2 is a set of 22 distinct points disjoint from Z_1 and with Hilbert function different than Z_1.
Z_1 and Z_2 are apolar to a common degree-10 ternary form.
By Proposition <ref>, it is enough to compute the Hilbert function of the union Z_1 ∪ Z_2. Note that, by construction, Z_1 ∪ Z_2 is linked to the set Y of five collinear points. Hence, by (<ref>)
[ 0 1 2 3 4 5 6 7 8 9 10 11 12; Dh_X(i) : 1 2 3 4 5 6 7 6 5 4 3 2 1; Dh_Z_1 ∪ Z_2(i) : 1 2 3 4 5 6 7 6 4 3 2 1; Dh_Y(12-i) : 1 1 1 1 1 ]
Hence, by Proposition <ref>, ⟨ν_10(Z_1) ⟩∩⟨ν_10(Z_2) ⟩ = 0. I.e., there exists f ∈ S_10 such that [f] ∈⟨ν_10(Z_1) ⟩∩⟨ν_10(Z_2) ⟩.
Now, we need to show that the general degree-10 form f constructed as in Claim <ref> is indeed of rank 22. Let 𝒳 be the variety of degree-10 forms admitting an apolar set of 22 reduced points lying on a quintic.
The variety 𝒳 is irreducible and has codimension 2.
Note that the variety of degree-10 ternary forms f∈ S_10 admitting a quintic in the apolar ideal is a hypersurface defined by the vanishing of the determinant of the central catalecticant matrix associated to the map
cat_5(f) : R_5 → S_5, g ↦ g ∘ f.
The fact that the variety {( cat_5(f)) = 0} is irreducible follows from <cit.>. Fixed a plane quintic C ⊂^2, by Riemann-Roch Theorem, we have that ⟨ν_10(C) ⟩ = ^44. Since curves are non-defective, σ_22ν_10(C) = 43, see Section <ref>. Therefore the general form f ∈⟨ν_10(C) ⟩ has rank 23 with respect to ν_10(X) and 𝒳 has codimension one in the hypersurface of forms admitting a quintic in the apolar ideal. In other words, if we consider the incidence variety of forms lying on the 22-nd secant variety of the degree-10 Veronese embedding of a plane quintic
ℐ = {(C,[f]) : [f] ∈σ_22(ν_10(C))}⊂ S_5 × S_10,
then 𝒳 = π_2(ℐ). The projection π_2 is generically one-to-one because the quintic in the apolar ideal for a general form [f] ∈𝒳 is uniquely the determinant of cat_5(f). Given a quintic C, we have that π_1^-1(C) ≅σ_22(ν_10(C)). Hence, 𝒳 = ℐ = S_5 + σ_22(ν_10(C)) = 20 + 43 = 63 inside S_10 = ^65.
The general form [f] ∈𝒳 has rank 22.
By Alexander-Hirschowitz Theorem (Theorem <ref>),
σ_21(ν_10(^2)) = 21 · 2 + 20 = 62,
i.e., σ_21(ν_10(^2)) has codimension 3. Hence, by Claim <ref>, 𝒳∩σ_21(ν_10(^2)) is a proper subvariety of 𝒳.
Consider 𝒴⊂𝒳 the set of degree-10 forms that are constructed as in Claim <ref>. Let Hilb^∘_22(^2) be the open subset of the Hilbert scheme of 22 points in ^2 and let Hilb^∘_22,5(^2) denote the set of all sets of 22 general points lying on a quintic of ^2. Then, consider the incidence variety
𝒥 = {(Z_1,Z_2,[f]) : ⟨ν_10(Z_1) ⟩∩⟨ν_10(Z_2) ⟩ = [f]}⊂ Hilb^∘_22,5(^2) × Hilb^∘_22(^2) × S_10.
By construction, 𝒴 = π_3(𝒥). Moreover, from the construction described at the beginning of the proof, the projection π_1 is dominant, i.e., for a general choice of a set Z_1 of 22 points on a quintic in ^2, there exists Z_2 ∈ Hilb^∘_22(^2) and f ∈ S_10 such that (Z_1,Z_2,[f]) ∈𝒥. With a similar construction, we can also show that the projection π_2 is dominant.
The projection π_2 : 𝒥→ Hilb^∘_22(^2) is dominant.
Let Z_2 be a general set of 22 points in ℙ^2. Take a set Y of three general points collinear on a general line L and let A = Z_2 ∪ Y. Since there are no quintics through Z_2, then the three points impose independent conditions on sextics through Z_2, see <cit.>. Hence,
h_A : 1 3 6 10 15 21 25 25 ⋯
D h_A : 1 2 3 4 5 6 4 -
Let {G_1,G_2,G_3} be a basis for the space of sextics passing through A, i.e., [I_A]_6 = ⟨ G_1,G_2,G_3 ⟩. The restriction of [I_A]_6 on L defines a non-complete linear series g^2_3 away from the set of points Y.
The linear series on L is generically base-point free, then it defines a regular map on ^2 which maps L into a singular cubic curve C. Indeed, since being base-point free is an open condition, this can be checked directly on a specific example with the support of the algebra software Macaulay2 <cit.>, see Section <ref>. For example, without loss of genericity, let L = {x_0 = 0} and Y = {(0:1:0), (0:0:1), (0:1:1)}. Hence, for i = 1,2,3, the restriction of G_i on L is given by G_i(0,x_1,x_2) = x_1x_2(x_1-x_2)H_i(x_1,x_2) and we consider the map φ : L →^2, p ↦ (H_1(p):H_2(p):H_3(p)). Let C = φ(L). The general cubic C constructed as above is nodal. Indeed, since being nodal is an open condition on the space of rational plane cubics, it is enough to exhibit one example in which the above construction provides a nodal curve. This is checked with the support of the algebra software Macaulay2 <cit.>, see Section <ref>.
Now, let X be the set of two distinct points on L which are pre-images of the singular point of C and consider the set of five points X ∪ Y ⊂ L. By construction, X ∪ Y does not impose independent conditions on the space of sextics passing through A. This implies that
[ h_X ∪ A : 1 3 6 10 15 21 26 27 27 ⋯; D h_X ∪ A : 1 2 3 4 5 6 5 1 - ]
Now, we consider the linkage to X ∪ A via a general complete intersection of type (7,7), i.e., U = (X ∪ A) ∪ Z_1. Then, Z_1 is a set of 22 points with the following Hilbert function
[ 0 1 2 3 4 5 6 7 8 9 10 11 12; Dh_U(i) : 1 2 3 4 5 6 7 6 5 4 3 2 1; Dh_Z_1(i) : 1 2 3 4 5 5 2 - - -; Dh_X∪ A(12-i) : 1 5 6 5 4 3 2 1 ]
Again, by Peskine-Szpiro Theorem, see <cit.>), Z_1 is smooth and Z_1 ∩ Z_2 = ∅. Hence, Z_1 ∈ Hilb^∘_22,5(^2). Moreover, by construction, U = (Z_1 ∪ Z_2) ∪ (X ∪ Y). I.e., the union Z_1 ∪ Z_2 is linked through U to the set X ∪ Y of 5 collinear points. Hence, by (<ref>),
[ 0 1 2 3 4 5 6 7 8 9 10 11 12; Dh_U(i) : 1 2 3 4 5 6 7 6 5 4 3 2 1 ; Dh_X ∪ Y(12-i) : 1 1 1 1 1; Dh_Z_1∪ Z_2(i) : 1 2 3 4 5 6 7 6 4 3 2 1 ]
Hence, Dh_Z_1∪ Z_2(11) = 1 and, by Proposition <ref>, there exists f ∈ S_10 such that (Z_1,Z_2,[f]) ∈𝒥.
𝒴 is dense in 𝒳. In particular, the general [f] ∈𝒴 has rank 22.
Since the 22-nd secant variety of ν_10(^2) and of ν_10(C), for any quintic C ⊂^2, are non-defective, we have that the Terracini loci in Hilb^∘_22,5(^2) and Hilb^∘_22(^2) are proper sub-varieties. In particular, we can restrict the projection π_3 to the dense subspace of 𝒥 given by the triplets (Z_1,Z_2,[f]) such that Z_1 and Z_2 do not belong to the corresponding Terracini locus. This implies that, for the general [f] ∈𝒴, the fiber π_3^-1([f]) is finite, see <cit.>. In particular, 𝒴 = 𝒥.
Since π_2 is dominant, for a general Z_2 ∈ Hilb^∘_22(^2), we have that 𝒥 = Hilb^∘_22(^2) + π_2^-1(Z_2). Now, Hilb^∘_22(^2) = 44. Following the construction in Claim <ref>, we see that π_2^-1(Z_2) = 19. Indeed, it depends on the choice of three collinear points, that is five parameters (2 to fix a line and 3 to fix three points on it), and the choice of the general complete intersection of two septics, that is the choice of a pencil in the 8-dimensional projective space of septics through the set of 27 points A, i.e., other 14 = 2(9-2) parameters. In particular, 𝒥 = 63 = 𝒳. Since 𝒳 is irreducible, we conclude the first part of the statement. The second part of the statement follows directly from Claim <ref>.
Therefore, the general element of 𝒴 evinces the statement of the theorem.
In the proof of Claim <ref> we observed that, given a general quintic curve C ⊂^2, the general degree-10 form in ⟨ν_10(C) ⟩ = ^44 has rank 23 with respect to the curve. However, since the general rank of degree-10 ternary forms is equal to 22 by Alexander-Hirschowitz Theorem (Theorem <ref>), we also deduce that the general form in ⟨ν_10(C) ⟩ has rank 22 with respect to the Veronese variety ν_10(^2). In other words, there exist degree-10 ternary forms whose apolar ideal has minimal generators in degree five but minimal Waring decompositions are given by sets of points whose ideal does not involve such minimal generators.
§.§ Second example. Degree-13 ternary forms of rank 30.
There exists a form f ∈ S_13 of rank 30 having two sets of points computing its rank and admitting different Hilbert functions and regularities.
Let A be a set of 12 general points lying on a cubic. I.e.,
h_A : 1 3 6 9 12 12 ⋯
Dh_A : 1 2 3 3 3 -
Then, we consider the set Z_1 of 30 points linked to A through a complete intersection X = A ∪ Z_1 of 42 points defined by a general sextic and a septic. I.e., by (<ref>),
[ Dh_X : 1 2 3 4 5 6 6 5 4 3 2 1 -; Dh_Z_1 : 1 2 3 4 5 6 6 2 1 - ]
We link Z_1 to another set Z_2 of 30 points through a complete intersection Y = Z_1 ∪ Z_2 of 60 points defined by a sextic and degree-10 form. I.e., by (<ref>),
[ Dh_Y : 1 2 3 4 5 6 6 6 6 6 5 4 3 2 1 -; Dh_Z_1 : 1 2 3 4 5 6 6 2 1 -; Dh_Z_2 : 1 2 3 4 5 6 5 4 - ]
We immediately observe that Z_1 and Z_2 are both apolar to a form of degree 13. Indeed, from the first difference of Y = Z_1 ∪ Z_2 in (<ref>), we have h^1_14(Z_1 ∪ Z_2) = 1. By Proposition <ref>, ⟨ν_13(Z_1) ⟩∩⟨ν_13(Z_2) ⟩ = [f] for some degree 13 form f.
f has rank 30.
Let Z_1 be as above and Z' ⊂^n be another set of points apolar to f.
First, assume that Z_1 ∩ Z' = ∅ and let Z = Z_1 ∪ Z'. By Lemma <ref>-(9) since ∑_i=0^5 Dh_Z_1(i) = 21 then also ∑_i=0^5 Dh_Z(i) = 21. By Proposition <ref>, Z satisfies CB(13) and then, by Theorem <ref>,
21 = ∑_i=0^5 Dh_Z(i) ≤∑_i = 9^14 Dh_Z(i).
In particular, we deduce that Dh_Z(5) = Dh_Z(9) = 6 and, by Lemma <ref>(10), we have Dh_Z(i) ≥ 6 for i ∈{6,7,8}. I.e.,
[ 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 ; Dh_Z(i) : 1 2 3 4 5 6 ≥ 6 ≥ 6 ≥ 6 6 5 4 3 2 1; Dh_Z_1(i) : 1 2 3 4 5 6 6 2 1 -; Dh_Z'(14-i) : ? ? ? 6 5 4 3 2 1 ]
Since Dh_Z_1(7) + Dh_Z_1(8) = 3, we conclude that Dh_Z(7) + Dh_Z(8) ≥ 9. Hence,
ℓ(Z') ≥∑_i=7^14 Dh_Z'(i) ≥ 9 + 21 = 30.
Assume now that Z_1 ∩ Z' ≠∅. As observed in <cit.>, if Z” = Z' ∖ (Z' ∩ Z_1), then there exists a form f_0 ∈ S_13 such that [f] ∈⟨ν_13(Z_1) ⟩∩⟨ν_13(Z”) ⟩. Indeed, if Z_1 = {ℓ_1,…,ℓ_30} and Z' = {ℓ_1,…,ℓ_k,m_k+1,…,m_r}, then,
f = ∑_i=1^30a_iℓ_i^13 = ∑_i=1^kb_iℓ_i^13 + ∑_i=k+1^rb_i m_i^13
and
f_0 = ∑_i=1^k(a_i-b_i)ℓ_i^13 + ∑_i=k+1^30a_i ℓ_i^13 = ∑_i=k+1^rb_i m_i^13.
Therefore, we can proceed with the same argument as before by considering f_0 instead of f and Z = Z_1 ∪ Z” to deduce that ℓ(Z_1) ≥ℓ(Z”) ≥ 30.
Therefore, we have that Z_1 and Z_2 have different Hilbert function and regularity by (<ref>) and both compute the rank of f by Claim <ref>. This concludes the proof.
§ EXPLICIT MACAULAY2 COMPUTATIONS
In this last section, we provide a code in the language of the algebra software Macaulay2 <cit.> to construct the examples presented in the previous section.
§.§ First example. Degree-10 ternary forms of rank 22.
[language = Macaulay2]
i1 : k = QQ;
i2 : S = k[x,y,z];
i3 : – consider a set of 22 general points
IZ1 = intersect for i from 1 to 22 list
minors(2,vars(S)||random(QQ^1,QQ^3));
i4 : degree IZ1, for i to 10 list hilbertFunction(i,IZ1)
o4 = (22, 1, 3, 6, 10, 15, 21, 22, 22, 22, 22, 22)
i5 : – consider the set of points Y = (0:1:0),(0:0:1),(0:1:1) on the line x = 0 and the union A = Z1 u Y
IY = intersect(ideal(x,z), ideal(x,y), ideal(x,y-z));
i6 : IA = intersect(IZ1,IY);
i7 : – take the degree-6 part of the ideal of A
G = ideal super basis(6,IA);
i8 : – take the ideal generated by the restriction of G over the line x = 0 away from the set of points Y
R = k[y,z];
i9 : G0 = sub(G,R);
i10 : G' = G0 : sub(IY,R);
i11 : – G' is then defined by three cubics: let C be the cubic curve as image of the line L via the map defined by G'
phi = map(R,S,first entries mingens G');
i12 : C = ker phi;
i13 : – We compute the singular locus and we check that it is nodal
VC = Proj (S/C);
i14 : singVC = singularLocus VC;
i15 : codim singVC, degree singVC
o15 = (2, 1)
i16 : IO = ideal singVC;
i17 : – We compute the pre-image X of the singular point:
– that is a union of two simple points
T = QQ[a,b,c,y,z, MonomialOrder => Eliminate 3];
i18 : psi = map(T,S,a,b,c);
i19 : J = psi(IO) + ideal(a-sub(G'_0,T),b-sub(G'_1,T),c-sub(G'_2,T));
i20 : use S;
i21 : IX=saturate(ideal(x)+sub(ideal selectInSubring(1,gens gb J),S));
i22 : dim IX, degree IX, IX == radical IX
o22 = (1, 2, true)
i23 : – Now, the union A u X is a set of 27 points
IA' = intersect(IA,IX);
i24 : degree IA', for i to 10 list hilbertFunction(i,IA')
o24 = (27, 1, 3, 6, 10, 15, 21, 26, 27, 27, 27, 27)
i25 : – Construct a general c.i. of type (7,7)
B7 = super basis(7,IA');
i26 : C1 = B7 * random(QQ^(numcols B7), QQ^1);
i27 : C2 = B7 * random(QQ^(numcols B7), QQ^1);
i28 : IU = ideal(C1,C2);
i29 : degree IU, for i to 12 list hilbertFunction(i,IU)
o29 = (49, 1, 3, 6, 10, 15, 21, 28, 34, 39, 43, 46, 48, 49)
i30 : – Consider the linkage to A' through U
IZ2 = IU : IA';
i31 : degree IZ2, for i to 10 list hilbertFunction(i,IZ2)
o31 = (22, 1, 3, 6, 10, 15, 20, 22, 22, 22, 22, 22)
i32 : – we compute now the intersection of their linear spans
perpSpace = ideal super basis(10,IZ1)+ideal super basis(10,IZ2);
i33 : B10 = basis(10,S);
i34 : f = (B10 * gens ker diff(B10, transpose mingens perpSpace))_0_0;
i35 : – Z1 and Z2 are apolar to f and have different HFs
fperp = inverseSystem f; – computes the apolar ideal of f
i36 : isSubset(IZ1,fperp), isSubset(IZ2,fperp),
netList for i to 14 list hilbertFunction(i,IZ1), for i to 14 list hilbertFunction(i,IZ2)
+-+-+-+–+–+–+–+–+–+–+–+–+–+–+–+
o36 = (true, true, |1|3|6|10|15|21|22|22|22|22|22|22|22|22|22|)
+-+-+-+–+–+–+–+–+–+–+–+–+–+–+–+
|1|3|6|10|15|20|22|22|22|22|22|22|22|22|22|
+-+-+-+–+–+–+–+–+–+–+–+–+–+–+–+
§.§ Second example. Degree-13 ternary forms of rank 30.
[language = Macaulay2]
i1 : k = QQ;
i2 : S = k[x,y,z];
i3 : – consider 12 random points on the rational cubic xz^2 - y^3 = 0
a = entries random(k^12,k^2);
i4 : A = (p -> p_0^3, p_0*p_1^2, p_1^3) a;
i5 : IA = intersect ((p -> minors(2,matrixx,y,z,p)) A);
i6 : degree IA, for i to 5 list hilbertFunction(i,IA)
o6 = (12, 1, 3, 6, 9, 12, 12)
i7 : – consider a c.i. X of type (6,7) containing A
B6 = super basis(6,IA); B7 = super basis(7,IA);
i9 : F1 = B6 * random(QQ^(numcols B6), QQ^1);
i10 : F2 = B7 * random(QQ^(numcols B7), QQ^1);
i11 : IX = ideal(F1,F2);
i12 : degree IX, for i to 13 list hilbertFunction(i,IX)
o12 = (42, 1, 3, 6, 10, 15, 21, 27, 32, 36, 39, 41, 42, 42, 42)
i13 : – consider the link to A through X
IZ1 = IX : IA;
i14 : degree IZ1, for i to 13 list hilbertFunction(i,IZ1)
o14 = (30, 1, 3, 6, 10, 15, 21, 27, 29, 30, 30, 30, 30, 30, 30)
i15 : – consider a c.i. Y of type (6,10) containing Z1
B6 = super basis(6,IZ1); B10 = super basis(10,IZ1);
i17 : G1 = B6 * random(QQ^(numcols B6), QQ^1);
i18 : G2 = B10 * random(QQ^(numcols B10), QQ^1);
i19 : IY = ideal(G1,G2);
i20 : degree IY, for i to 14 list hilbertFunction(i,IY)
o20 = (60, 1, 3, 6, 10, 15, 21, 27, 33, 39, 45, 50, 54, 57, 59, 60)
i21 : – consider the link to Z1 through Y
IZ2 = IY : IZ1;
i22 : degree IZ2, for i to 13 list hilbertFunction(i,IZ2)
o22 = (30, 1, 3, 6, 10, 15, 21, 26, 30, 30, 30, 30, 30, 30, 30)
i23 : – we compute now the intersection of their linear spans
perpSpace = ideal super basis(13,IZ1)+ideal super basis(13,IZ2);
i24 : B13 = basis(13,S);
i25 : f = (B13 * gens ker diff(B13, transpose mingens perpSpace))_0_0;
i26 : – note that Z1 and Z2 are apolar to f
– and have different Hilbert functions and regularity
fperp = inverseSystem f; – computes the apolar ideal of f
i27 : isSubset(IZ1,fperp), isSubset(IZ2,fperp),
netList for i to 14 list hilbertFunction(i,IZ1),
for i to 14 list hilbertFunction(i,IZ2)
+-+-+-+–+–+–+–+–+–+–+–+–+–+–+–+
o27 = (true, true, |1|3|6|10|15|21|27|29|30|30|30|30|30|30|30|)
+-+-+-+–+–+–+–+–+–+–+–+–+–+–+–+
|1|3|6|10|15|21|26|30|30|30|30|30|30|30|30|
+-+-+-+–+–+–+–+–+–+–+–+–+–+–+–+
amsplain
|
http://arxiv.org/abs/2303.07027v1
|
20230313114408
|
Adaptive Dereverberation, Noise and Interferer Reduction Using Sparse Weighted Linearly Constrained Minimum Power Beamforming
|
[
"Henri Gode",
"Simon Doclo"
] |
eess.AS
|
[
"eess.AS"
] |
Adaptive Dereverberation, Noise and Interferer Reduction Using Sparse Weighted Linearly Constrained Minimum Power Beamforming
This work was funded by the Deutsche Forschungsgemeinschaft (DFG, German Research Foundation) – Project ID 390895286 – EXC 2177/1.
Henri Gode and Simon Doclo
Department of Medical Physics and Acoustics and Cluster of Excellence Hearing4all,
University of Oldenburg, Germany
{henri.gode, simon.doclo}@uni-oldenburg.de
March 30, 2023
====================================================================================================================================================================================================================================================================
Interfering sources, background noise and reverberation degrade speech quality and intelligibility in hearing aid applications. In this paper, we present an adaptive algorithm aiming at dereverberation, noise and interferer reduction and preservation of binaural cues based on the wBLCMP beamformer. The wBLCMP beamformer unifies the multi-channel weighted prediction error method performing dereverberation and the linearly constrained minimum power beamformer performing noise and interferer reduction into a single convolutional beamformer. We propose to adaptively compute the optimal filter by incorporating an exponential window into a sparsity-promoting lp-norm cost function, which enables to track a moving target speaker. Simulation results with successive target speakers at different positions show that the proposed adaptive version of the wBLCMP beamformer outperforms a non-adaptive version in terms of objective speech enhancement performance measures.
noise reduction, dereverberation, online processing, convolutional beamformer, multi-microphone
§ INTRODUCTION
In many hands-free speech communication systems such as hearing aids, mobile phones and smart speakers, interfering sounds, ambient noise and reverberation may degrade the speech quality and intelligibility of the recorded microphone signals <cit.>.
To enhance speech quality and intelligibility, many multi-microphone speech enhancement methods aiming at noise and interferer reduction and dereverberation have been proposed in the last decades <cit.>. For many of these methods, both non-adaptive versions with time-invariant parameters as well as adaptive versions with time-varying parameters exist. When considering binaural hearing aids, it is often desired to preserve the binaural cues, which provide spatial awareness of the acoustic scene for the listener <cit.>.
A commonly used multi-microphone noise reduction method is the MPDR beamformer <cit.>, which aims at minimizing the output power while leaving the desired speech component undistorted. The LCMP beamformer generalizes the MPDR beamformer, providing the possibility of multiple linear constraints, e.g., to perform controlled reduction of the interfering sources <cit.>. Often the constraints are formulated in terms of the RTF vectors of the target speaker and interfering sources <cit.>.
To achieve dereverberation, the WPE method <cit.> and its generalization using sparse priors <cit.> are commonly employed.
WPE uses a convolutional filter, applied to a number of past frames in the STFT domain, to estimate and subtract the late reverberation component.
Since the WPE cost function does not have an analytic solution, it has been proposed to use iterative alternating optimization schemes. In <cit.> adaptive versions of the WPE algorithm have been proposed, e.g., by incorporating an exponential window into the cost function and incorporating an additional constraint to prevent overestimation of the late reverberation <cit.>.
Aiming at joint dereverberation and noise reduction, it has been proposed to perform MIMO-WPE as a preprocessing stage before MPDR beamforming, in a cascade system <cit.>. By unifying the optimization of the convolutional WPE filter and the MPDR beamformer, the so-called WPD beamformer <cit.>
and its generalization using sparse priors <cit.> were shown to outperform cascade systems. The unified WPD beamformer
is optimized similarly to the WPE filter with an additional distortionless constraint using the RTF of the target speaker.
In <cit.> two adaptive versions of the WPD algorithm have been proposed.
Aiming at joint dereverberation, reduction of interfering sources and noise and preservation of the binaural cues of all sources, the wBLCMP beamformer in <cit.> generalizes the WPD beamformer by unifying the optimization of the convolutional WPE filter and the LCMP beamformer.
Similarly to <cit.>, in this paper, we derive an adaptive version
by incorporating an exponential window into the cost function, which enables tracking of a moving target speaker. In addition, similarly to <cit.>, we explicitly control the sparsity of the STFT coefficients by using an ℓ_p-norm cost function. For a complex acoustic scenario featuring a target speaker which suddenly switches position, an interfering source at a fixed position and diffuse babble noise, simulation results show that the adaptive version of the wBLCMP beamformer clearly outperforms its non-adaptive version in terms of objective speech enhancement performance measures and RTF vector estimation accuracy.
§ SIGNAL MODEL
We consider J acoustic sources captured by a binaural microphone array setup with M/2 microphones on each of two head-worn hearing devices (e.g. left and right hearing aid) in a noisy and reverberant acoustic environment (with J < M). Without loss of generality, the first source (j=1) is considered to be the target speaker and the remaining J-1 sources are considered to be interfering sources. The STFT coefficients of the microphone signals at time frame t are denoted as
𝐲_t = [ y_1,t ⋯ y_M,t ]^T∈ℂ^M× 1,
with (·)^T denoting the transpose operator. In (<ref>) the frequency index has been omitted since it is assumed that each frequency subband is independent and hence can be processed individually.
Similarly to <cit.>, the multi-channel microphone signal 𝐲_t in (<ref>) is modeled as the sum of each source signal s_j,t convolved with its possibly time-varying multi-channel CTF matrix 𝐀_j,t= [ 𝐚_j,t,0 ⋯ 𝐚_j,t,L_a-1 ]∈ℂ^M× L_a plus background noise 𝐧_t ∈ℂ^M× 1, i.e.
𝐲_t = ∑_j=1^J∑_l=0^L_a-1𝐚_j,t,l s_j,t-l + 𝐧_t,
where L_a denotes the number of taps of the CTF. By splitting the CTF into the early reflections and late reverberation using the integer parameter τ, the reverberant signal for the j-th source can be decomposed into its direct component 𝐝_j,t∈ℂ^M× 1 (including early reflections)
and its late reverberation component 𝐫_j,t∈ℂ^M× 1, i.e.
𝐲_t = ∑_j=1^J∑_l=0^τ-1𝐚_j,t,l s_j,t-l_𝐝_j,t + ∑_j=1^J∑_l=τ^L_a-1𝐚_j,t,l s_j,t-l_𝐫_j,t + 𝐧_t.
The direct component for the j-th source 𝐝_j,t can be approximated using the MTF vector 𝐯_j,t∈ℂ^M× 1 as <cit.>
𝐝_j,t≈𝐯_j,t s_j,t = 𝐯_j,m,t d_j,m,t, m ∈{1,...,M},
where d_j,m,t
denotes the direct component of the j-th source in the reference microphone m at time frame t.
The vector
𝐯_j,m,t = 𝐯_j,t / v_j,m,t∈ℂ^M× 1
denotes the possibly time-varying RTF vector for the j-th source, where v_j,m,t is the m-th entry of 𝐯_j,t.
§ SPARSE WBLCMP FILTER
To obtain an estimate
of the direct target speech component d_1,ν,t in the left and right
reference microphone denoted by m = ν∈{L,R}, it has been proposed in <cit.> to apply a convolutional filter 𝐡_ν,t∈ℂ^M(L_h-τ+1)× 1 to the stacked noisy STFT vector 𝐲_t, i.e.
d̂_1,ν,t = 𝐡_ν,t^H𝐲_t,
where (·)^H denotes the conjugate transpose operator and the stacked noisy STFT vector 𝐲_t is defined as
𝐲_t = [ 𝐲^T_t | 𝐲^T_t-τ ⋯ 𝐲^T_t-L_h+1 ]^T∈ℂ^M(L_h-τ+1)× 1,
where L_h denotes the filter length.
It should be noted that the vector 𝐲_t only includes a subset of the L_h most recent frames, i.e. it includes the current frame but excludes the preceding τ-1 frames, aiming at preserving the early reflections.
§.§ Non-Adaptive Version
By assuming that all CTF and MTF and the convolutional filter 𝐡_ν,t do not change over time, i.e. 𝐡_ν,t = 𝐡_ν for all time frames t∈{1,…,T}, a non-adaptive version of the wBLCMP beamformer aiming at joint dereverberation, noise and interferer reduction
has been derived in <cit.>.
In <cit.>, assuming that the direct component of the target speaker follows a zero mean complex Gaussian distribution with a time-varying variance λ_n=d_1,ν,n^2, the convolutional filter in (<ref>) is computed by minimizing the negative log-likelihood function
_𝐡_ν∑_n=1^Tlnλ_n+ d̂_1,ν,n^2/λ_n = ∑_n=1^Tlnλ_n+𝐡_ν^H𝐲_n^2/λ_n,
subject to a linear constraint for each source using their RTF defined in (<ref>), i.e.
𝐡_ν^H𝐯_j,ν = β_j ∀ j ∈{1,…,J}
𝐯_j,ν = [ 𝐯_j,ν^T 0^T ]^T,
where 0 denotes a vector containing M(L_h-τ) zeros and β_j denotes a scaling factor for the direct component of the j-th source. The scaling factor β_1 is usually set to 1, corresponding to a distortionless constraint for the target speaker, whereas all other scaling factors are usually chosen to be close to 0, aiming at suppressing the interfering sources.
In this paper, we aim at explicitly taking into account that the STFT coefficients of the direct target speech component are sparser than the STFT coefficients of the noisy reverberant mixture recorded by the microphones <cit.>.
Hence, similarly to the WPE variant in <cit.> and the WPD variant in <cit.>, we propose to minimize the convolutional filter in (<ref>) using an ℓ_p-norm cost function instead of (<ref>), i.e.
_𝐡_ν∑_n=1^Td̂_1,ν,n^p = ∑_n=1^T𝐡_ν^H𝐲_n^p
where p ∈ (0,2] denotes the so-called shape parameter. This parameter determines the sparsity of the cost function, where small values of p promote sparsity. It should be noted that for 0 < p < 1 this cost function is non-convex.
§.§ Adaptive Version
To deal with time-varying acoustic scenarios, e.g. moving sources, in this paper we derive an adaptive version of the wBLCMP beamformer. Similarly as in <cit.>, we propose to incorporate an exponential window into the cost function in (<ref>). The resulting minimization problem for each time frame t is given by
[box=]align
_𝐡_ν,t ∑_n=1^t γ^t-nd̂_1,ν,n^p = ∑_n=1^tγ^t-n𝐡_ν,t^H𝐲_n^p
s.t. 𝐡_ν,t^H𝐯_j,ν,t = β_j ∀j ∈{1,…,J},
where the smoothing parameter γ∈ (0,1] allows adaptation to possibly time-varying CTF and MTF. Note that the cost function in (<ref>) reduces to the cost function in (<ref>) for γ = 1 and t=T. Therefore, the following derivations based on the adaptive cost function in (<ref>) for the adaptive version also hold for the cost function in (<ref>) for the non-adaptive version.
§.§ Filter Optimization
Similarly as in <cit.>, we propose to use an IRLS procedure to minimize the cost function in (<ref>) subject to the constraints in (<ref>). The basic idea is to replace the non-convex ℓ_p-norm minimization problem with a series of convex ℓ_2-norm minimization subproblems, which have an analytic solution. In this paper we used only the first iteration of IRLS, since preliminary results indicated sufficient convergence.
§.§.§ Constrained -Norm Subproblem Minimization
test
In each frame, the non-convex cost function in (<ref>) is replaced with a convex weighted ℓ_2-norm cost function, i.e.
_𝐡_ν,t∑_n=1^tγ^t-nw_nd̂_1,ν,n^2 = ∑_n=1^Tγ^t-nw_n𝐡_ν,t^H𝐲_n^2
where the weights w_n are real-valued and positive. The filter minimizing (<ref>) subject to the linear constraints in (<ref>) is equal to
𝐡_ν,t = 𝐑_y,t^-1𝐂_t(𝐂_t^H𝐑_y,t^-1𝐂_t)^-1𝐁𝐂_t^H𝐞_ν,
where
𝐑_y,t = ∑_n=1^tγ^t-n w_n𝐲_n𝐲_n^H
denotes the weighted noisy STCM of the stacked microphone signals, 𝐂_t =[ 𝐯_1,ν,t ⋯ 𝐯_J,ν,t ] denotes the constraint matrix containing the RTF vectors for all sources, 𝐁 = diag([ β_1 ⋯ β_J ]^T) denotes the diagonal scaling matrix containing the scaling factors for all sources, and 𝐞_ν is a selection vector with its entry corresponding to the left or right reference microphone equal to 1 and all other entries equal to 0. Assuming that the weights w_n of past frames n∈{1,…,t-1} are well estimated during processing of these past frames, the weighted noisy STCM 𝐑_y,t in (<ref>) can be effectively computed by an recursive update in each frame, i.e. 𝐑_y,t = γ𝐑_y,t-1 +
w_t𝐲_t𝐲_t^H.
However, since only the inverse of the weighted noisy STCM is required in (<ref>) it is more effective to use an update formula for 𝐑_y,t^-1 based on the Woodbury matrix identity, i.e.
𝐑_y,t^-1 = 1/γ(𝐑_y,t-1^-1 - w_t𝐑_y,t-1^-1𝐲̅_t𝐲̅_t^H𝐑_y,t-1^-1/γ + w_t𝐲̅_t^H𝐑_y,t-1^-1𝐲̅_t)
§.§.§ Weight Estimation
test
Similarly as in <cit.>, in each frame t the weight w_t in (<ref>) is estimated as
w_t = ( ∑_νd̂_1,ν,t^2)^p/2-1 = ( ∑_ν𝐡_ν,t^H𝐲_t^2)^p/2-1,
such that (<ref>) is a first-order approximation of (<ref>). Note that the shape parameter p only affects the weight update in (<ref>) of the algorithm, where it is possible to set p=0.
§.§ RTF Estimation
The wBLCMP beamformer in (<ref>) requires estimates of the RTF for each source, which can be obtained using the covariance whitening method <cit.>. It has been shown in <cit.> that performing RTF estimation on multi-channel dereverberated signals 𝐳_t, obtained by a MIMO-WPE preprocessing stage, is beneficial, since the MTF-based model in (<ref>) assumes short transfer functions for the direct component. The block diagram in Fig. <ref> shows an overview of the complete algorithm. Note that the computation time is not significantly increased by the MIMO-WPE preprocessing stage, since the wBLCMP filter can be effectively computed using the MIMO-WPE filter, because both are based on the convolutional signal model in (<ref>) and can be derived using the ℓ_p-norm cost function in (<ref>) <cit.>. The RTF vector of the j-th source can then be estimated based on the generalized eigenvalue decomposition of the dereverberated covariance matrix 𝐑_j,t of that source and the dereverberated covariance matrix 𝐑_v,j,t of all other sources and the background noise. Since accurately estimating all of these covariance matrices is far from trivial, in this paper, we will assume oracle knowledge about a noise-only period and a noise-plus-interferer period in the beginning of the signal, which are used to compute fixed covariance matrices of an interfering source and noise. In contrast, the covariance matrix and RTF vector of the target are tracked.
§ EXPERIMENTAL RESULTS
In this section, we compare the performance of the proposed adaptive version of the wBLCMP beamformer (Sec. <ref>) with the non-adaptive version (Sec. <ref>) using different shape parameters p for a spatially non-stationary acoustic scenario where the target speaker suddenly switches position.
§.§ Acoustic Scenario
We considered 2 BTE hearing aids with 2 microphones each, mounted on a dummy head located approximately in the center of an acoustic laboratory (7×6×2.7) with a reverberation time T_60≈510.
The acoustic scenario consists of one target speaker (which suddenly switches position), one interfering speaker (at a fixed position) and background noise. The target and interfering speech components at the microphones were generated by convolving clean speech signals with room impulse responses measured from loudspeakers at about 2 from the dummy head. The target speaker at position 1 (0, front of dummy head) is a male speaker which is active in the interval [2,20.4], whereas the target speaker at position 2 (90, right of dummy head) is a female speaker which is active in the interval [20.4,39]. The interfering speaker is a male speaker which is located at -120 and is active in the interval [1,39].
Quasi-diffuse babble noise, which is constantly active, was generated by playing back cafeteria noise
using 4 loudspeakers facing the corners of the laboratory.
The noisy mixture is constructed at a broadband SNR of 0 and a broadband SIR of 0 for both target positions. Note that there is a noise-only period in the 1^st second and a noise-plus-interferer period in the 2^nd second.
The sampling frequency was equal to 16.
§.§ Algorithm Settings
We applied the wBLCMP beamformer within an STFT framework with a frame length of 32, a frame shift of t_s = 16 and a sqrt-Hann window for analysis and synthesis. We compared the performance of two shape parameters p={0,0.5}, since it has been shown in <cit.> that a shape parameter of p=0.5 can be beneficial. The filter length L_h in (<ref>) was set to 16 frames corresponding to 256 covering about half of the T_60. The prediction delay τ was set to 3 frames corresponding to 48 aiming at preserving the early reflections.
The scaling factors of the target speaker and the interfering source in (<ref>) were set to β_1 = 0dB and β_2 = -20, respectively. Since preliminary results indicated reasonable convergence after the initial iteration of the alternating optimization described in Sec. <ref>, we chose to stop after the first iteration to reduce computational cost. For the adaptive versions, different time constants are evaluated between t_γ = [100, 1500]. The smoothing parameter γ can be computed using the time constant as γ = e^-t_s/t_γ. The noise-plus-interferer covariance matrix 𝐑_v,2 and RTF vector of the interfering source 𝐯_2,ν are fixed after the first 2, whereas the covariance matrix and RTF vector of the target speaker are adaptively tracked.
§.§ Objective Speech Enhancement Measures
As objective performance measures we used the FWSSNR <cit.>, and the SRR <cit.> averaged across the left and right output signal.
As reference signal for FWSSNR and SRR we used the direct target speech component including early reflections (first 50 of the RIR) at the reference microphones.
In addition, we evaluate the RTF vector estimation accuracy based on the Hermitian angle
φ = acos( ṽ̂_j,t^Hṽ_j,t/ṽ̂_j,tṽ_j,t)
between the estimated RTF vector ṽ̂_j,t of the target speaker and the oracle RTF vector ṽ_j,t averaged across frequency bands. The Hermitian angle φ is a scale-invariant error measure for complex vectors, with lower values indicating smaller errors. The oracle RTF vectors are computed as the principal eigenvector of the covariance matrices of a white noise signal convolved with the early part (50) of the respective multi-channel RIR of the target speaker. Note that for each target speaker position there is a unique oracle RTF vector.
§.§ Results
Fig. <ref> compares the FWSSNR and SRR improvements (difference between scores for input and output signals) for different time constants t_γ of the adaptive and non-adaptive version of the wBLCMP beamformer using two different shape parameters p={0,0.5}. It can be clearly observed that for the considered switching-target scenario the adaptive version of the wBLCMP beamformer outperforms the non-adaptive version in both performance measures for almost all time constants. The best SRR improvement is obtained using a time constant of roughly t_γ = 450, whereas the FWSSNR improvement is higher for shorter time constants. Using the shape parameter p=0.5 yields better SRR improvements especially for larger time constants, whereas using the shape parameter p=0, corresponding to the conventional cost function in (<ref>), yields slightly better FWSSNR improvements.
For the adaptive and the non-adaptive version Fig. <ref> shows the average Hermitian angle between the oracle RTF vector of the active target speaker and the estimated target RTF vector. Note that the non-adaptive version only provides one RTF vector estimate for the whole signal in contrast to the adaptive version which estimates the RTF vector of the target speaker in each time frame. It can be observed that the adaptive wBLCMP beamformer outperforms the non-adaptive version in almost all time frames in terms of RTF vector estimation accuracy.
§ CONCLUSION
In this paper, we derived an adaptive version of the wBLCMP beamformer capable of tracking a moving target speaker in a noisy environment with interfering sources. In addition we generalized the conventional method using sparse priors. The evaluation in terms of objective performance measures clearly shows that the adaptive version outperforms the non-adaptive version in the considered acoustic scenario. This can be explained partly by the ability to track the time-varying RTF vector and covariance matrix of a moving target speaker.
IEEEtran
|
http://arxiv.org/abs/2303.06765v1
|
20230312220245
|
Closed-form analytical solution for the transfer matrix based on Pendry-MacKinnon discrete Maxwell's equations
|
[
"Ovidiu-Zeno Lipan",
"Aldo De Sabata"
] |
physics.optics
|
[
"physics.optics",
"physics.class-ph"
] |
APS/123-QED
[email protected]
Department of Physics, Gottwald Center for the Sciences 138 UR Drive, University of Richmond, Richmond, VA 23173, USA
Department of Measurements and Optical Electronics, Politehnica University of Timisoara, 300006 Timisoara, Romania
Pendry and MacKinnon meaningful discretization of Maxwell's equations was put forward specifically as part of a finite-element numerical algorithm. By contrast with a numerical approach, in the same spirit evoked by the relationships between the difference and the differential equations, we provide an analytical solution for the transfer matrix elements generated by this discretization of Maxwell's equations. The method, valid for all modes and any non-magnetic pattern with frequency-dependent permittivities, is exemplified for a bilaminar structure. The results from hundreds of path-operators simplify to a small number of propagation channels, which transfer the electromagnetic field between input and output. A specific bilaminar device is design-optimized and used to generate a topological map from permittivities to the number of modes and very high Q-factor resonances.
PACS Numbers
78.67.Pt, 42.25.Fx
Closed-form analytical solution for the transfer matrix based on Pendry-MacKinnon discrete Maxwell's equations
Aldo De Sabata
March 30, 2023
==============================================================================================================
§ INTRODUCTION
What follows came about as an overlap of a present technological need with a perennial scientific quest. The current need is represented by photonic devices based on thin laminae, be they in the form of waveguides for augmented reality <cit.>, <cit.> or of frequency-selective surfaces for the 5 and 6G networks <cit.>, of wearable applications <cit.> or of surface wave-mediated sensing applications <cit.>, <cit.>. The perennial quest is to understand the interplay between discrete and continuous models <cit.>, <cit.>. The focus on this association has varied since the 19th century, <cit.>, piquing the interest of many in, for example, the theory of solitons <cit.>, universality in chaos <cit.>, <cit.>, fractals <cit.>. The manifestation that interests us is the relationship between the difference and the differential equations. For example, the discrete version of the equation of Korteweg and de Vries for soliton wave motion,<cit.>, shows a distinct asymmetric richness since it contains a series of universal properties that are not readily visible in the continuum. Particularly, the discrete form of soliton equations proposed by Hirota <cit.>,<cit.> is connected with quantum integrable systems <cit.>, <cit.>.
It is essential to emphasize that it is not at all trivial to discretize an equation in a way that preserves the prime properties of the original continuous equation.
Pendry and MacKinnon obtained a meaningful discretization of Maxwell's equations <cit.> on a carefully chosen simple cubic lattice <cit.>, by retaining the essential properties of the longitudinal modes present in the continuum. This discretization was put forward specifically as part of a finite-element numerical algorithm <cit.>.
By contrast with a numerical approach, in the same spirit evoked by the relationships between the difference and the differential equations, we asked the question of whether a complete analytical solution can be found to the transfer matrix of the Pendry and MacKinnon discrete Maxwell's equations.
The transfer matrix, <cit.>, is widely used well beyond the study of the propagation of electromagnetic fields <cit.>, <cit.>.
Its common appearance is in the form of a 2× 2 matrix, reduced to one propagation mode <cit.>, <cit.>,<cit.>.
However, we are looking here for an analytical solution for the transfer matrix that is valid for any non-magnetic pattern and that has to encompass all Bloch-Floquet modes, either propagative or evanescent. As a consequence, our procedures differ from those employed in theories where the number of parameters are few and symmetries are many, <cit.>,<cit.>.
In the ensuing sections we derive this analytical solution and present the techniques we used, noteworthy among them being the definition of path-operators, Fig.<ref>, and the appearance of propagation channels for the transfer of the electromagnetic field between input and output, Fig.<ref>. This analytical solution is valid for filling the lattice's nodes with frequency-dependent non-magnetic isotropic material of any kind. We present the general solution for two laminae, although the method can be extended to additional laminae.
To be more specific, in Sections <ref> and <ref> we rewrite the Pendry and MacKinnon discrete version of Maxwell's equations to take shape in a tensor product of two 2-dimensional linear spaces, (<ref>) to (<ref>) and (<ref>) to (<ref>). As a consequence, the electromagnetic states and the propagation operators are decomposed as a tensor product, (<ref>). This course of action proves to be essential in simplifying a large volume of analytic computations.
Sections <ref> and <ref> are dedicated to the discrete dispersion relation in vacuum and to the on-shell scattering method, <cit.>, from which a function along the z-coordinate is extracted, (<ref>). The Bloch-Floquet periodic boundary conditions along the x and y axes, but not along z, are introduced in Section <ref>. The building up of the transfer matrix from its elements is covered in Section <ref>.
A key step towards the solution, the path-operators, is defined and discussed in Section <ref>. The summation over the entire set of path-operators greatly simplifies the transfer matrix to reveal that the propagation run along a small number of channels, Section <ref>.
To concretize the proposed method, which hinges on path-operators and channels, we completely solve for the transfer matrix elements of a bilaminar structure. The presentation of the solution starts in Section <ref> from a bird's eye view, and dives into the details in Sections <ref> and <ref>. The classification of the channels by the input-output polarization and the direction of propagation is summarized in Table <ref>, Figs.<ref> and <ref> and Appendix B.
In Section <ref> we segue into the continuum limit, and then apply it to the specific bilaminar pattern from Fig.<ref>.
The limit is in the x and y directions and it reveals that channels can be classified by a set of universal functions. It also calls for computing 2-dimensional Fourier integrals of products of these functions, each function's argument being defined by the permittivities of a lamina, Section <ref> and <ref>. For polygonal tessellated laminae, Section <ref>, these integrals can be computed in a closed form, Section <ref> and <ref>. The formulas contain a gauge freedom and are arranged as a sum of terms over the vertices of the tessellated polygons. These terms hold all the information about the non-magnetic materials and the geometric orientations of the structure, as can be seen in (<ref>).
Lastly, from the formulas for the transfer matrix, an optimization procedure is devised in Section <ref> to create a dielectric bilaminar structure, Fig.<ref>, on which Bloch-Floquet modes propagate along the laminae with large amplitudes, being evanescent in the z-direction <cit.>. These resonances display a series of relevant properties. One is the robustness with respect to the change of the dielectric constants, Section <ref>. The resonant frequencies are located close to the zeroes of the diagonal elements of the transfer matrix. As the dielectric permittivities pass through different values, the zeroes are created or disappear allowing us to define a topological map that counts the number of resonant modes, Fig.<ref>.
On a separate note, in Section <ref> and <ref> we find that the same bilaminar structure, but with specifically selected dielectric constants, resonates with a very large Q-factor, Fig.<ref>. Finally, in Section <ref>, the complete analytical formula offers the possibility to obtain the Fano-Lorentz spectral line shape for a resonant mode, <cit.>,<cit.>, through a zero-pole approximation (<ref>), in the complex frequency plane Fig.<ref>.
§ DISCRETE MAXWELL'S EQUATIONS ON A LATTICE
Space is an orthogonal lattice with lattice constants a,b and c on the x,y and z directions, respectively. The z-axis is singled-out as the propagation axis for the transfer matrix. The discrete space is thus viewed as a sequence of x,y-parallel planes labeled by the z-axis coordinate. The discrete position vector is n=(a n_x,b n_y,c n_z)=(n_⊥,c n_z), where the notation n_⊥=(a n_x,b n_y) emphasizes the decomposition of the space as a collection of planes perpendicular to the z-axis, as in <cit.>. If there is a preference to view the collection of planes as central, then ⊥ should be changed to ∥ everywhere in the paper. At each point of the lattice, the electromagnetic field is described by six components, E and H. The material attached to each lattice point is characterized by two discrete scalar fields which connect D to E and B to H, respectively:
D = ϵ_0ϵ(n_⊥,c n_z)E,
B = μ_0μ(n_⊥,c n_z)H.
In the discrete electrodynamics that we are taking forward, the ∇ operator becomes a pair, (T^E ,T^H ), of lattice operators, where T^E=(T_x^E(a),T_y^E(b),T_z^E(c)) and T^H=(T_x^H(a),T_y^H(b),T_z^H(c)). These discrete operators are defined by their action on a lattice scalar function f(n). For the x-axis
T_x^E(a)f(n) =(i a)^-1(f(n+a x̂)-f(n)),
T_x^H(a)f(n) =-(i a)^-1(f(n-a x̂)-f(n)).
with (y,b) and (z,c) taking place of (x,a), for the other axes.
The Maxwell's equations on the lattice are
T^E ×E = Γ_H^-1H^' ,
T^H×H^' = Γ_E^-1E,
where
Γ_H^-1 = -iω^2 ϵ_0μ_0 μ(n_⊥,c n_z) c,
Γ_E^-1 = -i ϵ(n_⊥,c n_z)c^-1,
H^' = i(ωϵ_0 c)^-1H.
Eliminating E_z and H^'_z from Maxwell's equations, the propagation of the 4-dimensional vector field
|F(n_⊥,n_z)⟩=
[ E_x(n_⊥,c n_z); E_y(n_⊥,c n_z); H^'_x(n_⊥,c n_z); H^'_y(n_⊥,c n_z) ]
is carried on, as usual, by two operators. The first operator O_E, (<ref>), advances only the E-components Fig.(<ref>)
[ E_x(n_⊥,c n_z); E_y(n_⊥,c n_z); H^'_x(n_⊥,c n_z); H^'_y(n_⊥,c n_z) ] [ E_x(n_⊥,c n_z+c); E_y(n_⊥,c n_z+c); H^'_x(n_⊥,c n_z); H^'_y(n_⊥,c n_z) ].
The material properties Γ_H and Γ_E embedded in the O_E matrix elements depend only on the spatial position n located on the plane n_z. The operator O_E acts on the internal index α of the vector field F_α, (<ref>), as a 4 by 4 matrix multiplication, whereas the matrix elements of O_E are operators on the external space variable n_⊥ of the field, but not on the n_z-position.
The E-step carried by O_E is followed by an H-step carried by O_H
[ E_x(n_⊥,c n_z+c); E_y(n_⊥,c n_z+c); H^'_x(n_⊥,c n_z); H^'_y(n_⊥,c n_z) ] [ E_x(n_⊥,c n_z+c); E_y(n_⊥,c n_z+c); H^'_x(n_⊥,c n_z+c); H^'_y(n_⊥,c n_z+c) ].
In contrast to O_E, the material properties Γ_H and Γ_E for the O_H matrix elements depend on the spatial position on plane n_z+1.
The complete propagation from the plane located at n_z to the one located at n_z+1 is accomplished by O_H(n_⊥,c n_z+c) O_E(n_⊥,c n_z).
It is apparent from the structure of the operators O_E and O_H that the internal 4-dimensional space can be viewed as a tensor product of two 2-dimensional spaces. This decomposition proves to be efficient in classifying different paths taken by the electromagnetic propagation through materials, which will be one of our main instruments to obtain closed analytic formulas for the transfer matrix elements. So, departing from <cit.>, the path viewpoint is expressed by writing the operators as
O_E (n_z) = O_E^(1)+O_E^(2)+O_E^(3),
O_E^(3) = 1⊗1,
O_E^(2) = I_E⊗σ_2 Γ_H^-1(-c),
O_E^(1) = I_E⊗|T_E⟩Γ_E ⟨T_E|σ_2(-c),
where σ_2 is the Pauli matrix and
1=[ 1 0; 0 1; ] ,
I_E=[ 0 1; 0 0; ] ,
I_H=[ 0 0; 1 0; ].
The ket and the bra operators form (<ref>) act on the internal space as 2-dimensional vectors and on the external space variable n_⊥ as operators on functions
|T_E⟩=[ T_x^E; ; T_y^E ] ,
⟨T_E|=[ T_x^H T_y^H ].
The ket to bra conjugation is defined as the change of E into H. There is no additional conjugation over the complex unit i. The labels, as is usually the case, do not change under conjugation.
Similarly, but different to the E-step, the operator for the H-step is
O_H(n_z+1) = O_H^(1)+O_H^(2)+O_H^(3),
O_H^(3) = 1⊗1,
O_H^(2) = I_H⊗σ_2 Γ_E^-1(-c),
O_H^(1) = I_H⊗|T_H⟩Γ_H ⟨T_H|σ_2(-c),
|T_H⟩=[ T_x^H; ; T_y^H ],
⟨T_H|=[ T_x^E T_y^E ].
Concordant to the tensor product decomposition of the operators, the field will be represented also as a tensor product,
|F(n_⊥,n_z)⟩=
|e⟩⊗[ E_x(n_⊥,c n_z); E_y(n_⊥,c n_z) ]+|h⟩⊗ [ H^'_x(n_⊥,c n_z); H^'_y(n_⊥,c n_z) ],
where the 2-dimensional vectors |e⟩ and |h⟩,
|e⟩=[ 1; ; 0 ] ,
|h⟩=[ 0; ; 1 ],
select the electric part (E_x,E_y) and the magnetic part (H^'_x,H^'_y) of the 4-dimensional vector (E_x,E_y,H^'_x,H^'_y), respectively.
§ BASIS VECTORS FOR FIELDS ON A LATTICE
The solutions to Maxwell's equations on a lattice filled with a homogeneous medium, i.e. constant Γ_H(n_⊥,c n_z)=Γ_H and Γ_E(n_⊥,c n_z)=Γ_E, are plane waves.
These solutions, |Ψ_S/P,p_⊥^±⟩ e^± i p_z n_z c e^- i ω t, are distinguished by the type of polarization S or P and by the direction of propagation ± along the positive or negative z-direction. Here
|Ψ_S/P,p_⊥^±⟩=|p_⊥,S/P,±⟩e^i p_⊥ n_⊥,
with the propagation in the (x,y)-plane described by p_⊥=(p_x,p_y).
The internal 4-dimensional vectors of the plane waves are
|p_⊥,S,+⟩ =|e⟩⊗ i σ_2 |p_⊥^H⟩+|h⟩⊗|p_⊥^H⟩Γ_H k_z^E,
|p_⊥,P,+⟩ =|e⟩⊗|p_⊥^E⟩Γ_E k_z^H+|h⟩⊗ i σ_2 |p_⊥^E⟩,
where, consistent with (<ref>) and (<ref>), the column vectors |p_⊥^E⟩ and |p_⊥^H⟩ are the transpose and E⇄ H conjugate of the row vectors ⟨p_⊥^E|=[k_x^H,k_y^H] and ⟨p_⊥^H|=[k_x^E,k_y^E], respectively.
The space being discrete, the plane wave depends on the lattice constants (a,b,c) through the vectors k^E=(k_x^E,k_y^E,k_z^E) and k^H=(k_x^H,k_y^H,k_z^H),
k_x^E = (i a)^-1(e^i a p_x-1),
k_x^H = -(i a)^-1(e^-i a p_x-1),
with the pairs (b,p_y) and (c,p_z) instead of (a,p_x), for the other axes. To obtain the other two basis vectors, |p_⊥,S/P,-⟩, change k_z^E from |p_⊥,S/P,+⟩ into - k_z^H.
To derive the transfer matrix elements, the field (<ref>), at a given n_z, is decomposed in the basis |Ψ_S/P,p_⊥^±⟩. The decomposition is carried out by projecting on an orthogonal set of bra vectors (<ref>)
⟨Φ_S/P,p_⊥^±|=⟨p_⊥,S/P,±|e^-i p_⊥ n_⊥,
where
⟨p_⊥,S,+| =-⟨e|⊗⟨p_⊥^H|i σ_2 k_z^H+⟨h|⊗⟨p_⊥^H|Γ_H^-1,
⟨p_⊥,P,+| =⟨e|⊗⟨p_⊥^E|Γ_E^-1-⟨h|⊗⟨p_⊥^E|i σ_2 k_z^E.
Multiply ⟨p_⊥,S/P,+| by -1 and change k_z^H into -k_z^E to attain ⟨p_⊥,S/P,-|. The orthogonal basis is not normalized. The norm, ⟨p_⊥^H||p_⊥^H⟩( k_z^H+k_z^E)=⟨p_⊥^E||p_⊥^E⟩( k_z^E+k_z^H), is invariant to E⇆ H conjugation.
§ DISPERSION RELATION FOR A HOMOGENEOUS MEDIUM
The requirement that the plane wave basis satisfy Maxwell's equations on the lattice filled with a homogeneous medium imposes that
-(Γ_H Γ_E)^-1=⟨p_⊥^H||p_⊥^H⟩+k_z^E k_z^H.
This is the dispersion relation for the homogeneous medium
ω^2/v_0^2=k_x^E k_x^H+k_y^E k_y^H+k_z^E k_z^H,
where the velocity of light in that medium is v_0.
Through the following c-scaling
ω/v_0=Ω/c=2 π/λ,
the dispersion relation is written in terms of a unitless frequency Ω
Ω^2/c^2=k_x^Ek_x^H+k_y^Ek_y^H+k_z^Ek_z^H,
which will become useful for expressing the transfer matrix elements in terms of unitless parameters.
Note that the term k_x^Ek_x^H+k_y^Ek_y^H, which is equal to ⟨p_⊥^E||p_⊥^E⟩=⟨p_⊥^H||p_⊥^H⟩, tends in the continuum limit a → 0,b→ 0 to p_x^2+p_y^2. In what follows, we use vacuum as the homogeneous medium for the basis. Interchangeably, this medium will be called also as the reference medium for the basis.
§ SOLVING FOR Φ _Z=E^I C P_Z FOR GIVEN Ω, P_X AND P_Y
The approach in <cit.> is to work on-shell which means solve the dispersion relation for p_z, given the frequency Ω and p_⊥.
To this end, we introduce the function φ _z
φ _z=e^i c p_z,
which is the solution to the equation
φ _z+φ _z^-1=2ζ,
where
ζ=1-Ω^2/2+c^2/2⟨p_⊥^H||p_⊥^H⟩.
There are two distinct and non-overlapping constraints that we impose on p_z from (<ref>). One condition is Im(p_z)⩾ 0 so that evanescent waves generated away from sources placed at z=-∞ or at z=∞ are represented by a decaying φ_z or φ_z^-1, respectively. The other condition is p_z⩾0 enforcing the velocity of propagating waves coming from z=-∞ or z=∞ to be oriented along ẑ or
-ẑ, respectively. The formal solution to the equation (<ref>), φ_z=ζ±√(ζ^2-1)
divides the real axis into three intervals, (-∞,-1), (-1,1) and (1,∞). The requirement Im(p_z)⩾0 for the interval (-∞,-1) selects the φ_z=ζ - √(ζ^2-1)
but does not impose specific values for φ_z on (-∞,-1). Both walks in the ζ-complex plane above or below (-∞,-1) satisfy Im(p_z)⩾ 0.
The second constrain, p_z⩾ 0, requires the values of φ_z on (-1,1) to be those obtained from walking below the segment (-1,1). For the last interval the constrain Im(p_z)⩾ 0 is fulfilled and, like for (-∞,-1), we are free to define φ_z on (1,∞) from walking above or below the interval.
We opt to construct a function φ_z continuous from below, Im(ζ)⩽ 0, and so select the values of φ_z on the real axis by walking below it in the ζ-complex plane.
This analysis leads to the following solution
φ_z(ζ)=ζ-√(ζ^2-1)e^i/2(arg(ζ-1)+arg(ζ+1)).
The arg(ζ) takes values on [-π,π) in such a way that arg(ζ)=-π if Im(ζ)=0 and ζ<0.
In Fig.<ref> the point φ_z=1 defines the Rayleigh frequency, at which, for a given p_⊥, the waves turn from evanescent to propagating.
§ PERIODIC BOUNDARY CONDITIONS
Consider that the electromagnetic field is subjected to the Bloch-Floquet boundary conditions
|F(n_⊥+(a,0)L_x,c n_z)⟩= e^2π i ξ_x |F(n_⊥,c n_z)⟩,
|F(n_⊥+(0,b)L_y,c n_z)⟩= e^2π i ξ_y |F(n_⊥,c n_z)⟩,
where L_x⩾ 2 and L_y⩾ 2 are two integer numbers selected to describe the dimensions of a unit cell in the (x,y)-plane. The material properties are taken to be periodic from one unit cell to another
Γ_H(n_⊥+(a,0)L_x,n_z) = Γ_H(n_⊥,n_z)
Γ_H(n_⊥+(0,b)L_y,n_z) = Γ_H(n_⊥,n_z)
with a similar periodicity for Γ_E. The Bloch-Floquet boundary condition reduces the possible values for (p_x,p_y) to
p_x = 2 πM_x/a L_x+ 2 πξ_x/a L_x,
p_y = 2 πM_y/b L_y+ 2 πξ_y/b L_y,
where M_x=0,1,…,L_x-1 and M_y=0,1,…,L_y-1, with 0⩽ξ_x<1, 0⩽ξ_y<1.
The indices of the basis, written as |ψ_POL,BF^DIR⟩, are thus of four categories. The first, POL, is the polarization index, which takes two values S and P. The second, DIR, is the direction of propagation of the plane wave along the z-axis, which also take two values, + and -. The third, BF, is the Bloch-Floquet index consisting of pairs of integer numbers (M_x,M_y) and it takes a finite number of values. The last index, (ξ_x,ξ_y) takes only one value and can be viewed as a label for the entire Bloch-Floquet linear basis.
The parameters (ξ_x,ξ_y) specify the direction of the wave in the (x,y)-plane. For example, if the direction of the incoming mode (M_x=0,M_y=0) is stated in spherical coordinates by the angles (θ,φ), then the parameterization of ξ_x and ξ_y is
sin(πξ_x/L_x) = a Ω/2 csin(θ) cos(φ),
sin(πξ_y/L_y) = b Ω/2 csin(θ) sin(φ),
sin(1/2c p_z) = c Ω/2 ccos(θ).
The first two equations give ξ_x,ξ_y for chosen θ, φ and Ω, whereas the third equation solves for p_z.
§ TRANSFER AND SCATTERING MATRICES
To go ahead and propagate from the IN plane located at n_z to the OUT at n_z+L_z, decompose the IN and OUT fields in the plane wave basis, (<ref>), labeled as |ψ_pol,bf^dir⟩ and |ψ_POL,BF^DIR⟩, respectively. The z-phases, e^± i p_z^IN n_z and e^± i p_z^OUT (n_z+L_z), which are not included in the basis, are generated by the operators and so they do appear in the transfer matrix elements.
The transfer matrix elements are defined in (<ref>) as the factors that connect the coefficients of the |F^IN(n_⊥,n_z)⟩ and |F^OUT(n_⊥,n_z+L_z)⟩ fields decomposed in the reference medium plane wave basis
C_POL,BF^DIR=∑(T^DIR;dir_POL,BF;pol,bf ) C_pol,bf^dir ,
the sum being over indices (dir,pol,bf) related to the IN parameters.
The transfer matrix elements T in (<ref>) borrow, from the basis, all four index categories.
Building a matrix out of the T-coefficients of (<ref>) requires a map from the 2-dimensional Bloch-Floquet index (M_x,M_y) to a 1-dimensional integer index m=1,2,⋯, L_x L_y. We use the Rayleigh frequency of (M_x,M_y) to both map and order the Bloch-Floquet index. If the Rayleigh frequency of (M_x,M_y) is less than the Rayleigh frequency of (M_x^',M_y^') we order the Bloch-Floquet indices as (M_x,M_y)<(M_x^',M_y^'). If two distinct Bloch-Floquet modes have the same Rayleigh frequency, the order used is the lexicographic order. Note that this ordering depends on (ξ_x,ξ_y). The mode (M_x,M_y)=(0,0) has f_Rayleigh=0 and it is mapped into m=1. The next f_Rayleigh > 0 is mapped into m=2 and so on Table<ref> from Appendix I.
The process of building the transfer matrix out of its elements starts with all 2× 2 matrices
T^-,-_m,n= (
[ T^-,-_Sm,Sn T^-,-_Sm,Pn; T^-,-_Pm,Sn T^-,-_Pm,Pn; ])
constructed for each pair (m,n).
These matrices contain the information about the transfer, through the device, of the mode n with a negative direction present at IN into the mode m, also with a negative direction but located at OUT.
From these 2× 2-matrices, construct the transfer matrix T^-,- by letting the Bloch-Floquet indices m and n run from 1 to L_x L_y
T^-,-= (
[ T^-,-_1,1 T^-,-_1,2 T^-,-_1,3 ⋯; T^-,-_2,1 T^-,-_2,2 T^-,-_2,3 ⋯; T^-,-_3,1 T^-,-_3,2 T^-,-_3,3 ⋯; ⋯ ⋯ ⋯ ⋯; ]).
Once all four matrices T^-,-, T^-,+, T^+,-, T^+,+ are constructed in a similar manner, the complete transfer matrix appears as
T(ξ_x,ξ_y)= (
[ T^+,+ T^+,-; T^-,+ T^-,-; ]),
where (ξ_x,ξ_y) are explicitly written here to remind us of their role.
The elements of the scattering matrix can now be obtained from the complete transfer matrix. The input and output have a different meaning for the scattering matrix than OUT and IN have for the transfer matrix. Instead of "DIR/dir", for the scattering matrix we use a position index, which is either min or max depending on the position on the z-axis of the field |F⟩, at z=n_z or at z=n_z+L_z, respectively. The polarization and the Bloch-Floquet indices remain the same.
The well-known procedure to obtain the scattering matrix, <cit.>,
t(ξ_x,ξ_y)= (
[ t^max,min t^max,max; t^min,min t^min,max; ]),
requires the inverse of the transfer matrix T^-,-
t^min,max = (T^-,-)^-1,
t^min,min = -t^min,maxT^-,+,
t^max,max = T^+,-t^min,max,
t^max,min = T^+,++t^max,maxT^-,-t^min,min.
§ PROPAGATION BY PATH-OPERATORS
The transfer matrix elements
(<ref>) can be written in terms of the propagation operator
T^DIR; dir_POL,BF; pol,bf= OUT^-1(L_xL_y)^-1∑_-5mu n_⊥
⟨ϕ_POL,BF^DIR|Operator|ψ_pol,bf^dir⟩,
where the normalization in the internal space and the Operator are
OUT=⟨p^H,OUT_⊥||p^H,OUT_⊥⟩(k_z^H,OUT+k_z^E,OUT),
Operator=O_H(n_z+L_z)O_E(n_z+ L_z-1)
…
O_H(n_z+1)O_E(n_z).
The common approach, also followed by <cit.>, is to place the resolution of identity between every pair of O_HO_E operators in the product (<ref>). Within this procedure, for a stack of laminae we need to multiply a set of large-dimensional transfer matrices, one for each lamina. This implies that to grasp one desired transfer matrix element of the stack we actually need to compute all elements, which can be computationally taxing, at both levels, theoretical or numerical. Furthermore, the advantage of using a sequence of matrix products is diminished by numerical instabilities and, potentially, by approximating a large-dimensional transfer matrix by a smaller one.
To avoid using products of matrices we develop a different procedure, which, to the best of our knowledge is new in the context of transfer matrices for non-homogeneous permittivity and permeability materials.
To exemplify, consider |ψ_pol,bf^dir⟩=|p_⊥^IN,S,+⟩ e^i p_⊥^IN n_⊥ at IN and ⟨ϕ_POL,BF^DIR|=⟨p_⊥^OUT,S,+| e^-i p_⊥^OUT n_⊥ at OUT in (<ref>).
There are several decisive moments in this manuscript. One is here, where we decide to expand the product operator as a sum of path-operators. Namely, since each O_E and O_H is a sum of there operators, (<ref>) and (<ref>), (<ref>) becomes a sum of 3^L_z+1 terms O_H^(j)O_E^(k)… O_H^(m)O_E^(n), parameterized by a path (INn,m,…,k,jOUT), where each index takes three values. Each path can be represented graphically, like in Fig.<ref>, by associating a j ∙ and a j ∘ to O_E^(j) and O_H^(j), respectively.
For example, the path-operator O_H^(2)O_E^(3)O_H^(2)O_E^(1)O_H^(2)O_E^(1) for the path IN121232OUT is represented in Fig.<ref>
§ CHANNELS
The transfer matrix element is thus a sum over path-operators
OUT^-1(L_xL_y)^-1∑_paths∑_n_⊥e^-i p_⊥^OUT n_⊥
⟨p_⊥^OUT,S,+|path-operator|p_⊥^IN,S,+⟩ e^i p_⊥^IN n_⊥.
We continue with the chosen example where S+ is placed at both IN and OUT. However, the liberty of choosing any pair of polarization and direction at both IN and, independently, OUT, is manifestly visible in (<ref>).
To proceed further, the tensor product decomposition of both the basis and the operators proves to be very useful. Each element of the basis, (<ref>), is a sum of two parts, the e-part and the h-part, that contains |e⟩ and |h⟩, respectively. The same kind of decomposition is valid for the path-operator, where there is an I_E-part and an I_H-part in (<ref>) and (<ref>). Due to these decompositions, the tensor product in ⟨p_⊥^OUT,S,+|path-operator|p_⊥^IN,S,+⟩ splits as a product of two factors. The first factor is of the form ⟨e|I_H I_E I_2I_HI_1⋯ I_E|h⟩, and alike versions. It can take only two values, 0 or 1. For each non-zero path that survives this first-factor selection, we must compute the second factor, which contains the material properties. For this paper we confine ourselves to non-magnetic materials.
The structure of the second factor is of the form ⟨p_⊥^H,OUT||T_E⟩Γ_Pσ_2⋯|p_⊥^E,IN⟩, which, drawing on ⟨T_E|σ_2|T_H⟩ e^i p_⊥· n_⊥=0, offers a second zero-selection procedure. Moreover, the second factor, for those paths that are overall non-zero, admits, as well, a pleasing and advantageous factorization into two terms. One term, call it the 𝒵-term, is a function of (p_z^IN,p_z^OUT,Ω) but not on the materials parameters, whereas the other, call it the XY-term, depends on p_⊥^IN and the deposited materials.
This factorization is crucial in simplifying the final result for the transfer matrix because, fortunately, the XY-term is common to a group of paths.
We will call a channel a subset of paths, which have the same XY-term. The main significance is that the number of channels is much smaller than the number of non-zero paths, substantially reducing the final analytical expression for a transfer matrix element. Furthermore, the 𝒵-term of a channel, which is the sum of the 𝒵-terms of the paths that belong to that channel, simplifies into products of φ_z-dependent factors.
The technique to separate a 𝒵-term from an XY-term is to forward-propagate the input phase e^i p_⊥^IN· n_⊥ and backward-propagate the output phase e^i p_⊥^OUT· n_⊥, both through the chain of path-operator product. These propagations are carried through the path-operator by using the general relation
∑_n_⊥e^-i p_⊥^OUT· n_⊥ f_OUT (n_⊥)(|T_E/H⟩(f_IN (n_⊥)e^i p_⊥^IN· n_⊥))=
∑_n_⊥(-|T_H/E⟩(e^-i p_⊥^OUT· n_⊥ f_OUT (n_⊥)))f_IN (n_⊥)e^i p_⊥^IN· n_⊥.
For the specific aim of splitting-up the 𝒵 from the XY-factor, the forward-propagation proceeds as long as f_IN (n_⊥) is a constant independent of n_⊥. With or without the use of (<ref>), a trivial observation is that the phase
e^i p_⊥^IN can be pushed through |T_E⟩ leaving behind |p_E^IN⟩.
However, (<ref>) brings in clarity for the backward-propagation. In this case, i.e. for constant f_OUT (n_⊥), the phase
e^-i p_⊥^OUT is acted upon by -|T_H⟩, creating |p_E^OUT⟩, but at the output.
The splitting-up procedure stops when each phase meets its own n_⊥-dependent non-magnetic materials. The sub-chain of a path-operator that extends between the final propagation positions of e^-i p_⊥^OUT· n_⊥ and e^i p_⊥^IN· n_⊥ is the XY-operator, which defines a channel. Once the classification of channels is at hand, the complete solution for the transfer matrix elements is obtained by continuing the forward-propagation of the phase e^i p_⊥^IN, but now through the non-magnetic material-dependent XY-operators. We explain this below, solving the case of a structure composed of two nonhomogeneous non-magnetic laminae.
§ ANALYTICAL SOLUTION FOR A BILAMINAR NON-MAGNETIC STRUCTURE
It is not difficult to complete the path-operator calculation for a single lamina carrying an (n_x,n_y)-dependent non-magnetic materials. The next in line is a bilaminar structure, which gives rise to a greater range of scattering phenomena. Although its complete solution may seem arduous, the end result elucidates the role played by each propagation channel. Furthermore, the analytical solution combined with optimization procedures provides a method for designing practical devices, Section <ref>.
In what follows we present the solution to the path-operator propagation for a device composed of two laminae with non-homogeneous and distinct non-magnetic materials ϵ_1(n_x,n_y)≠ϵ_2(n_x,n_y), Fig.<ref>.
First we take an overall view of the results, followed by an in-depth study of propagation through path-operators.
From the total of 3^6=729 paths only 188 paths, counted for all possible polarization pairs, are non-zero. These paths are grouped into channels. The channels through which the plane waves propagate from IN at n_z-1 to OUT at n_z+2, depend on the polarization index, Tab.<ref>. For example, the specific propagation from S^IN into S^OUT goes through 104 paths, the contributions from the rest of the paths, up to 188, being zero for this polarization pair. These 104 paths are grouped in 5 channels Tab.<ref>. Channel 1 of S^OUTS^IN contains 46 paths, Channel 2 comprises 22 and so on, until Channel 5, which is built on 20 paths. Tab.<ref> contains, for each pair of IN-OUT polarization, the information for the number of channels and the number of paths per channel.
By way of example, to justify these results, and more, we will analyze three paths.
Two paths are selected form the 729-188 set of zero-paths to explain the source of their null contribution to propagation.
The path IN321321OUT does not contribute at all to any polarization propagation because the operator product for this path, O_H^(1)O_E^(2)O_H^(3)O_E^(1)O_H^(2)O_E^(3), is of the form
(I_H I_E1I_E I_H1)⊗(operator ). The part I_E1I_E=|e⟩⟨h|1|e⟩⟨h| is zero, since ⟨h||e⟩=0, which renders the paths inactive to any propagation.
Another path, IN321121OUT is also zero, but for a different reason. Its path-operator O_H^(1)O_E^(2)O_H^(1)O_E^(1)O_H^(2)O_E^(3) is of the form
(I_H I_EI_HI_E I_H1)⊗(operator). The first term of the tensor product, (I_H I_E I_H I_E I_H1)=|h⟩⟨e|, is not zero. However, the second term of its tensor product contains O_H^(1)O_E^(1)=|T_H⟩Γ_S⟨T_H|σ_2 (-c)|T_E⟩(-c Γ_P)⟨T_E|σ_2. This brings into contact ⟨T_H| with |T_E⟩ acted by σ_2, which is zero
[ T_x^E; ; T_y^E ]σ_2
[ T_x^E T_y^E ]=i(T_y^ET_x^E-T_x^ET_y^E)=0,
given that T_y^E and T_x^E commute.
We are left with the propagation along 188 non-zero paths, which is exemplified next.
§ CHANNEL 3 SS
Compute the contribution of the path IN321221OUT to the propagation of S^IN,+ into S^OUT,+. This path is part of Channel 3 S^OUTS^IN, which contains 8 paths, Tab.<ref>.
Its path-operator is of the form
|h⟩⟨e|⊗(operator). To evaluate its contribution to the transfer matrix element, the operator needs to act on both the input
|p_⊥^IN,S,+⟩ e^i p_⊥^IN n_⊥
and on the output
e^-i p_⊥^OUT n_⊥⟨p_⊥^OUT,S,+|,
(<ref>).
The first term |h⟩⟨e| tells us that only the e-part of the input |p_⊥^IN,S,+⟩ is delivered, by this path, into the h-part of the output ⟨p_⊥^OUT,S,+|.
Use, for a non-magnetic device, Γ_H^-1=Ω^2(i c)^-1 and Γ_E^-1=i ϵ(n_⊥)c^-1 to arrive at
OUT^-1(L_xL_y)^-1∑_n_⊥e^-i p_⊥^OUTn_⊥
ic^3Ω^2⟨p_⊥^OUT,H||T_H⟩⟨T_H|σ_2ϵ_2|T_E⟩ϵ_1^-1⟨T_E|ϵ_1σ_2|p_⊥^IN,H⟩
e^i p_⊥^IN n_⊥.
Factorize the summand into a 𝒵-factor and an XY-factor, by back-propagating e^-i p_⊥^OUTn_⊥ through |T_H⟩ at OUT, (<ref>), whereas at IN use |T_H⟩e^i p_⊥^IN n_⊥=|p_⊥^IN,H⟩e^i p_⊥^IN n_⊥,
OUT^-1(L_xL_y)^-1∑_n_⊥e^-i p_⊥^OUTn_⊥ ic^3Ω^2⟨p_⊥^OUT,H||p_⊥^OUT,H⟩
⟨T_H|σ_2ϵ_2|T_E⟩ϵ_1^-1⟨T_E|ϵ_1σ_2|T_H⟩ e^i p_⊥^IN n_⊥.
For this path, the 𝒵-factor is ic^3Ω^2⟨p_⊥^OUT,H||p_⊥^OUT,H⟩. For other paths, both variables φ_z^OUT and φ_z^IN are present in the result.
The XY-operator, which is common to all 8 paths from channel_3-SS and thus defines this channel, is
Operator-XY_3^SS=⟨T_H|σ_2ϵ_2|T_E⟩ϵ_1^-1⟨T_E|ϵ_1σ_2|T_H⟩.
In the general case, the action of an XY-operator on the input phase e^i p_⊥^IN n_⊥ delivers a function of n_⊥, χ(n_⊥), which depends on ϵ_1(n_⊥), ϵ_2(n_⊥) and p_⊥^IN. This function, χ(n_⊥), contains the information from the propagation of the IN phase through the entire non-magnetic media, all the way to the OUT. Here, for Channel 3 SS,
Operator-XY_3^SS(e^i p_⊥^IN n_⊥)=e^i p_⊥^IN n_⊥χ_3^S^OUT,S^IN(n_⊥).
Henceforth, to keep the formulas for χ(n_⊥) simple, we write interchangeably p_x=p^IN_x and p_y=p^IN_y. However, to avoid confusion and to be able to distinguish between the IN and OUT phases, we will keep the index OUT for p_⊥^OUT.
From (<ref>) we deduce the dependence on p_⊥^IN of the χ-function.
Namely, χ_3^S^OUT,S^IN(n_⊥)=g_0+g_1cos(a p_x)+g_2cos(b p_y)+g_3sin(a p_x)+g_4sin(b p_y)+g_5cos(a p_x-b p_y)+g_6sin(a p_x-b p_y), where g_j, with j=0⋯6, are functions of n_⊥ build exclusively on the non-magnetic materials deposited on the laminae. For example
g_6= iϵ _1(n_x-1,n_y+1) ϵ _2(n_x,n_y)/a^2 b^2 ϵ _1(n_x,n_y+1)
-iϵ _1(n_x+1,n_y-1)
ϵ _2(n_x,n_y)/a^2 b^2 ϵ _1(n_x+1,n_y)
+iϵ _1(n_x+1,n_y-1) ϵ _2(n_x+1,n_y)/a^2 b^2 ϵ _1(n_x+1,n_y)
-iϵ _1(n_x-1,n_y+1)
ϵ _2(n_x,n_y+1)/a^2 b^2 ϵ _1(n_x,n_y+1)
+iϵ _2(n_x,n_y+1)/a^2 b^2-iϵ _2(n_x+1,n_y)/a^2 b^2,
where, for clarity, we used the shorthand notation n_x-1=a n_x-a, n_y+1=b n_y+b, and alike.
The periodic boundary conditions and the sum from (<ref>) bring in the Fourier transform of χ(n_⊥) over the variable q_⊥=p_⊥^IN-p_⊥^OUT≡ p_⊥-p_⊥^OUT,
χ̃_3^S^OUT,S^IN(q_⊥):=
(L_xL_y)^-1∑_n_⊥e^i q_⊥· n_⊥χ_3^S^OUT,S^IN(n_⊥).
Since χ̃_3^S^OUT,S^IN(q_⊥) is common to all paths from Channel 3, the next focus is on the sum of all 𝒵_paths. It turns out that, for all channels, this sum factorizes into simple terms, each term being a function of either φ _z,IN or φ _z,OUT, but not both. For the example under study
∑_paths from
Channel 3𝒵_path =i c Ω ^2 φ _z,INφ _z,OUT.
Finally, we arrive at the contribution of Channel 3 S^OUT,+,S^IN,+,
which, conveniently, is a product of χ̃_3 from (<ref>) and the channel 𝒵-factor (<ref>)
𝒵_3^OUT,S+,IN,S+= OUT^-1 i c Ω ^2 φ _z,INφ _z,OUT.
The main result, for the IN S to OUT S propagation, is that the transfer matrix element is reduced from a sum of 729 paths to a sum of 5 channels
T_Sm,Sn^+,+=∑_channel=1^5 𝒵_channel^OUT,S+,IN,S+ χ̃_channel^S^OUT,S^IN(q_⊥).
The dependence on the Bloch-Floquet indices m and n is through both p_⊥ and q_⊥.
§ 𝒵 AND XY-FACTORS FOR ALL CHANNELS
The XY-channel-operators for all four polarization combinations (OUT/IN,S/P) are represented in Fig.<ref>. These operators are independent of the direction of propagation index ±. The channels from IN S to OUT S were discussed above. There are 9 channels that connect IN S polarization with OUT P. All start with |T_E⟩ and end in ⟨T_H|. They are colored green in Fig.<ref>. Change the input into a P-polarization. There are 5 unique channels that transfer an IN P into an OUT S. They are colored purple in Fig.<ref>. The last case is the transfer of IN P into OUT P. There are 14 channels out of which 13 are unique to this polarization pair. They are colored black in Fig.<ref>. The non-unique channel, shared with IN S to OUT S, has no (x,y)-dependence and so its χ-function is 1.
By contrast, the 𝒵-factors depend on the direction of propagation. Tab.<ref> and Appendix B contain the information for all the other 𝒵-factors.
The rule to obtain the 𝒵-factors for other directions is to change IN- into IN+ and, at the same time, change
φ_z,IN→φ_z,IN^-1 and
c → -c. The same rule applies for OUT- into OUT+.
However, this rule does not apply for Channel 1, for both SS and PP, Appendix B, Tables <ref>, <ref>. The reason is that, in vacuum, there are pairs of polarization and directions that cannot propagate into each other. For example, in vacuum, IN S+ cannot propagate into OUT S-. In contrast, Channel 1 is open in vacuum, so the rule does not apply to it.
At this point, the transfer matrix elements are computed in closed analytical formulas for any non-magnetic bilaminar lattice structure.
The solution is completely general being valid for elaborate non-magnetic material patterns that can be drawn on both laminae.
The decomposition of propagation by channels can be implemented also for three or more patterned laminae. The number of channels increases with the increase of the number of laminae, but the procedure remains the same.
Returning to the bilaminar structure, an avenue worth to explore is the continuum limit in the x and y dimensions. In this limit, the number of Bloch-Floquet modes become infinite, placing weight to our method of directly seizing the transfer matrix elements by circumventing infinite-dimensional transfer matrices.
XXXXXXXXXXXXXX
XXXXXXXXXXXXXX
XXXXXXXXXXXXXX
XXXXXXXXXXXXXX
XXXXXXXXXXXXXX
XXXXXXXXXXXXXX
XXXXXXXXXXXXXX
XXXXXXXXXXXXXX
XXXXXXXXXXXXXX
§ CONTINUUM LIMIT FOR A,B→ 0
Consider that the discrete lattice constants a and b are much smaller than c, the discrete lattice constant on the z-axis. In this case n_⊥ transforms into a continuum r_⊥ coordinate so that the unit cell length is l_x=lim (a L_x) for a→ 0 and L_x→∞. Same goes for l_y. However, the z-axis remains discrete. In the continuum x,y-limit the discrete χ_3^S^OUT,S^IN(n_⊥), (<ref>), is a function of (x,y)
χ_3^InS,OutS(x,y,p_x,p_y)=
p_x (
i (∂_yylnϵ_1)(∂_xϵ_2)-i(∂_xylnϵ_1)(∂_yϵ_2))+
p_y (
i (∂_xxlnϵ_1)(∂_yϵ_2)-i(∂_xylnϵ_1)(∂_xϵ_2))+
p_x^2 (∂_ylnϵ_1)(∂_yϵ_2)+
p_x p_y ( -(∂_xlnϵ_1)(∂_yϵ_2)-(∂_ylnϵ_1)(∂_xϵ_2))+
p_y^2 ( (∂_xlnϵ_1)(∂_xϵ_2)).
The dependence of (<ref>) on p_x, p_y is quadratic. Recall that p_⊥=p_⊥^IN. Each coefficient of this quadratic polynomial is a combination of partial derivatives of permittivities, Fig.<ref>. We purposely placed these coefficients as a sum of terms, each being a product of a partial derivative of a function of ϵ_1 into another one, which depends exclusively on ϵ_2. This specific arrangement is crucial to get a closed formula for the Fourier integral for a polygonal tessellated pattern, which will be a later subject to undertake. In addition to being technically useful, this arrangement has another facet. It reveals that the contribution of the permittivity constants to a channel is via pairs of functions (f_1,f_2), where f_1 and f_2 acts only on ϵ_1 and ϵ_2, respectively. From (<ref>) we get f_1(ϵ_1)= ln(ϵ_1) and f_2(ϵ_2)= ϵ_2. These functions are easily gleaned, for each of the 33 channels, from Fig.<ref> and Appendix B. They are either f(ϵ)=ϵ,ϵ^-1, ln(ϵ) or the constant 1.
All 33 channels, with the exception of the following 7 channels χ_3,4^P^OUT,S^IN, χ_4^S^OUT,P^IN, and χ_7,8,9,13^P^OUT,P^IN, use one pair (f_1,f_2). Channel χ_8^P^OUT,P^IN involves 3 pairs, whereas the other 6 from the exceptions use 2 pairs. Some examples are presented in Tab.<ref>.
These channel-dependent permittivity functions are universal for a bilaminar structure, the distinction between devices with the same geometry being captured by the specific values of their arguments, ϵ_1 and ϵ_2. It is worth noting that, for a given IN-OUT polarization pair, the set of functions are uniquely specific to a channel. This property can thus be used to name a channel. For example, Channel 3 in Fig.<ref> may bare the name SS(ln(x),x).
§ C-SCALING
The transfer matrix elements get simpler once the influence of the discreteness along the z-axis, c, is embodied into the scaling of the unit cell
x = c x^',y=c y^'.
The frequency was already c-scaled in (<ref>).
All parameters become c-scaled l_x/y = c l_x/y^',
p_x/y= c^-1p_x/y^'. Scaling a χ channel-function is equivalent to multiplying it by a power of the scaling parameter c. For example, the c-scaling effect on (<ref>) is
χ_3^InS,OutS(x,y,p_x,p_y)=c^-4χ_3^InS,OutS(x^',y^',p_x^',p_y^').
In the continuum (x,y)-plane the discrete Fourier transform becomes an integral, as (a b)/((a L_x) (bL_y))→ (dx dy)/(l_x l_y).
In the scaled variables, the Fourier transform of the χ channel-function
(l_x^'l_y^')^-1∫_0^l_x^'dx^'∫_0^l_y^'dy^' e^i q_x^' x^' e^i q_y^' y^'χ(x^',y^',p_x^',p_y^')
is a function of q_⊥^'=p_⊥^'IN-p_⊥^'OUT where
p_x/y^'IN/OUT=2π( M_x/y^IN/OUT+ξ_x/y)(l_x/y^')^-1
with 2πξ_x/l_x^' and 2πξ_y/l_y^' being equal to Ωsin(θ)cos(ϕ) and Ωsin(θ)sin(ϕ), respectively.
For 𝒵-factors, the c-scaling appears in the argument of φ_z
φ _z,IN = φ_z(1-2^-1Ω ^2+2^-1(p_x^'2+p_y^'2)).
For φ _z,OUT the argument contains p_⊥^'OUT.
Below, we drop the prime notation for the c-scaled parameters, understanding that all variables are c-scaled.
The advantage of scaling is that the c-monomial from χ and its corresponding 𝒵-factor cancel, rendering a c-independent formula for a channel.
§ POLYGONAL TESSELLATION PATTERNS
The transfer matrix elements, for the xy-continuous limit, are reduced at this point to the computation of 2-dimensional Fourier transforms of functions defined on the unit cell. To push forward the project of finding analytical closed-form formulas, we show that, in the general case, the Fourier transforms for all channels can be completely solved for polygonal subdomains. The approach and the notations for the general formulas are exemplified using a pattern, Fig.<ref>, which we will call π-π-rig. The unit cell is a square with corners positioned at (±π,±π), in length units chosen for a desired frequency band. Inside the unit cell sits an inner square. Fig.<ref> shows two inner squares, one located on plane 1, whereas the other on plane 2, both defined in Fig.<ref>. The corners of the unit cell are not visible in Fig.<ref> to save the space for the information pertaining to the inner squares. In the foreground, the square on plane 2 has its vertices labeled B_i,j, i=± 1,j=± 1 positioned at (±π/2,±π/2). In the background, the square on plane 1, with vertices A_i,j, is rotated counterclockwise by an angle α. For α=0, the squares' vertices coincide. There are two kinds of points in Fig.<ref>. Points like A_i,j and B_i,j from plane 1 and plane 2, respectively, are called real . In contrast, we call virtual those that appear as intersection points, like D_1, the origin O and Δ_1. All points, real and virtual, have associated with them a set of unit vectors. Take for example the origin O. There are four segments that originate at O. One is the segment OA_1,1 which carries a unit vector denoted μ̂_1 in Fig.<ref>. Then μ̂_2, μ̂_3 and μ̂_4 are along OB_1,1, OA_-1,-1 and OB_-1,-1, respectively. All tails of these unit vectors sit on point O. From the same point O, originates another set of four unit vectors λ̂_i, i=1,… ,4 in such a way that each pair (λ̂_i,μ̂_i) is orthogonal and each triplet (λ̂_i,μ̂_i, ẑ) is right-oriented.
The last geometrical parameter is related to the choice of a frequency band, say in GHz or THz, which scales the device's units to mm or μm, respectively. Versus this unit of length we define a unitless thickness parameter t
t=[1 unit](c [unit])^-1.
Although the frequency ω and the dimensions l_x,l_y are fixed in the chosen units, the c-scaled parameters change with t. As the laminae get thinner the scaled unit cell (l_x^', l_y^') and the probing wavelength λ^' get larger, λ^'=tλ [unit]/1 [unit], whereas the probing frequency Ω slides into lower regions,
Ω=2 πλ^'-1.
The increase of the scaled unit cell repositions the coordinates of the vertices, but do not change the unit vectors (λ̂,μ̂).
The coordinates of all points, real and virtual, together with the orientations of all unit vectors and a choice of the thickness parameter comprise the geometrical data for computing the Fourier transformation of any polygonal tessellation. The other data come from the jumps of the permittivities across polygonal segments. For example, for point O in Fig.<ref> the relative permittivity pair (ϵ_1R,ϵ_2L) appears towards to tip of λ̂_1, i.e. on the right-side looking along μ̂_1. The pair (ϵ_1L,ϵ_2L) sits towards the tail of λ̂_1, i.e. on the left-side of μ̂_1. As we cross μ̂_1 walking in the direction of λ̂_1, slightly above point O, the change in the relative permittivities introduces a jump
(Δ f_1f_2)_O,μ̂_1= f_1(ϵ_1R)f_2(ϵ_2L)-f_1(ϵ_1L)f_2(ϵ_2L),
where (f_1,f_2) is a channel-specific pair of permittivity functions as in Tab.<ref>.
The Fourier transforms for the χ channel-functions include both the geometrical configuration and the permittivities jumps.
In (<ref>) we show, as an example, the result of the Fourier transform, ℱ(χ), of the third channel for OutS,InS and for the specific case q_⊥·μ̂≠ 0 for all μ̂,
∑_(V_12,μ̂)e^i (q_⊥· V_12)_2 (p_⊥·μ̂_1)(p_⊥·μ̂_2)
( q_⊥·μ̂_2/μ̂_1·λ̂_2)( q_⊥·μ̂_1/μ̂_2·λ̂_1)
Δ (ϵ_2lnϵ_1)_μ̂W·λ̂/W· q_⊥1/q_⊥·μ̂ -
∑_(V_12,μ̂)e^i (q_⊥· V_12)_3 (p_⊥·μ̂_1)(μ̂_1·λ̂_2)
( q_⊥·μ̂_2/μ̂_1·λ̂_2)^2( q_⊥·μ̂_1/μ̂_2·λ̂_1)
Δ (ϵ_2lnϵ_1)_μ̂W·λ̂/W· q_⊥1/q_⊥·μ̂.
For each virtual vertex V_12 from Fig.<ref>, the sum covers all four μ̂'s associated with it. The indices 1 and 2 refer to the line from plane 1 and 2, respectively. In this formula we are free to choose one pair (μ̂_1,μ̂_2) of unit vectors along line 1 and line 2, out of all four possible choices of the pairs exiting V_12. The result is independent on the choice of the pair because the terms are invariant to the transformation μ̂_1→ -μ̂_1 or μ̂_2→ -μ̂_2.
The Fourier transform in (<ref>) depends on p_⊥, i.e. p_⊥^IN, because the channel's χ-function (<ref>) depends on it. In addition, the transform is naturally a function of the q_⊥, (<ref>). The first sum in (<ref>) displays the quadratic dependence on p_⊥ as a dot product, invariant to rotations of the (x,y) coordinate system. An invariant form also appears for the second sum, which contains the linear dependence on p_⊥. In this formula, the variables q_⊥,p_⊥ and V_12 are c-scaled and depend on the thickness parameter t. As we announced before, we do not carry the primed symbol, (<ref>), anymore.
In the next section we lay down the Fourier transform results, with their proofs left to Appendices D to H.
§ FOURIER TRANSFORMS FOR THE Χ-CHANNEL-FUNCTIONS
We encounter four types of integrals on the unit cell, based on the number of derivatives m^1=(m_x^1,m_y^1) and m^2=(m_x^2,m_y^2) being zero or not
(00). ∬ dx dy (f_1)(f_2) e^q_⊥· r_⊥, m^1=0,m^2=0,
(10). ∬ dx dy (∂_m^1f_1)(f_2) e^q_⊥· r_⊥, m^1≠ 0, m^2= 0,
(01). ∬ dx dy (f_1) (∂_m^2f_2) e^q_⊥· r_⊥, m^1= 0, m^2≠ 0,
(11). ∬ dx dy (∂_m^1f_1)(∂_m^2f_2) e^q_⊥· r_⊥, m^1≠ 0, m^2≠ 0.
There are three cases for (00), which depend on the relation between the geometry of the device, expressed by the set of vectors μ̂ and the mode-scattering vector q_⊥. For case (1), q_⊥·μ̂≠0.
Case (2) consists of q_⊥·μ̂=0 and q_⊥≠ 0, which means that q_⊥=±λ̂q_⊥. Finally for (3) q_⊥=0.
The formulas for (00), from (<ref>) and (<ref>), are written on purpose as a sum of terms contributed by each pair (V,μ̂). This is akin to a potential theory where only the ends of the curve contribute. In addition, also reminiscent of a potential theory, gauge vectors appear in the solution. They are the same for all pairs (V,μ̂) and their arbitrariness helps eliminating all singularities that may appear in the denominators. The gauge vectors are denoted as W and 𝒟, and can be arbitrarily chosen with the provision that
W· q_⊥≠ 0 and 𝒟·μ̂≠ 0.
The jump in ϵ, as the vector μ̂ is traversed along λ̂, is captured in (Δ f_1f_2)_μ̂,
as exemplified in (<ref>).
Outside the unit cell we place a fictitious material with ϵ=0 to get, for the (00) integrals, the correct terms generated by the unit cell boundaries.
The (00) integration formula for a polygonal tessellation of the unit cell, for cases (1) and (2), is
∬_ dxdy (f_1f_2) e^i q_⊥· r_⊥=
∑_V,μ̂e^i q_⊥· V1/q_⊥·μ̂ W·λ̂/W· q_⊥ (-Δ(f_1f_2))_μ̂ +
∑_V,μ̂e^i q_⊥· V(i μ̂· V) W·λ̂/W· q_⊥ (-Δ(f_1f_2))_μ̂ .
The first and the second sum applies for case(1) and (2), respectively.
For (00) in case (3) we need to use two gauge vectors. The W is the same as before, whereas 𝒟 is specific for this case and comes from taking the limit s→ 0 for q_⊥=s 𝒟. This formula,as proven in Appendix E, is independent on the choice of 𝒟
∬_ dxdy (f_1f_2) =
∑_V,μ̂1/2 (i 𝒟· V)^2 1/𝒟·μ̂ W·λ̂/W·𝒟 (-Δ (f_1f_2))_μ̂ .
We intentionally drafted the (00) Fourier transforms as a sum of contributions from vertices. This format can be handed on to the next integrals, (01), (1,0) and (1,1), in a consistent manner. The (00) integral appear in other works <cit.>,<cit.>, but as a sum over the edges of the polygon.
For the formulas that follow, we will list only the contribution of a pair (V,μ̂), the summation being understood.
§ FOURIER TRANSFORMS FOR PRODUCT OF DERIVATIVES OF TYPE (01), (10) AND (11)
The result for the (00) case is now used to generate the integrals for which a derivative acts on at least one function. The procedure implies two steps. The first step is to compute
∬_ dxdy f_1(r_⊥+δ r_1) f_2(r_⊥+δ r_2) e^i q_⊥· r_⊥=
Int(δ x_1,δ y_1,δ x_2,δ y_2)
as a function of two independent translations, δ r_1 and δ r_2, on plane 1 and plane 2, respectively. These translations change the position of a vertex V
V_translated=V-τ_x^1δ x_1-τ_y^1δ y_1-τ_x^2δ x_2-τ_y^2δ y_2.
The four vectors τ depend on the vertex V being subjected to a free or constraint translation, which will be defined subsequently. If the vertex is associated with a free translation, we have τ_x^1=τ_x^2=x̂ and τ_y^1=τ_y^2=ŷ.
A vertex at the intersection of two lines from different planes, subjected to a constraint translation, moves to
(V_12)_translated=V_12-δ r_1·λ̂_1/μ̂_2·λ̂_1μ̂_2-δ r_2·λ̂_2/μ̂_1·λ̂_2μ̂_1,
where μ̂_1 and μ̂_2 represent the directions of the two intersecting lines situated on plane 1 and 2, respectively. For constraint translations, the vectors τ^1 and τ^2 can be extracted from (<ref>).
In what follows we associate vertices V_1 and V_2 that are exclusively situated either in plane 1 or 2, respectively, to a free translation. For a V_1-type vertex τ^2=0 and, in reverse, τ^1=0 for a V_2-type.
Virtual vertices V_12 are associated to a constraint translation.
The sets V_1, V_2 and V_12 are exemplified in Fig.<ref>.
For the second step, once the function Int(δ x_1,δ y_1,δ x_2,δ y_2) is at hand, we compute the rest of the integrals by taking its derivatives
∬_ dxdy (∂_x^m_x^1∂_y^m_y^1f_1(r_⊥))(∂_x^m_x^2∂_y^m_y^2f_2(r_⊥)) e^i q_⊥· r_⊥
=∂_δ x_1^m_x^1∂_δ y_1^m_y^1∂_δ x_2^m_x^2∂_δ y_2^m_y^2Int
at δ x_j,δ y_j=0, j=1,2. The results are listed below and the details follow in Appendices D to H.
Unlike for the (00) integrals, here the unit cell boundaries do not generate any terms, because the derivative of a permittivity function is zero across the unit cell boundaries.
For m^1+m^2≠0 and case (1), q_⊥·μ̂≠0, the contribution of (V,μ̂) is
e^i (q_⊥· V)
(-i q_⊥·τ_x^1)^m_x^1
(-i q_⊥·τ_y^1)^m_y^1
(-i q_⊥·τ_x^2)^m_x^2
(-i q_⊥·τ_y^2)^m_y^2
1/q_⊥·μ̂ W·λ̂/W· q_⊥(-Δ(f_1f_2)_μ̂).
For case (2), q_⊥·μ̂=0, the contribution of (V,μ̂) is
d/ds|_s=0 e^i (q_⊥+s μ̂)· V)
(-i (q_⊥+s μ̂)·τ_x^1)^m_x^1
(-i (q_⊥+s μ̂)·τ_y^1)^m_y^1
(-i (q_⊥+s μ̂)·τ_x^2)^m_x^2
(-i (q_⊥+s μ̂)·τ_y^2)^m_y^2W·λ̂/W· q_⊥(-Δ(f_1f_2)_μ̂).
For case (3), q_⊥=0, the contribution of (V,μ̂) is
1/2d^2/ds^2|_s=0 e^i (s𝒟· V) s^m_x^1+m_y^1+m_x^2+m_2^2
(-i 𝒟·τ_x^1)^m_x^1
(-i 𝒟·τ_y^1)^m_y^1
(-i 𝒟·τ_x^2)^m_x^2
(-i 𝒟·τ_y^2)^m_y^2W·λ̂/W·𝒟(-Δ(f_1f_2)_μ̂).
The transfer matrix for a polygonal tessellated bilaminar non-magnetic structure, continuous in the x and y directions, is completely solved at this point. We are moving to test the theoretical results by comparing our closed analytical formulas for the π-π-rig structure, to numerical results obtained from a high-performance analysis software package <cit.>. Complex symbolic computations were handled by <cit.>.
§ EVANESCENT RESONANT MODES BY OPTIMIZATION DESIGN
The intent is to design-optimize a dielectric structure from Fig.<ref> such that a subset of evanescent Bloch-Floquet modes (M_x,M_y)≠0 acquire large scattering matrix elements at a specified frequency. Such an excited resonant mode propagates along the plane (x,y) at a frequency smaller than its Rayleigh frequency. Specifically, in the frequency range under study, 37 GHz to 50 GHz, the optimization function is based on four modes. Two modes, (0,0) and (-1,0), propagate, and two other modes, (0,± 1), are evanescent. The goal is to find a set of dielectric constants for which the modes (0,± 1) resonate. To excite the resonant modes, the plane wave (0,0) coming from z-min lands at angles θ=17.5^∘ and φ=0^∘ on the face A of the π-π-rig oriented at α=45^∘. The thickness of each of the two laminae is
c=0.25 𝚖𝚖.
The design-objective-function, constructed from the analytical formulas for the transfer matrix elements, selects a point in the 6-dimensional dielectric space ϵ _1B= 4.99, ϵ _2B= 2.96, ϵ _1L= 7.60,
ϵ _2L = 5.66, ϵ _1R=5.93 and ϵ _2R= 1.63.
Technologically, this point may not be easily implemented, although we constrained the dielectric constants to be less than 12. Instead, we focus on studying the predictions put forward by the analytic solution and compare them against numerical results from a high-performance software package.
These predictions are grouped in three categories. The first category, inspired by topological photonics, is related to robustness of the resonant modes with respect to the change of the dielectric constants, quantified as a map from the real to integer numbers.
The second is based on resonant frequency identification, whereas the third is focused on high Q-factors and the use of complex frequency plane to estimate the Fano-Lorentz spectral line shape for the resonant modes. In what follows we confine ourselves to evanescent S-polarized resonant waves excited by the (0,0) S-polarized incoming wave. Only the main results are presented below, with specific details on the design optimization being summarized in Appendix I.
§ A MAP FROM THE REAL TO INTEGER NUMBERS
The resonances in the scattering matrix elements appear as zeros of the determinant of the T^-,- matrix, (<ref>). The minimal T^-,- matrix can be reduced to just the matrix element T^-,-_Sm,Sm, the zeros of which give the first approximation for the resonant frequencies. To see that, take a 2× 2 transfer matrix built only from the set T^±,±_Sm,Sm and look at the resonance for the mode Sm as a singularity for which (<ref>) has a non-zero solution if all coefficients but (DIR,POL,BF)=(+,S,m) and (dir,pol,bf)=(-,S,m) are zero. It turns out that this simple approximation has predictive power.
As the dielectric constants change their values, the zeroes of T^-,-_Sm,Sm appear or disappear, creating or destroying a resonance. We study this phenomenon for variable ϵ_1B=ϵ_2B, running from 1 to ∞, with the rest of the dielectric constants kept constant at the optimized values.
Hence, map ϵ_1B=ϵ_1B to the number of modes m=(M_x,M_y) for which the diagonal transfer matrix element T^-,-_S m,S m, Appendix C, has at least one zero on the frequency axis in the interval [0,60] GHz,
ϵ∈ℝ↦number of modes with zeroes.
The analytic formulas position the zeros as in Fig.(<ref>) and Fig.(<ref>)
As ϵ_1B=ϵ_2B increases from 1 to ∞, Fig.<ref>, the number of modes for which T^-,-_S m,S m crosses the real frequency axis increases in discontinuous steps, then decreases as the dielectric constant gets above 30. It reaches a plateau of 36 modes as ϵ→∞. Fig.<ref> shows the position in the (M_x,M_y) plane of the 53 and 36 modes for ϵ_1B=ϵ_2B=35 and ∞, respectively. Two adjacent steps in Fig.<ref> have two distinct topological invariants, i.e. distinct number of resonant modes. The boundaries of these steps are not uniformly distributed on the horizontal dielectric axis. Knowing the distribution of these boundary values may play a significant role in assembling compound devices, which are built by bringing together two structures with distinct topological invariants.
Numerical simulations confirm that 5 modes resonate for ϵ_1B=ϵ_2B=1 and 53 for ϵ_1B=ϵ_2B=35.
One step deeper into the analysis of the zeros is provided by propagation along channels. Channel 1 SS does not depend on the dielectric constants and is positive for any frequency and direction p_⊥, Fig.<ref>. Some other channels have to be negative for T^-,-_S m,S m to cross the frequency axis. Interestingly, each channel keeps a constant sign as a function of frequency, namely (1,+),(2,-),(3,-),(4,+) and (5,-), noticeable in Fig.<ref> to Fig.<ref>.
From Fig.<ref> we see that Channel 3 is two orders of magnitude smaller than the other ones, so it does not lead to creation of destruction of a zero, but contributes to its location on the frequency axis.
As ϵ_1B=ϵ_2B increases the negative contribution starts to dominate the positive one and two phenomena appear: the zeros are pushed into lower frequencies and a variable number of modes start to cross the frequency axis. This explains the increase in the number of resonant modes as ϵ_1B=ϵ_2B increases.
§.§ Zeroes of the diagonal matrix elements of T^-,-
A distinctive advantage of analytical formulas over the numerical approaches is in the study of infinite limits
ϵ_1B =ϵ_2B→∞.
In this limit, the zeros of the transfer matrix elements
T^-,-_S m,S m(Ω)=0, appear at small Ω≅ 0. So, approximate
1+Ω ^2 φ _z,OUT≅1 to get, from Appendix C,
(T^-,-_S m,S m)_Channel 1≅1/φ _z,OUT^3 ,
(T^-,-_S m,S m)_Channel 2≅-Ω ^2 /8 φ _z,OUT^2 (1-φ _z,OUT^2)( 6 ϵ _1B),
(T^-,-_S m,S m)_Channel 3≅0,
(T^-,-_S m,S m)_Channel 4≅Ω ^4 /φ _z,OUT(1-φ _z,OUT^2)( ϵ_1Bϵ_2B/√(2)),
(T^-,-_S m,S m)_Channel 5≅-Ω ^2 /8 φ _z,OUT^2 (1-φ _z,OUT^2)( 6 ϵ _2B).
The equation
(T^-,-_S m,S m)=0, under the above approximations and using the notation ϵ_1B=ϵ_2B=ϵ, turns into
-3/2Ω ^2φ _z,OUTϵ+1/√(2)Ω ^4φ _z,OUT^2ϵ^2+1-φ _z,OUT^2=0.
As ϵ→∞, the zero of T^-,-_S m,S m(Ω)=0 tends to zero in such a way that Ω^2ϵ→finite number. In terms of this finite number, which we call X, the equation becomes
-3/2X φ _z,OUT+1/√(2)X ^2φ _z,OUT^2+1-φ _z,OUT^2=0.
The requirement for X to be positive imposes a constrain on mode numbers M_x and M_y, for which the diagonal transfer matrix elements posses a zero on the real frequency axis, in the limit ϵ_1B =ϵ_2B→∞
φ_z (1/2(M_x^2/t^2+M_y^2/t^2)+1) ⩾1/4√(16-9 √(2)).
This inequality is valid for 36 modes, which are visible in Fig.<ref>.
§ ANALYTICAL PREDICTION OF THE RESONANT FREQUENCY
§.§ Thinner the lamina higher the precision
From counting the number of zeros for many modes, we change the focus, Table<ref>, to predict the position of the zero, Ω_theory, of T^-,-_S m,S m for the optimized design modes, (0,± 1).
Both modes have the same zero at φ=0^∘. The resonant frequency depends on the thickness of the structure's lamina, c. All the other parameters are kept constant.
Notice that Ω %-error=100Ω 𝚗𝚞𝚖-Ω 𝚝𝚑𝚎𝚘𝚛𝚢/Ω 𝚗𝚞𝚖, which measures the distance to the numerical simulation result Ω 𝚗𝚞𝚖, <cit.>, decreases with the decrease of the width c. This is to be expected because as c→ 0 the discrete approximation of Maxwell's equations improves.
§.§ The influence of the rotation angle α on the resonant frequency
Out of the 5 channels for transfer of the SS-polarization, only Channels 3 and 4 depend on the angle α.
As the angle α is varied, the resonant frequency for the degenerate modes (0,-1) and (0,1) changes in the vicinity of the frequencies determined at α =45^∘, Figs.<ref>,<ref>. Although the relative changes are small, with an estimated linear slope of -0.96 MHz/deg and -2.46 MHz/deg, respectively, the slopes are close to the ones from the numerically simulated data.
The systematic shift between the theoretical and numerical values, described for α=45^∘ in Tab.<ref>, is the same for all angles α.
The study of the wedge effect, that comes out for 0^∘<α<10^∘ or for 80^∘<α<90^∘, will be covered in a different manuscript.
The transfer matrix elements depend on the logarithm of the permittivities, so we need to test the formulas for a metal, which exhibits complex permitivitty.
We take ϵ _2B= Johnson-Chrysti gold and find a local minimum of an objective function in the 5-dimensional space of the other dielectric constants.
The frequency range is now placed in the infrared at f=286.2 THz.
The optimization process to find the five unknown dielectric constants is similar to that for the all-dielectric case. This time, though, the objective function is based on one propagative mode (0,0) and one evanescent mode (-1,0), both P-polarized. The position and shape of the theoretical resonance were confirmed by numerical simulations performed via <cit.>.
§ A HIGH Q-FACTOR BILAMINAR STRUCTURE
To study the theoretical prediction for the amplitude we choose a series of resonances with large Q-factors. The first has Q=4.8× 10^6 at -3 dB, Fig.<ref>. The theoretical values were computed using a 20× 20 transfer matrix. Two systematic shifts, f_shift and t_shift, are needed to superpose the theoretical formula 20log_10t^max,min_S(0,1),S(0,0)(f-f_shift)+t_shift on numerical simulations. For Fig.<ref>, f_shift=3.2 10^-5 GHz and t_shift=-3.9 dB. The lamina being thin, c=0.01mm, the shifts are small with respect to the frequency and amplitude at resonance.
Variable φ offers another venue to study the amplitude around a high Q-factor resonance. The modes (0,-1) and (0,1) are degenerate for φ=0^∘, having the same Rayleigh and resonant frequency. As the angle φ slides away from 0^∘, the scattering amplitude of the mode S(0,-1) decreases, whereas the scattering amplitude for the mode S(0,1) remains excited at high dB levels, Fig.<ref>.
The same trend was confirmed by numerical simulation. Table<ref> contains additional data for the comparison between theory and numerical simulations for the high Q-factors.
§ COMPLEX-FREQUENCY PLANE AND THE WEIGHTED FANO-LORENTZ LINE SHAPE
Moving beyond predicting the position of the resonant frequency and its amplitude, the complete analytical solution for transfer matrix provides a simple but meaningful approximation for the resonant line shape
t^min,max_S(0,1),S(0,0)=Cofactor_S(0,0),S(0,1)(T^-,-)/Det(T^-,-)
≅ρ e^iΦf-f_zero/f-f_pole,
where the zero and the pole are located in the complex frequency plane, both in the vicinity of the real resonant frequency, <cit.>. The meromorphic approximation (<ref>) has a natural structure of dipoles with the monopoles placed at f_zero and f_pole, Fig.<ref>.
To estimate the pole and the zero, we use φ_z(ζ) already defined for complex values of ζ. Here we take advantage of the continuity at the real ζ-axis of φ_z(ζ) coming from below, Im(ζ)⩽ 0. This translates, for our case of φ=0^∘ and M_x=0, into the continuity from above, Im(Ω)⩾ 0, of the cofactor and the determinant at the real Ω-axis. Both functions of Ω are thus extended into the lower half of complex frequencies plane from the values they take above and on the real frequency axis, Appendix J.
After this analytic continuation, the zero-pole model, extracted from a 20× 20 matrix t^min,max , is
t^min,max_S(0,1),S(0,0)=0.053 e^-2.732 i f-f_zero/f-f_pole ,
with frequency, in GHz, given by
f_zero=40.843+ 0.027 i
f_pole=41.286- 0.009 i
Following <cit.>, we express the scattering line shape t^min,max_S(0,1),S(0,0)^2 in different forms. The first is
t^min,max_S(0,1),S(0,0)^2(x)=ρ^2(δ+x)^2+γ^2/1+x^2
=2.81× 10^-3(-47.47+x)^2+8.55/1+x^2,
where x=-f-Re(f_pole)/Im(f_pole), δ=-Re(f_pole-f_zero)/Im(f_pole), and γ=Im(f_zero)/Im(f_pole).
The second form is connected with the presence of a continuum background
t^min,max_S(0,1),S(0,0)^2(x)=A_0+F_0(ν+x)^2/1+x^2.
We found two solutions for the parameters A_0,F_0 and ν. Namely,
A_0=1.06× 10^-5, F_0=2.8× 10^-3 and ν=-47.65, or
A_0=6.37, F_0=-6.36 and ν=2.09× 10^-2. This form is thus ambiguous as is also noted in <cit.>.
The third, and the final format, presents the resonant line shape as a weighted sum of a Fano and Lorentz line shapes
t^min,max_S(0,1),S(0,0)^2(x)=A (η(δ+x)^2/1+x^2+(1-η)1/1+x^2).
where the weight parameter is η=1/(1+γ^2)=0.105 and A=ρ^2 (1+γ^2)=0.027.
The Fano line shape, which is the first term in (<ref>), contributes 10.5% to the resonance line shape.
§ CONCLUSION
To sum up, we show how to derive the transfer matrix using Pendry-MacKinnon discrete Maxwell's equations. Space is an orthogonal lattice with lattice constants a,b and c on the x,y and z directions, respectively. The z-axis is singled-out as the transfer axis. A finite number of parallel discrete laminae of thickness c are placed perpendicular along the z-axis. Each lamina can carry any non-magnetic, frequency-dependent pattern, independent from each other. The method we introduce computes, in an analytical closed form, the transfer matrix elements for all Bloch-Floquet modes. The computation starts with a large number of path-operators that transfer the field from the first to the last lamina. Fortunately, many of these path-operators come up with a zero contribution and the results of the paths that contribute can be further grouped together in simple terms, which we call channels. Each channel has the interesting attribute of being a product of two terms that bear distinctive features. One term, called the channel's χ-function, depends on the permittivities, whereas the other term, called the channel's 𝒵-factor, does not. We computed the χ and the 𝒵-factors for a bilaminar device for all pairs of input output polarization.
To exemplify the building up of a transfer matrix element consider, in continuum case of a,b→ 0, the P polarization at the input and the S at the output. The method for the discrete case is similar to the continuum, except that the χ functions are discrete like in (<ref>). For this (P,S) pair of polarization the transfer matrix element is a sum over 5 channels, having their χ-functions displayed in Fig.<ref>. For Channel 2, as an example, the χ-function is a polynomial in (p_x,p_y) given by p_y (-∂_xϵ_2)+p_x ∂_yϵ_2, for any permittivity pattern. The transfer matrix elements depend on the Fourier transforms of the χ-functions, which contain all Bloch-Floquet modes through the variable q_⊥=p_⊥-p_⊥^OUT. Next, the choice of a pair of ± propagation direction decides the specific form of the 𝒵-factor. For example, if we are looking for the matrix element T^-,-, then use Table <ref> and divide its entries by OUT to normalize the 𝒵-factor.
The rule to obtain the 𝒵-factors for other directions is to change IN- into IN+ and, at the same time, change
φ_z,IN→φ_z,IN^-1, and c→ -c, before moving to the c-scaled variables. The same rule applies for OUT- into OUT+. However, this rule does not apply for Channel 1, for both SS and PP, for which all unnormalized 𝒵-factors are tabulated in Appendix B Tables <ref> to <ref>. Finally, the matrix element is a sum over the product of the Fourier transform of χ and the 𝒵-factor for all channels that belong to the selected polarization pair.
A valuable way of proceeding further is to extend to range of applications. One possibility is to exploit Fig.<ref> and bring together two devices with distinct number of resonant modes, and examine the propagation along different channels at the interface. Other applications may be connected to metasurfaces <cit.>, energy harvesting <cit.>, <cit.>,<cit.>, leaky-wave theory <cit.> and frequency-selective surfaces <cit.>.
§ ACKNOWLEDGMENT
One of us, O.L., wishes to thank the Fulbright Commission for a Fulbright Scholarship grant and the host Victor Lopez-Richard from Universidade Federal de São Carlos, SP, Brazil, where part of this work was done. In addition, O.L. thanks his colleague Mariama Rebello de Sousa Dias for many conversations during the course of this research. Both of us wish to thank Dr. Andrei Silaghi, with Continental Automotive Romania SRL, for facilitating the access to numerical simulation using CST microwave studio <cit.>.
Appendix A: A summary of symbols with explanatory notes
1.The discrete position vectors are n=(a n_x,b n_y,c n_z) and n_⊥=(a n_x,b n_y). In the continuous, a,b→ 0, the position n_⊥ becomes r_⊥=(x,y).
2. The vector p_⊥=(p_x,p_y) appear in the formulation of the plane wave basis, |Ψ_S/P,p_⊥^±⟩ e^± i p_z n_z c e^- i ω t where |Ψ_S/P,p_⊥^±⟩=|p_⊥,S/P,±⟩e^i p_⊥ n_⊥, (<ref>). To distinguish between two Bloch-Floquet modes, one at the input IN and the other one at the output OUT, we write p_⊥^IN and p_⊥^OUT, respectively. To keep the final formulas for the transfer matrix elements simple, we use p_⊥ instead of p_⊥^IN, as is the case in Fig.<ref>.
3. Connection between p_x and k_x^E = (i a)^-1(e^i a p_x-1), (<ref>).
4. The unitless frequency Ω is defined by Ω v_0=ω c, (<ref>)
5. The p_z component appears in φ _z=e^i c p_z. φ_z(ζ)=ζ-√(ζ^2-1)e^i/2(arg(ζ-1)+arg(ζ+1)), (<ref>). The arg(ζ) takes values on [-π,π) in such a way that arg(ζ)=-π if Im(ζ)=0 and ζ<0. The argument ζ is defined in (<ref>).
6. Periodic boundary conditions introduce the modes (M_x,M_y) and the direction (ξ_x,ξ_y) of the mode (0,0) through (<ref>) and (<ref>).
7. Transfer matrix element T^-,-_m,n are organized in (<ref>).
8. All XY-operators are listed in Fig.<ref>.
9. An example of a discrete χ-function, (<ref>).
10. Discrete Fourier transform of a χ-function, (<ref>).
11. The Fourier transform goes from space n_⊥ to the mode variable q_⊥=p_⊥^IN-p_⊥^OUT≡ p_⊥-p_⊥^OUT.
12. An example of a 𝒵-factor, (<ref>).
13. Transfer matrix element as a sum over channels, (<ref>).
14. The 𝒵-factors are tabulated in Table <ref> and <ref> to <ref>.
15. Rules to obtain all 𝒵-factors for all directions are presented in Appendix B.
16. Some examples of permittivity functions for the continuum (x,y)-plane are in Table <ref>.
17. For the continuum (x,y) case, the χ-functions, the permittivity functions and the polynomial dependence on p_⊥≡ p_⊥^IN are found in (<ref>), Fig.<ref> and Fig.<ref> to <ref>
18. Through c-scaling, x = c x^',y=c y^' from (<ref>), the lattice constant c simplifies in the transfer matrix element.
19. Choose a unit of length in accordance with the frequency band under study. Use the thickness parameter t=[1 unit](c [unit])^-1, (<ref>), to write the transfer matrix element in terms of only unitless parameters.
20. Each vertex for any polygonal tessellation pattern carry a pair of orthogonal unit vectors (λ̂,μ̂). An example is the π-π-rig from Fig.<ref>.
21. The jumps in the relative permittivities are measured across μ̂ in the direction of λ̂, (<ref>).
22. The Fourier transforms of a tessellated pattern, in continuum, from the position space vector r_⊥ to the mode vector q_⊥, are built on (λ̂,μ̂), the permittivities jumps and two constant gauge vector W and 𝒟.
Appendix C: The diagonal T^-,- matrix elements (q_⊥=0) for the π-π-rig and a,b→ 0.
(T^-,-_S m,S m)_Channel 1=
-δ _IN,OUT((Ω ^2 φ _z,OUT+1)^2-(φ _z,OUT)^2) /(φ _z,OUT^2-1) φ _z,OUT^3 ,
(T^-,-_S m,S m)_Channel 2=( 6 ϵ _1B+ϵ _1L+ϵ _1R)
Ω ^2 (Ω ^2 φ _z,OUT+1)/8 φ _z,IN(φ _z,OUT^2-1) φ _z,OUT,
(T^-,-_S m,S m)_Channel 3=
Ω^2/4 π ^2 t^2 (p_x^2+p_y^2) φ _z,IN(φ _z,OUT^2-1)
(.
p_x^2(
(α ) (α ) ϵ _2B(2 ln(ϵ _1B)-ln(ϵ _1L)-ln(ϵ
_1R))
+ϵ _2L(- (α ) (α ) log(ϵ _1B)+3 (α ) log(ϵ _1L)/2
(sin (α )+cos (α ))-( (α )-2) (α ) (α ) log(ϵ _1R)/2 ( (α )+1))
+ϵ _2R(- (α ) (α ) log(ϵ _1B)-( (α )-2) (α ) (α ) log(ϵ _1L)/2 ( (α )+1)+3 (α ) log(ϵ _1R)/2 (sin (α )+cos (α
)))
. )
+p_x p_y (α ) /sin (α )+cos (α )(ϵ _2L-ϵ _2R) (log(ϵ _1L)-log(ϵ
_1R))
+p_y^2 ( .
(α ) (α ) ϵ _2B(2 log(ϵ _1B)-log(ϵ _1L)-log(ϵ
_1R))
+ϵ _2L(- (α ) (α ) log(ϵ _1B)+(3 (α )+2) (α ) (α ) log(ϵ _1L)/2 ( (α )+1)- (α ) log(ϵ _1R)/2 (sin (α )+cos (α )))
+ϵ _2R(- (α ) (α ) log(ϵ _1B)- (α ) log(ϵ _1L)/2
(sin (α )+cos (α ))+(3 (α )+2) (α ) (α ) log(ϵ _1R)/2 ( (α )+1))
. )
. )
. ,
(T^-,-_S m,S m)_Channel 4=-Ω^4/128 φ _z,IN(φ _z,OUT^2-1)
(.
64 ϵ _1Bϵ _2B+16 ϵ _1Bϵ _2L+16 ϵ _1Bϵ _2R+16 ϵ _2Bϵ _1L+16 ϵ _2Bϵ _1R+4 (cos (α )-sin (α )) (ϵ _1L-ϵ _1R) (ϵ _2L-ϵ _2R)/sin (α
)+cos (α )
^2(1/4 (2 α +π )) (α ) (2 sin (α )+cos (2 α )+3) (ϵ _1B-ϵ _1R)
(ϵ _2B-ϵ _2L)
-4 (α ) ^2(1/4 (2 α +π )) (ϵ _1B-ϵ
_1L) (ϵ _2B-ϵ _2L)
+ ^2(1/4 (2 α +π )) (α ) (2 sin (α )+cos (2 α )+3) (ϵ _1B-ϵ _1L)
(ϵ _2B-ϵ _2R)
-4 (α ) ^2(1/4 (2 α +π )) (ϵ _1B-ϵ _1R) (ϵ _2B-ϵ
_2R)
4 (2 tan(α/2)+ (α )) ((ϵ _1B-ϵ _1L) (ϵ _2B-ϵ
_2L)+(ϵ _1B-ϵ _1R) (ϵ _2B-ϵ _2R))
-4 tan ^2(α/2) tan (α ) ((ϵ _1B-ϵ _1L) (ϵ _2B-ϵ
_2L)+(ϵ _1B-ϵ _1R) (ϵ _2B-ϵ _2R))
). ,
(T^-,-_S m,S m)_Channel 5=
(6 ϵ _2B+ϵ _2L+ϵ _2R) Ω ^2 (Ω ^2 φ _z,IN+1)/8 φ _z,IN^2 (φ _z,OUT-1) (φ
_z,OUT+1) .
Appendix D: Fourier transform of a constant function on a polygon. Case q_⊥≠ 0
Start with the Stokes theorem applied for a polygon in the (x,y)-plane, <cit.>,
∬_polygon (∇×F)·dA=∮_right-oriented boundaryF·ds,
where dA=ẑ dx dy. Take the filed F to be of a special case F(x,y)=(ẑ× W) e^q_⊥· r_⊥, with W=(W_x,W_y) a constant 2-dimensional field.
Use the right-oriented pair (μ̂_j,λ̂_j) to compute, along each segment of the polygon, the right-hand integral from (<ref>). The integral over each segment gives different results for q_⊥·μ̂_j ≠ 0 or q_⊥·μ̂_j = 0. At this stage in the computations we notice two features
(i) the sum over segments is written in terms of sums over vertices,
(ii) we can drop the requirement of using a specific orientation of the polygon by using both μ̂_j and -μ̂_j for the j^th-segment. To accomplish this, if μ̂_j is associated with the vertex V_j, then associate -μ̂_j with the vertex V_j+1.
The result is a vertex-wise formula, with the sum running over the index k that labels the vertices of the polygon
∬_polygon dx dy e^i q_⊥· r_⊥= ∑_k∈vertices±W·λ̂_k/ W· q_⊥ 1/ q_⊥·μ̂_k e^i q_⊥· V_k.
The ± is the last remnant of the need of an orientation in the Stokes's theorem. To incorporate this ± into an unoriented polygon, place a permittivity ϵ inside the polygon, ϵ=0 outside and define the change in ϵ like in (<ref>).
The need for an orientation in the Stokes' theorem is exchange with the need to use a right-oriented pair (μ̂,λ̂). This, in turn, imposes the jump to change sign when μ̂ changes sign,
which makes the ± in (<ref>) to become part of (Δϵ)_μ̂.
We thus arrived at the formula (<ref>).
Note that the four corners of the unit cell contribute to the (00)-type Fourier integrals. For Channel 1, which is permittivity-independent, the corners contribute with jumps (Δ(f_1f_2))_μ̂ that are equal to ± 1, given that outside the unit cell we work with ϵ=0.
Appendix E: Fourier transform of a constant function on a polygon. Case q_⊥= 0
This integral is the area of the polygon, for which a simple answer is given by the sum of the areas of triangles, each triangle producing a term 1/2ẑ· (V_j+1× V_j). The disadvantage for us is that the vertices V_j+1 and V_J are not separated, as they are in the formula for q_⊥≠ 0.
Start from (<ref>) and take the limit of q_⊥→ 0 along a selected direction 𝒟
q_⊥ = s 𝒟→ 0, as s→ 0.
We will show that the final result is independent of the choice of the direction 𝒟.
With this choice of q_⊥ and 𝒟·μ̂≠ 0 for all μ̂, formula (<ref>) becomes
∑_verticese^i 𝒟· V s∑_μ̂_vertexW·λ̂/W·𝒟1/s(-Δϵ)_μ̂1/𝒟·μ̂1/s .
In (<ref>) there is a second-order singularity, s^-2, which we need to eliminate. To do just that, expand the exponential in Taylor series and examine the terms that belong to μ̂ and -μ̂ oriented along the same edge and notice that the second-order singularity is eliminated. However, a first-order singularity s^-1 came into being. This singularity goes away too once we sum up its contribution along a closed loop.
Once the singularity s^-1 is eliminated, we are left, in the limit s→ 0, with one term per segment
W·λ̂_j/W·𝒟1/𝒟·μ̂_j(-Δϵ)_μ̂_j1/2((i 𝒟· V_j)^2-(i 𝒟· V_j+1)^2).
This term can be placed back into a format that contains two μ̂ vectors per each edge. This is the result (<ref>).
We prove that the result thus obtained is independent on the choice of W and 𝒟 by showing that
(<ref>) is equal to sum of areas of triangles.
Call the vertices of the j-edge by V_j and V_j+1. Placed at V_j and V_j+1 are (λ̂_j,μ̂_j) and (λ̂_j+1,μ̂_j+1)=(-λ̂_j,-μ̂_j), respectively.
Along the computation we use V_j+1-V_j=μ̂_j l_j, where l_j is the length of the edge. Change the dot product into a cross product, W·λ̂=(ẑ× W)·μ̂, to prove the equality
W·λ̂_j/W·𝒟1/𝒟·μ̂_j(-Δϵ)_μ̂_j1/2(i 𝒟· V_j)^2+
W·λ̂_j+1/W·𝒟1/𝒟·μ̂_j+1(-Δϵ)_μ̂_j+11/2(i 𝒟· V_j+1)^2=
(-Δϵ)_μ̂_j1/W·𝒟1/2(ẑ× W)·
(V_j+1-V_j/l_j( 𝒟· V_j)+V_j+1-V_j/l_j( 𝒟· V_j+1))l_j .
There are four terms in the last line of (<ref>). Two out of these four sum up to zero when we go around a closed loop
keeping in mind that (-Δϵ)_μ̂_j is the same for all μ̂_j because we are working for a polygon with one kind of permittivity inside and ϵ=0 outside.
We are left with the sum of the other two terms, which, by the Binet-Cauchy vector relation, is transformed into a sum of oriented areas of triangles O V_j V_j+1, where O is some arbitrary origin.
Appendix F: The integral (00) on a polygonal tessellation of the plane
In the tessellated plane, for a selected vertex V and a pair (λ̂,μ̂) associated with this vertex, there are exactly two contributions from the two polygons that have a common edge along μ̂.
Two permittivity jumps along μ̂ originate from these two distinct polygons, each polygon being surrounded by a medium with ϵ=0. The sum of these polygonal jumps is actually equal to (-Δ(f_1f_2))_μ̂ but on the tessellated structure.
We arrived at the formula for the polygonal tessellation (<ref>).
Appendix G: Translation of a virtual point
A virtual point appears at the intersection of a line from plane 1 and another line from plane 2, which are described by r_1=V_12+μ_1μ̂_1 and r_2=V_12+μ_2 μ̂_2, respectively. Parameters μ_1 and μ_2 run on the real axis.
Apply a translation in plane 1,
δ r_1=(δ x_1,δ y_1), and plane 2,
δ r_2=(δ x_2,δ y_2), respectively.
Written in terms of a new set of parameters, μ_1^' and μ_2^', the translated lines are
(r_1)_translated= V_12-(δ r_1·λ̂_1)λ̂_1+μ_1^'μ̂_1,
(r_2)_translated= V_12-(δ r_2·λ̂_2)λ̂_2+μ_2^'μ̂_2.
To compute the position of the translated intersection, (V_12)_translated, solve for μ_1^' and μ_2^' such that (r_1)_translated=(r_2)_translated.
Use μ̂_2·λ̂_1=-μ̂_1·λ̂_2 and get at the final result (<ref>).
Appendix H: Fourier transforms for product of derivatives of type (01), (10) and (11)
We expand on (<ref>) and (<ref>).
In order to simplify the computation of ∂_δ x_1 and others of this kind, for case (2), (i.e. q_⊥·μ̂= 0 and q_⊥≠ 0), compound the product of the two vertex-dependent terms in one exponential
e^i q_⊥· V(i μ̂· V)=d/d s( e^i q_⊥· V+s i μ̂· V)|_s=0 .
For case (3), q_⊥=0, in a similar way as above, we get
1/2 (i 𝒟· V)^2=1/2(d^2/ds^2)_s= 0e^i (𝒟· V)s .
To group together the results for case (1) and (3), we found it useful to define a function e^i (q_⊥· V)_m, which for q_⊥≠0 it is equal to e^i q_⊥· V. For q_⊥=0 and for any natural number m it is 1/2(d^2/ds^2)_s= 0(e^i (𝒟· V)s s^m). So
e^i (q_⊥· V)_m =
e^i (q_⊥· V) for all m,if q_⊥≠ 0,
1/2(i 𝒟· V)^2 if m=0,and q_⊥= 0,
i 𝒟· V if m=1,and q_⊥= 0,
1 if m=2,and q_⊥= 0,
0 if m⩾3,and q_⊥= 0.
The function, for q_⊥=0, is equal to the term number 2-m, from the Taylor expansion.
With the help of this function, the contribution to the type (10)-integral, Section <ref>,
from a pair from plane 1, i.e. (V_1,μ̂), is
e^i (𝒟· V_1)_m_x^1+m_y^1 (-i𝒟_x )^m_x^1 (-i𝒟_y )^m_y^1
W·λ̂/W·𝒟(-Δ(f_1f_2)_μ̂)1/𝒟·μ̂,
where 𝒟 is arbitrary, subject to the condition that 𝒟·μ̂≠0 for all μ̂ in plane 1.
The contribution to the type (01)-integral from all real points from plane 2, i.e. V_2, is a mirror image.
The contribution to the type (11)-integral from a virtual point, V_12, under constrained translation has a different aspect, being
∑_all four μ̂^'se^i (𝒟· V_12)_m_x^1+m_y^1+m_x^2+m_y^2
(λ_1x)^m_x^1 (λ_1y)^m_y^1
(λ_2x)^m_x^2 (λ_2y)^m_y^2
(i𝒟·μ̂_2/μ̂_1·λ̂_2)^m_x^1+m_y^1(i𝒟·μ̂_1/μ̂_2·λ̂_1)^m_x^2+m_y^2
W·λ̂/W·𝒟(-Δ(f_1f_2)_μ̂)1/𝒟·μ̂ .
To avoid carrying over a minus sign and to arrive at the above formula, we use μ̂_2·λ̂_1=-μ̂_1·λ̂_2.
The sum, for a fixed virtual point V_12, is over all four μ̂^'s, which have the tail located at V_12.
The above sum, if needed, can be place in a form which is independent of the gauge vector W. For that, first notice that
(λ_1x)^m_x^1 (λ_1y)^m_y^1
(λ_2x)^m_x^2 (λ_2y)^m_y^2
(i𝒟·μ̂_2/μ̂_1·λ̂_2)^m_x^1+m_y^1(i𝒟·μ̂_1/μ̂_2·λ̂_1)^m_x^2+m_y^2
is the same for all four μ̂^'s, which have the tail located at V_12.
Second, use the relation
∑_all four μ̂^'sW·λ̂/W·𝒟(-Δ(f_1f_2)_μ̂)1/𝒟·μ̂=
λ̂_1·μ̂_2/(𝒟·μ̂_1)(𝒟·μ̂_2)
(Δ f)_μ̂_1(Δ g)_μ̂_2
valid for any two choices of μ̂_1 and μ̂_2, which have the tail located at V_12 and the tip on line 1 and line 2, respectively.
The contribution of a virtual point can be thus brought into a W-independent form
∑_V_12,two μ̂^'se^i (𝒟· V_12)_m_x^1+m_y^1+m_x^2+m_y^2
(i𝒟·μ̂_2/μ̂_1·λ̂_2λ_1x)^m_x^1(i𝒟·μ̂_2/μ̂_1·λ̂_2λ_1y)^m_y^1
(i𝒟·μ̂_1/μ̂_2·λ̂_1λ_2x)^m_x^2(i𝒟·μ̂_1/μ̂_2·λ̂_1λ_2y)^m_y^2
λ̂_1·μ̂_2/(𝒟·μ̂_1)(𝒟·μ̂_2)
(Δ f)_μ̂_1(Δ g)_μ̂_2 .
To show (<ref>), choose two out of four vectors that have the tail on the virtual point and direction on the line in plane 1 and plane 2, and call them μ̂_1 and μ̂_2, respectively. The other two vectors are -μ̂_1 and -μ̂_2.
Use
-Δ(f_1f_2)_μ̂_1-Δ(f_1f_2)_-μ̂_1=
-(-Δ(f_1f_2)_μ̂_2-Δ(f_1f_2)_-μ̂_2)
and get
∑_all four μ̂^'sW·λ̂/W·𝒟(-Δ(f_1f_2)_μ̂)1/𝒟·μ̂=
(W·λ̂_1/W·𝒟1/𝒟·μ̂_1-W·λ̂_2/W·𝒟1/𝒟·μ̂_2)
(-Δ(f_1f_2)_μ̂_1-Δ(f_1f_2)_-μ̂_1).
A vector identity, valid for any W, 𝒟 and two pairs
(λ̂_1,μ̂_1) and (λ̂_2,μ̂_2),
(W·λ̂_1)(𝒟·μ̂_2)-(W·λ̂_2)(𝒟·μ̂_1)=(W·𝒟)(λ̂_1·μ̂_2)
brings the right-hand side of (<ref>) into the form
(λ̂_1·μ̂_2/(𝒟·μ̂_1)(𝒟·μ̂_2))(-Δ(f_1f_2)_μ̂_1-Δ(f_1f_2)_-μ̂_1).
The final step is to prove that
(-Δ(f_1f_2)_μ̂_1-Δ(f_1f_2)_-μ̂_1)(λ̂_1·μ̂_2)=
(Δ f_1)_μ̂_1(Δ f_2)_μ̂_2λ̂_1·μ̂_2 .
This last equality can be established by going through every of the four cases of pairs (λ̂,μ̂). Another way is to notice that -Δ(f_1f_2)_μ̂_1-Δ(f_1f_2)_-μ̂_1 is equal to (Δ f)_μ̂_1(Δ g)_μ̂_2 up to a sign, i.e. -Δ(f_1f_2)_μ̂_1-Δ(f_1f_2)_-μ̂_1=± (Δ f_1)_μ̂_1(Δ f_2)_μ̂_2. This is so, because the left-hand side is invariant under the change in sign μ̂_1→ -μ̂_1, whereas the right-hand side changes its sign. The absolute value eliminates this change in sign and so the equality is valid.
Appendix I: The optimization procedure for selecting the dielectric constants
Construct, out of (<ref>), a 8 × 5 sub-matrix composed of transfer matrix elements that couples only the S-polarization of the four modes selected, (0,0),(-1,0),(0,-1),(0,1). The equations to solve are obtained from formula (<ref>). The OUT set (DIR,POL,BF) is composed of (±,S,m), with m=1,…,4 from Table <ref>. Given the absence of any source at z=+∞, the coefficients C_POL,BF^DIR are all zero for (-,S,m), m=1,…,4. At IN, the set (dir,pol,bf) contains the incoming (+,S,1) and the reflected (-,S,m), with m=1,…,4. There are 8 unknown coefficients, 4 at OUT and another 4 at IN.
The 8× 5 matrix transfers the input column vector (𝒞^+_S1,𝒞^-_S1,𝒞^-_S2,𝒞^-_S3,𝒞^-_S4) into the output (C^+_S1,C^+_S2,C^+_S3,C^+_S4,0,0,0,0). For ease of reading, the IN and OUT coefficients are marked using distinct fonts. Within this approximation, we can solve 8 equations for 8 unknowns coefficients, by fixing the input 𝒞^+_S1=1. The coefficients thus found are the transmission and reflection coefficients for the 4 modes under consideration.
To construct an objective function for the optimization process we use a series of properties. The first property is that in the vicinity of the resonant frequency the absolute value of the determinant of the 4× 4 matrix (T^-,-_Sm,Sn) attains a minimum. The second one is that the absolute value of the transmission and reflection coefficients of the evanescent modes need to attain high values. The third property is based on the absorptance factor defined as 1-C^+_S1^2-C^+_S2^2-𝒞^-_S1^2-𝒞^-_S2^2, similarly to the definition from <cit.>. The absorptance factor goes through a maximum around the resonant frequency.
The objective function we use is
Det(T^-,-_Sm,Sn)+
C^+_S1^2+C^+_S2^2+𝒞^-_S1^2+𝒞^-_S2^2-0.5
+
C^+_S3-10+C^+_S4-10 .
Only the transmission coefficients for the evanescent waves are present in (<ref>) because we expect that the reflection coefficients be very close, in absolute value, to the transmission values. We choose 10 as a target number for this values. For the absorptance factor the target values is chosen at 0.5.
For a fixed frequency in the range 37 GHz to 50 GHz, we found a local minimum for this objective function in the 6-dimensional space of the dielectric constants, each constant constrained to be between 1 and 12.
After scanning 100 frequencies, the local minimum we selected has f=41.29 GHz, Det(T^-,-_Sm,Sn) =2.5× 10^-5-3.7× 10^-5 i, C^+_S1= 0.59 - 0.0022 i, 𝒞^-_S1= -0.21 - 0.59 i, C^+_S2= 0.041 + 0.31 i, 𝒞^-_S2=0.04 + 0.34 i, C^+_S3=-10.03 - 0.15 i, 𝒞^-_S3=-10.61 - 0.18 i,
C^+_S4=-3.92 + 9.20 i and 𝒞^-_S4= -4.13 + 9.74 i.
We see that the obtained determinant is a small number and that the reflection and the transmissions coefficients are close, in absolute value, to the value 10 we imposed. The absorptance factor came out as 0.04, far from the value of 0.5. This is because in the vicinity of the resonant frequency the transmission and reflection coefficients of the propagative modes attain a minimum at frequencies slightly different than the resonance.
The dielectric permittivity set for the local minimum is
ϵ _1B= 4.98655,ϵ _2B= 2.95855,ϵ _1L= 7.59549,
ϵ _2L = 5.663,ϵ _1R=
5.92965,ϵ _2R= 1.63434
Appendix J: Complex frequency plane
The real resonant frequency is located at the minimum of the determinant on the real Ω-axis.
The zero of the cofactor is located in the upper complex plane, Im(f_zero)>0
. A search for the minimum of the absolute value of the Cofactor_S(0,0),S(0,1)(T^-,-) gives a complex frequency Ω_zero= 0.213999052599+0.00014322547392 i, for which the Cofactor attains the value of -4.17186×10^-7 + 5.51181×10^-7 i. Translated in frequency, using c=0.25 mm, we get f_zero=40.8425 + 0.0273351 i in GHz. Once this zero is localized, the parameters a and b are estimated through a linear regression, <cit.>.
The linear approximation of the cofactor in the vicinity of Ω_zero,
Cofactor_S(0,0),S(0,1)(T^-,-)≅(a+i b) (Ω-Ω_zero),
contains two unknown parameters, a and b. The numerical data consists of pairs (Ω,Cofactor_S(0,0),S(0,1)(T^-,-)) obtained from sampling the upper complex-frequency plane using the analytical formulas for the transfer matrix.
The linear approximation for the determinant starts with localizing Re(Ω_resonance)=0.21632449245970709 on the real axis at the point where the absolute value of the determinant becomes minimum, attaining the value 1.15869. In terms of the frequency, the resonance is at Re(f_resonance)=41.28635279688047 GHz. The linear approximation of the determinant in the vicinity of Ω_pole=0.21632449245970709+ i y_pole,
Det(T^-,-)≅(a^'+i b^') (Ω-Ω_pole),
contains three unknown parameters, a^', b^' and y_pole. The numerical data consists of pairs (Ω,Det(T^-,-)) obtained from sampling the upper complex-frequency plane around Re(Ω_resonance) using the analytical formulas for the transfer matrix. The fit this time is nonlinear because of the product (a^'+i b^') y_pole.
|
http://arxiv.org/abs/2303.07322v1
|
20230313174255
|
Coulomb-induced synchronization of intersubband coherences in highly doped quantum wells and the formation of giant collective resonances
|
[
"Mikhail Tokman",
"Maria Erukhimova",
"Yongrui Wang",
"Alexey Belyanin"
] |
cond-mat.mes-hall
|
[
"cond-mat.mes-hall",
"physics.optics",
"quant-ph"
] |
Department of Electrical and Electronic Engineering, Ariel University, 40700 Ariel, Israel
Biraghigasse 8, 1130 Vienna, Austria
Department of Physics and Astronomy, Texas A&M University, College Station, TX, 77843 USA
Department of Physics and Astronomy, Texas A&M University, College Station, TX, 77843 USA
Many-body Coulomb interactions drastically modify the optical response of highly doped semiconductor quantum wells leading to a merger of all intersubband transition resonances into one sharp peak at the frequency substantially higher than all single-particle transition frequencies. Starting from standard density matrix equations for the gas of pairwise interacting fermions within Hartree-Fock approximation, we show that this effect is due to Coulomb-induced synchronization of the oscillations of coherences of all N intersubband transitions and sharp collective increase in their coupling with an external optical field. In the high doping limit, the dynamics of light-matter interaction is described by the analytic theory of N coupled oscillators which determines new collective normal modes of the system and predicts the frequency and strength of the blueshifted collective resonance.
Coulomb-induced synchronization of intersubband coherences in highly doped quantum wells and the formation of giant collective resonances
Alexey Belyanin
March 30, 2023
=========================================================================================================================================
§ INTRODUCTION
Intersubband optical transitions in doped semiconductor quantum wells attracted strong recent interest due to their giant optical nonlinearities, tunability, and ultrafast response, which promise a broad range of applications from nonlinear frequency mixing, ultrafast saturation, and mode locking to ultra-strong coupling in cavity quantum electrodynamics; see, e.g., recent papers <cit.> and references therein. There has been a number of experimental and theoretical studies of dramatic changes in the intersubband absorption and emission in highly doped semiconductor quantum wells. These changes are the manifestation of the Coulomb-induced collective effect called the depolarization field <cit.>, when in the presence of the electromagnetic (EM) radiation each electron is affected by an effective field induced by the excitations of other electrons. The main result of such coupling is the macroscopic polarization which is established in the quantum well as a result of collective modes of oscillations of the electron gas. When the electron density is low and only a single subband is occupied, the depolarization field results in a blue shift of the absorption peak with respect to the “bare” transition frequency. This resonance frequency corresponds to the so called intersubband plasmon <cit.>. The effect of the depolarization field is much more dramatic if the quantum well is highly doped so that several subbands are occupied. In this case, instead of several absorption peaks corresponding to transitions between different subbands, the experiment shows a single strong peak, blueshifted from all “bare” transitions <cit.>. This has been interpreted as the excitation of the collective mode of the system, the so-called multisubband plasmon <cit.>. The model describing this effect <cit.> was based on the formalism of “bosonization” of the electron gas. In this formalism the Hamiltonian describing the electron gas is reduced to the expression that contains bosonic operators instead of fermionic ones, namely the operators of creation and annihilation of excitations associated with a given intersubband transition. Such bosonic operators are proportional to the dyadics ρ̂_mn=â^†_nâ_m, where â^†_n and â_m are the creation and annihilation operators of electrons in corresponding states. When the populations are assumed constant, the operators ρ̂_mn obey the standard bosonic commutation relation [ρ̂_mn ,ρ̂^†_mn]=const. The same operators ρ̂_mn define the operator of the electric polarization which appears in the total Hamiltonian in the dipole gauge <cit.> as an independent variable and describes the effects of dipole-dipole interactions and the coupling of the electronic polarization with a quantized EM field <cit.>.
We develop an alternative approach to describe the light-matter dynamics which does not rely on any approximations related to bosonization and replacement of the fermionic Hamiltonian by effective bosonic one. We obtain the absorption spectrum of the high-density two-dimensional electron gas confined in a quantum well by solving von Neumann density matrix equations taking into account pairwise Coulomb interactions of electrons within the Hartree-Fock (HF) approximation. We show that at high doping the exchange interaction (Fock) terms become insignificant as compared to Hartree terms. Moreover, the exchange interaction effects contributing to the intersubband transition energy renormalization and the coupling of coherences nearly cancel each other. Therefore, the exchange interaction introduces negligible corrections to the spectrum, which is dominated by electron interaction through a common field. Mathematically, the problem is reduced to the system of linearly coupled 2N first-order differential equations for coherences excited at the intersubband transitions by an external monochromatic force, where N is a number of the intersubband transitions. Therefore, the observed spectra can be understood within an intuitive and transparent picture of self-synchronization in a system of N coupled oscillators, which is a universal phenomenon in the nonlinear dynamics, with numerous analogies not only in quantum-well optics (e.g., self-synchronization of quantum-cascade laser modes <cit.> or Coulomb-induced Fermi-edge singularity <cit.>) and plasma physics (e.g., synchronization of oscillations of free electrons in the collective
field of a Langmuir wave), but across all areas of physics and other sciences <cit.>. We are able to obtain important analytic results, in particular the frequencies and oscillator strengths of the new collective normal modes of the system. The collapse of all transitions into a single absorption peak is naturally explained by the presence of Coulomb-induced couplings between intersubband coherences, similarly to the effect of springs connecting mechanical oscillators. In fact, the mechanical analogy can be made mathematically exact; see Fig. 1 and Appendix C. The action of these “Coulomb springs” leads to both the blueshift of the collective resonance frequency and giant enhancement of its oscillator strength.
The paper is organized as follows. In Section <ref> we present the Hamiltonian of the system of Coulomb-coupled identical fermions in a quantum well within the second quantization formalism. In Section <ref> the von Neumann equations for coherences are derived in Hartree-Fock approximation. The final form of the equations taking into account the Hartree modification of the ground state and Hartree coupling terms, and neglecting the exchange interaction is presented. In Section <ref> the solution of this system of coupled equations for coherences at different intersubband transitions is obtained in a general form. The expression for the absorption spectrum of a highly doped quantum well with several occupied subbands is derived analytically. It represents the superposition of collective oscillation eigenmodes with amplitudes proportional to the oscillator strengths and eigenfrequencies different from the original “bare” intersubband transition frequencies. In subsection <ref> we prove that the Coulomb interaction leads to a collapse of several excited intersubband transitions into one sharp peak at the frequency substantially higher than all the transition frequencies. This effect is illustrated by the mechanical model of “Coulomb springs”. The conditions imposed on the electron concentration and the quantum well thickness under which this effect dominates the optical response are formulated in subsection <ref>. The analytic expression for the frequency of a single bright resonance mode is obtained there. In subsection <ref> the numerically calculated absorption spectra of an electron gas with different concentrations and quantum wells with different thicknesses are presented. In Section <ref> we investigate analytically and numerically the impact of exchange effects on the absorption spectra and come to the conclusion that they are negligible at high doping. Appendix A describes the eigenfunctions and eigenstates of the Hartree Hamiltonian. Appendix B proves the sum rule for the new collective normal modes of the system. Appendix C derives the equations of motion for the mechanical model of “Coulomb springs” and Appendix D evaluates the screening effect coming from higher-order correlations.
§ THE MODEL AND THE HAMILTONIAN
In the second quantization form, the Hamiltonian of the system of interacting identical electrons placed in the QW confinement potential and the potential of ions can be written as
Ĥ=Ĥ_0+Ĥ_ee+Ĥ_ei
where
Ĥ_0=∫d^3rΨ̂^†_e(r)(p^2/2m^*+V_e(z))Ψ̂_e(r),
is a free-particle term,
Ĥ_ee=1/2∫d^3r∫d^3r'Ψ̂^†_e(r)Ψ̂^†_e(r')V(|r-r'|)Ψ̂_e(r')Ψ̂_e(r),
describes electron-electron interactions, and
Ĥ_ei=-N_2D∫d^3r∫d^3r'Ψ̂^†_e(r)Ψ̂_e(r)V(|r-r'|)ρ_i(z'),
describes electron-ion interactions.
Here m^* is the effective mass, V_e(z) is the confinement potential, z is the growth direction of the quantum well structure, V(|r-r'|)=e^2/ε_0|r-r'|
is the Coulomb interaction potential, ε_0 is the background dielectric constant, N_2D is the sheet doping density, and ρ_i(z) is the normalized doping profile of the ions, satisfying ∫ρ_i(z)dz=1.
The operator Ψ̂_e(r) can be expanded using the wave functions which form a complete one-particle basis. The basis functions are not necessarily wave functions which diagonalize a one-particle Hamiltonian
Ĥ^0=p^2/2m^*+V_e(z); the only requirement is that these are eigenfunctions of the two-dimensional momentum operator
p_=-i ∂/∂R,
where R is the coordinate in the plane of quantum well:
Ψ̂_e(r)=∑_nkφ_n(z)e^ikR/√(S)â_nk,
where â_nk is the fermionic annihilation operator in the corresponding state. The quantity S is the normalization area in the QW plane,
1/S∫_Sd^2R∫^∞_-∞dzφ^*_n(z)φ_m(z)e^-ikRe^ik'R=δ_nmδ_κκ'.
Then we get for the components of the Hamiltonian in Eq. (<ref>)
Ĥ_0=∑_mn∑_kH^0_mn(k)â^†_mkâ_nk,
Ĥ_ee=1/2S∑_mnlp∑_k_1k_2qV^ee_mnlp(q)â^†_mk_1-qâ^†_lk_2+qâ_pk_2â_nk_1=
=1/2S∑_mnlp.V^ee_mnlp(q)|_q=0∑_k_1k_2â^†_mk_1â^†_lk_2â_pk_2â_nk_1+
+1/2S∑_mnlp∑^q≠ 0_k_1k_2qV^ee_mnlp(q)â^†_mk_1-qâ^†_lk_2+qâ_pk_2â_nk_1,
Ĥ_ei=-N_2D∑_mn.V^ei_mn(q)|_q=0∑_kâ^†_mkâ_nk,
where
V^ee_mnlp(q)=∫dz∫dz'2π e^2/ε_0qe^-q|z-z'|φ^*_m(z)φ_n(z)φ^*_l(z')φ_p(z')
V^ei_mn(q)=∫dz∫dz'2π e^2/ε_0qe^-q|z-z'|φ^*_m(z)φ_n(z)ρ_i(z').
The charge neutrality condition requires that SN_2D=∑_nkn_nk, where n_nk=⟨â^†_nkâ_nk⟩. The q=0 terms should be interpreted as
.2π e^2/ε_0qe^-q|z-z'||_q=0=lim_q→ 02π e^2/ε_0qe^-q|z-z'| =.V^2D(q)|_q=0-2π e^2/ε_0|z-z'|,
where V^2D(q)=2π e^2/ε_0q is the two-dimensional Fourier transform of the Coulomb potential. Divergence of V^2D(q) can be avoided by considering the screening effect, see Appendix <ref>.
In the presence of an optical field ℰ(t) polarized along with the growth direction the Hamiltonian contains another term,
Ĥ_e-ph=-ℰ(t)∑_mn∑_kμ_mnâ^†_mkâ_nk,
where μ_mn are the dipole matrix elements. When the two indices are equal, μ_nn=ez_nn, where z_nn is the average position for level n. This element is only relevant for asymmetric QWs, otherwise it is just a constant in the Hamiltonian.
§ DYNAMICS IN THE HARTREE BASIS
The dynamics of the density matrix elements ρ_nm(k)≡⟨â^†_mkâ_nk⟩ is described by the Heisenberg equations
iħd/dt⟨â^†_mkâ_nk⟩ =⟨[â^†_mkâ_nk, Ĥ_0+Ĥ_ee+Ĥ_ei+Ĥ_e-ph]⟩ .
For commutation with Ĥ_ee and Ĥ_ei, it can be shown that the terms proportional to .V^2D(q)|_q=0 give zero. For the rest of the terms we get
iħd/dtρ_nm(k)=∑_l(H^0_nl(k)ρ_lm(k)-H^0_lm(k)ρ_nl(k))
+1/S∑_lpgṼ^ee_nlgpρ_lm(k)∑_k'ρ_pg(k')-1/S∑_lpgṼ^ee_lmgpρ_nl(k)∑_k'ρ_pg(k')
-N_2D∑_l(Ṽ^ei_nlρ_lm(k)-Ṽ^ei_lmρ_nl(k))
-ℰ(t)∑_l(μ_nlρ_lm(k)-μ_lmρ_nl(k))
-1/S∑_lpg∑_q≠0V^ee_npgl(q)ρ_lm(k)ρ_pg(k+q)+1/S∑_lpg∑_q≠0V^ee_lpgm(q)ρ_nl(k)ρ_pg(k+q),
where
Ṽ^ee_mnlp=-∫dz∫dz'2π e^2/ε_0|z-z'|φ^*_m(z)φ_n(z)φ^*_l(z')φ_p(z')
Ṽ^ei_mn=-∫dz∫dz'2π e^2/ε_0|z-z'|φ^*_m(z)φ_n(z)ρ_i(z').
In the derivation above, the random phase approximation (RPA) is used, namely we split quadruple correlators and only keep the density matrix elements which are diagonal with respect to k.
It is important that the first four lines in Eq. (<ref>) can be obtained by including only the coupling of electrons through their collective Coulomb field and their interaction with the optical field, i.e., they follow from the single-particle Hamiltonian including the self-consistent field:
Ĥ^(1)=Ĥ^0-eϕ(z)+Ĥ^(1)_e-ph.
Here the electric potential ϕ(z) obeys the one-dimensional Poisson's equation
ϕ^”_zz=-4π/ε_0Q(z),
where the spatial charge density distribution Q(z) is self-consistently expressed via the density matrix elements:
Q(z)=eN_2Dρ_i(z)-e1/S∑_mn∑_kρ_mn(k)φ^*_m(z)φ_n(z).
The last line in Eq. (<ref>) is due to exchange interaction. It cannot be obtained in the single-particle picture.
The eigenstates of the single-particle Hamiltonian Ĥ^H=Ĥ^0-eϕ(z), in which the collective field ϕ(z) is self-consistently produced by electrons with an equilibrium diagonal distribution over these particular eigen tates, form the so-called Hartree basis. The Hartree Hamiltonian can be written as
Ĥ^H=Ĥ^0+2π e^2/ε_0N_2D∫dz'|z-z'|ρ_i(z')-
-2π e^2/ε_01/S∑_m∑_kρ_mm(k)∫dz'|z-z'||φ_m(z')|^2.
The equation for eigenfunctions and eigenvalues is
Ĥ^Hφ_m(z)e^ikR/√(S)=(ħ^2k^2/2m^*+E^H_m)φ_m(z)e^ikR/√(S).
Here ρ_mm(k) are equilibrium populations obeying the Fermi-Dirac statistics over the self-consistently obtained energies E^H_m. The equations that can be used for the numerical calculation of the Hartree basis are presented in the Appendix <ref>.
Considering the exchange interaction and the interaction with the optical field as perturbations, the equilibrium diagonal distribution over the Hartree states should be used as an unperturbed state of the system. Equation (<ref>) is greatly simplified in the Hartree basis defined by Eqs. (<ref>), (<ref>). In linear approximation with respect to perturbations, the equations of motion for the nondiagonal density matrix elements take the form
iħd/dtρ_nm(k)=(E^H_n-E^H_m)ρ_nm(k)+
+1/S∑_p≠ gṼ^ee_nmgp∑_k'ρ_pg(k')(ρ_mm(k)-ρ_nn(k))+
-1/S∑_lp∑_q≠0ρ_pp(k+q)(V^ee_nppl(q)ρ_lm(k)-V^ee_lppm(q)ρ_nl(k))-
-1/S∑_p≠ g∑_q≠0V^ee_npgm(q)ρ_pg(k+q)(ρ_mm(k)-ρ_nn(k))-
-ℰ(t)μ_nm(ρ_mm(k)-ρ_nn(k)) .
If the exchange interaction is neglected, i.e., the third and the fourth rows in Eq. (<ref>) are dropped, one can sum over k and obtain much more compact equations for the dynamics of variables ρ_nm=1/S∑_kρ_nm(k):
iħd/dtρ_nm=(E^H_n-E^H_m)ρ_nm+∑_p≠ gṼ^ee_nmgp(ρ_mm-ρ_nn)ρ_pg-ℰ(t)μ_nm(ρ_mm-ρ_nn)-iħΓρ_nm.
Here we have added the relaxation term in its simplest form. Equation (<ref>) clearly demonstrates that the Coulomb interaction creates linear coupling of effective electron oscillators at different transitions between the subbands dressed by the self-consistent field. This coupling is stronger with increasing population differences. Note that Eq. (<ref>) contains total populations due to summation over k and therefore the population differences can be large despite the Pauli blocking of some k-states.
In what follows, we analyze the absorption of a highly-doped QW system. We use Eq. (<ref>), where exchange terms are dropped. In Section <ref> we evaluate the effect of exchange terms on the absorption spectrum.
§ THE ABSORPTION SPECTRUM OF HIGHLY DOPED QUANTUM WELLS
Equations (<ref>) represent a system of first-order differential equations for N_l linearly coupled variables ρ_j=ρ_nm in the presence of an “external force”. Here N_l is a number of discrete levels (Coulomb-dressed subbands) involved in the interaction. The corresponding number of the transitions is N_t=1/2N_l(N_l-1). Introducing the index numerating the transitions j={nm}, where the transitions {nm}=j and {mn}=j' are counted separately, we can rewrite Eqs. (<ref>) in the form
ρ̇_j=-i∑^2N_t_l=1Z_jlρ_l+if_j(t)- Γρ_j.
Here the elements of matrix ℤ are given by
Z_jl=ω_jδ_jl+ e^2/ħI_jl'Δn_j,
where the notations are
ω_j=1/ħ (E^H_n-E^H_m), I_jl'=1/e^2Ṽ^ee_nmgp, Δn_j=ρ_mm-ρ_nn, f_j(t)=1/ħμ_jℰ(t)Δn_j, μ_j=μ_nm
for j={nm}, l={pg}, l'={gp}.
Considering a monochromatic external field,
ℰ(t)=Re(E^ωe^-iω t),
we are looking for the induced solution of Eq. (<ref>),
ρ_j=ρ^ω_je^-iω t+ρ^-ω_je^iω t,
for which the differential equations Eq. (<ref>) are reduced to the algebraic ones:
-iωρ^ω_j=-i∑^2N_t_l=1Z_jlρ^ω_l+if^ω_j-Γρ^ω_j,
where
f^ω_j=1/2ħμ_jE^ωΔn_j.
Equation (<ref>) can be presented in the vector form, where the dimension of vector space is equal to 2N_t:
-iωρ^ω=-iℤρ^ω+if^ω-Γρ^ω.
The averaged dipole moment per unit area of the quantum well, excited as a response to the incident EM wave is calculated as
P(t)=∑_m,nμ_mnρ_nm=∑^2N_t_j=1μ_j(ρ^ω_je^-iω t+ρ^-ω_je^iω t).
For simplicity, we can assume that the matrix elements of the dipole moment are real, so that μ_mn=μ_nm. Effective absorbance, which determines the energy absorbed per unit area of the layer, is given by
Σ(ω)=4ω/c Im(∑^2N_t_j=1μ_jρ^ω_j/E^ω).
If the Coulomb interaction of electrons, and therefore the coupling of oscillations at different transitions, is neglected, the matrix ℤ in Eq. (<ref>) is diagonal, Z_jl=ω_jδ_jl, and the induced solution at frequency ω is defined by the standard Lorentzian:
ρ^ω_j=if^ω_j/i(ω_j-ω)+Γ.
In this case the absorbance given by Eq. (<ref>) yields
Σ(ω )= 4 ω/c Re(∑^2N_t_j=1μ_j f^ω_j/E^ω/ i(ω_j-ω)+Γ).
Taking into account that ω_j=-ω_j', μ_j=μ_j', f^ω_j=-f^ω_j', Eq. (<ref>) can be transformed into
Σ(ω )=e^2N_2D/cm^*Re(∑^N_t_j(ω_j>0)F_j4ω/2Γω +i(ω_j^2-ω^2)).
Here the dimensionless parameter F_j is the “oscillation strength” of the transition with frequency ω_j, multiplied (as compared with the standard definition) by the population difference at this transition normalized to the sheet doping density Δn_j/N_2D:
F_j=2m^*/e^2N_2Dω_jμ_jf^ω_j/E^ω=m^*μ^2_jω_j/ħ e^2Δn_j/N_2D.
These modified “oscillation strengths” still obey the sum rule,
∑^2N_t_j=1F_j=1.
This can be proven with the use of the relation ∑_m|μ_mn|^2ω_mn=e^2ħ/2m, which is true for any one-dimensional Hamiltonian.
If the transitions are well resolved, the absorption spectrum Eq. (<ref>) represents the combination of resonant lines with the peak absorbance values given by
Σ(ω_j)≈2e^2N_2D/cm^*F_j/Γ.
The Coulomb interaction leads to coupling of oscillations at different transitions and enables a dramatic modification of the absorption spectra. The matrix ℤ in Eq. (<ref>) acquires off-diagonal elements. By the linear change of variables
ρ̃_l=B_ljρ_j
the matrix ℤ can be transformed to the diagonal form, so that for the new variables ρ̃_l Eq. (<ref>) takes the form
-iωρ̃^ω_l=-iΩ_lρ̃^ω_l+if̃^ω_l-Γρ̃^ω_l.
The transformation matrix ℬ={B_lj} is composed of eigenvectors of the transposed Coulomb coupling matrix ℤ^T:
∑_iZ_ijB_li=Ω_lB_lj,
or in equivalent form, ℤ^TB_l=Ω_lB_l. The eigenvalues Ω_l of matrix ℤ (or matrix ℤ^T) are the frequencies of eigenmodes in the system of coupled oscillators. The “force vector” f^ω is transformed by the same matrix as
f̃^ω_l=B_ljf^ω_j.
The new components of the “force vector” are the projections of this vector onto the directions defined by the vectors B_l , i.e., they can be calculated as a scalar product
f̃^ω_l=(B_l·f^ω).
The solution of Eq. (<ref>) has a simple form, similar to Eq. (<ref>):
ρ̃^ω_l=if̃^ω_l/i(Ω_l-ω)+Γ.
Applying the inverse transformation to Eq. (<ref>) and substituting the result into Eq. (<ref>) we get the following expression for the absorbance:
Σ(ω )= 4ω/c Re(∑^2N_t_lμ̃_lf̃^ω_l/E^ω/i(Ω_l-ω)+Γ) .
It looks exactly like Eq.(<ref>), but with different resonance frequencies, dipole moments, and external forces, defined for the new collective normal modes of the system. Note that the effective “dipole vector” μ is transformed according to the operator which differs from ℬ:
μ̃_l=(ℬ^-1)^H_ljμ_j.
It can be shown that new components of the “dipole vector” are the projections of this vector onto the directions defined by the eigenvectors of matrix ℤ (ℤD_l=Ω_lD_l):
μ̃_l=(D_l·μ).
The matrix ℤ is not symmetric, and therefore its eigenvectors are not orthonormal, and the matrix ℬ is not unitary. However, since matrix ℤ obeys the following relation,
Z_ij=-Z_j'i',
for every number l which counts a new normal mode, there exists such a number l' that Ω_l=-Ω_l', B_lj=B_l'j', D_lj=D_l'j'. As result, we have μ̃_l=μ̃_l' , f̃_l=-f̃_l'. Thus we can rewrite the expression for the absorption spectrum Eq. (<ref>) in the form similar to Eq. (<ref>),
Σ(ω )=e^2N_2D/c m^*Re(∑^N_t_l(Ω_l>0)F̃_l4ω/2Γω +i(Ω^2_l-ω^2)).
Here the “oscillator strengths” of new normal oscillators are introduced:
F̃_l=2m^*/e^2N_2DΩ_lμ̃_lf̃^ω_l/E^ω=2m^*/e^2N_2DΩ_l(D_l·μ)(B_l·f^ω)/E^ω.
The absorption spectrum in Eq. (<ref>) represents the superposition of resonant lines at frequencies of the new normal modes Ω_l with the peak absorbance values proportional to new “oscillator strengths” F̃_l:
Σ(ω =Ω_l)≈2e^2N_2D/cm^*F̃_l/Γ.
It is remarkable that the sum rule holds true for the new “oscillation strengths” as well (see the Appendix <ref> for the proof):
∑^2N_t_l=1F̃_l=1.
To summarize this section, the Coulomb coupling of coherences at different intersubband transitions leads to the shift of resonant frequencies and redistribution of the “oscillation strengths” between new normal modes. In the next section we show that such redistribution leads to a dramatic effect in which most of the absorbance occurs at one of the normal mode frequencies, which is strongly blueshifted with respect to all “bare” intersubband transition frequencies.
§.§ Coulomb-induced self-synchronization of dipole oscillations. The“Coulomb springs” regime
In this Section investigate the properties of the Coulomb coupling matrix ℤ (Eq. (<ref>)) and show that under certain conditions the eigenvector of this matrix corresponding to one of the normal modes is optimally oriented with respect to the “force vector”, so that the “oscillation strength” for this normal mode dominates and reaches its maximum value (F̃_m=F̃_m'≈1/2). In other words, oscillations at different intersubband transitions get self-synchronized to produce one powerful collective mode of oscillations. We also show that the eigenfrequency for this mode is large compared with “bare” frequencies of intersubband transitions.
We assume that the doping is high enough, so that several subbands are populated in equilibrium, and there are 2N_t intersubband transitions with significant dipole moments and total population difference. As an estimation, for an isolated symmetric QW N_t is a number of populated subbands and the relevant transitions are those between neighboring subbands, because they tend to have a much larger transition dipole matrix element as compared to the transitions between more distant subbands. One can of course modify and control the transition dipole moments and frequencies on demand by designing asymmetric coupled QW structures.
For analytic illustration of the effect, we take some averaged values of the transition frequencies, overlap integrals, dipole moments, and population differences for all transitions:
|ω_j|≈ω_0, |e^2/ħI_jlΔn_j|≈Ω, |μ_j|≈μ , |f^ω_j|=|1/2ħμ_jE^ωΔn_j|≈ f
for all j. In a real system these parameters for different transitions are different, and the resulting response will differ from the ideal one, but the basic reasoning remains the same.
Since there is a correspondence between the overlap integrals I_ij (see Eqs. (<ref>) and (<ref>)) and the dipole moments,
sign(I_ij)= sign(μ_iμ_j),
the coupling matrix ℤ can be presented in the following form:
ℤ≈ω_0( [ 1̂ 0; 0 -1̂ ])+Ω( [ ℚ ℚ; -ℚ -ℚ ])=( [ ℤ_+ ℤ_±; ℤ_∓ ℤ_- ]),
where
dim(1̂) =dim(ℚ) =N_t× N_t,
Q_ij=δ_iδ_j, δ_i= sign(μ_i).
Here the numbering order of the subbands is chosen in such a way that ω_j>0 for 1≤ j≤ N_t and j'=j+N_t. Then the “dipole vector” and “force vector” are equal to
μ=μ( [ δ; δ ])=( [ μ_+; μ_- ]), f=f( [ δ; -δ ])=( [ f_+; f_- ]),
where dim(δ) =N_t. It is taken into account in Eq. (<ref>) and Eq. (<ref>) that μ_j=μ_j', Δn_j=-Δn_j', and ω_j=-ω_j'.
Consider the matrix ℤ_+, which is the “positive frequency” part of matrix ℤ. The eigenvector of ℤ_+ which corresponds to the in-phase addition of all oscillators, and therefore to the maximum increase of the corresponding eigenvalue, turns out to be “co-directional” with both the “dipole vector” μ_+ and the “force vector” f_+, so that the corresponding scalar products are maximal. Such an eigenvector is proportional to δ. Taking into account the coupling with “negative frequency” vector components, we search for the optimal eigenvector of matrix ℤ in the following form (marked by index “m”):
D_m=C( [ δ; (α -1)δ ]),
where C is the normalization factor, whereas the parameter α is found from the equation
ℤD_m=CΩ( [ (ω_0/Ω+α N_t)δ; (ω_0/Ω-αω_0/Ω-α N_t)δ ])=Ω_mC( [ δ; (α -1)δ ]).
Solving for it, we find
α =-ω_0/N_tΩ±√((ω_0/N_tΩ)^2+2ω_0/N_tΩ).
The frequency of the normal mode which corresponds to this eigenvector is
Ω_m=±√(ω_0^2+2ω_0N_tΩ).
Under the condition
N_tΩ≫ω_0
the frequency of this normal mode turns out to be much larger than a typical bare transition frequency
Ω_m≈√(2ω_0N_tΩ)≫ω_0.
For the effective dipole moment corresponding to this normal oscillator and for the “force vector” component, from Eq. (<ref>) and Eq. (<ref>) we obtain
μ̃_m≈μ(ω_0N_t/2Ω)^1/4, f̃_m≈ f(ω_0N_t/2Ω)^1/4 .
As a result, the “oscillator strength”, defined by Eq.(<ref>), is
F̃_m=2m^*/e^2N_2DΩ_mμ̃_mf̃^ω_m/E^ω≈2m^*/e^2N_2DN_tω_0μ f/E^ω_z.
It shows that the “oscillator strength” at the frequency Ω_m is N_t times higher as compared with the oscillator strengths at uncoupled transitions Eq. (<ref>). By virtue of the sum rule for the new “oscillation strengths” Eq. (<ref>), an almost total suppression of the optical response at all other normal frequencies will take place. From Eq. (<ref>) we obtain that F̃_m=1/2. Furthermore, according to Eq. (<ref>) the frequency of this bright mode is √(2N_tΩ/ω_0) times higher than bare transition frequencies. Note that even if one subband were populated, N_t=1, the frequency of the effective oscillator taking into account Coulomb interaction of electrons would be still √(1+2Ω/ω_0) larger than the “bare” transition frequency. If several subbands are populated the frequency of the bright mode gets even higher.
Under the ideal conditions when the whole “oscillation strength” is concentrated in one oscillator the absorbance at this frequency reaches the value
Σ_max=Σ(ω =Ω_m)≈e^2N_2D/cm^*Γ.
To summarize, Coulomb interaction leads to effective synchronization of the oscillations of coherences at different intersubband transitions. This effect can be illustrated by a simple mechanical model of coupled oscillators as in the sketch shown in Fig. <ref>, where corresponding equations are in Appendix <ref>. Each active intersubband transition can be modeled by a classical oscillator (the masses on a green spring) with frequency ω_j. The Coulomb couplings of oscillators are shown by the effective additional grey “springs”. These “Coulomb springs” synchronize the oscillations in phase for all oscillators, which also leads to an increase of eigenfrequency.
§.§ Conditions for a strong Coulomb effect
Let us analyze the conditions for strong modification of the absorption spectrum in a QW with thickness L and two-dimensional electron gas density N_2D. These two parameters determine the spectrum for a given shape of the quantum well potential and material parameters.
The parameter Ω is the characteristic frequency, which is a measure of the influence of Coulomb effects on the oscillations of the dipole moment in a QW. Its magnitude scales as (see Eq. (<ref>))
Ω∼e^2/ħ⟨ I_jl⟩⟨Δ n_j⟩ .
For strong Fermi degeneracy the population of the nth subband is equal to ρ_nn=m^*/πħ^2(E_F-E_n), where E_F is the Fermi energy. Hence it follows that if several subbands are populated, i.e. N_t>1, the averaged population difference at the transitions between neighboring levels a can be estimated as
⟨Δn_j⟩∼m^*/πħ⟨ω_j⟩ , ⟨ω_j⟩ =ω_0 .
More than one subband is populated if N_2D>m^*/πħω_1,
where ω_1 is the transition frequency between the first two levels.
The magnitude of one-dimensional overlap integrals I_jl is proportional to the QW thickness and can be estimated as
⟨ I_jl⟩∼π/ε_0 L J,
where J is the dimensionless factor defined by the shape of a QW potential. This parameter does not change much for different transitions between neighboring levels, For example, in a square potential J∼ 0.2.
It follows from Eqs. (<ref>), (<ref>), and (<ref>) that
Ω∼ω_0L/α^*J/ε_0,
where α^*=ħ^2/e^2m^* is an analog of the Bohr's radius defined for an effective electron mass m^*. For example, for GaAs QWs with m^*=0.067m_e the value of α^*≈ 0.8 nm. The condition Eq. (<ref>) of strong Coulomb modification of the absorption spectrum in a QW with several populated subbands can now be written as
N_tL/α^*J/ε_0≫ 1.
It means that the quantum well thickness multiplied by the number of populated subbands must be sufficiently large. Taking the above parameters and ε_0 ∼ 13 for the background dielectric constant <cit.>, the latter condition becomes
N_t L ≫ 50 nm.
As follows from Eq. (<ref>) the resonance frequency of the main peak under the condition (<ref>) becomes
Ω_m∼ω_0√(2N_tL/α^*J/ε_0).
The intersubband transition frequencies ω_0 also depend on the QW thickness. The typical scaling is
ω_0∼ω^*(α^*/L)^2.
Here ω^*=e^4m^*/ħ^3π D, where D is a dimensionless factor between 1 and 10 which is defined by the quantum well potential shape distorted in some way due to the Hartree effect. For example, in an infinite square potential and neglecting the Hartree contribution, we have D=3/2π.
Taking into account the dependence of transition frequencies on the quantum well thickness, Eq. (<ref>), the condition for several subbands to be occupied (N_t>1) is reduced to
N_2DL^2>D,
so that for QW thicknesses L∼ 10-20 nm, the 2D electron density needed to populate several subbands is of the order of N_2D∼ 10^12-10^13 cm^-2, as in the experiments <cit.>.
§.§ Examples of absorption spectra
In the previous sections the analytical estimations for absorption spectra were obtained using rather rough simplifications Eq. (<ref>). Surprisingly, these estimations describe the effect quite well, as illustrated by the numerical examples below for a square-well potential. First, we solve numerically Eqs. (<ref>)-(<ref>) to find the matrix of transformation from the “bare” to Hartree basis, the energies of Hartree levels and their populations. Then we solve for eigenvectors and eigenvalues of ℤ matrix in Eq. (<ref>). This yields the frequencies of new normal modes Ω_l and corresponding vectors D_l and B_l which define the “oscillator strengths” of new modes F̃_l in Eq. (<ref>)). The plots of absorption spectra (Eq. (<ref>)) are presented in Figs. <ref> and <ref> for different 2D electron densities in QWs of different thicknesses. The spectra are compared with the ones obtained from Eq. (<ref>) neglecting the Coulomb coupling.
The series of plots presented in Fig. <ref> illustrates the transformation of the absorption spectrum with increasing electron density for a fixed quantum well thickness L=18.5 nm used in experiments <cit.>. At the highest density N_2D=2.2×10^13 cm^-2 corresponding to the experimental structure in <cit.>, five subbands are populated. Using the QW parameters similar to those in <cit.>, the resulting calculated absorption spectrum is in a good agreement with the experimental one; compare the top plot in Fig. <ref> with the spectrum in Fig. 2 of <cit.>. The analytically predicted strong modification of the spectra is obvious at higher dopings. The frequency of the blueshifted absorption peak agrees with the analytic estimation (<ref>). It is much higher than the frequencies of the absorption peaks due to “bare” intersubband transitions in the model neglecting Coulomb coupling. In fact, the modified spectrum demonstrates almost full transparency at the frequencies of “bare” intersubband transitions. The plots in Fig. <ref> show the spectral evolution with varying QW thickness for a electron density. We see that the larger the width of the well, the greater the relative change in the spectrum associated with the Coulomb coupling.
§ THE INFLUENCE OF EXCHANGE INTERACTION EFFECTS
To evaluate the effects of the exchange interaction, we plot the absorption spectrum for the doping density 2.2×10^13 cm^-2 and QW thickness L=18.5 nm by calculating the density matrix elements from Eqs. (<ref>) which take into account the exchange terms as perturbation to the Hartree ground state. These equations include different exchange (Fock) terms, namely, those responsible for the frequency shift of intersubband transitions (the third row in Eq. (<ref>)) and for the coupling of coherences (the fourth row in Eq. (<ref>)), which can be taken into account independently. In Fig. <ref> we show the absorption spectrum when different terms are included. We can see that the blueshifted strong peak is mainly due to Hartree terms in the coupling. Slight blue shift produced by Fock terms in the energy renormalization is almost completely compensated by red shift caused by Fock terms in coupling. This effect of compensation can be explained by comparing different terms in Eqs. (<ref>) taking into account expression (<ref>) for the overlap integrals V^ee_mnlp(q). It is obvious that both “Fock” sums in Eqs. (<ref>) (the third and the fourth rows) are mostly defined by terms proportional to coefficients V^ee_mnlp(q) which tend to infinity with q close to zero. Such divergences can be avoided by taking into account the screening effect (see Appendix <ref>), but these terms are still prevailing in the sums. The coefficients V^ee,s_mnlp(q) in these terms have indices m=n, l=p and only weakly depend on them, so that they can be approximately written as V^ee,s_mnlp(q)∼.V^2D,s|_q=0δ_mnδ_lp×ℱ(q), where V^2D,s(q) is the two-dimensional Fourier transform of the screened Coulomb potential and ℱ(q) is a positive-value dimensionless decaying function with characteristic decay scale equal to 1/L. Here the superscript s stands for screened. Leaving only these dominant terms, the part of the overall sum responsible for the Fock energy renormalization is
.iħd/dtρ_nm(k)|_Fock energy renorm=
-1/S∑_lp∑_qρ_pp(k+q)(V^ee_nppl(q)ρ_lm(k)-V^ee_lppm(q)ρ_nl(k))∼
-1/S.V^2D,s|_q=0∑_qℱ(q)(ρ_nn(k+q)-ρ_mm(k+q))ρ_nm(k) ;
whereas the part of the sum which defines the exchange effects in coupling is given by
.iħd/dtρ_nm(k)|_Fock coupling=
-1/S∑_p≠ g∑_qV^ee_npgm(q)ρ_pg(k+q)(ρ_mm(k)-ρ_nn(k))∼
-1/S.V^2D,s|_q=0∑_qℱ(q)ρ_nm(k+q)(ρ_mm(k)-ρ_nn(k)).
The region of wave vectors k+q∈δk_nm, where the population difference (ρ_nn(k+q)-ρ_mm(k+q)) is far from zero, coincides with the region where the coherence ρ_nm(k+q) is excited. Replacing these quantities in this region by their mean values ρ_nn(k+q)-ρ_mm(k+q)≈ρ_nn(k)-ρ_mm(k), ρ_nm(k+q)≈ρ_nm(k), we get the following estimations for the two exchange effects:
.iħd/dtρ_nm(k)|_Fock energy renorm∼ -1/Sρ_nm(k)(ρ_nn(k)-ρ_mm(k)).V^2D,s|_q=0∑_q,k+q∈δk_nmℱ(q)
.iħd/dtρ_nm(k)|_Fock coupling∼1/Sρ_nm(k)(ρ_nn(k)-ρ_mm(k)).V^2D,s|_q=0∑_q,k+q∈δk_nmℱ(q) .
One can see from here that the blue frequency shift due to Fock terms in energy renormalization and red shift caused by Fock terms in coupling are of the same magnitude but opposite sign and therefore nearly compensate each other. Indeed, by order of magnitude |ρ_nn(k)-ρ_mm(k)|≤ 2 and .V^2D,s|_q=0∼πħ^2/m^*, where the last expression follows from screening theory presented in the Appendix <ref>. Furthermore, the number of electron states in the region of wave vectors k+q∈δk_ nm is of the order of Sm^*/2πħω_mn. Then for the frequency shifts we get
Δ_Fock energy renorm≈ -Δ_Fock coupling∼ω_0× o((k_FL)^-1),
where in notations of Section <ref> ω_0 is the average transition frequency, k_F is the Fermi wave number for a typical transition, and the small value o((k_FL)^-1) is defined by the decaying function ℱ(q). Each of these frequency shifts separately is smaller than ω_0 and their difference is even much smaller. The result is confirmed by numerical calculations in Fig. <ref> and provides the rationale for neglecting the exchange terms when calculating the absorption spectra of highly doped QWs.
§ CONCLUSIONS
We presented a consistent theoretical explanation of the effect of Coulomb-induced collapse of multiple intersubband absorption peaks in highly doped quantum wells into one strong and extremely blueshifted peak. The theory is based on the density matrix equations taking into account pairwise Coulomb interactions of electrons within the Hartree-Fock (HF) approximation. We show that in the high-doping limit the optical response is described by linearly coupled 2N first-order differential equations for intersubband coherences, where N is the total number of the intersubband transitions. Therefore, the observed spectra can be understood within an intuitive and transparent picture of self-synchronization in a system of N coupled oscillators, which has numerous analogies including the exact mechanical analogy.
Analytic expressions are obtained for the frequencies and oscillator strengths of the new collective normal modes of the system, renormalized by strong Coulomb interaction through the collective field. In the high doping regime, Coulomb-induced synchronization leads to a merger of all intersubband absorption resonances into one sharp peak at the frequency substantially higher than all “bare” intersubband transitions and accumulating all their oscillator strength.
§ THE HARTREE BASIS
The eigen functions of the Hartree Hamiltonian Eq. (<ref>) can be found from equation Eq. (<ref>) written in “bare” (single-particle) basis, using the expansion over the eigen functions of a single-particle Hamiltonian Ĥ^0, φ_m(z)=∑_nc^n_mφ^0_n(z):
∑_mH^H_nmc^m_l=E^H_lc^n_l,
where the matrix elements of the Hartree Hamiltonian in the “bare basis” are given by
H^H_nm=E^0_nδ_nm-N_2DṼ^ei_nm+∑_lpqρ_ll(c^p_l)^*c^q_lṼ^ee_nmpq.
Here the overlap integrals Ṽ^ei_nm and Ṽ^ee_nmpq given by Eq. (<ref>) and Eq. (<ref>) are calculated over “bare” basic functions. ρ_ll=1/S∑_kρ_ll(k) is the Hartree subband population, which in the case of an equilibrium Fermi distribution should be self-consistently calculated as
ρ_ll=m^*/πħ^2(E_F-E^H_l),
where E_F is Fermi energy and
N_2D=∑_lρ_ll.
Equations (<ref>)-(<ref>) can be used for numerical calculation of Hartree states in the case of known “bare” states.
§ THE SUM RULE FOR NEW COLLECTIVE NORMAL MODES
Here we prove that the sum of new “oscillator strengths” defined for the normal modes is equal to the sum of “oscillator strengths” in the system of uncoupled partial oscillators:
∑^2N_t_l=1F̃_l=∑^2N_t_j=1F_j=1.
Taking into account Eq. (<ref>) we can rewrite the first sum in the form
∑^2N_t_l=1F̃_l=2m^*/e^2N_2DE^ω∑^2N_t_l=1Ω_lμ̃_̃l̃f̃^ω_l=2m^*/e^2N_2DE^ω∑^2N_t_l,jD_jlμ_j∑^2N_t_k=1B_lkf^ω_kΩ_l
Then, using the relation D_jlΩ_l=∑^2N_t_iZ_jiD_il we obtain
∑^2N_t_l=1F̃_l=2m^*/e^2N_2DE^ω∑^2N_t_ljikμ_jB_lkf^ω_kZ_jiD_il
Taking into account the relation D_ij=(B^-1)_ij and Eq. (<ref>), the following transformation is possible:
∑^2N_t_l=1F̃_l=2m^*/e^2N_2DE^ω∑^2N_t_jikμ_jf^ω_kZ_jiδ_ki=2m^*/e^2N_2DE^ω∑^2N_t_kμ_kf^ω_kω_k+2m^*/ħ N_2DE^ω∑^2N_t_jkμ_jf^ω_kI_jk'Δn_j.
Using Eq. (<ref>) and the natural assumption that one-dimensional basic functions are real, so that I_jk'=I_jk, it can be shown that the second sum is equal to zero:
2m^*/ħ N_2DE^ω∑^2N_t_jkμ_jf^ω_kI_jk'Δn_j=2m^*/ħ^2N_2D∑^2N_t_jkμ_jμ_kΔn_jΔn_kI_jk=
2m^*/ħ^2N_2D∑^2N_t_jμ_jΔn_j∑^N_t_k,ω_k>0 μ_k(Δn_kI_jk-Δn_kI_jk)=0.
As result, taking into account Eq. (<ref>), we obtain Eq. (<ref>).
§ THE MECHANICAL MODEL OF “COULOMB SPRINGS”
Here write the equations of motion for the model of mechanical oscillators shown in Fig. <ref>. We consider one-dimensional (along axis x) mirror-symmetric oscillation mode of “upper” (blue) and “lower” (yellow) masses m coupled in pairs by green springs, when their coordinates are equal in absolute value and have a different sign. Let N_t be a total number of such oscillators (in Fig. <ref> N_t=3). The grey “Coulomb springs” couple each “upper” mass with all “lower” masses and vice versa. The equations for the distances l_i between the two masses in each oscillator are
1/2md^2/dt^2Δl_i=-k_iΔl_i-KΔl_i-1/2∑_j≠ iK(Δl_i+Δl_j),
where Δl_i=l_i-l_0, l_0 is the equilibrium spring length, k_i are spring constants of green springs which define partial frequencies of oscillations ω_i=√(2k_i/m). Note that the “Coulomb springs” not only couple different oscillators but also strengthen the coupling between the masses within each oscillator. Under the condition of a large stiffness of “Coulomb springs” as compared with the stiffness of green springs,
KN_t≫ k_i
there is obviously a normal mode with in-phase motion of all oscillators Δl_i=Δl:
d^2/dt^2Δl=-Ω^2_mΔl.
Its frequency is defined by the relation
Ω_m≈√(2K/mN_t).
It is analogous to Eq. (<ref>).
§ THE SCREENING EFFECT OF HIGHER-ORDER CORRELATIONS
Beyond the Hartree-Fock approximation, the screening effect coming from higher order correlations should be included. To do this we need to replace the overlap integrals of the Coulomb potential V^ee_mnlp(q) in Eq. (<ref>) with their screened values V^ee,s_mnlp(q) in accordance with the following relations <cit.>:
V^ee_mnlp(q)=∑_ijϵ_mjni(q)V^ee,s_ijlp(q) ,
where
ϵ_mjni(q)=δ_miδ_nj-V^ee_mnji(q)Π^0_mn(q),
with
Π^0_mn(q)=lim_ε→ 0^+∑_kρ_mm(k+q)-ρ_nn(k)/(H^0_mm(k+q)-H^0_nn(k))-iε .
Note that we use static screening <cit.>, <cit.>.
When the denominator in Eq. (<ref>) is zero, the numerator will also be zero, so we need to consider the ways these two limits are approached. If |q|→ 0 and m=n, and we have
Π^0_nn(q→ 0)=-m^*/2πħ^2ρ_nn(k=0).
If |q|≠ 0, the denominator in Eq. (<ref>) can still be zero, let us say at k=k_0, in which case
ρ_mm(k_0+q)-ρ_nn(k_0)/(H^0_mm(k_0+q)-H^0_nn(k_0))=.∂ρ_nn(k)/∂ H^0_nn(k)|_k=k_0=.∂ρ_mm(k)/∂ H^0_mm(k)|_k=k_0+q.
So, the elements in the summation of Eq. (<ref>) are always well-defined.
|
http://arxiv.org/abs/2303.07215v2
|
20230313155022
|
Surface instability in a nematic elastomer
|
[
"Morgan Barnes",
"Fan Feng",
"John S. Biggins"
] |
cond-mat.soft
|
[
"cond-mat.soft"
] |
ifundefined@parse@version@dash
parse@version#1parse@version@0#1
parse@version@#1/#2/#3#4#5nil
parse@version@dash#1-#2-#3#4nil
parse@version@dash#1-#2-#3#4#5nil
#2#1#2#3#4
Utipa
Utipamn<->tipa10
ḍ
𝐧
1/2
1/4
1/3
#1#1
#1#1
|
http://arxiv.org/abs/2303.06958v1
|
20230313095652
|
CPQR-based randomized algorithms for generalized CUR decompositions
|
[
"Guihua Zhang",
"Hanyu Li",
"Yimin Wei"
] |
math.NA
|
[
"math.NA",
"cs.NA"
] |
Guihua Zhang and Hanyu Li College of Mathematics and Statistics, Chongqing University, Chongqing, 401331,
People’s Republic of China.
[email protected]; [email protected]
Yimin Wei School of Mathematical Sciences and Shanghai Key Laboratory of Contemporary Applied Mathematics, Fudan University, Shanghai 200433, People’s Republic of China.
[email protected]; [email protected]
CPQR-based randomized algorithms for generalized CUR decompositions
Guihua Zhang Hanyu Li Yimin Wei
Received: date / Accepted: date
======================================================================
Based on the column pivoted QR decomposition, we propose some randomized algorithms including pass-efficient ones for the generalized CUR decompositions of matrix pair and matrix triplet.
Detailed error analyses of these algorithms are provided. Numerical experiments are given to test the proposed randomized algorithms.
15A99 68W20
§ INTRODUCTION
As we know, the singular value decomposition (SVD) is the most popular tool for
reducing dimension of a data matrix. However,
the final features
with the dimension reduction by SVD are usually difficult to explain and analyse <cit.>. To this end, some scholars proposed the CUR decomposition,
which is composed of subsets of the original columns and rows of the given matrix. Specifically,
for a matrix A, the CUR decomposition can be expressed as
A ≈ C_AM_AR_A,
where C_A and R_A are the subsets of columns and rows of A respectively, and M_A can be constructed by different ways; see Remark <ref> below. Recently, Gidisu and Hochstenbach <cit.> proposed the generalized CUR decompositions for matrix pair and matrix triplet; see Definitions <ref> and <ref> below.
At present, there are many works on applications (i.e., <cit.>), algorithms (i.e., <cit.>), and perturbation analyses (i.e., <cit.>) for (generalized) CUR decompositions. Here we mainly focus on their algorithms. For the case of CUR decomposition, Drineas et al. <cit.> presented the relative error guaranteed algorithm from the point of view of leverage-score sampling.
Subsequently, Wang and Zhang <cit.> proposed the adaptive sampling algorithm,
and Boutsidis and Woodruff <cit.> combined the previous two sampling methods with BSS sampling <cit.>
and obtained the optimal CUR decomposition.
Later, Sorensen and Embree <cit.> introduced a novel algorithm by means of the discrete empirical interpolation method (DEIM), and Voronin and Martinsson <cit.> presented efficient algorithms based on the column pivoted QR decomposition (CPQR). Recently, Chen et al. <cit.> proposed an algorithm by using the truncated LU factorization, and Dong and Martinsson <cit.> compared the randomized algorithms based on CPQR <cit.> and LU decomposition with partial pivoting <cit.>.
For the case of generalized CUR decompositions of matrix pair and matrix triplet, by virtue of the DEIM, Gidisu and Hochstenbach <cit.> proposed the corresponding deterministic algorithms.
Very recently, Cao et al. <cit.> presented some randomized algorithms based on L-DEIM <cit.>.
In this paper, we investigate the CPQR-based randomized algorithms for the generalized CUR decompositions of matrix pair and matrix triplet, and
present the corresponding expectation error bounds.
The rest of this paper is organized as follows. In Section <ref>, we introduce some preliminaries including the definitions of the generalized CUR decompositions for matrix pair and matrix triplet and the interpolative decomposition. The CPQR-based randomized algorithms and their error bounds are presented in Sections <ref> and <ref>. Finally, we provide some numerical results to test the proposed algorithms.
§ PRELIMINARIES
We first introduce some notations used in this paper. Given a matrix A∈ℝ^m × n, A^T, A^†, ‖ A‖ , ‖ A‖_F and σ_j(A) denote its transpose, Moore-Penrose inverse, spectral norm, Frobenius norm and jth largest singular value, respectively.
And, we use A(I,J) to denote the part of A consisting of rows from the index set I and columns from the index set J.
In addition, let [n]={1,⋯,n}, I_n be the n× n identity matrix, 𝔼 be the expectation notation, 𝔼[ ·|·] be the conditional expectation,
P_A be the orthogonal projector on range(A), and P_A,B be the oblique projector on range(A) along range(B).
§.§ CUR decomposition for matrix pair
Let (A,B) be a matrix pair, where A∈ℝ^m × n and B∈ℝ^d × n. The CUR decomposition of (A,B) of rank k is
A_k=C_AM_AR_A,
B_k=C_BM_BR_B,
where C_A=A(:,J)∈ℝ^m × k, C_B=B(:,J)∈ℝ^d × k, R_A=A(I_A,:)∈ℝ^k × n and R_B=B(I_B,:)∈ℝ^k × n.
The middle matrices M_A and M_B have some different ways to compute. For example,
we can construct M_A=A(I,J)^†, or M_A=C_A^† AR_A^† <cit.>. In this paper, we use M_A=C_A^† AR_A^† to analyse the related algorithms.
To obtain the error analyses of our randomized algorithms of generalized CUR decompositions,
we need
the generalized singular value decomposition (GSVD).
For the above matrix pair (A,B),
the GSVD can be expressed as
A=UΣ_1Y^T, B=ṼΣ_2Y^T,
where U∈ℝ^m × m and Ṽ∈ℝ^d × d are column orthogonal, Y∈ℝ^n × n is nonsingular, and Σ_1 ∈ℝ^m × n and Σ_2 ∈ℝ^d × n are diagonal with diagonal entries being in [0,1]. Here, we let the diagonal entries of Σ_1 be in nondecreasing order, while those of Σ_2 be in nonincreasing order. For the details of GSVD, please refer to <cit.>.
§.§ CUR decomposition for matrix triplet
Let (A,B,G) be a matrix triplet, where A∈ℝ^m × n, B∈ℝ^m × t and G∈ℝ^d × n. The CUR decomposition of (A,B,G) of rank k is
A_k=C_AM_AR_A,
B_k=C_BM_BR_B,
G_k=C_GM_GR_G,
where C_A=A(:,J)∈ℝ^m × k, C_B=B(:,J_B)∈ℝ^m × k,
C_G=G(:,J)∈ℝ^d × k, R_A=A(I,:)∈ℝ^k × n, R_B=B(I,:)∈ℝ^k × t and
R_G=G(I_G,:)∈ℝ^k × n.
The decomposition shows that the selected column indices of A and G are the same, and the selected row indices of A and B are the same. For the middle matrices M_A, M_B and M_G, they can be constructed as discussed in Remark <ref>.
§.§ Interpolative decomposition (ID)
The ID
is very close to the CUR decomposition. Specifically, given A∈ℝ^m × n, it has the following forms
A≈ĈV̂^T, A≈ŴR̂,
where Ĉ∈ℝ^m × k and R̂∈ℝ^k × n consist of k columns
and rows of A, respectively, and
V̂∈ℝ^n × k and Ŵ∈ℝ^k × n are such that max_i,j|V̂(i,j)|≤ 1 and max_i,j|Ŵ(i,j)|≤ 1, respectively. The above two IDs are one-sided IDs, i.e., column ID and row ID. Accordingly, there exists a two-sided ID:
A≈ŴA_sV̂^T,
where Ŵ∈ℝ^m × k, V̂∈ℝ^n × k, and A_s∈ℝ^k × k
is the submatrix of A.
§ RANDOMIZED ALGORITHMS FOR CUR DECOMPOSITION OF MATRIX PAIR
We first propose a randomized algorithm based on CPQR. Then,
a pass-efficient version of the
algorithm is derived. Their expectation error bounds are also presented correspondingly.
Moreover, we also provide the alternative error analyses of algorithms on the basis of GSVD.
§.§ CPQR-based randomized algorithm
For A∈ℝ^m × n and B∈ℝ^d × n, assume rank(A) > k and rank(B) > k. Using CPQR,
we have
[ A; B ]Π̂=Q̂T̂=Q̂[ T̂_1, T̂_2 ],
where Q̂∈ℝ^(m+d) × (m+d) is orthogonal, T̂∈ℝ^(m+d) × n is upper triangular with T̂_1∈ℝ^(m+d) × k and T̂_2∈ℝ^(m+d) × (n-k), and Π̂∈ℝ^n × n is a permutation matrix.
Similar to <cit.>, C_A and C_B in the CUR decomposition of the matrix pair (A,B) can be obtained from
Q̂T̂_1 directly.
However, it
is not very efficient on the computation cost. To tackle this problem, we consider the randomized CPQR
<cit.>.
Let Ω∈ℝ^l × (m+d) be a Gaussian matrix, where l=k+p and p is the oversampling parameter. Then, using CPQR, we have
Ω[ A; B ]Π=Q̃T=Q̃[ T_1, T_2 ],
where Q̃∈ℝ^l × l is orthogonal, T_1∈ℝ^l × l is invertible and upper triangular, and Π=I_n(:,J_n) with J_n being a permuted index vector. Based on the above decomposition, we can get the column index vector J appearing in the CUR decomposition of the matrix pair (A,B),
i.e., J=J_n(1:l).
The specific algorithm is listed
in Algorithm <ref>, from which, we can obtain
XI_n(:,J)=XΠ_C=Q̃T_1.
To investigate the theoretical analysis of Algorithm <ref>, we further consider the following column ID of the matrix pair (A,B):
[ A; B ]≈[ C_A; C_B ] V^T =[ C_AV^T; C_BV^T ],
which
can be written as A ≈ C_AV^T, B ≈ C_BV^T.
Solving one of them by the least squares method implies
V^T=C_A^†A=C_B^†B.
Besides, noting that XΠ_C is invertible due to both Q̃ and T_1 being invertible, we define a rank-l oblique projector onto the row space of X as follows:
P_Π_C,N_1=Π_C(XΠ_C)^-1X=Π_CT_1^-1Q̃^TX.
Since we mainly focus on the range where the oblique projector projects on, hereafter we just use N_x to denote the along range range(N_x) for oblique projectors.
It is clear that XP_Π_C,N_1=X.
Now, we present the
theoretical analysis of Algorithm <ref>.
Let C_A∈ℝ^m × l and C_B∈ℝ^d × l be obtained by Algorithm <ref>, and V^T=C_A^†A=C_B^†B. Then
‖ A-C_AV^T ‖≤‖ I_n-P_Π_C,N_1‖‖ A(I_n-X^†X) ‖,
‖ B-C_BV^T ‖≤‖ I_n-P_Π_C,N_1‖‖ B(I_n-X^†X) ‖.
We first consider the case for the matrix A. Since C_A=A(:,J)=AΠ_C is full column rank, we find that
C_AC_A^†A=AΠ_C(C_A^TC_A)^-1C_A^TA=AP_Π_C,N_2,
where P_Π_C,N_2=Π_C(C_A^TC_A)^-1C_A^TA. Considering the relationship between P_Π_C,N_2 and P_Π_C,N_1,
P_Π_C,N_2P_Π_C,N_1 =Π_C(C_A^TC_A)^-1C_A^TAΠ_C(XΠ_C)^-1X
=Π_C(XΠ_C)^-1X=P_Π_C,N_1,
we get
A(I_n-P_Π_C,N_2) =A(I_n-P_Π_C,N_2)(I_n-P_Π_C,N_1)
=(I_m-C_AC_A^†)A(I_n-P_Π_C,N_1).
Hence,
‖ A-C_AV^T ‖ =‖ (I_m-C_AC_A^†)A ‖ = ‖ A(I_n-P_Π_C,N_2) ‖
≤‖ I_m-C_AC_A^†‖‖ A(I_n-P_Π_C,N_1) ‖
=‖ A(I_n-P_Π_C,N_1) ‖
=‖ A(I_n-X^†X)(I_n-P_Π_C,N_1) ‖
≤‖ A(I_n-X^†X) ‖‖ I_n-P_Π_C,N_1‖,
where the third equality holds because I_m-C_AC_A^† is an orthogonal projector and the last equality relies on
XP_Π_C,N_1=X.
For the case of the matrix B, we can similarly define
P_Π_C,N_3=Π_C(C_B^TC_B)^-1C_B^TB
and get
P_Π_C,N_3P_Π_C,N_1=P_Π_C,N_1.
Thus, along the similar line, (<ref>) can be obtained.
Next, we
discuss how to select the rows of A and B, respectively. The idea is to find
the row index vectors I_A⊂ [m] and I_B⊂ [d]
from C_A and C_B.
To this end, we consider the exact CPQRs of the transposes of C_A and C_B:
l× mC_A^T[ m× lΠ_Ar, m× (m-l)Π_Ar^c ] =l× lQ_A[ l× lT_A1, l× (m-l)T_A2 ]=l× lA_s^T[ l× lI_l, l× (m-l)T_A1^-1T_A2 ],
l× dC_B^T[ d× lΠ_Br, d× (d-l)Π_Br^c ] =l× lQ_B[ l× lT_B1, l× (d-l)T_B2 ]=l× lB_s^T[ l× lI_l, l× (d-l)T_B1^-1T_B2 ],
where Π_Ar=I_m(:,I_A), Π_Br=I_d(:,I_B),
Q_A and Q_B are orthogonal,
and T_A1 and T_B1 are invertible and upper triangular due to C_A and C_B being full column rank.
Further, the exact row IDs of C_A and C_B are given by
C_A=Π_Ar(Q_AT_A1)^T:=W_AA_s, C_B=Π_Br(Q_BT_B1)^T:=W_BB_s.
Here, A_s=(Q_AT_A1)^T and B_s=(Q_BT_B1)^T consist of the rows of C_A and C_B, respectively.
By denoting R_A=A_sV^T and R_B=B_sV^T, we have
W_AA_sV^T=C_AV^T=C_AC_A^†A=W_AR_A=( W_AA_s)A_s^†(A_sV^T)=C_AA_s^†R_A,
W_BB_sV^T=C_BV^T=C_BC_B^†B=W_BR_B=( W_BB_s)B_s^†(B_sV^T)=C_BB_s^†R_B.
Thus, combining with the results that C_A and C_B are full column rank and R_A and R_B are full row rank implies
A_s^†=C_A^†AR_A^†:=M_A, B_s^†=C_B^†BR_B^†:=M_B.
Therefore, we can have
the randomized algorithm for the CUR decomposition of matrix pair, i.e.,
Algorithm <ref>.
To present the expectation error bounds of Algorithm <ref>, the following lemma is necessary.
<cit.>
Given a matrix A∈ℝ^m × n, the target rank k and the oversampling parameter p satisfying k+p ≤ min{m,n}, and a standard Gaussian matrix Ω∈ℝ^(k+p) × m, the column sketch X=Ω A satisfies
𝔼‖ A(I_n-X^† X) ‖≤( 1+√(k/p-1)) σ_k+1(A) + e√(k+p)/p( ∑_j>k^σ_j^2(A) )^1/2,
𝔼‖ A(I_n-X^† X) ‖_F ≤( 1+√(k/p-1))^1/2( ∑_j>k^σ_j^2(A) )^1/2.
Let C_A∈ℝ^m × l, C_B∈ℝ^d × l, R_A∈ℝ^l × n, R_B∈ℝ^l × n, M_A∈ℝ^l × l, and M_B∈ℝ^l × l be obtained by Algorithm <ref>. Let k be the target rank and p be the oversampling parameter.
Then
max{𝔼‖ A- C_AM_AR_A ‖, 𝔼‖ B-C_BM_BR_B ‖}≤√(1+(n-k-p)4^k+p-1)
×[ ( 1+√(k/p-1)) σ_k+1[ A; B ] + e√(k+p)/p( ∑_j>k^σ_j^2[ A; B ])^1/2],
max{𝔼‖ A- C_AM_AR_A ‖_F, 𝔼‖ B-C_BM_BR_B ‖_F }≤√(1+(n-k-p)4^k+p-1)
×( 1+√(k/p-1))^1/2( ∑_j>k^σ_j^2[ A; B ])^1/2.
By virtue of Lemma 3.2 in <cit.>, we have
‖ I_n-P_Π_C,N_1‖≤√(1+(n-k-p)4^k+p-1).
Thus, combining the fact
max{‖ A(I_n-X^†X) ‖, ‖ B(I_n-X^†X) ‖}≤‖[ A; B ](I_n-X^†X) ‖
with Theorem <ref> and Lemma <ref>
implies the desired results.
The probability error bounds for Algorithm <ref> can be similarly obtained by using <cit.>. For brevity, we omit them.
§.§ Pass-efficient randomized algorithm
Considering that
the matrix pair (A,B) may be very expensive to visit
in practise,
we now investigate the pass-efficient randomized algorithm for CUR decomposition. The idea is to introduce an extra random matrix to find the row index sets I_A and I_B. Specifically, let Ω_1∈ℝ^l × n be a Gaussian matrix and set Y_1=AΩ_1^T and Y_2=BΩ_1^T. Then, by the CPQRs of Y_1^T and Y_2^T, we have
Y_1^TΠ_1=Y_1^T [ Π_1r, Π_1r^c ]=
Q_1 [ T_11, T_12 ],
Y_2^TΠ_2=Y_2^T [ Π_2r,
Π_2r^c ]=
Q_2 [ T_21, T_22 ],
where Π_1r=I_m(:,I_A) and Π_2r=I_d(:,I_B). The specific algorithm is summarized in Algorithm <ref>.
In Algorithm <ref>, two passes through (A,B) are required. One is used to obtain the sketches X, Y_1 and Y_2, and further to find the index sets I_A, I_B and J. The other is used for
retrieving the factors of CUR decomposition. So, when only the column and row index sets are required, Algorithm <ref> only needs one pass and hence can be adapted to the streaming setting. In contrast, implementing Algorithm <ref> needs to access (A,B) at least four times.
Note that Y_1^TΠ_1r = Q_1T_11 and Y_2^TΠ_2r = Q_2T_21 are invertible. Then, we can define two oblique projectors:
P_Y_1,N_4=Y_1(Π_1r^TY_1)^-1Π_1r^T and P_Y_2,N_5=Y_2(Π_2r^TY_2)^-1Π_2r^T.
With them, we have the following results.
Let C_A∈ℝ^m × l, C_B∈ℝ^d × l, R_A∈ℝ^l × n, R_B∈ℝ^l × n, M_A∈ℝ^l × l, and M_B∈ℝ^l × l be obtained by Algorithm <ref>. Then
‖ A-C_AM_AR_A ‖ ≤ 2‖ I_n-P_Π_C,N_1‖‖ A(I_n-X^†X) ‖+ ‖ I_m-P_Y_1,N_4‖‖ (I_m-Y_1Y_1^†)A ‖,
‖ B-C_BM_BR_B ‖ ≤ 2‖ I_n-P_Π_C,N_1‖‖ B(I_n-X^†X) ‖+ ‖ I_d-P_Y_2,N_5‖‖ (I_d-Y_2Y_2^†)B ‖.
We just consider the error bound (<ref>) for A.
As the proof in <cit.>, we have
‖ A-C_AM_AR_A ‖≤‖ A-C_AV^T ‖ + ‖ A-W_AR_A ‖.
Since the bound of the first term in the right-hand side of the above inequality has been deduced in Theorem <ref>, we next study the bound of the second term.
On one hand, we have
‖ A-W_AR_A ‖ = ‖ A-C_AC_A^†AR_A^†R_A ‖
= ‖ A-C_AC_A^†A+C_AC_A^†A-C_AC_A^†AR_A^†R_A ‖
≤‖ A-C_AC_A^†A ‖+‖ C_AC_A^†‖·‖ A-AR_A^†R_A ‖
=‖ A-C_AC_A^†A ‖+‖ A-AR_A^†R_A ‖,
where the last equality holds because C_AC_A^† is an orthogonal projector. On the other hand, considering that R_A=Π_1r^TA is full row rank, using the property of Moore-Penrose inverse, we obtain
AR_A^†R_A=AR_A^T(R_AR_A^T)^-1Π_1r^TA:=P_AR_A^T,N_6A,
where
P_AR_A^T,N_6=AR_A^T(R_AR_A^T)^-1Π_1r^T.
It is easy to find that P_Y_1,N_4P_AR_A^T,N_6=P_Y_1,N_4.
Hence,
‖ A-AR_A^†R_A ‖ = ‖ A-P_AR_A^T,N_6A ‖ =‖ (I_m-P_Y_1,N_4)(I_m-P_AR_A^T,N_6)A ‖
=‖ (I_m-P_Y_1,N_4)A(I_n-R_A^†R_A) ‖
≤‖ (I_m-P_Y_1,N_4)A‖‖ I_n -R_A^†R_A ‖ = ‖ (I_m-P_Y_1,N_4)A‖
≤‖ I_m-P_Y_1,N_4‖‖ (I_m-Y_1Y_1^†)A ‖,
where the last equality holds because I_n-R_A^†R_A is an orthogonal projector and the last inequality relies on the following result
P_Y_1,N_4Y_1-Y_1=0.
Thus, (<ref>) can be obtained by combining (<ref>) and (<ref>) with (<ref>).
Now, we present the expectation error bounds for Algorithm <ref>. For brevity, we only consider the case for spectral norm.
With the same setting as Theorem <ref>, let k be the target rank and p be the oversampling parameter, and let
α = √(1+(n-k-p)4^k+p-1)[ ( 1+√(k/p-1)) σ_k+1[ A; B ] + e√(k+p)/p( ∑_j>k^σ_j^2[ A; B ])^1/2].
Then
𝔼‖ A-C_AM_AR_A ‖ ≤ 2α + √(1+(m-k-p)4^k+p-1)
×[ ( 1+√(k/p-1)) σ_k+1(A) + e√(k+p)/p( ∑_j>k^σ_j^2(A) )^1/2],
𝔼‖ B-C_BM_BR_B ‖ ≤ 2α + √(1+(d-k-p)4^k+p-1)
×[ ( 1+√(k/p-1)) σ_k+1(B) + e√(k+p)/p( ∑_j>k^σ_j^2(B) )^1/2].
By virtue of Lemma 3.2 in <cit.>, we have
‖ I_n-P_Π_C,N_1‖≤√(1+(n-k-p)4^k+p-1), ‖ I_m-P_Y_1,N_4‖≤√(1+(m-k-p)4^k+p-1),
‖ I_d-P_Y_2,N_5‖≤√(1+(d-k-p)4^k+p-1).
Thus, combining the fact
max{‖ A(I_n-X^†X) ‖, ‖ B(I_n-X^†X) ‖}≤‖[ A; B ](I_n-X^†X) ‖
with Theorem <ref> and Lemma <ref>, the proof is completed.
§.§ GSVD-based error analyses
The error bounds in Theorems <ref> and <ref> are controlled partly by the singular values of [ A^T B^T ]^T.
In this subsection, we provide the alternatives error analyses by the GSVD of the matrix pair (A,B) in (<ref>).
Let the QR decomposition of Y^T be Y^T=QR.
It is clear that R∈ℝ^n× n is nonsingular since Y^T∈ℝ^n× n is nonsingular. Thus, from the proof of Theorem <ref> and the fact (I_m-C_AC_A^† )A=A-C_AM_AR_A, the following inequality holds
‖ A-C_AM_AR_A ‖ ≤‖ A(I_n-X^† X) (I_n-P_Π_C,N_1)‖
= ‖ A(I_n-X^† X)R^-1 R(I_n-P_Π_C,N_1)‖
≤‖ A(I_n-X^† X)R^-1‖‖ R(I_n-P_Π_C,N_1)‖.
Similarly, we also have ‖ B-C_BM_BR_B ‖≤‖ B(I_n-X^† X)R^-1‖‖ R(I_n-P_Π_C,N_1)‖. In the following, we bound ‖ A(I_n-X^† X)R^-1‖ and ‖ B(I_n-X^† X)R^-1‖.
Denote
Â=AR^-1, B̂=BR^-1, and X̂=XR^-1,
and suppose that
range(R^-1(R^-1)^TX^T)⊂ range(X^T).
Hence, combining with the equation
[ A; B ]=[ U ; Ṽ ][ Σ_1; Σ_2 ]Y^T,
we have
X̂=Ω[ A; B ]R^-1=Ω[ Â; B̂ ].
To continue the GSVD based error analyses, the following lemma is necessary.
<cit.>
Given matrices D_1∈ℝ^t_1× t_2 and D_2∈ℝ^t_2× t_3, then
(D_1D_2)^†=D_2^†D_1^†
if and only if
range(D_1^TD_1D_2)⊂ range(D_2), range(D_2D_2^TD_1^T)⊂ range(D_1^T).
By means of Lemma <ref>, and considering the assumption range(R^-1(R^-1)^TX^T)⊂ range(X^T) and the fact range(X^TXR^-1)⊂ range(R^T), we have (XR^-1)^†=RX^†.
Hence,
‖Â (I_n-X̂^†X̂) ‖ =‖ AR^-1 (I_n-(XR^-1)^†(XR^-1)) ‖=‖ AR^-1 (I_n-RX^†XR^-1) ‖
=‖ A(R^-1-X^†XR^-1) ‖ = ‖ A(I_n-X^†X)R^-1‖.
For brevity, here we just discuss the case of A and that of B can be derived similarly. From (<ref>), it suffices to bound ‖Â (I_n-X̂^†X̂) ‖.
In the following, we tackle the problem using the idea
from
<cit.>.
Observe that the matrix X̂ can be expressed as follows by partitioning U= [ U_1 , U_2 ], Ṽ=[ V_1 , V_2 ],
Σ_1=[ Σ_11 ; Σ_12 ], and Σ_2=[ Σ_21 ; Σ_22 ]
with Σ_11∈ℝ^k× k, Σ_12∈ℝ^(m-k)× (n-k), Σ_21∈ℝ^k× k and Σ_22∈ℝ^(d-k)× (n-k):
X̂ =Ω[ U_1 U_2 ; V_1 V_2 ][ Σ_11 ; Σ_12; Σ_21 ; Σ_22 ]Q =Ω[ Û_̂1̂, Û_̂2̂, V̂_̂1̂, V̂_̂2̂ ][ Σ_11 ; Σ_12; Σ_21 ; Σ_22 ]Q
=Ω[ Û_̂1̂Σ_11+V̂_̂1̂Σ_21, Û_̂2̂Σ_12+V̂_̂2̂Σ_22 ]Q ,
where
Û_̂1̂=[ U_1; 0 ], Û_̂2̂=[ U_2; 0 ], V̂_̂1̂=[ 0; V_1 ], and V̂_̂2̂=[ 0; V_2 ].
Considering that the case we focus on is that both A and B are low rank, Σ_11 and Σ_22 may be nearly zero.
Then
X̂≈Ω[ V̂_̂1̂Σ_21, Û_̂2̂Σ_12 ]Q=[ ΩV̂_̂1̂Σ_21, ΩÛ_̂2̂Σ_12 ]Q=[ Γ_1Σ_21, Γ_2Σ_12 ]Q,
where Γ_1=ΩV̂_̂1̂∈ℝ^(k+p)× k and Γ_2=ΩÛ_̂2̂.
Further, X̂Q^T≈[ Γ_1Σ_21, Γ_2Σ_12 ]. Let X̃=X̂Q^T, note that Σ_21 is invertible, and suppose that Γ_1 is full column rank.
Then
Ẑ:=Σ_21^-1Γ_1^†X̃≈[ I , F̂ ],
where F̂=Σ_21^-1Γ_1^†Γ_2Σ_12. It is obvious that range(Ẑ^T)⊂ range(X̃^T) and Ẑ is full row rank.
To continue to bound ‖Â (I_n-X̂^†X̂) ‖,
some notations are necessary. Let
Ã=UΣ_1=ÂQ^T, B̃=ṼΣ_2=B̂Q^T, P_Ẑ=Ẑ^T(ẐẐ^T)^-1Ẑ,
P_X̃=X̃^T(X̃X̃^T)^†X̃=QX̂^T(X̂X̂^T)^†X̂Q^T=QX̂^†X̂Q^T,
where the last equality holds since (X̂X̂^T)^†=(X̂^T)^†X̂^†.
Note that P_Ẑ and P_X̃ are orthogonal projectors. Thus,
combining range(Ẑ^T)⊂ range(X̃^T) with Proposition 8.5 in <cit.>, we have
‖Â (I_n-X̂^†X̂) ‖ =
‖Ã Q (I_n-X̂^†X̂)Q^T ‖=‖Ã(I_n-P_X̃) ‖≤‖Ã(I_n-P_Ẑ) ‖.
Further, we can obtain
‖Â (I_n-X̂^†X̂) ‖^2 ≤‖Ã(I_n-P_Ẑ) ‖^2 =‖ UΣ_1 (I_n-P_Ẑ)Σ_1^TU^T ‖
=‖Σ_1 (I_n-P_Ẑ)Σ_1^T ‖,
where the first equality holds since I_n-P_Ẑ is an orthogonal projector. As done in the proof of <cit.>, by the similar algebraic computation, the following holds,
Σ_1(I_n-P_Ẑ)Σ_1^T ≼[ Σ_11F̂F̂^TΣ_11^T -Σ_11( I_k+F̂F̂^T )^-1F̂Σ_12^T; -Σ_12F̂^T( I_k+F̂F̂^T )^-1Σ_11^T Σ_12Σ_12^T ].
Note that the matrices on the two sides of the above inequality are positive semi-definite. Hence,
Proposition 8.3 in <cit.> results in
‖Σ_1(I_n-P_Ẑ)Σ_1^T ‖≤‖Σ_11F̂F̂^TΣ_11^T ‖ + ‖Σ_12Σ_12^T ‖ =
‖Σ_11F̂‖^2+‖Σ_12‖^2.
Thus, combining (<ref>) with the above inequality implies
‖Â(I_n-X̂^†X̂) ‖^2 ≤‖Σ_11F̂‖^2+‖Σ_12‖^2.
With the fact that for all a,b≥ 0, c^2≤ a^2+b^2 results in c≤ a+b, we have
‖Â(I_n-X̂^†X̂) ‖≤‖Σ_11F̂‖ +‖Σ_12‖≤‖Σ_11Σ_21^-1‖‖Γ_1^†Γ_2Σ_12‖ +‖Σ_12‖ ,
where F̂=Σ_21^-1Γ_1^†Γ_2Σ_12.
Similarly, for the case of B, we have
‖B̂ (I_n-X̂^†X̂) ‖^2 ≤‖Σ_2 (I_n-P_Ẑ)Σ_2^T ‖,
Σ_2 (I_n-P_Ẑ)Σ_2^T ≼[ Σ_21F̂F̂^TΣ_21^T -Σ_21( I_k+F̂F̂^T )^-1F̂Σ_22^T; -Σ_22F̂^T( I_k+F̂F̂^T )^-1Σ_21^T Σ_22Σ_22^T ],
‖B̂ (I_n-X̂^†X̂) ‖^2 ≤‖Σ_21F̂‖^2 + ‖Σ_22‖^2 ≤‖Σ_21Σ_21^-1Γ_1^†Γ_2Σ_12‖^2 + ‖Σ_22‖^2
= ‖Γ_1^†Γ_2Σ_12‖^2 + ‖Σ_22‖^2,
and
‖B̂ (I_n-X̂^†X̂) ‖≤‖Γ_1^†Γ_2Σ_12‖ + ‖Σ_22‖.
Therefore,
‖ A(I_n-X^† X)R^-1‖ ≤‖Σ_11Σ_21^-1‖‖Γ_1^†Γ_2Σ_12‖ +‖Σ_12‖,
‖ B(I_n-X^† X)R^-1‖ ≤‖Γ_1^†Γ_2Σ_12‖ + ‖Σ_22‖.
Furthermore, it is easy to see that (<ref>) and (<ref>) also hold for Frobenius norm.
Note that, in the above discussions, two necessary assumptions are used. We list them uniformly as follows.
(1) range(R^-1(R^-1)^TX^T)⊂ range(X^T);
(2) Γ_1=ΩV̂_1
is full column rank.
The last assumption is satisfied in high probability when Ω is a Gaussian matrix; see e.g., <cit.>.
In the following, we present the expectation error bounds of Algorithm <ref>. Two necessary lemmas are listed firstly as follows.
<cit.>
For the given matrices S and N, draw a standard Gaussian matrix Γ. Then
(𝔼‖ SΓ N ‖_F^2)^1/2=‖ S‖_F‖ N‖_F, 𝔼‖ SΓ N ‖≤‖ S ‖‖ N ‖_F+‖ S ‖_F‖ N ‖.
<cit.>
Let Γ∈ℝ^(k+p)× k be a standard Gaussian matrix. Then
(𝔼‖Γ^†‖_F^2)^1/2=√(k/p-1), 𝔼‖Γ^†‖≤ e√(k+p)/p.
With the same setting as Theorem <ref> and Assumption <ref>,
let
η =‖ Y ‖√(1+(n-k-p)4^k+p-1)
with Y being defined in (<ref>).
Then
𝔼‖ A-C_AM_AR_A ‖≤η[ ‖Σ_11Σ_21^-1‖( e√(k+p)/p‖Σ_12‖_F + √(k/p-1)‖Σ_12‖) + ‖Σ_12‖],
𝔼‖ B-C_BM_BR_B ‖≤η[ ( e√(k+p)/p‖Σ_12‖_F + √(k/p-1)‖Σ_12‖)+ ‖Σ_22‖],
𝔼‖ A-C_AM_AR_A ‖_F ≤η[ √(1+k/p-1‖Σ_11Σ_21^-1‖)‖Σ_12‖_F ],
𝔼‖ B-C_BM_BR_B ‖_F ≤η[ k/p-1‖Σ_12‖_F^2+‖Σ_22‖_F^2 ]^1/2,
where Σ_11, Σ_12, Σ_21, and Σ_22 are defined as in (<ref>).
Note that Y^T=QR, then ‖ Y^T ‖=‖ Y ‖=‖ R ‖. Thus, noting (<ref>),
we have
‖ A-C_AM_AR_A ‖≤‖ Y ‖‖ I_n-P_Π_C,N_1‖‖ A(I_n-X^† X)R^-1‖,
‖ A-C_AM_AR_A ‖_F ≤‖ Y ‖‖ I_n-P_Π_C,N_1‖‖ A(I_n-X^† X)R^-1‖_F.
Similarly, for the case of B,
‖ B-C_BM_BR_B ‖≤‖ Y ‖‖ I_n-P_Π_C,N_1‖‖ B(I_n-X^† X)R^-1‖,
‖ B-C_BM_BR_B ‖_F ≤‖ Y ‖‖ I_n-P_Π_C,N_1‖‖ B(I_n-X^† X)R^-1‖_F.
By virtue of Lemma 3.2 in <cit.>, we get
‖ I_n-P_Π_C,N_1‖≤√(1+(n-k-p)4^k+p-1).
Next, it suffices to bound the expectations of ‖ A(I-X^† X)R^-1‖, ‖ B(I-X^† X)R^-1‖, ‖ A(I-X^† X)R^-1‖_F, and ‖ B(I-X^† X)R^-1‖_F.
Observing (<ref>) and (<ref>), we need to take expectation on ‖Γ_1^†Γ_2Σ_12‖ and ‖Γ_1^†Γ_2Σ_12‖_F^2. On one hand,
𝔼‖Γ_1^†Γ_2Σ_12‖ = 𝔼( 𝔼[‖Γ_1^†Γ_2Σ_12‖|Γ_1 ] ) ≤𝔼( ‖Γ_1^†‖‖Σ_12‖_F+‖Γ_1^†‖_F ‖Σ_12‖)
≤‖Σ_12‖_F 𝔼‖Γ_1^†‖ +‖Σ_12‖(𝔼‖Γ_1^†‖_F^2 )^1/2
≤ e√(k+p)/p‖Σ_12‖_F + √(k/p-1)‖Σ_12‖,
where the first equality relies on the fact that Γ_1∈ℝ^(k+p) × k and Γ_2 are independent, the first inequality relies on Lemma <ref>, the second inequality relies on Hölder’s inequality, and the third inequality relies on Lemma <ref>. On the other hand,
𝔼‖Γ_1^†Γ_2Σ_12‖_F^2 = 𝔼( 𝔼[‖Γ_1^†Γ_2Σ_12‖_F^2 |Γ_1 ] ) =𝔼( ‖Γ_1^†‖_F^2 ‖Σ_12‖_F^2 )
= ‖Σ_12‖_F^2 𝔼‖Γ_1^†‖_F^2 =k/p-1‖Σ_12‖_F^2,
where the second equality relies on Lemma <ref> and the last equality relies on Lemma <ref>.
Thus, taking the expectation of both sides of (<ref>) and (<ref>) implies
𝔼‖ A(I_n-X^† X)R^-1‖≤‖Σ_11Σ_21^-1‖·𝔼‖Γ_1^†Γ_2Σ_12‖ + ‖Σ_12‖,
𝔼‖ B(I_n-X^† X)R^-1‖≤𝔼‖Γ_1^†Γ_2Σ_12‖ + ‖Σ_22‖.
Similarly, take the expectation of both sides of (<ref>) and (<ref>) leading to
𝔼‖ A(I_n-X^† X)R^-1‖_F ≤( 𝔼‖ A(I_n-X^† X)R^-1‖_F^2 )^1/2
≤( ‖Σ_11Σ_21^-1‖^2 ·𝔼‖Γ_1^†Γ_2Σ_12‖_F^2 +‖Σ_12‖_F^2 )^1/2 ,
𝔼‖ B(I_n-X^† X)R^-1‖_F ≤( 𝔼‖ B(I_n-X^† X)R^-1‖_F^2 )^1/2
≤( 𝔼‖Γ_1^†Γ_2Σ_12‖_F^2 +‖Σ_22‖_F^2 )^1/2.
Finally, taking the expectation of both sides of (<ref>), (<ref>), (<ref>), and (<ref>), and then combining them with (<ref>), (<ref>), (<ref>), (<ref>), (<ref>), (<ref>), and (<ref>) complete the proof.
Similarly, combining Theorem <ref> with Lemma <ref>, we can obtain the error analysis for
Algorithm <ref>.
With the same setting as Theorems <ref> and <ref>, we have
𝔼‖ A-C_AM_AR_A ‖≤ 2η[ ‖Σ_11Σ_21^-1‖( e√(k+p)/p‖Σ_12‖_F + √(k/p-1)‖Σ_12‖) + ‖Σ_12‖]
+√(1+(m-k-p)4^k+p-1)[ ( 1+√(k/p-1)) σ_k+1(A) + e√(k+p)/p( ∑_j>k^σ_j^2(A) )^1/2],
𝔼‖ B-C_BM_BR_B ‖≤ 2η[ ( e√(k+p)/p‖Σ_12‖_F + √(k/p-1)‖Σ_12‖)+ ‖Σ_22‖] +
√(1+(d-k-p)4^k+p-1)[ ( 1+√(k/p-1)) σ_k+1(B) + e√(k+p)/p( ∑_j>k^σ_j^2(B) )^1/2].
§ RANDOMIZED ALGORITHMS FOR CUR DECOMPOSITION OF MATRIX TRIPLET
We first consider a randomized algorithm based on randomized CPQR.
Let A∈ℝ^m × n, B∈ℝ^m × t, G∈ℝ^d × n, rank(A) > k, rank(B) > k, and rank(G) > k,
and let Ω_2 ∈ℝ^l × (m+d) and Ω_3 ∈ℝ^l × (n+t) be Gaussian matrices. Define
X_1=Ω_2[ A; G ], Y_3=[ A, B ]Ω_3^T.
By virtue of the CPQRs of X_1 and Y_3^T, we have
l× nX_1n× nΠ_3=X_1[ n× lΠ_31, n× (n-l)Π_31^c ]=l× lQ_3[ l× lT_31, l× (n-l)T_32 ],
l× mY_3^Tm× mΠ_4=Y_3^T[ m× lΠ_41, m× (m-l)Π_41^c ]=l× lQ_4[ l× lT_41, l× (m-l)T_42 ],
where Π_3 and Π_4 are permutation matrices, Q_3 and Q_4 are orthogonal, and T_31 and T_41 are invertible and upper triangular. With this step, we can select the columns of A and G, and the rows of A and B. So, it suffices to consider how to select the rows of G and the columns of B. To this end,
similar to the discussion on the row IDs of C_A and C_B in Section <ref>, we perform the exact IDs for the columns of G and the rows of B to obtain them.
The specific algorithm
is concluded in Algorithm <ref>.
Noting that X_1Π_31=Q_3T_31 and Y_3^TΠ_41=Q_4T_41 are invertible, we can define two oblique projectors:
P_Π_31,N_7=Π_31(X_1Π_31)^-1X_1 and P_Y_3,N_8=Y_3(Π_41^TY_3)^-1Π_41^T.
Using them, the following results hold.
Let C_A∈ℝ^m × l, C_B∈ℝ^m × l, C_G∈ℝ^d × l, R_A∈ℝ^l × n, R_B∈ℝ^l × t, R_G∈ℝ^l × n, M_A∈ℝ^l × l, M_B∈ℝ^l × l and M_G∈ℝ^l × l be obtained by Algorithm <ref>. Then
‖ A-C_AM_AR_A ‖ ≤‖ I_n-P_Π_31,N_7‖‖ A(I_n-X_1^†X_1) ‖
+ ‖ I_m-P_Y_3,N_8‖‖ (I_m-Y_3Y_3^†)A ‖,
‖ B-C_BM_BR_B ‖ ≤‖ I_m-P_Y_3,N_8‖‖ (I_m-Y_3Y_3^†)B ‖,
‖ G-C_GM_GR_G ‖ ≤‖ I_n-P_Π_31,N_7‖‖ G(I_n-X_1^†X_1) ‖.
The proof is similar to those of Theorems <ref> and <ref>. We first consider the case for the matrix A.
Since X_1P_Π_31,N_7=X_1 and P_Y_3,N_8Y_3=Y_3, we have
‖ A-C_AC_A^†A ‖ ≤‖ I_n-P_Π_31,N_7‖‖ A(I_n-X_1^†X_1) ‖,
‖ A-AR_A^†R_A ‖ ≤‖ I_m-P_Y_3,N_8‖‖ (I_m-Y_3Y_3^†)A ‖.
Considering the fact that C_AC_A^† is an orthogonal projector, we get
‖ A-C_AM_AR_A ‖ = ‖ A-C_AC_A^†AR_A^†R_A ‖
= ‖ (I_m-C_AC_A^†)A+C_AC_A^†A(I_n-R_A^†R_A) ‖
≤‖ (I_m-C_AC_A^†)A ‖+ ‖ C_AC_A^†‖‖ A(I_n-R_A^†R_A) ‖
= ‖ (I_m-C_AC_A^†)A ‖+ ‖ A(I_n-R_A^†R_A) ‖.
Thus, (<ref>) can be obtained. Similarly, for the cases of the matrices B and G, the following results hold,
‖ G-C_GC_G^†G ‖ ≤‖ I_n-P_Π_31,N_7‖‖ G(I_n-X_1^†X_1) ‖,
‖ B-BR_B^†R_B ‖ ≤‖ I_m-P_Y_3,N_8‖‖ (I_m-Y_3Y_3^†)B ‖.
Note that the CPQRs of C_G^T and R_B can imply the exact row IDs. Then
‖ B-C_BM_BR_B ‖ = ‖ B-BR_B^†R_B ‖, ‖ G-C_GM_GR_G ‖ = ‖ G-C_GC_G^†G ‖.
As a result, (<ref>) and (<ref>) are derived.
Now we present the pass-efficient algorithm, i.e., Algorithm <ref>, for the CUR decomposition of matrix triplet, whose deduction is like that of matrix pair.
Next, we present the expectation error bounds for Algorithm <ref>. For brevity, we only present the results of spectral norm.
With the same setting as Theorem <ref>, let k be the target rank and p be the oversampling parameter, and let
β = ( 1+√(k/p-1)) σ_k+1[ A; G ] + e√(k+p)/p( ∑_j>k^σ_j^2[ A; G ])^1/2,
θ = ( 1+√(k/p-1)) σ_k+1[ A , B ] + e√(k+p)/p( ∑_j>k^σ_j^2[ A , B ])^1/2.
Then
𝔼‖ A-C_AM_AR_A ‖ ≤√(1+(n-k-p)4^k+p-1)×β
+ √(1+(m-k-p)4^k+p-1)×θ,
𝔼‖ B-C_BM_BR_B ‖ ≤√(1+(m-k-p)4^k+p-1)×θ,
𝔼‖ G-C_GM_GR_G ‖ ≤√(1+(n-k-p)4^k+p-1)×β.
By virtue of Lemma 3.2 in <cit.>, we have
‖ I_n-P_Π_31,N_7‖≤√(1+(n-k-p)4^k+p-1), ‖ I_m-P_Y_3,N_8‖≤√(1+(m-k-p)4^k+p-1).
Thus, combining the fact
max{‖ A(I_n-X_1^†X_1) ‖, ‖ G(I_n-X_1^†X_1) ‖}≤‖[ A; G ](I_n-X_1^†X_1) ‖,
max{‖ (I_m-Y_3Y_3^†)A ‖, ‖ (I_m-Y_3Y_3^†)B‖}≤‖ (I_m-Y_3Y_3^†) [ A, B ]‖
with Theorem <ref> and Lemma <ref> implies the desired results.
Similar to the error analysis of the CUR decomposition for matrix pair, i.e., Theorem <ref>, we now consider
the alternative expectation error bounds of
Algorithm <ref>.
Let the GSVDs of (A,G) and (A^T,B^T) be
[ A; G ]= [ W_1Σ_3H_1^T; W_2Σ_4H_1^T ], [ A^T; B^T ]= [ W_3Σ_5H_2^T; W_4Σ_6H_2^T ],
where H_1∈ℝ^n× n and H_2∈ℝ^m× m are nonsingular, W_1∈ℝ^m× m, W_2∈ℝ^d× d, W_3∈ℝ^n× n, and W_4∈ℝ^t× t are orthogonal, Σ_3∈ℝ^m× n, Σ_4∈ℝ^d× n, Σ_5∈ℝ^n× m, and Σ_6∈ℝ^t× m are diagonal.
By using the similar partition method of matrix pair, i.e.,
W_1=[ W_11 , W_12 ], W_2=[ W_21 , W_22 ], W_3=[ W_31 , W_32 ], W_4=[ W_41 , W_42 ],
Σ_3 =[ Σ_31 ; Σ_32 ], Σ_4 =[ Σ_41 ; Σ_42 ], Σ_5 =[ Σ_51 ; Σ_52 ], and Σ_6 =[ Σ_61 ; Σ_62 ]
with Σ_31, Σ_41, Σ_51 and Σ_61∈ℝ^k× k,
we have
Ω_2 [ A; G ] = Ω_2 [ Ŵ_11Σ_31+Ŵ_21Σ_41, Ŵ_12Σ_32+Ŵ_22Σ_42 ]H_1^T
≈[ Ω_2Ŵ_21Σ_41, Ω_2Ŵ_12Σ_32 ]H_1^T,
Ω_3 [ A^T; B^T ] = Ω_3 [ Ŵ_31Σ_51+Ŵ_41Σ_61, Ŵ_32Σ_52+Ŵ_42Σ_62 ]H_2^T
≈[ Ω_3Ŵ_41Σ_61, Ω_3Ŵ_32Σ_52 ]H_2^T,
where
Ŵ_11=[ W_11; 0 ], Ŵ_12=[ W_12; 0 ], Ŵ_21=[ 0; W_21 ], Ŵ_22=[ 0; W_22 ],
Ŵ_31=[ W_31; 0 ], Ŵ_32=[ W_32; 0 ], Ŵ_41=[ 0; W_41 ], Ŵ_42=[ 0; W_42 ].
Let the QR decompositions of H_1^T and H_2^T be H_1^T=Q_H_1R_H_1 and H_2^T=Q_H_2R_H_2 respectively.
Thus, under the following
assumptions:
1.
range(R_H_1^-1(R_H_1^-1)^TX_1^T)⊂ range(X_1^T)
and range(R_H_2^-1(R_H_2^-1)^TY_3)⊂ range(Y_3);
2. Ω_2Ŵ_21 and Ω_3Ŵ_41 are full column rank;
combining the GSVD-based error analyses in Section <ref> with Theorem <ref>, we can obtain the following theorem.
With the same setting as Theorem <ref> and the above assumptions, let k be the target rank and p be the oversampling parameter,
and let
η_1=‖ H_1 ‖√(1+(n-k-p)4^k+p-1), η_2=‖ H_2 ‖√(1+(m-k-p)4^k+p-1).
Then
𝔼‖ A-C_AM_AR_A ‖ ≤η_1 [ ‖Σ_31Σ_41^-1‖( e√(k+p)/p‖Σ_32‖_F+√(k/p-1)‖Σ_32‖) +‖Σ_32‖]
+η_2 [ ‖Σ_51Σ_61^-1‖( e√(k+p)/p‖Σ_52‖_F+√(k/p-1)‖Σ_52‖) +‖Σ_52‖] ,
𝔼‖ B-C_BM_BR_B ‖ ≤η_2 [ ( e√(k+p)/p‖Σ_52‖_F+√(k/p-1)‖Σ_52‖) + ‖Σ_62‖],
𝔼‖ G-C_GM_GR_G ‖ ≤η_1 [ ( e√(k+p)/p‖Σ_32‖_F+√(k/p-1)‖Σ_32‖)+ ‖Σ_42‖].
Similar to Theorem <ref>, Theorem <ref> and Corollary <ref>, we can also obtain two alternative expectation error bounds of Algorithm <ref>. For brevity, we omit them here.
§ NUMERICAL EXPERIMENTS
In this section, we
compare numerically the CUR algorithms of matrix pair and matrix triplet whose abbreviations are summarized in Table <ref>, among which
LDEIM-PCUR is obtained by combining the L-DEIM index selection (i.e., <cit.>) with DEIM-PCUR (i.e., <cit.>).
These algorithms
are performed five times, and the numerical results on relative errors and runtime are presented as their average. For a matrix A, the relative error of its low rank approximation is defined by ‖ A-C_AM_AR_A ‖/ ‖ A ‖.
§.§ On the matrix pair
Experiment 1
As done in <cit.>, we generate the matrix pair (A,B) as follows,
A=A_1A_2, B=B_1B_2,
where A_1∈ℝ^10000× 100, A_2∈ℝ^100× 5000, B_1∈ℝ^8000× 100 and B_2∈ℝ^100× 5000 are randomly generated by using the MATLAB build-in function randn. Note that rank(A)= rank(B)=100 with probability one.
We
implement the algorithms in Table <ref> on the above matrix pair (A,B), and present the relative errors and runtime in Fig. <ref>.
From the first two figures in Fig. <ref>, it is seen that if the target rank is less than 100, all the algorithms have almost the same performance in relative errors. When the target rank approaches 100, the relative errors of RPCUR and PE-PCUR are smaller than those of DEIM-PCUR, LDEIM-PCUR and RLDEIM-PCUR. This mainly because the oversampling parameter p=5 is used in RPCUR and PE-PCUR. Therefore, all the algorithms actually perform almost the same in relative errors.
From the last figure in Fig. <ref>,
we can find that RPCUR needs the least runtime, followed by PE-PCUR. They are much cheaper than RLDEIM-PCUR, which in turn is cheaper than DEIM-PCUR and LDEIM-PCUR.
§.§ On the matrix triplet
Experiment 2 As done in Experiment 1, we construct the matrix triplet (A,B,G) as follows,
A=A_1A_2, B=B_1B_2, G=G_1G_2,
where A_1∈ℝ^5000× 100, A_2∈ℝ^100× 5000, B_1∈ℝ^5000× 100, B_2∈ℝ^100× 10000, G_1∈ℝ^10000× 100 and G_2∈ℝ^100× 5000 are generated by the MATLAB function randn. It is clear that rank(A)= rank(B)= rank(G)=100 with probability one.
Then, the algorithms in Table <ref> on the above matrix triplet (A,B,G) are performed, and the relative errors and runtime are reported in Fig. <ref>.
From Fig. <ref>, it follows that the conclusions are similar to those obtained in Experiment 1 except that, in approximating A and B,
the relative errors of RLDEIM-TCUR are barely falling when k> 100.
§ CONCLUSIONS
This paper presents the CPQR-based randomized algorithms for the generalized CUR decompositions of matrix pair and matrix triplet. Their pass-efficient versions are also obtained.
For these algorithms, we present two alternative expectation error analyses, among which
the second one is mainly inspired by
the method in <cit.>.
Numerical experiments demonstrate that our algorithms can calculate the generalized CUR decompositions as accurate as the existing methods, but need much less runtime.
99
mahoney2009cur
Mahoney, M.W., Drineas, P.: CUR matrix decompositions for improved
data analysis. Proc. Natl. Acad. Sci. USA 106(3),
697–702 (2009)
gidisu2022generalized
Gidisu, P.Y., Hochstenbach, M.E.: A generalized CUR decomposition for matrix pairs. SIAM J. Math. Data Science 4(1), 386–409 (2022)
gidisu2022rsvd
Gidisu, P.Y., Hochstenbach, M.E.: RSVD-CUR decomposition for matrix
triplets. arXiv:2204.02113 (2022)
cai2021robust
Cai, H., Hamm, K., Huang, L., Needell, D.: Robust CUR decomposition:
Theory and imaging applications. SIAM J. Imaging Sci. 14(4), 1472–1503 (2021)
lei2022exemplar
Lei, H., Liu, J., Yu, Y.: Exemplar-based large scale low-rank matrix
decomposition for collaborative prediction. Int. J. Comput. Math. 1-26 (2022)
wang2013improving
Wang, S., Zhang, Z.: Improving CUR matrix decomposition and the
nyström approximation via adaptive sampling. J. Mach. Learn. Res. 14(1), 2729–2769 (2013)
sorensen2016deim
Sorensen, D.C., Embree, M.: A DEIM induced CUR factorization. SIAM J. Sci. Comput. 38(3), 1454–1482 (2016)
voronin2017efficient
Voronin, S., Martinsson, P.-G.: Efficient algorithms for CUR and interpolative matrix decompositions. Adv. Comput. Math. 43(3), 495–516 (2017)
chen2020efficient
Chen, C., Gu, M., Zhang, Z., Zhang, W., Yu, Y.: Efficient spectrum revealing CUR matrix decomposition. In: Proceedings of the 23rd International Conference on
Artificial Intelligence and Statistics (AISTATS), 108, 766–775 (2020)
dong2021simpler
Dong, Y., Martinsson, P.-G.: Simpler is better: a comparative study of
randomized algorithms for computing the CUR decomposition. arXiv:2104.05877 (2021)
boutsidis2014optimal
Boutsidis, C., Woodruff, D.P.: Optimal CUR matrix decompositions. SIAM J. Comput. 46(2), 543-589 (2017)
drineas2008relative
Drineas, P., Mahoney, M.W., Muthukrishnan, S.: Relative-error CUR
matrix decompositions. SIAM J. Matrix Anal. Appl. 30(2), 844–881 (2008)
hamm2021perturbations
Hamm, K., Huang, L.: Perturbations of CUR decompositions. SIAM J. Matrix Anal. Appl. 42(1), 351–375 (2021)
chen2022tensor
Chen, J., Wei, Y., Xu, Y.: Tensor CUR decomposition under T-product
and its perturbation. Numer. Funct. Anal. Optim. 43(6), 698-722 (2022)
che2022perturbations
Che, M., Chen, J., Wei, Y.: Perturbations of the TCUR decomposition for
tensor valued data in the tucker format. J. Optim. Theory Appl. 194(3), 852–877 (2022)
boutsidis2014near
Boutsidis, C., Drineas, P., Magdon-Ismail, M.: Near-optimal column-based matrix reconstruction. SIAM J. Comput. 43(2), 687–717 (2014)
cao2023randomized
Cao, Z., Wei, Y., Xie, P.: Randomized GCUR decompositions. arXiv:2301.13163 (2023)
Gidisu2022hybrid
Gidisu, P.Y., Hochstenbach, M.E.: A hybrid DEIM and leverage scores based method for CUR index selection. Progress in Industrial Mathematics at ECMI 2021, 147-153 (2022)
van1976generalizing
Van Loan, C.F.: Generalizing the singular value decomposition. SIAM J. Numer. Anal. 13(1), 76–83 (1976)
van1985computing
Van Loan, C.: Computing the CS and the generalized singular value decompositions. Numer. Math. 46(4), 479–491 (1985)
duersch2017randomized
Duersch, J.A., Gu, M.: Randomized QR with column pivoting. SIAM J. Sci. Comput. 39(4), 263–291 (2017)
duersch2020randomized
Duersch, J.A., Gu, M.: Randomized projection for rank-revealing matrix
factorizations and low-rank approximations. SIAM Rev. 62(3), 661–682
(2020)
martinsson2017householder
Martinsson, P.-G., Quintana OrtÍ, G., Heavner, N., van de Geijn, R.:
Householder QR factorization with randomization for column pivoting
(HQRRP). SIAM J. Sci. Comput. 39(2), 96–115 (2017)
halko2011finding
Halko, N., Martinsson, P.-G., Tropp, J.A.: Finding structure with randomness: Probabilistic algorithms for constructing approximate matrix
decompositions. SIAM Rev. 53(2), 217–288 (2011)
Ben2003generalized
Ben-Israel, A., Greville, T.N.E.: Generalized Inverses: Theory and Applications, 2nd edn. Springer Verlag, New York (2003)
wei2021randomized
Wei, W., Zhang, H., Yang, X., Chen, X.: Randomized generalized singular value decomposition. Commun. Appl. Math. Comput. 3(1), 137–156 (2021)
|
http://arxiv.org/abs/2303.06685v1
|
20230312151031
|
Enhanced entanglement and controlling quantum steering in a Laguerre-Gaussian cavity optomechanical system with two rotating mirrors
|
[
"Amjad Sohail",
"Zaheer Abbas",
"Rizwan Ahmed",
"Aamir Shahzad",
"Naeem Akhtar",
"Jia-Xing Peng"
] |
quant-ph
|
[
"quant-ph"
] |
[email protected]
Department of Physics, Government College University, Allama Iqbal Road,
Faisalabad 38000, Pakistan
Department of Physics, Government College University, Allama Iqbal Road,
Faisalabad 38000, Pakistan
Physics Division, Pakistan Institute of Nuclear Science and Technology
(PINSTECH), P. O. Nilore, Islamabad 45650, Pakistan
Department of Physics, Government College University, Allama Iqbal Road,
Faisalabad 38000, Pakistan
Department of Physics, Zhejiang Normal University, Jinhua 321004, China
State Key Laboratory of Precision Spectroscopy, Quantum Institute for Light
and Atoms, Department of Physics, East China Normal University, Shanghai
200062, China
Gaussian quantum steering is a type of quantum correlation in which two
entangled states exhibit asymmetry. We present an efficient theoretical
scheme for controlling quantum steering and enhancing entanglement in a
Laguerre-Gaussian (LG) rotating cavity optomechanical system with an optical
parametric amplifier (OPA) driven by coherent light. The numerical
simulation results show that manipulating system parameters such as
parametric gain χ, parametric phase θ, and rotating mirror
frequency, among others, significantly improves mirror-mirror and
mirror-cavity entanglement. In addition to bipartite entanglement, we
achieve mirror-cavity-mirror tripartite entanglement. Another intriguing
discovery is the control of quantum steering, for which we obtained several
results by investigating it for various system parameters. We show that the
steering directivity is primarily determined by the frequency of two
rotating mirrors. Furthermore, for two rotating mirrors, quantum steering is
found to be asymmetric both one-way and two-way. As a result, we can assert
that the current proposal may help in the understanding of non-local
correlations and entanglement verification tasks.
Enhanced entanglement and controlling quantum steering in a
Laguerre-Gaussian cavity optomechanical system with two rotating mirrors
Jia-Xing Peng
March 30, 2023
====================================================================================================================================
§ INTRODUCTION
Quantum entanglement is one of the most weirdest phenomenon of quantum
mechanics in which there exists a non-classical (non-local) correlation
between spatially separated states <cit.>. Entanglement has been
shown to have numerous applications in quantum information processing <cit.>, quantum teleportation <cit.>, quantum algorithms <cit.>, and quantum computing <cit.>. In recent years, many of the
theoretical and experimental studies focused on the generation of
microscopic entanglement in systems such as atoms, ions, and photons <cit.>. However, it remained a pipe dream for researchers to
generate quantum entanglement for macroscopic objects. As a result of hard
efforts, macroscopic entanglement has been experimetally demonstrated for
superconducting qubits <cit.>, atomic ensembles <cit.> and
entanglement between diamonds <cit.>.
In addition to quantum entanglement, Einstein-Podolsky-Rosen (EPR) steering
<cit.> is one of an important quantum correlation that sits between
Bell's non-locality and entanglement <cit.>. As there
exists non-exchangeable asymmetric roles between the two observers, Alice
and Bob. This phenomenon was first introduced by Schrödinger to show
that the non-locality in EPR states <cit.>. Most distinctive and
unique feature of quantum steering is its directionality <cit.>. It is
interesting to mention here that the steerable states of massive and
macroscopic objects can be utilized to test the foundational issues of
quantum mechanics and the implementation of quantum information processing.
In recent years, many of the studies has focused to achieve these goals in
many optomechanical <cit.> and in magnomechanical systems
<cit.>. It is because of advancement in present day
technology that the most promising feature of quantum steering, one-way
steering, has been experimentally demonstrated <cit.>.
Over the course of about last two decade, cavity optomechanical systems <cit.> have gained importance due to its academic significance and
applications in foundational issues of quantum mechanics <cit.> and
highly precise measurements <cit.>. Optomechanical systems have
recently sparked widespread interest in their discussion of quantumness <cit.> via the Wigner function <cit.> and time-frequency
analysis <cit.>. In addition to above, optomechanical systems have
been experimentally used because of the development of optical micro-cavity
technology. They provide an excellent test bed macroscopic entangled state
<cit.>, coherent state <cit.>, squeezed state
<cit.>, ground state cooling <cit.> and optomechanically induced
transparency (OMIT) <cit.>. In principle, nothing
from the principles of quantum mechanics prohibit macroscopic entanglement.
This has been first investigated by Vitali and collaborators in their
seminal paper <cit.>. Therefore, optomechanics is paving a way towards
the macroscopic non-local correlations at macroscopic scales.
Motivated by the progress in optmechanical systems, Bhattacharya and Meystre proposed an optomechanical system comprising a rotating mirror (or rovibrational mirror) which is directly coupled to a Laguerre-Gaussian (LG) cavity mode via exchange of angular momentum <cit.>. In their scheme, they demonstrate that the rotating mirror can be sufficiently cooled
to 8mK right from the room temperature (300K), due to the incident radiation torque. At such low temperature, one can observe various nonlinear and quantum phenomena. In another interesting scheme, Bhattacharya and collaborators, showed that one can generate entanglement between mechanical rotating mirror and LG cavity mode <cit.>. More recently,
researchers found that orbital angular momentum of LG cavity mode can be measured by utilizing OMIT window width <cit.>. Furthermore, researcher used hybrid rotational system to study OMIT <cit.>, cooling of rotating mirrors <cit.>, and entanglement <cit.>. Most recently, there is an interesting study by Huang et al, in which they proposed a LG cavity optomechanical scheme, assisted with an optical parametric amplifier (OPA) whose pump frequency is double the frequency of frequency of anti-Stokes field which is
being generated by the external laser beam interacting with both rotating mirrors, for exploring the entanglement between two rotating mechanical mirrors <cit.> and showed that the maximum entanglement is restricted by the gain of the OPA.
The current research focuses on the controllable quantum steering and
enhanced entanglement in a resolved-side-band of two rotating mechanical
mirrors of a single LG optomechanical cavity containing an OPA. We
specifically investigated mirror entanglement as well as quantum steering of
rotating mirrors, and our results show that parametric interactions haveÂ
increased entanglement. Moreover, we also discussed the dependence of
entanglement upon several system parameters such as parametric gain χ,
effective detuning Δ and parametric phase θ. It is also shown
that there exists tripartitite (mirror-cavity-mirror) entanglement,
quantified by residual cotangle. In addition to entanglement, we also
studied the control of quantum steering ξ, which has been found to be
asymmetric both one-way and two-way for rotating mirrors RM_1 and RM_2, respectively.
The paper is arranged as follows. In Section 2, we present
the theoretical model and the corresponding dynamical quantum langevin
equations. The discussion of methodology for measuring entanglement and
quantum steering is covered in Section 3. We present
numerical results that discuss bipartite/tripartite entanglement and quantum
steering in Section 4 and Section 5,
respectively, then Section 6, shows the experimental
feasibility of the present scheme. Finally, Section 7
presents the conclusions.
§ THEORETICAL MODEL
The system we considered comprises an optical cavity with length L with two rotating mirrors, as shown in Figure 1. The cavity is driven by
the input Gaussian beam which has no topological charges. The Gaussian beam
with frequency ω_L and zero charge enters the cavity through the
left rotating mirror (RM_1), which is partly transmissive. The reflected
beam gets a charge -2l while the transmitted beam obtain zero charge.
Moreover, the transmitted beam is then incident on the right rotating mirror
(RM_2) and gets charge 2l (zero) on reflection (transmission) from RM_2. Thus a beam with charge 2l interacts with the RM_1 again. The
transmitted beam from RM_1 has charge 2l while the reflected beam
remains with no charge, demonstrating that the net topological charge
increment of light transmission back and forth in the cavity is zero,
ensuring the stability of the system. Moreover, the coupling between the
cavity and left/right rotating mirrors established due to the exchange of
orbital angular momentum. Therefore, we can expect the entanglement between
two rotating mirrors. The exchange of angular momentum between each rotating
mirror and each intracavity photon is 2lħ and time for a round trip is
2L/c, thus the radiation torque acting on both mirror is the change in
angular momentum per the time required for a round trip, that is, 2lħ/(2L/c)=clħ/L=ħ g_ϕ, where g_ϕ=cl/L
optorotational coupling strength. For simplicity, we assumed the same radius
R and the same mass m, and the same intrinsic damping rate γ_m.
In addition, a degenerate OPA is embedded into the cavity. Finally, the beam
is completely reflected from RM_2. Moreover, we have ignored the loss of
incident light <cit.>. In a frame rotating at the driving frequency ω _L,
the Hamiltonian of the whole system takes the form
H/ħ = [Δ_0+(g_1φ _1-g_2φ_2)]
a^†a+1/2∑_j^2ω_φ _i(
L_z_i^2+φ _i^2)
+iχ ( a^† ^2e^iθ-a^2e^-iθ) +ι
E(a^†-a),
where Δ_0=ω _c-ω _L is the detuning of the cavity
field and a (a^†) is the annihilation (creation) operator of
the cavity field, and follow the relation [ a,a^†] =1.
While ϕ _j and L_z_k are the angular displacement and angular
momentum of the rotating mirrors, respectively, with [ϕ
_j,L_z_k]=iδ_jk(j,k=1,2). In above Hamiltonian, the first two
terms are the bare Hamiltonian of the energy for the cavity field and the
two rotating mirrors, the third term describes the optomechanical coupling
between the cavity field and the two rotating mirrors with the coupling
constant given by g_i=(cl/L)√(ħ /Iω _ϕ _i)(
i=1,2) <cit.>, where c is the velocity of light and l is the
orbital angular momentum quantum number, L is the length of the cavity and
I=MR^2/2 is the moment of inertia of the two rotating mirrors about the
central axis of the cavity. The next term interprets the interaction of the
2nd-order nonlinear optical crystals, at 2ω_L, with the L-G cavity
mode with χ (θ) being the parametric gain (phase) of the OPAs.
The last term of Equation (<ref>) represents the interaction of the LG-cavity
mode with the incoming coupling field.
The dynamics of the system can be well described by the time evolution of
the operators and is given by the quantum Langevin equations (QLEs), which
can be written as:
ϕ̇_j = ω _ϕ _jL_z_j,(j=1,2)
L̇_z_j = -ω _ϕ _jϕ _j+g_α ja^†a-γ _mL_z_j+ε ^in,
ȧ = -[κ +iΔ _∘+(g_1ϕ _1-g_2ϕ _2)
]a+2χ a^†e^iθ
+E+√(2κ)a^in,
where g_α1=-g_1, g_α2=g_2 and Δ _∘=ω _c-ω _L. In addition, ε ^in account for the
mechanical noise, and its fluctuation correlations which are relevant to
temperature T, can be described by
⟨δε ^in(t)δε ^in(t^^')⟩ =γ _m_i/ω _ϕ _i
∫_-∞^∞dω/2πe^-ιω
(t-t^^')ω[ 1+Θ] ,
where Θ =( ħω/2k_BT), with k_B being the Boltzmann's constant. Similarly, a^in is a noise
operator that of the incident laser beam on the optical cavity and whose
delta-correlated fluctuations are
⟨ a^in(t)a^in,†(t)⟩ =δ (t-t^^'),
To linearize the set of QLEs, i.e., Equation (<ref>-<ref>), we use the ansatz by
writing τ =τ _0+δτ, (τ =ϕ _j,L_z_j,a),
where τ _s (δτ) is the steady-state (quantum fluctuation
) of the operators. Under the long-term limit, the steady-state values of
each operator are:
L_z_j = 0,
ϕ _j0 = g_αj| a_0| ^2/ω
_ϕ _1,
a_0 = (κ -iΔ +2χ e^iθ)/(κ ^2+Δ
^2+4χ ^2)E,
where Δ =Δ _0+∑_j^2g_jϕ _j0 represents the
effective cavity detuning while a_0 denotes the effective field
amplitude of cavity modified by OPA. Since, |a_s|≫δ a, one can
omit the unwanted nonlinear terms, e.g., δ aδ a^†. In
this case, the linearized set of QLEs takes the form:
δϕ̇_j = ω _ϕ _jδ L_z_j,
δL̇_z_j = -ω _φ _jδϕ _j-γ
_mδ L_z_j+G_jδ X+δε ^in,
δẊ = -κδ X+Δδ Y+√(2κ)X^in,
δẎ = -κδ Y-Δδ X-G_1δϕ
_1+G_2δϕ _2
+√(2κ)Y^in,
where G_j=√(2)g_α ja_0 is the effective optomechanical
coupling strength. Here, we have introduced the set of quadratures for the
cavity field, that is, δ X=1/√(2)(δ a+δ a^†), δ Y=1/√(2)i(δ a-δ a^†), δ
X_in=1/√(2)(δ a_in+δ a_in^†) and δ
Y_in=1/√(2)i(δ a_in-δ a_in^†). Hence, we
rewrite the QLEs (Equation (<ref>-<ref>)) in a more compact form, as follow
Ż(t)=𝒜𝒵(t)+n(t),
where 𝒵^T=(δϕ _1,δ L_z_1,δϕ
_2,δ L_z_2,δ X,δ Y) is the fluctuation vector and n^T(t)=(0,ε ^in,0,ε ^in,√(2κ)X^in,
√(2κ)Y^in) represents the noise vector. Therefore, the drift
matrix of the system is given by
𝒜=(
[ 0 ω _ϕ _1 0 0 0 0; -ω _ϕ _1 -γ _m 0 0 -G_1 0; 0 0 0 ω _ϕ _2 0 0; 0 0 -ω _ϕ _2 -γ _m G_2 0; 0 0 0 0 μ _+ ρ _+; -G_1 0 G_2 0 ρ _- μ _- ]
) ,
where μ _±=-κ± 2χ(e^θ) and ρ _±=±Δ +(e^θ). The above drift matrix of the system determines the
stability of the optorotational system, is stable and reaches its
steady-state if none of the eigenvalues of the above drift matrix 𝒜 has a positive real part <cit.>.
§ ENTANGLEMENT AND GAUSSINA STEERING MEASUREMENT
Covariance Matrix. The foremost task is to find the
stability of any system which, in this case, is obtained by applying the
Routh-Hurwitz criterion which impose certain constraints on the system
parameters. Once the constraints for the current optorotational system are
fulfilled, the steady state of the fluctuations must be a Gaussian state.
Since, ⟨ε ^in⟩=⟨ a^in⟩=0, and in
this situation, quantum correlations of the system can then be characterized
by the covariance matrix, which has the same order as the drift matrix, with
V_jk=[𝒵_j(∞ )𝒵_k(∞ )+𝒵
_k(∞ )𝒵_j(∞ )]/2, where
𝒵^T(∞ ) = (δϕ _1(∞ ),δ L_z1(∞
),δϕ _2(∞ ),δ L_z2(∞ ),
δ X(∞ ),δ Y(∞ ))
represents the fluctuation matrix. The elements of the covariance matrix
take the form <cit.>
V_jk=∑_k,l∫_0^∞dt∫_0^∞dt^'
Λ_i,k(t)Λ_j,l(t^')Ψ_k,l(t-t^'),
where Λ=exp(𝒜t) and
Ψ_k,l(t-t^')=⟨
n_k(t)n_l(t^')n_l(t^')n_k(t)/2
is noise correlation functions matrix. For large mechanical quality factor,
the quantum Brownian noise can be delta-correlated, that is
Ψ_k,l(t-t^') = D_k,lδ(t-t^'),
= Diag[0,γ _m_1(2n_1+1),0,γ_m_1(2n_2+1),κ,κ],
which simplifies Equation (<ref>) as follow
V=∫_0^∞dtΛ(t)DΛ^T(t).
The covariance matrix V of system satisfy steady-state Lypunov equation,
𝒜V+𝒜V^T=-D.
The covariance matrix V which delineate the entanglement configuration of
the current two mirrors optorotational system, its form is
V=(
[ M_1 N_12 N_1m; N_12^T M_2 N_2m; N_1m^T N_2m^T M_m ]
) .
Each entry of above covariance matric V is a 2×2 block matrix. The
diagonal entries of the above covariance matrix V describe the local
properties of the participants while the rest of the entries define the the
correlations between different modes. Bipartite entanglement. The logarithmic energy which quantify the
entanglement is defined as
E_N=max [0,ln (2ν^-)],
where ν ^-=2^-1/2√(ℵ -√(ℵ^2-4ς)) is the smallest symplectic eigenvalue of the partially
transposed covariance matrix (CM), ς=[ς _α, ς _αβ;ς _αβ^T,ς _β] with each entry of the ς is a 2× 2 block matrix and therefore, ς is the 4× 4 CM of the bipartite subsystem involving mode α and β and
ℵ =ς _α+ς _β-2ς_αβ.
Tripartite entanglement. We opt the minimum residual cotangle <cit.> for the basic criteria to realize tripartite
entanglement, is given by
ℛ_τ^min≡min [ℛ_τ^m_1|m_2a,
ℛ_τ^m_2|m_1a,ℛ_τ^a|m_1m_2],
where ℛ_τ^f|jk≡ C_f|jk-C_f|j-C_f|k≥ 0 (f,j,k=m_1,m_2,a) is the monogamy of quantum entanglement and this
condition assures the invariance of tripartite entanglement under possible
permutations of all modes. Hence, ℛ_τ^min and is
describes the genuine tripartite entanglement of any three-mode Gaussian
state. In Equation (<ref>), C_f|j is the contangle of subsystems of f
and j ( j incorporate one or two modes), and is equal to the
squared logarithmic negativity. To execute one-mode-vs-two-modes
logarithmic negativity E_f|jk, one must reform ν^- (see Equation (<ref>)) as
ν^-=min eig |⊕_j=1^3(-σ _y)V_4|,
where V_4=𝒫_1|2𝒱_4𝒫_1|2
with 𝒬=𝒢_i|jk𝒬𝒢_i|jk.
Furthermore Furthermore, the partial transposition matrices are given by
𝒢_1|23 = diag(1,-1,1,1,1,1),
𝒢_2|13 = diag(1,1,1,-1,1,1),
𝒢_3|12 = diag(1,1,1,1,1,-1).
Gaussian steering. Gaussian steering has asymmetric characteristics
in nature and is much different from the entanglement. For the two
interacting mode Gaussian state, the recommended measurements of the quantum
steerability between any two interacting parties in different directions can
be calculated as
ζ _α |β = max{0,𝒮(2𝒱_m_l)-
𝒮(2𝒱_in)},
ζ _β |α = max{0,𝒮(2𝒱_m_2)-
𝒮(2𝒱_in)},
where 𝒮(ν ) is the Rényi-2 entropy and is 𝒮(ν
)=1/2ln (ν ), and
𝒱_in=[
[ 𝒱_m_1 𝒱_m_1m_2; 𝒱_m_1m_2^T 𝒱_m_2 ]
] ,
The diagonal entries of 𝒱_m_1 and 𝒱_m_2
defines the reduced states of modes 𝒱_m_1 and 𝒱
_m_2, respectively. We quantify the quantum steering by ζ _α
|β which translates the mode α steers mode β and
similarly ζ _β |α defines the swaped direction. It is an
established fact that the entanglement is symmetric property. However, the
EPR steering is intrinsically different from entanglement, i.e., asymmetric
property which means that a quantum state may be steerable from Bob to Alice
but not vice versa. Therefore, there exist mainly three different
possibilities for quantum steering. (i) ζ _α |β=ζ
_β |α=0 as no-way (NW) steering, (ii) ζ _α |β>0 and ζ _β |α=0 or ζ _α |β=0 ζ
_β |α>0 as one-way (OW) steering and ζ _α |β>0
ζ _β |α>0 as two-way (TW) steering. Asymmetric
steerability between the two modes of the Gaussian states can be checked by
introducing the steering asymmetry, defined as
ζ _M=|ζ _α |β-ζ _β |α|.
It is vital to mentioned here that we obtain one-way or two way steering as
long as steering asymmetry remains positive, i.e., ζ _M>0 and no-way
if ζ _M=0.
§ BIPARTITE AND TRIPARTITE ENTANGLEMENT
In the following discussion, we demonstrate the results
regarding the generation of bipartite (and tripartite) entanglement and
quantum steering for the current system. Throughout our numerics, we have
assumed experimentally realizable parameters, similar to those in ref <cit.>, listed in Table 1. In this paper, we consider two
bi-partitions, namely E_N^m-m and E_N^m-c to represent the
degree of entanglement between two phonon modes and between L–G cavity mode
and phonon mode, respectively. The utmost task of studying the entanglement
in such a double rotational cavity optomechanical system is to find optimal
value of the cavity detuning Δ. In Figure 2 (a-b), the logarithmic
negativity is plotted as a function of the detuning in the absence and
presence of parametric gain (with different parametric phases). To ensure
the stability of the system, we choose the parameter gain χ=0.1ω_ϕ_1. We find that the steady state entanglement
between two mirrors E_n^m-m (between the mirror and the cavity E_n^m-c) is obtained when Δ<0 (Δ>0) in the steady state
which is similar to <cit.>. In addition, the maximal value of E_n^m-m (E_n^m-c) is obtained at about Δ=-ω_ϕ_1
(Δ=ω_ϕ_1). Furthermore, the enhancement pattern of
entanglement E_n^m-m, by varying the phase of the parametric, behaves
almost in converse manner as compared to E_n^m-c as shown by Figure 2
(a-b).
Next, we examine the combined effect of parametric gain and parametric phase
(associated with the gain), on the mirror-mirror entanglement E_n^m-m
and mirror-cavity entanglement E_n^m-c as shown by the Figure 3.
Physically, the gradual increase of parametric gain induces the nonlinearity
in the system and consequently, we observe the enhancement in entanglement.
One can see that bipartite entanglement E_n^m-m increases as the θ increases for a larger value of parametric gain. We can also see
from the Figure 3 that by ensuring the stability of the current system, the
maximum enhancement of E_n^m-m appears around θ=3π/2 for
varied parametric gain. For specific value of χ, the amount of maximum
entanglement increase, is different. For example, keeping the fixed
parametric gain, i.e., χ=0.1ω_ϕ_1, the amount of maximum
entanglement E_n^m-m increased, is about 14%.
The robustness of such a mirror-mirror entanglement in two rotating cavity
optomechanical system with respect to the temperature T as shown in Figure
4. It is clear that for a fixed value of the parametric gain, the amount of
entanglement decreases monotonically as the temperature of the environment
increases. and eventually cease to exist. However, the critical temperature
of mirror-mirror entanglement fluctuate by varying the parametric phase. On
the other hand, the curve shown in the inset of Figure 4 have dissimilar
tendency i.e., by choosing the optimal value of the parametric phase, the
degree of mirror-mirror entanglement E_n^m-m increases with the rise
of parametric gain. However, the temperature decreases, implying that the
system with larger parametric gain mass possess weaker capability to refrain
from decoherence of the thermal environment.
One of the most vital contribution in the present double rotating system is
to find the possibility of exploring the genuine tripartite entanglement. In
Figure 5, we investigate the genuine tripartite entanglement versus normalized
detuning. It is clear that the genuine tripartite entanglement among the
participants (i.e., phonon-photon-phonon) exists in the current double
rotating system if the cavity mode is in blue sideband. The solid blue curve
shows the genuine tripartite entanglement when χ=0. However, in the
presence of parametric gain χ=0.1ω_ϕ_1, we plot tripartite
entanglement for different value of phase. It is clear from Figure 5 that
maximum enhancement in tripartite entanglement is obtained for θ=π/2
. It is also noticeable that this enhancement go along with an increase in
domain of genuine tripartite entanglement over a relatively wider range of
effective cavity detuning. Furthermore, the maximum of genuine tripartite
entanglement with parametric phase increases by 40%. Hence, the
parametric phase of the OPA plays a vital role in enhancing the genuine
tripartite entanglement as exhibited in Figure 5.
§ CONTROLLING GAUSSIAN STEERING
Two-way (TW) control. In the following, our purpose is to find the
controllable quantum steering in the double rotational cavity optomechanical
system. Since the entanglement and the quantum steering are two different
facets of inseparable quantum correlations, therefore, it is better to study
them simultaneously under the same conditions. For this purpose, we employ
the Rényi-2 entropy to quantify the steerability between the two
rotational modes. We first demonstrate this idea in Figure 6, the peak values
of the entanglement and quantum steering of the two mechanical modes. It is
evident from Figure 6. that steerable states are always entangled, however,
the reverse order is not generally true, i.e., entangled states are not
usually steerable. This property reflects the idea that stronger quantum
correlations, between the two rotational modes, are indispensable for
realizing the Gaussian steering than that for the entanglement. In such a
two-rotating cavity optomechanical system, there may exist (one-) two-way
quantum steering between the two rotational modes due to frequency
difference. To demonstrate the Gaussian steering more clearly, we use the
pink area to area to depict the presence of two-way steering, green and
yellow areas for one-way steering, and the blue area to represent the
presence of no-way steering. It is clear from Figure 6 (a-b), that both the
mirror steer each other, however, the steerability mainly depends on the
frequency of each mirror. The mirror which has high frequency steers more as
compared to the mirror which has less frequency as clearly demonstrated by
the pink area in Figure 6 (a-b). The two-way steering implies that both Alice
and Bob can convince each other that the state they shared, is entangled.
Furthermore, Figure 6. reveal situation where ζ_m_1|m_2>0, ζ_m_2|m_1=0 and E_N^m-m>0 (or ζ_m_1|m_2=0, ζ_m_2|m_1>0 and E_N^m-m>0) witnesses the Gaussian one-way
(OW) steering region as shown by the green (yellow) region. One-way (OW)
steering in the current system translates that the states of the two
rotational modes are steerable in single direction even though they are
entangled. Such a kind of response is a direct manifestation of the problem
which has been reported in <cit.>. Furthermore, Figure 6 also shows that
not only the two steerabilities ζ_m_1|m_2 and ζ_m_2|m_1 but also the entanglement E_N^m-m are strongly
sensitive to the frequencies of the two mechanical modes. Moreover, it can
be seen that when the value of the frequency of mirror-2 is greater than the
mirror-1, the region for the one-way (two-way) steering gets broaden
(shorten).
One-way (OW) control. As we discussed, the steerability and
entanglement between the rotational modes are sensitive to their
frequencies. We observe that when the two rotational modes are about to
synchronize, i.e., the ratio of the frequency of the two rotating mirrors
approaches unity, the two-way steering completely vanishes. Furthermore,
Figure 7(a) and 7(d) present a fascinating situation where the states of the
two rotational modes are entangled; though they show steerability in one
direction, which indicates the perfect asymmetry of quantum correlations
(one-way steering). Such an asymmetry of quantum correlations describes that
both Alice and Bob can execute the same Gaussian measurements on their side
of the entangled system, however, they find completely different results.
One-way steering can be explained by the steering asymmetry introduced in
Eq. (<ref>). Figure 7(a) and 7(d) clearly show that one-way steering
can be observe until ω_ϕ_2/ω_ϕ_1=0.9 or ω_ϕ_2/ω_ϕ_1=1.1. The one-way steering has been
experimentally realized in <cit.> and imparts one-side device
independent quantum key distribution (QKD). However, we observe no-way
steering when ω_ϕ_2/ω_ϕ_1≃0.95 or ω_ϕ_2/ω_ϕ_1≃1.05. Furthermore, when the two
rotating mirrors rotate with exactly the same frequency (complectly
synchronize), even the entanglement between rotating mirrors completely
cease to exist (not shown).
Effect of Parametric Gain and Phase on quantum steering. Finally,
the degree of entanglemnt entanglement and dynamics quantum steering can be
studied under influence of the parametric gain for different value of phase
as shown in Figure 8 around the optimum value of the cavity detuning. Firstly,
it can be seen in Figure 8. that quantum steering remains upper bounded by the
entanglement irrespective of which rotational mirror has higher frequency.
Figure 8 (a-d) shows that with gradual increase of the parametric gain, the
two rotational modes exhibit two-way steering except the case when θ=π/2, where two-way steering converts to one-way steering around χ/ω_ϕ_1=0.13. This is because we obtained reduced
entanglement at this parametric phase (can be seen in Figure 2(a)). The same
situation can also be observe in lower panel of Figure 8, where the one-way
steering vanishes around χ/ω_ϕ_1=0.16. Owing to the gradual
enhancement of entanglement for θ=3π/2, one-way steering converts
to two-way steering for large value of parametric gain. Hence, the current
scheme may provide motivation for handling quantum steering in two
rotational cavity optomechanical system.
§ EXPERIMENTAL IMPLEMENTATIONS
The parameters for the current scheme is given in Table. 1.
Keeping these parameters in mind, we now talk about the feasibility of the
current two rotating system based on the recent experiments. In recent
experiment, the value of the angular momentum is taken very high because it
can easily be realizable via spiral phase elements. In addition, the
azimuthal structure of beam of light can be altered via transmission or
reflection from the spiral phase elements <cit.>. It is shown that low
mass of the rotational mirrors with high precision can be well fabricated.
Futhermore, topological charge of the LG laser beams can be taken as high as
1000 <cit.>. With the fast growing nanotechnology, the mechanical
oscillators, with low effective mass (m=37pg), high-quality factor (Q_m=10^8) and and high frequency (a few MHz), has been experimentally
reported <cit.>. This implies that the current system is an
experimentally feasible system under the present-day technology.
§ CONCLUSIONS
We have presented an efficient and effective method for
improving the entanglement and one-way (two-way) steering characteristics of
two rotating mirrors in a Laguerre-Gaussian (LG) rotating cavity, which
composed of two rotational mirrors coupled to a cavity via orbital angular
momentum exchange and an optical parametric amplifier (OPA) driven by
coherent light. We have shown that the frequencies of two rotational mirrors
play a vital role in modulating the entanglement and controlling the quantum
steering. For example, when ω_ϕ2=0.5ω_ϕ1 (ω_ϕ2=1.5ω_ϕ1), the steerability of two mirrors is
enhanced as compared to the case when the two mirrors are near to
synchronized, that is, near the resonance frequency, two-way steering
converts to one-way steering (or no-way steering) with a reduced degree of
entanglement. It is interesting to mention that the switch from two-way
steering to one-way (or no-way) steering is practicable by changing the frequencies of two rotational mirrors,
parametric gain and phase. Hence, we argued that the steering directivity in the current scheme would
support understanding the quantum correlation and may have major applications in one-way (two-way) quantum computing, quantum secret sharing, and quantum key distribution.
§ DATA AVAILABILITY
All numerical data that support the findings in this study is available within the article
99
ent E. Schrodinger, Proc. Cambridge Philos. Soc. 1935, 31(4), 555.
ent1 R. Horodecki, P. Horodecki, M. Horodecki, K. Horodecki, Rev. Mod. Phys. 2009, 81, 865.
ent2 M. A. Nielson and I. L. Chuang, Quantum Computation and Quantum Information (Cambridge University, 2000, pp. 558-559.
tele X. M. Jin, et. al. Nat. Photon 2010, 4(6), 376 381.
ram R. ul-Islam, M. Ikram, R. Ahmed, A. H. Khosa, F. Saif, J. Mod. Opt. 2009, 56, 875.
algo A. M. Childs, W. Van Dam, Rev. Mod. Phys. 2010, 82, 148.
comp Andrew Steane, Rep. Prog. Phys. 1998, 61, 117.
micro C. A. Sackett, et. al. Nature 2000, 404, 256.
micro1 H. HÃffner, et. al. Nature 2005, 438, 643.
micro2 X. C. Yao, et. al. Nat. Photonics 2012, 6, 225.
sup A. J. Berkley, et. al. Science 2003, 300, 1548.
atom H. Krauter, C. A. Muschik, K. Jensen, W. Wasilewski, J. M. Petersen, J. I. Cirac, E. S. Polzik, Phys. Rev. Lett. 2011, 107, 080503.
diam K. C. Lee, et. al. Science 2011, 334, 6060.
epr A. Einstein, B. Podolsky, N. Rosen, Phys. Rev. 1935, 47, 777.
bell J.S. Bell, Physics 1964, 1, 195.
bell1 J.F. Clauser, M.A. Horne, A. Shimony, R.A. Holt, Phys. Rev. Lett. 1969, 23, 880.
bell2 A. Aspect, P. Grangier, G. Roger, Phys. Rev. Lett. 1982, 49, 91.
sch E. Schrodinger, Math. Proc. Cambridge Philos. Soc. 1935, 31, 555.
sch1 E. Schrodinger, Proc. Camb. Phil. Soc.1936, 32, 446.
dir H.M. Wiseman, S. J. Jones, A.C. Doherty, Phys. Rev. Lett. 2007, 98, 140402.
stee Q. Y. He, M. D. Reid, Phys. Rev. A 2013, 88, 052121.
stee1 S. Kiesewetter, Q. Y. He, P. D. Drummond, and M. D. Reid, Phys. Rev. A 2014, 90, 043805.
stee2 J. El Qars, M. Daoud, R. Ahl Laamara, Phys. Rev. A 2018, 98, 042115.
opent3 A. Sohail, R. Ahmed, R. Zainab, Chang shui Yu, Phys. Scr. 2022, 97, 075102.
opent4 A. Sohail, A. Hassan, R. Ahmed, C. S. Yu, Quant. Inf. Process. 2022, 21, 207.
opent5 A. Sohail, R. Ahmed, A. Shahzad, M. A. Khan , Int. J. Theor. Phys. 2022, 61, 174.
exp D. Cavalcanti, P. Skrzypczyk, G. H. Aguilar, R. V. Nery, P. H. S. Ribeiro, S. P. Walborn, Nat. Commun. 2015, 6, 7941.
exp1 V. Händchen, T. Eberle, S. Steinlechner, A. Samblowski, T. Franz, R. F. Werner, R. Schnabel, Nat. Photon. 2012, 6, 596.
oms D. Vitali, S. Gigan, A. Ferreira, H. R. Böhm, P. Tombesi, A. Guerreiro, V. Vedral, A. Zeilinger, M. Aspelmeyer, Phys. Rev. Lett. 2007, 98, 030405.
oms2 C Doolin, et. al. New J. Phys. 2014, 16, 035001.
oms3 T J Kippenberg, et. al. New J. Phys. 2013, 15, 015019.
found M. Metcalfe, Appl. Phys. Rev 2014, 1, 031105.
measure M. Aspelmeyer, T,.J. Kipenberg, F. Marquardt, Rev. Mod. Phys. 2013, 86, 1391.
wig1 M. F. Alotaibi, E. M. Khalil , M. Y. Abd Rabbou,and M. Marin, Mathematics, 2022, 10, 4458.
naeem1 N. Akhtar, J. Wu, J X Peng, W M Liu, G Xianlong, 2023 arXiv:2301.00195.
naeem2 N. Akhtar, B. C. Sanders, G. Xianlong, Phys. Rev. A 2022, 106, 043704.
naeem3 N. Akhtar, H. Ullah, A. Omari, F. Saif, J. Russ. Laser Res. 2017, 38, 399.
opent R. Ahmed , S. Qamar, Phys. Scr.2017, 92, 105101.
opent1 A. Sohail, M. Rana, S. Ikram, T. Munir, T. Hussain, R. Ahmed, Chang-shui Yu, Quant. Inf. Proc.2020, 19, 372.
opent2 A. Sohail, R. Ahmed, Chang Shui Yu, T. Munir, Phys. Scr. 2020, 95, 035108.
SigJS S. K. Singh and C. H. Raymond Ooi, J. Opt. Soc. Am. B 2014, 31, 2390-2398
coh A. Mahdifar, W. Vogel, T. Richter, R. Roknizadeh, M. H. Naderi, Phys. Rev. A 2008, 78, 063814.
sq A. Vinante, P. Falferi, Phys. Rev. Lett.2013, 111, 207203.
Sin A. Kundu, S. K. Singh, Int. J. Theor. Phys. 2019, 58, 2418-2427.
cool S. Huang, Aixi Chen, Appl. Sci. 2019, 9(16), 3402.
omit A. Sohail, R. Ahmed, Chang shui Yu, Int. J. Theor. Phys. 2021, 60, 739.
omit1 A. Sohail, Z. Yang, M. Usman, Chang shui Yu, Eur. Phys. J. D 2017, 71, 103.
omit2 Stefan Weis, et. al., Science 2010, 330, 1520.
Sn1 S. K. Singh, M. Asjad, C. H. Raymond Ooi, Quantum Inf Process 2022, 21, 47.
Sn2 S. K. Singh, et. al. Physics Letters A 2022, 442, 128181.
bhatt M. Bhattacharya, P. Meystre, Phys. Rev. Lett. 2007, 99, 153603.
bht M. Bhattacharya, P. L. Giscard, P. Meystre, Phys. Rev. Lett. 2008, 77, 030303.
bhatt1 M. Bhattacharya, P. L. Giscard, P. Meystre, Phys. Rev. A 2008, 77, 013827.
peng J. X. Peng, Z. Chen, Q. Z. Yuan, X. L. Feng, Phys. Rev. A 2019, 99, 043817.
XHYM X. Hao, Y. M. Huang, Y. Wu Phys. Rev. A 2021, 103, 043506.
QingL L. Qinghong, J. Sun, Z. Liu, W. Bao, Int. J. of Theor. Phys. 2022, 61, 150.
peng3 J. X. Peng, Z. Chen, Q. Z. Yuan, X. L. Feng, Phys. Lett. A 2020, 384, 126153.
YXW Y Xu, W Liu, Journal of Lightwave Technology, 2022.
ZAAK Ziauddin, A. A. Khan, A. Yar, M. Abbas, Eur. Phys. J. Plus 2022 137, 1203.
Rao Shi Rao, Y. Huang, Eur. Phys. J. D 2020, 74, 233.
QioP Q. Pan, W. Lv, D. Li, S. Huang, A. Chen, Nanomaterials 2022, 12, 3701.
peng1 Z. Chen, J. X. Peng, J. J. Fu, X. L. Feng, Opt. Express 2019, 27, 029479.
peng2 H. J. Cheng, S. J. Zhou, J. X. Peng, A. Kundu, H. X. Li, L. Jin, X. L. Feng, J. Opt. Soc. Am. B 2021, 38, 285.
Singh S. K. Singh, J. X. Peng, M. Asjad, M. Mazaheri, J. Phys. B: At. Mol. Opt. Phys. 2021, 54, 215502.
FWK F. Wang, K. Shen, J. Xu, New J. Phys. 2023, 24, 123044.
huang S. Huang, Li Deng, Aixi Chen, Ann. Phys. (Berlin)2022, 534, 2200171.
ASRA Amjad Sohail, R. Arif, N. Akhtar, Ziauddin, J. X. Peng, Gao Xianlong, ZhiDong Gu, 2023 arXiv:2301.06979v1
11 C. Santori, et. al., Phys. Rev. Lett. 2006, 97, 247401.
RHC E. X. DeJesus, C. Kaufman, Phys. Rev. A 1987, 35, 5288.
CWSP C. Weedbrook, et. al., Rev. Mod. Phys. 2012, 84, 621.
Adesso Adesso, G., Illuminati, F. J. Phys. A 2007, 40, 7821.
Adesso2 G. Adesso, F. Illuminati. New J. Phys. 2006, 8, 15.
Coffman Coffman, V., Kundu, J., Wootters, W. K. Phys. Rev. A 2000, 61, 052306.
SYC Y. Shen, G. T. Campbell, B. Hage, H. Zou, B.C. Buchler, P. K. Lam , J. Opt. 2013, 15, 044005.
KHG H. Kaviani, R. Ghobadi, B. Behera, M. Wu, A. Hryciw, S. Vo, D. Fattal, P. Barclay, Opt. Express 2020, 28, 15482.
|
http://arxiv.org/abs/2303.07153v1
|
20230313142734
|
SA-CNN: Application to text categorization issues using simulated annealing-based convolutional neural network optimization
|
[
"Zihao Guo",
"Yueying Cao"
] |
cs.LG
|
[
"cs.LG"
] |
SA-CNN: Application to text categorization issues using simulated annealing-based convolutional neural network optimization
1st Zihao GUO†
École Centrale de Nantes
Nantes, France
[email protected]
2nd Yueying CAO
École Centrale de Nantes
Nantes, France
[email protected]
March 30, 2023
===========================================================================================================================================================================================
Convolutional neural networks (CNNs) are a representative class of deep learning algorithms including convolutional computation that perform translation-invariant classification of input data based on their hierarchical architecture. However, classical convolutional neural network learning methods use the steepest descent algorithm for training, and the learning performance is greatly influenced by the initial weight settings of the convolutional and fully connected layers, requiring re-tuning to achieve better performance under different model structures and data. Combining the strengths of the simulated annealing algorithm in global search, we propose applying it to the hyperparameter search process in order to increase the effectiveness of convolutional neural networks (CNNs). In this paper, we introduce SA-CNN neural networks for text classification tasks based on Text-CNN neural networks and implement the simulated annealing algorithm for hyperparameter search. Experiments demonstrate that we can achieve greater classification accuracy than earlier models with manual tuning, and the improvement in time and space for exploration relative to human tuning is substantial.
Simulated Annealing Algorithm; Text Classification; Deep Learning; Self-optimization
§ INTRODUCTION
In recent years, significant breakthroughs have been achieved in the field of convolutional neural networks for text classification, and Yoon Kim<cit.> proposed a straightforward single-layer CNN architecture that can outperform traditional algorithms in a variety of uses. Rie Johnson and Tong Zhang<cit.> applied CNNs to high-dimensional text data and learned with embed small text regions for classification. Tong He and Weilin Huang<cit.> proposed a convolutional neural network that extracts regions and features related to text from image components. This type of model use vectors to characterize each sentence in the text, which are then merged into a matrix and utilized as input for constructing a CNN network model.
Numerous experiments have shown, however, that the performance of neural networks is highly dependent on their architecture<cit.><cit.><cit.>. Due to the discrete nature of these parameters, accurate optimization algorithms cannot be used to resolve the architecture optimization problem<cit.>. Manually tuning the parameters of a model to optimize its performance for different tasks is not only inefficient, but also likely to miss the optimal parameters, resulting in a network architecture that does not achieve maximum performance, which is not advantageous in comparison to traditional classification algorithms<cit.>. In addition, the widely utilized grid search is an enumerative search, i.e., it tries every possibility by performing a cyclic traversal of all candidate parameter choices, which is marked by its high time consumption and limited globalization. Therefore, it is practical to use an algorithm to automatically and fairly rapidly determine the optimal architecture of a neural network.
It has been shown that tuning neural network hyperparameters with metaheuristic algorithms not only simplifies the network<cit.><cit.>, but also enhances its classification performance. In this paper, we use simulated annealing algorithm to optimize the neural network architecture, and we model the neural network hyperparameter optimization problem as a dual-criteria optimization problem of classification accuracy and computational complexity. The resulting network achieves improved classification performance in the text classification task.
§ BACKGROUND AND RELATED WORK
§.§ The current utilisation text classification in neural networks
Text classification was initially done by using knowledge engineering to build an expert system and perform classification, which is a laborious task with limited accuracy. After that, along with the development of statistical learning methods and machine learning disciplines, the classical approach of feature engineering plus shallow classification models developed gradually (Fig.1). During this period, rule-based models: decision trees<cit.>, probability-based models: Nave Bayes classification algorithms<cit.><cit.>, geometry-based models: SVM<cit.>and statistical models: KNN<cit.>, etc. However, these models typically rely heavily on time-consuming feature engineering or large quantities of additional linguistic resources, and are ineffective at learning semantic information about words.
In recent years, research on deep learning that incorporates feature engineering into the process of model fitting has significantly enhanced the performance of text classification tasks. Kim <cit.> explored the use of convolutional neural networks with multiple windows for text classification, a method that has been widely adopted in industry due to its high computational speed and parallelizability. Yang et al <cit.> proposed HAN, a hierarchical attention mechanism network that mitigates the gradient disappearance problem caused by RNNs in neural networks. Johnson and Zhang <cit.> proposed a word-level deep CNN model that improves network performance by increasing network depth without significantly increasing computational burden.
Additionally to convolutional neural networks and recurrent neural networks, numerous researchers have proposed more intricate models in recent years. The capsule networks-based text classification model proposed by Zhao et al <cit.>. outperformed conventional neural networks. Google proposed the BERT model <cit.>, which overcomes the problem that static word vectors cannot solve the problem of a word having multiple meanings. However, the parameters of each of the aforementioned deep learning models have a substantial effect on network performance and must be optimized for optimal network performance.
§.§ Current research status on the simulated annealing method and associated neural network optimization
The Simulated Annealing Technique is a stochastic optimization algorithm based on the Monte Carlo iterative solution approach that was first designed for combinatorial optimization and then adapted for general optimization. Its fundamental concept is based on the significance sampling approach published by Metropolis in 1953, but Kirkpatrick et al.<cit.> did not properly implement it into the field of combinatorial optimization until 1983.
The algorithm for simulated annealing is taken from the process of metal annealing<cit.>, which may be summarized roughly as follows. The simulated annealing technique begins with a high initial temperature, then as the temperature parameter decreases, it searches for the optimal solution among all conceivable possibilities. The SA method has a probability of accepting a solution that is worse than the initial one, i.e. the locally optimal solution can probabilistically jump out and finally converge to the global optimum. This likelihood of accepting a suboptimal answer decreases until the SA approaches the global optimal solution.
The standard optimization process of the simulated annealing algorithm can be described as follows.
SA has been utilized extensively in VLSI<cit.>, production scheduling<cit.>, machine learning<cit.>, signal processing<cit.>, and other domains as a general-purpose stochastic search method. Boltzmann machine<cit.>, the first neural network capable of learning internal expressions and solving complicated combinatorial optimization problems, utilizes the SA principle for optimization precisely, therefore the optimization potential of SA is evident.
RasdiRere et al.<cit.> employed simulated annealing to automatically construct neural networks and alter hyperparameters, and experimental findings revealed that the method could increase the performance of the original CNN, demonstrating the efficacy of this optimization technique. Mousavi et al.<cit.> updated a solar radiation prediction model by integrating artificial neural networks and simulated annealing with temperature cycling to increase ANN calibration performance. Choubin et al.<cit.> utilized the simulated annealing (SA) feature selection approach to find the influential factors of PM modeling based on current air detection machine learning models for the spatial risk assessment of PM10 in Barcelona.
According to the study, however, there is no research on the combination of simulated annealing and neural networks for text categorization tasks. This research conducts tests on neural networks employing simulated annealing to enable automated hyperparameter search, based on the fact that neural networks now generate superior outcomes in text categorization.
§ METHODS
§.§ Convolutional neural networks for text processing tasks (Text-CNN)
Convolutional neural networks (CNN) originated in the field of computer vision; however, with the recent deformation of the CNN input layer, this neural network structure has been steadily transferred to the field of natural language processing, where it is often referred to as Text CNN. The schematic is seen below.
A text statement consists of n words, therefore the text is separated according to words and each word is mapped to the Word Embedding layer as a k-dimensional vector. At this point, for this input model, the text may be regarded as a n× k single-channel picture. During the processing of the convolution layer, the convolution is used to extract the relationships between tuples containing different numbers of words, i.e., to generate new features and obtain different feature maps, when the width of the convolution kernel is equal to the dimension k of the word vector.
The feature map in the form of an n-dimensional vector is then sampled using max-pooling to determine the maximum value, and the data is pooled and utilized as input to the fully connected layer. The softmax function[Eq. (1)] is then employed to convert these probabilities into discrete 0 or 1 class labels in order to solve this classification challenge.
y = softmax(W_1h + b_1)
As demonstrated in Eq. (2), a cross-entropy loss function is frequently utilized for the classification job in model training.
Loss = -∑_i=1^ny_i× log(y_i^')
where y_i is the label value corresponding to the real probability distribution of the i^th sample, y_i^' is the prevalence measure corresponding to the projected probability distribution of the i^th sample, and n is the number of samples in the training set.
The hyperparameter optimization process of the neural network by simulated annealing method is shown below.
§.§ Hyperparametric optimization method based on multi-objective simulated annealing method
In this study, we use the MOSA algorithm proposed by Gülcü and Kuş <cit.> to optimize the hyperparameters of the convolutional neural network in order to find the most suitable parameters quickly and achieve a higher accuracy rate. Similar to the single-objective SA algorithm, we extend the SA algorithm, which only considers the error rate of the network implementation, to consider the two objectives of the number of FLOPs required by the network and the error rate of the network, respectively, and define the stopping criterion of the simulated annealing method as the number of iterations.
§.§.§ Main flow of MOSA algorithm
The MOSA algorithm primarily uses Smith's Pareto dominance rule <cit.> due to complications such as the need for two target values to be on the same scale, followed by the application of decision rules to aggregate the probabilities, and the need to maintain different temperatures due to the different probabilities evaluated for each target. All non-dominated solutions encountered during the search are stored in an external archive, A, when the first iteration begins at the initial temperature. As new solutions are accepted, A is updated (by inserting the new solution X' and removing all solutions dominated by it) and a superior solution is eventually formed as the Pareto frontier. As depicted in the following flowchart, whenever a new solution X' is obtained, X and A are updated based on the dominance relationship between the current solution X, the new solution X', and the solution in the external archive A. This process of re-visiting previously visited archive solutions is known as the return-to-base strategy. In contrast to the single-target SA algorithm, the Δ F calculation used to determine the probability of acceptance is different in this method. For calculation purposes, a single temperature will be maintained regardless of the number of targets.
§.§.§ Setting and calculation of temperature and probability for SA method
First, the initial and finale temperatures. Theoretically, the higher the initial temperature setting, the better, but since the time required for convergence increases correspondingly with the temperature, it is necessary to make a compromise between convergence time and convergence accuracy. To define T_init, we apply a real-time initial temperature selection strategy. In this strategy, rather than using Eq. (3) to calculate the initial probability value for a given initial temperature (where Δ F is the amount of deterioration in the objective function and T_cur is the current temperature).
p_acc=min{1, exp( −Δ F/T_cur )}
We use Eq. (4) to calculate the initial temperature with an initial probability value (where Fave is the average amount of deterioration penalty calculated during short-term "aging"). tfinal is also defined by this method of real-time temperature adjustment)
T_init= −(Δ F_ave/(ln(p_acc)))
§.§.§ Acceptance criteria in searching parameters
In this experiment, the number of iterations is used to define the stopping criterion for the simulated annealing method. The rationale is as follows: if poor early performance is observed on the validation set, the current training process is terminated and the next search round is initiated. This approach has the benefit of introducing noise while decreasing the total running time of the HPO method. In each iteration of the simulated annealing method, the newly generated configuration is trained on the training set of the original training set and evaluated on the validation set (i.e., the test split of the original training set).
We apply the Xavier weight initial value setting term, a learning rate of 0.001, the Rmsprop optimizer, and a batch size of 32.
§.§.§ Optimization of the Simulated Annealing method
Starting with the initial solution I and initial temperature T_init, the iterative process “generate a new solution → calculate the objective function difference → accept or reject" is repeated for the current solution and temperature. T_cur is gradually decayed, and if the optimal error rate achieved on the validation set does not improve after three consecutive calendar hours, the training procedure is terminated, indicating that the current solution is the approximate optimal solution, i.e. the optimal state of the network has been reached.
§ EXPERIMENTS AND RESULTS
§.§ Introduction to the experimental data set
This experiment utilized two short text categorization datasets, the MR dataset and the TREC dataset. MR is a dataset for the sentiment analysis of movie reviews, with each sample classified as positive sentiment or negative sentiment. The CR dataset consists of reviews of five electronic products, and these sentences have been manually tagged with the sentiment of the reviews. TREC is a question classification dataset in which each data point represents a question description, and the job entails categorizing a question into six question kinds, including person, place, numerical information, abbreviation, description, and entity.
The table displays the statistical information of the three data sets.
Several samples from each of the two datasets are provided below.
* It's a square, sentimental drama that satisfies, as comfort food often can. [MR Dataset, tags: positive].
* The sort of movie that gives tastelessness a bad rap. [MR Dataset, tags: negative].
* this camera is so easy to use ! [CR Dataset, tags: positive].
* the sound level is also not as high as i would have expected . [CR Dataset, tags: negative].
* What is Australia's national flower? [TREC Dataset, tags: place]
* Who was the first man to fly across the Pacific Ocean? [TREC Dataset, tags: person]
§.§ Introduction to the comparison model
Comparing the model in the article to the experimental model in Kim's<cit.> study for experimentation.
* CNN-rand: All word vectors are initialized at random before being utilized as optimization parameters during training.
* CNN-static: All word vectors are directly acquired with the Word2Vec tool and are fixed.
* CNN-multichannel: A mix of CNN-static and CNN-non-static, i.e. two types of inputs.
* DCNN<cit.>: Dynamic Convolutional Neural Network with k-max pooling.
* MV-RNN<cit.>: Matrix-Vector Recursive Neural Network with parse trees.
§.§ SA-CNN parameter setting
§.§.§ Parameter setting of MOSA
In this research, we employed the identical parameter settings for the simulated annealing approach as Gülcü and Kuş<cit.>, set the starting initial probability value to 0.5, and derived T_init≈ 0.577 and T_finial≈ 0.12 in a similar fashion. The link between the number of exterior and internal iterations estimated for different cooling rate values is depicted in the table.2.
The number of outer iterations defines the number of search networks, whereas the number of inner iterations determines the number of single network training iterations. As the cooling rate, we chose 0.95, where the number of external cycles is greater than the number of internal cycles, to ensure that as many network structures as possible are searched for and to avoid repeated training of a single network structure as much as possible, thereby avoiding becoming trapped in a local optimal solution of network selection.
§.§.§ Search range of neural network hyperparameters
In this study, we utilize a 300-dimensional word2vec trained by Mikolov<cit.> as the initial representation and continually update the word vector during the training process, similar to Kim's<cit.> approach. In this paper, the empirical range of hyperparameters to be tuned in the network is provided so that the simulated annealing technique can search for a new solution from the existing one. Expanding the range of searchable hyperparameters may result in improved experimental outcomes, provided computational resources permit.
* Conv:
* kernelCount: [32, 64, 96, 100, 128, 160, 256]
* dropoutRate: [0.1, 0.2, 0.3, 0.4, 0.5]
* fullyConnected:
* unitCount: [16, 32, 64, 128, 256, 512]
* dropoutRate: [0.1, 0.2, 0.3, 0.4, 0.5]
* learningProcess:
* activation: [relu, leaky_relu, elu, tanh, linear]
* learningRate: [0.0001, 0.001, 0.01, 0.0002, 0.0005, 0.0008, 0.002, 0.004, 0.005, 0.008]
* batchSize: [64, 128, 256]
* seedNumber: 40
* ratioInit: 0.9
§.§ Experimental results and discussion
§.§.§ Comparison of model accuracy results
The following table shows the accuracy of different CNN models for text classification tasks on MR, CR and TREC datasets.
As shown in the table.3, on the MR and CR datasets, the model presented in this paper outperformed other neural network structures, leading the authors to conclude that, due to a lack of computational resources, the parameter search range was restricted and the optimal network was not found. Nevertheless, the performance of the convolutional neural network was utilized, and on the TREC dataset, the model SA-CNN achieved the highest accuracy rate. Under the assumption of using the same model structure, the experimental results demonstrate that using the simulated annealing algorithm to find the optimal hyperparameters not only reduces the tediousness of manual parameter tuning, but also yields better parameters than manual tuning if the search range is correct, thereby achieving a high test accuracy.
§.§.§ Discussion of experimental results
In order to comprehend the characteristics of the ideal hyperparameters discovered by the simulated annealing technique, the following tables list the top 3 optimal hyperparameters sought by the algorithm in the TREC dataset.
Compared to manual tuning, the simulated annealing algorithm may search for hyperparameter combinations that one would not ordinarily consider; for instance, the number of CNN convolutional kernels for the Top1 model on the TREC dataset is 100, 64, and 32 for three different strings, which is a combination that one would not ordinarily consider. Therefore, by utilizing the simulated annealing process to optimize the neural network's hyperparameters, it is theoretically possible to acquire hyperparameter combinations that have not been considered or disregarded based on prior experience, and so achieve improved performance.
§ CONCLUSION
In this article, we proposed a machine learning method combining simulated annealing and convolutional neural networks. The main goal is to adjust the hyperparameters of neural networks using simulated annealing in order to prevent manual tuning parameters into local optima, thus failing to enhance neural network performance. The experimental results demonstrate that the method of implementing simulated annealing to tune the hyperparameters of a neural network is effective in overcoming the constraints of manual parameter tuning, is practical, and can be theoretically applied to additional natural language processing problems. Due to the limited resource space and the different cooling rate for defining the initialization, which may result in different time costs and architecture, the final solution may only be an approximate optimal solution, and this approximation may differ. Consequently, the simulated annealing method may be integrated with other algorithms or the multi-objective simulated annealing algorithm may be further optimized, thereby further enhancing the efficiency of the simulated annealing algorithm on neural network optimization.
unsrt
|
http://arxiv.org/abs/2303.06962v1
|
20230313100446
|
Near-Field Beam Training of Intelligent Reflecting Surface: A Novel Two-Layer Codebook
|
[
"Tao Wang",
"Jie Lv",
"Haonan Tong",
"Changchuan Yin"
] |
cs.IT
|
[
"cs.IT",
"eess.SP",
"math.IT"
] |
Near-Field Beam Training of Intelligent Reflecting Surface: A Novel Two-Layer Codebook
Tao Wanghttps://orcid.org/0000-0002-8695-5400
< g r a p h i c s >
,
Jie Lvhttps://orcid.org/0000-0001-9028-6986
< g r a p h i c s >
,
Haonan Tonghttps://orcid.org/0000-0002-1835-4769
< g r a p h i c s >
, and
Changchuan Yinhttps://orcid.org/0000-0001-8969-1431
< g r a p h i c s >
, Senior Member IEEE
The authors are with the School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China. (e-mail: [email protected]; [email protected]).
March 30, 2023
=================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================
empty
empty
This paper investigates the codebook based near-field beam training of Intelligent Reflecting Surface (IRS). In the considered model, near-field beam training should be performed to focus the signals at the location of user equipment (UE) to obtain the prominent IRS array gain. However, existing codebook schemes can not realize low training overhead and high receiving power, simultaneously.
To tackle this issue, a novel two-layer codebook is proposed. Specifically, the layer-1 codebook is designed based on the omnidirectivity of random-phase beam pattern, which estimates the UE distance with training overhead equivalent to that of a DFT codeword. Then, based on the estimated distance of UE, the layer-2 codebook is generated to scan the candidate locations of UE, and finally obtain the optimal codeword for IRS beamforming. Numerical results show that, compared with the benchmarks, the proposed codebook scheme makes more accurate estimation of UE distances and angles, achieving higher date rate, yet with a smaller training overhead.
Intelligent Reflecting Surface, near-field beam training, codebook design.
§ INTRODUCTION
[lines=2]INTELLIGENT Reflecting Surface (IRS) is expected to be one of the key technologies of the next-generation wireless networks, with the great potential of modifying the wireless channel in a cost-effective and energy-efficient way<cit.>. Owing to its nature in terms of signal reflection, IRS requires a large-scale implementation to capture enough amount of energy and achieve a significant beamforming gain<cit.>. For this reason, it has been proposed to deploy extremely large-scale IRS to enhance the wireless communications <cit.>. However, the application of large-scale IRS results in a large Rayleigh distance R_ tra[R_ tra = 2D^2/λ, where D, λ represent the size of IRS, and the carrier wavelength, respectively.], which makes the user equipment (UE) locate in the near-field region of IRS.
This trend has been elaborated in our previous work <cit.>, which reveals that the near-field situations will be common in IRS assisted wireless systems.
The beam training design in near-field situations has new challenges, including the deterioration of the training accuracy and the drastic increase of the training overhead, which have been addressed in the literature<cit.>. Specifically, the near-field channel is studied in <cit.> where a polar-domain (angle plus distance) channel model is proposed, showing that near-field beamforming should focus the transmitted signals at the location of UE. By contrast, traditional far-field beamforming, e.g., DFT codebook based beamforming, only tries to match the angle of UE, thus causing significant decrease of the training accuracy in the near-field situations of IRS.
To address this issue, our previous work in <cit.> intuitively adds a distance-domain beam training after the DFT codebook based beam training, which outperforms the DFT codebook scheme. Besides, a polar-domain codebook dedicated to the near-field channel is proposed in <cit.>, wherein the polar-domain channel space is properly sampled based on compressed sensing theory, and the exhaustive beam search strategy in adopted. To further reduce the prohibitively beam training overhead of <cit.>, a two-phase beam training method is proposed in <cit.>, wherein the candidate angles of UE are obtained from the DFT-codebook based beam searching in the first phase, then a shortlisted polar-domain codewords of <cit.> is adopted to estimated the UE distance in the second phase.
However, we find that the near-field beam patterns under far-field beamforming get broadened in the very near-field region, which is named the beam broadening effect in this paper. In this case, the accuracy of DFT-codebook based angle estimation can not be guaranteed, causing performance deterioration of the current near-field IRS codebook schemes <cit.>.
Motivated by above, we propose a novel two-layer codebook to realize both low training overhead and high IRS array gain. The key contributions are summarized as follows.
* Based on the considered model of IRS-assisted near-field wireless system, the problem caused by using far-field beamforming in the near-field region is elaborated.
* To realize both low training overhead and high IRS array gain, a novel two-layer codebook scheme is proposed. Specifically, the layer-1 codebook is composed of several independent random-phase vectors, which are performed to generate an omnidirectional IRS beam for the estimation of UE distance. Then, the layer-2 codebook is generated based on the estimated distance of UE in the first layer, which searches the candidate locations of UE and finally obtains the optimal
codeword for IRS beamforming.
* Numerical results show that, compared to the benchmarks, the proposed codebook makes more accurate estimations of the distances and angles of UE, achieving higher data rate, yet with a smaller training overhead.
The rest of this paper is organized as follows. The system model is illustrated in Section II.
In Section III, based on the observation of the the near-field beam patterns, a novel two-layer IRS codebook is proposed and analyzed theoretically. Extensive numerical results are given in Section IV. Finally, conclusions are drawn in Section V.
§ SYSTEM MODEL AND RELATED CONCEPTS
As shown in Fig. <ref>, we consider the downlink beam training of an IRS-assisted narrow-band wireless system, where an M-antenna base station (BS) serves a single-antenna UE with the aid of an N-element uniform linear array (ULA) IRS[The ULA IRS is adopted for ease of analysis. However, by using random-phase vectors for the layer-1 codebook and considering the spatial angles of two-dimensional DFT codebook for layer-2 codebook, see Section III, the proposed scheme can be readily extended to UPA IRS.] of λ/2 spacing. The UE is located in the near-field region of the IRS. Due to the occlusion, it is assumed that only the BS-IRS-UE link is viable.
Without loss of generality, the IRS is placed on the x-axis with its center on the origin. The coordinate of the n-th IRS element is given by ((n-N+1/2)λ/2, 0), where N is assumed even.
The coordinate of UE is given by (dsinθ, dcosθ), where θ and d denote the angle and distance of UE with reference to the origin. The distance between the n-th IRS element and UE, denoted by d_n, is derived as
d_n(θ, d) = √((dsinθ-(n-N+1/2)λ/2)^2+(dcosθ)^2).
§.§ Signal Model
The incident signals at IRS are denoted by f = [ a_1e^jω_1, a_2e^jω_2, ⋯, a_Ne^jω_N]^Ts, where a_n, ω_n denote the amplitude and phase of the incident signal at the n-th IRS element. s denotes the unit modulus transmitted signal. Considering the fixed and known deployment of BS and IRS, the BS-IRS channel, e.g., the geometry based channel model, is assumed fixed and known. So given the precoding vector of BS, e.g., the angle-domain precoding, f is known[For other BS-IRS channel settings, the design of the BS precoding during IRS beam training is an interesting topic, but left for our future work.].
Now, the received signal of UE can be represented as
y = hΦf+z,
where z ∼𝒞𝒩(0, σ^2) denotes the received noise. Φ=diag( e^jφ_1, ⋯, e^jφ_N) denotes the adjustable phase shifts introduced by the IRS. h∈ℂ^1× N denotes the near-field IRS-UE channel, which is modeled as <cit.>
[h]_n = √(G^ U A^ U G^ I/4π d_n^2)e^j2π d_n/λ,
where G^ U, A^ U, G^ I denote the receiving gain of UE antenna, the effective aperture of UE antenna, and the reflecting gain of IRS elements, respectively.
Substituting (<ref>) into (<ref>),
the received signal power is represented as
P_ r = |∑_n=1^N√(G^ U A^ U G^ I/4π d_n^2)a_ne^j(φ_n+ω_n+2π d_n/λ)|^2.
The achievable rate is given by
R = log_2(1+P_r/σ^2).
§.§ Near-Field and Far-Field IRS Beamforming
The near-field IRS beamforming should be performed as <cit.>
φ^near_n(θ,d) = -(ω_n + 2π d_n/λ), n = 1, ⋯, N,
so that the in-phase superposition of signals from all IRS elements is achieved at the location of UE. Since ω_n is known, the optimal Φ is only determined by d_n. Therefore, according to (<ref>), the location of UE should be obtained to perform the optimal near-field IRS beamforming.
By contrast, the far-field IRS beamforming is performed as
φ^far_n(θ) = -ω_n-π(n-1)sinθ, n = 1, ⋯, N.
Comparing (<ref>) and (<ref>), it is observed that the far-field beamforming induces phase errors, which inevitably leads to the decrease of the IRS array gain.
§ PROPOSED TWO-LAYER NEAR-FIELD IRS CODEBOOK
In this section, based on the observation of the near-field beam patterns, we propose a novel two-layer IRS codebook.
definitionDefinition
The near-field beam pattern is defined as the normalized signal power measured on the circle around the IRS center, where the radius of the circle equals the UE distance d.
Similar to the derivation of (<ref>), the normalized near-field beam pattern is represented as
P_ pat(φ_n,θ^') = |∑_n=1^N√(G^ U A^ U G^ I/4π d_n^'2)a_n e^j(φ_n+ω_n+2π d_n^'/λ)|^2/|∑_n=1^N√(G^ U A^ U G^ I/4π d_n^'2)a_n|^2
= |∑_n=1^N1/d_n^'
e^j(φ_n+ω_n+2π d_n^'/λ)|^2/|∑_n=1^N1/d_n^'|^2,
where a_n are assumed the same without loss of generality. θ^' denotes the angle of the measurement point, d^'_n(θ^', d) denotes the distance between the n-th IRS element and the measurement point.
The near-field beam patterns under near-field and far-field beamforming can be obtained by substituting the φ_n in (<ref>) with φ^near_n(θ,d) and φ^far_n(θ), respectively, which are shown in Fig. <ref> with θ = 0^∘, 20^∘, 40^∘, 60^∘ and d = 6 m, under the system setup with D = 1.28m, N = 256, and λ = 0.01m.
Observation 1 (beam broadening effect). In Fig. <ref>, the near-field beam patterns under far-field beamforming get broadened and lose the single peak characteristic, which is called the beam broadening effect in this paper. In this case, the accuracy of the angle estimation under far-field beam sweeping<cit.> can not be guaranteed, resulting in performance degradation, as shown in the numerical results of this paper.
By contrast, the near-field beam patterns under near-field beamforming maintain the single peak characteristic, which means that if the UE distance d is provided, the UE angle θ can be accurately estimated through the near-field beam sweeping.
Inspired by this observation, a novel codebook based two-layer beam training scheme is proposed to estimate d and θ, successively.
To estimate d, we make the following approximation of equation (<ref>),
[h]_n≈√(G^ U A^ U G^ I/4π d^2)_be^j2π d_n/λ,
where d_n, n = 1, ⋯, N are approximated as d to calculate the amplitude whose abbreviation is b.
To determine when this approximation holds, we compute the distance differential from the IRS elements to UE between the center and the edge of the IRS. For the sake of argument, suppose θ = 0, however the analysis can be generalized to arbitrary UE angles. With the equal-distance approximation in (<ref>), the signal from each IRS element travels the same distance, d, to UE. But actually at the edge of the IRS it has traveled the distance √(d^2 + D^2/4). The error ratio of the approximation is d-√(d^2 + D^2/4)/√(d^2 + D^2/4).
The trend of the error ratio is shown in Fig. 3. It can be seen that the error caused by the equal-distance approximation are relatively small. With e.g., D = 1.5 m, d = 5 m, this is about 1.14% and should have a minor impact.
With (<ref>), the equation (<ref>) can be approximated as
P_ r≈ b^2 |∑_n=1^Na_ne^j(φ_n+ω_n+2π d_n/λ)|^2.
§.§ Layer-1 Codebook
The proposed layer-1 codebook consists of C random-phase IRS beamforming vectors, denoted as
[ e^jμ_c,1, e^jμ_c,2, ⋯,e^jμ_c,N], c = 1,⋯,C,
where μ_c,ni.i.d∼U(0,2π), ∀ n∈{1, 2, ⋯, N}, c ∈{1, 2, ⋯, C}.
Those C beamforming vectors are designed to perform within the tine period of one traditional codeword, e.g., a DFT
codeword, to generate a cumulative omnidirectional beam. According to (<ref>), the average received signal power is
P_ r = 1/C∑_c=1^Cb^2|∑_n=1^Na_ne^j(μ_c,n+ω_n+2π d_n/λ^ζ_c,n)|^2_Q_c,
where Q_c denotes the received signal power under the c-th codeword. ζ_c,n denotes the phase of the received signal from the n-th IRS element under the c-th codeword.
lemmaLemma[]
For any UE location (θ, d), when C→+∞,
P_ r∼𝒩(b^2∑_n=1^Na_n^2, ∑_1≤ i < j≤ N 2a_i^2a_j^2b^4/C),
and the unbiased estimation of d is
d̂ = √(G^ U A^ UG^ I∑_n=1^Na_n^2/4πP_ r).
For a specific (θ, d), d_n and ω_n are fixed because of the fixed deployment of BS and IRS. According to (<ref>),
Q_c/b^2 = |∑_n=1^N a_ne^jζ_c,n|^2
= |∑_n=1^Na_n(cosζ_c,n +isinζ_c,n)|^2
= (∑_n=1^Na_ncosζ_c,n)^2 +(∑_n=1^Na_nsinζ_c,n)^2
= ∑_n=1^Na_n^2+
2(∑_1≤ i < j≤ N a_ia_jcos(ζ_c,i-ζ_c,j)_N(N-1)/2 items).
Since μ_c,ni.i.d∼U(0,2π), we have ζ_c,ni.i.d∼U(0,2π), and ζ_c,i-ζ_c,ji.i.d∼U(0,2π), i≠ j. Therefore, cos(ζ_c,i-ζ_c,j), ∀ 1≤ i < j≤ N, c ∈{1, 2, ⋯, C} are independent and identically distributed, with mean 0 and variance 0.5. So the mean and variance of Q_c are b^2∑_n=1^Na_n^2 and b^4∑_1≤ i < j≤ N 2a_i^2a_j^2, respectively.
Therefore when C→+∞, (<ref>) can be obtained based on the central limit law, thus proving the beam omnidirectivity of the proposed layer-1 codebook. The unbiased estimation of l can be derived as (<ref>) by substituting (<ref>) into (<ref>).
Similar to (<ref>), the near-field beam patterns generated by the layer-1 codebook is represented as
P_ pat(μ_c,n,θ^') =
1/C∑_c=1^C|∑_n=1^N1/d_n^'
e^j(μ_c,n+ω_n+2π d_n^'/λ)|^2/|∑_n=1^N1/d_n^'|^2,
which is shown in Fig. <ref> with C = 100, 500, 2000, respectively. The setup is the same as that in Fig. <ref> with D = 1.28m, N = 256, and λ = 0.01m. The theoretical random-phase beam pattern for C→+∞ is also shown. Fig. <ref> shows that as C increases, the mean value of the beam patterns remains the same, while the fluctuation of the beam patterns diminishes, which is in accordance with the conclusion in equation (<ref>).
remarkRemark
In practice, The C beamforming vectors in layer-1 codebook can be pre-stored in the IRS controller, e.g., Field Programmable Gate Array (FPGA) controller, and performed within the time period of one traditional codeword, e.g., a DFT codeword, by means of phase switching at nanosecond level <cit.>. So the training overhead of layer-1 codebook is equivalent to that of only one DFT beam scan. Then, UE measures the average received power during this period for the distance estimation of (<ref>). Equation
(<ref>) shows the variance of P_ r is inversely proportional to C, therefore, C can be increased to enhance the omnidirectivity of the random-phase IRS beam and improve the accuracy of d̂.
§.§ Layer-2 Codebook
The layer-2 codebook is designed to search for the UE angle based on the estimated UE distance, d̂, in the first layer. According to the compressed sensing based analysis in <cit.>, the spatial angles corresponding to the DFT codebook are adopted as the candidate UE angles, which are represented as
θ_m = arcsin2m-N-1/N, m = 1, 2, …, N.
The candidate UE locations are denoted as (θ_m, d̂), m = 1, 2, …, N. The layer-2 codebook composed of N codewords is generated by substituting (θ_m, d̂) into (<ref>), and (<ref>) into (<ref>), which are finally represented as
[ e^-j(ω_1 + 2π d_1(θ_m,d̂)/λ), ⋯,e^-j(ω_N + 2π d_n(θ_m,d̂)/λ)],m = 1, …, N.
The N layer-2 codewords should be performed one by one to generate N beams with focus on the N candidate UE locations, respectively. Then, UE measures the received power of each beam and reports the beam index corresponding to the maximal received power, which indicates the estimated UE location and the optimal IRS codeword. The procedure of the proposed two-layer beam training scheme are summarized in Algorithm <ref>.
Since only 1 omnidirectional IRS beam is generated by layer-1 codebook, and N beams are generated by layer-2 codebook, the overall training overhead of the proposed codebook is given by T^(pro) = 1+N, which is only 1 more than that of the DFT codebook, T^(DFT) = N.
Besides, it is obvious that T^(pro) is much smaller than the training overhead of the exhaustive-search based polar-domain codebook<cit.>, T^(ex) = NS, and that of the two-phase codebook<cit.>, T^(2P) = N+KS, where S and K denote the number of the candidate UE distances, and the number of the shortlisted candidate UE angles, respectively. To further reduce the overhead of the proposed layer-2 codebook, multi-beam and hierarchical strategy <cit.> can be adopted, which is left for our future work.
§ NUMERICAL RESULTS
We conduct a Monte-Carlo simulation, where the channel model in Section II-A is adopted, whose parameters are shown in Table <ref>. The reference SNR of the IRS assisted system is defined as SNR = N a^2 A^ U/4π d^2 σ^2, where a_n^2, n = 1, 2, …, N are assumed the same and denoted as a, and the noise power is set as -94 dBm (corresponding to the bandwidth of 100 MHz). The achievable rate is given by equation (<ref>). Besides, the number of the independent channel realizations for each result point is set as 1000. Four benchmark schemes are adopted: 1) perfect-CSI based beamforming, which gives the upper bound of rate performance; 2) exhaustive search based polar-domain codebook with S = 8 <cit.>; 3) two-phase codebook with K = 3, S = 8 <cit.>; 4) DFT codebook.
Figs. 5-7 show the effects of SNR on the distance estimation error, the angle estimation error, and the achievable rate, where d = 4 m and θ randomly distributed in [-60^∘, 60^∘) are adopted. Several observations are made as follows. First, compared with the polar-domain codebook in <cit.> and the two-phase codebook in <cit.>, the proposed codebook brings the least estimation errors of the UE distance and angle, thus achieving better performance in terms of the achievable rate. Second, the training overhead of the proposed codebook is obviously smaller than that of <cit.> and <cit.>, (i.e., 201 versus 1600 and 224). Moreover, it is observed that the proposed codebook significant outperforms the DFT codebook under different SNRs, yet with similar training overhead, (i.e., 201 versus 200). Besides, the distance estimation error decreases as C increases, which is in accordance with the conclusion in equation (<ref>).
In addition, it can be seen that the distance estimation error of the proposed codebook rises in the very low SNR regime, causing certain performance degradation. This problem can be readily solved by increasing the transmitted signal power or the training overhead of the proposed layer-1 codebook, (e.g., increasing the training overhead from 1 to 10 brings 10 dB increase of the average received signal power).
We finally show the effects of UE distance d on the distance estimation error, the angle estimation error, and the achievable rate in Figs. 8-10, where a = 0.05 mW and θ randomly distributed in [-60^∘, 60^∘) are adopted.
First in the short range (i.e., 1-10 m), it is observed that the proposed codebook makes accurate estimation of UE distance and angle, while the polar-domain codebook and the two-phase codebook schemes bring significant estimation errors, which is due to the beam broadening effect in the near-field region, thus causing obvious decrease in terms the achievable rate in this range.
Second in the long range (i.e., 10-60 m), on one hand, the distance estimation error of the proposed codebook increases with the UE distance, which is due to the decrease of SNR. On the other hand, the distance estimation error of the polar-domain codebook and the two-phase codebook increase quiet sharply, which is because that the number of distance samples is limited and with the non-uniform distance sampling method, the distance estimation is always +∞ in the long-distance range.
Moreover, the performance of the proposed codebook outperforms those of the benchmarks and is very close to the perfect CSI beamforming under different UE distances, which is due to the limited angle-domain sample step and the existence of noise.
Last, the achievable rates of all codebook schemes monotonically decrease with the user distance due to the more severe path-loss and all the schemes achieve the same rate performance when UE distance is sufficiently large to meet the far-field assumption.
§ CONCLUSION
In this paper, to achieve an IRS near-field beam training with both low overhead and high achievable rate across the near-field region, we propose a novel two-layer codebook scheme. The proposed codebook is inspired from the characteristics of the near-field beam patterns under near-field/far-field/random-phase beamforming, which can efficiently estimate the distance and angle of UE.
The effectiveness and overhead of the proposed codebook are analyzed to demonstrate its superiority over the benchmarks. Numerical results show that, compared with the benchmarks, the proposed codebook makes more accurate estimation of the UE distances and angles, realizing achievable rate close to the upper bound across the near-field region, yet with a smaller training overhead.
IEEEbib
|
http://arxiv.org/abs/2303.06928v1
|
20230313084615
|
$S_8$ increases with effective redshift in $Λ$CDM cosmology
|
[
"Shahnawaz A. Adil",
"Özgür Akarsu",
"Mohammad Malekjani",
"Eoin Ó Colgáin",
"Saeed Pourojaghi",
"Anjan A. Sen",
"M. M. Sheikh-Jabbari"
] |
astro-ph.CO
|
[
"astro-ph.CO",
"hep-ph",
"hep-th"
] |
-1.1ex>∼
w_eff
0̋HH 00
ΛCDM
Department of Physics, Jamia Millia Islamia, New Delhi - 110025, IndiaDepartment of Physics, Istanbul Technical University, Maslak 34469 Istanbul, TurkeyDepartment of Physics, Bu-Ali Sina University, Hamedan 65178, IranAtlantic Technological University, Ash Lane, Sligo, IrelandSchool of Physics, Institute for Research in Fundamental Sciences (IPM), P.O.Box 19395-5531, Tehran, Iran
School of Physics, Institute for Research in Fundamental Sciences (IPM), P.O.Box 19395-5531, Tehran, IranCentre for Theoretical Physics, Jamia Millia Islamia, New Delhi - 110025, India
Hubble constant H_0 and weighted amplitude of matter fluctuations S_8 determinations are biased to higher and lower values, respectively, in the late Universe with respect to early Universe values inferred by the Planck collaboration within flat ΛCDM cosmology. If these anomalies are physical, i.e. not due to systematics, they naively suggest that H_0 decreases and S_8 increases with effective redshift. Here, on the assumption that matter density parameter today Ω_m is a constant, we show that S_8 determinations from f σ_8(z) constraints increase with effective redshift, thereby providing corroborating support for an S_8 discrepancy that is physical in origin. Results here and elsewhere suggest that the ΛCDM cosmological parameters are redshift dependent. Fitting parameters that evolve with redshift is a recognisable hallmark of model breakdown.
S_8 increases with effective redshift in ΛCDM cosmology
A. A. Sen
March 30, 2023
=======================================================
§ INTRODUCTION
Modern cosmology is a pursuit where one theoretically guesses a function (or model) and compares it to another a priori unknown function, the Hubble parameter H(z), extracted observationally from Nature. Given the possibilities, the guess is invariably wrong, but existing cosmological data can mask disagreement until precision improves. Viewed historically, concordance Lambda cold dark matter (ΛCDM) cosmology emerged when a spatially flat, homogeneous & isotropic Universe, filled exclusively with radiation and (pressure-less) matter, required a dark energy sector to explain observations <cit.>. Further improvements in data in recent years have unveiled anomalies in the Hubble constant H_0 := H(z=0) <cit.>, the weighted amplitude of matter fluctuations S_8 := σ_8 √(Ω_m/0.3) <cit.>, the lensing parameter A_lens and/or curvature Ω_k <cit.>, the late-time integrated Sachs-Wolfe (ISW) effect <cit.>, and high redshift galaxies that seemingly defy ΛCDM expectations <cit.>. See <cit.> for reviews of ΛCDM anomalies. It is plausible that the (flat) ΛCDM cosmological model is breaking down. What remains is to confirm this diagnosis.
To that end, a simple insight comes directly to us from the Friedmann equations; H_0 is by construction an integration constant. In other words, it is theoretically a constant within the Friedmann-Lemaître-Robertson-Walker (FLRW) framework on which ΛCDM is established by assuming spatial flatness. Nevertheless, it is observationally a constant only when one has the correct cosmological model <cit.>. This statement is true not only for H_0, but also for other model parameters that are integration constants, such as matter density parameter (today) Ω_m:=ρ_m0/3H_0^2 (ρ_m0 being the matter energy density today) in the ΛCDM model. Thus, if the ΛCDM model is breaking down, as all cosmological models must at some precision for the reason outlined above, one expects H_0, Ω_m, etc, to evolve with effective redshift. There are now numerous observations suggesting that H_0 evolves, more accurately decreases with effective redshift <cit.> (see also <cit.>). Likewise there are claims of Ω_m increasing with effective redshift <cit.> (see also
<cit.>). Furthermore, it has been noted in <cit.> that evolution of H_0 and Ω_m within ΛCDM are anti-correlated with each other. Note that if Ω_m evolves with effective redshift, it is unlikely that S_8 is a constant, because σ_8 conspiring to balance evolution in Ω_m represents a contrived scenario.
Here we focus on the S_8 discrepancy <cit.>. Taken at face value, this anomaly says that S_8 as inferred by Planck collaboration (high redshift inference) has a larger value than the one from galaxy surveys (low redshift measurement).
This can be independently verified with growth rate data, in particular measurements of f σ_8 (z), which are independent of galaxy bias. Concretely, we will assume expressions that are valid for ΛCDM cosmology and fit f σ_8 (z) constraints in bins of varying effective redshift. However, since growth rate data suffers from large fractional errors, we will leverage a working assumption in modern cosmology that Ω_m is a constant to elucidate the trend. This means that the increases observed in S_8 are driven by increases in σ_8. Interestingly, this effect is also evident when one compares low redshift σ_8 constraints from clusters with high redshift σ_8 constraints from Lyman-α data <cit.>. Admittedly, Ω_m may not be a constant <cit.>, but this is currently a fringe viewpoint. Our goal in this letter is to explore evolution of S_8
within ΛCDM in the late Universe under standard assumptions.
§ WARM UP
To get oriented, we impose a Gaussian prior, Ω_m = 0.3111 ± 0.0056, which arises from combining Cosmic Microwave Background (CMB), galaxy, quasar and Lyman-α baryon acoustic oscillation (BAO) constraints <cit.>. The CMB+BAO prior is needed to compensate for the relatively low quality of the growth rate data, which is further reduced through binning. Compared to Planck <cit.>, it is marginally more constraining, but remains representative of a Planck prior. In the absence of Gaussian priors, we employ generous uniform priors Ω_m ∼𝒰 (0, 1.5), in addition to σ_8 ∼𝒰(0, 3) throughout.
We combine this prior with 20 measurements of f σ_8 (z) from peculiar velocity and redshift-space distortion (RSD) data <cit.>, as compiled recently in <cit.>. We illustrate the constraints in Fig. <ref>
in red. We will be interested in the combination
S_8 := σ_8√(Ω_m/0.3),
where the constant σ_8 is the amplitude of mass fluctuations in spheres of 8 h^-1 Mpc with h:=H_0/100 km s^-1 Mpc^-1. Following <cit.>, we introduce the matter density parameter
Ω(z) := Ω_m (1+z)^3/1- Ω_m + Ω_m (1+z)^3,
thereby allowing us to obtain
f σ_8 (z) = σ_8 Ω^6/11(z) exp( - ∫_0^zΩ^6/11(z^')/1+z^' z^').
As explained in <cit.>, these expressions are valid for ΛCDM and represent a good approximation to the growth of large scale structure in the linear regime. For all redshifts z, the function Ω(z) is bounded Ω_m≤Ω (z) <1. In particular, Ω→ 1 as z →∞, so that Ω_m dependence drops out as an overall factor in (<ref>) at high redshifts, but some knowledge of Ω_m is retained through the integral.
The green curve in Fig. <ref> denotes the best fit of the ΛCDM model to the 20 data points, whereas the blue curve documents the effect of introducing the Gaussian prior on Ω_m. It is worth noting that this increases the S_8 inference and visibly worsens the fit to the f σ_8 (z) constraints at z ≈ 0 and z ≈ 1.5, thereby underscoring the tension between the Ω_m prior and the lower value of Ω_m preferred by f σ_8 (z) data. The blue curve worsens the fit to f σ_8 (z) data by Δχ^2 ≈ 4.9. The f σ_8 (z) constraints are weak while the Gaussian prior is strong. Therefore, the prior effectively fixes Ω_m, so that the only parameter being fitted is σ_8. As is clear from (<ref>), one is simply fitting the scale of the f σ_8(z) function, whereas the functional form is fixed. In Fig. <ref> we see the effect of removing f σ_8 (z) constraints below z = z_min. We see that with Ω_m constrained through the prior, σ_8 increases leading to larger values of S_8. As S_8 increases, the curves visibly provide a better fit to high redshift f σ_8 (z) constraints. This increase in S_8 is driven by the two high redshift data points and is expected, even without performing data analysis.
We next split the f σ_8(z) data at z= 0.7 into a low redshift sample of 14 data points and a high redshift sample of 6 data points. This choice is arbitrary, but it is guided by Fig. <ref> and the intuition that evolution in S_8 is expected once we see evolution in H_0 <cit.> and Ω_m <cit.> elsewhere. We impose the Gaussian prior on Ω_m to each sample and perform a Markov Chain Monte Carlo (MCMC) analysis. The result is shown in Fig. <ref>, where in line with expectations from Fig. <ref>, the contours separate in the σ_8 or S_8 direction. The contours are Gaussian, allowing us to directly compare S_8 = 0.752 ± 0.015(z < 0.7) to S_8 = 0.841 ± 0.036(z ≥ 0.7) and conclude that the discrepancy in S_8 is 2.3 σ.
§ LARGER DATA SET
Given that the increase in S_8 is driven exclusively by two high redshift data points, it is prudent to work with a larger data set. To that end, we focus on Table II of <cit.>, where one finds 63 historical measurements of f σ_8(z) <cit.>. We add more recent data from <cit.> to increase the sample to 66 data points. We observe that Refs. <cit.> are common to both data sets in Fig. <ref> and Fig. <ref>. The other data points are the work of independent groups, but as cautioned in <cit.>, most analyses of growth rate data, e.g. <cit.>, tend to pick 20 odd data points to counteract any overcounting of data. However, this choice of independent data points is largely subjective. Moreover, different studies make use of different fiducial cosmologies. To address this latter concern, we follow equation (2.6) of <cit.> (see also <cit.>) and correct for this choice of fiducial model by performing a rescaling by the combination H(z) D_A(z), where H(z) and D_A(z) denote the Hubble parameter and angular diameter distance at a given z. Note, following <cit.>, we did not perform this correction in the last section.
In Fig. <ref> we show the effect of removing f σ_8(z) constraints below z = z_min. Where relevant, e.g. <cit.>, we crop covariance matrices accordingly as we remove data points. Our strong Gaussian prior on Ω_m ensures that our a posteriori distributions from MCMC analysis remain Gaussian. As a result, the 1 σ errors in Fig. <ref> are representative. The reader will note that, in line with expectations, the size of the error bar increases as we remove data. Furthermore, the error bars in Fig. <ref> are correlated, because all plotted constraints larger than a given z_min share data points.
We can address criticism regarding the correlated constraints in Fig. <ref> by simply splitting the sample into independent subsamples. Our results in Fig. <ref> suggest that any split at z ∼ 1 may maximise the discrepancy between low redshift and high redshift subsamples. The choice is somewhat arbitrary, as it depends on the composition or makeup of the overall sample, notably redshift distribution and quality of the data. For this reason, the split here is conducted at z = 1.1, whereas it was z = 0.7 in the previous section. Note that our sample here now has an extended range, so we can explore higher redshift splits of the sample. Concretely, we find that a split at z= 1.1 leads to S_8 = 0.732 ± 0.010 at lower redshifts and S_8 = 0.906 ± 0.043 at higher redshifts, with a tension at 3.9 σ. While the discrepancy is large, not all of our data points are independent, so this constitutes an overestimation. The main point here is that the S_8 trend is robust to changes in the data set. Of course, evolution in S_8 within the ΛCDM model is expected if evolution of cosmological parameters is seen elsewhere <cit.>.
§ CONCLUSIONS
Binning data is not a crime. Neither is fitting a dynamical model, here the ΛCDM model, to binned data in different temporal epochs, alternatively different redshift ranges. Either from the Friedmann equations directly, or the continuity equation and the assumption of pressure-less matter, both H_0 and Ω_m arise mathematically as integration constants. Thus, consistency demands that both H_0 and Ω_m are observationally constants. Similarly, σ_8 is an integration constant of linear growth equations <cit.>. Here, working within these assumptions, we have shown that the S_8 ≡σ_8 √(Ω_m/0.3) parameter increases with effective redshift in the late Universe, z ≲ 2. This evolution is compelling because it corroborates the tendency of cosmic shear to give lower values of S_8 than Planck-ΛCDM <cit.>. Moreover, it is not an isolated observation and it has been noted that σ_8 constraints from low redshift clusters are biased lower than high redshift Lyman-α constraints with statistical significance ∼ 3.3 σ <cit.>. In <cit.>, systematics are a greater concern as one is comparing different observables, but here we are working with common f σ_8(z) constraints throughout. However, these differences aside, we agree on the increasing σ_8 trend.
Concretely, we presented analysis in a sample of 20 and 66 f σ_8(z) constraints respectively. In both samples we find the same increasing S_8 trend, which is essentially a σ_8 trend, because Ω_m is subject to a strong prior. Since there is considerable survey overlap in Fig. <ref>, the tension between low and high redshift is admittedly overestimated at 3.9 σ (Fig. <ref>). That being said, if the 20 data points in Fig. <ref> are independent (Ref. <cit.> assumes they are), then any discrepancy is bounded below by 2.3 σ. This places the tension in the 2-4 σ range. Forthcoming releases from the Dark Energy Spectroscopic Instrument (DESI) <cit.> will be in a position to settle the matter. Our results also provide a targeted prediction for tomographic studies of cosmic shear <cit.>. These surveys, i. e. HSC, KiDS and DES, currently employ redshift bins with varying effective redshift across the surveys and shifts in cosmological parameters up to 1 σ are evident. Given our results here, it is plausible that S_8 evolution will be detected as cosmic shear data quality improves. Finally, our results caution theoretically that physics that alters the radius of the sound horizon <cit.> cannot account for these expected hallmarks of model breakdown.
§ ACKNOWLEDGEMENTS
We thank Dragan Huterer, Leandros Perivolaropoulos, Sunny Vagnozzi, and Matteo Viel for correspondence on related topics. ÖA acknowledges the support by the Turkish Academy of Sciences in the scheme of the Outstanding Young Scientist Award (TÜBA-GEBİP). ÖA is supported in part by TUBITAK grant 122F124. SP acknowledges hospitality of Bu-Ali Sina University while this work carried out. MMShJ and SP are supported in part by SarAmadan grant No ISEF/M/401332. AAS acknowledges the funding from SERB, Govt of India under the research grant no: CRG/2020/004347. SAA is funded by UGC non-NET Fellowship scheme of Govt. of India.
99Riess:1998cb
A. G. Riess et al. [Supernova Search Team],
Astron. J. 116, 1009 (1998).
https://arxiv.org/abs/astro-ph/9805201astro-ph/9805201Perlmutter:1998np
S. Perlmutter et al. [Supernova Cosmology Project],
Astrophys. J. 517, 565 (1999).
https://arxiv.org/abs/astro-ph/9812133astro-ph/9812133Planck:2018vyg
N. Aghanim et al. [Planck],
Astron. Astrophys. 641, A6 (2020).
https://arxiv.org/abs/1807.062091807.06209Riess:2021jrx
A. G. Riess, W. Yuan, L. M. Macri, D. Scolnic, D. Brout, S. Casertano, D. O. Jones, Y. Murakami, L. Breuval and T. G. Brink, et al.
Astrophys. J. Lett. 934, L7 (2022).
https://arxiv.org/abs/2112.045102112.04510Freedman:2021ahq
W. L. Freedman,
Astrophys. J. 919, 16 (2021).
https://arxiv.org/abs/2106.156562106.15656Pesce:2020xfe
D. W. Pesce, J. A. Braatz, M. J. Reid, A. G. Riess, D. Scolnic, J. J. Condon, F. Gao, C. Henkel, C. M. V. Impellizzeri and C. Y. Kuo, et al.
Astrophys. J. Lett. 891, L1 (2020).
https://arxiv.org/abs/2001.092132001.09213Blakeslee:2021rqi
J. P. Blakeslee, J. B. Jensen, C. P. Ma, P. A. Milne and J. E. Greene,
Astrophys. J. 911, 65 (2021).
https://arxiv.org/abs/2101.022212101.02221Kourkchi:2020iyz
E. Kourkchi, R. B. Tully, G. S. Anand, H. M. Courtois, A. Dupuy, J. D. Neill, L. Rizzi and M. Seibert,
Astrophys. J. 896, 3 (2020).
https://arxiv.org/abs/2004.144992004.14499Heymans:2013fya
C. Heymans, E. Grocutt, A. Heavens, M. Kilbinger, T. D. Kitching, F. Simpson, J. Benjamin, T. Erben, H. Hildebrandt and H. Hoekstra, et al.
Mon. Not. Roy. Astron. Soc. 432, 2433 (2013).
https://arxiv.org/abs/1303.18081303.1808Joudaki:2016mvz
S. Joudaki, C. Blake, C. Heymans, A. Choi, J. Harnois-Deraps, H. Hildebrandt, B. Joachimi, A. Johnson, A. Mead and D. Parkinson, et al.
Mon. Not. Roy. Astron. Soc. 465, 2033 (2017).
https://arxiv.org/abs/1601.057861601.05786DES:2017qwj
M. A. Troxel et al. [DES],
Phys. Rev. D 98, 043528 (2018).
https://arxiv.org/abs/1708.015381708.01538HSC:2018mrq
C. Hikage et al. [HSC],
Publ. Astron. Soc. Jap. 71, 43 (2019).
https://arxiv.org/abs/1809.091481809.09148KiDS:2020suj
M. Asgari et al. [KiDS],
Astron. Astrophys. 645, A104 (2021).
https://arxiv.org/abs/2007.156332007.15633DES:2021wwk
T. M. C. Abbott et al. [DES],
Phys. Rev. D 105, 023520 (2022).
https://arxiv.org/abs/2105.135492105.13549Addison:2015wyg
G. E. Addison, Y. Huang, D. J. Watts, C. L. Bennett, M. Halpern, G. Hinshaw and J. L. Weiland,
Astrophys. J. 818 (2016), 132.
https://arxiv.org/abs/1511.000551511.00055Handley:2019tkm
W. Handley,
Phys. Rev. D 103, L041301 (2021).
https://arxiv.org/abs/1908.091391908.09139DiValentino:2019qzk
E. Di Valentino, A. Melchiorri and J. Silk,
Nature Astron. 4, 196 (2019).
https://arxiv.org/abs/1911.020871911.02087Granett:2008ju
B. R. Granett, M. C. Neyrinck and I. Szapudi,
Astrophys. J. Lett. 683, L99 (2008).
https://arxiv.org/abs/0805.36950805.3695DES:2016zxh
A. Kovács et al. [DES],
Mon. Not. Roy. Astron. Soc. 465, 4166 (2017).
https://arxiv.org/abs/1610.006371610.00637DES:2018nlb
A. Kovács et al. [DES],
Mon. Not. Roy. Astron. Soc. 484, 5267 (2019).
https://arxiv.org/abs/1811.078121811.07812Kovacs:2021mnf
A. Kovács, R. Beck, A. Smith, G. Rácz, I. Csabai and I. Szapudi,
Mon. Not. Roy. Astron. Soc. 513, 15 (2022).
https://arxiv.org/abs/2107.130382107.13038Adams:2022
N. J. Adams et al., Mon. Not. Roy. Astron. Soc. 518, 4755 (2022).
https://arxiv.org/abs/2207.112172207.11217Labbe:2022
I. Labbe et al., https://arxiv.org/abs/2207.12446arXiv:2207.12446.
Castellano:2022
M. Castellano et al., ApJL 938, L15 (2022). https://arxiv.org/abs/2207.094362207.09436Naidu:2022
R. P. Naidu et al., ApJL 940, L14 (2022).
https://arxiv.org/abs/2207.094342207.09434DiValentino:2021izs
E. Di Valentino, O. Mena, S. Pan, L. Visinelli, W. Yang, A. Melchiorri, D. F. Mota, A. G. Riess and J. Silk,
Class. Quant. Grav. 38, 153001 (2021).
https://arxiv.org/abs/2103.011832103.01183Perivolaropoulos:2021jda
L. Perivolaropoulos and F. Skara,
New Astron. Rev. 95, 101659 (2022).
https://arxiv.org/abs/2105.052082105.05208Abdalla:2022yfr
E. Abdalla, G. Franco Abellán, A. Aboubrahim, A. Agnello, O. Akarsu, Y. Akrami, G. Alestas, D. Aloni, L. Amendola and L. A. Anchordoqui, et al.
JHEAp 34, 49 (2022).
https://arxiv.org/abs/2203.061422203.06142Krishnan:2020vaf
C. Krishnan, E. Ó Colgáin, M. M. Sheikh-Jabbari and T. Yang,
Phys. Rev. D 103, 103509 (2021).
https://arxiv.org/abs/2011.028582011.02858Krishnan:2022fzz
C. Krishnan and R. Mondol,
https://arxiv.org/abs/2201.13384arXiv:2201.13384.
Wong:2019kwg
K. C. Wong, S. H. Suyu, G. C. F. Chen, C. E. Rusu, M. Millon, D. Sluse, V. Bonvin, C. D. Fassnacht, S. Taubenberger and M. W. Auger, et al.
Mon. Not. Roy. Astron. Soc. 498, 1420 (2020).
https://arxiv.org/abs/1907.048691907.04869Millon:2019slk
M. Millon, A. Galan, F. Courbin, T. Treu, S. H. Suyu, X. Ding, S. Birrer, G. C. F. Chen, A. J. Shajib and D. Sluse, et al.
Astron. Astrophys. 639, A101 (2020).
https://arxiv.org/abs/1912.080271912.08027Krishnan:2020obg
C. Krishnan, E. Ó Colgáin, Ruchika, A. A. Sen, M. M. Sheikh-Jabbari and T. Yang,
Phys. Rev. D 102, 103525 (2020).
https://arxiv.org/abs/2002.060442002.06044Dainotti:2021pqg
M. G. Dainotti, B. De Simone, T. Schiavone, G. Montani, E. Rinaldi and G. Lambiase,
Astrophys. J. 912, 150 (2021).
https://arxiv.org/abs/2103.021172103.02117Dainotti:2022bzg
M. G. Dainotti, B. De Simone, T. Schiavone, G. Montani, E. Rinaldi, G. Lambiase, M. Bogdan and S. Ugale,
Galaxies 10, 24 (2022).
https://arxiv.org/abs/2201.098482201.09848Colgain:2022nlb
E. Ó Colgáin, M. M. Sheikh-Jabbari, R. Solomon, G. Bargiacchi, S. Capozziello, M. G. Dainotti and D. Stojkovic,
Phys. Rev. D 106, L041301 (2022).
https://arxiv.org/abs/2203.105582203.10558Colgain:2022rxy
E. Ó Colgáin, M. M. Sheikh-Jabbari, R. Solomon, M. G. Dainotti and D. Stojkovic,
https://arxiv.org/abs/2206.11447arXiv:2206.11447.
Malekjani:2023dky
M. Malekjani, R. M. Conville, E. Ó Colgáin, S. Pourojaghi and M. M. Sheikh-Jabbari,
https://arxiv.org/abs/2301.12725arXiv:2301.12725.
Hu:2022kes
J. P. Hu and F. Y. Wang,
Mon. Not. Roy. Astron. Soc. 517, 576 (2022).
https://arxiv.org/abs/2203.130372203.13037Jia:2022ycc
X. D. Jia, J. P. Hu and F. Y. Wang,
https://arxiv.org/abs/2212.00238arXiv:2212.00238.
Risaliti:2018reu
G. Risaliti and E. Lusso,
Nature Astron. 3, 272 (2019).
https://arxiv.org/abs/1811.025901811.02590Lusso:2020pdb
E. Lusso, G. Risaliti, E. Nardini, G. Bargiacchi, M. Benetti, S. Bisogni, S. Capozziello, F. Civano, L. Eggleston and M. Elvis, et al.
Astron. Astrophys. 642, A150 (2020).
https://arxiv.org/abs/2008.085862008.08586Yang:2019vgk
T. Yang, A. Banerjee and E. Ó Colgáin,
Phys. Rev. D 102, 123532 (2020).
https://arxiv.org/abs/1911.016811911.01681Khadka:2020vlh
N. Khadka and B. Ratra,
Mon. Not. Roy. Astron. Soc. 497, 263 (2020).
https://arxiv.org/abs/2004.099792004.09979Khadka:2020tlm
N. Khadka and B. Ratra,
Mon. Not. Roy. Astron. Soc. 502, 6140 (2021).
https://arxiv.org/abs/2012.092912012.09291Khadka:2021xcc
N. Khadka and B. Ratra,
Mon. Not. Roy. Astron. Soc. 510, 2753 (2022).
https://arxiv.org/abs/2107.076002107.07600Pourojaghi:2022zrh
S. Pourojaghi, N. F. Zabihi and M. Malekjani,
Phys. Rev. D 106, 123523 (2022).
https://arxiv.org/abs/2212.041182212.04118Pasten:2023rpc
E. Pastén and V. Cárdenas,
https://arxiv.org/abs/2301.10740arXiv:2301.10740.
Esposito:2022plo
M. Esposito, V. Iršič, M. Costanzi, S. Borgani, A. Saro and M. Viel,
Mon. Not. Roy. Astron. Soc. 515, 857 (2022).
https://arxiv.org/abs/2202.009742202.00974BOSS:2016wmc
S. Alam et al. [BOSS],
Mon. Not. Roy. Astron. Soc. 470, 2617 (2017).
https://arxiv.org/abs/1607.031551607.03155Neveux:2020voa
R. Neveux, E. Burtin, A. de Mattia, A. Smith, A. J. Ross, J. Hou, J. Bautista, J. Brinkmann, C. H. Chuang and K. S. Dawson, et al.
Mon. Not. Roy. Astron. Soc. 499, 210 (2020).
https://arxiv.org/abs/2007.089992007.08999Hou:2020rse
J. Hou, A. G. Sánchez, A. J. Ross, A. Smith, R. Neveux, J. Bautista, E. Burtin, C. Zhao, R. Scoccimarro and K. S. Dawson, et al.
Mon. Not. Roy. Astron. Soc. 500, 1201 (2020).
https://arxiv.org/abs/2007.089982007.08998Said:2020epb
K. Said, M. Colless, C. Magoulas, J. R. Lucey and M. J. Hudson,
Mon. Not. Roy. Astron. Soc. 497 (2020), 1275.
https://arxiv.org/abs/2007.049932007.04993Beutler:2012px
F. Beutler, C. Blake, M. Colless, D. H. Jones, L. Staveley-Smith, G. B. Poole, L. Campbell, Q. Parker, W. Saunders and F. Watson,
Mon. Not. Roy. Astron. Soc. 423, 3430 (2012).
https://arxiv.org/abs/1204.47251204.4725Huterer:2016uyq
D. Huterer, D. Shafer, D. Scolnic and F. Schmidt,
JCAP 05, 015 (2017).
https://arxiv.org/abs/1611.098621611.09862Boruah:2019icj
S. S. Boruah, M. J. Hudson and G. Lavaux,
Mon. Not. Roy. Astron. Soc. 498, 2703 (2020).
https://arxiv.org/abs/1912.093831912.09383Turner:2022mla
R. J. Turner, C. Blake and R. Ruggeri,
Mon. Not. Roy. Astron. Soc. 518, 2436 (2022).
https://arxiv.org/abs/2207.037072207.03707Blake:2011rj
C. Blake, S. Brough, M. Colless, C. Contreras, W. Couch, S. Croom, T. Davis, M. J. Drinkwater, K. Forster and D. Gilbank, et al.
Mon. Not. Roy. Astron. Soc. 415, 2876 (2011).
https://arxiv.org/abs/1104.29481104.2948Blake:2013nif
C. Blake, I. K. Baldry, J. Bland-Hawthorn, L. Christodoulou, M. Colless, C. J. Conselice, S. P. Driver, A. M. Hopkins, J. Liske and J. Loveday, et al.
Mon. Not. Roy. Astron. Soc. 436, 3089 (2013).
https://arxiv.org/abs/1309.55561309.5556Howlett:2014opa
C. Howlett, A. Ross, L. Samushia, W. Percival and M. Manera,
Mon. Not. Roy. Astron. Soc. 449, 848 (2015).
https://arxiv.org/abs/1409.32381409.3238Okumura:2015lvp
T. Okumura, C. Hikage, T. Totani, M. Tonegawa, H. Okada, K. Glazebrook, C. Blake, P. G. Ferreira, S. More and A. Taruya, et al.
Publ. Astron. Soc. Jap. 68, 38 (2016).
https://arxiv.org/abs/1511.080831511.08083Pezzotta:2016gbo
A. Pezzotta, S. de la Torre, J. Bel, B. R. Granett, L. Guzzo, J. A. Peacock, B. Garilli, M. Scodeggio, M. Bolzonella and U. Abbas, et al.
Astron. Astrophys. 604, A33 (2017).
https://arxiv.org/abs/1612.056451612.05645eBOSS:2020yzd
S. Alam et al. [eBOSS],
Phys. Rev. D 103, 083533 (2021).
https://arxiv.org/abs/2007.089912007.08991Nguyen:2023fip
N. M. Nguyen, D. Huterer and Y. Wen,
https://arxiv.org/abs/2302.01331arXiv:2302.01331Wang:1998gt
L. M. Wang and P. J. Steinhardt,
Astrophys. J. 508, 483 (1998).
https://arxiv.org/abs/astro-ph/9804015astro-ph/9804015Kazantzidis:2018rnb
L. Kazantzidis and L. Perivolaropoulos,
Phys. Rev. D 97, 103503 (2018).
https://arxiv.org/abs/1803.013371803.01337Song:2008qt
Y. S. Song and W. J. Percival,
JCAP 10, 004 (2009).
https://arxiv.org/abs/0807.08100807.0810Blake:2012pj
C. Blake, S. Brough, M. Colless, C. Contreras, W. Couch, S. Croom, D. Croton, T. Davis, M. J. Drinkwater and K. Forster, et al.
Mon. Not. Roy. Astron. Soc. 425, 405 (2012).
https://arxiv.org/abs/1204.36741204.3674Davis:2010sw
M. Davis, A. Nusser, K. Masters, C. Springob, J. P. Huchra and G. Lemson,
Mon. Not. Roy. Astron. Soc. 413, 2906 (2011).
https://arxiv.org/abs/1011.31141011.3114Hudson:2012gt
M. J. Hudson and S. J. Turnbull,
Astrophys. J. Lett. 751, L30 (2013).
https://arxiv.org/abs/1203.48141203.4814Turnbull:2011ty
S. J. Turnbull, M. J. Hudson, H. A. Feldman, M. Hicken, R. P. Kirshner and R. Watkins,
Mon. Not. Roy. Astron. Soc. 420, 447 (2012).
https://arxiv.org/abs/1111.06311111.0631Samushia:2011cs
L. Samushia, W. J. Percival and A. Raccanelli,
Mon. Not. Roy. Astron. Soc. 420, 2102 (2012).
https://arxiv.org/abs/1102.10141102.1014Tojeiro:2012rp
R. Tojeiro, W. J. Percival, J. Brinkmann, J. R. Brownstein, D. Eisenstein, M. Manera, C. Maraston, C. K. McBride, D. Duna and B. Reid, et al.
Mon. Not. Roy. Astron. Soc. 424, 2339 (2012).
https://arxiv.org/abs/1203.65651203.6565delaTorre:2013rpa
S. de la Torre, L. Guzzo, J. A. Peacock, E. Branchini, A. Iovino, B. R. Granett, U. Abbas, C. Adami, S. Arnouts and J. Bel, et al.
Astron. Astrophys. 557, A54 (2013).
https://arxiv.org/abs/1303.26221303.2622Chuang:2012qt
C. H. Chuang and Y. Wang,
Mon. Not. Roy. Astron. Soc. 435, 255 (2013).
https://arxiv.org/abs/1209.02101209.0210Sanchez:2013tga
A. G. Sanchez, F. Montesano, E. A. Kazin, E. Aubourg, F. Beutler, J. Brinkmann, J. R. Brownstein, A. J. Cuesta, K. S. Dawson and D. J. Eisenstein, et al.
Mon. Not. Roy. Astron. Soc. 440, 2692 (2014).
https://arxiv.org/abs/1312.48541312.4854Feix:2015dla
M. Feix, A. Nusser and E. Branchini,
Phys. Rev. Lett. 115, 011301 (2015).
https://arxiv.org/abs/1503.059451503.05945Wang:2017wia
Y. Wang, G. B. Zhao, C. H. Chuang, M. Pellejero-Ibanez, C. Zhao, F. S. Kitaura and S. Rodriguez-Torres,
Mon. Not. Roy. Astron. Soc. 481, 3160 (2018).
https://arxiv.org/abs/1709.051731709.05173Chuang:2013wga
C. H. Chuang, F. Prada, M. Pellejero-Ibanez, F. Beutler, A. J. Cuesta, D. J. Eisenstein, S. Escoffier, S. Ho, F. S. Kitaura and J. P. Kneib, et al.
Mon. Not. Roy. Astron. Soc. 461, 3781 (2016).
https://arxiv.org/abs/1312.48891312.4889BOSS:2016psr
F. Beutler et al. [BOSS],
Mon. Not. Roy. Astron. Soc. 466, 2242 (2017).
https://arxiv.org/abs/1607.031501607.03150Wilson:2016ggz
M. J. Wilson,
https://arxiv.org/abs/1610.08362arXiv:1610.08362.
Gil-Marin:2016wya
H. Gil-Marín, W. J. Percival, L. Verde, J. R. Brownstein, C. H. Chuang, F. S. Kitaura, S. A. Rodríguez-Torres and M. D. Olmstead,
Mon. Not. Roy. Astron. Soc. 465, 1757 (2017).
https://arxiv.org/abs/1606.004391606.00439Hawken:2016qcy
A. J. Hawken, B. R. Granett, A. Iovino, L. Guzzo, J. A. Peacock, S. de la Torre, B. Garilli, M. Bolzonella, M. Scodeggio and U. Abbas, et al.
Astron. Astrophys. 607, A54 (2017).
https://arxiv.org/abs/1611.070461611.07046delaTorre:2016rxm
S. de la Torre, E. Jullo, C. Giocoli, A. Pezzotta, J. Bel, B. R. Granett, L. Guzzo, B. Garilli, M. Scodeggio and M. Bolzonella, et al.
Astron. Astrophys. 608, A44 (2017).
https://arxiv.org/abs/1612.056471612.05647Feix:2016qhh
M. Feix, E. Branchini and A. Nusser,
Mon. Not. Roy. Astron. Soc. 468, 1420 (2017).
https://arxiv.org/abs/1612.078091612.07809Howlett:2017asq
C. Howlett, L. Staveley-Smith, P. J. Elahi, T. Hong, T. H. Jarrett, D. H. Jones, B. S. Koribalski, L. M. Macri, K. L. Masters and C. M. Springob,
Mon. Not. Roy. Astron. Soc. 471, 3135 (2017).
https://arxiv.org/abs/1706.051301706.05130Mohammad:2017lzz
F. G. Mohammad, B. R. Granett, L. Guzzo, J. Bel, E. Branchini, S. de la Torre, L. Moscardini, J. A. Peacock, M. Bolzonella and B. Garilli, et al.
Astron. Astrophys. 610, A59 (2018).
https://arxiv.org/abs/1708.000261708.00026Shi:2017qpr
F. Shi, X. Yang, H. Wang, Y. Zhang, H. J. Mo, F. C. van den Bosch, W. Luo, D. Tweed, S. Li and C. Liu, et al.
Astrophys. J. 861, 137 (2018).
https://arxiv.org/abs/1712.041631712.04163Gil-Marin:2018cgo
H. Gil-Marín, J. Guy, P. Zarrouk, E. Burtin, C. H. Chuang, W. J. Percival, A. J. Ross, R. Ruggeri, R. Tojerio and G. B. Zhao, et al.
Mon. Not. Roy. Astron. Soc. 477, 1604 (2018).
https://arxiv.org/abs/1801.026891801.02689Hou:2018yny
J. Hou, A. G. Sánchez, R. Scoccimarro, S. Salazar-Albornoz, E. Burtin, H. Gil-Marín, W. J. Percival, R. Ruggeri, P. Zarrouk and G. B. Zhao, et al.
Mon. Not. Roy. Astron. Soc. 480, 2521 (2018).
https://arxiv.org/abs/1801.026561801.02656Zhao:2018gvb
G. B. Zhao, Y. Wang, S. Saito, H. Gil-Marín, W. J. Percival, D. Wang, C. H. Chuang, R. Ruggeri, E. M. Mueller and F. Zhu, et al.
Mon. Not. Roy. Astron. Soc. 482, 3497 (2019).
https://arxiv.org/abs/1801.030431801.03043Bautista:2020ahg
J. E. Bautista, R. Paviot, M. Vargas Magaña, S. de la Torre, S. Fromenteau, H. Gil-Marín, A. J. Ross, E. Burtin, K. S. Dawson and J. Hou, et al.
Mon. Not. Roy. Astron. Soc. 500, 736 (2020).
https://arxiv.org/abs/2007.089932007.08993deMattia:2020fkb
A. de Mattia, V. Ruhlmann-Kleider, A. Raichoor, A. J. Ross, A. Tamone, C. Zhao, S. Alam, S. Avila, E. Burtin and J. Bautista, et al.
Mon. Not. Roy. Astron. Soc. 501, 5616 (2021).
https://arxiv.org/abs/2007.090082007.09008Nesseris:2017vor
S. Nesseris, G. Pantazis and L. Perivolaropoulos,
Phys. Rev. D 96, 023542 (2017).
https://arxiv.org/abs/1703.105381703.10538Macaulay:2013swa
E. Macaulay, I. K. Wehus and H. K. Eriksen,
Phys. Rev. Lett. 111, 161301 (2013).
https://arxiv.org/abs/1303.65831303.6583DESI:2016fyo
A. Aghamousa et al. [DESI],
https://arxiv.org/abs/1611.00036arXiv:1611.00036.
Knox:2019rjx
L. Knox and M. Millea,
Phys. Rev. D 101, 043533 (2020).
https://arxiv.org/abs/1908.036631908.03663
|
http://arxiv.org/abs/2303.06701v1
|
20230312163300
|
Composite Sorting
|
[
"Job Boerma",
"Aleh Tsyvinski",
"Ruodu Wang",
"Zhenyuan Zhang"
] |
econ.GN
|
[
"econ.GN",
"q-fin.EC"
] |
#1#2#3
[#1,->] (#2) +(80:#3) arc(80:-260:#3)
font=stretch=1.5
patterns
decorations.pathreplacing
fillbetween
definition
theoremTheorem
*theorem*Theorem
acknowledgementAcknowledgement
assumptionAssumption
axiomAxiom
caseCase
claimClaim
conclusionConclusion
conditionCondition
conjectureConjecture
corollary[theorem]Corollary
*corollary*Corollary
criterionCriterion
definitionDefinition
*definition*Definition
exampleExample
exerciseExercise
lemmaLemma
notationNotation
problemProblem
proposition[theorem]Proposition
remarkRemark
solutionSolution
summarySummary
arrows,decorations.markings,arrows.meta
.5
ḍ
law =
law →
law ∼
∈_law
(
[
ncbar angle/.initial=90,
ncbar/.style=
to path=()
– (()!#1!/tikz/ncbar angle:())
– (()!(()!#1!/tikz/ncbar angle:())!/tikz/ncbar angle:())
– ()
,
ncbar/.default=0.5cm,
square left brace/.style=ncbar=0.5cmsquare right brace/.style=ncbar=-0.5cmround left paren/.style=ncbar=0.5cm,out=120,in=-120round right paren/.style=ncbar=0.5cm,out=60,in=-60
Composite Sorting
12.5pt We thank Carter Braxton, Hector Chade, Rasmus Lentz, Ilse Lindenlaub, Paolo Martellini, Luigi Pistaferri, Tommaso Porzio, Fabien Postel-Vinay, and Alexander Zimin for comments.
Job Boerma
University of Wisconsin-Madison
Aleh Tsyvinski
Yale University
Ruodu Wang
University of Waterloo
Zhenyuan Zhang
Stanford University
March 2023
=========================================================================================================================================================================================================
11.5pt18.0pt We propose a new tractable general framework for sorting – composite sorting. Composite sorting comprises of (1) distinct workers being assigned to the same job and (2) a given worker type simultaneously being part of both positive and negative sorting. We show that composite sorting generically arises in a class of sorting models when fixed investments can mitigate the variable costs of mismatch. We develop a complete characterization of equilibrium sorting as well as the corresponding equilibrium wages. Wages exhibit a local hierarchical structure meaning the relative wages depend solely on sorting patterns within narrow skill groups. Using this framework, we study within–job wage dispersion and demonstrate that quantitatively composite sorting may explain a sizable portion of wage dispersion within occupations in the United States.
JEL-Codes: J01, D31, C78
Keywords: Sorting, Assignment
empty11.0pt21.0pt
§ INTRODUCTION
Since <cit.> and <cit.>, sorting
models have taken a prominent position in economics. An important
insight of this literature is when the output function is supermodular
or submodular, sorting is positive or negative, implying that very
similar or identical worker types are assigned to the same job type.
<cit.>, <cit.>, <cit.>,
and <cit.> provide comprehensive reviews of this literature.[<cit.> and <cit.> provide an overview
of the significance of assignment models in international trade.]
Our paper provides the first complete characterization of optimal
sorting and wages in a general sorting model with an output function
that is neither supermodular nor submodular. We establish that equilibrium
sorting is significantly richer than in the canonical settings yet
we characterize it fully. We refer to the sorting pattern that emerges
as composite sorting, which has two key features. First, distinct
workers are sorted to the same job which enables us to study wage
dispersion within jobs. Second, the fact that a given worker type
can simultaneously be in both positive and negative sorting allows
us to generate intricate sorting patterns to bring to the data. We
quantitatively demonstrate our model using American Community Survey
data. Our model can explain 32 percent of the overall wage dispersion
and about 50 percent of the wage dispersion at the top and the bottom
of the wage distribution. In contrast, with either supermodular or
submodular costs, the solution is positive or negative one-to-one
sorting with no dispersion in wages.[To be precise, wage dispersion in this case can be positive but solely
due to the discretization of occupations.]
We consider a sorting model with heterogeneous workers and heterogeneous
jobs. Mismatch is the difference between the skill of the worker and
the difficulty of the job. When the job's difficulty exceeds the worker's
skill level, that is, a worker is underqualified, mismatch decreases
output. The second type of mismatch (as in <cit.>) arises
when the worker's ability surpasses the job's demands, that is, a
worker is overqualified, resulting in a utility loss for a worker
and a corresponding loss in the joint surplus. Following <cit.>
and <cit.>, firms can incur fixed costs
to reduce the variable costs of mismatch. Firms thus mitigate the
adverse effects of mismatch by investing in technologies or providing
amenities. An example is investing in an industrial cobot (collaborative
robot) that enhances the output of a low-skill welder. The result
of the technology decision is that the effective output function is
concave in the extent of underqualification. Similarly, employers
may invest in amenities to decrease the disutility of workers (as
in <cit.>) when they are overqualified. An example is
investing in a premium truck with advanced comfort and drivers support
system for a high-skill trucker. The result of investment in amenities
is that the effective surplus is concave in the extent of overqualification.
In sum, the effective output function is concave in mismatch. The
key characteristic of a generic concave function in mismatch is that
it is neither supermodular nor submodular. We are able to provide
a complete characterization of this general sorting problem with neither
supermodular nor submodular costs by analyzing it using the tools
of optimal transport theory.
We now turn to the main characteristics of an optimal assignment.
First, an optimal assignment maximizes the number of perfect pairs,
which refer to pairs without mismatch. When mismatch costs are concave,
it is preferable to have a combination of one pair with small mismatch
and another with significant mismatch, as opposed to having two pairs
with moderate mismatch. A combination of a perfect pair and a pair
with significant mismatch exemplifies this.
The second feature of an optimal assignment is that pairings between
workers and jobs do not intersect. Consider workers with low and medium
skills {x_L,x_M} and jobs that require high and exceptional
skills {z_H,z_E}. Positive sorting assigns the low-skill
worker to the high-skill job (x_L,z_H), and a medium-skill
worker to the exceptional skill job (x_M,z_E). This results
in two medium-size mismatch costs. Visualizing the pairing as arcs
connecting a worker with a job reveals that the pairs intersect as
in the left panel of Figure <ref>. For concave costs, in contrast, it
is preferable to have one large mismatch (between a low-skill worker
and a very high-skill job (x_L,z_E)) and one small mismatch
(between a medium-skill worker and a high-skill job (x_M,z_H)).
Thus, it is optimal to have pairs that do not intersect as in the
right panel of Figure <ref>.
This principle of no intersecting pairs gives rise to two additional characteristics
of an optimal assignment. First, the assignment problem can be decomposed
into independent problems by a layer mechanism. Layers are constructed by first designing a measure of underqualification that evaluates the cumulative deficiency of worker skills compared to the cumulative demands of jobs at a given skill level. A layer contains all the workers and
jobs in a particular slice of this measure of underqualification.
An assignment in each layer optimally pairs workers and jobs within
a given slice, regardless of all workers and jobs in other layers.
The full optimal assignment combines the independent optimal assignments
in each layer. Second, we characterize an optimal assignment within
a given layer by formulating a Bellman equation. By leveraging the property of
no intersecting pairs, it is straightforward to construct
this recursive characterization.
The main result of our paper is composite sorting – the optimal
assignment sorts identical workers into different jobs, some positively
and some negatively. The intuition for composite sorting can be described
through an example. Suppose a low worker-job group {x_L,z_L}
is far from a high worker-job group {x_H,z_H} as in the top
panel of Figure <ref>. When there is a significant gap between the groups,
workers are optimally assigned to jobs within their skill groups resulting
in two pairs (x_L,z_L) and (x_H,z_H). This results in
two small mismatches and positive sorting. Suppose one identical low-skill
worker x_L and one identical high-skill job z_H as
well a medium-skill worker-job group {x_M,z_M} are added
as in the bottom panel of Figure <ref>. Adding an identical low-skill
worker and an identical high-skill job does not allow to reduce the
initial mismatched pairs (x_L,z_L) and (x_H,z_H), and
so the added low-skill worker is assigned to the added high-skill
job forming a pair (x_L,z_H). The medium worker-job group {x_M,z_M}
can, in principle, be used to rematch the added low-skill worker and
the added high-skill job with the medium-skill job and worker forming
pairs (x_L,z_M) and (x_M,z_H). However, such rematching
is not optimal, because due to concavity of the costs, two medium mismatches
(x_L,z_M) and (x_M,z_H) are worse than one small mismatch
within the medium-skill group (x_M,z_M) and one large mismatch
for (x_L,z_H). As a result, the medium-skill group is paired
together and this results in the negative sorting for the added group.
We emphasize that the optimal assignment sorts the same worker type
to very different jobs, with some positive and some negative sorting.
The low-skill worker x_L is paired positively with the low-skill
job z_L (as a part of the sorting (x_L,z_L) and (x_H,z_H))
but the same worker type is also paired negatively to the distant
high-skill job z_H as a part of the sorting ((x_L,z_H)
and (x_M,z_M)). Thus, the optimal full assignment is not one-to-one
because the same worker type is assigned to different jobs as a part
of simultaneously positive and negative sorting. The problem thus
delivers composite sorting.
For general distributions, composite sorting may be very rich with
very distinct worker types being assigned to the same job and may
exhibit various local and global intervals of positive and negative
sorting. Our theory offers a complete characterization of composite
sorting.
We determine equilibrium wages and firm values by characterizing the
solution to the dual planning problem. Our contribution here is to
characterize the dual for mismatched workers and jobs by demonstrating
that the shadow cost of mismatch exhibits a local hierarchical structure.
For a given skill group, the relative wages are determined locally,
that is, they depend only on information within the narrowly defined
local skill group and do not depend on any other groups or skills.
The hierarchical structure aggregates the local relative wages to
the wages for the larger groups preserving the relative wages implied
by the local structure. Finally, we extend the construction of the
wages and the firm values to perfectly paired workers.
Having characterized the equilibrium theoretically, we quantitatively
illustrate the theory. An important implication of our results is
frictionless wage dispersion within jobs. We investigate to what extent
our model can generate qualitative and quantitative patterns of wage
dispersion within 497 occupations in the American Community Survey
between 2010 and 2017.
We find that the model can deliver sizable wage dispersion within
occupations with high and low mean wages. Composite sorting can
account for 46 percent of wage dispersion within jobs at the bottom
of the distribution, and 58 percent at the top. At the top, a high-skill
surgeon performs the same job as a lower-skill surgeon assisted by
a robotic surgical system. This leads to a wide range of salaries
within the occupation, encompassing both low- and high-skill surgeons.
A similar pattern holds at the bottom of the distribution. The model
can account for 19 percent of the wage dispersion in the middle of
the distribution. The main reason is that the log-wage profile
is relatively flat in this range and, even though there may be substantial
skill dispersion within a particular occupation, it does not give
rise to substantial wage dispersion. Overall, composite sorting
accounts for 32 percent of the wage dispersion in the sample. In contrast,
one-to-one sorting models (such as models with positive or negative
sorting arising from submodular or supermodular costs) would deliver
no wage dispersion within jobs.
Literature. We now briefly discuss additional relevant literature. <cit.>
study sorting of heterogeneous workers with a form of technology
choice where there is selection in managerial and worker roles. <cit.>
uses optimal transport to extend their framework with a continuous
technological investment choice for each worker and manager which
scales the strength of the complementary between them. <cit.>
depart from focusing on the conditions for assortative matching by
developing comparative statics predictions for the sorting patterns
without having to solve for optimal sorting. <cit.>
empirically document the patterns on non-assortative pairing in wealth. Another recent development
in the sorting literature is to study assignment models with multiple
agents combined together (<cit.>, <cit.>,
<cit.>, and <cit.>).
Another general alternative that results in imperfect assortative
matching is the search and matching literature (for example, <cit.>,
<cit.>, <cit.>, <cit.>,
<cit.>, <cit.>). Specifically, this approach
generates wage dispersion within jobs due to the search frictions.
Our work instead generates wage dispersion solely due to sorting in
a frictionless environment.
Our paper uses results from the optimal transport
literature (see <cit.> for a comprehensive overview
of applications of optimal transport theory to solve economic problems) and, more specifically, from the literature with concave distance costs started by <cit.> and <cit.>.
In the optimal transport literature the idea of the perfect pairs
is referred to as “mass stays in place if it can” (<cit.>). <cit.> states that the non-intersecting rule first appears in <cit.>. This non-intersecting property
is central to the literature on optimal transport with concave distance costs
as well as to algorithmic sorting problems with distance costs
(<cit.>). <cit.>
proposed the first combinatorial algorithm that can be used to solve
for an optimal assignment within a layer when the cost of mismatch
is linear. The Bellman equation in our papers adopts a recursive
algorithm developed by <cit.>, designed to model statistical
properties of polymer chains. The idea of layering was introduced
in <cit.>. Their work also develops a more computationally
efficient version of the Bellman equation building on <cit.>.
We provide a novel, concise proof of this more efficient Bellman equation. Our construction of the dual solution and characterization of its local hierarchical structure are also mathematical contributions within the optimal transport literature.
§ MODEL
We study an environment in which workers with heterogeneous skills sort into heterogeneous jobs, where the mismatch between their skills and the job difficulty leads to output losses. Firms reduce the extent to which mismatch penalizes surplus by reducing variable mismatch costs with fixed cost investments.
§.§ Environment
The economy is populated by risk-neutral workers
and jobs. The workers differ in their skills which are indexed by
a real number x∈ X⊆ℝ. The set of worker skills
X contains a finite number n of types x_1<x_2<…<x_n.
Workers are distributed according to the cumulative distribution function
F(x).
Jobs differ in their difficulty which is indexed by a real number
z∈ Z⊆ℝ. The set of job intensities Z contains
a finite number m of types z_1<z_2<…<z_m. Jobs
are distributed according to cumulative distribution function G(z).
Both the worker and the job distributions have finite support.
Technology. Firms produce a single good. Production requires
one worker for each job. A firm with a job z that employs
a worker with skill x produces output according to
p(x,z)= g(x) + h(z) -γ_pmax( z-x,0),
with γ_p≥0. There are three terms in this technology specification. The first term h(z) where h'(z)>0 reflects that a more difficult job z produces more output and is thus more valuable, independent of the worker that fulfills the job. The second term g(x) with g'(x)>0 reflects that a more skilled worker contributes more to production, independent of the job performed. The third term γ_pmax(z-x,0) captures the idea that a worker with a skill x that is lower than the job demand z causes a loss of output. It is costly to have workers perform tasks for which they have limited talent.
Preferences. The utility of a worker x working a
job z earning wage w is given by w-κ(x,z), where κ(x,z)
is the disutility from work which depends on the worker-job pair. Following <cit.>, disutility from work is positive when the worker is overqualified for the job. We assume the utility cost of being overqualified is given by κ(x,z)=γ_κmax(x-z,0), where the parameter γ_κ≥ 0. The specification of the disutility cost function parallels the one we use to capture the output loss due to inadequacy of worker skills compared to the job difficulties in the production function (<ref>). The difference between these specifications
is governed by the parameters γ_p and γ_κ.
The utility cost of being overqualified introduces an excess of skills
to cause a loss of joint surplus without causing a loss of output. In equilibrium,
overqualified workers are compensated for their utility cost, and therefore are paid
more in a given job than workers whose skills exactly match the job’s
difficulties (as in <cit.>).
Technology Choice. Mismatch is the distance between worker x and job z. The environment so far assumes that the costs of mismatch are exogenous. We now endogenize the cost of mismatch. A firm can reduce the exogenous cost of mismatch by making a fixed investment. In case a worker is underqualified, the firm can make technology investments to reduce the cost of mismatch in output. When workers are overqualified they experience a disutility cost which can be reduced by providing amenities. The main insight of <cit.> and <cit.> for our setting is that the technology selection results in an output function with a concave cost of mismatch. We proceed to formally define these technology choices.
We model technology choice as a firm making fixed investments (for example, by purchasing better equipment) to reduce variable costs associated with mistakes and delays caused by underqualified workers. Specifically, firms choose the variable
cost γ_p of production mismatch, which comes at an associated
fixed cost Ψ_p(γ_p). By decreasing the variable costs
γ_p, the firm increases its fixed costs, or Ψ_p'<0,
where Ψ_p”>0. To highlight the key forces that arise by introducing technology selection into the assignment model, we use the specification Ψ_p(γ_p)=B_p/η_pγ_p^-η_p, where parameters B_p and η_p are both strictly positive.[We generalize our approach to any convex cost function in the Technical Appendix.] The effective output created by worker x on job z > x is then:
y(x,z)=max_γ_p≥ 0 g(x) + h(z) -γ_p(z-x)-B_p/η_pγ_p^-η_p.
A firm makes a technology investment when a worker is underqualified to fulfill the job, when x<z. The extent of investment increases in the distance between the worker skill and the job difficulty. Using the first-order condition, the optimal technology choice is γ_p=(z-x/B_p)^-1/1+η_p. Firms choose
a low variable cost of production mismatch if the worker is less qualified,
that is, when the distance between skills and demands (z-x)
is large, or if the cost of technology investment B_p is low.
The effective output of worker x in job z is, using the technology investment decision, given by:
y(x,z)= g(x) + h(z) -ρ_p(z-x)^ζ_p
for underqualified workers x<z, with implied parameters ζ_p=η_p/1+η_p∈(0,1)
and ρ_p=B_p^1/1+η_p/ζ_p. The distinctive
feature of this function is that the effective output is concave in
the distance between worker skill and job difficulty. The technology
choice transforms a production function with linear mismatch costs
into an effective output function with strictly concave mismatch costs.
Firms can similarly reduce the extent to which overqualificaton penalizes worker utility by providing amenities. We model amenities analogously to technology choice.[Alternative frameworks that incorporate the decision to provide amenities are presented in <cit.>, <cit.>, and <cit.>.] If workers are underqualified, x<z, their employers want to invest in technology so that the costs of having underqualified employees are reduced. Similarly, when workers are overqualified, x>z, their employers want to invest in amenities to lower the disutility from working. Firms choose the variable disutility cost due to mismatch γ_κ at an associate fixed cost Ψ_κ(γ_κ)=B_κ/η_κγ_κ^-η_κ. The optimal provision of amenities
is thus characterized by γ_κ=(x-z/B_κ)^-1/1+η_κ.
Amenities increase with worker skills and decrease with the cost of
providing amenities, B_ψ. As a result, the effective output
of overqualified workers is y(x,z)=g(x) + h(z) -ρ_κ(z-x)^ζ_κ.
Effective Output. We can write the effective output of overqualified and underqualified workers as:
y(x,z)=g(x) + h(z)-ρ_p(z-x)^ζ_p if z≥ x
ρ_κ(x-z)^ζ_κ if z<x,
where ζ_p and ζ_κ are strictly positive and strictly less than one. We use effective output function (<ref>) to define the cost of mismatch between worker x and job z as c(x,z) = g(x) + h(z) - y(x,z), or
c(x,z) =ρ_p (z-x )^ζ_p if z≥ x
ρ_κ (x-z)^ζ_κ if z<x,
that is, maximal output of worker x and job z minus effective output y(x,z). Thus, the sections above give a microfoundation for a mismatch cost function that is concave in the discrepancy between worker x and job z. We plot the mismatch cost function in Figure <ref>.
The key observation is that the effective output function is neither supermodular nor submodular. For both z>x and z<x, the cross-derivatives of the output function are negative. If the cross-derivative is negative for all (x,z) the production function is submodular. To see that our production function is not submodular, consider pairs (a,b) and (b,a) such that b>a. Pairing worker a positively with job a and worker b with job b gives zero mismatch. The original configuration (a,b) and (b,a), however, has mismatch and hence has lower output than the combination of (a,a) and (b,b). Submodularity, however, requires that the combined output of (a,b) and (b,a) is higher than the combined output of (a,a) and (b,b). Thus, the output function is not submodular. In sum, even though the cross-derivative is negative for all z>x and z<x, the output function is neither supermodular nor submodular.
Assignment. An assignment pairs workers and jobs. Formally,
an assignment is a probability measure π over workers and jobs.
Given a worker distribution F and a distribution of jobs G,
the set of feasible assignment functions is Π:=Π(F,G) which
is the set of probability measures on the product space X× Z
such that the marginal distributions of π onto X and Z
are F and G. For an assignment π, we denote the support of this assignment by Γ_π={(x,z):π({(x,z)})>0}⊆^2. Feasibility of an assignment function is equivalent
to labor market clearing; that is, all workers and jobs are sorted.
§.§ Equilibrium
To define an equilibrium for our economy, we first specify the firm and worker problem. A firm with job z employs worker x to maximize profits taking the wage schedule w as given. The firm problem is:
v(z)=max_x ∈ X y(x,z)-w(x).
Taking firm compensation v as given, worker x chooses to fulfill job z to maximize their wage income:
w(x)=max_z ∈ Z y(x,z)-v(z).
An equilibrium is a wage schedule w, firm value function v, and feasible assignment function π, such that firms solve their profit maximization problem (<ref>), workers solve the worker problem (<ref>), and a feasibility constraint is satisfied, ∫ y(x,z ) dπ = ∫ w(x) d F + ∫ v(z) d G, which states that the total quantity of output produced, ∫ y(x,z ) dπ, equals the total quantity of output distributed to workers and jobs.
§.§ Planning Problem
We solve a planning problem to characterize the equilibrium assignment.
The planning problem is to choose an assignment to maximize aggregate
output:
max_π∈Π∫ y(x,z) dπ
The planning problem to maximize output is equivalent, in terms of
choosing an optimal assignment, to a planning problem that minimizes
the cost of mismatch. When we characterize the optimal assignment, we can thus equivalently represent the planning problem as:
min_π∈Π ∫ c(x,z) dπ,
where c(x,z) represents the cost of mismatch (<ref>). This is an optimal transport problem in the formulation of <cit.> with the cost function that is neither supermodular nor submodular.
Dual Problem. The solution to the planning problem is an
assignment, which we argue is an equilibrium assignment. To obtain
the equilibrium wage schedule and firm value function, we solve a
dual problem. The dual formulation for the assignment planning problem
is to choose functions w and v that solve:
min ∫ w(x) dF+∫ v(z) dG,
subject to the constraint w(x)+v(z)≥ y(x,z) for any (x,z)∈ X× Z. The Monge-Kantorovich duality states that the values from (<ref>) and (<ref>) are the same, or max_π∈Π∫ y(x,z) dπ= min∫ w(x) dF+∫ v(z) dG. In Appendix <ref>, we prove the following relation between the primal and dual solutions.
Suppose we have some assignment π∈Π and some functions w and v such that w(x)+v(z)≥ y(x,z) for any (x,z)∈ X× Z and that w(x)+v(z)= y(x,z) for any (x,z)∈Γ_π, then assignment π is an optimal assignment and (w,v) is an optimal dual pair.
§ OPTIMAL SORTING
We now characterize an optimal assignment of workers to jobs. A necessary condition for an optimal assignment is that aggregate output does not increase by a bilateral exchange of workers between jobs. For any two pairs in an optimal assignment (x,z) and (x̂,ẑ), the following inequality should be satisfied:[This is an instance of the notion of cyclical monotonicity (see, e.g., Definition 1.36 in <cit.>).]
y(x,z)+y(x̂,ẑ)≥ y(x,ẑ)+y(x,ẑ).
We next use this optimality condition to demonstrate the main features of an optimal assignment.
Maximal Number of Perfect Pairs. An optimal assignment maximizes
the number of pairs that are perfectly sorted, i.e., the number of
pairs with zero cost of mismatch between workers and jobs, or x=z. In other words, whenever feasible, an optimal assignment assigns worker x to job z=x.
The rationale for why an optimal assignment maximizes the number of perfect pairs is as follows. When mismatch costs are concave, it is preferable to have a pair with small mismatch and a pair with significant mismatch than to have two pairs with moderate mismatch. A perfect pair is a demonstration of this concept since it has zero mismatch. Specifically, let an optimal assignment contain pairs (x,z) and (x',z') but x'=z where x and z' do not equal z. Suppose x<x'=z<z', that is, the value z=x' is in between the values x and z. The original cost of mismatch is two medium-size mismatches in pairs (x,z) and (x',z'). Consider reshuffling to form a perfect pair (x',z) and the remaining pairing (x,z'). The cost of the mismatch of the reshuffled pairs is that of a large mismatch (x,z') and a zero mismatch for the perfect pair (x',z). By concavity of the costs, this is lower than two medium-size mismatches.[A strictly convex cost of mismatch implies that the optimal sorting is positive which, in general, conflicts with maximal perfect pairing.]
The output loss due to mismatch is strictly reduced by assigning worker x to job z' and by perfectly assigning worker x' to job z, which contradicts the optimality condition (<ref>). We
summarize this idea in Lemma <ref>.
Maximal Perfect Pairs.
Let F∧ G denote the common component of the worker distribution
F and the job distribution G. Any optimal assignment π
between workers consists of perfect pairings on the support of F∧ G
and an optimal assignment between workers F-F∧ G and jobs
G-F∧ G. We present a proof in Appendix <ref>.
Lemma <ref> shows that workers and jobs which are part
of the common component are positively sorted. Since workers in the
common component are perfectly paired, better workers are paired with
better jobs. Lemma <ref> implies that in analyzing the sorting problem
between the remaining workers and jobs we can restrict attention to
assignments between worker and job distributions where the common parts of the distributions are removed. For brevity, we label the remaining worker distribution F and the remaining job distribution G.
No Intersecting Pairs. The second feature of an optimal
assignment is that pairings between workers and jobs do not intersect. Consider pairs (x,z) and (x',z') and illustrate their pairings by arcs. In Figure <ref>
we show intersecting and non-intersecting pairs. The left
panel shows an example of intersecting pairs as the arcs of pairs
(x,z) and (x',z') intersect. The right panel shows an example
of non-intersecting pairs as the arcs corresponding to pairs (x,z)
and (x',z') do not intersect. We say that the arcs (x,z)
and (x',z') do not intersect if and only if the intervals (x,z)
and (x',z') are either disjoint or one interval is a subset of
the other interval.[When referring to an interval (x,z), we do not require that the
worker skills and job difficulties are ordered: we mean
the set of real numbers lying between z and x on the real line.] Lemma <ref> establishes that under an optimal assignment arcs never intersect.
No Intersecting Pairs.
Let π be an optimal assignment. For any two pairs (x,z) and
(x',z') in the support Γ_π, their arcs do not intersect.
The proof is in Appendix <ref> and we now outline the main idea.
We prove Lemma <ref> by considering the two
unique configurations with intersecting pairs.[There are six distinct orderings of workers x's (white circles)
and jobs z's (black dots) to consider, which can be represented
as:
< g r a p h i c s >
< g r a p h i c s >
< g r a p h i c s >
< g r a p h i c s >
< g r a p h i c s >
< g r a p h i c s >
.
The first four configurations do not contain any intersections. The
final two scenarios are discussed in the main text.] The first configuration is x<z'<z<x'. Since the mismatch cost
increases in the distance between worker and job, an improvement is
to instead pair the closer points (x,z') and (x',z) as it reduces
the mismatch cost for each worker and hence the total mismatch costs.
The second configuration is x<x'<z<z'. In this case, we utilize
the concavity of the cost of mismatch to obtain a contradiction to the optimality condition (<ref>). We
reshuffle so that we have one large mismatch (x,z')
and one small mismatch (x',z). By concavity, the cost of this is
smaller than two medium-size mismatches. The output loss due to mismatch
strictly reduces by assigning worker x to job z' and worker
x' to job z, which contradicts the optimality condition (<ref>).
Layering. The observation that an optimal assignment does not contain intersections
enables us to next show that the optimal assignment problem
can be decomposed into a series of independent problems.
To see how the assignment problem is decomposed into different layers,
let H be the difference between the cumulative distribution function
of workers F and the cumulative distribution function of jobs G.
The measure of underqualification H measures
the extent to which workers up to skill level s outweigh the jobs
requiring skill levels up to s since H(s):=F(s)-G(s).
Figure <ref> illustrates the measure of underqualification. The top panel gives an example of the worker distribution F and the job distribution G. Distribution F has one worker at skill level s_1 and four workers at skill level s_3.
Distribution G has two jobs each at skill level s_2 and s_5
and a single job at s_4. The underqualification measure between
s_1 and s_2 is H=1/5 as there is one worker at
s_1 and no jobs less than s_2. Between s_2 and s_3,
the underqualification measure is H=-1/5 as there are two
jobs and only one worker compared to level s_3.
The similar intuition holds for the other points yielding the
measure of underqualification H∈{a_v}_v=0^4={-1/5,0,1/5,2/5,3/5}
at skill levels {s_i}_i=1^5. Generally, an underqualification
measure has jumps at a finite number of skill levels {s_i}
and takes a finite number of values in {a_0,a_1,…,a_L}
if the distributions of workers and jobs are discrete.
To illustrate the construction of layers we plot the blue dashed lines
which indicate the different values of the measure of underqualification in the bottom panel of Figure <ref>.
Layers are thus confined between two successive blue lines. For example,
the top layer (between a_3=2/5 and a_4=3/5)
contains a worker at skill level s_3 and a job at skill level
s_4. Similarly, the layer between a_1=0 and a_2=1/5
consists of one worker each at skill levels s_1 and s_3,
and one job each at skill levels s_2 and s_5.
We observe that each layer consists of an alternating configuration of workers
and jobs, that is, either x_1<z_1<x_2<z_2<…< x_n<z_n or z_1<x_1<z_2<x_2 <… <z_n<x_n. We define an alternating assignment problem as an assignment
problem between n workers and n jobs.
Workers and jobs are arranged in increasing order, and alternating
such that every worker skill level is followed by a job difficulty level, except for the last one. Let F_ℓ and G_ℓ be the measure of the workers and the jobs in each layer.[The formal definition is given with the proof in Appendix <ref>.]
After providing a decomposition into layers with alternating configurations,
Lemma <ref> shows how to solve the full assignment problem using the solutions to the assignment problem
within each layer.
Layering. Let π_ℓ
be an optimal assignment between the worker distribution F_ℓ and the job distribution G_ℓ
for the layer ℓ∈{1,…,L}. Then, an optimal assignment
between workers F and jobs G is their sum, π:=∑_ℓπ_ℓ.
This result is proved in Appendix <ref>.
Lemma <ref> shows that an optimal assignment between workers
and jobs is equal to the sum of optimal assignments in each layer.
This observation breaks the original problem down into L independent problems.
In each of the layers, there is an alternating configuration of workers
and jobs. We use this observation to characterize an optimal assignment
for our full problem by aggregating the solutions to the assignment
problems for each layer.
The intuition for Lemma <ref> is illustrated in Figure <ref> for the case where all points have equal weight. Let us consider two points x_0 and z_0 that are matched under an optimal assignment depicted by a solid arc. There is the same number of workers and jobs between these two points. Suppose that instead there exists at least one worker or a job that needs to be paired with a job or worker outside of this range. In the figure, worker x_1 does not have a pair in the interval between x_0 and z_0 and has to be connected by a dashed arc. This dashed arc intersects the solid arc (x_0,z_0) which contradicts the no-intersecting pairs principle in Lemma <ref>.
Sorting Within a Layer. By leveraging the property of no intersecting pairs, it becomes straightforward to construct a recursive characterization for an optimal assignment within a particular layer. In particular, for each layer, we adopt the recursive algorithm developed by <cit.>, designed to model statistical properties of polymer chains. The complete optimal solution is then obtained by combining the optimal solutions of each individual layer.
The optimal assignment problem for a given layer is
an alternating assignment problem. An optimal assignment within a layer matches one worker with precisely one job.[An equivalent form of Birkhoff's Theorem <cit.> states that for this setting, the set of Kantorovich transport plans is precisely that of mixtures of one-to-one transport maps. Since the cost is linear with respect to mixtures, there exists a one-to-one optimal assignment.] For notational convenience, we
order workers and jobs within each layer by their skill levels. Let there be n workers and n jobs in a given layer, and we denote the skill levels by s_1<s_2<…<s_2n-1<s_2n.
We employ a Bellman equation to calculate the minimum total cost of
mismatch. Rather than using a Bellman equation to solve a dynamic
program, we apply the Bellman equation to solve a static assignment
program. The dynamic component of the Bellman equation is that
we consider assignment problems with an increasing number of skill levels.
We start by solving all assignment problems between two consecutive
elements – the assignment problem between one worker and
one job. That is, we consider assignments between skill levels
s_i and s_i+1, for each i. Using the solutions from the
previous step, we proceed to solve all assignment problems between four consecutive elements (two workers and two jobs). That is, we solve for an optimal assignment
between s_i,s_i+1,s_i+2,s_i+3, for each i. Then we consider all optimal
assignment problems between three workers and three jobs. We continue
increasing the size of the optimal assignment problem until we
solve the assignment problem between n workers and n jobs,
which is the original alternating assignment problem for the layer.
By the property of no intersecting pairs, the formulation of the Bellman equation directly arises. We denote the minimum cost of mismatch when sorting all workers
and jobs with skill levels between s_i and s_j by the value
V_i,j, where j>i. The difference j-i has to be odd so that
there are equal numbers of workers and jobs between s_i and s_j.
Considering an optimal assignment of workers and jobs with skill levels
in [s_i,s_j], the planner can pair the leftmost s_i with
any s_k such that k-i is odd. Upon pairing
s_i with s_k, the planner remains to optimally pair the
other workers and jobs in [s_i+1,s_k-1], and all workers and
jobs with skill levels in [s_k+1,s_j]. There are no pairings
between these two segments because this violates the
property of no intersecting pairs. In this way, we can use results from previous steps of assignment
and thus obtain a Bellman equation:
V_i,j=min_k∈{i+1,i+3,…,j} ( c(s_i,s_k)+V_i+1,k-1+V_k+1,j)
with boundary conditions V_i+1,i=0 for all i.[The boundary conditions are invoked at either end of the choice interval.
When k=i+1, the minimum cost of mismatch is c(s_i,s_i+1)+V_i+2,j,
the cost of pairing the first worker to the first job, together with
optimally sorting all skill levels from s_i+2 to s_j. When
k=j, the minimum cost is c(s_i,s_j)+V_j+1,j-1, the cost
of pairing the first worker to the last job, together with optimally
matching all intermediate skill levels between s_i+1 and s_j-1.
The boundary conditions are also used when j-i=1, in which case
there is a unique choice necessarily at the bounds of the choice set.
This is an important step, as the Bellman equation (<ref>)
is solved by induction over all j-i odd, starting with j-1=1.]
Once the Bellman equation (<ref>) is solved, we construct an optimal assignment. Starting from V_1,2n_ℓ, the optimal pairing of skill s_1 is given by skill s_k that solves equation (<ref>). Then two corresponding continuation values, V_2,k-1 and V_k+1,2n_ℓ, are evaluated to determine optimal pairings for skill s_2 and for skill s_k+1, respectively. This process of finding an optimal assignment continues recursively until the full assignment is constructed.
Our three-step approach to characterizing the optimal sorting is as follows. First, we maximize perfect pairs. This always leads to positive sorting between identical workers and jobs and enables us to withdraw them from further analysis. Second, we construct a measure of underqualification to decompose the assignment problem into a sequence of independent problems – layers. Third, we characterize an optimal assignment for each layer using the Bellman algorithm. The optimal allocation is thus given by the following proposition.
An optimal assignment between
workers F and jobs G sums an optimal assignment in each layer,
where the optimal assignment in each layer attains V_1,2n_ℓ
in the Bellman equation (<ref>).
In Appendix <ref>, we introduce a novel, more concise proof of a computationally efficient version of the Bellman equation in <cit.>. Our proof also applies in the case of asymmetric cost functions that we consider.
In Appendix <ref>, we derive an additional explicit optimal sorting when the mismatch power indices ζ_p and ζ_κ are close to one. Specifically, we show that the optimal assignment within each layer is positive. The implication is that for mismatch power indices close to one, the solution can be directly constructed by constructing the measure of underqualification, and constructing the positive sorting by layer. <cit.> shows that this layered positive assignment is the limit of some optimal assignments as ζ→ 1^-. Our results proves the existence of a threshold beyond which the layered positive assignment is optimal for our environment and is thus applicable away from the limit.
§ EXAMPLES
Having described how to characterize the optimal sorting, we illustrate
various elements of composite sorting through examples.
Positive and Negative Sorting. Our assignment problem,
which features neither a supermodular nor a submodular output function,
can deliver simultaneously positive and negative sorting. Importantly, the sorting pattern, rather than being dictated by the shape of the production function alone as in the classic optimal assignment problems, depends on the distributions of worker skills and job difficulties.
To see that an optimal assignment can feature both positively and negatively assorted pairings and sort identical workers into different jobs, consider an assignment problem with two workers and two jobs. Worker skills are given by x_L and x_H and jobs are given by
z_L and z_H satisfying x_L<z_L<x_H<z_H. Let
the absolute distance between x_i and z_j be d_ij:=|x_i-z_j|.
To explain the presence of positive sorting, consider the following
configuration of distances: d_LL^ζ+d_HH^ζ≤ d_LH^ζ+d_HL^ζ with the specific cost function c(x,z) = |x-z|^ζ with ζ∈ (0,1). This case is presented
in the top panel of Figure <ref>, where the workers are
given by circles and the jobs are given by dots.
The low-skill worker x_L and the low-skill job z_L as well
as the high-skill worker x_H and the high-skill job z_H
are very close to each other, while the skill gap between the
low-skill job z_L and high-skill worker x_H is large. In
this case, it is optimal for the low-skill worker to fulfill the low
skill job and for the high-skill worker to fulfill the high-skill
job and, hence, the optimal assignment is positive. The optimal
assignment is visualized using an arrow between the low-skill worker
and low-skill job, and an arrow between the high-skill worker and
high-skill job. In other words, when there are worker-job skill groups that are far apart, it is optimal to sort within groups.
To explain the presence of negative sorting, consider the opposite
configuration of distances where d_LL^ζ+d_HH^ζ>d_LH^ζ+d_HL^ζ.
In this case, the high-skill worker and the low-skill job are close
to each other, while the distance between the low-skill worker and
the low-skill job as well as the distance between the high-skill worker
and the high-skill job is relatively large. Since the mismatch
cost is concave in the distance between the worker skills and the
job demands, it is optimal to pair the high-skill worker with
the low-skill job since having one small mismatch and one large
mismatch is better than having two medium-sized mismatches. This case is
presented in the middle panel of Figure <ref>.
To see that an assignment between workers and jobs may simultaneously
feature positive and negative sorting, we combine the two prior cases. This case is displayed in the bottom panel
of Figure <ref>. The assignment problem features four
workers (circles) and four jobs (dots). In this case, we first split
the assignment problem into layers. The top layer contains the worker
and job types that we considered in the top panel, implying that
their optimal sorting is positive. Turning to
the bottom layer, we see that the worker and job types in the bottom
layer are given by the worker and job types that we considered in
the middle panel, which implies that their optimal sorting is negative. By Lemma <ref>, a sum of optimal assignments of each
of the two layers is optimal for the combined problem. In conclusion,
the equilibrium assignment simultaneously features positive and negative
sorting.
We emphasize the optimal assignment not only features positive and
negative sorting simultaneously but also assigns the same worker
type to distant job types, and thus delivers the two defining features of composite sorting. Consider the bottom panel
in Figure <ref>. The low-skill worker is paired positively
with the low-skill job (dashed arc), but the same worker type is also
paired negatively with the very distant high-skill job (dashed dotted
arc). While the optimal assignment within each layer is a one-to-one
assignment, the full optimal assignment is not one-to-one because the same worker type is assigned to different jobs in different layers. Thus, sorting is composite – an identical worker type is assigned to multiple job types as part of both positive and negative pairings.[In equilibrium, workers of a type x that is assigned to multiple job types are indifferent between these job types since the worker receives identical compensation w(x).]
Reflecting Binomial Distributions. To illustrate layering, we consider the following example. Let the skill levels be given by {0,1,2,3,4}, the numbers of workers with these skill
levels are given by {16,32,24,8,1}, and the numbers of jobs with these skill levels are given by {1,8,24,32,16}. This corresponds to an economy where both worker skills and job difficulties are distributed
following binomial distributions, where we denote the worker skill
distribution by B(n,p) and the job distribution by B(n,1-p)
with n=4 and p=1/3. In this case, the two binomial distributions are called reflecting
as they have parameters p and 1-p.
We determine the solution to this sorting problem using the theory in Section <ref>. The first step is to maximize the number of perfect pairs. At skill level 0, there are 1 job and 16 workers. We perfectly pair this job with one of these 16 workers. Analogously, we perfectly pair {8,24,8,1} workers at each skill level in {1,2,3,4}. After maximizing perfect pairings, we are left with 15 workers of skill level 0 and 24 workers of skill level 1 together with 24 remaining jobs of skill level 3, and 15 jobs of skill level 4.
Next, we apply the layer analysis to the remaining workers and jobs. The difference between the worker and job distribution, the measure of underqualification, is presented in the top panel of Figure <ref>. In this case, we split the assignment problem into two layers. The top layer consists of 24 workers (39-15) of skill level 1 and 24 jobs of skill level 3. The bottom layer consists of 15 workers of skill level 0 and 15 jobs of skill level 4. Within each layer there is only one feasible sorting. Across the layers, there is negative sorting, meaning that the best job is paired with the worst worker (bottom layer) and the worst job is paired with the top remaining worker (top layer). This negative sorting pattern within each layer is represented by the top two arcs in the bottom panel of Figure <ref>. The circular arcs in the bottom of the second panel of Figure <ref> represent the optimal perfect pairing between workers and jobs to the extent that their distributions overlap.
Summarizing, the assignment problem with these reflecting binomial distributions simultaneously features both positive and negative sorting. Furthermore, we note that, as in the first example, the same job type is assigned to distinct worker types. For example, among the 32 jobs with skill level 3, 8 of them are matched perfectly with workers of skill level 3, while 24 of them are matched with workers of relatively low-skill level 1. In sum, the structure of the assignment is twofold: positive sorting of identical pairs and, for the remaining workers and jobs, pairing two points in each layer leading to negative sorting.[In fact, this result applies more broadly to any pair of worker and job distributions that lead to a unimodal measure of underqualification H.]
Reflecting Binomial Mixture Distributions. We now develop a more general example that provides a baseline intuition for the quantitative analysis in Section <ref>.
We take the previous case with the reflecting worker
skill distribution and the job distribution parameterized by p=1/3 and n=4, and mix these distributions with a reflecting binomial worker and job distribution with p̂=1 and n=4 in the ratio of
3:1. Again, we consider skill levels {0,1,2,3,4} where now
the number of jobs with these skill levels is {28,8,24,32,16},
and the number of workers with these skill levels is {16,32,24,8,28}.
We first maximize perfect pairs. For example, we sort 16 jobs with skill level 0 to all workers with skill level 0. Similarly, we perfectly pair {8,24,8,16} jobs with skill levels {1,2,3,4}. After maximizing perfect pairs, we are left with 24 workers of skill level 1 and 12 workers of skill level 4 together with 12 remaining jobs of skill level 0, and 24 jobs of skill level 3.
Second, we decompose the problem into independent layers. The measure
of underqualification H after normalization[That is, multiplied by the total number of workers or jobs, equal
to 108. ] at the respective skill levels is thus given by {-12,12,12,-12,0},
and is depicted in Figure <ref>. The top layer consists of 12 workers of skill level 1 and 12 jobs
of skill level 3. The bottom layer contains four distinct elements:
12 jobs each at skill levels 0 and 3 and 12 workers each at skill
levels 1 and 4.
Third, we characterize the optimal assignment for each layer independently.
As in the case of the two reflecting binomial distributions, there
is only one feasible sorting in the top layer. The problem for the bottom layer is identical to the example
of positive and negative sorting where worker skills are represented
by x_L and x_H, while jobs are represented by z_L and
z_H satisfying z_L<x_L<z_H<x_H. The assumed distributions
of skill levels imply that d_LL=d_HH=1,d_LH=2 and d_HL=4.
In this case, the sorting within the top layer is positive since 2≤2^ζ+4^ζ
for all ζ∈(0,1).
The full optimal assignment is shown in Figure <ref>. Consider the job with skill difficulty 3. This job is paired with workers of skill 1, 3, and 4. Similarly, the workers with skill type 1 are paired with jobs of type 0, 1, and 3. We emphasize that, even without perfect pairing (the bottom row of the bottom panel, circular arcs), the job with skill difficulty 3 is a part of both positive and negative pairing.
§ WAGES AND FIRM VALUES
We determine the equilibrium wages and firm values by characterizing
the solution to the dual planning problem (<ref>). The presentation is divided into two parts. The first part characterizes the
dual for mismatched workers and jobs by constructing the local hierarchical
structure which delivers the shadow cost of mismatch. The second
part then constructs the dual for both the mismatched and perfectly
paired workers. Our construction of the dual solution and characterization of its local hierarchical structure are interesting not only from the economic perspective, but also are new to the optimal transport literature.
Mismatched Workers and Jobs. We consider a problem with n workers with skill levels in a set
X and n jobs with difficulty levels in a set Z with potentially
multiple workers at each skill level and multiple jobs at each difficulty
level, where X and Z are disjoint after the removal of perfect pairs. We denote by S=X∪ Z the set of all skill levels.
Suppose that an optimal assignment π consists of n worker-job
pairs (x_i,z_i) ∈Γ_π. Our goal is to first construct a function
ϕ:S→ such that for each worker x and every job z,
ϕ(x)-ϕ(z)≤ c(x,z), which holds with equality if the assignment
π pairs worker x to job z.[Equivalently, we construct worker wage function ϕ:X→ and
firm value function ψ:Z→ such that for each worker x
and job z, ϕ(x)+ψ(z)≤ c(x,z), where the equality holds
if the optimal assignment π matches x with z, that is (x,z)∈Γ_π.
Since the intersection of the set of workers and the set of jobs
is empty these formulations are equivalent.] This gives the dual potentials ϕ and ψ, yielding
a shadow cost ϕ on X∪ Z of mismatch for the worker and the job via the connection
ψ(z)=-ϕ(z) for all mismatched jobs z ∈ Z.
We propose a construction of the dual solution that is specific to
the model of composite sorting. This mechanism builds on a local hierarchical
structure for the shadow prices of mismatch. We show that locality
and hierarchy are direct consequences of the absence of intersecting
pairs. The main implication of this structure is that the relative
wages are determined locally – for any two skills s and s'
in a given skill group, their relative wages ϕ(s)-ϕ(s') can
be computed only based on information in this skill group.[Since the optimality of a dual potential is invariant constant shifts, the relative difference ϕ(s)-ϕ(s') contains all information of the solution to the dual problem.] Next, the mechanism aggregates this local structure by constructing
suitable level shifts that preserve the local structure of relative
wages within groups while ensuring consistency across all groups.[A local-global structure for the primal problem appears in <cit.> where he argues that the points of nondifferentiability in the dual problem can be used to determine local regions for the primal problem. Instead, we characterize a local-global structure for the dual solution directly using the primal problem. The primary technical difficulty in our construction is to ensure consistency at every scale from local to global via aggregation of the local relative wages.
The local region generally does not appear in the case of convex costs. For instance, when all worker skills
are lower than each job difficulty, the optimal assignment for a convex
cost is the positive sorting, which allows for no local regions (except
for the whole set) since any two pairs intersect. In contrast, for
a concave cost, every pair forms a local region regardless of how
the worker skills and jobs are located. Therefore, our findings on
the hierarchical structure for the dual problem are specific to concave
costs.]
Figure <ref> illustrates our local hierarchical structure.
The lower skill group has skills in the interval between x_1
and z_1. The higher skill group has skills in the interval between
x_2 and z_2. The relative shadow cost of mismatch for all
skills within either the first or the second group is determined
solely within each group. That is, the wage determination is local
by group. Wage determination is also hierarchical within groups. In
the lower skill group, the wage is first determined for the innermost
pair (x_4,z_4) which contains no nested skill groups, then
for the intermediate pair (x_3,z_3), and finally for the outer
pair (x_1,z_1). In other words, hierarchical structure implies
that we move sequentially from lower-level pairs to higher-level pairs.
At each stage, wages depend only on information from the skill group
nested within the progressively larger group. For the higher skill
group, the relative wage for the pair (x_2,z_2) is thus constructed from
the relative wages for both pairs (x_5,z_5) and (x_6,z_6)
which are, in turn, determined locally. Finally, the wages for the
outermost pair (x_0,z_0) are constructed using the relative
wages for the first and the second skill group. The formal definition
of the local hierarchical mechanism is analogous to this example but
is notationally more involved. We present a condensed statement of
the theorem here and include the complete definition of the mechanism,
the full statement of the theorem, and the proof in the Appendix.
Given an optimal assignment,
the local hierarchical mechanism constructs an optimal dual pair (ϕ,ψ)
where ψ=-ϕ. Within each skill group, relative wages are
determined locally: for any two points s and s' in a skill group,
ϕ(s)-ϕ(s') depends only on the pairings within the group.
We next use the dual functions to define worker wages and firm values
for these non-overlapping segments of the worker distribution and
the job distribution. We let worker wages be w(x)=g(x)-ϕ(x)
and firm values be v(z)=h(z)-ψ(z). The first observation is
that the assignment π which solves the primal mismatch cost minimization
problem (<ref>) also solves the primal output maximization
problem (<ref>). Moreover, w(x)+v(z)≥ y(x,z) holds for all
(x,z) with equality if (x,z)∈Γ_π, where y(x,z)=g(z)+f(x)-c(x,z).
By Lemma <ref>, it follows that (w,v) is a dual optimizer
for the output maximization problem. In sum, given the shadow mismatch
cost (ϕ,ψ) for the minimization problem without overlapping
parts, the dual pair (w,v) for the maximization problem without
overlapping parts is obtained.
Incorporating Perfectly Paired Workers and Jobs. Up to this point, we have addressed
the issue of determining worker wages and firm values in the output
maximization problem where there is no overlap between the distributions
of workers and jobs. Next, we discuss how these wage and value functions
can be used to construct worker wages and firm values for the problem
with overlapping distributions.
Before we formalize our construction, an informal description
is helpful. We start with an equilibrium of only mismatched workers
and jobs. We then add perfectly matched firms and determine what income
each firm could maximally generate given mismatched workers and wages
w̃ that is obtained in the discussion above. We next introduce perfectly matched workers and pass
on the new information, the assessed value of all jobs, to both mismatched
and perfectly matched workers. We then determine what wage income
both the imperfectly and perfectly paired workers would generate given
the compensation required by firms. As a result, we obtain the required
wages for both mismatched and perfectly paired workers. We pass on
this information, the compensation required by workers, further to
all firms such that all firms now have information about all workers.
Finally, we determine what income all firms would generate given all
workers and their required compensation. The dual values are the required
compensation of workers and firms in the final step. We next formalize
this sequential construction.
After removing the common parts of distributions, denote the sets
of remaining workers and jobs as I and J. We start by defining
the first auxiliary firm decision problem, which is the problem of
a firm restricted to choosing an employee among only mismatched workers
x∈ I, that is, the workers who are not in perfect pairs. Formally,
a firm with job z∈ I∪ J solves: ṽ(z):=max _x∈ Iy(x,z)-w̃(x).
We denote by ṽ the firm mismatch compensation, the maximum
profits firms can attain given a set of mismatched workers and wage
schedule w̃. We use firm mismatch compensation to define
an auxiliary worker decision problem, which is the problem of a worker
x∈ I∪ J choosing any job, including the perfect pairs, given
the firm mismatch compensation schedule v̂:
ŵ(x):=max_z∈ I∪ Jy(x,z)-ṽ(z).
We set up a second auxiliary firm decision problem, which is the problem
of a mismatched job z∈ J now choosing an employee among all
workers (perfectly aligned and mismatched) subject to auxiliary wage
schedule ŵ:
v̂(z):=max_x∈ I∪ J y(x,z)-ŵ(x).
We refer to v̂ as mismatched firm compensation, since it represents
the profits of firm type z∈ J that is mismatched in equilibrium.
Equilibrium wages are formulated using auxiliary wage income for mismatched
workers, w(x)=ŵ(x) for all x∈ I, as well as mismatched
firm compensation, v(z)=v̂(z) for all z∈ J, to set w(x)=-v(x)
for all x∈ J. Equilibrium firm values v are then given by
v(z)=-w(z) for every job z∈ I∪ J. Theorem <ref>
shows that the wage function w and the firm value function v
indeed solve the dual problem for the full assignment problem between
worker distribution F and job distribution G.[We can extend the domain of wages w and values v to K=X∖(I∪ J)
by setting w(x)=max_z∈ I∪ Jy(x,z)-v(z) for x∈ K and
v(z)=-w(z) for z∈ K.] The constructed functions (w,v)
are a dual solution for the sorting problem between worker distribution
F and job distribution G, that is, w(x)+v(z)≥ y(x,z), where equality holds everywhere with respect to Γ_π. The proof of Theorem 3, as well as a formal analysis of the above mechanism, is in Appendix <ref>.
§ QUANTITATIVE ANALYSIS
The distinguishing feature of the model is frictionless wage dispersion within occupations. We explore the ability of the model to generate qualitative and quantitative patterns of wage dispersion within occupations.
Data. Our main data source is the American Community Survey. We consider all individuals between 25 and 60 years of age between 2010 and 2017. The final sample includes about 6.7 million individuals. We select this period to work with a single Standard Occupational Classification (SOC) code, which yields 497 distinct and consistent occupations. Our measure of labor income is wage and salary income before taxes over the past 12 months.[Labor income includes wages, salaries, commissions, cash bonuses, tips, and other money income received from an employer. We drop individuals with wages below a threshold to focus on workers who are attached to the labor market. This minimum is equal to the federal minimum wage times 52 weeks at 40 hours per week.]
Figure <ref> shows the dispersion of individual wages
within occupation. On the horizontal axis, we rank occupations by
the average wages earned in each occupation. For every occupation,
we calculate the dispersion in logarithmic wages within that occupation,
where the size of the circle indicates the share of employment within
the occupation. The salient data pattern is captured by the red solid
line which is a fractional polynomial fit. Wage dispersion within
occupations is sizable, with the average wage dispersion equal to
0.24 log points. Second, the wage dispersion within occupations is relatively
flat at the bottom 80 percent of occupations, but rapidly increases for the top fifth of occupations.
Analysis. We next calibrate the technology. We choose simple parameter values for the cost of mismatch:
ζ_p=ζ_κ=1/2 and ρ_p=ρ_κ=1.
These parameters, together with the distributions of workers and jobs,
determine the equilibrium assignment. We discipline the choice for
the production value of a worker independent of their job g(x)
to exactly replicate earnings data in the United States. That is,
we calibrate the function g to exactly replicate the wages at each percentile in the data.[We do not need to calibrate the function h as all our results are invariant to it. In principle, the function could be directly inferred using a measure of the value of a job.]
We now expand on the example of reflecting binomial mixture distributions that we discussed in Section <ref> to develop an understanding of the quantitative exploration. First, in Figure <ref>, we plot a continuous analog of the measure of underqualification in that example. It follows from our theoretical
analysis of Section <ref> that this measure is an important determinant of an optimal assignment. There are two peaks and one trough - an increasing measure of underqualification indicates mismatched workers; a decreasing measure of underqualification
indicates mismatched jobs. Figure <ref> thus indicates
mismatched workers with skill difficulty levels between 0 and 500 as well as
mismatched workers between 1500 and 2500. Similarly, Figure <ref>
indicates mismatched jobs with skill levels between 500 and 1500 as well as mismatched jobs with skill difficulties between 2500 and 3000. To explain the equilibrium assignment, we divide the measure of underqualification
into three symmetric regions. The regions are given by 0 to 1000, 1000 to 2000, and 2000 to 3000.
Let us consider the first region given by skills between 0 and 1000.
The analysis for the other two regions is analogous.[The intuition for separation into three regions is similar to the
example of reflecting binomial mixture distributions and is verified
formally using the Bellman algorithm. In general, separation
may not be optimal and a complete characterization of sorting for
arbitrary distributions and any concave cost function is constructed
using the Bellman recursion (<ref>). Given the separation of the
measure of underqualification it follows that our equilibrium sorting
is not sensitive to the technological parameter values.] In this region, the measure of underqualification linearly increases
and then linearly decreases, as we plot in the left panel of <Ref>. The underlying distribution of the mismatched workers is plotted
in the middle panel: a uniform distribution of workers with
skills between 0 and 500. The underlying distribution of the mismatched
jobs is uniform between 500 and 1000 and is plotted in the right panel.
To understand the optimal assignment, consider the workers x_1 and x_2 (where x_1<x_2) and the jobs z_1 and z_2 (where z_1<z_2).
By the principle of no intersecting pairs, it follows that we optimally
pair worker x_1 with job z_2 and worker x_2 with job
z_1. There are only two possible pairings. The first is positive
assortative matching: (x_1,z_1) and (x_2,z_2). The second
is negative assortative matching: (x_1,z_2) and (x_2,z_1).
Positive assortative matching here leads to intersections, contradicting
the property of no intersecting pairs, and, hence, is not optimal.
Negative assortative matching is the only non-intersecting configuration
and is thus optimal. Since this reasoning holds for any two workers
and two jobs in this region it follows that all workers and jobs are
negatively sorted. Alternatively, we could have established the optimal
assignment directly from the principle of layering. Since each layer
within the region contains a single worker and a single job, the optimal
assignment pairs them.
The optimal pairing features significant variation in mismatch. The
mismatch varies from almost zero for the worker at skill (slightly
below) 500 and the job (slightly above) 500 to the mismatch of 1000
for the worker at skill 0 and the job at skill 1000. In contrast,
if sorting were positive, there would be no variation in mismatch
– mismatch for each worker-job pair would equal 500.
Negative sorting in this region implies that more valuable jobs feature larger fixed investments. The worker with the highest skills is paired with the job with the lowest skills demands meaning that the mismatch (z-x) between the worker and the job is small. Since mismatch is small and technology choice increases in mismatch, the extent of investment is small. However, the worker with the lowest skills is paired with the most valuable job. To ensure that the value of this job is not significantly diminished, a large investment is made. An example would be the case of welding (SOC 51-4120, mean wage of 45 thousand dollars) and the adoption of collaborative welding robots (cobots).[A welding cobot consists of a robotic arm with welding instruments attached. A high-end cobot costs about 100 thousand dollars versus 5 thousand dollars for a basic industrial welding machine.] A low-skill welder (with high mismatch between the skill and the
job) is assisted by a cobot which ensures the quality of the output. A high-skill
welder (with no mismatch between the skill and the job) instead completes
the job without robotic assistance. In the right region of <Ref>, the intuition is similar for the case of surgeons (Physicians
and Surgeons SOC 29-1060 with a mean wage of 213 thousand dollars is the
top-ranked occupation). A low-skill surgeon is assisted by a robotic surgical system while a high-skill surgeon operates without robotic assistance.[A surgical robot consists of a control console and robotic arms with surgical instruments and costs about 2 million dollars.] The
welding company or a surgical practice makes investments in technology in order to produce valuable output with minimal mismatch costs.
In the middle region, workers are more qualified than the job requires
and firms invest in amenities for more skilled employees to reduce
their utility cost of mismatch. Consider the case of semi-truck
drivers (SOC 53-3030, mean wage 47 thousand dollars). A high-skill
trucker drives a new truck with a quiet cabin, enhanced sleep space, and driver assistance technologies such as adaptive cruise control and
digital mirrors. A low-skill trucker drives a basic model without
such features.[A new high-end Kenworth Signature truck costs about 250 thousand dollars
versus an older basic model that can be purchased for about 25 thousand
dollars or less.] A high-skill computer user support specialist (SOC 15-1150, mean
wage 64 thousand dollars) has an option to work from home using investments
in remote access and control software. A low-skill computer support
specialist instead works on-site in person.[For more empirical and theoretical discussion on the provision and valuation of amenities, see, amongst others, <cit.>, <cit.>, <cit.>, <cit.>, <cit.>, and <cit.>.]
Second, we add common parts to the distributions of workers and jobs.
In particular, we add 250 workers and 250 jobs with identical skill
levels between 750 and 1000. Following Section <ref>, an optimal
assignment pairs these workers and jobs to maximize the number of
perfect pairs. We illustrate the resulting new distributions of workers
and jobs in <Ref>. Thus, we now have jobs without wage dispersion
with skill difficulty between 500 and 750 and jobs with wage dispersion
and skill difficulty between 750 and 1000. Two distinct workers
work in each of these jobs: one positively sorted worker in a perfect
pair, and one negatively sorted worker. Consider a job with skill
demand 800 as indicated by the horizontal dashed line in the
right panel of <Ref>. The horizontal dashed line intersects the assignment at two points. At the right intersection, the worker is perfectly paired and has skill 800. There is no mismatch for this worker. At the left intersection, the worker's skill is instead 200 and the worker is mismatched. No additional technology investment is necessary for a worker who is perfectly matched, while a worker with lower skills benefits from technology. Consider the example of welders. The welder with skill 200 is assisted by a cobot to ensure that the output is not diminished due to skill mismatch. The perfectly paired welder with skill 800 does not need a cobot and instead works with a standard manual welding machine.
The skill is a normalization that represents workers' rank. We now explain how the results on sorting by skills can be linked to sorting by wages. To convert skills into wages we use a one-to-one ranking between workers' positions in the skill distribution and their corresponding position in the earnings distribution. As an illustration, a worker located at the lowest point of the skill distribution (skill level 0) would earn a salary of 16 thousand dollars, which is the lowest possible wage level. Similarly, a worker situated in the middle of the skill distribution earns a wage of 47 thousand dollars (the median of the earnings distribution).
The key attribute of our model is its ability to create wage dispersion within the same job. The analysis above concluded that there is dispersion of skills in the same job and thus there is corresponding dispersion of wages within jobs as well. On the other hand, a model that delivers either positive or negative sorting cannot result in any variation in skill levels within a particular job, and as a consequence, does not create any wage dispersion within that job. Furthermore, any model that pairs only one worker to each job does not generate any wage dispersion within jobs.
In our example above, the same job is performed by a high-skill welder and a low-skill welder assisted by a cobot. It should be emphasized that this situation is different from a scenario where a high-skill welder is assigned to a more complex job (for example, underwater welding requiring specialized skills) and the low-skill welder is assigned to a simpler job (for example, assembling an industrial boiler). This would result in wage dispersion not within the same job, but rather across two different jobs: the complex and the simple job.
By combining the optimal assignment within the three regions, we find that the model delivers sizable wage dispersion in occupations with high and low mean wages. Consider a high-skill occupation such as surgeon. There is a large wage variation at the top of the income distribution. A high-skill surgeon earns a multiple of the wages of a low-skill surgeon. According to our model, a low-skill surgeon assisted by a robotic surgical system performs the same job as a high-skill surgeon. As a result, the salary variation in this profession is significant, since it encompasses low-skill surgeons as well as high-skill surgeons. A similar intuition holds for the bottom of the wage distribution. The wage distribution exhibits a lower level of dispersion at the bottom compared to the top, and the model accounts for a sizable part of this reduced level of dispersion. In contrast, the model only accounts for a moderate portion of wage dispersion in the middle of the income distribution. The reason is that the log-wage profile is relatively flat in this range. As a result, even though there may be substantial skill dispersion within a particular occupation, it does not give rise to substantial wage dispersion.
Our model explains 28 percent of the squared deviation and 32 percent
of the absolute deviation of wages across the sample. For the middle
of the distribution (20th to 80th percentiles), the model accounts
for 12 percent of the squared deviation and 19 percent of the absolute
deviation. In contrast, any one-to-one sorting model (for example,
a model with positive or negative sorting arising from submodular
or supermodular costs) would yield zero wage dispersion within occupations. For the bottom of the distribution (0th to 20th percentiles), the
model accounts for 20 percent of the squared deviation and 46 percent
of the absolute deviation. For the top of the distribution (80th to
100th percentiles), the model accounts for 57 percent of the squared
deviation and 58 percent of the absolute deviation.
§ CONCLUSION
We provide a complete solution to an assignment problem with heterogeneous workers and heterogeneous jobs when the underlying technology is neither supermodular nor submodular. Our analysis introduces a general tractable framework – composite sorting – that yields both multiple workers sorted to the same job and workers being a part of both positive and negative sorting. We also show that wages have a new local hierarchical structure with relative wages being determined by narrow skill groups and aggregated to determine wages at different scales. We illustrate the composite sorting framework quantitatively to argue that it may account for a sizable portion of wage dispersion within jobs.
econometrica
Composite Sorting
Online Appendix
Job Boerma, Aleh Tsyvinski, Ruodu Wang, and Zhenyuan Zhang
March 2023
§ PROOFS
In this appendix, we formally prove the results in the main text.
§.§ Proof to Lemma <ref>
Suppose the assignment π and the functions (w,v) satisfy our assumptions above. Then it holds that ∫ y(x,z) dπ=∫ w(x) dF+∫ v(z) dG. By Monge-Kantorovich duality, we must have that the maximum for the primal problem is attained by π and the minimum for the dual problem is attained by (w,v), as required.
§.§ Proof to Lemma <ref>
We show that a perfect pairing is made when feasible. By contradiction, suppose an optimal assignment contains pairings (x,z) and (x',z') when x'=z.[If either x = x' or z = z', a perfect pairing is naturally made since x' = z. We thus restrict our attention to the cases where x ≠ x' and z ≠ z'.]
By symmetry, it suffices to consider two cases. Consider first the case x≤ z'<z=x'. Since the cost of mismatch c̅ is strictly increasing, c(x,z') + c(x',z) = c(x,z') < c(x,z) ≤ c(x,z)+c(x',z') where the equality follows since c(x',z)=0. Thus, the cost of mismatch when making the perfect pairing is strictly lower than under the optimal configuration, which is a contradiction.
Second, we consider the case where x<x'=z<z'. In this case, the cost of mismatch c̅ is given by c(x,z')+c(x',z) = c̅(z'-x) since c(x',z)=0. To arrive at a contradiction, choose some weight λ∈ (0,1) to scale the maximum distance such that z-x = (1-λ)(z' - x). Since the total distance is given by (z - x) + (z' - x') = (z' - x), we also have z'-x' = λ (z' - x). Since the cost of mismatch is strictly concave, we use strict concavity and add the two previous equations to obtain c̅(z-x) + c̅(z'-x') > c̅(z'-x). The output loss due to mismatch can be strictly reduced by assigning worker x to job z' and by perfectly assigning worker x' to job z, which is a contradiction.[<cit.> further show that Lemma <ref> extends with continuous worker and job distributions in higher dimensions. In these environments, the solution is partially characterized by two parts. Overlapping sets of the distributions are perfectly paired, and the remaining mass is assigned using Monge maps. In our economy featuring distributions with atoms the remaining mass is not assigned using one-to-one assignments as identical worker types fulfill different jobs. We highlight this feature of optimal assignments in the first example in Section <ref>.]
§.§ Proof to Lemma <ref>
To establish the result, we show that if two pairings (x,z) and (x',z') under an optimal assignment intersect, then the support of the assignment is not optimal.
By symmetry, it suffices to consider two cases.[There is a total of six distinct scenarios to consider, which can diagrammatically be represented by the following pairings:
< g r a p h i c s >
< g r a p h i c s >
< g r a p h i c s >
< g r a p h i c s >
< g r a p h i c s >
< g r a p h i c s >
. The first four scenarios do not contain intersecting pairs. The fifth scenario is the first scenario in the proof, while the sixth scenario is the second scenario in the proof.] First, consider the case x < z'< z <x'. Since the cost function is increasing, c(x,z') + c(x',z) = c̅(z'-x) + c(x' - z)< c̅(z-x) + c(x'-z') = c(x,z) + c(x',z'). The output loss due to mismatch is strictly reduced by assigning worker x to job z' and worker x' to job z, which is a contradiction.
Second, consider the case x < x' < z < z'. In this case, the cost of mismatch c̅ is given by c(x,z')+c(x',z) = c̅(z'-x) + c̅(z - x'). To arrive at a contradiction, choose some weight λ∈ (0,1) to average the minimum and maximum distance such that
z-x = (1-λ)(z' - x) + λ (z-x').
Since the total distance is given by (z - x) + (z' - x') = (z' - x) + (z - x'), we moreover obtain
z'-x' = λ (z' - x) + (1-λ) (z-x').
Since the cost of mismatch is strictly concave, we can use strict concavity and add the two previous equations to obtain c̅(z-x) + c̅(z'-x') > c̅(z'-x) + c̅(z-x'). The output loss due to mismatch can be strictly reduced by assigning worker x to job z' and worker x' to job z, which is a contradiction.
§.§ Layering and Proof to Lemma <ref>
To prove Lemma <ref>, we make use of the following result due to <cit.>. We repeat the result here for completeness.
Stability of Optimal Assignment. Let c(x,z) be a continuous non-negative cost function, and {F_n}_n∈, {G_n}_n∈ be sequences of distributions of workers and jobs, respectively. Suppose F_n→ F, G_n→ G weakly for some F, G,[This means that F_n→ F on continuity points of F and respectively for G.] and let π_n be an optimal assignment between F_n and G_n. If π_n→π in distribution, then π is an optimal assignment between F and G.
To establish Lemma <ref>, we first formally define F_ℓ and G_ℓ, the measures of the workers and the jobs in each layer. To obtain different layers for a general underqualification measure, we identify the skill levels where underqualification increases, and
the skill levels where underqualification decreases. Recall that an underqualification
measure H takes a finite number of values in a_0<a_1<…<a_L. Underqualification
increases from a_ℓ to a_ℓ+1 at a skill level s
if H(s_-)≤ a_ℓ<a_ℓ+1≤ H(s), where s_- represents
the limit from the left. Analogously, the measure of underqualification
decreases from a_ℓ+1 to a_ℓ at a skill level s
if H(s_-)≥ a_ℓ+1>a_ℓ≥ H(s). The set of skill
levels where underqualification increases is denoted by X_ℓ^↑:={: increases from to at skill level }
for all 1≤ℓ≤ L. Similarly, the set of skill levels where
underqualification decreases is denoted by X_ℓ^↓:={: decreases from to at skill level }.
Define the discrete measures for all layers 1≤ℓ≤ L by
F_ℓ:=(a_ℓ-a_ℓ-1)∑_x∈ X_ℓ^↑δ_x and G_ℓ:=(a_ℓ-a_ℓ-1)∑_x∈ X_ℓ^↓δ_x
where δ_x is the Dirac measure at x. It follows that
F=∑ F_ℓ and G=∑ G_ℓ. Note that F_ℓ and
G_ℓ are generally not probability measures as they are not
required to have total measure one.
Having defined the measure of workers and jobs in each layer, we next observe that the worker and job distributions are supported on disjoint sets and on a finite set of skills {s_j}_1 ≤ j ≤ S. We smooth both the discrete distributions of workers and the discrete distribution of jobs by replacing each atom in the worker and job distribution at level s_j by a uniform distribution on [s_j,s_j + ε] with the same mass for every 1≤ j≤ S, where ε is small enough such that the intervals [s_j,s_j+ε] for all 1≤ j≤ S do not intersect. In Figure <ref>, we provide an illustration of this procedure using the underqualification measure H of Figure <ref>. We denote the smoothed measure of workers by F_ε and the smoothed measure of jobs by G_ε, and the corresponding underqualification measure by H_ε. An optimal assignment given worker measure F_ε and job measure G_ε is given by π_ε. Since the mismatch cost c is continuous, by stability of the optimal transport, π_ε→π weakly where π is the optimal matching between workers F and jobs G.
Consider the support A^ℓ_ε := H_ε^-1((a_ℓ-1,a_ℓ)) for all layers 1≤ℓ≤ L and define the smoothed worker distribution F^ℓ_ε:= F_ε|_A^ℓ_ε and the smoothed job distribution G^ℓ_ε := G_ε|_A^ℓ_ε for every layer such that F_ε = ∑ F^ℓ_ε and G_ε=∑ G^ℓ_ε.[The choice of an open or closed interval (a_ℓ-1, a_ℓ ) does not matter because the inverse of the boundary points is negligible with respect to the measure F_ε + G_ε.] Moreover, let an optimal assignment between workers F^ℓ_ε and jobs G^ℓ_ε in layer ℓ be denoted by π^ℓ_ε. Clearly, this assignment π^ℓ_ε is supported on the set (A^ℓ_ε)^2.
Next, we establish that the sum of optimal assignments across layers ∑π^ℓ_ε is an optimal assignment between the smoothed worker distribution F_ε and the smoothed job distribution G_ε. Let π_ε be some optimal assignment between F_ε and G_ε. By cyclical monotonicity, the assignment π_ε is concentrated on a support Γ_ε that satisfies the property of no intersecting pairs. Since the smoothed distributions F_ε and G_ε are both atomless, this implies that any pairing (x,z)∈Γ_ε where x<z satisfies F_ε([x,z])=G_ε([x,z]). In turn, by the definition of the measure of underqualification H, this implies H_(x)=H_(z) meaning that x and z are both part of the same layer A^ℓ_ε. As a result, it follows that the support of the assignment π_ε is contained in the union of the support of all layers, or Γ_ε⊆∪ (A^ℓ_ε)^2. Since all the supports {A^ℓ_ε} are disjoint, the assignment π_ε|_(A^ℓ_ε)^2 transports between F^ℓ_ε and G^ℓ_ε. Since π^ℓ_ε is an optimal assignment between workers F^ℓ_ε and jobs G^ℓ_ε, it follows that the cost of mismatch for layer ℓ is greater under the assignment π_ε|_(A^ℓ_ε)^2, that is, ∫ c π̣_ε|_(A^ℓ_ε)^2≥∫ c π̣^ℓ_ε. By summing over all layers 1 ≤ℓ≤ L, we can write that
∫ c π̣_ε = ∑_1≤ℓ≤ L∫ c π̣_ε|_(A^ℓ_ε)^2≥∑_1≤ℓ≤ L∫ c π̣^ℓ_ε=∫ c ( ∑_1≤ℓ≤ Lπ^ℓ_ε ).
Since ∑π^ℓ_ε is a feasible assignment between the smoothed distributions F_ε and G_ε, and the mismatch cost is below the minimum mismatch cost, it follows that ∑π^ℓ_ε must be an optimal assignment.
To conclude the proof it follows from our construction and the stability of the optimal assignment that π^ℓ_ε→π^ℓ and ∑π^ℓ_ε→π weakly. Thus,
π=lim_→ 0∑_1≤ℓ≤ Lπ^ℓ_ε =∑_1≤ℓ≤ Llim_→ 0π^ℓ_ε = ∑_1≤ℓ≤ Lπ^ℓ.
§.§ Representation of Bellman Algorithm
We can follow <cit.> to further simplify solving the Bellman
equation. Rather than considering all potential pairings k as in
equation (<ref>), it suffices to compare only two
alternatives. Specifically, the minimal mismatch cost can be described
by the simple recursive equation:
V_i,j=min(c(s_i,s_j)+V_i+1,j-1,V_i,j-2+V_i+2,j-V_i+2,j-2),
where j-i is odd so that the assignment problem contains an equal
mass of workers and jobs. We now illustrate Bellman equation (<ref>). Consider, say,
V_3,8 which is the cost of an optimal pairing for the skills
in [s_3,s_8]. It is given as the minimum between two alternatives.
The first alternative is c(s_3,s_8)+V_4,7. This is the cost
of pairing s_3 and s_8 which is given by c(s_3,s_8)
and the minimal cost of pairing in [s_4,s_7] given by the value
V_4,7. The second alternative is V_3,6+V_5,8-V_5,6.
We use the Bellman equation (<ref>), with initial conditions,
to obtain the minimal cost of mismatch V_i,j for every pair (i,j)
such that 1≤ i<j≤2n.[For this Bellman formulation, the initial conditions are V_i,i-1=0
and V_i+2,i-1=-c(s_i,s_i+1). To observe the role of initial
conditions consider the assignment problems of size two and four.
When j-i=1, we obtain V_i,i+1=min(c(s_i,s_i+1)+V_i+1,i,V_i,i-1+V_i+2,i+1-V_i+2,i-1)=c(s_i,s_i+1).
When j-i=3, we obtain V_i,i+3=min(c(s_i,s_i+3)+V_i+1,i+2,V_i,i+1+V_i+2,i+3-V_i+2,i+1)=min(c(s_i,s_i+3)+V_i+1,i+2,V_i,i+1+V_i+2,i+3).
We note that both are indeed identical to the simple specification
in equation (<ref>).]
An optimal assignment between
workers F and jobs G sums an optimal assignment in each layer,
where the optimal assignment in each layer attains V_1,2n_ℓ
in the Bellman equation (<ref>).
Proof to Proposition <ref>. The proposition is proved in two steps. First, we show the minimum aggregate cost of mismatch is described by the Bellman equation. Given the Bellman equation, we then characterize the assignment that attains the minimum cost of mismatch as discussed in the main text.
Cost of Mismatch. We prove by induction that each mismatch cost V_i,j in (<ref>) represents the minimal cost of mismatching between the distribution of workers F|_[s_i,s_j] and the distribution of jobs G|_[s_i,s_j]. Let us first check the base cases |j-i|≤ 3. Recall the initial conditions V_i,i-1=0 and V_i+2,i-1=-c(s_i,s_i+1).
First,
V_i,i+1 =min( c(s_i,s_i+1) + V_i+1,i,V_i,i-1 + V_i+2,i+1 - V_i+2,i-1)
=min(c(s_i,s_i+1),c(s_i,s_i+1))=c(s_i,s_i+1).
This is the correct cost of matching as there exists only a unique assignment with one worker and one job.
Second,
V_i,i+3 =min( c(s_i,s_i+3) + V_i+1,i+2,V_i,i+1 + V_i+2,i+3 - V_i+2,i+1)
=min(c(s_i,s_i+3)+c(s_i+1,s_i+2),c(s_i,s_i+1)+c(s_i+2,s_i+3)).
This is the correct cost of matching since there are only two possibilities for an assignment in this case, match either the first and the fourth or the first and the second.
Suppose we know V_i,j is the minimum cost of mismatch for every |j-i|< 2n - 1. For the induction step, we show this also holds at |j-i| = 2n - 1, or the complete alternating assignment problem, where:
V_1,2n = min( c( s_1 , s_2n) + V_2, 2n-1, V_1,2n - 2 + V_3,2n -V_3,2n-2).
Denote by F_t = F|_[3,2n-2] and G_t = G|_[3,2n-2] the worker and job distributions on a thin support, and we let F_a = F + F_t and G_a = G + G_t denote the addition of the original worker and job distribution and their respective distributions on the thin support. In order to prove that the Bellman equation (<ref>) holds, we show that both directions hold, that is, V_1,2n≤min ( c( s_1 , s_2n) + V_2, 2n-1, V_1,2n - 2 + V_3,2n -V_3,2n-2 ) and V_1,2n≥min ( c( s_1 , s_2n) + V_2, 2n-1, V_1,2n - 2 + V_3,2n -V_3,2n-2 ).
We establish the ≤ direction by showing V_1,2n≤ c(s_1,s_2n)+V_2,2n-1 as well as V_1,2n≤ V_1,2n - 2 + V_3,2n -V_3,2n-2. The first inequality follows immediately. Take the optimal assignment in the interval [s_2,s_2 n-1], and pair the remaining elements, s_1 and s_2n, which induces a cost of mismatch c(s_1,s_2n)+V_2,2n-1. Since this is a feasible assignment for all workers and jobs on the interval [s_1,s_2 n] the minimum mismatch cost on this interval is below the mismatch cost of the constructed assignment, or V_1,2n≤ c(x_1,x_2n)+V_2,2n-1.
To prove V_1,2n + V_3,2n-2≤ V_1,2n-2 + V_3,2n, consider the assignment problem between workers F_a and jobs G_a. By Lemma <ref>, the minimal cost of mismatch is V_1,2n + V_3,2n-2. On the other hand, combining the two optimal assignments between F|_[1,2n-2] and G|_[1,2n-2] as well as between F|_[3,2n] and G|_[3,2n] gives a feasible assignment between workers F_c and jobs G_c. This shows that the optimal assignment cost between workers F_c and jobs G_c is less than V_1,2n-2+V_3,2n, which concludes the proof of the ≤ direction.
Next, we establish the ≥ direction, or V_1,2n≥min( c( s_1 , s_2n) + V_2, 2n-1, V_1,2n - 2 + V_3,2n -V_3,2n-2). It suffices to establish that if V_1,2n < c( s_1, s_2n ) + V_2,2n-1 then V_1,2n+V_3,2n-2≥ V_1,2n-2+V_3,2n.[Logically, we prove V ≥min ( A,B ) by showing that V ≥ B or V ≥ A. We show this by proving the statement that if V < A, then V ≥ B.] Suppose V_1,2n < c(s_1,s_2n)+V_2,2n-1. This implies that an optimal assignment between workers F and jobs G does not contain the pairing (s_1,s_2n). Suppose that s_1 is paired with s_j where j < 2n. The absence of intersecting pairs implies that the optimal assignment is concentrated on square subsets to the left and right of skill s_j, that is, π⊆ [s_1,s_j]^2∪[s_j+1,s_2n]^2. We denote the skill threshold in between s_j and s_j+1 by t = ( s_j + s_j+1 ) / 2.
We next claim that an optimal assignment π_t between the thin distribution of workers F_t and the thin distribution of jobs G_t has no pairing with a corresponding interval that contains the point t. By contradiction, suppose there does exist a pair (s_k,s_l) crossing the threshold t in π_t. Since the masses to the left and the right of t are equal, there also exists a pairing (s_k',s_l') that contains (s_k,s_l). This is illustrated by the blue arrows in Figure <ref>. Consider an optimal assignment π_a between the added distribution workers F_a and jobs G_a. By Lemma <ref>, π_a = π + π_t, and hence assignment π_a contains the pairings (s_1,s_j), (s_k,s_l), and (s_k',s_l'). This contradicts the property of no intersecting pairs. Since the optimal assignment π_t does not contain a pair whose interval contains t, it follows that π_t is concentrated on the support [s_3,s_j]^2 ∪ [s_j+1,s_2n-2]^2.
We combine the optimal assignment between workers F and jobs G with the optimal assignment between thinned distributions for workers F_t and jobs G_t to obtain the result. We construct a feasible assignment π_a,1 for the problem on [s_1,s_2n-2] by combining the optimal assignment π on [s_1,s_j] with the optimal assignment π_t on the interval [s_j+1,s_2n-2], so that π_a,1=π|_[s_1,s_j]^2+π_t|_[s_j+1,s_2n-2]^2. Analogously, we construct a feasible assignment π_a,2 for the problem on [s_3,s_2n] by combining the optimal assignment π on [s_j+1,s_2n] with the optimal assignment π_t on the interval [s_3,s_j] which generates π_a,2 = π_t|_[s_3,s_j]^2+π|_[s_j+1,s_2n]^2. Since the constructed assignments are feasible for the assignment problems on [s_1,s_2n-2] and [s_3,s_2n], respectively, we have (π_a,1)≥ V_1,2n-2 and (π_a,2)≥ V_3,2n. Finally, we observe that the addition of π_a,1 and π_a,2 solves the assignment problem with worker distribution F_a and job distribution G_a, such that π_a,1 + π_a,2 = π_a. These together yield V_1,2n-2+ V_3,2n≤(π_a,1) + (π_a,2) = (π_a) =V_1,2n+V_3,2n-2, completing the ≥ direction for (<ref>). This concludes the proof.
§.§ Other Examples
In this appendix, we provide additional illustrations of our theory.
Close to Linear Mismatch Costs. This example emphasizes
the dependence of the optimal sorting on the cost function. In particular,
we consider the assignment problem when ζ is close to 1, that
is, when the cost of mismatch is close to linear in the distance between
the worker skill and the job.[The linear case of mismatch (ζ=1) is the original formulation of the optimal transport problem due to Monge (1781) and has been well studied (<cit.>). See a discussion below.]
First, we maximize the number of perfect pairings. Second, we decompose the assignment problem into layers 0≤ℓ≤ L. Third, when ζ is close to one, the optimal assignment
within each layer is simple. Specifically, we show in Proposition
<ref> below that the optimal assignment within each layer is positive sorting which we denote by π_ℓ^+.
The simplicity of the optimal assignment within layer enables us to
provide a simple characterization of the overall solution in this case. The solution to the full assignment problem is given by the sum of the positive assignments within each layer. We refer to this assignment as the layered positive assignment denoted by π^+=∑π_ℓ^+.
Figure <ref> illustrates the layered positive assignment with
four workers and four jobs. The optimal assignment is given by the
top panel. To construct this assignment, we use the measure of underqualification
H in the bottom panel. The measure of underqualification induces
three independent layers. The decomposition yields two layers with
only one worker and one job (x_4,z_3) and (x_2,z_2)
for which there is no other option but to pair them. The third layer
contains skill levels (x_1,z_1,x_3,z_4). The assignment
positively pairs (x_1,z_1) and (x_3,z_4).
We summarize the lessons from this subsection in Proposition <ref>.
Given a worker distribution
F and a job distribution G, there exists ζ̅<1 such
that for any ζ∈[ζ̅,1], the layered positive assignment
π^+ is optimal.
After maximizing perfect pairs, by Lemma <ref>, we can restrict attention to assignments between worker and job distributions that are supported on disjoint sets. This means that the distributions F and G are supported on a finite set S, and we denote by δ the smallest pairwise distance between elements in S, and by D the largest pairwise distance between elements.[This proof can be extended to the case of continuous distributions when F and G are compactly supported with the measure of underqualification H:=F-G satisfying that both H and -H have finitely many local maxima and those maxima are strictly above zero.]
We show there exists 0<ζ̅<1 such that for any ζ∈[ζ̅,1], the layered positive assignment π is optimal with respect to the mismatch cost c(x,z). To prove the result, consider ζ̅ such that for any δ≤δ'≤ D'≤ D:
2^1-ζ̅(D'-δ')^ζ̅≤δ'^ζ̅+D'^ζ̅.
Such a ζ̅ exists because equation (<ref>) with D'-δ'≤δ is vacuously true while otherwise both sides of (<ref>) are uniformly continuous in ζ̅ on {(δ',D'):δ≤δ'≤ D'≤ D, D'-δ'> δ} and “<" holds uniformly when ζ̅=1. Consider ζ∈ [ζ̅,1]. It suffices to prove that the optimal assignment within a layer does not contain any nested arc for the mismatch cost |x-z|^ζ.
By the principle of layering Lemma <ref>, we decompose both measures F_n and G_n into layers. Here we assume without loss of generality that the lowest skill worker comes before the lowest skill job: x_1<z_1. On each layer there are 2 k equal masses on the skill levels x_1 < z_1 < … < x_k < z_k in S that are at least δ apart. The maximum distance within this layer is exceeded by D > z_k - x_1. Let {x_j}_1≤ j≤ k be the locations of mass on the layer for workers F_n, and let {z_j}_1≤ j≤ k be the locations of mass on the layer for jobs G_n. By contradiction, suppose that the optimal assignment within this layer instead does contain a nested arc, so it holds for some x_1≤ u<v<s<t≤ z_k that
(t-u)^ζ + (s-v)^ζ≤ (t-s)^ζ + (v-u)^ζ.
Since by concavity of the function x^ζ for x ≥ 0,
(t-s)^ζ + (v-u)^ζ≤ 2(1/2(t-s)+1/2(v-u))^ζ=2^1-ζ((t-u)-(s-v))^ζ.
Putting t-u=D' and s-v=δ' in (<ref>) leads to a contradiction.
Hence the optimal assignment within this layer does not contain any nested arc for ζ∈ [ζ̅,1].
The implication
of the proposition is that for mismatch power values close to one, the
solution can be directly constructed by constructing the measure of
underqualification, and constructing the positive alternating assignment by layer.[<cit.> calls the layered positive assignment an excursion coupling, and shows that the layered positive assignment is
the limit of some optimal couplings as ζ→ 1^-. We complement their result by proving the existence of a threshold ζ̅ beyond which the layered positive assignment is optimal for our environment.]
While this assignment generates positive sorting within each
layer, we emphasize this does not imply positive sorting overall
as we demonstrated in the example of two binomial distributions. In
particular, there is negative sorting since x_3 is sorted with z_4 but x_4 is sorted
with z_3.
Linear Cost of Mismatch. The last example naturally begs
the question what is optimal when the cost of mismatch is linear in
the distance between worker skills and job difficulties. The linear
case is exactly the specification of the mismatch cost prior to the
technology choice in Section <ref>. This formulation is in fact the
original formulation of the optimal transport problem due to Monge
(1781) and has been well studied (<cit.>). When the cost of mismatch is linear, an optimal assignment
is not unique. To illustrate this, we argue that both the Bellman
equation and positive sorting are optimal.
To see that the Bellman equation also delivers the optimal
assignment in the case of linear costs of mismatch, we note that the
derivation of the Bellman equation did not require that the cost of
mismatch was strictly concave, only that the cost of mismatch was
concave. As a result, the same approach as before characterizes an optimal
assignment.
Another solution to the assignment problem with linear costs of mismatch
is positive sorting. In this case, as with convex costs of the distance,
the production function is supermodular, and it follows that a positively
sorted assignment is optimal.
§.§ Local Hierarchical Algorithm
We propose a new algorithm specifically tailored to the model of composite sorting, which has two distinct merits. First, it is more efficient than the existing generic algorithms, as shown in Appendix <ref>. Second, and more importantly, this new algorithm reveals
a hierarchical structure of the dual potential functions,
highlighting an implication of the absence of intersecting pairs to dual optimizers.
This hierarchical structure
means that a local dual optimizer within each region, which is the interval between two points in a pair,
is computed from the local dual optimizers on its subregions.
This hierarchical structure
leads to the following separation property of the global dual optimizer ϕ:
for any two points s and s' in one region,
ϕ(s)-ϕ(s')
can be computed only based on points within this region, and thus it does not depend on points outside.
We will describe this structure in detail and our algorithm below.
Recall that in our setting, we consider a problem with n workers with skill levels in
X and n jobs with difficulty levels in Z, where X and Z are disjoint sets. We denote by S=X∪ Z the set of all skill levels. In what follows, when we mention an interval [x,z], we meant for the set of points between x and z, regardless of whether x<z or z<x.
Our algorithm relies on recursive computations of ϕ constrained on smaller subsets of S.
To explain such a recursive procedure, we need some preparation by introducing the notion of subpairs.
A pair (x,z) is called a subpair of the pair (x_0,z_0) if
(x,z) is a non-nested pair inside the interval [x_0,z_0] that is not equal to (x_0,z_0).
In Figure <ref>, the pairs (x_2,z_2) and (x_3,z_3) are
subpairs of the pair (x_0,z_0). The pair (x_1,z_1) is
a subpair of (x_2,z_2) but not of (x_0,z_0) as it is
nested in (x_2,z_2). For (x,z)∈Γ_π,
let X_[x,z] denote the set of all points in
X between x and z inclusive of the boundary, and similarly for Z_[x,z].
We process each pair (x_0,z_0)∈Γ_π
sequentially in a certain order described below to get a local dual optimizer on [x_0,z_0], that is, a function
ϕ_[x_0,z_0] such that for any (x,z)∈ X_[x_0,z_0]× Z_[x_0,z_0],
ϕ_[x_0,z_0](x)-ϕ_[x_0,z_0](z)≤ c(x,z) which
holds with equality when (x,z)∈Γ_π. We observe that this property is preserved if ϕ_[x_0,z_0]
is shifted by any constant a∈ℝ.
A simple illustrative example is given in Figure <ref>.
We start with the pair (x_1,z_1) and found a local
dual optimizer ϕ_[x_1,z_1]. Here, the local dual optimizer
is any function ϕ_[x_1,z_1] satisfying ϕ_[x_1,z_1](x_1)-ϕ_[x_1,z_1](z_1) = c(x_1,z_1)
as the only pair contained in
[x_1,z_1] is (x_1,z_1).
We then process the pair (x_2,z_2). A local dual optimizer
on [x_2,z_2] is a function ϕ_[x_2,z_2] satisfying
ϕ_[x_2,z_2](x)-ϕ_[x_2,z_2](z)≤ c(x,z) for (x,z)∈{(x_1,z_1),(x_2,z_2),(x_1,z_2),(x_2,z_1)}
with equality holding for (x,z)=(x_1,z_1) and (x,z)=(x_2,z_2).
We proceed with the subpair (x_3,z_3) and finally the remaining pair (x_0,z_0).
Below is a full description of the algorithm, where ϕ, ϕ_i, x_i and z_i are local variables which vary across each iteration, and ϕ_[x,z] for (x,z)∈Γ_π are global variables which are the output of the algorithm.
* Pick any pair (x_0,z_0)∈Γ_π that has not been processed such that all subpairs of (x_0,z_0) have been processed.
Let (x_1,z_1),…,(x_p,z_p) be the subpairs ordered in dictionary order[A vector (a_1,…,a_d) is smaller than a vector (b_1,…,b_d) in dictionary order if either (a_1,…,a_d)=(b_1,…,b_d) or there exists p=1,
…,d such that a_i=b_i for i=1,…,p-1 and a_p+1<b_p+1.]
with potential functions ϕ_i:=ϕ_[x_i,z_i]
for i=1,…, p.
* If p=0, then let ϕ (z_0)=0 and ϕ (x_0)=c(x_0,z_0).
* If p≥ 1, then continue with the following sub-steps.
* If p>1, let (β_2,…,β_p)∈^p-1
be a solution to the inequality system
max(c_00-c_0n-c_m0, -c_mn) + c_nn≤∑_k=n+1^mβ_k≤min(c_0m+c_n0 -c_00 ,c_nm) -c_mm
for all 1≤ n<m≤ p,
where c_ij=c(x_i,z_j) for i,j∈{1,…,p}. We show the existence of such (β_2,…,β_p) in Lemma <ref>.
* For i=1,…,p,
let
ϕ(s)= ϕ_i(s)+ ∑_k=i+1^p β _k +ϕ_p(x_p)-ϕ_i(x_i)
for s∈ X_ [x_i,z_i] or s∈ Z_[x_i,z_i]. The above sum is 0 if i=p.
* Define ϕ(x_0) and ϕ(z_0) by the following equations
ϕ(z_0) =max_i∈{1,…,p} (ϕ(x_i)-c(x_i,z_0)) if x_1≠ x_0,
min_i∈{1,…,p}(ϕ(z_i)+c(x_0,z_i))-c(x_0,z_0) elsewhere;
ϕ(x_0) =ϕ(z_0)+c(x_0,z_0).
* Let ϕ_[x_0,z_0] be equal to ϕ.
* Return to step 1 with the next pair to process, or terminate if all pairs have been processed.
We note from step 3(b) that
for s,s'∈ X_[x_i,z_i]∪ Z_[x_i,z_i],
we have ϕ(s)-ϕ(s')=ϕ_i(s)-ϕ_i(s'). This means that after many iterations, the value of ϕ(s)-ϕ(s') does not change, and therefore it depends only on points in the region [x_i,z_i].
There is some flexibility in the above algorithm
in choosing the order of processing the pairs in step 1 and in solving for (β_2,…,β_p) in (<ref>) in step 3(a). This flexibility is natural as the dual optimizers are not unique in general.
The order of processing the pairs does not affect the output of the algorithm because
each ϕ_[x_0,z_0] only depends on the local dual optimizers of its subpairs, which are all processed before this pair. A default order is to always choose the unprocessed pair (x_0,z_0) with the smallest x_0 satisfying the condition in step 1.
On the other hand, the choice of
(β_2,…,β_p) does affect
the output of the algorithm.
As a default, (β_2,…,β_p)
can be chosen as the solution of (<ref>)
which is the smallest in dictionary order.[Note that such a smallest solution always exists since (β_2,…,β_p) satisfying (<ref>) lies in a compact region.]
In this way, we obtain a unique output of the algorithm.
Nevertheless, in the next result, we will show that a dual potential ϕ is obtained from the algorithm with arbitrary choices of (β_2,…,β_p) in each iteration.
We illustrate the construction of the dual potential ϕ in a simple example where X={1,3,7}, Z={4,8,10}, and x_0=1, x_1=3, x_2=7, z_0=10, z_1=4, z_2=8, with the cost function given by c(x,z)=√(|x-z|). By the principles established in Section <ref>,
the optimal assignment π pairs x_i with z_i for all i={0,1,2} as displayed in Figure <ref>. Our goal is to construct a function ϕ: S → such that ϕ(x_i)-ϕ(z_j)≤ c(x_i,z_j) for all i and j in {0,1,2} with equality holding when i=j.
Following step 1 of the algorithm, we first process the pairs (x_1,z_1) and (x_2,z_2), as they do not have any subpair. Define ϕ_1(x_1)=ϕ_2(x_2)=1 and ϕ_1(z_1)=ϕ_2(z_2)=0, which are the local dual optimizers on [x_1,z_1] and [x_2,z_2], respectively. We now process the pair (x_0,z_0). According to (<ref>), the second step is to find β_2 ∈ℝ such that
max(c_00-c_01-c_20,-c_21)+c_11≤β_2≤min(c_02+c_10-c_00,c_12)-c_22.
Plugging in the values of x_i,z_i, we get
max(c_00-c_01-c_20,-c_21)+c_11=4-2√(3)≈ 0.536; min(c_02+c_10-c_00,c_12)-c_22=√(3)-1≈ 0.732.
Following the default choice of choosing the smallest β_2, we set β_2=4-2√(3).[Any value in between 4-2√(3) and √(3)-1 will produce a dual potential. That the left-hand side of (<ref>) is no more than the right-hand side of (<ref>) is not a coincidence. We will prove that the system of inequalities (<ref>) always admits a solution in Lemma <ref> in Appendix <ref>.
The set of solutions is always non-empty, although, intuitively, the larger |S| is, the less freedom for the dual optimizer one has.]
Following step 3(b) of the algorithm, we have
ϕ(x_2) =ϕ_2(x_2)+0+ϕ_2(x_2)-ϕ_2(x_2)=c_22=1;
ϕ(z_2) =ϕ_2(z_2)+0+ϕ_2(x_2)-ϕ_2(x_2)=0;
ϕ(x_1) =ϕ_1(x_1)+β_2+ϕ_2(x_2)-ϕ_1(x_1)=c_22+β_2=5-2√(3);
ϕ(z_1) =ϕ_1(z_1)+β_2+ϕ_2(x_2)-ϕ_1(x_1)=c_22-c_11+β_2=4-2√(3).
Further, step 3(c) yields
ϕ(z_0) =max(ϕ(x_1)-c_10,ϕ(x_2)-c_20)=1-√(3);
ϕ(x_0) =ϕ(z_0)+c_00=4-√(3).
One can verify numerically that the function ϕ defined above satisfies the conditions of a dual optimizer.
§.§ Proof to Theorem <ref>
We prove Theorem <ref> in two parts. First, we prove there exists a solution (β_2,…,β_p) to (<ref>), in Lemma <ref>. Second, we prove that the function ϕ defined in (<ref>)-(<ref>) is indeed a local dual optimizer on S_[x_0,z_0].
Suppose (x_1,z_1),…,(x_p,z_p) are ordered subpairs of pair (x_0,z_0) in the optimal assignment π. Define c_ij:=c(x_i,z_j). Then the system of inequalities, where for all 1≤ n<m≤ p:
max(c_00+c_nn-c_0n-c_m0,c_nn-c_mn)≤∑_k=n+1^mβ_k≤min(c_0m+c_n0 -c_00-c_mm,c_nm-c_mm)
admits a solution (β_2,…,β_p).
We use Farkas' Lemma to prove our existence result, specifically, to have a necessary and sufficient condition for a system of linear inequalities to have a solution. We state Farkas' Lemma for completeness.
Farkas.
Let A be a d_1× d_2 matrix, b∈^d_1, and let x=(x_1,…,x_d_2)^⊤ be a set of real-valued variables. Then the system Ax≥ b allows a set of solutions if and only if for any y∈ [0,∞)^d_1 such that y^⊤ A=0, it holds y^⊤ b≤ 0.
We aim to show that equation (<ref>) admits a solution (β_2,…,β_p)∈^p-1. We observe that we can think of (<ref>) equivalently as the following set of inequalities:
∑_k=n+1^mβ_k ≥ c_00+c_nn-c_0n-c_m0
∑_k=n+1^mβ_k ≥ c_nn-c_mn
- ∑_k=n+1^mβ_k ≥ c_mm - c_nm
- ∑_k=n+1^mβ_k ≥ c_00+c_mm-c_0m-c_n0
for all 1 ≤ n < m ≤ p. All inequalities implied by (<ref>) are thus linear in the variables (β_2,…,β_p). Matrix A is given by columns with values (-1,0,+1), while vector b is governed by the costs c.
By Lemma <ref> it suffices to prove the following.[Equation (<ref>) is the analog of y^⊤ A=0 in the statement of Farkas' Lemma. Specifically, we use y^⊤ A=0 if and only if y^⊤ A z=0 for all z ∈ℝ^d_1. Applied to our setting, where β takes the position of x in Farkas' Lemma, this states that the weighted sum of all left-hand sides in the system of inequalities equals zero. Equation (<ref>) below is similarly the analog of y^⊤ b≤ 0 in the statement of Farkas' Lemma.] For any set of non-negative weights (λ^+_mn,λ^-_mn,ω^+_mn,ω^-_mn),1≤ n<m≤ p on each of the inequalities above such that
∑_1≤ n<m≤ p(λ^+_mn+ω^+_mn)∑_k=n+1^mβ_k= ∑_1≤ n<m≤ p(λ^-_m,n+ω^-_m,n)∑_k=n+1^mβ_k, for all (β_2,…,β_p),
it holds that
∑_1≤ n<m≤ p( _mn(c_00+c_nn-c_0n-c_m0)+_mn(c_nn-c_mn) )
≤∑_1≤ n<m≤ p( _mn(c_0m+c_n0-c_00-c_mm)+_mn(c_nm-c_mm) ) .
We start by simplifying equations (<ref>) and (<ref>). We first simplify equation (<ref>). Since (<ref>) has to hold for all (β_2,…,β_p), we note that the coefficient on each β_k has to equal zero. For each 2≤ k≤ p, equating the coefficients for some β_k requires
∑_m,n( λ^+_mn+ω^+_mn) =∑_m,n( λ^-_mn+ω^-_mn),
where we sum over all (m,n) satisfying 1≤ n<k≤ m≤ p, that is, we sum over all equations where β_k appears. Furthermore, subtracting equation (<ref>) evaluated at k from equation (<ref>) evaluated at k+1 yields:
∑_k<m≤ p(_mk +_mk) - ∑_k<m≤ p(_mk+_mk) = ∑_1≤ n<k(_kn+_kn) - ∑_1≤ n<k(_kn+_kn),
for all 2 ≤ k<p.
We next simplify (<ref>). Rearranging (<ref>) by collecting terms by coefficients in front of c_ij leads to the equivalent form:
∑_1≤ n<m≤ p( λ^-_mn + λ^+_mn) c_00 + ∑_1<m≤ p( λ^-_m1+_m1) c_11 + ∑_1≤ n<p( λ^+_pn+_pn) c_pp
+∑_k=2^p-1( ∑_k<m≤ p( λ^-_mk+_mk) + ∑_1≤ n<k( λ^+_kn + _kn) ) c_kk
≤∑_1<m≤ pλ^-_m1c_01+∑_1≤ n<pλ^+_pnc_0p+∑_1≤ n<pλ^-_pnc_p0+∑_1<m ≤ pλ^+_m1 c_10
+∑_k=2^p-1( ∑_1≤ n<kλ^+_kn+∑_k<m≤ pλ^-_mk) c_0k+ ( ∑_1≤ n<kλ^-_kn + ∑_k<m≤ pλ^+_mk) c_k0
+∑_1≤ n<m≤ p_mn c_mn +∑_1≤ n<m≤ p_mnc_nm,
where the left-hand side of the inequality collects all “diagonal” elements, and the right-hand side collects all other elements.
Our next step in proving that equation (<ref>) indeed holds, is to show that both sides of equation (<ref>) represent transport costs of an assignment between a measure of workers F̃ and a measure of jobs G̃. Specifically, consider the assignment problem between a measure F̃ and a measure G̃, satisfying:
F̃ =∑_1≤ n<m≤ p(λ^-_mn+λ^+_mn)δ_x_0+∑_1<m≤ p(λ^-_m1+_m1)δ_x_1+∑_1≤ n<p(λ^+_pn+_pn)δ_x_p
+∑_k=2^p-1(∑_k<m≤ p(λ^-_mk+_mk)+∑_1≤ n<k( λ^+_kn+_kn))δ_x_k,
and, similarly,
G̃ = ∑_1≤ n<m ≤ p( λ^-_mn + λ^+_mn) δ_z_0 + ∑_1<m≤ p( λ^-_m1 + _m1) δ_z_1 + ∑_1≤ n<p( λ^+_pn + _pn) δ_z_p
+ ∑_k=2^p-1( ∑_k<m≤ p(λ^-_mk+_mk)+∑_1≤ n<k( λ^+_kn+_kn) ) δ_z_k.
Both measures may not be probability measures, but they do have the same total mass.
The fact that the left-hand side of (<ref>) represents a transport cost between workers F̃ and jobs G̃ is evident. Under this assignment each worker type is assigned to an identically indexed job, which have identical masses by construction of the worker distribution F̃ in (<ref>) and the job distribution G̃ in (<ref>). To establish the same on the right-hand side requires work. Consider first the worker x marginal on the right-hand side of (<ref>).
* The mass on x_0 is
∑_1<m≤ pλ^-_m1+∑_1≤ n<pλ^+_pn+∑_k=2^p-1(∑_1≤ n<kλ^+_kn+∑_k<m≤ pλ^-_mk) =∑_1≤ n<m≤ p( λ^-_mn+λ^+_mn).
* Using equation (<ref>) with k=2, the mass on x_1 is
∑_1<m≤ pλ^+_m1+∑_1<m≤ p_m1=∑_1<m≤ p( λ^-_m1+_m1).
* For 2≤ k<p, using (<ref>) and grouping terms, the mass on x_k is
∑_1≤ n<kλ^-_kn+∑_k<m≤ pλ^+_mk+∑_1≤ n<k_k,n+∑_k<m≤ p_mk=∑_k<m≤ p(λ^-_mk+_mk)+∑_1≤ n<k(λ^+_kn+_kn).
* Using equation (<ref>) with k=p, the mass on x_p is
∑_1≤ n<p( λ^-_pn+_pn)= ∑_1≤ n<p( λ^+_pn + _pn).
Combining these four terms we see that the x-marginal of the right-hand side of (<ref>) corresponds with that of (<ref>). We proceed to show that the same is true for the distribution of jobs.
* The mass on z_0 is
∑_1≤ n<p_pn+∑_1<m≤ p_m1+∑_k=2^p-1( ∑_1≤ n<kλ^-_kn+∑_k<m≤ pλ^+_mk)=∑_1≤ n<m≤ p( λ^-_mn+λ^+_mn),
where the equality follows by simple accounting.
* The mass on z_1 is
∑_1<m≤ p_m1+∑_1<m≤ p_m1=∑_1<m≤ p( _m1+_m1).
* For 2≤ k<p, the mass on z_k is
∑_1≤ n<kλ^+_kn+∑_k<m≤ pλ^-_mk+∑_k<m≤ p_mk+∑_1≤ n<k_kn=∑_k<m≤ p( λ^-_mk+_mk) +∑_1≤ n<k( λ^+_kn+_kn).
* Finally, the mass on z_p is given by
∑_1≤ n<p_pn+∑_1≤ n<p_pn=∑_1≤ n<p ( λ^+_pn+_pn ).
We have thus proved the marginal distributions on both sides of the costs (<ref>) are the worker distribution F̃ and the job distribution G̃.
Why is the left-hand side of equation (<ref>) the optimal transportation cost between the worker distribution F̃ and job distribution G̃? To characterize an optimal assignment between the constructed measures F̃ and G̃, we decompose the corresponding measure of underqualification H̃ := F̃-G̃ into layers. By the definition of the worker measure F̃ in equation (<ref>) and the job measure G̃ in equation (<ref>), we know that for each k we have F̃(x_k)=G̃(z_k). This means each layer ℓ will consist of a subset S⊆{0,…,p} and the distributions within the layer F_ℓ and G_ℓ will be uniform on {x_k}_k∈ S and {z_k}_k∈ S respectively. From the assumption of the theorem we recall that the optimal assignment π pairs x_k with z_k for every k in the optimal assignment problem with uniform distributions on {x_k}_0≤ k≤ p and {z_k}_0≤ k≤ p. Since a restriction of an optimal assignment is also optimal on the restricted marginals, we know that an optimal assignment between F_ℓ and G_ℓ matches x_k to z_k for each k∈ S. After adding the layers, the same holds for an optimal assignment between F̃ and G̃ by the principle of layering. Therefore, the pairs { (x_k,z_k) } are paired under an optimal assignment between F̃ and G̃. This establishes the inequality (<ref>), hence we finally conclude (<ref>) has a solution. Next, we continue to prove the second part of the result, that the function ϕ defined in (<ref>)-(<ref>) is indeed a local dual optimizer on S_[x_0,z_0].
First, we record the following simple observation on our construction of ϕ in the case of overlapping masses.
We will extensively make use of Lemma <ref>.
Suppose h:[0,∞)→ is concave. Then for 0≤ x≤ y and a>0 we have
h(x+a)-h(x)≥ h(y+a)-h(y).
From concavity, it follows that
h(y)+h(x+a)≥(y-x)h(y+a)+ah(x)/y+a-x+(y-x)h(x)+ah(y+a)/y+a-x=h(x)+h(y+a),
completing the proof.
Suppose (x_1,z_1),…,(x_p,z_p) are ordered subpairs of pair (x_0,z_0) in the optimal assignment π, and that ϕ_i are dual potentials on S_[x_i,z_i]:=X_[x_i,z_i]∪ Z_[x_i,z_i] for all 1≤ i≤ p. Define c_ij=c_i,j:=c(x_i,z_j). We first prove that, with the possibilities of multiple workers on the same skill level and multiple jobs on the same difficulty level, our ϕ in (<ref>)-(<ref>) is well-defined.
* Suppose that x_n=x_n+1 or z_n=z_n+1 for some 1≤ n<p. Then any solution (β_2,…,β_p) to the system of inequalities (<ref>) satisfies
max(c_00-c_0n-c_n+1,0,-c_n+1,n)+c_nn≤β_n+1≤min(c_0,n+1+c_n0-c_00,c_n,n+1)-c_n+1,n+1.
As a consequence,
c_nn-c_n+1,n≤β_n+1≤ c_n,n+1-c_n+1,n+1,
and hence we must have
β_n+1=c_nn-c_n+1,n+1. In particular, the ϕ defined in (<ref>) satisfies ϕ(x_n)=ϕ(x_n+1) in the case x_n=x_n+1, and ϕ(z_n)=ϕ(z_n+1) in the case z_n=z_n+1.
* Suppose that z_0=z_1 and x_0≠ x_1. We first prove that
max_i∈{1,…,p} (ϕ(x_i)-c(x_i,z_0))=ϕ(x_1)-c(x_1,z_0).
Indeed, for any i∈{1,…,p}, it holds that
ϕ(x_1)-c(x_1,z_0)=ϕ(x_1)-c(x_1,z_1)=ϕ(z_1)≥ϕ(x_i)-c(x_i,z_1)=ϕ(x_i)-c(x_i,z_0).
Therefore, by (<ref>),
ϕ(z_0)=ϕ(x_1)-c(x_1,z_0)=ϕ(x_1)-c(x_1,z_1)=ϕ(z_1).
* Suppose that x_0=x_1. Similarly as in step 2 above, we have
ϕ(x_0)=ϕ(z_1)+c(x_0,z_1)=ϕ(z_1)+c(x_1,z_1)=ϕ(x_1).
* Suppose that x_0=x_1 and z_0=z_1. We need to show that
max_i∈{1,…,p} (ϕ(x_i)-c(x_i,z_0))=min_i∈{1,…,p}(ϕ(z_i)+c(x_0,z_i))-c(x_0,z_0).
This is because the left-hand side of (<ref>) is equal to ϕ(z_1) by step 3 and the right-hand side of (<ref>) is equal to ϕ(x_1)-c_00 by step 2. Since c_00=c_11-ϕ(x_1)-ϕ(z_1), this proves (<ref>).
We prove that ϕ is a local dual optimizer on the domain S_[x_0,z_0]∖{x_0,z_0}. Suppose that both x∈ X_[x_n,z_n] and z∈ Z_[x_m,z_m]. The equality ϕ(x)-ϕ(z)=c(x,z) when (x,z) is a worker-job pair is obvious because the same condition is satisfied by ϕ_i for all 1≤ i≤ p. Our goal is to prove ϕ(x)-ϕ(z)≤ c(x,z) when worker x and job z are not paired.
We consider three cases.
Case I: n=m. This follows immediately since ϕ_n is a dual potential on S_[x_n,z_n].
Case II: n<m. Observe
ϕ(x)-ϕ(z) = ( ϕ(x)-ϕ(z_n) )-∑_k=n^m(ϕ(x_k)-ϕ(z_k))+∑_k=n+1^m(ϕ(x_k-1)-ϕ(z_k))+(ϕ(x_m)-ϕ(z))
≤ c(x,z_n)-∑_k=n^mc_kk+∑_k=n+1^m(β_k+c_kk)+c(x_m,z)
= c(x,z_n)-c_nn+c(x_m,z)+∑_k=n+1^mβ_k
≤ c(x,z_n)-c_nn+c_nm-c_mm+c(x_m,z).
The first inequality follows since both ϕ(x) - ϕ(z_n) ≤ c(x,z_n) and ϕ(x_m) - ϕ(z) ≤ c(x_m,z) follow from the dual potential within the same part, and ϕ(x_k)-ϕ(z_k) = c_kk follows by the dual potential within the same part for paired workers and jobs, and finally β_k+c_kk = ϕ(x_k-1)-ϕ(z_k) by the definition of the constants a_i in statement of the theorem. The final inequality is implied by the upper bound on ∑_k=n+1^mβ_k from (<ref>). To show ϕ(x)-ϕ(z)≤ c(x,z), it suffices to prove
c(x,z_n)+c(x_m,z)-c(x,z)≤ c_nn+c_mm-c_nm.
Note that c(x,z_n)≤ c(x_n,z_n) and c(x_m,z)≤ c(x_m,z_m). There are four cases:
* z_n≤ x_n≤ z_m≤ x_m. Then c(x,z)≥ c(x_n,z_m) and the claim follows.
* x_n≤ z_n≤ z_m≤ x_m. In this case z_n-x≤ z_n-x_n. Applying Lemma <ref> with a=z-z_n yields c(x,z_n)-c(x,z)≤ c(x_n,z_n)-c(x_n,z)≤ c(x_n,z_n)-c(x_n,z_m). Using that c(x_m,z)≤ c(x_m,z_m) equation (<ref>) follows.
* z_n≤ x_n≤ x_m≤ z_m. In this case z-x_m≤ z_m-x_m. Applying Lemma <ref> with a=x_m-x_n yields c(x_m,z)-c(x,z) ≤ c(x_m,z)-c(x_n,z)≤ c(x_m,z_m)-c(x_n,z_m), where the first inequality follows from c(x_n,z) ≤ c(x,z). Further using c(x,z_n)≤ c(x_n,z_n), equation (<ref>) follows.
* x_n≤ z_n≤ x_m≤ z_m. In this case, the configuration between x_n and z_n is identical to Case 2, and the configuration between x_m and z_m is identical to Case 3. We apply Lemma <ref> exactly as in Case 2 and in Case 3. First, c(x,z_n)-c(x,z)≤ c(x_n,z_n)-c(x_n,z). Second, c(x_m,z)-c(x_n,z)≤ c(x_m,z_m)-c(x_n,z_m). Summing the two inequalities delivers inequality (<ref>).
This completes the proof of (<ref>) for Case II.
Case III: n>m. Observe that
ϕ(x)-ϕ(z) =(ϕ(x)-ϕ(z_n))+∑_k=m+1^n-1(ϕ(x_k)-ϕ(z_k))-∑_k=m+1^n(ϕ(x_k-1)-ϕ(z_k))+(ϕ(x_m)-ϕ(z))
≤ c(x,z_n)+∑_k=m+1^n-1c_kk-∑_k=m+1^n(β_k+c_kk)+c(x_m,z)
= c(x,z_n)-c_nn+c(x_m,z)-∑_k=m+1^nβ_k
≤ c(x,z_n)-c_nn+c_nm-c_mm+c(x_m,z).
The first inequality follows since both ϕ(x) - ϕ(z_n) ≤ c(x,z_n) and ϕ(x_m) - ϕ(z) ≤ c(x_m,z) follow from the dual potential within the same part, and ϕ(x_k)-ϕ(z_k) = c_kk follows by the dual potential within the same part for paired workers and jobs, and finally β_k+c_kk = ϕ(x_k-1)-ϕ(z_k) by the definition of the constants a_i in statement of the theorem. The final inequality is implied by the upper bound on ∑_k=n+1^mβ_k from (<ref>). The rest follows similarly as in Case II.
It then remains to check that ϕ is a dual potential on S_[x_0,z_0], that is, to show that
* ϕ(x_0)-ϕ(z_0)=c(x_0,z_0);
* For x∈ X_[x_0,z_0]∖{x_0}, ϕ(x)-ϕ(z_0)≤ c(x,z_0);
* For z∈ Z_[x_0,z_0]∖{z_0}, ϕ(x_0)-ϕ(z)≤ c(x_0,z).
In view of (<ref>) and (<ref>), it remains to prove
min_1≤ i≤ p(ϕ(z_i)+c(x_0,z_i))-max_1≤ i≤ p (ϕ(x_i)-c(x_i,z_0))≥ c(x_0,z_0).
Equivalently, it suffices to show that
ϕ(x)-ϕ(z)≤ c(x_0,z)+c(x,z_0)-c_0,0
for all x∈ X_[x_0,z_0]∖{x_0} and z∈ Z_[x_0,z_0]∖{z_0}. Recall that ϕ(x_i-1)-ϕ(z_i)=β_i+c_ii for 2≤ i≤ p by the definition of the constants in the statement of the theorem. Again, we have the three cases of Figure <ref> to consider to show that the sufficient condition (<ref>) is satisfied.
Case I: n=m. By symmetry, we may assume x_0<z_0. Consider first the case z_n≤ x_n. Since ϕ_n is a dual potential on S_[x_n,z_n], we have ϕ(x)-ϕ(z)≤ c(x,z). Since π is optimal,
c(x,z)+c(x_0,z_0)≤ c(x_n,z_n)+c(x_0,z_0)≤ c(x_n,z_0)+c(x_0,z_n)≤ c(x,z_0)+c(x_0,z).
where the first inequality follows since (x,z) ∈ (x_n,z_n), the second follows by optimality, and the third one follows since z_n≤ x_n and x_0<z_0.
Using the above inequality, we write:
ϕ(x)-ϕ(z)≤ c(x,z) ≤ c(x_0,z)+c(x,z_0)-c_00,
verifying (<ref>).
Next, we consider the case where x_n<z_n. By the property of no intersecting pairs, it follows that
c(x_n,z_n)+c(x_0,z_0)≤ c(x_0,z_n)+c(x_n,z_0).
Furthermore, two applications of Lemma <ref> yield both
c(x_0,z_n)-c(x_0,z)≤ c(x_n,z_n)-c(x_n,z)
when a = z_n -z and
c(x_n,z_0)-c(x,z_0)≤ c(x_n,z_n)-c(x,z_n).
when a = z_0 - z_n. Summing up equations (<ref>), (<ref>), and (<ref>) yields
c(x_0,z_0)+c(x,z_n)+c(x_n,z)≤ c(x_0,z)+c(x,z_0)+c(x_n,z_n).
Since π is optimal, we have
ϕ(x)-ϕ(z) ≤ c(x,z) ≤ c(x,z_n)+c(x_n,z)-c(x_n,z_n)≤ c(x_0,z)+c(x,z_0)-c_00,
as desired by (<ref>).
Case II: n<m. Similar to the other Case II discussed above, we obtain
ϕ(x)-ϕ(z) ≤ c(x,z_n)-c_nn+c(x_m,z)+∑_k=n+1^mβ_k
≤ c(x,z_n)-c_nn+c_0m+c_n0-c_00-c_mm+c(x_m,z),
where the second inequality follows from the upper bound in (<ref>). To prove equation (<ref>) it suffices to show that the upper bound in the previous equation is below the upper bound in equation (<ref>), or
c(x,z_n)+c(x_m,z)-c(x_0,z)-c(x,z_0) ≤ c(x_n,z_n)+c(x_m,z_m)-c(x_n,z_0)-c(x_0,z_m).
We observe that the arcs (x,z_0) and (x_n,z_n) intersect, but that the arcs (x,z_n) and (x_n,z_0) do not cross. By Lemma <ref>, describing that intersecting pairs are never optimal, we thus have
c(x,z_n)+c(x_n,z_0)≤ c(x,z_0)+c(x_n,z_n).
Similarly, the arcs (x_0,z) and (x_m,z_m) intersect, but the arcs (x_0,z_m) and (x_m,z) do not intersect. Thus, by the property of no intersecting pairs,
c(x_0,z_m)+c(x_m,z)≤ c(x_0,z)+c(x_m,z_m).
Summing up (<ref>) and (<ref>) yields (<ref>) and hence completes the proof of Case II.
Case III: n>m. We have
ϕ(x)-ϕ(z) ≤ c(x,z_n)-c_nn+c(x_m,z)-∑_k=m+1^nβ_k
≤ c(x,z_n)-c_nn-c_00-c_mm+c_0m+c_n0+c(x_m,z),
where the last step follows from (<ref>). Inequality (<ref>) coincides with inequality (<ref>) in Case II. Then (<ref>) follows in exactly the same way from (<ref>) as in Case II. Finally, we emphasize that our construction relies on the concavity of the mismatch cost function c(x,z) in two respects. First, the property of no intersecting pairs is essential for our induction structure. Second, (<ref>) requires concavity as well.
§.§ Proof to Theorem <ref>
In this appendix, we prove Theorem <ref>. We make use of Lemma <ref> and Lemma <ref>, which we prove first.
Triangle Inequality.
For all x,y,z∈, it holds that c(x,y)+c(y,z)≥ c(x,z).
Our cost of mismatch takes the form c(x,z)=h(z-x) where h is strictly concave and increasing on [0,∞), strictly concave and decreasing on (-∞,0], satisfying h(0)=0.
The case where x=z is trivial, so we focus our attention to the case where x ≠ z. By symmetry, we assume x< z without loss of generality. If z-y≥ z-x > 0, then necessarily c(y,z)≥ c(x,z) and hence c(x,y)+c(y,z)≥ c(x,z). The same argument applies when y - x ≥ z-x > 0. In the remaining scenario where both (z-y) and (y-x) are in [0,z-x), we have by concavity of h that[The interval is bounded below by zero because when z-y ≥ z-x is not true, then y-x>0, and similarly when y-x ≥ z-x is not true then z-y > 0.]
c(x,y)+c(y,z) =h(y-x)+h(z-y)≥y-x/z-x h(z-x) + z-y/z-x h(z-x)=h(z-x)=c(x,z),
where the inequality follows since y - x = y-x/z-x× (z-x) + z-y/z-x× 0. This completes the proof.
In the main text, we established the connection between the dual optimizers for the cost minimization problem and the dual optimizers for the output maximization problem. In this appendix, we exploit this connection to simplify the exposition to the proof of Theorem <ref>. Specifically, we use that we can equivalently characterize the dual functions (ϕ,ψ) for the overlapping segments of the worker and the job distribution, with the understanding that we can obtain wages and job values using w(x) = g(x) - ϕ(x) and v(z)=h(z) - ψ(z), where y(x,z)= g(x) + h(z) - c(x,z).
To formulate Theorem <ref> in terms of the dual potentials for the mismatch cost minimization problem, we need to describe our sequential construction of the functions. For the interpretation of these objects we refer the reader to the main text. We define sequentially the dual maps, analogous to our previous definitions (<ref>) and (<ref>). Starting from ϕ̃=g-w̃, where w̃ are the dual values for mismatched workers x ∈ I, let
ψ̃(z):=min_x ∈ I c(x,z) - ϕ̃(x) and ϕ̂(x):=min_z∈ I∪ Jc(x,z)-ψ̃(z) ,
where we recall that J is the set of mismatched jobs. Moreover, let
ψ̂(z):=min_x ∈ I ∪ J c(x,z) - ϕ̂(x),
ϕ(x)=ϕ̂(x) for x∈ I, ψ(z)=ψ̂(z) for z∈ J, and set ϕ(x)=-ψ(x) for x∈ J and ψ(z)=-ϕ(z) for z∈ I. Finally, we define for x∈ K
ϕ(x)=min_z∈ I∪ Jc(x,z)-ψ(z)
and ψ(z)=-ϕ(z) for z∈ K.
It is easy to check that with these definitions, ϕ=g-w and ψ=f-v, with w,v given in Theorem <ref>.
To prove the result, we first define c-conjugate functions.
For ϕ: I →, we define the c-conjugate function for all jobs z ∈ J as
ϕ^c(z) := min_x∈ I c(x,z) - ϕ(x).
Denote by c̅(z,x)=c(x,z) and we further define for x∈ I
ϕ^cc̅(x)=(ϕ^c)^c̅(x) = min_z∈ J c̅(z,x) - ϕ^c(z)=min_z∈ J c(x,z) - ϕ^c(z).
Given these definitions, the following statements follow:[See Chapter 1 of <cit.> for further details.]
* ϕ^cc̅≥ϕ.
This follows since for each x∈ I and z∈ J, ϕ(x)+ϕ^c(z)≤ c(x,z) or ϕ(x) ≤ c(x,z) - ϕ^c(z) by the definition of the c-conjugate function. By taking the infimum z ∈ J this leads to ϕ^cc̅(x)≥ϕ(x) by the definition (<ref>).
* If ϕ=ψ^c̅ for some ψ, then ϕ=ϕ^cc̅.
First, we observe that ϕ=ψ^c̅ naturally implies ϕ^c=ψ^c̅c. To see this, note that ϕ^c=ψ^c̅c≥ψ which follows from the previous statement. This inequality, by uniformly decreasing from ϕ^c to ψ, together with the definition (<ref>), implies we uniformly increase the conjugate, or ϕ^cc̅=(ϕ^c)^c̅≤ψ^c̅=ϕ. We establish ϕ=ϕ^cc̅ by combining ϕ^cc̅≤ϕ with Statement 1.
* If (ϕ,ψ) is an optimal dual pair, then so is (ϕ,ϕ^c).
Suppose (ϕ,ψ) is a dual pair, then ϕ(x)+ψ(z)≤ c(x,z). It holds by the definition in (<ref>) that ϕ(x)+ϕ^c(z)≤ c(x,z) as well as ϕ^c(z)≥ψ(z). Since ϕ^c(z)≥ψ(z) and (ϕ,ϕ^c) is a dual solution, it follows that if (ϕ,ψ) is a solution to the dual maximization problem, then so is (ϕ,ϕ^c).
ϕ̂(x)+ψ̃(z)≤ c(x,z) for all workers x and jobs z such that x,z ∈ I∪ J, and equality holds for (x,z)∈Γ_π.
That ϕ̂(x)+ψ̃(z)≤ c(x,z) follows from definition of the dual optimizer for workers ϕ̂(x) in (<ref>). Next, we prove ϕ̂(x)+ψ̃(z) = c(x,z) for all workers and jobs (x,z) ∈Γ_π.
To prove that ϕ̂(x)+ψ̃(z) = c(x,z) for workers and jobs (x,z) ∈Γ_π, we fix some pair (x,z) ∈Γ_π. Since (ϕ̃, ϕ̃^c) is a dual solution to the assignment problem between remaining workers and jobs, ϕ̃(x)+ϕ̃^c(z) = c(x,z) for all (x,z) ∈Γ_π. Given the definition of the dual value for jobs z ∈ I ∪ J in (<ref>) we obtain that ψ̃(z) =min_x ∈ I c(x,z) - ϕ̃(x) = ϕ̃^c(z) and hence that ϕ̃(x)+ψ̃(z) = c(x,z) for all (x,z) ∈Γ_π. To conclude the proof it remains to show that ϕ̂(x)=ϕ̃(x) for every worker x∈ I.
We next show that ϕ̂(x)=ϕ̃(x) for every worker x∈ I. Since we replaced, without loss of generality, the dual potential ϕ̃ by the c-transform ϕ̃^cc̅,[We can always improve on the original ϕ̃ by doing a double c-conjugate transform by Statement 1 that is weakly better in terms of the dual maximization problem, see Remark 1.13 in <cit.>.] it follows from the definition of the c-transform that for all x ∈ I:
ϕ̃(x) = ϕ̃^cc̅(x) = min_z ∈ J c(x,z) - ϕ̃^c(z) .
Further, since z∈ J, by definition of the dual potential for jobs ψ̃(z) =min_x ∈ Ic(x,z) - ϕ̃(x) = ϕ̃^c(z), where the second equality follows from the definition of the c-transform. We substitute this relationship into the previous expression for ϕ̃(x) to write
ϕ̃(x) = min_z ∈ J c(x,z) - ϕ̃^c(z) = min_z ∈ J c(x,z) - ψ̃(z) .
We can use the definition of the dual optimizers (<ref>) to write that for all workers x ∈ I:
ϕ̂(x)=min( min_z∈ J c(x,z) - ψ̃(z) , min_z∈ Ic(x,z)-ψ̃(z) ) = min( ϕ̃(x), min_z∈ Ic(x,z)-ψ̃(z) )
where the first equality follows by splitting the sets in (<ref>) and the second equality follows from the equation above.
Hence, we want to show for (x,z) ∈ I the infimum is attained by ϕ̃(x). We show c(x,z) ≥ψ̃(z) + ϕ̃(x). This follows since the dual optimizer for all jobs is defined as ψ̃(z):=min_x ∈ I c(x,z) - ϕ̃(x)
for all z ∈ I∪ J.
Having established the two claims, we next prove Theorem <ref>.
The proof is divided in three parts. We first show the inequality holds on I∪ J. To do so, we consider four cases:
* If x∈ I and z∈ J, we have
ϕ(x)+ψ(z) =ϕ(x)-ϕ(z)=ϕ̂(x)-max_x∈ I∪ J(ϕ̂(x)-c(x,z)) ≤ c(x,z)
because in the final step we subtract the maximum, but a feasible deduction is ϕ̂(x)-c(x,z).
* If x,z ∈ I, then by Lemma <ref> we have
ϕ(x)+ψ(z)=ϕ(x)-ϕ(z) =ϕ̂(x)-ϕ̂(z) =min_y∈ I∪ J(c(x,y)-ψ̃(y))- min_y∈ I∪ J(c(z,y)-ψ̃(y))≤ c(x,z)
where the final equality follows by (<ref>). The concluding inequality is obtained as follows. Suppose y_0 attains the infimum for the second term, the same y_0 may not attain the infimum for the first term but is feasible, so the left hand side will be lower than when both terms are evaluated at y_0, or min_y∈ I∪ J(c(x,y)-ψ̃(y))-min_y∈ I∪ J(c(z,y)-ψ̃(y))≤ c(x,y_0) - c(z,y_0). We combine the right-hand side with the triangle inequality of Lemma <ref> to write c(x,z) + c(z,y_0) ≥ c(x,y_0) or c(x,z) ≥ c(x,y_0)- c(z,y_0) to obtain the inequality.
* If x∈ J and z ∈ I.
ϕ(x) + ψ(z) = max_y∈ I∪ J( ϕ̂(y)-c(y,x) ) - ϕ̂(z).
We next want to show that this expression is less than c(x,z). This is equivalent to showing that ϕ̂(y)-c(y,x) ≤ c(x,z) + ϕ̂(z) for all y ∈ I∪ J. To establish this, fix y, and evaluate:
ϕ̂(y) - ϕ̂(z) = min_w∈ I∪ J ( c(y,w)-ψ̃(w) ) - min_w∈ I∪ J ( c(z,w)-ψ̃(w) )
where the equality follows from the definition of ϕ̂ in equation (<ref>). Let w_0 be the value that attains the infimum in the second term on the right, which is also feasible for the first term so that ϕ̂(y) - ϕ̂(z) ≤ c(y,w_0) - c(z,w_0). To bound this further, we use the triangle inequality of Lemma <ref> twice to write c(y,w_0)- c(z,w_0) ≤ c(y,z) as well as c(y,z) ≤ c(y,x) + c(x,z). Using the triangle inequalities, we thus write ϕ̂(y) - ϕ̂(z) ≤ c(y,x) + c(x,z) which is what we wanted to show since y is arbitrary.
* If worker and job x,z∈ J, use (<ref>) to write
ϕ(x) + ψ(z) = max_y∈ I∪ J(ϕ̂(y)-c(y,x)) - max_y∈ I∪ J(ϕ̂(y)-c(y,z)).
To bound the right-hand side, let y_0 denote the value that attains the supremum in the first term, that is also feasible for the second term. Hence, the right-hand side is bounded above by -c(y_0,x) + c(y_0,z). By the triangle inequality of Lemma <ref> it follows that -c(y_0,x) + c(y_0,z) ≤ c(x,z) and hence we have ϕ(x) + ψ(z) ≤ c(x,z).
The second part of the proof shows that the equality holds everywhere on I∪ J with respect to the optimal assignment π. We distinguish two cases:
* The worker is perfectly matched to their job, or (x,z)∈{(x,x):x∈}. Since the dual functions are defined as ψ(x) = - ϕ(x) we have ϕ(x)+ψ(x)=0. As a result, ϕ(x)+ψ(x)=0=c(x,x), as the cost of mismatch is zero.
* The worker is mismatched in their job, or (x,z)∈Γ_π, implying worker x∈ I and job z∈ J. Using definition (<ref>), ψ(z) = - ϕ(z),
ϕ(x)+ψ(z) =ϕ̂(x)-max_y∈ I∪ J(ϕ̃(y)-c(y,z)).
By Lemma <ref>, ϕ̂(x)+ψ̃(z)≤ c(x,z) for all (x,z). In particular, for a given job z, ϕ̂(x)+ψ̃(z)≤ c(x,z) for all x, and min_x∈ I∪ J (c(x,z) -ϕ̂(x) ) ≥ψ̃(z), or, equivalently, -max_x∈ I∪ J(ϕ̂(x)-c(x,z)) ≥ψ̃(z). Combining this inequality with the previous expression, we obtain the inequality
ϕ(x)+ψ(z) ≥ϕ̂(x) + ψ̃(z) = c(x,z)
where the final equality follows by Lemma <ref>. Since we have shown the opposite inequality above in the first case of the first part to this proof, we obtain that ϕ(x)+ψ(z)= c(x,z).
In the third part of the proof we further establish that the dual inequality ϕ(x)+ψ(z)≤ c(x,z) holds when x∈ K or z∈ K. There are three cases.
* x∉K, z∈ K. For any x'∉K, we have ϕ(x)+ψ(x') = ϕ(x) - ϕ(x') ≤ c(x,x') when x∉K by the first part of this proof. Following the triangle inequality of Lemma <ref>,
ϕ(x)-ϕ(x') ≤ c(x,x')≤ c(x,z)+c(z,x'), giving ϕ(x)- c(x,z) ≤ c(z,x') + ϕ(x') = c(z,x') - ψ(x'). Taking infimum over x'∈ I∪ J gives ϕ(x)-c(x,z)≤ϕ(z)=-ψ(z) using the definition of ϕ.
* x∈ K, z∉K. For any x'∈ I∪ J, by the definition of the wage function, we have that
ϕ(x) = min_x' ∈ I ∪ J c(x,x') - ψ(x'), such that ϕ(x) - ϕ(x') ≤ c(x,x') ≤ c(x,z)+c(z,x'), where the final step follows by the triangle inequality of Lemma <ref>. Alternatively, we write ϕ(x) - c(x,z) ≤ c(z,x') - ψ(x'). Taking infimum in x'∈ I∪ J gives ϕ(x)+ψ(z)≤ c(x,z) using the definition of ϕ.
* x,z∈ K. We want to establish
ϕ(x)+ψ(z)≤ c(x,z). Using the definitions of the dual potentials in (<ref>),
ϕ(x)+ψ(z) = min_x' ∈ I ∪ J( c(x,x') - ψ(x') ) + max_x' ∈ I ∪ J( - c(z,x') + ψ(x') ) .
Suppose the maximum in the second term is attained by the worker value x_0, and also evaluate the first term at x_0 where it may not attain the minimum, implying ϕ(x)+ψ(z) ≤ c(x,x_0) - c(z,x_0). By the triangle inequality c(x,x_0) - c(z,x_0) ≤ c(x,z) and hence it indeed follows that ϕ(x)+ψ(z)≤ c(x,z).
By observing that ϕ=-ψ on the set K, the equality ϕ(x)+ψ(z)=0= c(x,z) holds when x,z∈ K and (x,z)∈Γ_π. This completes the proof in view of Lemma <ref>.
Composite Sorting
Technical Appendix
Job Boerma, Aleh Tsyvinski, Ruodu Wang, and Zhenyuan Zhang
March 2023
§ ADDITIONAL RESULTS
In this appendix we present additional technical results.
§.§ General Production Function
In this section, we present two generalizations of the model.
§.§.§ Concave Distance Function
Using Legendre transformations, we show that the indirect output function is generally a strictly concave function in mismatch given strictly convex cost functions. To be specific, consider the same cost function Ψ as above, and use d:=|x-y| to denote the distance to obtain:
𝒞(d) = min_γ≥ 0 γ d + Ψ(γ)
This problem has a unique solution characterized by d = - Ψ'(γ(d)). From the envelope condition, we obtain 𝒞'(d)= γ > 0, showing that the cost function is strictly increasing in the distance.
To characterize the second derivative, we write the cost minimization problem as a maximization problem of the form:
𝒞̂(d) = max_γ≥ 0 - γ d - Ψ(γ)
where 𝒞̂ = - 𝒞 which shows 𝒞̂ is the Legendre transformation of the strictly convex function Ψ. Since the Legendre transformation of a strictly convex function is also strictly convex, the indirect cost function 𝒞 is a strictly concave function of the distance. As a result, choosing an assignment to maximize:
y(x,z) = z + x - 𝒞(|x-y|)
where 𝒞 is now our concave cost distance function.
§.§.§ Asymmetric Distance Function
Next, we incorporate differential distance functions for both x - z > 0 and x - z < 0. This is a trivial extension, let Ψ̅ denote the cost function for x - z > 0 and Ψ denote the cost function for x - z < 0. In this case, the cost minimization problem is:
𝒞̅(d) = min_γ≥ 0 γ d + Ψ̅(γ)
when d > 0. By the same arguments on the Legendre transformation, this gives rise to a strictly concave function of the distance 𝒞̅(d). Analogously, when d < 0, we generically obtain a distinct strictly concave function of the distance 𝒞(d). As a result, we choose an assignment to maximize:
y(x,z) = z + x - 𝒞̅({x-y }_+) - 𝒞({y-x }_+).
§.§ Convex Cost of Mismatch
We show that the optimal assignment features positive sorting when the mismatch cost function is strictly convex in the distance between worker skills and job difficulties. We establish this by showing that the cost function is submodular when the mismatch cost function is strictly convex. In turn, the production function is strictly supermodular, and hence the optimal sorting is positive following <cit.>.
Convex Cost of Mismatch.
Suppose c(x,z)=h(z-x) with h:→ strictly convex. Then the mismatch cost function c is strictly submodular.
To establish that the cost of mismatch is submodular, we need to establish that
c(x_1,z_1)+c(x_2,z_2)<c(x_1,z_2)+c(x_2,z_1),
for any x_1<x_2 and z_1<z_2.
It follows from the strict convexity of the cost function that h(z_1-x_1)≤ c_1h(z_1-x_2)+c_2h(z_2-x_1) where the weighting coefficients are c_1= (z_2-x_1)-(z_1-x_1)/(z_2-x_1)-(z_1-x_2) and c_2=1-c_1 = (z_1-x_1)-(z_1-x_2)/(z_2-x_1)-(z_1-x_2).[We observe that c_1 (z_1 - x_2) + (1- c_1) (z_2-x_1) = z_2-x_1 + c_1 ((z_1 - x_2) -(z_2-x_1) ) = z_2-x_1 - ((z_2-x_1)-(z_1-x_1)) = (z_1 - x_1) and further note that the coefficient c_1 is between 0 and 1 since the denominator is positive the numerator is positive but smaller than the denominator.] Analogously, it follows that h(z_2-x_2)≤ c_2 h(z_1-x_2)+c_1h(z_2-x_1).[For completeness, we observe that c_2 (z_1 - x_2) + (1- c_2) (z_2-x_1) = z_2-x_1 + c_2 ((z_1 - x_2) -(z_2-x_1) ) = z_2-x_1 - ((z_1-x_1)-(z_1-x_2)) = (z_2 - x_2).] We use these two inequalities to show that
c(x_1,z_2) + c(x_2,z_1) = h(z_2-x_1) + h(z_1-x_2) > h(z_1-x_1)+h(z_2-x_2) = c(x_1,z_1) + c(x_2,z_2),
where the inequality follows by addition of the two previous inequalities.
§.§ Efficiency Properties of Algorithm
Recall our algorithm for computing dual potentials from Appendix <ref>. The total runtime is dominated by the runtime for solving the system of inequalities (<ref>), which we recall as follows. Suppose that (x_1,z_1),…,(x_p,z_p) are ordered subpairs of pair (x_0,z_0) in the optimal assignment π. Define c_ij:=c(x_i,z_j). Then the system of inequalities, where for all 1≤ n<m≤ p:
max(c_00+c_nn-c_0n-c_m0,c_nn-c_mn)≤∑_k=n+1^mβ_k≤min(c_0m+c_n0 -c_00-c_mm,c_nm-c_mm)
(a) admits a solution (β_2,…,β_p).
Since the system of inequalities (<ref>) can be solved via linear programming in p steps where p≤ n, the worst-case runtime for our algorithm is O(n^4) (when p=n). However, it becomes much more efficient when more layers of arcs are introduced. This is because compared with the trivial linear programming, our algorithm solves the problem in the order from bottom arcs to top, while at each step the values of ϕ in the hidden arcs need not be computed again, but only adjusted with constant factors. Typically, the number N will not be as large as n. The following proposition provides a general upper bound of the number N, which is a consequence of the absence of intersecting pairs. Define the number of crossings of F-G at x ∈ as
C_F-G(x):=∑_1≤ k≤ n_{(F-G)(x_k)=x}+∑_1≤ k≤ n_{(F-G)(z_k)=x}.
In other words, every time a flat part of F-G takes value x, we count that as an x-crossing. Note that this is nonzero only if nx∈ℤ and |x|≤ 1.
Suppose that (x_1,z_1),…,(x_p,z_p) are the ordered subpairs of the pair (x_0,z_0) in the optimal matching π. Then there exists x ∈ℤ / n such that the measure of underqualification F-G crosses the level x for N times, i.e., C_F-G(x)≥ N.
Consider numbers t_i∈(max(x_i,z_i),min(x_i+1,z_i+1)), 1≤ i<p. By the property of no intersecting pairs, F(t_i)-G(t_i) is a constant in i. On the other hand, F-G cannot be constant on the interval [t_i,t_i+1]. Thus the claim follows.
In fact, the number of crosses of F-G at a certain level is typically much smaller if we consider empirical processes. By empirical we mean that X_1,…,X_n are random samples drawn independently from distribution F on , and the workers are uniformly distributed on {X_1,…,X_n}, and similarly for the jobs. In this case, we may further refine the bound for the runtime of our algorithm, as is remarked below.
Suppose that F,G are independent empirical measures of the uniform distribution on [0,1]. Then the runtime of the algorithm is O(n^2.5(loglog n)^3/2) almost surely.
In order to prove Remark <ref>, consider the (random) empirical cumulative densities F_n,G_n, drawn from two independent sequences {X_i}_1≤ i≤ n and {Z_i}_1≤ i≤ n uniformly in [0,1], i.e.,
F_n(t)=1/n∑_k=1^n_{X_k≤ t} and G_n(t)=1/n∑_k=1^n_{Z_k≤ t}.
It is well known that the scaled measure of underqualification √(n)(F_n-G_n) can be well approximated by a Brownian bridge, where we recall that a (standard) Brownian bridge B={B(t)}_t∈[0,1] is a centered Gaussian process with covariance [B(s)B(t)]=min(s,t)-st.
We denote the local time of a standard Brownian bridge B on [0,1] at x∈ by L_B(x). By definition, the local time process {L_B(x)}_x∈ is such that for any bounded Borel function f,
∫_0^1 f(B(t)) ṭ=∫_ f(x)L_B(x) x̣.
The following Lemma is a special case of Theorem 5 of <cit.>.
There exists a suitable probability space carrying F_n,G_n, and a sequence of Brownian bridges {B_n}, such that
lim_n→∞max_k∈ℤ|n^-1/2C_F_n-G_n(k/n)-√(2) L_B_n(k√(2)/√(n))|=O(n^-0.24) a.s.
We also have the following Lemma on fluctuations of the local time for Brownian bridges. This is taken from Lemma 3.2 of <cit.> applied with n_k=k and _n=√(2/n).
Let {B_n} be any sequence of Brownian bridges. It holds that
sup_|x-y|<√(2/n)|L_B_n(x)-L_B_n(y)|=O(n^-0.24) a.s.
With a Borel-Cantelli argument in <cit.> applied to the sequence of Brownian bridges {B_n} (with the tail estimates supplied by Theorem 5.1 therein), the following lemma can be similarly established as Theorem 1.4 of <cit.>.
Let {B_n} be any sequence of Brownian bridges. There is a constant C>0 such that
[∫_L_B_n(x)^4x̣>y]≤exp(-y^2/3/C).
Moreover,
∫_L_B_n(x)^4x̣=O((loglog n)^3/2) a.s.
The first claim is Theorem 5.1 of <cit.> applied with p=4. The second claim can be proved in a similar way as (3.7a) of <cit.>.
Recall that solving (<ref>) requires N^4 steps. In view of Proposition <ref>, the runtime of our algorithm has the upper bound
∑_|k|≤ nC_F-G(k/n)^4.
Using Lemma <ref>, we get that almost surely,
C_F-G(k/n)=√(2n)L_B_n(√(2)k/√(n))+O(n^0.26).
Therefore, using the elementary inequality (A+B)^4≤ 16(A^4+B^4) we have almost surely,
∑_|k|≤ nC_F-G(k/n)^4 ≤ 64 ∑_|k|≤ n(n^2L_B_n(√(2)k/√(n))^4+O(n^1.04))
≤ O(n^2.04)+1024n^2.5(∫_-√(n)^√(n)+1/√(n) L_B_n(x)^4x̣+∑_|k|≤ n1/√(n)O(n^-0.96))
≤ O(n^2.04)+1024n^2.5∫_L_B_n(x)^4x̣,
where we applied Lemma <ref> in the second inequality. Applying now Lemma <ref>
concludes the proof.
###############################dual alg example
We illustrate the construction of the dual solution ϕ for an example where |S|=6 and the optimal assignment π pairs x_i with z_i for all i={0,1,2} as displayed in Figure <ref>. Our goal is to construct a function ϕ: S → such that ϕ(x_i)-ϕ(z_j)≤ c(x_i,z_j) for all i and j in {0,1,2} with equality holding when i=j.
We follow the algorithm described above. First, we process the pairs (x_1,z_1) and (x_2,z_2), as they do not have any subpair. We may define ϕ_1(x_1)=c_11, ϕ_2(x_2)=c_22, and ϕ_1(z_1)=ϕ_2(z_2)=0. We now process the pair (x_0,z_0).
According to (<ref>), the second step is to find β_2 ∈ℝ such that
max(c_00-c_01-c_20,-c_21)+c_11≤β_2≤min(c_02+c_10-c_00,c_12)-c_22.
By optimality of the assignment π, we observe that it necessarily needs to hold that
max(c_22-c_21,c_00-c_01-c_20+c_22)≤min(c_12-c_11,c_10-c_11-c_00+c_02),
as each of the comparisons yields a comparison between something optimal and something suboptimal. The existence of β_2 follows directly as this is a rewriting of the equation (c_22,c_11).[The general case being similar, while we deploy Farkas' Lemma to establish the existence. We will prove that the system of inequalities (<ref>) always admits a solution in Lemma <ref> in Appendix <ref>. ] (Job. EXPAND).
Next we follow step 3 of the algorithm. Define
ϕ(x_2) =ϕ_2(x_2)+0+ϕ_2(x_2)-ϕ_2(x_2)=c_22;
ϕ(z_2) =ϕ_2(z_2)+0+ϕ_2(x_2)-ϕ_2(x_2)=0;
ϕ(x_1) =ϕ_1(x_1)+β_2+ϕ_2(x_2)-ϕ_1(x_1)=c_22+β_2;
ϕ(z_1) =ϕ_1(z_1)+β_2+ϕ_2(x_2)-ϕ_1(x_1)=c_22-c_11+β_2.
Further, step 4 yields the definition
ϕ(z_0) =max(ϕ(x_1)-c_10,ϕ(x_2)-c_20);
ϕ(x_0) =max(ϕ(x_1)-c_10,ϕ(x_2)-c_20)+c_00.
We check that the potential function ϕ as defined satisfies being a dual optimizer on S_[x_0,z_0]. First we check the inequalities ϕ(x)-ϕ(z)≤ c(x,z) for (x,z)∉Γ_π. We have
ϕ(x_1)-ϕ(z_2) =c_22+β_2 ≤ c_12;
ϕ(x_2)-ϕ(z_1) =c_11-β_2 ≤ c_21;
ϕ(x_1)-ϕ(z_0) =c_22+β_2-max(ϕ(x_1)-c_10,ϕ(x_2)-c_20)≤ (c_22+β_2)-(ϕ(x_1)-c_10)=c_10;
ϕ(x_2)-ϕ(z_0) =c_22-max(ϕ(x_1)-c_10,ϕ(x_2)-c_20)≤ c_22-(ϕ(x_2)-c_20)=c_20;
ϕ(x_0)-ϕ(z_1) =max(ϕ(x_1)-c_10,ϕ(x_2)-c_20)+c_00-(c_22-c_11+β_2)
≤max(β_2-c_10,-c_20)+c_00-max(c_00-c_01-c_20,-c_21)
≤max(c_02-c_00-c_22,-c_20)+c_00-(c_00-c_01-c_20)≤ c_01;
ϕ(x_0)-ϕ(z_2) =max(ϕ(x_1)-c_10,ϕ(x_2)-c_20)+c_00
=max(β_2-c_10,-c_20)+c_00+c_22≤max(c_02-c_00-c_22,-c_20)+c_00+c_22≤ c_02.
Next, it is straightforward from definition that ϕ(x_i)-ϕ(z_i)= c(x_i,z_i) for i=0,1,2. This completes the proof that the above constructed ϕ is a dual solution.
That the algorithm works in general will be proved later in Appendix <ref>.
We now sketch the idea of the proof and depict it in Figure <ref>. Consider
three assignment problems. The top panel is the assignment between
the distribution of workers F_ℓ and the distribution of jobs
G_ℓ, both restricted to interval ℐ. The middle
panel is the assignment between the entire distributions F_ℓ
and G_ℓ. The bottom panel is the assignment between the combined
distributions in the top and the middle panels. Suppose that there
is an arc (x,z) concealed by another arc (x',z') in the optimal
assignment π_1 for the top panel. If the same arc (x,z)
is not part of any optimal assignment π_2 in the second panel,
then π_2 must contain an arc (x”,z”) intersecting (x',z').
The layer decomposition principle implies that π_1+π_2
is optimal for the third panel but now π_1+π_2 contains
intersecting arcs (x',z') and (x”,z”) contradicting Lemma.
8cm2cm[darkgray, thick] (-4,1) – (-3,1);
[darkgray, thick] (-4,1) – (-4,0) node[below];
[darkgray, thick] (-3,0) – (-3,1);
[darkgray, thick] (-2,1) – (-1,1);
[darkgray, thick] (-2,1) – (-2,0) node[below];
[darkgray, thick] (-1,0) – (-1,1);
[darkgray, thick] (2,1) – (1,1);
[darkgray, thick] (2,1) – (2,0)node[below] ;
[darkgray, thick] (1,0) – (1,1);
[darkgray, thick] (4,1) – (3,1);
[darkgray, thick] (4,1) – (4,0) node[below];
[darkgray, thick] (3,0) – (3,1);
[darkgray, thick,dashed] (-5,0) – (5,0);
[<-,every node/.style=font=] (2,1) edge[bend right=30] node [left] (-2,1);
[<-,every node/.style=font=] (-1,1) edge[bend left=30] node [left] (1,1);
16cm2cm[darkgray, thick] (-9,1) – (-8,1) ;
[darkgray, thick] (-9,1) – (-9,0)node[below];
[darkgray, thick] (-8,1) – (-8,0)node[below] (-7.5,0.5)node[right]…;
[darkgray, thick] (-6,1) – (-5,1);
[darkgray, thick] (-6,1) – (-6,0);
[darkgray, thick] (-5,1) – (-5,0) node[below];
[darkgray, thick] (-4,1) – (-3,1);
[darkgray, thick] (-4,1) – (-4,0) node[below];
[darkgray, thick] (-3,0) – (-3,1);
[darkgray, thick] (-2,1) – (-1,1);
[darkgray, thick] (-2,1) – (-2,0) node[below];
[darkgray, thick] (-1,0) – (-1,1);
[darkgray, thick] (2,1) – (1,1);
[darkgray, thick] (2,1) – (2,0)node[below] ;
[darkgray, thick] (1,0) – (1,1);
[darkgray, thick] (9,1) – (8,1);
[darkgray, thick] (9,1) – (9,0) node[below];
[darkgray, thick] (8,1) – (8,0) node[below];
[darkgray, thick] (6,1) – (5,1);
[darkgray, thick] (6,1) – (6,0);
[darkgray, thick] (5,1) – (5,0) node[below](6.5,0.5)node[right]…;
[darkgray, thick] (4,1) – (3,1);
[darkgray, thick] (4,1) – (4,0) node[below];
[darkgray, thick] (3,0) – (3,1);
[darkgray, thick,dashed] (-10,0) – (10,0);
[<-,every node/.style=font=] (2,1) edge[bend right=30] node [left] (-2,1);
[<-,every node/.style=font=] (-1,1) edge[bend left=30] node [left] (1,1);
16cm3cm[darkgray, thick] (-9,1) – (-8,1) ;
[darkgray, thick] (-9,1) – (-9,0)node[below];
[darkgray, thick] (-8,1) – (-8,0)node[below] (-7.5,0.5)node[right]…;
[darkgray, thick] (-6,1) – (-5,1);
[darkgray, thick] (-6,1) – (-6,0);
[darkgray, thick] (-5,1) – (-5,0) node[below];
[darkgray, thick] (-4,2) – (-3,2);
[darkgray, thick] (-4,2) – (-4,0) node[below];
[darkgray, thick] (-3,0) – (-3,2);
[darkgray, thick] (-2,2) – (-1,2);
[darkgray, thick] (-2,2) – (-2,0) node[below];
[darkgray, thick] (-1,0) – (-1,2);
[darkgray, thick] (2,2) – (1,2);
[darkgray, thick] (2,2) – (2,0)node[below] ;
[darkgray, thick] (1,0) – (1,2);
[darkgray, thick] (9,1) – (8,1);
[darkgray, thick] (9,1) – (9,0) node[below];
[darkgray, thick] (8,1) – (8,0) node[below];
[darkgray, thick] (6,1) – (5,1);
[darkgray, thick] (6,1) – (6,0);
[darkgray, thick] (5,1) – (5,0) node[below](6.5,0.5)node[right]…;
[darkgray, thick] (4,2) – (3,2);
[darkgray, thick] (4,2) – (4,0) node[below];
[darkgray, thick] (3,0) – (3,2);
[darkgray, thick,dashed] (-10,0) – (10,0);
[<-,every node/.style=font=] (2,2) edge[bend right=30] node [left] (-2,2);
[<-,every node/.style=font=] (-1,2) edge[bend left=30] node [left] (1,2);
Qué mira bobo
|
http://arxiv.org/abs/2303.07145v1
|
20230313141328
|
Sublinear drag regime at mesoscopic scales in viscoelastic materials
|
[
"A. E. O. Ferreira",
"J. L. B. de Araújo",
"W. P. Ferreira",
"J. S. de Sousa",
"C. L. N. Oliveira"
] |
cond-mat.soft
|
[
"cond-mat.soft"
] |
Departamento de Física, Universidade Federal do
Ceará, 60451-970 Fortaleza, Ceará, Brazil
Laboratório de Ciência de Dados e Inteligência Artificial,
Universidade de Fortaleza, 60811-905 Fortaleza, Ceará, Brazil
Departamento de Física, Universidade Federal do
Ceará, 60451-970 Fortaleza, Ceará, Brazil
Departamento de Física, Universidade Federal do
Ceará, 60451-970 Fortaleza, Ceará, Brazil
[email protected]
Departamento de Física, Universidade Federal do
Ceará, 60451-970 Fortaleza, Ceará, Brazil
Stressed soft materials commonly present viscoelastic signatures in
the form of power-law or exponential decay. Understanding the origins
of such rheologic behaviors is crucial to find proper technological
applications. Using an elastic network model of macromolecules
immersed in a viscous fluid, we numerically reproduce those
characteristic viscoelastic relaxations and show how the microscopic
interactions determine the rheologic response. We find that
exponential relaxations are indeed the most common behavior. However,
power laws may arise when drag forces between the macromolecules and
the fluid are sublinear, which is related to micro-deformations of the
macromolecules.
Sublinear drag regime at mesoscopic scales in
viscoelastic materials
C. L. N. Oliveira
March 30, 2023
======================================================================
Purely elastic and purely viscous behaviors are limited cases of
constitutive equations of materials <cit.>. Actual
substances may deform and flow, but one of these attributes usually
dominates the other, depending on the applied conditions. This
solid-liquid duality has teased researchers since at least the
19^th century. Back then, pioneers such as James Maxwell and
Ludwig Boltzmann proposed analytical models based on series and
parallel associations of springs and dashpots to explain the peculiar
characteristics observed in silk, glass fibers, and steel
wires <cit.>. The effective response of
such early models invariably presents exponential relaxation decays,
regardless of how springs and dashpots are connected. However, these
simple approaches are only suited for some viscoelastic materials
nowadays.
In modern society, soft matter is ubiquitous and broadly
accessible. The emergence of such complex materials has triggered new
theoretical models and the improvement of proper experimental
techniques to explain and control their viscoelastic
properties <cit.>. Nanoindentation methods, such
as Atomic Force Microscopy, have become essential to characterize
viscoelastic features at micro and nanometer scales by probing
materials with nano-sized indenters <cit.>. The
characterization of viscoelastic materials attempts to determine the
relaxation function that possesses both qualitative and quantitative
information.
Exponential and power-law relaxation functions are the two major types
of experimentally probed responses. Polyacrylamide
gels <cit.> and aqueous solutions of cationic
surfactants <cit.>, for instance, present exponential-like
responses with a relaxation time for the material to achieve a new
equilibrium configuration. On the other hand, living
cells <cit.>, microgel dispersions <cit.>, soft
glassy materials <cit.>, and hydrogels <cit.>
present a time-invariant power-law-like behavior. As observed in
elastic materials <cit.>, macroscopic
physical parameters are intrinsically connected to their microscopic
interactions and structures <cit.>.
Power laws and exponentials arise in many physical phenomena having a
deep origin in their dynamic processes. For instance, in non-additive
entropy systems, many physical variables are described by power-law
distributions instead of the traditional exponential functions in the
counterpart entropy <cit.>. Exponential and
power-law canonical distributions emerge naturally regarding whether
the heat capacity of the heat bath is constant or
diverges <cit.>. Moreover, power laws are associated with
emergence phenomena where exponents display scaling behaviors as they
approach criticality <cit.>. Systems with precisely the
same critical exponents belong to the same universality class, and a
small set of universality classes describes almost all material phase
transitions.
One of the challenges in material science is linking the physical
mechanisms at microscopic scales to macroscopic functional
behavior. This approach is especially relevant for soft matter because
properties on the molecular scale are linked to conformational and
compositional fluctuations on the nanometer and micrometer scale and,
in addition, span many orders of magnitude in
length <cit.>. Soft matter holds rich
structures and various interactions at the mesoscale, where thermal
energy per unit volume is negligible, in contrast with the high energy
density stored in atomic bonds of crystalline
structures <cit.>. While exponential materials can be modeled
by an association of springs and dashpots, such as the so-called
standard linear solid model, power-law materials are usually obtained
by fractional rheology <cit.> or glassy
rheology models <cit.>. However, these models
cannot explain the connection between macroscopic responses and their
elastic and viscous components.
We design a model of viscoelastic materials composed of an immersed
elastic network of macromolecules to study how mesoscopic interactions
influence macroscopic rheological behavior in soft
materials <cit.>. We assume non-linear hydrodynamic drag
forces act between the macromolecule and the fluid, where the
contribution of elastic and viscous interactions are controlled at the
mesoscopic level. By changing the physical parameters of elastic and
drag forces, we obtain materials with exponential or power-law
relaxations or then an intermediary behavior for responses not clearly
characterized. Our results show that exponential behavior is, in fact,
the most common regime of deformation, being described by the standard
linear solid model. Power-law responses are exceptional outcomes for a
particular range of sublinear drag forces.
Our model consists of N spherical particles of diameter σ and
mass m arranged in a face-centered cubic (FCC) lattice with
dimensions x× y× z given by σ Hsin(π/3) ×σ Hsin(π/3) ×σ H, where H is the number of
layers in z direction, as shown in Fig. <ref>(a). Every
particle interacts with its twelve nearest neighbors through an
elastic potential with an effective spring constant k. The spring
network is immersed in a viscous fluid, where drag forces act on
moving particles. In this coarse-grained approach, the particles
represent macromolecules commonly found in suspended polymer chains,
colloidal aggregations, and other load-bearing structures of soft
matter.
We perform computational indentation assays to probe this network's
effective viscoelastic properties. Firstly, a rigid spherical
indenter presses down the network at a constant rate. This
loading stage is done during a time τ_l until a maximum
indentation depth δ_max is achieved. After that, called
dwell stage, the indenter stays still while the network
rearranges towards a minimum energy configuration. Particles in the
bottom layer are not allowed to move along the z-axis (where
deformation is applied) but are free to slide horizontally. To avoid
finite-size effects, we limit the maximum indentation to less than
10% of the network height <cit.>, and thus we apply
δ_max≈σ.
The equation of motion of the i_th particle, at position r⃗_i, is given by the following
equation <cit.>
md^2 r⃗_i/dt^2 = - ∇ U_i - γ v^α_iv̂_i,
where U_i is the interaction potential of particle i due to other
particles and the indenter, given by
U_i = k/2∑_j (r_ij-ℓ)^2 + ϵ[σ/r_is-(σ_s-σ)/2]^ξ.
The summation in the first part runs over the neighbors, where
r_ij=|r⃗_i-r⃗_j| and ℓ are, respectively, the
distance and the equilibrium distance between the centers of particles
i and j. The last term in Eq. (<ref>) represents a hard-core
potential applied only to those particles in contact with the
indenter, where ϵ is an energy parameter, and
r_is=|r⃗_i-r⃗_s| is the distance between the center of
the particle and the indenter. The exponent ξ must be large enough
to keep the stiffness of the indenter.
The last term of Eq. (<ref>) represents a generalized drag
force acting oppositely to the particle velocity, v⃗_i = v_iv̂_i, with magnitude given by γ v^α_i, where γ
and α are related to the particle geometry and the fluid
properties in which the particles are immersed. Dissipation vanishes
for γ=0, leading to purely elastic networks where our model
reproduces the well-known Hertz behavior for mechanical
contacts <cit.>. However, when local friction becomes
relevant, γ > 0, the model may produce distinguished behaviors
of viscoelastic materials. Notice that α = 1 and α = 2
represent typical values for drag forces acting on rigid
structures. The linear regime, known as Stoke's law, arises for small
Reynolds numbers when viscous forces dominate over inertial forces,
where γ is proportional to the medium's viscosity and the
particle's diameter. On the other hand, the quadratic drag is dominant
for large Reynolds numbers. In this case, γ is proportional to
the medium's density and the cross-sectional area of the particle.
The physical origins of the sublinear regime (α<1), however,
are entirely different and are related to the
deformability/adaptability of bodies subjected to drag
forces <cit.>. Many living beings present sublinear drag
behaviors, where deformability is a survival strategy to protect their
fragile structures under hydrodynamic conditions. Characterizing the
drag exponents in deformable systems is recurrent in botany,
aerodynamics, and hydrodynamics <cit.>. Typical drag exponents for algae are as
small as 0.34 <cit.>. On the other hand, tulip and willow
oak trees are more rigid and present exponents close to unity,
α=0.92 and α=0.94 <cit.>, respectively. The
limiting case of α=0 corresponds to constant frictional forces,
regardless of the particle velocity. In our model, micro deformations
are associated with a new molecular arrangement of the macromolecules.
The numerical solution of Eq. (<ref>) is performed through
molecular dynamics simulations <cit.> with
periodic boundary conditions applied to the horizontal plane, and time
integration is done with the velocity Verlet algorithm with time step
dt. See <cit.> for the parameters used. The force is computed
as the sum of all collisions on the indenter at each time step. Each
set of k, γ, and α represents a specific material and
defines the macroscopic viscoelastic responses. To investigate how
microscopic properties lead to the rheological behavior of the entire
network, we perform simulations varying the spring constant between
100 and 1000, the drag constant between 10 and 100, and the drag
exponent between 0.0 and 1.0, totalizing 2100 different networks.
Figure <ref>(b) shows typical force curves for γ=80 and
k=800 and different values of the drag exponent. F(t) is the
computational analogous of an indentation assay used to characterize
macroscopic responses of actual materials. In the loading stage, the
indenter slowly deforms the network until the contact force reaches
its maximum value, which is inversely proportional to α. In the
dwell stage, when the indenter stays still, F(t) relaxes until part
of the mechanical energy is lost through friction. The timescale of
such dissipation depends on α in a highly complex fashion. For
α = 2, dissipation is fast enough so that the response behavior
is qualitatively identical to a perfectly elastic network. For
α<1, drag forces slowly remove energy from the network leading
to a viscoelastic decay.
In a continuum approach, the analytical time-dependent contact force
of a viscoelastic sample indented by a spherical punch follows the
convolution integral <cit.>
ℱ(t) = ∫_0^t
R(t-t^')dδ^3/2(t^')/dt^' dt^',
where R(t) is the relaxation function and δ(t) the
indentation depth history. The contact force in
Eq. (<ref>) is normalized by the constant
4√(σ_s)δ_max^3/2 / 3(1-ν^2), where ν
is the Poisson coefficient. Typical relaxation behaviors for
viscoelastic materials are given by
R_P(t) = E_∞ + Δ E t^-β,
R_E(t) = E_∞ + Δ E e^-t/τ,
where R_P(t) is the relaxation model for power-law materials with an
exponent β and R_E(t) for exponential materials with
relaxation time τ. In both models, E_∞ is the elastic
modulus at considerable times when the material is completely relaxed,
and Δ E is the difference between the maximum value, at
t=τ_l, and E_∞. We assume that materials become
perfectly elastic after some time, although this long-time elasticity
plateau is only sometimes observed in actual
materials <cit.>. However, micro-deformations are allowed
only due to the movement of the pseudo-atoms, which is represented by
the sublinear drag regime. Solving Eq. (<ref>) with
Eqs. (<ref>) in the dwell stage leads, respectively, to
ℱ_P(t) = E_∞ + a t^-β,
ℱ_E(t) = E_∞ + b e^-(t-τ_l)/τ - c e^-t/τ,
where the constant a≈Δ E/Γ(1-β) is
obtained by expanding the incomplete beta function, Γ(1-β)
is the gamma function, and b=3τ/2τ_lΔ E and
c=3√(π)/4(τ/τ_l)^3/2Δ E
erfi(√(τ_l/τ)), where
erfi(√(τ_l/τ)) is the imaginary error function of
x.
Fitting the dwell part of the force curve allows us to map the
macroscopic mechanical properties (E_∞, Δ E, τ,
β) with the mesoscopic parameters (k, γ and α)
as done previously for α=1 <cit.>. Here we focus on
finding the qualitative rheological behavior rather than describing
relations among parameters. Figures <ref>(c) and (d) show the
same force curves as in (b) for α=0.45 and α=0.85,
respectively, where the curves are fitted both with ℱ_P(t)
and ℱ_E(t). Clearly, the α=0.45 case is better
fitted with the power-law model, while α=0.85 with an
exponential.
The mean-square error determines the goodness-of-fit parameter between
the obtained numerical force curve F(t) and the analytical force
models given in Eqs. <ref> and <ref>,
χ_M = 1/N_p∑_i=1^N_p[F(t_i)-ℱ_M(t_i)]^2,
where N_p is the number of points in the force curves and M stands
for exponential (E) or power-law (P) model type. This statistical
index, calculated for each combination of k, γ, α, is
used in a K-means method as an unsupervised clustering
strategy <cit.> to classify the computational
force curves as either an exponential or a power-law behavior, or even
a transitional regime that cannot be clearly classified. In this
machine learning process, the classification of the material takes
into account not only the values of χ_E and χ_P but also
the trends and distributions in the phase space of χ_E and
χ_P. Figure <ref>(a) shows the graph visualization of this
clustering process. The exponential behavior is indeed the most common
one, as shown in the big cluster in Fig. <ref>(a), but small
groups of power-law materials are also observed. The parallel
coordinates plot in Fig. <ref>(b) summarizes the rheological
outcomes. Each line passes through every combination of k, γ,
and α ending up in one of the three boxes representing the
response behavior of the network.
To understand why small clusters of power-law materials form in
Fig. <ref>(a), we must investigate the impact of considering
sublinear drag regimes. Fig. <ref> shows the normalized
probability P(α) of finding PL, EXP, or TR behavior for a given
α. In panel (a), P(α) is computed for all values of k
and γ considered here. The three distributions strongly
overlap, making classification a challenging exercise. In panel (b),
on the other hand, we remove small values of k and γ. For
networks not too soft, k ≥ 800, and not too elastic, γ≥
80, those distributions split for different regions of α, and
the drag exponent becomes the central controller to characterize the
macroscopic behavior. Exponential behaviors are found mainly for
α⪅ 0.2 and α⪆ 0.55, while the
relaxation is a power law for α between 0.3 and 0.45. For
intersecting values of α, the superposition of the
probabilities of PL and EXP leaves doubt in classifying the material
either as an exponential or a power law.
For those cases where the network presents a power-law behavior, we
show in Fig. <ref> the relationship between the macroscopic
relaxation exponent β and the drag exponent. For each value of
α, there is a small dispersion distribution of β whose
mean range is between 1.05 and 1.35. Actual materials exhibiting
power-law relaxation usually present smaller exponents and exhibit
structural disorder and metastability <cit.>. Computational investigations of
disordered two-dimensional networks obtained relaxation exponents
between 0.5 and 0.75, depending on the network
arrangement <cit.>. Our simulations exhibit macroscopic
relaxation exponents above 1.0, mainly because our viscoelastic solid
model is structurally ordered and stable, restricting the viscoelastic
responses to faster relaxation regimes. Our results clearly show that
structural disorder is not a mandatory ingredient for power-law-like
viscoelasticity and can only change the exponent.
In conclusion, we show why viscoelastic materials present power-law or
exponential relaxation responses. Using molecular dynamics
simulations, we perform numerical indentations onto a network of
interacting macromolecules immersed in a fluid and reproduce typical
viscoelastic signatures as those found experimentally. The
macromolecules interact with the fluid through a non-linear drag
regime given by γ v^α, where γ and α are
mesoscopic parameters, and v is the particle's velocity. For each
set of the interacting parameters, we classify the macroscopic
viscoelasticity using an unsupervised clustering algorithm according
to the type of relaxation of the deformed network, namely, exponential
or power-law relaxations or transitional behavior between them. While
exponential behaviors are predominant, power laws may arise in the
sublinear regime. In fact, the drag exponent alone may explain the
macroscopic viscoelastic relaxation for materials not too elastic nor
too soft. More specifically, power-law responses are found for
0.3⪅α⪅ 0.45, while exponential responses
for 0.0⪅α⪅ 0.2 and 0.55⪅α⪅ 1.0.
The authors acknowledge the financial support from the Brazilian
agencies CNPq, CAPES, and FUNCAP.
100
Lakes2017 R. S. Lakes, Viscoelastic Solids (CRC Press,
2017).
Maxwell1867 J. C. Maxwell, On the dynamical theory of gases,
Phil. Trans. Royal Soc. London 157, 49 (1867).
Markovitz1977 H. Markovitz, Boltzmann and the beginning of
linear viscoelasticity, Trans. Soc. Rheology 21, 381 (1977).
Sousa2020 J. S. de Sousa, R. S. Freire, F. D. Sousa,
M. Radmacher, A. F. B. Silva, M. V. Ramos,
A. C. O. Monteiro-Moreira, F. P.Mesquita, M. E. A. Moraes,
R. C. Montenegro, and C. L. N. Oliveira, Double power-law
viscoelastic relaxation of livingcells encodes motility trends,
Sci. Rep. 10, 4749 (2020).
Sousa2021 F. B. de Sousa, P. K. V. Babu, M. Radmacher,
C. L. N. Oliveira, and J S de Sousa Multiple power-law viscoelastic
relaxation in time and frequency domains with atomic force
microscopy, J. Phys. D: Appl. Phys. 54, 335401 (2021).
Sousa2017 J. S. de Sousa, J. A. C. Santos, E. B. Barros,
L. M. R. Alencar, W. T. Cruz, M. V. Ramos, and J. Mendes Filho,
Analytical model of atomic-force-microscopy force curves in
viscoelastic materials exhibiting power law relaxation, App.
Phys. Rev. 1, 8 (2017).
Song2017 R. Song, G. Jiang, and K. Wang, Gelation mechanism
and rheological properties of polyacrylamide crosslinking with
polyethyleneimine and its plugging performance in air-foam
displacement, App. Polymer Sci. 4 11 (2017).
Calvet2004 D. Calvet, J. Y. Wong, and S. Giasson,
Rheological Monitoring of Polyacrylamide Gelation: Importance of
Cross-Link Density and Temperature, Macromolecules 7769 7771
(2004).
Rehage1988 H. Rehage and H. Hoffmann, Rheological properties
of viscoelastic surfactant systems, The Journal of Physical
Chemistry 4713 4719 (1988).
Efremov2017 Y. M. Efremov, W.-H. Wang, S. D. Hardy,
R. L. Geahlen and A. Raman, Measuring nanoscale viscoelastic
parameters of cells directly from AFM force-displacement curves,
Nature 4 11 (2017).
Ketz1988 R. J. Ketz, Jr., R. K. Prud'homme and
W. W. Graessley, Rheology of concentrated microgel solutions,
Rheologica Acta 535 531 (1988).
Sollich1998 P. Sollich, Rheological constitutive equation
for a model of soft glassy materials, Phys. Rev. E 58 738
(1998).
Larson1999 R. G. Larson, The Structure and Rheology of
Complex Fluids (Oxford University Press, 1999).
Moreira2012 A. A. Moreira, C. L. N. Oliveira, A. Hansen,
N. A. M. Araújo, H. J. Herrmann, and J. S. Andrade, Fracturing
Highly Disordered Materials, Phys. Rev. Lett. 109, 255701
(2012).
Oliveira2014 C. L. N. Oliveira, J. H. T. Bates, and B. Suki,
A network model of correlated growth of tissue stiffening in
pulmonary fibrosis, New J. Phys. 16, 065022 (2014).
Achar2012 B. N. Achar, and J. W. Hanneken, "Microscopic
Formulation of Fractional Theory of Viscoelasticity", in
Viscoelasticity - From Theory to Biological Applications. London,
United Kingdom: IntechOpen, 2012.
Yucht2013 M. G. Yucht, M. Sheinmanb and C. P. Broedersz,
Dynamical behavior of disordered spring networks, Soft Matter
9, 7000 (2013).
Milkus2017 R. Milkus, and A. Zaccone, Atomic-scale origin of
dynamic viscoelastic response and creep in disordered solids,
Phys. Rev. E 95, 023001 (2017).
Tsallis1988 C. Tsallis, Possible Generalization of
Boltzmann-Gibbs Statistics, J. Stat. Phys. 52, 479 (1998).
Tsallis2009 C. Tsallis, Nonadditive entropy and nonextensive
statistical mechanics - an overview after 20 years,
Braz. J. Phys. 39, (2a) (2009).
Murilo2001 M. P. Almeida, Generalized entropies from first
principles, Phys. A 300, 424 (2001).
Stanley1971 H. E. Stanley, Introduction to Phase
Transitions and Critical Phenomena (Oxford, 1971).
Praprotnik2007 M. Praprotnik, L. D. Site and K. Kremer,
Multiscale Simulation of Soft Matter: From Scale Bridging to
Adaptive Resolution, Rev. Phys. Chem. 547, 571 (2007).
Qu2011 Z. Qu, A. Garfinkel, J. N. Weiss, M. Nivala,
Multi-scale modeling in biology: How to bridge the gaps between
scales?, ELSEVIER 21, 31 (2011).
Doi2013 M. Doi, Soft Matter Physics (Oxford, 2013).
West2003 B. J. West, M. Bologna, and P. Grigolini, Physics of Fractal Operators (Springer, 2003).
Jaishankar2012 A. Jaishankar and G. H. McKinley, Power-law
rheology in the bulk and at the interface: quasi-properties and
fractional constitutive equations, Proc. R. Soc. A 469, 20120284
(2012).
Fabry2001 B. Fabry, G. N. Maksym, J. P. Butler, M. Glogauer,
D. Navajas, and J. J. Fredberg, Scaling the microrheology of living
cells, Phys. Rev. Lett. 87, 148102 (2001).
Fabry2003 B. Fabry, G. N. Maksym, J. P. Butler, M. Glogauer,
D. Navajas, N. A. Taback, E. J. Millet, and J. J. Fredberg, Time
scale and other invariants of integrative mechanical behavior in
living cells, Phys. Rev. E 68, 041914 (2003).
Araujo2020 J. L. B. de Araújo, J. S. de Sousa,
W. P. Ferreira, and C. L. N. Oliveira, Viscoelastic multiscaling in
immersed networks, Phys. Rev. Research 2, 033222 (2020).
Garcia2018 P. D. Garcia and R. Garcia, Determination of the
Elastic Moduli of a Single Cell Cultured on a Rigid Support by Force
Microscopy, Biophys. J. 114, 2923 (2018).
Langevin1908 P. Langevin, Sur la théorie du mouvement
brownien, C. R. Acad. Sci. (Paris) 146, 530 (1908).
Lemons1997 D. S. Lemons and A. Gythiel, Paul Langevin's 1908
paper “On the Theory of Brownian Motion” [“Sur la théorie du
mouvement brownien,” C. R. Acad. Sci. (Paris) 146, 530 (1908)],
Am. J. Phys. 1081, 1081 (1997).
Vogel1994 S. Vogel, Life in moving fluids: the
philosophical biology of flow (Princeton University Press. 1994).
Gosselin2010 F. Gosselin, E. de Langre and
B. A. Machado-Almeida, Drag reduction of flexible plates by
reconfiguration, J. Fluid Mech. 650, 319 (2010).
Vogel1989 S. Vogel, Drag and Reconfiguration of Broad Leaves
in High Winds, Journal of Experimental Botany 945, 948 (1989).
John2015 J. A. Chapman, B. N. Wilson, and J. S. Gulliver,
Drag force parameters of rigid and flexible vegetal elements, Water
Resources Research 3293, 3292-3302 (2015).
Favier2009 J. Favier, A. Dauptain, D. Basso and A. Bottaro,
Passive separation control using a self-adaptivehairy coating,
J. Fluid Mech. 627, 451 (2009).
Vogel1984 S. Vogel, Drag and Flexibility in Sessile
Organisms 1, Amer. Zoll. 40, 44 (1984).
Rapaport2004 D. C. Rapaport, The Art of Molecular
Dynamics Simulation - second edition (Cambridge University Press,
2004)
Araujo2017 J. L. B. de Araújo, F. F. Munarin,
G. A. Farias, F. M. Peeters, and W. P. Ferreira, Structure and
reentrant percolation in an inverse patchy colloidal system,
Phys. Rev. E 95, 062606 (2017).
Param The dimensionless length, mass, and energy units are
given, respectively, by σ=1, m=1, ϵ=1, and the
timestep dt=0.001t_0, where the time unit has the following
relation t_0=√(mσ^2/ϵ). Other length
parameters are given by σ_s=10σ, ℓ=σ, and
H=15σ, and some exponents by ν=0.5 and ξ=400. The
number of particles in the network is N=2748.
Footnote This assumption is necessary to avoid high-pressure
effects in our numerical model. For instance, if the external force
is large enough to ultimately compress the small particles until a
condensate network is formed, any additional pressure would induce
the deformation of those particles.
Geron2019 A. Geron, Hands-On Machine Learning with
Scikit-Learn, Keras, and TensorFlow, Published by O'Reilly Media,
Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472., 1150
(2019).
Sinaga2020 K. P. Sinaga and M. Yang, Unsupervised K-Means
Clustering Algorithm, IEEE Access 8, 80716 (2020).
Sollich1997 P. Sollich, F. Lequeux, P. Hébraud,
M. E. Cates, Rheology of Soft Glassy Materials,
Phys. Rev. Lett. 78, 2020 (1997).
|
http://arxiv.org/abs/2303.06796v2
|
20230313010228
|
Ins-ATP: Deep Estimation of ATP for Organoid Based on High Throughput Microscopic Images
|
[
"Xuesheng Bian",
"Cheng Wang",
"Shuting Chen",
"Weiquan Liu",
"Sen Xu",
"Jinxin Zhu",
"Rugang Wang",
"Zexin Chen",
"Min Huang",
"Gang Li"
] |
cs.CV
|
[
"cs.CV"
] |
1
.001
Ins-ATP: Deep Estimation of ATP for Organoid
Xs. Bian et al.
mode = title]Ins-ATP: Deep Estimation of ATP for Organoid Based on High Throughput Microscopic Images
1,2]Xuesheng Bian[
orcid=0000-0002-7690-4386,
]
[email protected]
Conceptualization, Methodology, Writing - Original Draft
2]Cheng Wang[]
[email protected]
[1]
Conceptualization, Methodology, Supervision, Resources
5]Shuting Chen[]
[email protected]
Resources, Funding acquisition
2]Weiquan Liu[]
[email protected]
Methodology, Writing - Review & Editing, Funding acquisition
1]Sen Xu[]
[email protected]
Funding acquisition
1]Jinxin Zhu[]
[email protected]
Resources
1]Rugang Wang[]
[email protected]
Resources
4]Zexin Chen[]
[email protected]
Specimen culture, Resources
4]Min Huang[]
[email protected]
Investigation, Resources
3]Gang Li[]
[email protected]
[1]
Conceptualization, Methodology, Resources
[1]organization=Yancheng Institute of Technology,
addressline=Jiangsu province Yancheng City Hope Avenue Road 1,
city=Yancheng,
citysep=,
postcode=224051,
state=Jiangsu,
country=China
[2]organization=Fujian Key Laboratory of Sensing and Computing for Smart Cities, School of Informatics, Xiamen University,
addressline=Fujian province Xiamen City Siming South Road No. 422,
city=Xiamen,
citysep=,
postcode=361005,
state=Fujian,
country=China
[3]organization=Department of Otolaryngology-Head and Neck Surgery, Precision Medical Center, Nanfang Hospital,
addressline=Guangdong province Guangzhou City Baiyun District North Guangzhou Avenue No. 1838,
city=Guangzhou,
citysep=,
postcode=510000,
state=Guangdong,
country=China
[4]organization=Guangdong Research Center of Organoid Engineering and Technology,
addressline=Guangdong province Guangzhou City Huangpu District Kaiyuan Avenue No. 11,
city=Guangzhou,
citysep=,
postcode=510000,
state=Guangdong,
country=China
[5]organization=Chengyi University College, Jimei University,
addressline=Fujian province Xiamen City Jimei District Jimei Boulevard 199,
city=Xiamen,
citysep=,
postcode=361021,
state=Fujian,
country=China
Adenosine triphosphate (ATP) is a high-energy phosphate compound and the most direct energy source in organisms. ATP is an essential biomarker for evaluating cell viability in biology. Researchers often use ATP bioluminescence to measure the ATP of organoid after drug to evaluate the drug efficacy. However, ATP bioluminescence has some limitations, leading to unreliable drug screening results. Performing ATP bioluminescence causes cell lysis of organoids, so it is impossible to observe organoids' long-term viability changes after medication continually. To overcome the disadvantages of ATP bioluminescence, we propose Ins-ATP, a non-invasive strategy, the first organoid ATP estimation model based on the high-throughput microscopic image. Ins-ATP directly estimates the ATP of organoids from high-throughput microscopic images, so that it does not influence the drug reactions of organoids. Therefore, the ATP change of organoids can be observed for a long time to obtain more stable results. Experimental results show that the ATP estimation by Ins-ATP is in good agreement with those determined by ATP bioluminescence. Specifically, the predictions of Ins-ATP are consistent with the results measured by ATP bioluminescence in the efficacy evaluation experiments of different drugs.
Organoid ATP estimationDeep learning Microscopic images Multi-instance learning
[
[
March 30, 2023
==================
§ INTRODUCTION
In biopharmaceuticals, cell models and animal models are the mainstream models for drug screening. The culture of the cell model is easy, low cost, and the culture process can be precisely controlled, which enables large-scale drug screening <cit.>. However, the structure of the cell model is simple, making it unable to simulate the accurate response of drugs in a complex environment in vivo <cit.>. Compared with cell models, animal models can better simulate the complex environment of drugs in vivo, and the results of drug experiments are more convincing. However, animal models are high-cost and difficult to conduct large-scale experiments.
Organoids have been a research hotspot in recent years. It is an ideal drug test model, taking advantage of both cell models and animal models <cit.>. Organoids are 3D cell complexes cultured in vitro with highly similar structures and functions to the source organ or tissue. Organoids can be long-term cultured in vitro and have stable phenotypic and genetic characteristics. Compared with traditional 2D cell culture methods, organoids contain complex cell types and more complex biological communication. Therefore, organoids can better simulate the growth and development process and physiological and pathological states of organs or tissues, playing a significant role in drug screening and personalized medicine.
At present, researchers worldwide have made many efforts in organoid culture. They have successfully cultured various organoids, including normal organs such as the liver, kidney, stomach, heart, and various tumour organoids, e.g. breast cancer, lung cancer, and pancreatic cancer <cit.>. Organoid culture technology is developing rapidly, and various types of organoids are gradually successfully cultured. However, organoid-related analysis and processing technologies still rely on traditional methods designed for cell models, and there are few significant breakthroughs.
Microscopic imaging is essential for organoid analysis. Researchers use optical microscopes to observe the morphology and growth trends of organoids. However, organoid biomarkers, critical in organoid research, are difficult to estimate using microscopic images. Researchers have to use various reagents or professional instruments to measure the biomarkers of organoids. This process changes the original growth environment of the organoids and causes irreversible effects on the organoids.
Organoid microscopic images contain quite a wealth of information. After medication, drugs with superior efficacy have a massive impact on the development of organoids. We observed that the organoids show different appearances after medication, such as decomposition, contraction, and ablation. Specifically, obtaining microscopic images of organoids does not affect the growth of the organoids and interfere with the effect of drugs on the organoids. Therefore, if the discriminative features related to organoid biomarkers can be extracted from organoid microscope images, the estimation from microscope images to organoid biomarkers can be achieved.
Numerous studies show that deep learning technology represented by deep neural networks (DNNs) has great potential in computer vision <cit.>. After years of development, deep learning technology has penetrated various computer vision tasks, such as object recognition <cit.>, object detection <cit.>, segmentation <cit.>, super-resolution <cit.>, registration <cit.>, etc. Deep neural networks (DNNs) effectively learn important features in images and improve the representation ability of image features through end-to-end learning. Therefore, we hope to estimate organoid biomarkers from microscopic images of organoids through deep learning techniques.
In organoid drug screening experiments, ATP bioluminescence is an important means to assess the viability of organoids <cit.>. However, ATP bioluminescence causes organoid lysis, making it hard to obtain the changing trend of organoid viability after performing ATP bioluminescence. Therefore, performing ATP bioluminescence at different times may result in different ATP measurement results, making organoid drug screening results unreliable. There are few studies on non-invasive biomarkers estimation for organoids through investigation. In this paper, we take the ATP of organoids as an example to explore the application potential of deep learning techniques in organoid drug screening tasks.
Organoid ATP estimation using deep learning is a challenging task. First, deep learning techniques rely on a large number of labelled samples, but there are currently no open-source datasets for this task. Second, only living cells contain ATP, and organoid images are filled with many ATP-independent targets, such as vacuoles, impurities, background, etc. These objectives easily cause instability of the model optimization during the training process, resulting in disturbance of the estimation results. Finally, the ATP range of organoids is large, and the samples distribute unevenly, which causes the model prediction results to be inaccurate for extreme samples.
In this study, we propose a multi-instance learning based model, Ins-ATP, to address the above challenges. Ins-ATP accurately estimates the ATP of organoids from microscopic images. To our knowledge, this is the first attempt that introduces deep learning to solve ATP estimation for organoids. The contribution of the method proposed in this paper are as follows:
* We construct the first organoid ATP estimation dataset, which is vital for organoid biomarker estimation.
* We design the first organoid ATP estimation model, Ins-ATP. We introduce a multi-instance learning strategy, which effectively overcomes the disturbance of objects unrelated to ATP estimation in the image and improves the prediction accuracy and robustness.
* The proposed Ins-ATP achieves accurate ATP estimation of organoids, and its predictions are in high agreement with ATP bioluminescence. In addition, Ins-ATP's evaluation of the efficacy differences of different drugs has a high correlation with the results of ATP bioluminescence.
§ RELATED WORKS
Organoid viability evaluation is a critical step in organoid drug screening. Conventional ATP bioluminescence interferes with the normal development of the organoid. Therefore, researchers have been exploring easy-to-use and non-invasive methods for organoid viability evaluation. Some existing works have initially explored organoid viability evaluation using organoid imaging. The challenge in achieving organoid viability evaluation by organoid imaging is the high amount of redundant information in organoid images.
Thompson et al. <cit.> proposed to evaluate organoid viability by counting the change in the number of organoids after thawing and the percentage of live cells after fluorescent staining. This method considered microscopic observation to evaluate organoid viability and reduce the impact on the sample. However, this is only a qualitative assessment method, and its accuracy cannot be quantified. Powell et al. <cit.> proposed an AutoML-based deep learning model to regress the terminal viability readout (CellTiter-Glo) in high-throughput microscopic images and achieved high performance. However, the method did not address the problem of highly redundant information in high-throughput microscopic images in a targeted manner. Thus the correlation between the predicted and true values on different sample groups is unstable.
In the previous works, we proposed an organoid viability evaluation method based on the expert weak label before, which combines organoid detection and organoid viability scoring to achieve the evaluation of whole-well sample viability <cit.>. However, this method performed detection in advance to reduce the interference of redundant information in images but focused mainly on the larger-sized organoids in 96-well plates and was not compatible to samples in 384-well plates.
Since ATP of the organoid is only strongly correlated with the organoid, the target changes in the microscopic images that are unrelated to ATP should not impact the ATP estimation results. However, deep learning methods are more sensitive to changes in the images, and slight changes in the images may cause severe perturbations in the prediction results. Therefore, the key to improving organoid ATP estimation performance lies in overcoming the discrepancy of prediction results caused by the perturbation of targets other than organoids in the images. We find that the characteristics of the organoid ATP estimation task are highly compatible with the multi-instance learning paradigm<cit.>.
In the multi-instance learning approach, the basic unit of training samples is the bag. Each bag contains multiple samples, and the samples in the bag are called instances, and each instance has a different impact on the bag according to its importance. Multi-instance learning has many applications in pathological image analysis tasks that similar to high-throughput organoid microscopic image analysis. Campanell et al. <cit.> proposed a multi-instance learning based approach that uses diagnostic reports as training labels to avoid expensive and time-consuming manual annotation of pixels. Naik et al. <cit.> proposed a multi-instance based approach to directly assess Estrogen Receptor Status (ERS) from pathology images. Lerousseau et al. <cit.> proposed a multi-scale domain adversarial multi-instance convolutional network for cancer subtype classification. All of the above methods used multi-instance learning to overcome the problem of too much redundant information in pathology images.
§ MATERIAL AND METHODS
§.§ Data
We constructed the first ATP estimation dataset. The samples used in the dataset are tumour organoids, including colon cancer, lung cancer, nasopharyngeal cancer, ovarian cancer, and pancreatic cancer. All images were captured from organoids cultured in 384-well plates, and the corresponding ATPs were measured by ATP bioluminescence after imaging. The organoid microscopic images were acquired using the Cytation 5 imaging system, which images all wells in a plate using a uniform setting. The resolution of the captured image is 1992 × 1992, and the corresponding physical size is 3.45mm × 3.45mm. All organoids covered three distinct stages: culture stage, pre-dose and post-dose. The drugs and drug concentrations added to different wells are different, making the ATP vary in different images. We collected 1678 microscopic images and found that the range of ATP values measured by ATP bioluminescence was large, ranging from 0 to 400,000. In addition, the samples are distributed unevenly; see Figure <ref>. The ATPs corresponding to these images are mainly distributed in the interval of 0-200000, and most samples are concentrated in 0-100000. Only very few samples are distributed from 200000 to 400000.
§.§ Proposed Methodology
To estimate ATP from microscopic images accurately, we have to solve two other challenges: (1) Organoid images are full of ATP-irrelevant targets. Directly using supervised learning to learn image-to-value mapping is easy to make the model learns redundant features. The slight perturbations in the image can make model predictions unstable. (2) The numerical range of ATP is extremely large, and the samples are unevenly distributed. This dilemma may make the model optimization unstable and inaccurate in predicting extreme samples when DCNNs are trained with limited data. To address challenge (1), we introduce a multi-instance learning mechanism that treats organoid images as bags and objects in the images as instances <cit.>. The instances determine the label of the bag, and the perturbation of redundant instances does not produce subversive effects on the prediction of the bag. To address challenge (2), we introduce a multi-task learning strategy, treating the problem of mapping organoid images to organoid ATP values as a combined optimization problem of regression and classification. Through multi-task training, the generalization of features can be effectively improved, and satisfying results can also be achieved on a small dataset.
One of the critical factors affecting the performance of multi-instance learning is the construction strategy of instances. We propose two instances constructions methods: rule-based instance and learning-based instance. The rule-based instance is constructed according to rules, which usually requires defining instances in advance, such as cropping the image into image patches and performing organoid detection. Each image patch is regarded as an instance, as shown in Figure <ref>. The learning-based instance constructs instances without manually defining instance generation rules and constructs instances by learning, as shown in Figure <ref>. We propose two different architectures: MeshIns-ATP and DeepIns-ATP, based on these two instance construction schemes. The two models share other settings except for the instance construction schemes.
The Ins-ATP proposed in this paper consists of a CNN-based feature extractor, an attention module, and a regression network. The detailed network architectures are shown in Figure <ref> and Figure <ref>. The feature extractor extracts representations from the organoid image that are important for ATP estimation. The attention module weights the features of the instances in the bag according to their importance and achieves feature aggregation. The regression network maps the aggregated features to the corresponding ATP values of the images.
§.§.§ CNN-Based Feature Extractor
Convolutional Neural Networks (CNNs) are widely used in various computer vision tasks due to their superior performance in image feature extraction <cit.>. The feature extractor of Ins-ATP used in this paper also uses CNN as an essential component. In the back-propagation during optimization, the gradient vanished quickly as the network layers increased. ResNet introduces residual connections, effectively alleviating the vanishing gradient problem <cit.>. Therefore, the feature extractor in our proposed Ins-ATP also introduces the residual connection. All instances share the feature extractor. We use two feature extraction schemes here. First, construct the instances and then extract features for all instances one by one; Second, extract features from the entire image and then construct the instances. These two schemes correspond to the above two instance construction strategies, respectively.
§.§.§ Attention Module
Multi-instance learning takes a bag as the training unit. A bag is composed of several instances, and all instances jointly influence the prediction result of the bag. In the organoid ATP estimation task, many ATP-unrelated objects exist in the organoid image, such as impurities, vacuoles, etc. All these objects can be regarded as instances. Due to differences between instances, each instance's contribution to the bag varies. The attention mechanism is an popular method in natural language processing and then gradually extended to the field of computer vision <cit.>. The attention mechanism mimics the human visual mechanism to focus on key locations in the image.
Therefore, we introduce an attention mechanism to focus on instances crucial for ATP estimation. In general, the key instances to the prediction get higher weights. Here, we define the attention mechanism as Eq. (<ref>). In the Eq. (<ref>), z represents the aggregated feature, h represents the instance feature, V represents the trainable parameters, and a_n represents the instance weight. Through the attention mechanism, we get the final prediction depending on the contribution of each instance.
z= ∑_n=1^Na_nh_n
where a_n= exp{ w^⊤tanh( V h_n^⊤) }/∑_j=1^bexp{ w^⊤tanh( V h_j^⊤) }
§.§.§ Regression Network
The regression network is a fully connected network that maps the aggregated features to the corresponding ATP values of the images. Since the annotations range from 0 to 400000, direct optimization with ATP may lead to unstable training. So we encode the ATP with the following steps. First, we separate the range of 0 - 400000 into several bins by the bin width R_bin, then divide the ATP by the bin width R_bin. Second, binary-coded the integer part of the output to obtain the integer representation of ATP, and take the fractional part as the decimal representation of ATP. Taking the sample with ATP of 239420 as an example, the bin width is set to 20000, and the intermediate result is 239420/20000=11.971. Take the integer part 11 and convert it to binary representation 1011; the fractional part is 0.971. The encoded value is represented by a 5-dimensional vector {1, 0, 1, 1, 0.971}.
§.§.§ Loss Function
The mathematical notations are as follows: 𝔽(X,θ) represents the organoid ATP estimation model, Ins-ATP, proposed in this paper, and θ is the parameters of Ins-ATP. We feed N_b training samples as a batch to the model, {(X_1,Y_1), (X_2,Y_2), ..., (X_b,Y_b)}. X_i represents the input organoid image, Y_irepresents the ATP value corresponding to the input image, and B represents the vector dimension after ATP encoding. After the above encoding, Y_i can be encoded Ŷ_i,j, where i represents the index number of the sample, and j represents the j-th component of the encoded representation. To stabilize the optimization process and improve the training efficiency, we propose an auxiliary loss for training in a multi-task learning manner.
The loss function consists of two terms (Eq. (<ref>)): the first term is the ATP encoding loss (Eq. (<ref>)), which consists of a binary cross-entropy loss for the integer part of the ATP encoding and a mean squared error loss for the fractional part; the second term is the mean squared error loss for normalized ATP (Eq. (<ref>)). Considering that the different elements in the ATP-encoded vector have different contributions to the predicted value, a weighting mechanism is introduced here, see Eq. (<ref>). where i represents the ground truth coding dimension index, w represents the decay factor, and epoch represents the current training epoch. The weight of the prediction vector decreases bit by bit from left to right, and the model focuses on optimizing the high position of ATP encoding in the early stage. With the increase of the training epoch, the weight of each position is gradually balanced. It can be seen from Figure <ref> that with the increase of the number of the training epoch, the weight of each element in the ATP encoding gradually approaches 1. Figure <ref> shows that by adjusting the decay factor w, the weight difference of each element at the beginning of training can be adjusted. The smaller the w, the greater the weight difference. Figure <ref> shows that after the decay factor w is determined, the weight difference caused by the loss of each element of the vector, the higher the component position, the higher the initial weight.
In the Eq. (<ref>), we normalize the ATP, map it to the range of 0 - 1, and then use the mean square error to calculate the mean square loss for the normalized predicted value and the ground truth.
ℒ=αℒ_cls+(1-α)ℒ_reg
ℒ_cls= 1/NB∑_i=1^N( ∑_j=1^B-1(ℒ_bce(𝔽(X_i,θ)_j,Ŷ_i,j)× W_j)
+ ∑_j=B-1^B(ℒ_mse(𝔽(X_i,θ)_j,Ŷ_i,j)× W_j)))
ℒ_reg=1/N∑_i=1^N ℒ_mse(𝔽(X_i,θ),Y_i)
[ W[i]= (1/1+e^(ln(1/w-1)-epoch/30))^i ]
[ ℒ_bce(x, y)=y_ilog x+(1-y) log(1-x) ]
[ ℒ_mse(x, y)=(x-y)^2 ]
§.§ Optimization Strategy
Due to the unevenness in the number of samples distributed in different bins of ATP, direct optimization by random sampling may lead to poor performance in samples distributed in specific bins of ATP. Therefore, we design a sampling strategy to ensure that the number of training data distributed in each bin remains balanced. Taking the maximum value of ATP as ATP_max, and regarding it as an example, the detailed process is as follows: (1) Set the bin width R_bin, and the number to separating bins is ATP_max//R_bin; (2) Suppose the training batch is B, then sample B//(ATP_max//R_bin) images uniformly from each bin; (3) Combine the samples in each bin to form the training samples for each iteration. After sampling, the number of samples participating in training is the same in each bin. The training data and the validation data are divided from the dataset randomly after shuffling.
To enhance the stability of the training, we perform image augmentation on the input image, including random horizontal and vertical flipping, overall random pixel value perturbation, and random rotation. On the one hand, the features learned by the network are robust to image flipping and brightness changes, and on the other hand, a large number of data are randomly constructed to increase the number of training samples.
The proposed Ins-ATP is implemented using the Pytorch <cit.> deep learning framework. The weight decay factor in the loss function is set to 0.9. The model is optimized on an Nvidia GTX 3090 GPU using the Adam optimizer, and the batch is set to 15. The learning rate is set to 0.002, which decays 0.1 every 10 epochs. We train Ins-ATP 200 epochs in total. All training data needs to be preprocessed, and only images covering the well are retained. The cropped image patch is resampled to a specific size and normalized before inputting to Ins-ATP.
§ EXPERIMENTS
§.§ Experimental Setup
To validate the performance of Ins-ATP, we collected additional 335 test samples, all of which were determined by ATP bioluminescence. These samples are divided into 67 groups, and each group contains 5 samples. These samples include data from the same type of organoid with different drugs added, data from the same type of organoid sample with different concentration drugs added, and data from the same type of organoid with different drug combinations added. We design a series of experiments to verify the performance of the proposed algorithm. First, to compare predictions of Ins-ATP with the results of ATP bioluminescence, we used the mean absolute error as a metric (as shown in Eq. (<ref>)). Second, to compare the correlation between the ATP value and the Ins-ATP’s evaluation at different concentrations of the drug, we use the Pearson correlation coefficient as a measure (see Eq. (<ref>)).
MAE=1/n∑_i=0^n|𝔽(X_i,θ)-Y_i|
ρ = ∑_i=0^n(X_i-X̅)(Y_i-Y̅)/√(∑_i=0^n(X_i-X̅)^2∑_i=0^n(Y_i-Y̅)^2)
Firstly, the proposed Ins-ATP is compared with the traditional supervised learning methods to verify the advantages of multi-instance learning in the automatic organoid ATP estimation task. These traditional methods feed the whole image into the feature extraction network and map the learnt features directly to ATP values. We compared the performance of some popular network architectures in computer vision tasks, including VGG <cit.>, ResNet <cit.>, GoogLeNet <cit.>, and Inception V4 <cit.>.
Secondly, The parameter settings in image acquisition affect the image acquisition time. The higher the magnification of the image acquisition, the higher the resolution of the final image and the longer the acquisition takes. We should minimize the image acquisition time to alleviate the impact on organoid growth. The correlation between image resolution and model prediction performance is analyzed in our experiments. The input images are resampled at different scales, such as 128 × 128, 192 × 192, 256 × 256, 320 × 320, 384 × 384, 448 × 448, and 512 × 512. We retrained these models by these resampled images and analysed the trend of model performance with image resolution.
Finally, we designed ablation experiments to validate Ins-ATP proposed in this paper. Since factors such as instance generation method, instance feature aggregation strategy, and instance resampling strategy in multi-instance learning have significant effects on performance, we explore the effects of these settings on the performance of Ins-ATP. We compare the performance of the model for different instance generation methods and different numbers of instances. In addition, to investigate the impact of different feature aggregation strategies <cit.>, the performance of the Ins-ATP when different feature aggregation strategies are introduced is also compared, as shown in Figure <ref>.
§.§ Results
Comparison between multi-instance learning and traditional supervised learning
We first compare the Ins-ATP with the mainstream supervised learning methods. The models involved in the comparison include VGG <cit.>, ResNet <cit.>, GoogleNet <cit.>, and Inception Net V4 <cit.>. The above four models all use the models provided in the Pytorch framework and are initialized with pre-trained parameters on ImageNet <cit.>. All models are trained using the same training data. The experimental results are shown in Table <ref>. It can be found that the two methods (MeshIns-ATP and DeepIns-ATP) based on multi-instance learning proposed in this paper outperform the above four mainstream models in both evaluation metrics. It can be seen from Figure <ref> that the prediction errors of the above four models have a large variance, which indicates that these models have significant differences in the prediction accuracy of different samples. The variance of the prediction errors of Ins-ATP was kept low. As shown in Figure <ref>, the above four models have poor prediction performance in the interval where the real sample distribution is sparse. The multi-instance learning method, MeshIns-ATP and DeepIns-ATP, proposed in this paper can maintain a balanced performance in the entire dataset.
We visualize the optimization of all models, as shown in Figure <ref>. During the optimization of DeepIns-ATP, the overall downward trend of the loss curve remains stable, and the convergence speed is fast. In addition, as shown in Figure <ref>, the test set also maintains a steady decline without violent jitter. The other four models have serious jitter on the test set, indicating that the Ins-ATP also maintain good generalization performance on the test set.
Performance comparison at different image resolutions
Depending on the practical needs, microscopic images are acquired using different settings, such as magnification, number of stitching, etc. To analyze the performance of each model at different resolution images and to obtain the best resolution for training the models, we train the models with microscopic images at different resolutions. The experimental results are shown in Table <ref>. It can be seen that the prediction error of each model decreases with increasing resolution from Figure <ref>. When the resolution is low, all models have high prediction errors because of image quality problems. As the resolution increases, the performance of each model gradually increases, especially the MeahIns-ATP and DeepIns-ATP based on multi-instance learning proposed in this paper, whose performance improves significantly as the resolution increases.
Ablation study
Finally, we designed the ablation experiments of each module in Ins-ATP, including whether to introduce ATP encoding, whether to use resampling for images, different instance generation methods and different feature fusion methods. First, we divided the experiments into two groups according to the instance generation method: dividing the instances by grid before inputting the feature extractor and automatically generating the instances after inputting the feature extractor. Secondly, we conducted experiments for the three feature fusion methods. Three feature fusion methods were tried: (1) summing all instance features directly; (2) stitching all instance features and combining them into a higher dimensional feature; (3) weighting all example features to sum by the attention mechanism. Finally, an experimental comparison is made on whether to introduce ATP coding or not.
In the model training process, two training strategies are set in this paper according to whether to resample the images or not to explore the practicality of the resampling method for data with uneven sample distribution. The results of all the above experiments are shown in Table <ref>. The experiments show that the approach of generating instances with learning is more suitable for the task of ATP estimation, and its performance is better than generating instances by mesh. Introducing attention weighting for the feature fusion approach improves the prediction performance. In addition, the introduction of sample resampling and encoding of ATP can also help in performance improvement.
§ DISCUSSION
We propose a deep learning algorithm based on multi-instance learning in this paper to solve the problem of automatic estimation of ATP from microscopic images for organoids. In addition, we propose a loss function based on ATP encoding to optimize the model. In addition, a data resampling strategy is proposed to cope with the problem of uneven distribution of samples in the ATP prediction space. The model performance is verified through a large number of experiments, while the effects of various designs in the network on the model performance are compared through ablation experiments. The model proposed in this paper is analyzed below.
The experimental comparison shows that the estimation results of the Ins-ATP outperform the traditional supervised learning method on the test set for the automatic organoid ATP estimation task. The model optimization process based on multi-instance learning is more stable compared to traditional supervised learning methods, and this stability can maintain the advantage over the test data. It is because multi-instance learning treats the whole microscopic image as a bag, and changes in individual instances within the bag do not have a disruptive effect on the prediction of the whole bag by the attention mechanism. Due to various targets in the image that are redundant to ATP estimation, supervised learning strategies have difficulty learning robust features in a small amount of data.
By comparing the input images with different resolutions, we found that different models prefer training data with different resolutions but generally show the same trend. It can be found that the higher the resolution of the training images, the better the performance of the trained models obtained. As the image resolution decreases, a large number of details in the images are lost, thus leading to a poorer discriminative ability of the model on the data. Through the experiments, it can be found that the performance improvement of the model is weak after the resolution exceeds 384 × 384. Therefore, through experiments, the most suitable resolution can be found for this task to achieve a compromise between efficiency and accuracy.
Through extensive comparison experiments, each module and setting proposed in this paper positively affects performance improvement. By increasing the number of examples, the performance is significantly improved. The more examples, the less dependent the model is on specific examples, the more robust the model is to perturbations of individual examples, and the more accurate predictions it can make. In addition, the performance is sensitive to the interval width setting. Since the interval width setting affects the collateral loss in multi-task learning, a small interval width increases the number of intervals divided and the discrimination between samples increases, which affects the optimization of the ATP coding loss and the model training. Therefore, several experiments are needed to try the optimal setting.
Although the method in this chapter performs better on the automatic organoid ATP estimation task, the method has some limitations. First, the method is difficult to generalize on the same task for different organoid images, and the model needs to be retrained before it is used on other types of organoid data. Second, the method in this paper is designed only for data captured from 384-well plates. The number of organoids in different sizes of well plates can vary significantly due to the different volumes of the inner wells of the plates, and the differences in the values of ATP determined by bioluminescence may be extremely large. Therefore, this method is only compatible with tumour organoid images cultured in 384-well plates.
§ CONCLUSIONS
In this paper, we constructed a dedicated dataset for automatic ATP estimation of tumour organoids. We proposed a deep learning network, Ins-ATP, based on multi-instance learning to achieve accurate ATP estimation for tumour organoids. Our Ins-ATP effectively achieves accurate estimation of ATP from organoids' microscopic images. The method treats organoid microscopic images as a bag consisting of multi-instances and the organoid ATP estimation problem as a bag prediction problem.
To optimize the model and achieve regression with a wide range of values, we proposed a loss function based on ATP encoding, which maps the predicted value to a vector. We performed joint optimization by combining the cross-entropy loss and the mean squared error loss. To overcome the problem that the training is unstable due to the imbalance of training data in the ATP, we proposed a training data sampling strategy to improve the stability of the training.
Experiments show that the method based on multi-instance learning proposed in this paper is superior to the traditional supervised learning methods in organoid ATP estimation tasks. The prediction of our Ins-ATP is in good agreement with the measurement results of ATP bioluminescence.
§ DECLARATION OF COMPETING INTEREST
We would like to confirm that all authors were fully involved in the study and preparation of the manuscript. None of this work has been previously published, or been pending publication in another journal, or been under review in any other journal. None of the authors has a conflict of interest.
§ ACKNOWLEDGMENTS
cas-model2-names
|
http://arxiv.org/abs/2303.06747v1
|
20230312204907
|
Raising The Limit Of Image Rescaling Using Auxiliary Encoding
|
[
"Chenzhong Yin",
"Zhihong Pan",
"Xin Zhou",
"Le Kang",
"Paul Bogdan"
] |
cs.CV
|
[
"cs.CV",
"eess.IV"
] |
DTT: An Example-Driven Tabular Transformer by Leveraging Large Language Models
Davood Rafiei
March 30, 2023
===============================================================================
Normalizing flow models using invertible neural networks (INN) have been widely investigated for successful generative image super-resolution (SR) by learning
the transformation between the normal distribution of latent variable z and the conditional distribution of high-resolution
(HR) images gave a low-resolution (LR) input. Recently, image rescaling models like IRN utilize the bidirectional nature of INN to push the performance limit of image upscaling
by optimizing the downscaling and upscaling steps jointly. While the random sampling of latent variable z is useful in generating diverse
photo-realistic images, it is not desirable for image rescaling when accurate restoration of the HR image is more important.
Hence, in places of random sampling of z, we propose auxiliary encoding modules to further push the limit of image rescaling performance.
Two options to store the encoded latent variables in downscaled LR images, both readily supported in existing image file format,
are proposed.
One is saved as the alpha-channel, the other is saved as meta-data in the image header, and the corresponding modules are denoted as suffixes -A and -M respectively.
Optimal network architectural changes are investigated for both options to demonstrate their effectiveness
in raising the rescaling performance limit on different baseline models including IRN and DLV-IRN.
Super-Resolution, Image Rescaling
§ INTRODUCTION
Currently, ultra-high resolution (HR) images are often needed to be reduced from their original resolutions to lower ones due to various limitations like display or transmission.
Once resized, there could be subsequent needs of scaling them up so it is useful to restore more high-frequency details <cit.>.
While deep learning super-resolution (SR) models <cit.> are powerful tools to reconstruct HR images from low-resolution (LR) inputs, they are often limited to pre-defined image downscaling methods. Additionally, due to memory and speed constraints, HR images or videos are also commonly resized to lower resolution for downstream computer vision tasks
like image classification and video understanding. Similarly, they rely on conventional resizing methods which are subject to information loss and have negative impact on downstream tasks <cit.>.
Hence, learned image downscaling techniques with minimum loss in high-frequency information are quite indispensable for both scenarios.
Lastly, it is known that SR models optimized for upscaling only are subject to model stability issues when multiple downscaling-to-upscaling cycles are applied <cit.> so it further
validates the necessity of learning downscaling and upscaling jointly.
To overcome these challenges and utilize the relationship between upscaling and downscaling steps, recent works designed the encoder-decoder framework to unite these two independent tasks together.
Kim <cit.> utilized autoencoder (AE) architecture, where the encoder is the downscaling network and the decoder is the upscaling network, to find the optimal LR result that maximizes the restoration performance of the HR image. Sun <cit.> designed a learned content adaptive image downscaling model in which an SR model is trained simultaneously to best recover the HR images.
Later on, Li <cit.> proposed a learning approach for image compact-resolution using a convolutional neural network (CNN-CR) where the image SR problem is formulated to jointly minimize the reconstruction loss and the regularization loss. Although the above models can efficiently improve the quality of HR images recovered from corresponding LR images, these works only optimize downscaling and SR separately, while ignoring the potential mutual intension between downscaling and inverse upscaling.
More recently, a jointly optimized rescaling model was proposed by Xiao <cit.>
to achieve significantly improved performance.
An Invertible Rescaling Net (IRN) was designed to model the reciprocal nature of the downscaling and upscaling processes.
For downscaling, IRN was trained to convert HR input to visually-pleasing LR output and a latent variable z.
As z is trained to follow an input-agnostic Gaussian distribution, the HR image can be accurately reconstructed
during the inverse up-scaling procedure although z is randomly sampled from a normal distribution. Nevertheless,
the model's performance can be further improved if the high-frequency information remaining in z is efficiently stored.
To resolve the above difficulties and take full potential of the IRN, here we propose two approaches, namely the IRN-meta (IRN-M) and IRN-alpha (IRN-A), respectively, to efficiently compress the high frequency information stored in z, which can be used to recover z
and help restore HR image consequently during the inverse up-scaling.
For IRN-A, we train the model to extract a fourth LR channel in addition to the LR RGB channels.
It represents essential high frequency information which was lost in the IRN baseline due to random sampling of z,
and is saved as the alpha-channel of saved LR output.
For IRN-M approach, an AE module is trained to compress z as a compact latent variable, which can be saved
as metadata of the LR output. In the inverse upscaling process, z is restored from the latent space by utilizing the well-trained decoder.
Both modules are also successfully applied to the state-of-the-art (SOTA) rescaling model DLV-IRN <cit.>.
In summary, the main contribution of this paper is that we are the first to compress the high-frequency information in z,
which is not fully utilized in current invertible image rescaling models, to improve the restored HR image quality in upscaling progress.
§ PROPOSED METHOD
§.§ IRN-A
Fig. <ref> (a) shows the IRN-A network architectures, where the invertible neural network blocks (InvBlocks) are referenced from previous work IRN <cit.>. In the new model, the input HR image is resized via Haar transformation before
splitting to a lower branch x_l and a higher branch x_h.
More specifically, Haar transformation converts the input HR image (C, H, W) into a matrix of shape (4C, H/2, W/2), where C, H, and W represent image color channels, height and width respectively. The first C channels represent low-frequency components of the input image in general
and the remaining 3C channels represent the high-frequency information on vertical, horizontal and diagonal directions respectively.
Different from the IRN baseline, which uses only the C low-frequency channels in the lower branch,
we add 1 additional channel, denoted as alpha-channel for convenience as it would be stored as the alpha-channel in RGBA format,
in the lower branch x_l to store the compressed high-frequency information.
After the first Haar transformation, the alpha-channel is initialized with the average value across all 3C high-frequency channels,
and only 3C-1 channels are included in x_h as the first channel is removed to make the total number of channels remain constant.
After channel splitting, x_l and x_h are fed into cascaded InvBlocks and transformed to an LR RGBA image y and an auxiliary
latent variable z.
First three channels of y consist of the visual RGB channels and the fourth channel contains the compressed high-frequency
components transformed along the InvBlocks. The alpha-channel was normalized via a sigmoid function, S(α)=1/1+e^-α, to help quantization
of the alpha-channel and maintain training stability.
For the inverse upscaling process,
the model needs to recover z, denoted as ẑ as it is not stored. In previous work, ẑ was randomly drawn from normal Gaussian distribution.
While this helps creating diverse samples in generative models, it is not optimal for tasks like image rescaling which aims to restore one HR image instead
of diverse variations.
Therefore, we set ẑ as 0, the mean value of the normal distribution, for the inverse up-scaling process.
This technique was also validated in previous works like FGRN <cit.> and DLV-IRN <cit.>.
Of note, at the end of inverse process, the deleted high frequency channel needs to be recovered as
x_m=3C× x_α-∑_i=1^3C-1x^i_h
where x_m represents the channel removed from x_h and x_α represents the alpha-channel in x_l.
§.§ IRN-M
Besides storing the compressed high-frequency information in a separate alpha-channel, we also propose an alternative space-saving approach to store the extracted information as metadata of the image file. Image metadata is text information pertaining to an image file that is embedded into the image file or contained in a separate file in a digital asset management system. Metadata is readily supported by existing image format so this proposed method could be easily integrated with current solutions.
The network architecture of our metadata approach is shown in Fig. <ref> (b). Here x_l and x_h, same as the IRN baseline,
are split from Haar transformed 4C channels to C and 3C channels respectively.
Unlike the RGBA approach, the metadata method uses an encoder at the end to compress the z and save the latent vector S as metadata,
rather than saving as the alpha-channel of the output. S will be decompressed by the decoder for the inverse upscaling step.
In our AE architecture, the encoder compacts the number of z channels from 3C× n^2 -C to 4 via 2D convolution layers and
compresses the z's height and width from (H/2^n, W/2^n) to (H/2^n+2, W/2^n+2) by using max-pooling layers.
Here n is 1 or 2 depending on the scale factor of 2× or 4×.
Of note, the AE was pre-trained with MSE loss before being embedded into the model structure.
After placing the well-trained AE in the IRN architecture, the entire structure was trained to minimize the following mixture loss function:
L = λ_1 L_r+λ_2 L_g+λ_3 L_d+λ_4 L_mse
where L_r is the L1 loss for reconstructing HR image; L_g is the L2 loss for the generated LR image; L_d is the distribution matching loss; and L_mse is the MSE loss between the input of the encoder and the output of the decoder.
§ EXPERIMENTS
Following the same training strategy and hyperparameters in IRN baseline, our models were trained on the DIV2K <cit.> dataset, which includes 800 HR training images. IRN-M and IRN-A were trained with 500,000 and 250,000 iterations respectively.
Both models were evaluated across five benchmark datasets: Set5 <cit.>, Set14 <cit.>, BSD100 <cit.>, Urban100 <cit.> and the validation set of DIV2K. The upscaled images quality across different models were assessed via the peak noise-signal ratio (PSNR) and SSIM on the Y channel of the YCbCr color space.
Following previous works <cit.>, as it is not beneficial to add
randomness in restoring HR images, we set ẑ as 0 during the inverse up-scaling process
for both training and validation steps in all experiments.
§.§ Ablation study
As the transformed
alpha-channel is the key innovation for improved performance for IRN-A,
the pre-splitting and initial settings of the alpha-channel
before the forward transformation process are very important.
For better analysis of their effects, Table <ref> shows an ablation study that compares the results for different settings of the alpha-channel, where
“post-split" and “pre-split" refer to splitting the alpha-channel after the downscaling module or before the InvBlock respectively, and
α_avg represents presetting the average value of high-frequency information in the pre-split alpha-channel.
From Table <ref>, we notice that using the α_avg with pre-split architecture performs best across all options.
The IRN-M model constructs the HR image by decoding the latent space s saved in the metadata file. Table <ref> shows another ablation study for determining the optimal AE structure, where AE_p represents that AE, before training as part of IRN-M, is pre-trained using MSE loss with standalone random z;
AE_f represents fixing the AE during training the IRN-M; and “2layers" and “4layers" represent two and four convolutional layers used in AE respectively.
As shown in Table <ref>, using the IRN-M with pre-trained 4 layers AE and not fixing the AE during training has the best performance.
Of all three settings, pre-training of AE is the most critical factor in maximizing performance.
§.§ Image rescaling
The quantitative comparison results for HR image reconstruction are shown in Table <ref>.
Rather than choosing SR models which only optimize upscaling steps, we consider SOTA bidirectional (jointly optimizing downscaling and upscaling steps) models for fair comparison <cit.>.
As shown in Table <ref>, DLV-IRN-A is efficient at storing high-frequency information in the alpha-channel and consequently outperforms its baseline DLV-IRN, as well as other models,
including HCFlow and IRN models, which randomly samples ẑ for the upscaling step.
For DLV-IRN-M, while not as good as the -A variant,
it still performs better than all other models, only trailing behind FGRN for two small test sets at 4×.
Hence we conclude that both -M and -A modules can improve the modeling of the high-frequency information and
help restore the HR image consequently. Visual examples of the 4× test in Fig <ref> also validate the improved performance from our models.
§ CONCLUSIONS
To fully mine the potential of image rescaling models based on INN, two novel modules are proposed to store otherwise lost high-frequency information z. The IRN-M model utilizes an autoencoder to compress
z and save as metadata in native image format so it can be decoded to an approximate of z, while IRN-A adds an additional channel to store crucial high-frequency information, which can be quantized and stored
as the alpha-channel, in addition to the RGB channels, in existing RGBA format. With carefully designed autoencoder and alpha-channel pre-split,
it is shown that both modules can improve the upscaling performance significantly comparing to the IRN baseline.
The proposed modules are also applicable to newer baseline models like DLV-IRN and DLV-IRN-A is by far the best, which further pushes the limit of image rescaling performance with a significant margin.
IEEEbib
|
http://arxiv.org/abs/2303.07219v1
|
20230313155326
|
Lower (negative) bounds on the static electric susceptibility of non-equilibrium cubic crystals
|
[
"R. Dutta",
"P. D. Wurzner",
"F. Castles"
] |
cond-mat.mtrl-sci
|
[
"cond-mat.mtrl-sci"
] |
School of Electronic Engineering and Computer Science, Queen Mary University of London, Mile End Road, London E1 4NS, United Kingdom
School of Electronic Engineering and Computer Science, Queen Mary University of London, Mile End Road, London E1 4NS, United Kingdom
[email protected]
School of Electronic Engineering and Computer Science, Queen Mary University of London, Mile End Road, London E1 4NS, United Kingdom
For a long time, conventional wisdom held that the static electric susceptibility of all materials must be positive. However, it is now believed that negative static electric susceptibility is likely to be possible in certain materials that are not in thermodynamic equilibrium (though conclusive experimental evidence of this remains to be reported). Negative static electric susceptibility represents a qualitatively new parameter range of an important material property and it is thought that it may open up the possibility of new physical effects and technological capabilities. With the recent introduction of active metamaterials composed of meta-atoms that appear to be capable, in principle, of exhibiting negative static polarizabilities of arbitrarily large magnitudes, it seems timely to investigate how the mutual interaction between dipolarizable entities with negative static polarizability affects the stability of such systems, and, in particular, to determine the lower bound on the static electric susceptibility that may be achieved in non-equilibrium materials. Here we use a classical, microscopic model of point-like dipolarizable entities (a model that is standard in the case of positive polarizability) and investigate its behavior for simple cubic (sc), body-centered cubic (bcc), and face-centered cubic (fcc) crystals with one entity per primitive cell when the static polarizability of the entities is negative and the mutual interaction between the entities is taken into account. We find that the static electric susceptibility is bounded below due to an instability towards self-polarization but the lower permissible bound is negative definite in each case, i.e., the concept of negative static electric susceptibility remains robust, according to the model, when mutual interactions are taken into account. The usual Clausius-Mossotti relation between the static polarizability and the static electric susceptibility remains valid in the case of negative parameters, but only down to the lower permissible bound; the value of the bound depends on the crystal structure and is always unrelated to the asymptote of the Clausius-Mossotti curve. The lower permissible bounds of the static electric susceptibility are found to be -0.906 for sc, and -1.00 for bcc and fcc. These results confirm that, although the magnitude of the static electric susceptibility does not diverge in the negative case (as it can in the positive case), the magnitudes attainable in the negative case for condensed media may, nevertheless, be many orders of magnitude greater than those predicted previously for inverted vapors and gases. This is a promising result in relation to the development of potential new technologies that exploit the phenomenon.
Lower (negative) bounds on the static electric susceptibility of non-equilibrium cubic crystals
F. Castles
March 30, 2023
===============================================================================================
§ INTRODUCTION
The discovery and development of materials with new or enhanced properties is an important driver of technological advance. In the area of electrostatics and low-frequency electromagnetics, a key material property is static electric susceptibility χ^(0) (or, equivalently, static relative permittivity ε^(0), related via ε^(0)=χ^(0)+1). The value of χ^(0) for a material can be crucial to the utility of the material in certain device applications; for example, its value is of crucial importance in capacitor dielectrics, where a large (positive) value is often desired to facilitate device miniaturization <cit.>. Since the first measurements of Cavendish <cit.> and Faraday <cit.>, it was found that the presence of a material between two conductors always increased the static mutual capacitance of the conductors above the capacitance observed when no material was present, i.e., it became established empirically that ε^(0)>1 and, correspondingly, χ^(0)>0 for all materials [For completeness, we may note that, following Faraday, some relatively early researchers considered air, rather than vacuum, as the reference medium, even when measurement techniques became sufficiently precise to distinguish between the values obtained for various gases. Therefore, values of ε^(0) (or the specific inductive capacity, as it was called initially) slightly less than unity have been reported for gases such as Hydrogen: see, e.g., Ref. <cit.>. However, since it has been accepted subsequently that the more-appropriate reference is vacuum, the values of ε^(0) reported experimentally are greater than unity for all materials (but may be less than that of air for certain gases): see, e.g., Ref. <cit.>]. Although early researchers kept an open mind regarding whether, as-yet untested, materials may nevertheless be found subsequently to exhibit ε^(0) values less than unity (see, e.g., Ref. <cit.>), a theoretical argument was developed later that appeared to rule out this possibility; in 14 of Ref. <cit.>, Landau et al. conclude that “the permittivity of all bodies exceeds unity, and the dielectric susceptibility ... is therefore positive”. (Note that Landau et al. are referring here to the static relative permittivity and electric susceptibility). It has since been noted, however, that Landau et al.'s argument assumes that the bodies in question are in thermodynamic equilibrium, and, therefore, the conclusion does not necessarily hold for media that are not in thermodynamic equilibrium <cit.>. Sanders discussed tentatively the possibility of a χ^(0)<0 state in media with inverted populations of energy levels produced by means similar to those used in maser and laser applications <cit.>, and Chiao et al. predicted unequivocally a χ^(0)<0 state in such systems <cit.>. Apart from the unusual property of reducing, rather than increasing, the static mutual capacitance of two conductors if such a material were placed between them, the possibility of negative χ^(0)—a qualitatively new parameter range for this important material property—opens up the possibility of new physical effects and technological capabilities.
For example, Sanders <cit.> and Chiao et al. <cit.> discussed theoretically how negative static electric susceptibility opens up the possibility of stable electrostatic levitation, which would be analogous in many respects to the magnetostatic levitation that is seen using diamagnetic or superconducting materials <cit.>. In particular, Chiao et al. proposed explicitly that it should be possible to construct purely electrostatic charged particle traps, which would be very different in principle from Paul and Penning traps <cit.>. However, Chiao et al. also went on to predict theoretically that for a specific, typical case of the types of systems they considered (ammonia gas at a temperature of 180 K and a pressure of 1 Torr with population inversion maintained by a carbon dioxide pump laser), the value of χ^(0) is expected to be ≈-3× 10^-4 <cit.>; based on this relatively-small magnitude they concluded that condensed media with much larger magnitudes of the negative static electric susceptibility would need to be developed before such levitation effects become readily observable <cit.>. This is perhaps one reason why no attempts to observe experimentally the theoretically-predicted χ^(0)<0 state, or the associated levitation phenomenon, have been reported using the systems considered by Sanders and Chiao et al.
More recently, it was proposed that negative static electric susceptibility may be achieved also in completely different systems: active metamaterials <cit.>. Active metamaterials <cit.> utilize an internal source of power and, like the systems considered by Sanders and Chiao et al., are not subject to the equilibrium thermodynamical argument of Landau et al. concerning the restriction on the sign of χ^(0). In Ref. <cit.>, a design concept for active metamaterials with negative static electric susceptibility was proposed and preliminary experimental evidence in support of the general concept was reported. Unlike the systems considered by Sanders and Chiao et al., such metamaterials are readily realized at room temperature and pressure. Further, they constitute a form of condensed matter for which it appears very likely that negative static electric susceptibility values with magnitudes much greater than the systems of Sanders and of Chiao et al. are possible <cit.>.
Given that: (1) the likely existence of negative static electric susceptibility in non-equilibrium materials raises the theoretical possibility of novel technological capabilities <cit.>, (2) the magnitude of the negative static electric susceptibility that is achievable in non-equilibrium materials is expected to be crucial to the practical realization of such technologies <cit.>, and (3) the practical development of condensed (meta)materials with negative static electric susceptibilities of relative large magnitudes is now well under way <cit.>, it appears timely to seek to determine rigorously just how negative can one expect the negative static electric susceptibility to be made in non-equilibrium condensed materials.
If Ref. <cit.> it was claimed—without full theoretical or experimental justification—that negative static electric susceptibility is possible throughout the range -1<χ^(0)<0; herein we present the theoretical basis on which this claim was made.
§.§ Scope
We consider the basic, conventional interpretations of χ^(0) and ε^(0); that is, we consider the linear static electric susceptibility (polarization proportional to internal electric field) and linear static relative permittivity (electric displacement proportional to internal electric field) as they pertain to a nonrelativistic, macroscopic, and homogeneous sample of material under the action of a static electric field created by external test electrodes. This interpretation corresponds, for example, to the original experiments of Cavendish <cit.> and Faraday <cit.>, to the meaning ascribed to the static electric susceptibility and permittivity in standard textbook accounts of the electrostatics of dielectrics (e.g., Chap. II of Ref. <cit.>), and to the definition of the permittivity according to recent ASTM standards <cit.>.
It should be noted that there are a number of scenarios where negative static electric susceptibility has been discussed or implied in the literature in relation to phenomena that do not correspond to this conventional interpretation. For example, Kirzhnits et al. have shown that static permittivity may be negative in the sense that, if spatial dispersion is taken into account, the longitudinal permittivity at zero frequency but nonzero wave vector
may exhibit negative values <cit.>. However, this concerns the scenario where external sources of charge are located within the material itself, and, for the case of static fields and external test electrodes, i.e., the conventional case which corresponds to zero frequency and zero wave vector, Kirzhnits et al. reaffirm the conclusion of Landau et al. that the static permittivity of a material must exceed unity and hence the static electric susceptibility must be positive (if the body is in thermodynamic equilibrium).
We emphasize that we are interested in the static electric susceptibility and permittivity; it is well known that the static magnetic susceptibility may be either positive or negative, regardless of whether the body is in thermodynamic equilibrium or not (see, e.g., Ref. <cit.>, p. 106). We also emphasize that we are interested in the static electric susceptibility and permittivity; it is well known that the sign of the real part of the complex permittivity is subject to no theoretical restriction for nonzero frequencies, again, regardless of whether the body is in thermodynamic equilibrium or not (see, e.g., Ref. <cit.>, p. 274).
Finally, we note that we consider herein only isotropic media such that the static electric susceptibility—which is, in general, a real symmetric second-rank tensor—reduces to a real scalar, which we denote as χ^(0). Thus, `negative static electric susceptibility' means, straightforwardly, that χ^(0)<0 [Although we do not make use of the fact in what follows, a `negative static electric susceptibility' may be considered readily in the general, anisotropic, case to mean that one or more of the three principal components of the static electric susceptibility tensor are less than zero.]. We use superscript `(0)' to denote explicitly a static quantity.
To study the static electric susceptibility, as interpreted conventionally in this way, we use a simple model of insulators that is standard in the normal case of χ^(0)>0. To analyze the model we also use methods employed previously to a substantial extent in the case χ^(0)>0. The main novelty of our work is that new results are obtained by applying a generalized version of the method to the unusual parameter range χ^(0)<0.
§.§ A known lower bound on the value of for non-equilibrium materials
As noted above, the theoretical argument of Landau et al. (14 of Ref. <cit.>) puts a lower bound of zero on the static electric susceptibility of materials that are in thermodynamic equilibrium. A simple theoretical argument that puts a less stringent lower bound of -1 on the static electric susceptibility—but which applies manifestly to all materials, whether equilibrium or non-equilibrium—is provided by circuit theory, as follows [We are unaware of the origins of this type of argument to establish minimum bounds on ε^(0) and χ^(0), but such an approach was brought to our attention by Ref. <cit.>.].
Consider an empty parallel plate capacitor of capacitance C_0 (>0) for which the plates are initially disconnected and a charge of ± q_0 is deposited on the plates. Now fill the volume between the capacitor plates with a homogeneous and isotropic insulator with static relative permittivity ε^(0). Suppose that the geometry of the capacitor is such that fringing fields are sufficiently small that they may be reasonably ignored. By definition of ε^(0) <cit.>, the capacitance of the filled capacitor is C=ε^(0)C_0. Now let the capacitor plates be connected at time t=0 across a resistor of resistance R (>0). Suppose that the value of R is such that the time constant t_c=|RC| is large with respect to the time taken for polarization to be established in the material, and the resulting `quasi-static' behavior of the capacitor is dictated by ε^(0).
Elementary circuit theory tells us that the charge on the capacitor as a function of time is q(t)=q_0exp[-t/(RC)]. For the normal case, ε^(0)>1 and therefore C>0, hence q(t) decays exponentially, i.e., the capacitor discharges through the resistor. However, for the hypothetical case ε^(0)<0, C would be negative and an exponential, unbounded increase of q(t) would be predicted. Since this indicates a system that is unstable, values ε^(0)<0, i.e., values χ^(0)<-1, must be unphysical. We note that the argument does not rely, at any point, on the material being in thermodynamic equilibrium, so it should apply to all materials whether or not they are in thermodynamic equilibrium [An alternative, briefer argument is to observe that the energy of a capacitor is given by Q^2/(2C), which already indicates an instability for C<0, and hence for ε^(0)<0 and χ^(0)<-1. However, we believe that such energy-based arguments should, in general, be applied with some care to non-equilibrium materials that may utilize a source of power to maintain an electrostatic state that is otherwise energetically unfavorable.].
This circuit theory result is of relatively little interest in relation to equilibrium materials because, in this case, the argument of Landau et al. already provides a more stringent lower bound. It is of much greater significance in relation to non-equilibrium materials because, in this case, it provides a lower bound where the argument of Landau et al. does not apply. Importantly, the circuit theory argument rules out most negative values of χ^(0) (viz., all values <-1) in non-equilibrium materials, and it already tells us that one cannot hope to obtain negative values with the large magnitudes readily seen in the positive case for equilibrium materials, even if condensed media are employed (many typical solids have values χ^(0)∼ 10^0–10^3 <cit.> and values of χ^(0)∼ 10^4–10^5 may be observed just above the Curie point in materials that exhibit a ferroelectric phase <cit.>). On the other hand, it is essential to bear in mind that the circuit theory argument does not imply that any values in the interval -1<χ^(0)<0 are necessarily possible for non-equilibrium materials. (Indeed, it is known, from Landau et al.'s result, that this would be an incorrect inference in the case of equilibrium materials, to which the circuit theory argument applies equally).
To determine theoretically whether values in the interval -1<χ^(0)<0 are actually possible for non-equilibrium materials, i.e., to determine the lower permissible bound of χ^(0), it appears necessary to investigate a specific microscopic model of insulators.
§.§ Model
As presently conceived, materials with negative static electric susceptibility are composed of discrete entities with negative static polarizability. To begin to model condensed media consisting of such entities—be they atoms, molecules, or meta-atoms—we assume herein a set of identical, point-like, dipolarizable entities that are located at fixed positions and respond linearly and isotropically to the local electric field: in static equilibrium, the dipole moment 𝐩^(j) (∈ℝ^3) of the jth entity is given by 𝐩^(j)=α𝐄^(j), where α (∈ℝ) is the static polarizability of each entity and 𝐄^(j) (∈ℝ^3) is the (`microscopic') electric field at the point 𝐫^(j) due to all sources except the jth entity itself. For a stable macroscopic medium composed of a cubic arrangement of such entities, the static electric susceptibility is also isotropic and described by scalar χ^(0) (∈ℝ) [It is, of course, also possible to obtain an isotropic electric susceptibility from entities with anisotropic static polarizability: for example, if the principal axes of the entities are randomly oriented. However, for simplicity, we do not consider this case herein.].
This model is, of course, precisely that which has been applied standardly, assuming α>0, to the study of normal dielectrics with χ^(0)>0, in which context it may be traced back to the work of Mossotti <cit.>, Faraday <cit.>,
and Clausius <cit.> (though these authors envisioned small conducting inclusions of finite, nonzero, volume rather than dipolarizable entities that were assumed point-like from the outset). The treatment of the usual case—i.e., the case α>0 and χ^(0)>0—that we believe is most relevant to our work is that of Allen <cit.>. Our task is to investigate the behavior of the model when α<0.
§.§ The Drude formula and the Clausius-Mossotti equation for the case of negative static polarizability
If materials composed of entities with α<0 are stable against self-polarization, then there is no reason to suppose that, in the weakly-interacting limit, the usual, basic expression χ^(0)=Nα/ε_0 would not be as valid for the case α<0 as it is for the case α>0. Here, N (⩾ 0) is the number of entities per unit volume and ε_0 is the permittivity of free space. This expression is sometimes referred to as the Drude formula for susceptibility (see, e.g., Ref. <cit.>) and it was assumed to be valid in the case of α<0 by Chiao et al. <cit.>; in particular, Chiao et al. used it to arrive at their theoretical prediction of the value of χ^(0)≈-3× 10^-4 for pumped ammonia gas in Refs. <cit.>.
The Drude formula reflects the obvious fact that, if one wishes to achieve a negative χ^(0) of larger magnitude, it is natural to seek to employ entities with negative α of larger magnitude and/or arrangements of entities that are more densely packed, i.e., larger N (hence the desire for condensed media). Based on the work presented in Ref. <cit.>, it is clear that α can be negative and the combination Nα can be of large magnitude in metamaterial systems. However, as |Nα| increases, the approximation that the entities may be treated as non-interacting—the assumption on which the derivation of the Drude formula is based—becomes increasingly inaccurate and mutual interactions between the entities must be taken into account. Further, it must be borne in mind that, by applying the Drude formula to the α<0 case at all, one is assuming that the χ^(0)<0 state exists; that is, one is assuming that the mutual interactions between the entities do not, in fact, make the system unstable for all values α<0, no matter how small the value of |Nα|, in the macroscopic limit. To our knowledge, there is no definitive way to justify this assumption theoretically without taking the mutual interactions into account explicitly and confirming whether the lower limit of stability is negative definite.
Moving beyond the Drude formula, one arrives at the Clausius-Mossotti equation. The Clausius-Mossotti equation accounts for the fact that the field at a given dipolarizable entity is not, in general, just the external field, but is the sum of the external field and the field due to the polarization of all the other entities in the material. The assumptions of our model (discrete entities that are point-like, linearly-dipolarizable, at fixed positions, etc.), are exactly those often used in modern accounts of the derivation of the Clausius-Mossotti equation (see, e.g., Refs. <cit.>). The equation states that, for media with certain symmetries (including cubic crystals with one entity per primitive cell, with which we are concerned herein) <cit.>, the static electric susceptibility is related to the static polarizability as
χ^(0)=4πα̃/1-4π/3α̃.
Here, we have chosen to write the equation in terms of the dimensionless variable α̃=Nα/(4πε_0), which will be particularly convenient later. A plot of χ^(0) as a function of α̃ according to Eq. (<ref>eq:cm_reduced) is included in Fig. <ref>fig:cm. As α̃→3/4π from below, the Clausius-Mossotti equation predicts that χ^(0)→∞. This is sometimes referred to as the “Lorentz 4π/3 catastrophe” and is associated with an instability towards self-polarization that has, for a long time, been considered a qualitative, if not precisely quantitative, model of the paraelectric to ferroelectric transition (see, e.g., Ref. <cit.>).
For α̃> 3/4π, the Clausius-Mossotti equation formally predicts negative values of χ^(0); however, this does not constitute a genuine prediction of a negative static electric susceptibility state. Rather, the equation ceases to be valid in this case and a more sophisticated (nonlinear) model is required to describe the self-polarized state. Accordingly, the conventional interval in which the Clausius-Mossotti equation is typically considered is 0≤α̃< 3/4π.
Since the Clausius-Mossotti equation is a useful description of dielectrics in the standard case of 0≤α̃< 3/4π, it is natural for us to ask whether, and to what extent, it remains valid in the case of α̃<0. It was noted as long ago as 1873 by Maxwell <cit.> that there is no step in the derivation of the Clausius-Mossotti equation that requires the static polarizability to be positive for the derivation to be valid. Therefore, if our model consists of entities that may assume negative values of α̃ (as per the inverted media of Sanders <cit.> and Chiao et al. <cit.>, or the metamaterials of Ref. <cit.>), one would expect, naively, that the Clausius-Mossotti equation will still provide the appropriate expression for χ^(0) for the model, as per Eq. (<ref>eq:cm_reduced). However, as we will now see, this is only partly true.
§.§.§ The limitation of the Clausius-Mossotti equation for the case of negative static polarizability
Since, unlike the case of α̃>0, there is no divergence of the function χ^(0) for any α̃<0 according to Eq. (<ref>eq:cm_reduced), one would expect, naively, that Eq. (<ref>eq:cm_reduced) should be applicable for all α̃<0. If this were the case, the minimum value of χ^(0) would be lim_α̃→ -∞χ^(0)(α̃)=-3 (the horizontal asymptote of the Clausius-Mossotti curve as it is presented in Fig. <ref>fig:cm). However, this is clearly at odds with the circuit theory argument, discussed previously, which has shown that any value χ^(0)<-1 is unstable.
To reconcile the fact that the naive result of the Clausius-Mossotti equation for α̃<0 is at odds with the circuit theory argument, one may look at the case of a sc crystal [When we talk herein of sc, bcc, or fcc crystals, we mean, in all cases, crystals with one entity per primitive cell.] of α̃>0 entities to remind us of a known limitation of the Clausius-Mossotti equation that exists even within the usual interval in which it is considered to be valid, i.e., within the interval 0≤α̃< 3/4π. The derivation of the equation would appear to apply equally to sc, bcc, and fcc crystals, and, as discussed above, Eq. (<ref>eq:cm_reduced) predicts that χ^(0)→∞ as α̃→3/4π from below in all three cases. However, although it is not discussed explicitly in typical textbook accounts of the Clausius-Mossotti equation, it is, nevertheless, well established that a more-sophisticated analysis of the same model shows that, upon increasing α̃ from zero, the sc case becomes unstable towards self polarization at a critical value α̃=α̃_c^+^ sc which is less than 3/4π [This has been articulated clearly by Allen in Refs. <cit.> and is related closely to the fact that, for a model consisting of entities with dipole moments of fixed magnitude that are free to rotate, an antiferroelectric configuration, as opposed to a ferroelectric configuration, can be energetically preferred in the sc case <cit.>.] (the numerical value of α̃_c^+^ sc will be considered in detail below). What happens, more precisely, in the sc case is that, upon increasing α̃ from zero, Eq. (<ref>eq:cm_reduced) determines correctly the associated value of χ^(0), but only until the critical value α̃=α̃_c^+^ sc<3/4π is reached: for any value of α̃ that is greater than α̃_c^+^ sc the system is already unstable and the Clausius-Mossotti curve for the sc case is truncated (as shown in Fig. <ref>fig:cm). Accordingly, in the sc case for α̃>0, the value of χ^(0) is not unbounded above, but has a finite upper bound determined by evaluating χ^(0) according to Eq. (<ref>eq:cm_reduced) at α̃=α̃_c^+^ sc. Thus, there is clear precedent for the limited applicability of the Clausius-Mossotti equation within the normally-considered interval 0≤α̃<3/4π, and for a finite upper bound on χ^(0), for certain crystal structures.
As is generally assumed, and we will end up essentially reaffirming in detail below, there is no such truncation of the Clausius-Mossotti curve for the bcc and fcc cases with α̃>0; within the model, the upper critical values for the static polarizability are α̃_c^+^ bcc=α̃_c^+^ fcc=3/4π and, therefore, χ^(0) does indeed diverge to infinity as α̃→3/4π from below.
For convenience, we may refer to an instability that occurs with a divergence of χ^(0)—such as that which occurs for the bcc and fcc cases on increasing α̃ from zero—as a `Type-I' instability, and an instability that occurs without a divergence of χ^(0)—such as that which occurs for the sc case on increasing α̃ from zero—as a `Type-II' instability. Accordingly, to reconcile the fact that the minimum value of χ^(0)=-3 that is naively predicted by the Clausius-Mossotti equation is at odds with the minimum value of χ^(0)=-1 predicted by the circuit argument, we may hypothesize that, upon decreasing α̃ from zero, there is always a Type-II instability that truncates the Clausius-Mossotti curve at or before χ^(0)(α̃=-3/8π)=-1. Sections <ref>sec:method and <ref>sec:results of this paper amount, essentially, to a rigorous demonstration that this is indeed what happens, and to an accurate calculation of the values of α̃ and χ^(0) at which the truncations occur, for the sc, bcc, and fcc cases. Our primary methodology is a generalization of one of the methods used by Allen—which was applied in Refs. <cit.> to the sc case with α>0—to include also the case of α<0.
§.§ The physical origin of the lower bound
We believe that, in broad terms, the physical mechanism underlying the instability is the same for the α̃<0 case as for the α̃>0 case (which is essentially the same for Type I and Type II instabilities). That is, the physical mechanism of the instability in the α̃<0 case is essentially the same as the well-known Lorentz 4π/3 catastrophe model of the paraelectric to ferroelectric transition, which may be interpreted in the following way. It is clear that, in the absence of external sources of electric fields, the state of the system where all of the entities are unpolarized, i.e., 𝐩^(j)=0 for all j, is a state of static equilibrium of the system; for, if the polarization of each entity is exactly zero, then, in the absence of external sources, there are no electric fields that may induce polarization. The question is whether this state is a stable or unstable static equilibrium. Loosely speaking, if the entities are arranged sufficiently close together or |α| is sufficiently large, then the system may be shown to be unstable; in this case, any transient, non-zero, polarization of any of the entities would cause polarization of the other entities, which would, in turn, lead to further polarization which is, on average, of larger magnitude, etc., leading to a “runaway condition" where polarization increases, in theory, without bound. (Using a more-sophisticated, nonlinear model the self-polarization can be bounded and describe a ferroelectric or antiferroelectric state.) Conversely, if the entities are arranged sufficiently far apart or |α| is sufficiently small, then the system may be shown to be stable; in this case, any transient, non-zero polarization of any of the entities would lead to only finite oscillations of the 𝐩^(j), and these would die away to zero if any damping whatsoever were present in the system [This type of instability is already exhibited by a system containing only two entities. In this case, if the value of α in relation to the distance between the entities d is such that α>2πε_0 d^3 then the system is unstable towards a self-polarized state. For a pedagogical account of the two-entity system, and others, in the case α>0, see Ref. <cit.>. The two-entity system with α>0 also appears, for example, as Problem 8 in Chapter 16 of Ref. <cit.>, where it is referred to as the “ferroelectric criterion for atoms”.].
§ METHOD
We will find that any set of two or more entities (assuming the entities are located at distinct positions) has an upper critical value of α̃, which we denote α̃_c^+, and a lower critical value of α̃, which we denote α̃_c^-, such that: if α̃_c^-<α̃<α̃_c^+ then the system is stable, and if α<α̃_c^- or α>α̃_c^+ then the system is unstable. We seek to determine the values of α̃_c^+ and α̃_c^- as they pertain to infinite sc, bcc, and fcc crystals, then use Eq. (<ref>eq:cm_reduced) to determine the associated upper and lower bounds of χ^(0).
To determine the values of α̃_c^+ and α̃_c^- as they pertain to infinite crystals, our primary methodology is to consider finite crystals of a systematic range of sizes and determine the infinite limit by extrapolation. (We also summarize an alternative methodology in <ref>sec:alternative_method.) This method has essentially been employed by Allen to investigate the sc case for α̃>0 (see, in particular, Fig. 1 of Ref. <cit.>). As we will see, if the method is suitably generalized to deal also with the case α̃<0, and suitable care is taken to execute and analyze the extrapolation, it can lead to definitive results with well-defined accuracy for each of the sc, bcc, and fcc cases for both α̃>0 and α̃<0.
§.§ General method for entities located at arbitrary positions
We begin by establishing the method of determining α̃_c^+ and α̃_c^- for a finite number of entities at arbitrary positions, and later consider positions that represent finite sc, bcc, and fcc crystals. Consider a finite number n_tot⩾ 2 of entities located at fixed position vectors 𝐫^(j) (∈ℝ^3), j=1...n_tot. For now, the 𝐫^(j) may be considered to be entirely arbitrary, save that no two entities are coincidentally positioned, i.e., 𝐫^(j)≠𝐫^(l) if j≠ l. As per our model, in static equilibrium the dipole moment of the jth entity, 𝐩^(j), is given by 𝐩^(j)=α𝐄^(j), where α is the static polarizability of each entity and 𝐄^(j) is the electric field at the point 𝐫^(j) due to all sources except the jth entity itself. In the absence of additional sources of electric fields external to the n_tot dipolarizable entities themselves (an external field being superfluous to the question of the intrinsic stability of the system of entities itself), we may write that, in static equilibrium,
𝐩^(j)=α∑_l≠ j𝐄^(j,l),
where 𝐄^(j,l) (∈ℝ^3) is the field at 𝐫^(j) due to the polarization 𝐩^(l) of the lth entity and ∑_l≠ j denotes the sum over all l=1...n_tot except for the value j. Using the standard expression for the electric field 𝐄 at a displacement 𝐫 from a point dipole 𝐩, viz., 𝐄 = [3(𝐩·𝐫)𝐫-r^2𝐩]/(4πε_0r^5), where r=|𝐫|, Eq. (<ref>eq:p_j) becomes
𝐩^(j) = α∑_l≠ j3[𝐩^(l)·𝐑^(j,l)]𝐑^(j,l)-[R^(j,l)]^2𝐩^(l)/4πε_0[R^(j,l)]^5.
Here, 𝐑^(j,l)=𝐫^(j)-𝐫^(l) is the displacement of the jth entity with respect to the lth, and R^(j,l)=|𝐑^(j,l)|. Expressing distances in multiples of a unit distance a>0 (later, a will be the length of the sc cell edge), such that 𝐫^(j)=a𝐫'^(j) and 𝐑^(j,l)=a𝐑'^(j,l), Eq. (<ref>eq:p_j_2) may be rewritten
𝐩^(j) = α̃∑_l≠ j3[𝐩^(l)·𝐑'^(j,l)]𝐑'^(j,l)-[R'^(j,l)]^2𝐩^(l)/[R'^(j,l)]^5,
where α̃=α/(4πε_0 a^3) is the reduced, dimensionless, static polarizability.
It is convenient to re-express the n_tot vector equations of dimension three that are given by Eq. (<ref>eq:p_j_R) as a single matrix equation of dimension 3n_tot:
𝖯 =α̃𝖬𝖯,
or (𝖨-α̃𝖬)𝖯 = 0.
Here, 𝖨 is the 3n_tot× 3n_tot identity matrix, 0 is the 3n_tot× 1 zero column matrix, 𝖯 is a 3n_tot× 1 column matrix
𝖯=
[
[ p^(1)_1 p^(1)_2 p^(1)_3 p^(2)_1 p^(2)_2 p^(2)_3 ... p^(n_tot)_1 p^(n_tot)_2 p^(n_tot)_3 ]]^T
where p^(j)_1, p^(j)_2, and p^(j)_3 are the Cartesian components of 𝐩^(j), and 𝖬 is a 3n_tot× 3n_tot matrix that may be most-conveniently specified in terms of 3× 3 sub-matrices 𝖬^(i,j),
𝖬=
[ 0_3 𝖬^(1,2) 𝖬^(1,3) … … 𝖬^(1,n_tot); 𝖬^(2,1) 0_3 𝖬^(2,3) … … 𝖬^(2,n_tot); 𝖬^(3,1) 𝖬^(3,2) 0_3 … ⋮; ⋮ ⋮ ⋮ ⋱ ⋮ ⋮; ⋮ ⋮ … 0_3 𝖬^(n_tot-1,n_tot); 𝖬^(n_tot,1) 𝖬^(n_tot,2) … … 𝖬^(n_tot,n_tot-1) 0_3 ],
where 0_3 is the 3× 3 zero matrix and
[𝖬^(j,l)]_βγ=3 R'^(j,l)_β R'^(j,l)_γ-[R'^(j,l)]^2δ_βγ/[R'^(j,l)]^5, for β,γ =1,2,3.
Here, δ_βγ denotes Kronecker's delta, R'^(j,l)_1, R'^(j,l)_2, and R'^(j,l)_3 are the Cartesian components of 𝐑'^(j,l), and, in terms of the Cartesian components, R'^(j,l)=√([R'^(j,l)_1]^2+[R'^(j,l)_2]^2+[R'^(j,l)_3]^2).
It is clear that the state 𝖯=0, i.e., the state where all of the entities are unpolarized, is always a solution of Eq. (<ref>eq:P) and hence always an equilibrium state of the system. This solution may be stable or unstable depending on the values of α̃ and 𝖬, i.e., depending on the static polarizability and the relative positions of the entities. The precise criterion for stability of the system is as follows: the system is stable if all the eigenvalues of matrix (𝖨-α̃𝖬) are positive [note that the eigenvalues are real because (𝖨-α̃𝖬) is a real-symmetric matrix], and the system is unstable if any of the eigenvalues of (𝖨-α̃𝖬) are negative.
That this is the precise criterion for stability of the system may be derived using a number of different arguments. Perhaps the simplest is to note that, although we are considering entities that may exploit a source of power to maintain an unnatural state of polarization, we can, nevertheless, consider the equilibrium condition, Eq. (<ref>eq:P), as arising formally from the minimization of an energy function U:ℝ^3n_tot→ℝ
U(𝖯)=1/2|α̃|𝖯^T(𝖨-α̃𝖬)𝖯,
whereupon Eq. (<ref>eq:P) arises from the condition ∂ U/∂𝖯=0. The matrix (𝖨-α̃𝖬) is thus identified as the Hessian matrix of the system and, according to standard results in mathematical analysis (see, e.g., Ref. <cit.>), the point 𝖯=0 is a minimum of U if (𝖨-α̃𝖬) is positive definite, i.e., if all its eigenvalues are positive. If 𝖯=0 is a minimum of the energy then it is a stable configuration of the system. Similarly, the point 𝖯=0 is a saddle or a maximum of U if any of the eigenvalues of (𝖨-α̃𝖬) are negative. If 𝖯=0 is a saddle or a maximum of the energy, then the system is unstable along one or more directions in 𝖯-space.
Since 𝖬 is a real, symmetric, traceless matrix (of dimension ⩾ 6 since we are considering n_tot⩾ 2) which is not equal to the 3n_tot× 3n_tot zero matrix, we know that it has at least one positive (definite) eigenvalue and at least one negative (definite) eigenvalue, and the condition for stability may be restated most simply as follows: the system is stable for values of α̃ such that α̃_c^-<α̃<α̃_c^+, where α̃_c^-=1/λ_min<0 and α̃_c^+=1/λ_max>0. Here, λ_min and λ_max are the minimum and maximum eigenvalues of 𝖬 respectively. Conversely, if α̃<α̃_c^- or α̃>α̃_c^+ then the system is unstable.
Thus, the question of stability of a given system becomes essentially a question of constructing the matrix 𝖬 for that system (which depends only on the relative positions of the entities) and calculating its maximum and minimum eigenvalues. This stability criterion is a generalization—to include also the α<0 case—of that presented, and derived by a somewhat similar argument, for the α>0 case in Refs. <cit.>.
§.§ Application to arrays forming finite sc, bcc, and fcc crystals
Having established the stability criterion for entities located at arbitrary positions, we now proceed to specify explicitly the locations of the entities for sc, bcc, and fcc finite crystals used in the study. At this stage, it is convenient to switch from labeling the entities with a single index j (with position vectors 𝐫^(j), etc.) to labeling them with an ordered triple of integers (u_1,u_2,u_3). In this notation, finite crystals may be created via the usual approach <cit.> of locating entities at the sets of (reduced) position vectors S_n={𝐫̃^(u_1,u_2,u_3):u_1,u_2,u_3=0...n-1}, where 𝐫̃^(u_1,u_2,u_3)=u_1𝐚̃_1+u_2𝐚̃_2+u_3𝐚̃_3. Here, 𝐚̃_1, 𝐚̃_2, and 𝐚̃_3 are the (reduced) primitive lattice vectors of the associated Bravais lattice. For the sc case: 𝐚̃_1^sc=𝐱̂_1, 𝐚̃_2^sc=𝐱̂_2, and 𝐚̃_3^sc=𝐱̂_3, where 𝐱̂_1, 𝐱̂_2, and 𝐱̂_3 are the (dimensionless) unit vectors of a conventional Cartesian system. For the bcc case: 𝐚̃_1^bcc=(1/2^2/3)(-𝐱̂_1+𝐱̂_2+𝐱̂_3), 𝐚̃_2^bcc=(1/2^2/3)(𝐱̂_1-𝐱̂_2+𝐱̂_3), and 𝐚̃_3^bcc=(1/2^2/3)(𝐱̂_1+𝐱̂_2-𝐱̂_3). For the fcc case: 𝐚̃_1^fcc=(1/2^1/3)(𝐱̂_2+𝐱̂_3), 𝐚̃_2^fcc=(1/2^1/3)(𝐱̂_3+𝐱̂_1), and 𝐚̃_3^fcc=(1/2^1/3)(𝐱̂_1+𝐱̂_2). Each set S_n describes a finite crystal consisting of an n× n× n array of entities (total number of entities n_tot=n^3) with the overall shape of a rhombohedron (more specifically, a cube in the sc case).
We have chosen normalization factors, 1/2^2/3 and 1/2^1/3 for the bcc and fcc cases respectively, such that the primitive cells (and not the conventional cells) are of unit volume. This means that the number density is the same in each of the sc, bcc, and fcc cases and given by N=1/a^3, which is convenient for our purposes. In particular, the expression for α̃ used in this section, α̃=α/(4πε_0 a^3), is consistent with the expression α̃=Nα/(4πε_0) used in Section <ref>sec:model and Eq. (<ref>eq:cm_reduced), and the resulting values of α̃_c^± for the sc, bcc, and fcc cases may be inserted into Eq. (<ref>eq:cm_reduced) and compared in a like-for-like fashion.
We used Python to generate the 𝖬-matrices, calculate λ_min and λ_max, and hence determine the critical values of the static polarizability α̃_c^+, n and α̃_c^-, n for a given n× n× n crystal described by a given set S_n. The Python code is included in the Supplemental Material <cit.>. In each of the sc, bcc, and fcc cases, α̃_c^+, n and α̃_c^-, n were calculated for n=2,3,...,n_max, with n_max=27 (thus, the largest crystals contained 27^3=19,683 dipolarizable entities). The value n_max=27 was used as it was found to be the largest value for which our code could be run on the system with 64 GB RAM that we had readily available and, as shown below, it already provides results that are sufficiently conclusive for our purposes.
We may note that the method takes into account all interactions between every pair of entities in the crystal (and does not, for example, assume only nearest neighbor interactions).
To determine the critical values of the static polarizability in the macroscopic limit, i.e., in the limit of infinite sc, bcc, and fcc crystals we calculate the limiting values α̃_c^+, ∞=lim_n→∞α̃_c^+, n and α̃_c^-, ∞=lim_n→∞α̃_c^-, n by extrapolation, as detailed below.
§ RESULTS
§.§ Critical values of the reduced static polarizability and static electric susceptibility
Raw data for the values of α̃_c^-, n and α̃_c^+, n in each of the sc, bcc, and fcc cases are given in Table S1 of the Supplemental Material <cit.>. Plots of α̃_c^-, n and α̃_c^+, n for n=2,3,...,n_max are shown in Fig. <ref>fig:basic.
It is seen from the plots that: (1) In each of the sc, bcc, and fcc cases, the values of α̃_c^+, n decrease with increasing n and the values of α̃_c^-, n increase with increasing n. (For the case of α̃^ sc_c^+, n, the decreasing behavior was essentially noted in <cit.>, although there it was characterized as an increase in the associated eigenvalue, which amounts to the same thing, since α̃_c^+=1/λ_max.) Thus, the interval of stability of α̃ is reduced in both its positive and negative extents as n increases. This makes intuitive physical sense; it would seem reasonable to expect that the addition of more dipolarizable entities can, loosely speaking, only serve to increase the overall amount of mutual interaction within the system, causing a greater tendency towards instability. (2) In all cases, the sequences α̃_c^±, n, n=2,3,4,... appear to converge to finite, non-zero values. (We already know, by the very fact that the dielectric state exists for the case of positive static polarizability within this model, that the sequences α̃_c^+, n, n=2,3,4,... do not converge to zero for large n, and the qualitative behavior of the magnitude of sequences α̃_c^-, n, n=2,3,4,... appears to be very similar in this respect.) (3) In both the positive and negative cases, it appears that the values of α̃^ bcc_c, n and α̃^ fcc_c, n become increasingly coincident with each other as n increases, whereas the values of α̃^ sc_c, n remain significantly different.
These aspects of the data are illuminated further by plots of the points (1/n^2,α̃_c^±, n), as shown in Fig. <ref>fig:extrap. The plots indicate also how the limiting values α̃_c^±, ∞ may be determined by extrapolation.
It can be seen that the plots are approximately linear in each case; this enables the best estimates for the values of α̃_c^±, ∞=lim_n→∞α̃_c^±, n to be determined as the vertical intercepts of linear fit lines. Since the data becomes linear to an increasing level of accuracy as n is increased, we use the two largest-n data points available, n=n_max-1=26 and n=n_max=27, to construct the extrapolation line and determine what we believe to be our best estimates of the limiting values using this method. Explicitly, the formula for the extrapolated values is thus
α̃_c^±, ∞=n_max^2α̃_c^±, n_max-(n_max-1)^2α̃_c^±, n_max-1/2n_max-1.
The values obtained by this method are listed in Table <ref>tab:data, where they are quoted to three significant figures.
As discussed above, we expect the Clausius-Mossotti equation to remain valid for values of α̃ that are within the stable interval α̃_c^-<α̃<α̃_c^+. Therefore, the critical values of the static electric susceptibility χ^(0)_c^± may be determined by inserting the values of α̃_c^±, ∞ into Eq. (<ref>eq:cm_reduced). The values of χ^(0)_c^± thus obtained are listed also in Table <ref>tab:data to three significant figures. The results of the study are summarized in Fig. <ref>fig:cm.
§.§ Accuracy of the numerically-determined critical values
There are a number of ways by which we may consider the accuracy of the results determined via the above method.
§.§.§ Accuracy via comparison against assumed exact values for the cases of bcc and fcc with
It appears reasonable to assume that the true model values (by which we mean the values predicted by the model, if we were able to solve it exactly as opposed to numerically) of α̃^ bcc_c^+, ∞ and α̃^ fcc_c^+, ∞ are exactly 3/4π, as per the vertical asymptote in the Clausius-Mossotti expression, Eq. (<ref>eq:cm_reduced); our numerical results for these values are α̃^ bcc_c^+, ∞=0.238752 and α̃^ fcc_c^+, ∞=0.238756 to six decimal places, which approximate 3/4π to an accuracy of 0.008 % and 0.010 % respectively. Based on this, it appears reasonable to argue that, in general, the uncertainty in determining the values of α̃_c^±, ∞ via our method is probably 0.01 % to the nearest order of magnitude (when using n_max=27); that is, we may assume an uncertainty of the order 0.01 % also on our values of α̃^ sc_c^+, ∞, α̃^ sc_c^-, ∞, α̃^ bcc_c^-, ∞, and α̃^ fcc_c^-, ∞. Using the standard method for propagation of uncertainties, uncertainties of the order 0.01 % on α̃^ sc_c^+, ∞, α̃^ sc_c^-, ∞, α̃^ bcc_c^-, ∞, and α̃^ fcc_c^-, ∞, lead, via Eq. (<ref>eq:cm_reduced), to uncertainties of the order of 0.01 % also on the values of χ^(0) sc_c^+, χ^(0) sc_c^-, χ^(0) bcc_c^-, and χ^(0) fcc_c^- (more precisely, an uncertainty of 0.01 % on α̃^ sc_c^+, ∞ would lead to an uncertainty of 0.05 % on χ^(0) sc_c^+, and uncertainties of 0.01 % on α̃^ sc_c^-, ∞, α̃^ bcc_c^-, ∞, and α̃^ fcc_c^-, ∞ would lead to uncertainties of 0.007 % on χ^(0) sc_c^-, χ^(0) bcc_c^-, and χ^(0) fcc_c^-). Therefore, we may conclude that the values listed in Table <ref>tab:data are almost certainly accurate as-quoted to three significant figures, and, if desired, values quoted to a larger number of significant figures with uncertainties of the order of 0.01 % may be readily generated from the raw data (provided in the Supplemental Material <cit.>). In particular: to a larger number of significant figures, we find χ^(0) bcc_c^-=-1.00009 and χ^(0) fcc_c^-=-1.00008. Given the above-estimated uncertainty of the order of 0.01 %, these values are consistent with, and very suggestive of, the true model values for these quantities both being exactly -1.
Working backwards at this point to cross check, if we believe that the true model values of χ^(0) bcc_c^- and χ^(0) fcc_c^- are both -1, then the true model values of α̃^ bcc_c^-, ∞, and α̃^ fcc_c^-, ∞ must, from Eq. (<ref>eq:cm_reduced), be exactly -3/8π. Our numerical results for these values are α̃^ bcc_c^-, ∞=-0.119382 and α̃^ fcc_c^-, ∞=-0.119381 to six decimal places, which may be seen to approximate -3/8π to an accuracy of 0.013 % and 0.012 % respectively. This appears consistent with our previous assumption that the uncertainty on all the numerical values of α̃_c^±, ∞ is of the order 0.01 %.
§.§.§ Accuracy via inductive reasoning
An alternative way to assess the accuracy of our numerical results is as follows. Noting, from Fig. <ref>fig:basic and the raw data tabulated in the Supplemental Material <cit.>, that the sequences α̃_c^+, n, n=2,3,4,...,27, decrease monotonically with increasing n in each of the sc, bcc, and fcc cases, and assuming that this trend continues for all n (i.e., applying `inductive reasoning'), then any particular value of α̃_c^+, n for a given crystal structure provides an upper bound on α̃_c^+, ∞ for that crystal structure (note that we are referring here to an upper bound on the numerically-determined value of α̃_c^+, ∞, which is itself an upper bound on the stable value of α̃). Accordingly, the most stringent upper bounds on the values of α̃_c^+, ∞ that may be determined from the data in this way are given by α̃_c^+, ∞^ub=α̃_c^+, n_max (with, in our case, n_max=27).
To determine lower bounds on the numerically-determined values of α̃_c^+, ∞, we first recall that our extrapolation to determine the best-estimate values of α̃_c^±, ∞, as per Fig. <ref>fig:extrap and Eq. (<ref>eq:extrap), used a straight line fit through the points (1/n^2,α̃_c^+, n). Here, the exponent of two in 1/n^2 was chosen `by hand' to produce the most-linear plot. If, instead of an exponent of two, we choose an exponent of one and, hence, plot instead the points (1/n,α̃_c^+, n), we may observe that the graph is increasing and convex in each of the sc, bcc, and fcc cases (see Fig. S1 of the Supplemental Material <cit.>). The choice of an exponent of one is somewhat arbitrary; the requirement is simply that a convex graph is produced. Again, assuming this trend remains true, i.e., the plot remains increasing and convex, not just for n=2...27 but for all n, then the vertical intercept of a straight line through any two data points provides a lower bound on α̃_c^+, ∞. Accordingly, the most stringent lower bounds on the values of α̃_c^+, ∞ that may be determined in this way from the data available are given by the vertical intercepts of the straight lines through the points (1/n,α̃_c^+, n) with n=n_max-1=26 and n=n_max=27. Explicitly, the formula for this procedure is thus
α̃_c^+, ∞^lb=n_maxα̃_c^+, n_max-(n_max-1)α̃_c^+, n_max-1.
Similarly, with regard to α̃_c^-, ∞, we may observe that the sequence α̃_c^-, n, n=2,3,4,...,27 increases monotonically for each type of crystal structure and we may argue that lower bounds on the values of α̃_c^-, ∞ are given by α̃_c^-, ∞^lb=α̃_c^-, n_max in each case. To determine upper bounds on the values of α̃_c^-, ∞, we observe that plots of the points (1/n,α̃_c^-, n) are decreasing and concave in each case, with the caveat that only points for which n⩾ 5 are included in the sc case (see Fig. S1 of the Supplemental Material <cit.>). Therefore, we may argue, analogously to above, that the most stringent upper bounds on the values of α̃_c^-, ∞ that may be determined by this method from the data available are given by the vertical intercepts of the straight lines through the points (1/n,α̃_c^-, n) with n=n_max-1=26 and n=n_max=27. Explicitly, the formula for this procedure is thus
α̃_c^-, ∞^ub=n_maxα̃_c^-, n_max-(n_max-1)α̃_c^-, n_max-1.
In this way we find, to four significant figures:
α̃^ sc_c^+, ∞=0.1868^(0.1876)_(0.1860),
α̃^ sc_c^-, ∞=-0.1032^(-0.1026)_(-0.1039),
α̃^ bcc_c^+, ∞=0.2388^(0.2395)_(0.2380),
α̃^ bcc_c^-, ∞=-0.1194^(-0.1188)_(-0.1199),
α̃^ fcc_c^+, ∞=0.2388^(0.2396)_(0.2379), and
α̃^ fcc_c^-, ∞=-0.1194^(-0.1188)_(-0.1199), where superscripts denote upper bounds and subscripts denote lower bounds. (Here, we have rounded away from zero for the upper bounds of α̃_c^+, ∞ and the lower bounds of α̃_c^-, ∞, and rounded towards zero for the lower bounds of α̃_c^+, ∞ and the upper bounds of α̃_c^-, ∞, to preserve, when rounded, the integrity of the values as bounds.) It is seen that, in all cases, the upper and lower bounds lie within ± 0.6 % of the best-estimate values, hence we may summarize that the values of α̃_c^±, ∞ obtained by the above method (with n_max=27) are accurate to within ± 0.6 % for each crystal structure, according to this way of assessing the accuracy. The values for the bcc and fcc cases are consistent with, and suggestive of, the true model values of α̃^ bcc_c^+, ∞ and α̃^ fcc_c^+, ∞ being exactly 3/4π (as assumed previously), and the true model values of α̃^ bcc_c^-, ∞ and α̃^ fcc_c^-, ∞ being exactly -3/8π (as deduced previously).
Inserting the best-estimate, upper bound, and lower bound values of α̃_c^±, ∞ into Eq. (<ref>eq:cm_reduced), we find:
χ^(0) sc_c^+=10.80^(10.99)_(10.60),
χ^(0) sc_c^-=-0.9057^(-0.9020)_(-0.9093),
χ^(0) bcc_c^-=-1.0001^(-0.9971)_(-1.0030),
and χ^(0) fcc_c^-=-1.0001^(-0.9972)_(-1.0029).
Again, the best-estimate values, and bounds, for χ^(0) bcc_c^- and χ^(0) fcc_c^- are consistent with, and suggestive of, true model values of exactly -1. As percentages, the accuracy of χ^(0) sc_c^+ is within ± 1.8 % and the accuracies of χ^(0) sc_c^-, χ^(0) bcc_c^-, and χ^(0) fcc_c^- are all within ± 0.5 %.
This way of assessing the accuracy has the advantage, compared to that presented in <ref>sec:acc_comp, that it does not require any of the values of α̃_c^±, ∞ to be assumed a priori for `calibration', and it does not require us to assume that the accuracy of the values of α̃_c^±, ∞ are similar for each crystal structure (though it ends up confirming that this is the case). In this regard, it may be considered somewhat more rigorous. On the other hand, it leads to less-stringent specifications of the accuracy.
§.§ Study to rule out sample-shape dependence
If our method is valid, it must be the case that the results obtained for α̃_c^±, ∞ and χ^(0)_c^± are independent of the overall shape of the crystals (assuming the crystals are macroscopic in all three dimensions, i.e., not 2D or 1D arrays). We have carried out a study to confirm that this is the case <cit.>, which may be summarized as follows.
In addition to the rhombohedral samples reported above, for each of the sc, bcc, and fcc cases, the following, alternatively-shaped, crystals were studied:
* `Parallelepiped slabs', formed from entities at the sets of position vectors
S_n^ slab={𝐫̃^(u_1,u_2,u_3):u_1,u_2=0...n^2-1; u_3=0..n-1}.
(More specifically, slab-like square cuboids in the sc case.)
* `Parallelepiped needles', formed from entities at the sets of position vectors
S_n^ needle={𝐫̃^(u_1,u_2,u_3):u_1,u_2=0...n-1; u_3=0..n^2-1}.
(More specifically, needle-like square cuboids in the sc case.)
* Spheres, formed from entities at the sets of position vectors
S_n^ sphere={𝐫̃^(u_1,u_2,u_3):u_1,u_2,u_3∈ℤ; |𝐫̃^(u_1,u_2,u_3)|≤ n}.
In each case, if the values of α̃_c^+, n and α̃_c^-, n for set S_n are calculated for a range of n, the limits α̃_c^±, ∞=lim_n→∞α̃_c^±, n are determined by extrapolation, and the accuracy is determined by one or other of the methods above—i.e., if the same process is carried out for these alternatively-shaped crystals as was carried out for the rhombohedral crystals above—then the same values of α̃^ sc_c^±, ∞, α̃^ fcc_c^±, ∞, and α̃^ bcc_c^±, ∞, and hence the same values of χ^(0) sc_c^±, χ^(0) fcc_c^±, and χ^(0) bcc_c^± are found, within the accuracy of the method (i.e., the same results as already reported in Table <ref>tab:data).
Of course, this approach does not rule out the possibility that some other overall shape of crystals that we have not checked explicitly—say, ellipsoidal—may somehow give different values, but we nevertheless consider it appropriate to reasonably conclude that the method appears to provide results that are independent of the sample shape.
§.§ An alternative methodology (yields the same results)
We may refer to the method employed hitherto in this paper as the `finite crystal method' since the macroscopic limit is considered by extrapolating the results for finite crystals of increasing size. An alternative methodology involves assuming an infinite crystal from the outset, which we may refer to as the `infinite crystal method'. Both methods were considered and applied by Allen to investigate the sc case with positive polarizability in Ref. <cit.>. Each method has certain advantages and disadvantages, but we believe that, overall, the finite crystal method provides the most direct and rigorous route to determine the values of α̃_c^± with well-defined accuracy in the macroscopic limit, and hence it is the method we reported in detail above. However, we have also carried out a detailed analysis of the infinite crystal method as applied to sc, bcc, and fcc crystals with emphasis on the negative static polarizability case <cit.>; in all cases, we find excellent agreement with the above-stated results, providing a useful cross-check and validation.
One favorable feature of the infinite crystal method is that, once the location in reciprocal space of the extremal eigenvalues has been established for a given crystal structure, the values of α̃_c^± (which are, necessarily, the macroscopic values) may be expressed as infinite lattice sums. For example, in the sc case we may write
α̃^ sc_c^+=[∑_𝗎'(-1)^u_2+u_3(2u_1^2-u_2^2-u_3^2)/(u_1^2+u_2^2+u_3^2)^5/2]^-1,
and
α̃^ sc_c^-=[∑_𝗎'(-1)^u_1(2u_1^2-u_2^2-u_3^2)/(u_1^2+u_2^2+u_3^2)^5/2]^-1,
where ∑_𝗎' denotes the sum over all triples of integers 𝗎=(u_1,u_2,u_3) except (0,0,0) (corresponding to the interaction of a given dipole with all other dipoles in the infinite crystal). We are not aware of any closed form expressions for these two particular sums, but they are absolutely convergent and may be readily approximated either via brute force summation with u_1, u_2, u_3=-N_sum...N_sum for some large N_sum, by evaluating the sum for a range of N_sum and extrapolating N_sum→∞, or by using the Ewald summation method. To three significant figures, the values of the sums are α̃^ sc_c^+=0.187 and α̃^ sc_c^-=-0.103, which agree with the results found previously for the finite crystal method recorded in Table <ref>tab:data.
The reciprocal λ_max^sc=1/α̃^ sc_c^+=5.35 was considered explicitly by Allen and is identified as the maximum point of the graph in Fig. 3 of Ref. <cit.>. The lower critical values were not of interest to Allen, but we may see that the reciprocal λ_min^sc=1/α̃^ sc_c^-=-9.69 is the minimum point of the graph in Fig. 3 of Ref. <cit.>. (We are not aware of any general theorem that states the extremal eigenvalues must lie along the edges of the irreducible Brillouin zone, as Allen appears to assume, but our work <cit.> indicates that this is indeed true for the sc, bcc, and fcc cases we have considered.)
The lattice sums of Eqs. (<ref>eq:lattice_sum_plus) and (<ref>eq:lattice_sum_minus) appear also in other physical systems and have, long ago, been evaluated in other contexts. For example, they appear in the related problem of the preferred orientation of arrays of electric or magnetic dipoles with fixed magnitudes: in this context, the value of what we refer to as λ_max^sc, for example, appears in Ref. <cit.> (denoted as “f_5” and listed in Table II of that reference), and in Ref. <cit.> (the value of -2.7 quoted for the “Antiparallel `A' ” structure with “Lattice structure a” in Table I of Ref. <cit.> is essentially -λ_max^sc/2). The value of what we refer to as λ_min^sc appears also in Ref. <cit.> (denoted as “f_2” and listed in Table II of Ref. <cit.>).
§ CONCLUSIONS
We have found that static electric susceptibility values are possible, according to the model, for non-equilibrium cubic crystals (with one dipolarizable entity per primitive cell) in the following intervals:
-0.906 ≲χ^(0) sc≲ 10.8,
-1.00 ≲χ^(0) bcc,
-1.00 ≲χ^(0) fcc.
The analysis of <ref>sec:accuracy indicates that the numerically-determined endpoints for the intervals are almost certainly accurate to the three significant figures stated and the lower endpoints for bcc and fcc are consistent with, and highly suggestive of, the true model values being exactly -1 in both cases.
All values of χ^(0) within the intervals can, according to the model, be obtained via an appropriate value of α̃. The value of α̃ necessary to produce a given value of χ^(0) may be obtained from the Clausius-Mossotti equation [by inverting the version of the equation presented in Eq. (<ref>eq:cm_reduced)]. Although we assume that α̃ may, in principle, take any (real) value, hypothetical values χ^(0) sc≳ 10.8, χ^(0) sc≲ -0.906, χ^(0) bcc≲ -1.00, and χ^(0) fcc≲ -1.00 are nevertheless impossible, within the model, because there is no value of α̃ that would result in a stable material with such a value of χ^(0). We therefore refer to the intervals above as the permissible intervals of χ^(0) and the lower endpoints of the above intervals as the lower permissible bounds of χ^(0) for the given crystal structure [Note, however, that we make no comment on whether the system is stable for values of α̃ exactly equal to α̃_c^-, ∞ and, therefore, whether values of χ^(0) exactly equal to χ^(0)_c^- are possible.]. The lower permissible bounds are unrelated to the horizontal asymptote of the Clausius-Mossotti curve (as it is presented in Fig. <ref>fig:cm) and they require a more-sophisticated approach than the standard Clausius-Mossotti analysis to derive.
Our initial motivation for carrying out the work presented herein was a concern that mutual interactions between entities with α<0 might, collectively, wipe out the possibility of χ^(0)<0 materials in the macroscopic limit: that is, we were concerned that, in the limit of large particle numbers, the lower critical value of α̃ would converge to zero and, accordingly, the lower permissible bound of χ^(0) would be zero in all cases. (The experiments reported in Ref. <cit.> were not sophisticated enough to rule out this possibility.) Perhaps most importantly, then, we have seen that this does not happen; the lower permissible bounds of χ^(0) are negative definite in each case. Therefore, we conclude that negative static electric susceptibility values are indeed possible in non-equilibrium crystals, according to the model. (We note that this conclusion is very different from that of the circuit theory argument, which also showed that values χ^(0)<-1 are impossible whether the material is in equilibrium or not but did not imply that any values in the interval -1<χ^(0)<0 are necessarily possible.)
We see that the lower permissible bound depends on the crystal structure: it is different for sc than for bcc and fcc. Thus, the question of the lower permissible bound for a given crystal structure appears to be, in general, a highly non-trivial question which can probably only be addressed definitively by the type of methods considered herein. In particular, we can assert that there is no structure-independent `short cut' derivation of the lower permissible bound.
Although the value χ^(0) sc_c^-=-0.906 differs by only ≈10 % from the values χ^(0) bcc_c^-=χ^(0) fcc_c^-=-1.00, and the assumption of point-like dipolarizable entities means that the results of the study may be inaccurate in relation to any real system, our results suggest that, if one wishes to create an isotropic material with the lowest possible value of χ^(0), a bcc or fcc structure, as opposed to a sc structure, is likely to be preferable.
It is clear that the case of χ^(0)<0 is very different from the usual case of χ^(0)>0. Whereas the permissible value of χ^(0) may be unbounded above for certain crystal structures (e.g., bcc and fcc with one entity per primitive cell), it is always bounded below by the value -1 according to the circuit theory argument, and, as we have seen, may be even more limited in its negative extent in certain crystal structures (e.g., sc with one entity per primitive cell). Nevertheless, in finding that the permissible interval may extend all the way down to the circuit theory limit of -1 for certain condensed media, we have confirmed that condensed media are, indeed, capable of exhibiting χ^(0)<0 values with magnitudes that are ∼ 10^3 times greater than those proposed initially in gaseous systems, even when mutual interactions between the dipolarizable entities are taken into account. We believe that this increase is likely to be sufficient to enable the remarkable potentialities of χ^(0)<0 materials—such as new forms of charged particle traps—to become practically feasible.
§ ACKNOWLEDGMENTS
This work was funded by the Engineering and Physical Sciences Research Council UK (Grant No. EP/R035393/1).
55
fxundefined [1]
ifx#1
fnum [1]
#1firstoftwo
secondoftwo
fx [1]
#1firstoftwo
secondoftwo
noop [0]secondoftwo
ref[1]@startlink#1@href
href[1]#1@endlink
anitize@url [0]`
12`$12`&12`#12`1̂2`_12`%12
startlink[1]
endlink[0]
rl [1]href #1
@bib@innerbibempty
[von Hippel(1954a)]hippel_1954
editor A. R. von Hippel, ed., @noop title Dielectric Materials and
Applications (publisher Wiley, address New
York, year 1954)NoStop
[Reynolds III and Buchanan(2004)]reynolds_2004
author author T. G. Reynolds III and author R. C. Buchanan, title title Ceramic capacitor
materials, in @noop booktitle Ceramic
Materials for Electronics, editor edited by editor R. C. Buchanan (publisher Taylor & Francis, address Boca Raton, year 2004) edition 3rd ed., Chap. chapter 3,
p. pages 141NoStop
[Cavendish(1921)]cavendish_1921
author author H. Cavendish, in @noop booktitle The
Scientific Papers of the Honourable Henry Cavendish, Vol. volume 1, editor edited by editor J. C. Maxwell and editor J. Larmor (publisher Cambridge University
Press, address Cambridge, year 1921)NoStop
[Faraday(1838a)]faraday_ERE_11_series_phil_trans
author author M. Faraday, title title Experimental researches
in electricity—eleventh series, https://doi.org/10.1098/rstl.1838.0002 journal journal Philos. Trans. R. Soc. London volume
128, pages 1 (year
1838a)NoStop
[Note1()]Note1
note For completeness, we may note that, following Faraday, some
relatively early researchers considered air, rather than vacuum, as the
reference medium, even when measurement techniques became sufficiently
precise to distinguish between the values obtained for various gases.
Therefore, values of ε ^(0) (or the specific inductive
capacity, as it was called initially) slightly less than unity have been
reported for gases such as Hydrogen: see, e.g., Ref. <cit.>.
However, since it has been accepted subsequently that the more-appropriate
reference is vacuum, the values of ε ^(0) reported
experimentally are greater than unity for all materials (but may be less than
that of air for certain gases): see, e.g., Ref. <cit.>NoStop
[Maxwell(1873)]maxwell_1873_p_65
author author J. C. Maxwell, @noop title A Treatise on
Electricity and Magnetism, edition 1st ed., Vol. volume 1 (publisher Clarendon Press, address
Oxford, year 1873) p. pages 65NoStop
[Landau et al.(1984)Landau,
Lifshitz, and Pitaevskii]ll8
author author L. D. Landau, author E. M. Lifshitz, and author L. P. Pitaevskii, @noop title Electrodynamics of
Continuous Media (Course of Theoretical Physics, Vol. 8), edition 2nd ed. (publisher Pergamon Press, address Oxford, year 1984)NoStop
[Sanders(1986)]sanders_1986
author author T. M. Sanders, Jr., title title The
sign of the static susceptibility, @noop journal
journal Bull. Am. Phys. Soc. volume
31, pages 868 (year 1986)NoStop
[Sanders(1988)]sanders_1988
author author T. M. Sanders, Jr., title title On
the sign of the static susceptibility, https://doi.org/10.1119/1.15754 journal journal
Am. J. Phys. volume 56, pages 448
(year 1988)NoStop
[Chiao and Boyce(1994)]chiao_1994
author author R. Y. Chiao and author J. Boyce, title title Superluminality, parelectricity, and
Earnshaw's theorem in media with inverted populations, https://doi.org/10.1103/PhysRevLett.73.3383 journal journal Phys. Rev. Lett. volume 73, pages 3383 (year 1994)NoStop
[Chiao et al.(1995a)Chiao, Bolda,
Bowie, Boyce, Garrison, and Mitchell]chiao_1995_1
author author R. Y. Chiao, author E. Bolda,
author J. Bowie, author J. Boyce, author
J. C. Garrison, and author
M. W. Mitchell, title
title Superluminal and parelectric effects in rubidium vapour
and ammonia gas, https://doi.org/10.1088/1355-5111/7/3/007
journal journal Quantum Semiclass. Opt. volume 7, pages 279 (year
1995a)NoStop
[Chiao et al.(1995b)Chiao, Boyce, and Mitchell]chiao_1995_2
author author R. Y. Chiao, author J. Boyce, and author M. W. Mitchell, title title Superluminality and parelectricity:
the ammonia maser revisited, https://doi.org/10.1007/BF01135871
journal journal Appl. Phys. B volume 60, pages 259 (year
1995b)NoStop
[Chiao et al.(1995c)Chiao, Boyce, and Garrison]chiao_1995_3
author author R. Y. Chiao, author J. Boyce, and author J. C. Garrison, title title Superluminal (but causal) effects in
quantum physics, https://doi.org/10.1111/j.1749-6632.1995.tb38983.x journal
journal Ann. N. Y. Acad. Sci. volume
755, pages 400 (year
1995c)NoStop
[Chiao(1993)]chiao_1993
author author R. Y. Chiao, title title Superluminal (but causal)
propagation of wave packets in transparent media with inverted atomic
populations, https://doi.org/10.1103/PhysRevA.48.R34 journal journal Phys. Rev. A volume
48, pages R34 (year 1993)NoStop
[Thomson(1847)]thomson_1847
author author W. Thomson, title title On the forces experienced
by small spheres under magnetic influence; and on some of the phenomena
presented by diamagnetic substances, @noop journal
journal Cam. Dub. Math. J. volume 2, pages 230 (year 1847)NoStop
[Braunbek(1939a)]braunbek_1939_1
author author W. Braunbek, title title Freischwebende
Körper im elektrischen und magnetischen Feld, https://doi.org/10.1007/BF01339979 journal journal Z. Phys. volume 112, pages
753 (year 1939a)NoStop
[Braunbek(1939b)]braunbek_1939_2
author author W. Braunbek, title title Freies Schweben
diamagnetischer Körper im Magnetfeld, https://doi.org/10.1007/BF01339980 journal journal Z. Phys. volume 112, pages
764 (year 1939b)NoStop
[Arkadiev(1947)]arkadiev_1947
author author V. Arkadiev, title title A floating magnet, https://doi.org/10.1038/160330a0 journal journal Nature volume 160, pages
330 (year 1947)NoStop
[Castles et al.(2020)Castles, Fells, Isakov, Morris, Watt, and Grant]castles_2020
author author F. Castles, author J. A. J. Fells, author D. Isakov,
author S. M. Morris, author A. A. R. Watt, and author P. S. Grant, title
title Active metamaterials with negative static electric
susceptibility, https://doi.org/10.1002/adma.201904863 journal journal Adv. Mater. volume
32, pages 1904863 (year 2020)NoStop
[Auzanneau and Ziolkowski(1999)]auzanneau_1999
author author F. Auzanneau and author R. W. Ziolkowski, title title Artificial composite
materials consisting of nonlinearly loaded electrically small antennas:
operational-amplifier-based circuits with applications to smart skins, https://doi.org/10.1109/8.791952 journal journal IEEE Trans. Antennas Propag. volume 47, pages 1330 (year 1999)NoStop
[Tretyakov(2001)]tretyakov_2001
author author S. A. Tretyakov, title title Meta-materials with
wideband negative permittivity and permeability, https://doi.org/10.1002/mop.1387 journal journal
Microw. Opt. Technol. Lett. volume 31, pages 163 (year 2001)NoStop
[Cummer(2015)]cummer_2015
author author S. A. Cummer, in @noop booktitle Nonlinear,
Tunable and Active Metamaterials, editor edited by editor I. V. Shadrivov, editor
M. Lapine, and editor
Y. S. Kivshar (publisher
Springer, Cham, year 2015) p. pages
21NoStop
[ASTM Standard D150-18(2022)]astm_d150_18_2022
author author ASTM Standard
D150-18, title Standard test methods for ac loss
characteristics and permittivity (dielectric constant) of solid electrical
insulation, in @noop booktitle 2022 Annual
Book of ASTM Standards, Vol. volume 10.01 (publisher ASTM International, West Conshohocken, year
2022)NoStop
[kir()]kirzhnits_1976
@noop note D. A. Kirzhnits, Are the Kramers-Kronig
relations for the dielectric permittivity of a material always valid?
https://doi.org/10.3367/UFNr.0119.197606f.0357Usp. Fiz. Nauk
119, 357 (1976)
[https://doi.org/10.1070/PU1976v019n06ABEH005268Sov. Phys. Usp.
19, 530, (1976)]NoStop
[Dolgov et al.(1981)Dolgov,
Kirzhnits, and Maksimov]dolgov_1981
author author O. V. Dolgov, author D. A. Kirzhnits, and author E. G. Maksimov, title title On an admissible sign of
the static dielectric function of matter, https://doi.org/10.1103/RevModPhys.53.81 journal journal Rev. Mod. Phys. volume 53, pages 81 (year 1981)NoStop
[Kirzhnits()]kirzhnits_1987
author author D. A. Kirzhnits, @noop note General properties of
electromagnetic response functions,
https://doi.org/10.3367/UFNr.0152.198707b.0399Usp. Fiz. Nauk
152, 399 (1987)
[https://doi.org/10.1070/PU1987v030n07ABEH002925Sov. Phys. Usp.
30, 575, (1987)]NoStop
[Kirzhnitz(1989)]kirzhnitz_1989
author author D. A. Kirzhnitz, title title General properties of
electromagnetic response functions, in @noop booktitle The Dielectric Function of Condensed Systems (Modern Problems in
Condensed Matter Sciences, Vol. 24), editor edited by editor L. V. Keldysh, editor D. A. Kirzhnitz, and editor A. A. Maradudin (publisher Elsevier, address Amsterdam, year
1989) Chap. chapter 2, p. pages 41NoStop
[Note2()]Note2
note Although we do not make use of the fact in what follows, a
`negative static electric susceptibility' may be considered readily in the
general, anisotropic, case to mean that one or more of the three principal
components of the static electric susceptibility tensor are less than
zero.Stop
[Note3()]Note3
note We are unaware of the origins of this type of argument to
establish minimum bounds on ε ^(0) and χ ^(0), but such
an approach was brought to our attention by Ref. <cit.>.Stop
[Note4()]Note4
note An alternative, briefer argument is to observe that the
energy of a capacitor is given by Q^2/ (2C ), which already
indicates an instability for C<0, and hence for ε ^(0)<0 and
χ ^(0)<-1. However, we believe that such energy-based arguments
should, in general, be applied with some care to non-equilibrium materials
that may utilize a source of power to maintain an electrostatic state that is
otherwise energetically unfavorable.Stop
[Kaye and Laby(1973)]kaye_laby_1973
author author G. W. C. Kaye and author T. H. Laby, @noop title Tables of
Physical and Chemical Constants, edition 14th ed. (publisher Longman, address London, year 1973)NoStop
[von Hippel et al.(1946)von
Hippel, Breckenridge, Chesley, and Tisza]hippel_1946
author author A. von
Hippel, author R. G. Breckenridge, author F. G. Chesley, and author L. Tisza, title title High dielectric constant
ceramics, https://doi.org/10.1021/ie50443a009 journal journal Ind. Eng. Chem. volume
38, pages 1097 (year 1946)NoStop
[von Hippel(1954b)]hippel_1954_2
author author A. R. von Hippel, @noop title Dielectrics and
Waves (publisher Wiley, address New York, year 1954)NoStop
[Note5()]Note5
note It is, of course, also possible to obtain an isotropic
electric susceptibility from entities with anisotropic static polarizability:
for example, if the principal axes of the entities are randomly oriented.
However, for simplicity, we do not consider this case herein.Stop
[Mossotti(1836)]mossotti_1836
author author O. F. Mossotti, @noop title Sur les Forces qui
Régissent la Constitution Intérieure des Corps, Aperçu pour servir à la
Détermination de la Cause et des Lois de l'Action Moléculaire (publisher L'Imprimerie Royale, address Turin, year 1836)NoStop
[Mossotti(1850)]mossotti_1850
author author O. F. Mossotti, title title Discussione analitica
sull'influenza che l'azione di un mezzo dielettrico ha sulla distribuzione
dell'elettricità alla superficie di più corpi elettrici disseminati in
esso, @noop journal journal Memorie di
Matematica e di Fisica della Società Italiana delle Scienze Residente in
Modena volume 24(2), pages 49
(year 1850)NoStop
[Faraday(1838b)]faraday_ERE_14_series_phil_trans
author author M. Faraday, title title Experimental researches
in electricity—fourteenth series, https://doi.org/10.1098/rstl.1838.0014 journal journal Philos. Trans. R. Soc. London volume
128, pages 265 (year
1838b)NoStop
[Clausius(1879)]clausius_1879
author author R. Clausius, @noop title Die Mechanische
Behandlung der Electricität (publisher Druck &
Verlag, address Braunschweig, year
1879)NoStop
[Allen(2004a)]allen_2004
author author P. B. Allen, title title Dipole interactions and
electrical polarity in nanosystems: the Clausius-Mossotti and related
models, https://doi.org/10.1063/1.1630029 journal
journal J. Chem. Phys. volume 120, pages 2951 (year 2004a)NoStop
[Allen(2004b)]allen_2004_inbook
author author P. B. Allen, title title Dipole interactions in
nanosystems, in @noop booktitle Molecular
Nanowires and Other Quantum Objects, editor edited by editor A. S. Alexandrov,
editor J. Demsar, and editor I. K. Yanson (publisher Kluwer, address Dordrecht, year
2004) p. pages 29NoStop
[Anderson(1951)]anderson_1951
author author P. W. Anderson, title title Theory of ferroelectric
behavior of barium titanate, @noop journal journal Ceramic Age volume 57, pages 29 (year 1951), note [reprinted in P. W.
Anderson, A Career in Theoretical Physics, 2nd ed. (World Scientific
Publishing, Singapore, 2004) p. 21]NoStop
[Kittel(2005)]kittel_book
author author C. Kittel, @noop title Introduction to Solid
State Physics, edition 8th ed. (publisher
Wiley, address Hoboken, year 2005)NoStop
[Aspnes(1982)]aspnes_1982
author author D. E. Aspnes, title title Local-field effects and
effective-medium theory: a microscopic perspective, https://doi.org/10.1119/1.12734 journal journal
Am. J. Phys. volume 50, pages 704
(year 1982)NoStop
[Note6()]Note6
note When we talk herein of sc, bcc, or fcc crystals, we mean, in
all cases, crystals with one entity per primitive cell.Stop
[Note7()]Note7
note This has been articulated clearly by Allen in Refs. <cit.> and is related closely to the fact that, for a
model consisting of entities with dipole moments of fixed
magnitude that are free to rotate, an antiferroelectric configuration, as
opposed to a ferroelectric configuration, can be energetically preferred in
the sc case <cit.>.Stop
[Note8()]Note8
note This type of instability is already exhibited by a system
containing only two entities. In this case, if the value of α in
relation to the distance between the entities d is such that α >2πε _0 d^3 then the system is unstable towards a self-polarized
state. For a pedagogical account of the two-entity system, and others, in the
case α >0, see Ref. <cit.>. The two-entity system
with α >0 also appears, for example, as Problem 8 in Chapter 16 of
Ref. <cit.>, where it is referred to as the “ferroelectric
criterion for atoms”.Stop
[Körner(2004)]korner_companion
author author T. W. Körner, @noop title A Companion to
Analysis (publisher American Mathematical Society, address Providence, year 2004) p. pages 151NoStop
[Ashcroft and Mermin(1976)]ashcroft_mermin_p_66
author author N. W. Ashcroft and author N. D. Mermin, @noop title Solid State Physics (publisher Brooks/Cole, Cengage Learning, address
Belmont, year 1976) p. pages 66NoStop
[sup()]supp_aip
@noop note See Supplemental Material at [URL will be
inserted by publisher].Stop
[Dutta and Castles()]dutta_castles_unpublished
author author R. Dutta and author F. Castles, note (unpublished)NoStop
[Luttinger and Tisza(1946)]luttinger_1946
author author J. M. Luttinger and author L. Tisza, title title Theory of dipole
interactions in crystals, https://doi.org/10.1103/PhysRev.70.954
journal journal Phys. Rev. volume 70, pages 954 (year 1946)NoStop
[Sauer(1940)]sauer_1940
author author J. A. Sauer, title title Magnetic energy constants
of dipolar lattices, https://doi.org/10.1103/PhysRev.57.142
journal journal Phys. Rev. volume 57, pages 142 (year 1940)NoStop
[Note9()]Note9
note Note, however, that we make no comment on whether the system
is stable for values of α̃ exactly equal to α̃_c^-, ∞ and, therefore,
whether values of χ ^(0) exactly equal to χ ^(0)_c^- are possible.Stop
[Thomson(1921)]thomson_jj_1921
author author J. J. Thomson, @noop title Elements of the
Mathematical Theory of Electricity and Magnetism, edition
5th ed. (publisher Cambridge University Press, address Cambridge, year 1921) p. pages
89NoStop
[Tretyakov and Maslovski(2007)]tretyakov_2007
author author S. A. Tretyakov and author S. I. Maslovski, title title Veselago materials:
what is possible and impossible about the dispersion of the constitutive
parameters, https://doi.org/10.1109/MAP.2007.370980 journal journal IEEE Antennas Propag. Mag. volume 49, pages 37 (year
2007)NoStop
|
http://arxiv.org/abs/2303.06903v1
|
20230313074109
|
Resource-efficient Direct Characterization of General Density Matrix
|
[
"Liang Xu",
"Mingti Zhou",
"Runxia Tao",
"Zhipeng Zhong",
"Ben Wang",
"Zhiyong Cao",
"Hongkuan Xia",
"Qianyi Wang",
"Hao Zhan",
"Aonan Zhang",
"Shang Yu",
"Nanyang Xu",
"Ying Dong",
"Changliang Ren",
"Lijian Zhang"
] |
quant-ph
|
[
"quant-ph",
"physics.optics"
] |
these authors contribute equally to this work
Research Center for Quantum Sensing, Zhejiang Lab, Hangzhou 310000, China
these authors contribute equally to this work
Research Center for Quantum Sensing, Zhejiang Lab, Hangzhou 310000, China
these authors contribute equally to this work
Research Center for Quantum Sensing, Zhejiang Lab, Hangzhou 310000, China
Research Center for Quantum Sensing, Zhejiang Lab, Hangzhou 310000, China
National Laboratory of Solid State Microstructures, Key Laboratory of Intelligent Optical Sensing and Manipulation, College of Engineering and Applied Sciences, and Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093, China
School of Electronic Control, Chang’an University, Xi’an 710064, China
National Laboratory of Solid State Microstructures, Key Laboratory of Intelligent Optical Sensing and Manipulation, College of Engineering and Applied Sciences, and Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093, China
National Laboratory of Solid State Microstructures, Key Laboratory of Intelligent Optical Sensing and Manipulation, College of Engineering and Applied Sciences, and Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093, China
National Laboratory of Solid State Microstructures, Key Laboratory of Intelligent Optical Sensing and Manipulation, College of Engineering and Applied Sciences, and Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093, China
Quantum Optics and Laser Science, Blackett Laboratory, Imperial College London, Prince Consort Rd, London SW7 2AZ, United Kingdom
Quantum Optics and Laser Science, Blackett Laboratory, Imperial College London, Prince Consort Rd, London SW7 2AZ, United Kingdom
Research Center for Quantum Sensing, Zhejiang Lab, Hangzhou 310000, China
[email protected]
Research Center for Quantum Sensing, Zhejiang Lab, Hangzhou 310000, China
[email protected]
Key Laboratory of Low-Dimensional Quantum Structures and Quantum Control of Ministry of Education,Key Laboratory for Matter Microstructure and Function of Hunan Province,
Department of Physics and Synergetic Innovation Center for Quantum Effects and Applications,Hunan Normal University, Changsha 410081, China
[email protected]
National Laboratory of Solid State Microstructures, Key Laboratory of Intelligent Optical Sensing and Manipulation, College of Engineering and Applied Sciences, and Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093, China
Sequential weak measurements allow the direct extraction of individual density-matrix elements instead of globally reconstructing the whole density matrix, opening a new avenue for the characterization of quantum systems. Nevertheless, the requirement of multiple coupling for each qudit of quantum systems and the lack of appropriate precision evaluation constraint its applicability extension, especially for multi-qudit quantum systems. Here, we propose a resource-efficient scheme (RES) to directly characterize the density matrix of general multi-qudit systems, which not only optimizes the measurements but also establishes a feasible estimation analysis. In this scheme, an efficient observable of quantum system is constructed such that a single meter state coupled to each qudit is sufficient to extract the corresponding density-matrix element. An appropriate model based on the statistical distribution of errors are used to evaluate the precision and feasibility of the scheme. We experimentally apply the RES to the direct characterization of general single-photon qutrit states and two-photon entangled states. The results show that the RES outperforms the sequential schemes in terms of efficiency and precision in both weak- and strong- coupling scenarios. This work sheds new light on the practical characterization of large-scale quantum systems and investigation of their non-classical properties.
Resource-efficient Direct Characterization of General Density Matrix
Lijian Zhang
March 30, 2023
====================================================================
Introduction.–The density matrix fully describes a quantum system (QS), including its intrinsic properties and how it interacts with other systems. The characterization of the density matrix, especially the off-diagonal elements, is crucial for revealing the non-classical properties of quantum systems <cit.> and underpinning advanced quantum technologies <cit.>. Quantum state tomography (QST) is a standard approach to globally reconstruct the whole density matrix based on the informationally-complete measurement results. However, both the experimental difficulties in implementing informationally-complete quantum measurements and the computational complexity of reconstruction algorithm dramatically increase with growing dimension of quantum systems, making the QST impractical for the characterization of large-scale quantum states. Though many attempts have been made to improve the feasibility of QST <cit.>, the characterization of the entire density matrix would be inefficient when a few specific density-matrix elements are sufficient to reveal certain properties e.g., entanglement <cit.> and coherence <cit.>.
Recently, weak measurement followed by post-selection makes it possible to directly measure the quantum wavefunction of pure states <cit.> as well as the quasi-probability distribution of general mixed states <cit.>, which is equivalent to the density matrix through linear transformation <cit.>. In particular, the density-matrix elements can be directly characterized by sequential measurements of complementary observables <cit.>. Given the significant advantages in the reduced number of measurement basis and the avoidance of the reconstruction algorithm, the direct characterization scheme has also been generalized to quantum processes <cit.> and quantum detectors <cit.>. However, the current direct characterization of density matrix relies on sequential coupling processes for each qudit of quantum systems, which largely restricts its efficiency and scalability to multi-particle and high-dimensional quantum states <cit.>. Thus, the up-to-date direct characterization of high-dimensional or two-photon density matrix has to resort to introducing certain assumptions or utilizing extra quantum resources <cit.>. Beyond that, the extraction of high-order correlation information during the sequential weak measurements leads to large statistical errors <cit.>. A rigorous framework based on strong measurements has also been developed to improve the characterization precision <cit.>. Yet, such an approach may destroy the unique advantages of weak measurement in slight disturbance to the quantum systems.
In this paper, we propose a resource-efficient scheme (RES) to directly characterize the density-matrix elements of general multi-qudit quantum systems. An efficient observable is constructed through Hadamard transformations, which allows to extract the density-matrix element of interest with one coupling process for each qudit. We experimentally demonstrate the RES by directly characterizing the density matrix of single-photon qutrit states and two-photon entangled states during the unitary evolution and dephasing processes. Our results show that the RES achieves better precision than sequential schemes with fewer quantum measurements in two prevalent situations, where the coupling strength is weak or simultaneously optimized in terms of precision.
Theoretical framework.–We first consider a general single-qudit (d-dimensional) QS described by the density matrix ρ = ∑_a,a^'ρ_a,a^'|a⟩⟨ a^'|. The diagonal element ρ_a,a can be easily obtained with the projective measurements π̂_a = |a⟩⟨ a| yielding ρ_a,a = Tr(ρπ̂_a). In sequential weak measurement scheme, the off-diagonal element ρ_a,a^' (a≠ a^') is associated with the average value Tr(M̂_a^',aρ) = ρ_a,a^' of the operator M̂_a^',a = dπ̂_a^'π̂_bπ̂_a, where π̂_b = |b⟩⟨ b| and |b⟩ =1/√(d)∑_a|a⟩. Practically, one sequentially couples the observables π̂_a and π̂_b with two independent meter states followed by the projector π̂_a^' for the post-selection <cit.>. The joint measurement on the post-selected meter states leads to the average value of M̂_a^',a. Here, we adopt an alternative decomposition of M̂_a^',a = π̂_a^'Ĉ_a,a^' to the product of the efficient observable Ĉ_a,a^' = |a⟩⟨ a^'| + |a^'⟩⟨ a| and the projector π̂_a^' for the post-selection. With this decomposition, the density-matrix element can be directly characterized through one coupling operation for each qudit to measure the efficient observable.
Fig. <ref> (A) shows how to directly characterize the density matrix of a single-qudit QS with the RES. In the red dashed box, we implement the coupling between the QS ρ and the single-qubit meter state (MS) |0⟩_m under the Hamiltonian Ĥ=gδ(t-t_0)Ĉ_a,a^'⊗σ̂_y, where g is the coupling strength and σ̂_y is the Pauli operator of the MS. The efficient observable Ĉ_a,a^' is constructed through the Hadamard transformation H_a,a^' on the ordinary observable Ô_a,a^'=|a⟩⟨ a| - |a^'⟩⟨ a^'| of the QS, given by Ĉ_a,a^' = Ĥ_a,a^'Ô_a,a^'Ĥ_a,a^'. After the coupling process Û = exp(-i∫Ĥdt), the system-meter joint state evolves to ρ_jt=Ûρ⊗ |0⟩_m⟨ 0| Û^†. Since a pair of post-selection projectors π̂_a^' and π̂_a correspond to the conjugate operators M̂_a^',a and M̂_a,a^', we perform both post-selection on the QS and obtain the final meter states ρ_m,a^'=Tr_s[π̂_a^'⊗_mρ_jt] and ρ_m,a, respectively, with the subscript s denoting the partial trace on the QS. In this way, the density-matrix element derived by the weak average ρ_a,a^' = [Tr(M̂_a^',aρ_jt) + Tr(M̂_a,a^'ρ_jt)']/2 can be extracted with the observables σ̂_+ = σ̂_x+iσ̂_y and σ̂_- = σ̂_x - iσ̂_y of the post-selected meter states:
ρ_a,a^' = Tr(σ̂_+ρ_m,a^') + Tr(σ̂_-ρ_m,a)/2sin(2g).
In Fig. <ref> (B), we generalize our formalism to the direct characterization of N-qudit density matrix ρ^(N) = ∑_𝒮,𝒮^'ρ^(N)_𝒮,𝒮^'|𝒮⟩⟨𝒮^'|, where |𝒮⟩⟨𝒮^'| = |a_1,...,a_N⟩⟨ a_1^',...,a_N^'| and |a_n⟩ refers to the eigenstate of nth qudit. To directly characterize the off-diagonal element ρ_𝒮,𝒮^', we decompose the operator M̂_𝒮^',𝒮 = |𝒮^'⟩⟨𝒮| (and its conjugate M̂_𝒮,𝒮^') to the joint efficient observable Ĉ^(N) = ⊗_n=1^NĈ_n and the post-selection projector Π̂_𝒮^'^(N) = |𝒮^'⟩⟨𝒮^'| (Π̂_𝒮^(N)). The efficient observable Ĉ_n for nth qudit is divided into two cases: (i) if a_j ≠ a_j^', we choose Ĉ_j = |a_j⟩⟨ a_j^'| +|a_j^'⟩⟨ a_j| and the coupling process is in analogy to the single-qudit situation; (ii) if a_k = a_k^', Ĉ_k equals to _k and no coupling is required. The separate measurement of the observable Ĉ_j on each qudit with the identical coupling strength g leads to the Hamiltonian Ĥ^(N) = ∑_a_j ≠ a_j^' gδ(t-t_0) Ĉ_j⊗σ̂_y,j and the multiplied result yields the average value of Ĉ^(N). Assuming that there are totally l independent couplings of N-qudit system, i.e., l terms in Ĥ^(N), we get the joint state
ρ_jt^(N) = Û^(N)[ ρ^(N)⊗ (|0⟩_m⟨ 0|)^⊗ l] Û^(N)†.
with the unitary Û^(N) = exp[-i∫Ĥ^(N)dt]. The following post-selection Π̂_𝒮^' or Π̂_𝒮 on the QS results in the final MS ρ_m,𝒮^' = Tr_s[Π̂_𝒮^'⊗^⊗ lρ_jt^(N)] or ρ_m,𝒮, respectively. The density-matrix element can be directly obtained by collective measurements on the MS:
ρ_𝒮,𝒮^'=Tr[⊗_a_j ≠ a_j^'σ̂_+,jρ_m,𝒮^'] + Tr[⊗_a_j ≠ a_j^'σ̂_-,jρ_m,𝒮]/2sin^l(2g).
To comprehensively evaluate the precision of the direct-characterization schemes, we analyze the statistical errors of the measured density-matrix elements with the quantum states uniformly sampled over the state space. Thus, the expected precision and the feasibility of the scheme can be inferred from the statistical distribution of errors. Due to the uniform sampling of single-qudit systems, both the real and the imaginary parts of all off-diagonal density-matrix elements stand on equal footing. Given that the sampled state ρ_d evolves from an initial state |0⟩⟨ 0| = (1,0,...,0)^T(1,0,...,0) under the unitary transformation V∈ U(d), we define the mean precision of single-qudit characterization
Δ^2_d = ∫ _V∈ U(d)δ^2 ρ_d dμ_d(V).
by taking the integral of mean errors δ^2 ρ_d = 1/d(d-1)∑_a=0,a<a^'^d-1 [δ^2 Re(ρ_a,a^') + δ^2 Im(ρ_a,a^')] with respect to Harr measure μ_d(V). For N-qudit quantum systems, we start with the maximally entangled state, e.g., |Ψ_0⟩ = 1/√(d)∑_j=0^d-1 |a_j⟩_1...|a_j⟩_N and let nth qudit evolve under the unitary V_n∈ U(d) to acquire the arbitrary sampling state |Ψ_E⟩ = ⊗_n=1^N V_n |Ψ_0⟩. We focus on the density-matrix elements ρ^(N)_𝒮,𝒮^' satisfying a_n ≠ a_n^' for all n since such elements imply the coherence information among all particles. Therefore, we can get the mean precision of N-qudit characterization:
Δ^2_N,d = _V_n ∈ U_n(d)δ^2 ρ^(N)∏_n=1^N dμ_d(V_n),
where δ^2 ρ^(N) = 2^N-1/d^N(d-1)^N∑_∀ n, a_n≠ a_n^'{δ^2 Re[ρ^(N)_𝒮,𝒮^'] + δ^2 Im[ρ^(N)_𝒮,𝒮^']}.
Experiment.–The experimental setup for the preparation and direct characterization of single-qutrit states ρ_T is shown in Fig. <ref> (B). The heralded single photons generated in module (A) input S1 port and sequentially pass through a half-wave plate (HWP), a quarter-wave plate (QWP) and a polarizer to initialize the polarization to the horizontal state |H⟩. By referring to the optical paths {up, middle, bottom} as basis {|0⟩, |1⟩, |2⟩}, we prepare the pure qutrit state |ψ_T⟩ = cos 2θ_1 cos 2θ_2 |0⟩ + cos2θ_1sin 2θ_2e^iϕ_2 |1⟩ + sin 2θ_1e^i(ϕ_1+ϕ_2) |2⟩ with the HWPs at θ_1, θ_2 and the phase retarders (PRs) at ϕ_1, ϕ_2 realizing polarization transformation as well as the polarizing beam displacers (PBDs) implementing beam splitting <cit.>. Additionally, the mixed states can be obtained by probabilistic mixture of specific pure states <cit.>. In the two boxes labelled `Ĥ_a,a^'', we perform the Hadamard transformations of qutrits Ĥ_a,a^' with the realization shown in blow dotted blocks <cit.>. After the first Hadamard transformation, we initialize the polarization of photons at all paths to |H⟩ as the MS. The interaction Hamiltonian Ĥ=gδ(t-t_0) Ô_a,a^'⊗σ̂_y is realized by rotating the HWPs at the path a (a^') to g/2 (-g/2) degrees. Given that both the Hadamard transformation and the post-selection on QS are commutable with the measurement of the MS, we first perform projective measurements on the MS with the combination of a QWP, a HWP and a polarizer. After the second Hadamard transformation, the distribution of photons at detectors D1, D2 and D3 are collected for the post-selection of the QS.
In Fig. <ref> (C), we directly characterize the arbitrary two-photon entangled states ρ_E by inputting two photons into S1 and S2 ports, respectively. Both photons undergo two identical setups in the dotted box `(M)' but the configuration depends on the density-matrix element of interest. Here, the polarization degree of freedom of photons is referred to as the QS. The first group of a QWP, a HWP and a QWP is used for compensating the polarization changes in fiber transmission <cit.>. Then, the arbitrary unitary transformation Û_1(2) on the polarization is realized with a group of a QWP, a HWP and a QWP <cit.>. The subsequent HWP (as well as the last HWP) at 22.5^∘ implements the Hadamard transformation on the polarization qubit. To facilitate the coupling between the QS and the MS, we transform the polarization information of photons to the path information through a PBD and the polarization of photons is used as the MS. The coupling operation and measurements on the MS are in analogy to the single-qutrit experiment. The coincidence rates, such as D4&D6, D4&D7, D5&D6 and D5&D7, are collected for the corresponding post-selection.
Results.–The directly measured density-matrix elements of qutrit states during the unitary and dephasing processes are shown in Fig. <ref> (A) and (B), respectively. In the unitary evolution, we set the parameters θ_1 = arcsin(√(1/3))/2, θ_2 = π/8, ϕ_1 = ϕ_2 + π/3 and vary ϕ_2 from π/3 to 4π/3. By mixing specific pure states with different probability distribution, we equivalently let an original state ρ_T,0 with ϕ_2 = 2π/3 undergo the dephasing process 𝒩(|a⟩⟨ a^'|) = γ |a⟩⟨ a^' |, in which the off-diagonal elements are decreased to γ⟨ a|ρ_T,0|a^'⟩ <cit.>. In direct characterization of two-qubit systems, the two-photon entangled state ρ_E = |ψ_E⟩⟨ψ_E| is prepared by evolving one of the bell states |ψ_b⟩ = (|H⟩|V⟩ + |V⟩|H⟩) /√(2) under the composed unitary Û_1(2)⊗Û_2(2) with Û_n(2) = [ cos 2θ_n e^-iϕ_n1 -sin 2θ_n e^iϕ_n1; sin 2θ_n e^-iϕ_n2 cos 2θ_n e^iϕ_n1 ]. In Fig. <ref> (C), we illustrate the measured anti-diagonal elements of the density matrix ⟨ 00|ρ_E|11⟩ and ⟨ 01|ρ_E|10⟩ with the parameters θ_11 = π/8, θ_21=ϕ_21=ϕ_22 = 0, ϕ_12 = ϕ_11+π/4 and varying ϕ_11 from 0 to π. In the following, the original state |ψ_E,0⟩ with ϕ_11=π/3 is chosen to evolve under the dephasing process 𝒩(|𝒮⟩⟨𝒮^'|) = γ |𝒮⟩⟨𝒮^'| realized by appropriately mixing certain unitary operations Û_1(2) and Û_2(2) <cit.>. The experimental results of anti-diagonal elements ⟨ 00|ρ_E|11⟩ and ⟨ 01|ρ_E|10⟩ in dephasing process are shown in Fig. <ref> (D). The error bars are smaller than the data points.
In Fig. <ref>, the precision of the RES and that of sequential scheme are compared with different coupling strength g. By assuming the total number of single photons or photon pairs per unit time n_t subjecting to Poisson distribution, we theoretically derive the mean precision of direct characterization with single copy of state n_tΔ^2_T and n_tΔ^2_E for qutrit states and two-photon entangled states, respectively <cit.>. In the experiment, we randomly generate one hundred single-qutrit states |ψ_T⟩ = Û(3)|0⟩ or two-photon polarization states |ψ_E⟩ with the unitary operators Û(3), Û_1(2) and Û_2(2) sampled according to Harr measure. The experimental precision are obtained from the Monte Carlo simulation based on the raw data. The results show that the precision of both direct characterization schemes is improved with stronger coupling strength g. The optimal precision of the RES in characterizing both qutrits (g=π/4, n_tΔ^2_T = 0.125) and entangled states (g=π/4, n_tΔ^2_E = 0.208) is overall better than that of the sequential schemes with qutrits (g=π/2, n_tΔ^2_T = 0.708) and entangled states (g=π/2, n_tΔ^2_E = 0.458).
Discussion and conclusions.–From the insets (a) to (d) of Fig. <ref>, the statistical errors are non divergent confirming the feasibility of our scheme in characterizing the arbitrary quantum states. In weak-measurement scenario (i.e., g→ 0), the precision of the RES is several orders of magnitude better than that of sequential schemes with the ratio following g^2N for N-qudit systems. This advantage endows our scheme with better potential in studying weak-measurement problems, e.g., share of non-locality <cit.>, error-disturbance relationship <cit.> and etc <cit.>. With the qubit meter states used for the direct characterization of N-qudit systems, 2^2N or 2^3N projective measurements are typically performed for the resource-efficient or sequential schemes, respectively. Provided that the efficiency of direct characterization schemes is quantitatively compared by counting the total number of photons (or the equivalent time consumption) to achieve the same precision, the mean efficiency of the optimal RES is 11.3 or 8.8 times higher than that of the optimized sequential schemes for qutrit states or two-photon states, respectively.
In conclusion, we propose a RES which can be practically used to directly characterize the density matrix of general multi-qudit quantum systems. Compared to the multiple coupling operations in sequential schemes, our protocol only requires one coupling process to measure an efficient observable for each qudit in extracting a specific density-matrix element. We experimentally demonstrate the advantages of the RES over sequential schemes by directly characterizing single-qutrit states and two-photon entangled states with fewer measurements and better precision. These advantages will be significantly enhanced as the particle number increases in weak coupling scenario. When both the resource-efficient and sequential schemes are optimized in terms of precision over the coupling strength, the former scheme still demonstrates the efficiency advantage over the latter by about an order of magnitude. Our work provides a promising approach for the characterization and exploration of large-scale quantum systems with broad extension from integrated photonic chip to other physical systems.
This work was supported by China Postdoctoral Science Foundation (Grants No. 2022M722918, No. 2021M702976, No. 2020TQ0297 and No. 2020M681949), International Postdoctoral Exchange Fellowship Program 2022 (Grant No. PC2022049), National Natural Science Foundation of China (Grants No. 12204437, No. 61975077, No. 12075245, No. 12247105 and No. 92265114), the Center initiated Research Project of Zhejiang Lab (Grant No. 2021MB0AL01), the Natural Science Foundation of Hunan Province (Grant No. 2021JJ10033), Xiaoxiang Scholars Project of Hunan Normal university, the National Key Research and Development Program of China (Grants No. 2018YFA0306202 and No. 2019YFA0308704) and Fundamental Research Funds for the Central Universities (Grant No. 020414380175).
48
fxundefined [1]
ifx#1
fnum [1]
#1firstoftwo
secondoftwo
fx [1]
#1firstoftwo
secondoftwo
noop [0]secondoftwo
ref[1]@startlink#1@href
href[1]#1@endlink
anitize@url [0]`
12`$12`&12`#12`1̂2`_12`%12
startlink[1]
endlink[0]
rl [1]href #1
@bib@innerbibempty
[Horodecki et al.(2009)Horodecki, Horodecki, Horodecki, and Horodecki]horodecki2009quantum
author author R. Horodecki, author P. Horodecki, author M. Horodecki, and author K. Horodecki, @noop journal journal
Rev. Mod. Phys. volume 81, pages 865
(year 2009)NoStop
[Modi et al.(2010)Modi,
Paterek, Son, Vedral, and Williamson]modi2010unified
author author K. Modi, author T. Paterek,
author W. Son, author
V. Vedral, and author
M. Williamson, @noop journal journal Phys. Rev. Lett. volume 104, pages 080501 (year
2010)NoStop
[Streltsov et al.(2017)Streltsov, Adesso, and Plenio]streltsov2017colloquium
author author A. Streltsov, author G. Adesso, and author M. B. Plenio, @noop journal journal Rev. Mod. Phys. volume 89, pages 041003 (year 2017)NoStop
[Degen et al.(2017)Degen,
Reinhard, and Cappellaro]degen2017quantum
author author C. L. Degen, author F. Reinhard, and author P. Cappellaro, @noop journal journal Rev. Mod. Phys. volume 89, pages 035002 (year 2017)NoStop
[Braun et al.(2018)Braun,
Adesso, Benatti, Floreanini,
Marzolino, Mitchell, and Pirandola]braun2018quantum
author author D. Braun, author G. Adesso,
author F. Benatti, author R. Floreanini, author
U. Marzolino, author
M. W. Mitchell, and author
S. Pirandola, @noop journal journal Rev. Mod. Phys. volume
90, pages 035006 (year 2018)NoStop
[Giovannetti et al.(2011)Giovannetti, Lloyd, and Maccone]giovannetti2011advances
author author V. Giovannetti, author S. Lloyd, and author L. Maccone, @noop journal journal Nat. Photon. volume 5, pages 222 (year
2011)NoStop
[Vidrighin et al.(2014)Vidrighin, Donati, Genoni, Jin, Kolthammer, Kim, Datta, Barbieri, and Walmsley]vidrighin2014joint
author author M. D. Vidrighin, author G. Donati,
author M. G. Genoni, author X.-M. Jin, author
W. S. Kolthammer, author
M. Kim, author A. Datta, author M. Barbieri, and author I. A. Walmsley, @noop journal
journal Nat. Commun. volume 5, pages 1 (year 2014)NoStop
[Wootters and Fields(1989)]wootters1989optimal
author author W. K. Wootters and author B. D. Fields, @noop journal journal Ann.
Phys. volume 191, pages 363 (year 1989)NoStop
[Scott and Grassl(2010)]scott2010symmetric
author author A. J. Scott and author M. Grassl, @noop journal journal J. Math. Phys. volume 51, pages 042203 (year 2010)NoStop
[Bent et al.(2015)Bent,
Qassim, Tahir, Sych,
Leuchs, Sánchez-Soto, Karimi, and Boyd]bent2015experimental
author author N. Bent, author H. Qassim,
author A. Tahir, author D. Sych, author
G. Leuchs, author L. L. Sánchez-Soto, author E. Karimi, and author R. Boyd, @noop journal journal Phys. Rev. X volume 5, pages
041006 (year 2015)NoStop
[Banchi et al.(2018)Banchi,
Kolthammer, and Kim]banchi2018multiphoton
author author L. Banchi, author W. S. Kolthammer, and author M. Kim, @noop journal journal Phys.
Rev. Lett. volume 121, pages 250402
(year 2018)NoStop
[Zhao et al.(2021)Zhao,
Rubin, and Miyake]zhao2021fermionic
author author A. Zhao, author N. C. Rubin, and author A. Miyake, @noop journal journal Phys. Rev. Lett. volume 127, pages 110504 (year 2021)NoStop
[Friis et al.(2019)Friis,
Vitagliano, Malik, and Huber]friis2019entanglement
author author N. Friis, author G. Vitagliano,
author M. Malik, and author M. Huber, @noop
journal journal Nat. Rev. Phys. volume 1, pages 72 (year
2019)NoStop
[Wu et al.(2021)Wu,
Streltsov, Regula, Xiang,
Li, and Guo]wu2021experimental
author author K.-D. Wu, author A. Streltsov,
author B. Regula, author G.-Y. Xiang, author
C.-F. Li, and author
G.-C. Guo, @noop journal journal Adv. Quantum Technol. volume 4, pages 2100040 (year
2021)NoStop
[Lundeen et al.(2011)Lundeen, Sutherland, Patel, Stewart, and Bamber]lundeen2011direct
author author J. S. Lundeen, author B. Sutherland,
author A. Patel, author C. Stewart, and author
C. Bamber, @noop journal journal Nature volume 474, pages 188 (year 2011)NoStop
[Mirhosseini et al.(2014)Mirhosseini, Magaña-Loaiza, Rafsanjani, and Boyd]mirhosseini2014compressive
author author M. Mirhosseini, author O. S. Magaña-Loaiza, author S. M. H. Rafsanjani, and author R. W. Boyd, @noop journal journal Phys. Rev. Lett. volume 113, pages 090402 (year 2014)NoStop
[Malik et al.(2014)Malik,
Mirhosseini, Lavery, Leach,
Padgett, and Boyd]malik2014direct
author author M. Malik, author M. Mirhosseini,
author M. P. Lavery, author J. Leach, author
M. J. Padgett, and author
R. W. Boyd, @noop journal journal Nat. Commun. volume
5, pages 1 (year 2014)NoStop
[Fischbach and Freyberger(2012)]fischbach2012quantum
author author J. Fischbach and author M. Freyberger, @noop journal journal
Phys. Rev. A volume 86, pages 052110
(year 2012)NoStop
[Bolduc et al.(2016)Bolduc,
Gariepy, and Leach]bolduc2016direct
author author E. Bolduc, author G. Gariepy, and author J. Leach, @noop journal journal Nat. Commun. volume 7, pages 1 (year
2016)NoStop
[Shi et al.(2015)Shi,
Mirhosseini, Margiewicz, Malik, Rivera, Zhu, and Boyd]shi2015scan
author author Z. Shi, author M. Mirhosseini,
author J. Margiewicz, author M. Malik, author
F. Rivera, author Z. Zhu, and author R. W. Boyd, @noop journal journal Optica volume 2, pages 388
(year 2015)NoStop
[Pan et al.(2019)Pan,
Xu, Kedem, Wang,
Chen, Jan, Sun, Xu, Han, Li et al.]pan2019direct
author author W.-W. Pan, author X.-Y. Xu,
author Y. Kedem, author Q.-Q. Wang, author
Z. Chen, author M. Jan, author K. Sun, author J.-S. Xu,
author Y.-J. Han, author C.-F. Li, et al., @noop journal journal Phys. Rev. Lett. volume 123, pages 150402 (year 2019)NoStop
[Lundeen and Bamber(2012)]lundeen2012procedure
author author J. S. Lundeen and author C. Bamber, @noop journal journal Phys.
Rev. Lett. volume 108, pages 070402
(year 2012)NoStop
[Salvail et al.(2013)Salvail, Agnew, Johnson, Bolduc, Leach, and Boyd]salvail2013full
author author J. Z. Salvail, author M. Agnew,
author A. S. Johnson, author E. Bolduc, author
J. Leach, and author
R. W. Boyd, @noop journal journal Nat. Photon. volume
7, pages 316 (year 2013)NoStop
[Bamber and Lundeen(2014)]bamber2014observing
author author C. Bamber and author J. S. Lundeen, @noop journal journal
Physical Review Letters volume 112, pages 070405 (year 2014)NoStop
[Wu(2013)]wu2013state
author author S. Wu, @noop journal journal Sci.
Rep. volume 3, pages 1 (year 2013)NoStop
[Dirac(1945)]dirac1945analogy
author author P. A. M. Dirac, @noop journal journal Rev. Mod. Phys. volume 17, pages 195 (year 1945)NoStop
[Thekkadath et al.(2016)Thekkadath, Giner, Chalich, Horton, Banker, and Lundeen]thekkadath2016direct
author author G. S. Thekkadath, author L. Giner,
author Y. Chalich, author M. J. Horton, author
J. Banker, and author
J. S. Lundeen, @noop journal journal Phys. Rev. Lett. volume 117, pages 120401 (year
2016)NoStop
[Martinez-Becerril et al.(2021)Martinez-Becerril, Bussières, Curic,
Giner, Abrahao, and Lundeen]martinez2021theory
author author A. C. Martinez-Becerril, author G. Bussières, author D. Curic, author L. Giner,
author R. A. Abrahao, and author J. S. Lundeen, @noop journal journal Quantum volume 5, pages 599 (year
2021)NoStop
[Kim et al.(2018)Kim,
Kim, Lee, Han, Moon, Kim, and Cho]kim2018direct
author author Y. Kim, author Y.-S. Kim,
author S.-Y. Lee, author S.-W. Han, author
S. Moon, author Y.-H. Kim, and author Y.-W. Cho, @noop journal journal Nat. Commun. volume 9, pages
1 (year 2018)NoStop
[Xu et al.(2021a)Xu, Xu, Jiang, Xu,
Zheng, Wang, Zhang, and Zhang]xu2021direct_PRL
author author L. Xu, author H. Xu, author T. Jiang, author
F. Xu, author K. Zheng, author B. Wang, author A. Zhang, and author L. Zhang, @noop journal journal Phys. Rev. Lett. volume 127, pages 180401 (year 2021a)NoStop
[Xu et al.(2021b)Xu, Xu, Xie, Li,
Zhou, Xu, and Zhang]xu2021direct_AP
author author L. Xu, author H. Xu, author J. Xie, author
H. Li, author L. Zhou, author F. Xu, and author L. Zhang, @noop journal journal Adv. Photon. volume 3, pages 066001 (year
2021b)NoStop
[Ren et al.(2019)Ren,
Wang, and Du]ren2019efficient
author author C. Ren, author Y. Wang, and author J. Du, @noop
journal journal Phys. Rev. Appl. volume 12, pages 014045 (year
2019)NoStop
[Zhou et al.(2021)Zhou,
Zhao, Hay, McGonagle,
Boyd, and Shi]zhou2021direct
author author Y. Zhou, author J. Zhao, author D. Hay, author
K. McGonagle, author
R. W. Boyd, and author
Z. Shi, @noop journal journal Phys. Rev. Lett. volume 127, pages 040402 (year
2021)NoStop
[Chen et al.(2021)Chen,
Li, Liu, Wu, Su, Wang, Li, Liu,
Lu, and Pan]chen2021directly
author author M.-C. Chen, author Y. Li, author R.-Z. Liu, author
D. Wu, author Z.-E. Su, author X.-L. Wang, author L. Li, author N.-L. Liu,
author C.-Y. Lu, and author J.-W. Pan, @noop
journal journal Phys. Rev. Lett. volume 127, pages 030402 (year
2021)NoStop
[Maccone and Rusconi(2014)]maccone2014state
author author L. Maccone and author C. C. Rusconi, @noop journal journal Phys.
Rev. A volume 89, pages 022122
(year 2014)NoStop
[Gross et al.(2015)Gross,
Dangniam, Ferrie, and Caves]gross2015novelty
author author J. A. Gross, author N. Dangniam,
author C. Ferrie, and author C. M. Caves, @noop
journal journal Phys. Rev. A volume 92, pages 062133 (year
2015)NoStop
[Zhu et al.(2016)Zhu,
Zhang, and Wu]zhu2016direct
author author X. Zhu, author Y.-X. Zhang, and author S. Wu, @noop
journal journal Physical Review A volume 93, pages 062304 (year
2016)NoStop
[Vallone and Dequal(2016)]vallone2016strong
author author G. Vallone and author D. Dequal, @noop journal journal Phys.
Rev. Lett. volume 116, pages 040502
(year 2016)NoStop
[Calderaro et al.(2018)Calderaro, Foletto, Dequal, Villoresi, and Vallone]calderaro2018direct
author author L. Calderaro, author G. Foletto,
author D. Dequal, author P. Villoresi, and author G. Vallone, @noop
journal journal Phys. Rev. Lett. volume 121, pages 230501 (year
2018)NoStop
[Zhang et al.(2020)Zhang,
Hu, Hou, Tang, Zhu, Xiang, Li, Guo, and Zhang]zhang2020direct
author author C.-R. Zhang, author M.-J. Hu,
author Z.-B. Hou, author J.-F. Tang, author
J. Zhu, author G.-Y. Xiang, author C.-F. Li, author G.-C. Guo, and author Y.-S. Zhang, @noop journal journal Phys.
Rev. A volume 101, pages 012119
(year 2020)NoStop
[ODS()]ODST_supplementary
@noop note Supplementary MaterialsNoStop
[Shao-Kai et al.(2007)Shao-Kai, Ji-Gang, Cheng-Zhi, Shuo, and Xiang-Bin]shao2007realization
author author W. Shao-Kai, author R. Ji-Gang,
author P. Cheng-Zhi, author J. Shuo, and author
W. Xiang-Bin, @noop journal journal Chin. Phys. Lett. volume 24, pages 2471 (year
2007)NoStop
[Simon and Mukunda(1989)]simon1989universal
author author R. Simon and author N. Mukunda, @noop journal journal Phys.
Lett. A volume 138, pages 474
(year 1989)NoStop
[Simon and Mukunda(1990)]simon1990minimal
author author R. Simon and author N. Mukunda, @noop journal journal Phys.
Lett. A volume 143, pages 165
(year 1990)NoStop
[Hu et al.(2018)Hu,
Zhou, Hu, Li, Guo, and Zhang]hu2018observation
author author M.-J. Hu, author Z.-Y. Zhou,
author X.-M. Hu, author C.-F. Li, author
G.-C. Guo, and author
Y.-S. Zhang, @noop journal journal npj Quantum Inform. volume 4, pages 63 (year 2018)NoStop
[Mao et al.(2019)Mao,
Ma, Jin, Sun, Fei, Zhang, Fan, and Pan]mao2019error
author author Y.-L. Mao, author Z.-H. Ma,
author R.-B. Jin, author Q.-C. Sun, author
S.-M. Fei, author Q. Zhang, author J. Fan, and author J.-W. Pan, @noop journal journal Phys. Rev. Lett. volume 122, pages 090404 (year 2019)NoStop
[Blok et al.(2014)Blok,
Bonato, Markham, Twitchen,
Dobrovitski, and Hanson]blok2014manipulating
author author M. Blok, author C. Bonato,
author M. Markham, author D. Twitchen, author
V. Dobrovitski, and author
R. Hanson, @noop journal journal Nat. Phys. volume
10, pages 189 (year 2014)NoStop
[Kim et al.(2012)Kim,
Lee, Kwon, and Kim]kim2012protecting
author author Y.-S. Kim, author J.-C. Lee,
author O. Kwon, and author Y.-H. Kim, @noop
journal journal Nat. Phys. volume 8, pages 117 (year 2012)NoStop
|
http://arxiv.org/abs/2303.07004v1
|
20230313110126
|
Incommensurable matter-wave jets in quasi-1D geometry
|
[
"Tadej Mežnaršič",
"Rok Žitko",
"Katja Gosar",
"Katja Arh",
"Matevž Jug",
"Erik Zupanič",
"Peter Jeglič"
] |
cond-mat.quant-gas
|
[
"cond-mat.quant-gas",
"nlin.PS",
"physics.atom-ph",
"quant-ph"
] |
[][email protected]
Jožef Stefan Institute, Jamova 39, SI-1000 Ljubljana, Slovenia
Jožef Stefan Institute, Jamova 39, SI-1000 Ljubljana, Slovenia
Jožef Stefan Institute, Jamova 39, SI-1000 Ljubljana, Slovenia
Faculty of mathematics and physics, University of Ljubljana, Jadranska 19, SI-1000 Ljubljana, Slovenia
Jožef Stefan Institute, Jamova 39, SI-1000 Ljubljana, Slovenia
Faculty of mathematics and physics, University of Ljubljana, Jadranska 19, SI-1000 Ljubljana, Slovenia
Jožef Stefan Institute, Jamova 39, SI-1000 Ljubljana, Slovenia
Faculty of mathematics and physics, University of Ljubljana, Jadranska 19, SI-1000 Ljubljana, Slovenia
Jožef Stefan Institute, Jamova 39, SI-1000 Ljubljana, Slovenia
[][email protected]
Jožef Stefan Institute, Jamova 39, SI-1000 Ljubljana, Slovenia
We experimentally show spontaneous formation of incommensurable “golden” 1+√(5)/2 matter-wave jets in a Bose-Einstein condensate (BEC) subjected to single frequency interaction modulation.
We study the formation of higher order jets and corresponding incommensurable density waves in quasi one dimensional (1D) geometry with the help of numerical 1D Gross-Pitaevskii equation simulation.
We explore the process of jet formation for a large range of modulation amplitudes and frequencies and present a phase diagram for jet formation.
Incommensurable matter-wave jets in quasi-1D geometry
Peter Jeglič
March 30, 2023
=====================================================
Incommensurability is encountered aperiodic crystals with incommensurable phases <cit.>, charge and spin structures <cit.>, twisted moiré bilayer experiments <cit.> with Hofstadter butterfly energy structure <cit.> and surface layers <cit.>.
In the context of cold atoms, incommensurable optical lattices have been used to study wavefunction localization phenomena in disordered potentials within the Aubry-André model <cit.>.
In this Letter we experimentally show spontaneous formation of incommensurable density waves inside a BEC confined in a quasi one-dimensional (1D) potential evidenced via the emission of matter-wave jets.
Previous studies of matter-wave jets in two dimensions have revealed the formation of density waves inside the condensate prior to the emission of jets and explained the process of formation of higher-order jets <cit.>.
We expand on our previous experiments with matter-wave jets in a quasi-1D potential <cit.> by experimentally and numerically exploring the formation of incommensurable “golden” jets and other higher-order jets in a quasi-1D BEC under a single-frequency interaction modulation.
We start by preparing a BEC in a crossed dipole trap, from which we release it into a channel with radial frequency ω_r = [2π· 90]Hz.
Simultaneously, we change the interaction between the atoms to a_dc close to zero via a Feshbach resonance <cit.>.
To induce the emission of matter-wave jets, we modulate the magnetic field and therefore the interaction between the atoms as a(t) = a_dc + a_acsin (ω t) for time t_p, where a_ac and ω are the amplitude and the frequency of the modulation, respectively <cit.>.
We leave them to evolve for t_e in the channel and then take an absorption picture after a [15]ms time-of-flight.
In addition to previously observed jets of first (J1) and second order (J2) <cit.>, we observe two pairs of jets with dimensionless velocities
u_G2 = v_G2/v_0 = ±1±√(5)/2,
where v_0 = √(ħω / m) is the velocity of the first-order jets (J1), ħ is the reduced Planck constant, and m is the mass of an atom.
We name these “golden jets” (G2) for their golden ratio relative velocities.
The irrational velocity ratio between first order and golden jets implies the existence of two incommensurable density waves inside the condensate prior to jet emission.
Fig. <ref>(a) shows three experimental realizations of golden jets.
Their origin can be understood from the conservation of energy
mv_1^2/2 + mv_2^2/2 + ħω = mv_1^' 2/2 + mv_2^' 2/2, and momentum: mv_1 + mv_2 = mv_1^' + mv_2^',
where v_i (v_i^') are the initial (final) velocities of the atoms.
A pair of atoms in J1 is formed from a pair of colliding atoms from the original condensate (J0) by absorbing one quantum of energy from the modulating magnetic field.
Similarly, a pair J0-J2 forms from a pair of J1 atoms with the same velocity and a pair G2-G2 from a pair J0-J1.
In general the final velocities of the resulting jets are
u^'_1,2 = (u_1 + u_2) ±√((u_1-u_2)^2 + 4)/2,
where u_1,2 are the initial velocities of the atom pair.
With each absorbed photon the number of possible jets increases.
By the number of photons that an atom in a jet has absorbed we define the order of the jets: the initial BEC is zeroth order, J1 are first order, J2, G2 and others that form from them are second order and so on, see Fig. <ref>(b) and Table <ref>.
The total number of jets increases as a double exponential with order, going as 1, 3, 11, 109, 11605,, and can be approximately calculated as 1.7949^2^n (from the fit up to n=4, where n is the order).
While J1 and J2 are quite easily observed in the experiment, G2 appear very rarely and we haven't been able to observe jets with relative velocity ±√(2) (D2, the other second order jets).
As can be seen in Fig. <ref>(a) the golden jets are not necessarily symmetric around J0 and change in each experimental run despite the symmetry of involved processes.
We attribute this to the asymmetry in the initial BEC which fluctuates between experimental runs.
To understand why these jets are so difficult to observe we need to consider the Hamiltonian for the jet formation process.
We write it in the rotating frame without the fast varying terms <cit.>
H = ħν∑_𝐪_1,𝐪_2,Δ𝐪(
a_𝐪_1 + Δ𝐪^† a_𝐪_2 - Δ𝐪^† a_𝐪_1 a_𝐪_2 + h.c.),
where ν = 2πħ a_ac/mV (V is the condensate volume) and a_𝐪 (a_𝐪^†) is the annihilation (creation) operator of an atom with momentum ħ𝐪.
The Hamiltonian takes into account only resonant terms, assumes photon operators to be C-numbers and the condensate to be non-depleting (Bogoliubov approx.) (see <cit.>).
We can approximate the initial time evolution of jets with momentum ħ𝐪 by taking the first non-zero derivative
n_𝐪^(j) = (i/ħ) [H,n_𝐪^(j-1)]
, n_𝐪^(1) = (i/ħ) [H,n_𝐪]
of the expected value of its number operator
⟨ n_𝐪|=⟩⟨ a_𝐪^† a_𝐪|$⟩, wherejis the order of the derivative.
The results for the first and second order jets are presented in Table <ref>.
For a realistic experimental valueN_0=4000it is clear that G2 grows much slower than J1 and J2, with D2 even farther behind.
Due to the rarity of golden jets in the experiments we turn to numerical simulations of 1D Gross-Pitaevskii equation (GPE) to better understand the conditions for their formation.
Like in our previous work <cit.>, we start with a soliton as the initial state and modulate the interaction parameterk(t) = k_dc+k_acsin(ωt)for a timet_p = 8πwith different frequenciesωand amplitudesk_ac.
We leave the wavefunction to evolve fort_eand look at the density profilen(x)=|ψ(x)|^2.
In the simulations, timetis given in units1/ω_r,ωin unitsω_r, interatomic interaction ask=Na/a_rand distances in unitsa_r = √(ħ/mω_r).
An example of the final density profile can be seen in Fig. <ref>(a) where all visible jets are marked.
In contrast with the experiment, we observe additional jets of third order J3 and G3 which form from J2-J2 and J1-J2 pairs, respectively (see Table <ref>).
Because J2 are so prominent in the simulations (compared to the experiment) we almost always observe G2, G3, and J3 together.
To quantify the size of jets, we calculate the integrals over a fixed interval around each peak in the density profile, which gives the fraction of the atoms in jets of each order (total integral is normalized,∫|ψ(x)|^2 dx = 1).
The fraction in the central peak J0 only starts decreasing after the threshold amplitude for J1 formation is reached, as can be seen in Fig. <ref>(b).
The J1 first increases steeply with amplitude and then levels out due to J0 depletion and losses to the higher-order processes.
It can be seen that only the first order has a sharp threshold (Fig. <ref>(b)), while the higher orders increase smoothly from zero once the first order exists (Fig. <ref>(c)).
D2 are not observed even in simulations due to the onset of a wide background
at high amplitudes needed to create them (discussed below).
When we combine the integrals for the whole simulated region, we can construct a phase diagram with distinct regions in which different jets are visible, as shown in Fig. <ref>(a).
We declare that a new region begins when the integral for the next jet exceeds 0.002.
We choose this value so that it is smaller than the integral of the jets at high modulation amplitudes and much larger than the noise in the simulation.
As the amplitudek_acincreases, additional jets are enabled and we transition into a new region.
As discussed above the transitions are actually continuous and not discrete, except from the “no jets” to the “J1” region.
Fig. <ref>(b) shows the final profiles for a fixed frequencyω= 12.
The onset of J1, J2 and other jets can be clearly seen as the modulation amplitude increases.
For very high amplitudes the discrete jets start disappearing in the increasingly uniform background of a multitude of higher order jets.
The observed spread from the single momentum mode to a wide momentum distribution resembles the generation of supercontinua in nonlinear optical media, where various instabilities cause an initially narrow frequency spectrum to disperse into a wide continuum <cit.>.
The boundary for the supercontinuum can be determined from the median of the final density profilen(x).
It stays close to zero when we only have discrete jets and when it increases beyond 0.00025 we say that it transitioned into the supercontinuum region (of course the transition is actually gradual, the threshold value was chosen to be above numerical noise and visually without separate jets.
The threshold boundary for J1 formation is proportional toω^1/2, as previously reported <cit.>.
The fits to lower boundaries for J2 and J3 regions also giveω^1/2dependences, while the boundaries for golden jets (G2+G3) and the supercontinuum region go as∼ω^0.8.
To find the reason for the absence of the supercontinuum in the experiment, we must look at what the simulation does not take into account.
As we increase the amplitude in the experiment, the number of atoms in J0 and J1 starts decreasing and the incoherent background between the jets becomes stronger, as seen in Fig. <ref>.
However, these do not appear to be signs of a supercontinuum, but are more likely due to partial collapses of the BEC, evidenced by the decreased total number of atoms observed.
The cause of the collapses are probably the strong attractive interactions the BEC is subjected to during the modulation.
The momentum distribution of the incoherent background also remains of the same width for increasing amplitude and does not increase beyond the position of J2 jets as the supercontinuum would.
Atom losses and increased fraction of incoherent background, formed by the excited atoms that are not part of the jets <cit.>, both absent from the simulation, decrease the effective modulation amplitude preventing the supercontinuum from forming.
In this work we explored the spontaneous formation of higher-order jets inside the BEC in a quasi-1D geometry experimentally and with simulations.
We explain the selectivity of the formation of second order jets and therefore the scarcity of less probable incommensurable modes in the experiment.
Numerically, we explore the jet formation for a wide range of modulation frequencies and amplitudes, resulting in a phase diagram of possible jets, while also uncovering an unexpected supercontinuum region.
The supercontinuum likely arises due to the double-exponential growth of the number of possible modes, while the wavenumber only grows linearly, resulting in a densely populated momentum space.
The supercontinuum is potentially experimentally observable if the three-body losses and the incoherent background could be reduced, by increasing the radial trapping frequency, making the system more 1D.
In multispecies experiments the incommensurable density waves inside one species could be used as a disordered potential for the other species, if the jets are prevented from escaping the trap (provided there exist appropriate Feshbach resonances).
This would eliminate the need for an external disordered potential and even a regular lattice that is usually needed to capture impurities, which act as a source of disorder <cit.>.
We thank Cheng Chin and Matjaž Gomilšek for helpful discussions.
We would also like to thank Samo Beguš and Davorin Kotnik for their help with electronics.
This work was supported by the Slovenian Research Agency (research core Grants No. P1-0125, No. P1-0099 and P1-0416, and research projects No. J2-8191 and No. J2-2514).
apsrev4-2
|
http://arxiv.org/abs/2303.06641v1
|
20230312115202
|
Adaptive Local Adversarial Attacks on 3D Point Clouds for Augmented Reality
|
[
"Weiquan Liu",
"Shijun Zheng",
"Cheng Wang"
] |
cs.CV
|
[
"cs.CV",
"eess.IV"
] |
Introduction
General Boolean Formula Minimization
with QBF SolversThis project has received funding from the European Union’s Horizon 2020 research and innovation program under the Marie Skłodowska-Curie grant agreement No. 860621 and the MICINN project PROOFS
(PID2019-109137GB-C21).
Eduardo Calò10000-0003-3881-8994
Jordi Levy20000-0001-5883-5746
================================================================================================================================================================================================================================================================================
In recent years, with the development of deep learning technology, AR technology has been deeply combined with deep learning, such as 2D and 3D object detection, recognition, and so on <cit.>. In AR, determining the three-dimensional (3D) spatial position of objects in the real world is an important task, which directly affects the user's product experience. To ensure the better superposition of virtual objects on real objects, AR systems have higher requirements for real-time recognition and tracking of objects. AR object recognition and tracking based on deep learning methods (3D deep network) <cit.>, a core technology of augmented reality, has been widely used in the industrial field, providing an intuitive and efficient solution for remote guidance, maintenance, and training <cit.>. However, there is still a great security threat in the actual application process of AR object recognition and tracking based on 3D deep network. If the attacker produces adversarial objects in the real world, it will largely cause the AR system to fail to perceive the real scene normally <cit.>.
The recognition and tracking of the 3D point cloud <cit.> is an important support for the application of AR. AR realizes the perception of the scene by detecting, recognizing, and tracking objects in the real environment, which is the basis for the seamless overlay of virtual objects. However, previous studies <cit.> found that 3D deep network models are vulnerable to adversarial examples, resulting in the models producing erroneous recognition results. For the input 3D point cloud, adversarial examples are generated by adversarial perturbations, which cause the 3D deep network model to predict wrong results. If the 3D network model is attacked by adversarial examples, the 3D recognition and tracking functions of the AR system will not work properly, which is a great risk for AR applications. In 3D point clouds, adversarial attacks are mainly divided into two categories: the digital domain and the physical world.
In the digital domain, adversarial examples are mainly generated by adding points or clusters, removing points, and perturbing points <cit.>. The generated adversarial examples are required to be as close as possible to the original point cloud while maintaining good 3D properties such as smoothness and fairness. At the same time, the adversarial examples should have a high attack success rate on the 3D network model.
In the physical world, 3D adversarial examples need to be constructed in real scenes. For example, adversarial examples generated in the digital are presented in the real world through 3D printing <cit.>, and they are used to attack artificial intelligence systems based on 3D network models. Such reconstructed adversarial examples in the physical world often pose a greater threat to artificial intelligence systems, including AR systems. Therefore, this paper mainly studies how to generate adversarial examples of 3D point clouds, which are crucial for the robustness of 3D network models. The stable recognition and tracking technology of the 3D network model helps to improve the robustness of the AR system.
In general 3D network models, the training and testing samples are often benign, which also leads to the model always making mistakes in recognizing adversarial examples. Therefore, researchers usually add adversarial examples to the training set, and the model learns them while training. This approach can effectively deal with the threat of adversarial examples to the 3D network model <cit.>. We mainly focus on how to generate high-quality 3D point cloud adversarial examples, which are beneficial to improve the security of AR systems. In summary, the better the imperceptibility of the generated adversarial examples, the harder it is for the human eye to perceive.
In this paper, we pay attention to local regions of 3D point clouds rather than the whole point cloud when generating adversarial examples. Compared to attacking the entire point cloud, adversarial examples generated by attacking local regions of the point cloud have better operability in the physical world. Therefore, this paper proposes an adaptive local adversarial attack method (AL-Adv) to generate high-quality adversarial point clouds. First, we introduce the idea of game theory to analyze the 3D network model. Specifically, Shapley value is used to analyze the vulnerability of 3D network models and extract salient regions. Each region uses a Shapley value to represent its importance to the recognition results of the network model. If the saliency of a region is stronger, the 3D network model is more vulnerable in this region. Second, we design an adaptive gradient attack algorithm for salient regions. The attack algorithm adaptively assigns different perturbations to each direction of the 3D coordinates according to the gradient of the point cloud. To verify the effectiveness of the generated adversarial examples, the proposed AL-Adv is compared with several popular adversarial attack methods. Experimental results show that the proposed AL-Adv has a higher attack success rate than other global adversarial attack methods.
The main contributions of this work can be expressed as follows:
* Existing adversarial attack methods mainly focus on the global point cloud, while our proposed AL-Adv method pays more attention to the local regions of the point cloud.
* To obtain higher-quality 3D adversarial point clouds, we design a novel adaptive gradient attack algorithm for local regions.
* The proposed method AL-Adv achieves a higher attack success rate in local regions compared to existing global adversarial attack methods.
§ RELATED WORKS
At present, the object recognition and tracking methods used in AR systems are mainly divided into two categories: 2D recognition and 3D recognition. This paper mainly focuses on the impact of 3D point cloud object recognition and tracking methods on AR systems. Therefore, this section presents the related works of adversarial attacks on 3D point clouds, both in the digital domain and in the physical world.
§.§ Digital adversarial attack
In images, samples obtained by applying adversarial perturbations to the input image cause the deep network model to produce incorrect predictions, such samples are called adversarial examples<cit.>. For images, many methods of generating adversarial examples have emerged <cit.>. When generating adversarial examples, the goal is to achieve a high attack success rate while making them imperceptible to the human eye. Distance constraints are usually used in this process to limit the generation of adversarial examples. In 3D point clouds, many adversarial attack methods are extended from images <cit.>. The most common way to generate 3D point cloud adversarial examples is to perturb, remove, and add points to the input point cloud. For example, Xiang et al.<cit.> perturbed the entire point cloud so that the points of the point cloud deviate from the original position to deceive the 3D network model. In addition, point clusters or objects with shapes (such as planes, balls, etc.) are added to the input point cloud to generate adversarial point clouds. Zheng et al. <cit.> proposed a new adversarial attack method by removing points from the input point cloud to generate adversarial examples. First, the method generated a saliency map of the input point cloud through the gradient, which represented the contribution of each point to the model prediction result. Therefore, the corresponding point removal algorithm was designed for the highly significant points to generate adversarial examples effectively. As the number of removed points increases, the recognition results of the 3D network model were decreased. To ensure the correct working of the 3D network model, the operation of point removal was equivalent to moving the point to the centroid of the point cloud. To enhance the transferability of adversarial examples and make them more difficult to defend, Hamdi et al. <cit.> proposed a data-driven adversarial attack method. This method designed a new loss function to perturb the input point cloud.
Using an optimized method to generate adversarial examples is another important way by designing the objective function of adversarial attacks. Kim et al. <cit.> proposed a unified adversarial point cloud generation formulation to obtain better imperceptible adversarial point clouds with minimal manipulation points. This method unifies the two adversarial point cloud generation methods of perturbed points and added points, and used distance constraint and point number constraint when generating adversarial examples. To avoid obvious outliers in adversarial examples and maintain the basic properties of 3D objects, Wen et al. <cit.> designed a novel geometry-aware objective function to generate adversarial point clouds. Then based on this geometry-aware objective function, an optimization-based adversarial attack method was implemented by regularizing the adversarial loss. The generated adversarial point cloud was more harmful to the 3D network model and harder to defend. However, Huang et al. <cit.> argued that 3D point clouds were highly structured data, and it was difficult to use simple constraints to limit perturbations. Therefore, the method transformed the original point cloud into a new coordinate system and constrains the movement of points within the tangent plane. In addition, the method used gradients in the new coordinate system to find the best attack direction and built a saliency map of the point cloud.
§.§ Physical adversarial attack
Currently, for the 3D point cloud, the digital adversarial attack is the main research direction, and there is less work on the adversarial attack in the physical world. There are three categories of existing adversarial attacks in the physical world. The first category is to generate high-quality adversarial examples with a high attack success rate through digital simulation, and then use 3D printing technology to reconstruct the adversarial object in the real world. For example, Wen et al. <cit.> first used an adversarial attack method to generate adversarial point clouds and convert the adversarial point clouds into meshes. The reconstructed adversarial meshes were then produced in the real world using 3D printing. Finally, the printed real objects were rescanned into point clouds for testing the performance of the 3D network model. The second category is to implement adversarial attacks in point cloud data scanned in real scenes. For example, Tu et al. <cit.> proposed an adversarial attack method to generate adversarial objects of different geometries. Placing these adversarial objects on top of the car's point cloud can fool the LiDAR, causing the 3D object recognition network to fail to detect the car. The third category is the realization of adversarial attacks in the physical world, leading to the failure of LiDAR. Zhu et al. <cit.> proposed an adversarial attack framework for finding attack locations in the real world. Placing any object with a reflective surface, such as a commercial drone, at these attack positions makes the target object invisible to the LiDAR. This attack method posed a very large threat to autonomous driving systems in the real world.
§ METHOD
§.§ Vulnerability Analysis of 3D Network Models
§.§.§ Shapley value
We are more concerned with the effect of local regions of the point cloud on the output of the network model than the global structure of the point cloud. We introduce how the Shapley value is applied to the vulnerability analysis of 3D network models. The Shapley value is a reasonable method used in game theory <cit.> to address the distribution of cooperative benefits. Supposing there are multiple players participating in the game, and different players will get different rewards. In the whole game process, multiple players cooperate to obtain the maximum reward, some players contribute greatly to the final reward, and some players contribute less. The Shapley value is used to reasonably distribute rewards to each player to ensure fairness.
§.§.§ Shapley value for 3D network models
In this paper, the Shapley value is used to analyze the vulnerability of 3D network models. Specifically, we take the 3D network model as the game, divide the input point cloud into m regions, that is, m players, and the output of the 3D network model is used as a reward. We use the Shapley value to fairly assign rewards to these m regions. If a region plays a more important role in the output of the network model, it is assigned a higher reward. Conversely, if a region contributes less to the output of the network model, then it also receives less reward.
For an input point cloud x, we divide it into m regions, denoted as x=(a_1,a_2,···,a_k,···,a_m), and a_i represents the i-th region. Then for the input point cloud x, the set of all players is represented as M={1, 2, ..., m}. Given a trained 3D network model, its output is denoted as g(·). Assuming that S∈ M is a set of some of these players, the rewards obtained by players in the set S when they participate in the game are denoted as g(S). Therefore, the Shapley value of the i-th region of the input point cloud is represented as ϕ(i).
ϕ(i)=∑_S ⊆ M ∖{i}|S| !(m-|S|-1) !/m !(g(S ∪{i})-g(S)).
In detail, ϕ(i) represents the importance of the i-th region of the input point cloud to the recognition result of the 3D network model. The higher the value of ϕ(i), the more important the i-th region is to the recognition result of the network model. Therefore, each region is assigned a salient value using the Shapley value, which indicates how important the region is to the output of the network model. That is to say, the higher the salient value of a region, the greater the effect of the region on the recognition results of the model. For 3D network models, regions with higher salient values are more vulnerable.
The Shapley value is used to analyze the vulnerability of the 3D point cloud deep network model and extract the salient regions of the point cloud, as shown in <ref>.
§.§ Generating Adversarial Point Clouds
Untargeted Adversarial Attacks. In this paper, we focus on untargeted attacks on 3D network models. For a point cloud x ∈ R^(n × 3)containing n points, its ground-truth label is y. The 3D network model f can correctly identify x, that is, f(x)=y. Our goal is to find a point cloud x', which makes the recognition result of the 3D network model f wrong, that is, f(x')≠ y. Furthermore, in the process of generating x', it should be ensured that x and x' are as similar as possible. Such x' is called an adversarial example and can be expressed as follows:
min D(x, x^') s.t. f(x^')≠ y ,
where D represents a disturbance metric between x and x', such as a distance metric. The generated adversarial point cloud is forced to be closer to the original point cloud by minimizing the metric D. A smaller value of the metric D indicates that the adversarial point cloud x' is closer to the original point cloud x and more difficult to distinguish.
Adversarial Attacks on Local Regions.
We have used Shapley value to perform a vulnerability analysis on a 3D network model and extracted vulnerable regions. Our goal is to only attack a certain number of vulnerable regions to generate adversarial examples, not to attack the entire point cloud. The point cloud attack scheme based on salient regions is shown in <ref>.
Most adversarial attack methods are to perturb the entire point cloud, however, we are more concerned with the local regions of the point cloud. Therefore, we divide the original point cloud into m regions, denoted as x=(a_1, a_2,···,a_k,···,a_m), a_i representing the i-th region. Assuming that the perturbation of the region a_i is e_i, then the adversarial point cloud x' can be expressed as follows:
x'= {a'_i=a_i+e_i | a_i ∈ x } .
It can be seen that x and x' have the same structure, that is, the adversarial point cloud x'=(a_1',a_2',···,a_i',···,a_m'), where a_i' is obtained by perturbing the region a_i.
Therefore, according to Equation (2), the regional attack of 3D point cloud can be formulated as follows:
min C_Region= l(x') + λ_1∗ D(x, x') + λ_2∗ P(x, x').
l(x') is the adversarial loss, D(x,x') is the distance constraint between the original point cloud x and the adversarial point cloud x'. λ_1 and λ_2 are constants. In the actual solution process, the binary search method is used to automatically find the optimal parameter value of λ_1. P(x, x') represents the number of points modified by the adversarial point cloud compared to the original point cloud. Finally, adversarial examples are generated by solving equation (4).
Perceptibility.
When generating adversarial examples, it is necessary to use relevant constraints to ensure that the adversarial examples are as close as possible to the original examples. Using distance constraints is an effective way to improve the imperceptibility of generated adversarial examples. This paper uses the Chamfer distance and Hausdorff distance, which are common in 3D data, to constrain the generation of adversarial point clouds. These two distance constraints are also important indicators to measure the quality of adversarial point clouds.
Chamfer distance is used to measure the difference between two point sets. The calculation is as follows:
D_Chamfer(x, x^')=max{1/n∑_b ∈ xmin _a ∈ x^'b-a_2^2,.
.1/n^'∑_a ∈ x^'min _b ∈ xa-b_2^2},
where n represents the number of points of the original point cloud x, and n' represents the number of points against the point cloud x'.
Hausdorff distance is a common constraint term for generating 3D adversarial point clouds, which effectively reduces the outliers of the generated adversarial examples. Through this distance constraint, the generated adversarial examples can be made more imperceptible to a certain extent, making them more difficult to distinguish. The Hausdorff distance is calculated as follows:
D_Hausdorff(x, x^')=max{max _b ∈ x{min _a ∈ x^'b-a_2}. ,
.max _a ∈ x^'{min _b ∈ xa-b_2}}.
In this paper, the local adversarial attack method using Chamfer distance and Hausdorff distance constraints can be expressed as follows:
D(x, x') = D_Chamfer(x, x') + D_Hausdorff(x, x') .
Adversarial loss.
Given a 3D network model f, input a 3D point cloud x labeled y, the correct prediction result is f(x)=y. After attacking vulnerable regions of the input point cloud to generate an adversarial point cloud x', our goal is to make the model produce the wrong output, i.e. f(x')≠ y. Therefore, we use an adversarial loss as follows to make the model fail to correctly identify adversarial point clouds.
l(x^')=max{f_y(x^')-max _y^'≠ y f_y^'(x^'), 0}.
where y is the class label of the original point cloud x. f_y(x') indicates that the 3D network model recognizes the input x' as class y. Here, the essence of adversarial loss is a penalty term. If the network model classifies the adversarial point cloud as the true class of the original point cloud, then l(x')>0, which requires a penalty. Otherwise, l(x')=0, and the adversarial loss will not work.
§.§ Adaptive gradient attack algorithm
In order to generate more harmful adversarial examples, this paper designs an adaptive gradient attack algorithm for vulnerable regions.
Based on the vulnerability analysis of the 3D network model, it is only necessary to perturb the most vulnerable regions of the point cloud when generating the adversarial point cloud. So the salient values of all regions of the point cloud need to be sorted. Sort the salient values for different regions of the point cloud in descending order. Suppose the sorted point cloud is x=(p_1,p_2,···,p_k,p_m), where ϕ(p_1)>ϕ(p_2)>···>ϕ(p_k)>···>ϕ(p_m). Then the adversarial attack method only needs to perturb the first k regions (p_1, p_2, ..., p_k) to produce adversarial examples.
The spatial location of 3D point cloud includes three directions: x, y, and z. The proposed adaptive gradient attack algorithm automatically assigns the disturbance size for each direction when disturbing vulnerable regions. First, the adaptive gradient attack algorithm calculates the gradient grad=▽_xC_Region(x, x') of the adversarial point cloud for each iteration. Then, the calculation method of the ratio of the disturbance size in different coordinate axis directions is as follows. To avoid ambiguity, we denote the three axes of x, y, and z as x^*, y^*, and z^*, respectively.
e_x^*= | grad_x^*|| grad_x^*| + | grad_y^*| + | grad_z^*| ,
e_y^*= | grad_y^*|| grad_x^*| + | grad_y^*| + | grad_z^*| ,
e_z^*= | grad_z^*|| grad_x^*| + | grad_y^*| + | grad_z^*|.
The grad_x^*, grad_y^*, and grad_z^* in the above equation represent the gradient size of the adversarial point cloud on the three axes of x, y, and z, respectively. We denote the ratio of the disturbance size of the three-dimensional coordinate axis as Ration=[e_x^*, e_y^*, e_z^*]. After obtaining the ratio of the disturbance size of each coordinate axis in the three-dimensional space, the disturbance is automatically assigned to different coordinate axes in each iterative optimization process. The process of updating the adversarial point cloud once is expressed as follows:
x^'← x + Ration ·ϵ·sign(grad) · offset· Region_idx,
where the parameter ϵ is the disturbance size and offset is the disturbance to be optimized. Region_idx represents the vulnerable regions that need to be disturbed. the sign is a symbolic function, the specific calculation method is as follows:
sign(k)={[ 1 k>0; 0 k=0; -1 k<0. ].
§.§ Adaptive local adversarial attack method
In this paper, the adaptive local adversarial attack method (AL-Adv) generates more harmful adversarial examples. The specific implementation process of the proposed AL-Adv is described as Algorithm <ref>. The overall implementation process can be divided into two aspects. First, vulnerability analysis is performed on the 3D network model using Shapley value, and salient regions are extracted from the input point cloud. Second, the top k vulnerable regions of the input point cloud are determined, and an adaptive gradient attack algorithm is applied to these vulnerable regions. Finally, the optimal adversarial point cloud is found in the iterative optimization process.
§ EXPERIMENTS
§.§ Experimental setup
Dataset. This paper evaluates various adversarial attack methods on the ModelNet40 <cit.> dataset. The ModelNet40 dataset is very popular for 3D network model classification and is one of the main evaluation datasets. This dataset contains 12311 CAD models of 40 classes. In specific experiments, the data used are point clouds obtained by uniform sampling from these CAD models. This paper follows the experimental setting in <cit.>, the training data uses a total of 9843 point clouds, and the test data contains 2468 point clouds.
Implementation Details.
In this paper, the experiments are only carried out on the 3D point cloud classification model. We adopt PointNet <cit.> as the attacked 3D network model. Following the previous setting <cit.>, the input point cloud of PointNet is 1024 points. In actual experiments, we select 25 samples of each class from the ModelNet40 test set for experiments. During model vulnerability analysis, we divided the input point cloud into 32 regions and calculated the salient value for each region. In the process of generating adversarial point clouds, we use Adam to optimize the perturbation, the learning rate of the optimizer is set to 0.01, the momentum is set to 0.9, and the perturbation size ϵ is set to 0.6. The parameter λ_1 is automatically adjusted during optimization using a binary search method and the λ_2 is set to 0.15. The number of salient regions attacked by the proposed method AL-Adv is five.
Evaluation Metrics.
The evaluation indicators of 3D adversarial attack methods mainly include attack success rate, Chamfer distance, Hausdorff distance, and the number of points manipulated when generating adversarial samples. This paper adopts these four metrics to measure different adversarial attack methods. Among them, the higher the attack success rate, the better, indicating that the generated adversarial examples have a greater threat to the network model. For the other three indicators, the smaller the better. Chamfer distance and Hausdorff distance measure how similar the adversarial example is to the original example. The number of points manipulated represents the cost of generating adversarial examples.
§.§ Experimental results
We conduct comparative experiments on PointNet. The comparison methods include the excellent 3D point cloud adversarial attack methods in recent years, which were proposed by Xiang et al. <cit.>, Liu et al. <cit.>, Wicker et al. <cit.>, Zheng et al. <cit.>, Kim et al.<cit.> respectively. According to the settings of Kim et al.<cit.>, the method proposed by Xiang et al. <cit.> was modified to untargeted attacks.The methods proposed by Liu et al. <cit.> are also reimplemented, denoted as Adversarial sink <cit.> and Adversarial stick <cit.>, respectively. Wicker et al. <cit.> generated adversarial examples by removing points, which was modified into perturbation, and implemented two attack methods Random selection <cit.> and Critical selection <cit.>. Kim et al.<cit.> used the keypoint selection strategy of Zheng et al. <cit.>, but modified the point removal operation to a perturbation operation, and implemented three adversarial attack methods according to the rules of point removal, namely Saliency map/critical frequency <cit.>, Saliency map/low-score <cit.> ,and Saliency map/high-score <cit.>.
<ref> shows the comparison of various metrics for different adversarial attack methods. From the <ref>, the proposed method AL-Adv achieves the highest attack success rate, indicating that the AL-Adv generates more harmful adversarial examples. At the same time, the number of points operated by the AL-Adv method is also relatively small, indicating that the cost of generating adversarial examples is low. In terms of distance metrics, both the Chamfer distance and the Hausdorff distance are relatively small, indicating that the adversarial examples generated by the method AL-Adv have good imperceptibility.
In experiments, the proposed adversarial attack method (AL-Adv) targets local regions of point clouds and generates adversarial point clouds by attacking salient regions. All other comparison methods are global adversarial attack methods. Experimental results show that the proposed AL-Adv achieves the highest attack success rate of 92.92% while only operating at 40 points. Although the method proposed by Kim et al. <cit.> generates adversarial examples only by operating 36 points, the method achieves an attack success rate of 89.38%. In addition, the "Adversarial sink" operated 1024 points to obtain an attack success rate of 88.3%. Although the "Critical selection" method only uses 50 points to generate adversarial examples, the attack success rate is only 18.99%, which shows that the quality of adversarial examples is low. In summary, the proposed local attack method (AL-Adv) achieves a higher attack success rate than the global attack method, and the AL-Adv achieves excellent performance overall.
<ref> shows the comparison of adversarial examples generated by the proposed method AL-Adv and the method proposed by Xiang et al. Compared with the original point cloud, the adversarial examples generated by Xiang et al. need to manipulate a large number of points, and are prone to produce obvious outliers that are easy to detect. However, the proposed AL-Adv operates fewer points when generating adversarial examples, and the generated adversarial examples have better imperceptibility. To highlight the difference in adversarial point clouds, we mark the perturbed points in red and increase the size of the red points.
In terms of performance evaluation, the attack success rate is an important indicator. The higher the attack success rate, the greater the threat to the network model caused by the generated adversarial examples. Therefore, the adversarial examples generated by the proposed AL-Adv tend to be more harmful to the network model. In addition, the cost and imperceptibility of the generated adversarial examples are also important metrics. To sum up, the proposed AL-Adv generates adversarial examples with good visual perception at a small cost, and the adversarial examples are more harmful.
§ DISCUSSION
Risks of AR Systems. Due to the development of augmented reality (AR) technology, many industries have started the development and application of AR products. Therefore, the security issues of AR systems used in real life deserve attention. As an important support for AR technology, 3D recognition and tracking has an important impact on product safety. Point clouds are widely used in 3D object recognition and tracking due to their good data characteristics. For the development of AR, the application of point cloud data is also an important direction. In addition, deep network models are vulnerable to malicious attacks by adversarial examples, causing the model to fail to correctly recognize objects. Therefore, this paper focuses on the safety of AR systems on 3D point clouds and proposes a more harmful adversarial point cloud generation method AL-Adv.
Advantages of Local regions Attacks. Most of the current adversarial point cloud generation methods attack the entire point cloud, resulting in a large generation cost. Therefore, we pay more attention to the local regions of the point cloud. Analyzing the vulnerability of the 3D network model is more conducive to implementing adversarial attacks. Theoretically, we only need to attack the vulnerable part of the network model to achieve the adversarial attack. Therefore, the proposed method AL-Adv attacks only the most vulnerable region of the input point cloud for the 3D network model. The results demonstrate that AL-Adv generates adversarial point clouds at a small cost and that adversarial point clouds are more harmful.
Advantages of adaptive gradient attack. Most of the existing gradient-based adversarial attack methods achieve the attacks in the gradient direction when perturbing the point cloud, which makes different dimensions of a point have the same size of perturbation. However, this is not reasonable, and there should be different perturbations size for different dimensions of a point. Therefore, this paper designs an adaptive gradient attack algorithm, so that each point in different dimensions automatically sets the perturbation size according to the gradient. Experiments show that the adaptive gradient attack algorithm achieves a higher attack success rate.
§ CONCLUSION
Adversarial objects in the physical world cause augmented reality (AR) systems to fail to perceive their surroundings. Therefore, adversarial objects have an important impact on the development of AR technology. In this paper, we propose an adaptive local adversarial attack method (AL-Adv) to generate 3D adversarial examples. First, we formulate the attack on local regions of point clouds. Then, we introduce the Shapley value to analyze the vulnerability of the 3D network model and extract the salient regions of the input point cloud. Finally, we design an adaptive gradient attack algorithm to attack these salient regions. The adaptive gradient attack algorithm adaptively assigns different disturbance sizes in different coordinate axis directions. Experimental results show that the proposed method AL-Adv has obtained a higher attack success rate than the global attack method, which shows that the adversarial examples generated by our method are more harmful to the 3D network model. Therefore, during the model training phase, the 3D network model learns adversarial examples to enhance model robustness, which is the basis for further improving the security of the AR system.
abbrv-doi
|
http://arxiv.org/abs/2303.07357v1
|
20230313180000
|
Localizing The First Interstellar Meteor With Seismometer Data
|
[
"Amir Siraj",
"Abraham Loeb"
] |
astro-ph.EP
|
[
"astro-ph.EP"
] |
[email protected], [email protected]
Department of Astronomy, Harvard University, 60 Garden Street, Cambridge, MA 02138, USA
Department of Astronomy, Harvard University, 60 Garden Street, Cambridge, MA 02138, USA
The first meter-scale interstellar meteor (IM1) was detected by US government sensors in 2014, identified as an interstellar object candidate in 2019, and confirmed by the Department of Defense (DoD) in 2022. We use data from a nearby seismometer to localize the fireball to a 1 km^2 region within the 10^2 km^2 zone allowed by the precision of the DoD-provided coordinates. The improved localization is of great importance for a forthcoming expedition to retrieve the meteor fragments.
§ INTRODUCTION
The first interstellar meteor (IM1), CNEOS[<https://cneos.jpl.nasa.gov/>] 2014-01-08, was detected by U.S. Department of Defense (DoD) sensors through the light that it emitted as it burned up in the Earth's atmosphere off of the coast of Papua New Guinea in 2014 <cit.>. The material strength of IM1 appears to be higher than all other 272 meteors in the CNEOS catalog <cit.>. A forthcoming expedition aims to recover fragments from the ocean floor with an expedition to Papua New Guinea <cit.>. The area associated with the DoD-reported localization box for the fireball is ∼ 10^2 km^2, but given practical constraints the expedition can only search an area of order ∼ 1 km^2. Hence, it is crucial to improve the precision of the fireball localization. In this Letter, we use data from a nearby seismometer, AU MANU, to set new constraints on the fireball location.
§ METHOD OF CALCULATION
We use the National Weather Service's Global Ensemble Forecast System model atmospheric profile (pressure as a function of temperature) for the DoD-reported fireball location, (-1.3^∘, 147.6^∘) at the time 2014-01-08 17:05:34 (private communication, Tim Gallaudet & Steve Levine, April 27, 2022). We compute the sequential altitude differences as dz = H(dP/P), where H = (RT/g) is the scale height, R is the gas constant, g is the gravitational acceleration, T is the temperature as a function of pressure P, and dP are the sequential pressure differences. The sound speed as a function of temperature is given by, v_a = 331.3 m s^-1 [1 + (T/546.3 C)]. For this particular atmospheric profile, the sound speed as a function of altitude z can be expressed as, v_a = (347.2 - 1.861 z/km) m s^-1.
The geometric setup is shown in Figure <ref> and the AU MANU seismic signal (with the three directions of the seismometer added in quadrature, and the overall signal normalized to unity) is displayed in Figure <ref>. There are two distinct packets of acoustic energy. The onset of the first packet is unclear, likely due to electrophonic noise that typically occurs simultaneously with fireballs, as well as the contribution from the fireball's light rapidly heating up the water beneath it, resulting in pressure waves that travel through the water, or a combination of the water and the ground, to the seismometer. However, there does appear to be a marked increase in the magnitude of the signal after about a delay of 40 s, to a level comparable to that of the second packet. The light from the fireball carries ≲ 10% of the energy <cit.>, so it should not produce a seismic signal comparable to the purely acoustic second packet. As a result, we place a simple and conservative constraint: the first sound waves from the fireball (traveling along the fastest path) should arrive sometime before 40 s. The fastest path would correspond to travel directly down through the air column, directly down through the water column, and horizontally through the ground, since the speed of sound in the ground exceeds the speed of sound in water and air. For the second packet, we require the first arrival of air-mediated sound waves from the fireball to occur at a delay of 270 - 282 s, the green region in Figure <ref> corresponding to where the signal rises above the noise threshold. This implies sound waves traversing the shortest path in between the blast and the seismometer, a distance of √(r^2 + z^2), where z is the altitude of the fireball above the ocean surface and r is the horizontal separation of the fireball from the seismometer. Similarly, we require the peak amplitude of the air-mediated sound waves to occur at a delay of 296 - 304 s (within the orange region), corresponding to the apparent peak in the signal. To first order, this should correspond to sound waves that traveled a distance of roughly r + (z / √(2)) in the air, since r ≫ z (note that we use this approximation for the analytical derivation, but then verify the fit numerically).
For the signal:
Air speed: v_a = (347.2 - 1.861 z/km) m s^-1
Ground arrival: z/v_a + 1.7 km/v_w + r/v_g < 40 s
Air arrival: 270 s < √(r^2 + z^2)/v_a < 282 s
Air maximum: 296 s < r + z/√(2)/v_a < 304 s,
where v_w ∼ 1.5 km s^-1 is the speed of sound in water <cit.> and v_g ∼ 6 km s^-1 is the speed of sound in the ground[<http://www.columbia.edu/ vjd1/earth_int.htm>]. Solving this system of equations yields a ground distance of r ≈ 93.5 ± 0.5 km and altitude of z ≈ 7.4 ± 0.4 km.
We then use a numerical procedure to check if the derived values for r and z correctly describe the shape of the second packet. The procedure imagines the blast from the fireball as a singular spherical wave emitted z = 7.4 ± 0.4 km above a point ocean surface r = 93.5 ± 0.5 km away from the AU MANU seismometer, traveling at v_a = 334 m s^-1. The spherical wave intersects the ocean surface at times t > (z/v_a) in circles with radii r_circ = arccos[(z/(v_a t))], carrying a fraction of the blast energy corresponding to the fraction of the spherical blast wave contacting the ocean surface, f ∝ (2 π r_circdr_circ)/(4 π r^2). We assume an angle-independent reflection coefficient and the amplitude does not matter for the probability distribution in Figure <ref>, given the arbitrary normalization. The procedure then considers each point on each ocean surface circle re-radiating, using the distance from the point to the AU MANU seismometer, s, to derive the additional travel time (s / v_a) and the additional reduction in flux of (4 π s^-2). For each possible path, the travel time from the fireball to the point on the ocean surface, and from the point on the ocean surface to the AU MANU seismometer, are summed, and the relative flux delivered to the AU MANU seismometer is tabulated. This allows the relative fluxes for all paths with arrival times within each time bin to be summed. The result is the relative amplitude for the simulated signal, assuming perfect reflection and no transmission losses, as a function of time. The simulated second packet provides an excellent match to the rise, peak, and tail of the actual second packet, displayed in Figure <ref>. This match confirms the blast location parameters derived using Equations (<ref>) - (<ref>).
§ DISCUSSION
The locations reported by the DoD in the CNEOS catalog are rounded to the tenths place in longitude and latitude. This suggests that the reported location, (-1.3^∘, 147.6^∘), corresponds to a square connecting (-1.35^∘, 147.65^∘), (-1.35^∘, 147.55^∘), (-1.25^∘, 147.55^∘), and (-1.25^∘, 147.55^∘). The area of this region is ∼ 10^2 km^2. The acoustic localization described here implies a distance of 93.5 ± 0.5 km from the AU MANU seismometer at (-2.0432^∘, 147.366196^∘), and overlaps with the DoD-provided location only within a ∼ 1 km^2 triangle connecting (-1.25^∘, 147.65^∘), (-1.25^∘, 147.632^∘), and (-1.256^∘, 147.65^∘). This reduces the uncertainty in the location of the fireball by a factor of ∼ 10^2 in terms of area. This reduction in the geographic uncertainty of the IM1 fireball improves the search efficiency in the forthcoming ocean expedition to recover its fragments <cit.>. In addition, the direction in which the IM1 was traveling through the atmosphere fortuitously aligns with the distance constraint derived here, due to the serendipitous location of the AU MANU seismometer. This is beneficial for the ocean expedition search, as the fragments are expected to fall along the extrapolated post-fireball ground track trajectory of the meteor <cit.>.
While the DoD-provided fireball altitude of 18.7 km implied a peak ram pressure of ∼ 2 × 10^2 MPa <cit.>, the altitude of 7.4 ± 0.4 km derived here implies a significantly higher ram pressure of (8 ± 0.4) × 10^2 MPa. If this altitude corresponded to the last of the three bursts observed in the light curve, then it would imply a ram pressure of (4.7 ± 0.3) × 10^2 MPa. As a result, the acoustic localization described here raises the estimate of the strength of the object by a factor of 2 - 4, which is notable since IM1 was already the toughest meteor in the CNEOS catalog by a significant margin <cit.>, and given that typical iron meteors have material strengths of ∼ 50 MPa <cit.>.
§ ACKNOWLEDGEMENTS
We thank Tim Gallaudet and Steve Levine for providing crucial meteorological data used in this work. This work was supported in part by a grant from the Breakthrough Prize Foundation and by research funds from the Galileo Project at Harvard University.
aasjournal
|
http://arxiv.org/abs/2303.07086v1
|
20230313131149
|
Non-radial oscillations and gravitational wave emission of hybrid neutron stars
|
[
"Zi-Yue Zheng",
"Ting-Ting Sun",
"Huan Chen",
"Jin-Biao Wei",
"G. F. Burgio",
"H. -J. Schulze"
] |
nucl-th
|
[
"nucl-th",
"astro-ph.HE",
"gr-qc"
] |
#1 #1
#1 #1
#1 #1
#1
#1
pxe𝐞→εϕφλαω M_⊙M_max MeV km3 fm^-33 g/cm^3 MeV fm^-3τ_GWδϵx_p
UTF8gbsn
Email:[email protected]
School of Mathematics and Physics, China University of Geosciences,
Lumo Road 388, 430074 Wuhan, China
INFN Sezione di Catania, Dipartimento di Fisica,
Universitá di Catania, Via Santa Sofia 64, 95123 Catania, Italy
We investigate non-radial oscillations of pure and hybrid neutron stars,
employing equations of state of nuclear matter
from Brueckner-Hartree-Fock theory,
and of quark matter from the Dyson-Schwinger quark model,
performing a Gibbs construction for the mixed phase in hybrid stars.
Characteristic differences between neutron-star and hybrid-star
g_1-mode oscillation frequencies, damping times, and gravitational wave strains
are pointed out. Prospects of observations are also discussed.
Non-radial oscillations and gravitational wave emission
of hybrid neutron stars
H.-J. Schulze
March 30, 2023
===============================================================================
§ INTRODUCTION
The interior of a neutron star (NS) can reach several times
the nuclear saturation density ρ_0 ≃ 0.163.
Therefore, there might exist a phase transition to deconfined quark matter (QM)
in the NS core <cit.>.
In general, once the equation of state (EOS) of nuclear matter (NM) is known,
one can compute the structure and properties of NSs.
Unfortunately, so far,
due to the lack of exact computation
dealing with the nonperturbative strong interaction,
the EOS of high-density NM remains an open theoretical problem.
There are many theoretical models for the NS EOS
that can meet the observational and experimental constraints,
see, e.g., <cit.>
for a recent review.
For NM in the hadron phase,
popular EOSs are based on
relativistic mean field models <cit.>,
phenomenological models based on energy-density functional theory
with generalized Skyrme effective forces <cit.>,
Brueckner-Hartree-Fock (BHF) theory
<cit.>,
the variational method (APR) <cit.>,
the self-consistent Green's functions approach
<cit.>,
and chiral effective field theory
<cit.>.
For QM, EOSs are mainly obtained with
the MIT bag model <cit.>,
the Nambu-Jona-Lasinio model <cit.>,
the perturbative QCD <cit.>,
and the Dyson-Schwinger equations (DSEs)
<cit.>.
To test the various theoretical models of NSs and hybrid stars (HSs),
we have to resort to observations.
The mass-radius relation is one of the most straightforward and
simple observables,
which can be theoretically obtained by solving the Tolman-Oppenheimer-Volkov
(TOV) equations combined with the EOS.
Recently, several observed pulsars with masses above two solar masses
<cit.>
put firm lower limits on the maximum mass of NSs.
Some theoretical analyses of the NS merger event GW170817
even deduce an upper limit on the maximum mass of about 2.2–2.3<cit.>,
albeit with large theoretical uncertainty.
In 2019, new constraints on the radius were provided by the NICER
(Neutron Star Interior Composition Explorer) mission,
which reported Bayesian parameter estimations of the mass and equatorial radius
of the millisecond pulsar PSR J0030+0451 <cit.>,
and recently on PSR J0740+6620 with mass 2.08_-0.07^+0.07<cit.>.
However, it is hard to distinguish HSs and pure NSs
from the mass-radius relations,
since theoretically the differences between them are small,
and even masked by the uncertainties of pure NSs with various models
<cit.>.
Therefore, one needs other observables to reveal the interior of NSs.
NSs are sources of electromagnetic waves in all wavelengths,
and also emitters of both continuous and inspiral gravitational waves (GWs).
In particular, when NSs experience violent processes such as accretions,
radial and non-radial oscillations, glitches, and even NS mergers
<cit.>,
they are expected to emit strong enough signals that can be observed.
After the first direct observation of GWs from a binary black hole (BH) merger
<cit.>,
more and more GW signals were detected,
including NS mergers
<cit.>,
which has opened a new window on NS observation
by using GWs as probes of their internal structure.
In our previous work <cit.> we investigated radial oscillations,
and found a clear difference of their frequencies between pure NSs and HSs.
The radial oscillation of NSs is the simplest oscillation mode
without direct GW radiation,
but might couple with and amplify GWs <cit.>
and modulate the short gamma ray burst (SGRB) <cit.>.
On the contrary,
the non-radial oscillation (NRO) of a star can directly produce GW signals
<cit.>,
not only in NS mergers or supernova explosions.
Therefore, the study of NROs of isolated NSs
may provide us with direct and stable observations to understand
the structure and properties of high-density NM,
the strong interaction, and GWs.
In this work we further study the NROs of NSs,
specifically the quadrupole oscillations
which are stable sources of GW radiation.
The theoretical study of NROs in general relativity
was first proposed by Thorne <cit.>.
After that,
a series of rigorous mathematical analyses were carried out
by Detweiler and Lindblom <cit.>,
whereas Chandrasekhar and Ferrari proposed a simpler calculation
and obtained some properties of NROs of compact stars <cit.>.
In recent years,
many investigations of NS NROs were carried out,
for example
<cit.>.
They show that some eigenfrequencies of the NROs of NSs
are within the sensitive range of some current detectors.
Theoretically, for a non-rotating NS,
the eigenmodes of oscillation are divided into
g mode, f mode, and p mode,
which indicate the various dominant restoring forces for the perturbations.
The g-mode eigenfrequencies are relatively small,
∼ O(1 kHz),
and provide us with an appropriate observable.
The buoyancy acts as the g-mode restoring force
to bring disturbed fluid elements back into equilibrium,
and generally its frequency depends on the particle fraction gradient
and temperature <cit.>.
This effect is more intense in HSs than in pure NSs <cit.>.
Therefore, we can expect different characteristics of the g modes
between NSs and HSs,
and we will mainly focus on this mode.
In this work, we adopt the BHF theory for NM,
which is based on realistic many-body forces that describe accurately
nucleon scattering data in free space and the properties of the deuteron.
Moreover, the BHF approach enables the derivation of the properties
of NM at nuclear saturation density
consistent with experiments
<cit.>.
For QM, we adopt the Dyson-Schwinger-equation quark model
<cit.>,
which can simultaneously address both confinement and
dynamical chiral symmetry breaking <cit.>.
We employ the Gibbs phase transition between the hadron and
deconfined quark phase <cit.>,
which determines a range of baryon densities
where hadron and quark phase coexist.
In this framework,
the maximum masses of the pure NSs and HSs fulfill the two-solar-mass constraint
<cit.>.
This work is organized as follows.
In Sec. <ref> we briefly describe the formalism for the EOSs, i.e.,
the BHF theory for the hadron phase and the DSEs for the quark phase.
In Sec. <ref> we introduce the TOV and
the eigenvalue equations for the NROs of NSs.
Numerical results are given in Sec. <ref>,
and we draw the conclusions in Sec. <ref>.
We use natural units c=ħ=1 throughout the paper.
§ EQUATION OF STATE
§.§ Nuclear matter
The BHF many-body theory <cit.>
is used to describe the NM in the interior of NSs.
It can reproduce NM properties near the saturation density
with a quite good accuracy <cit.>.
We only provide here a brief overview of the formalism,
and refer to the various indicated references for full details.
The essential ingredient of this approach is the interaction matrix G,
which satisfies the following equations
G(ρ,;E) = V + V ∑_1,2|12⟩ (1-n_1)(1-n_2) ⟨12|/E - e_1-e_2 +i0 G(ρ,;E)
and
U_1(ρ,) = ∑_2 n_2
G(ρ,;e_1+e_2)12_a ,
where n_i(k) is a Fermi distribution,
≡ρ_p/ρ is the proton fraction,
and ρ_p and ρ are the proton and the total nucleon number densities,
respectively.
E is the starting energy and
e_i(k) ≡ k^2/2m_i + U_i(k) is the single-particle energy.
The multi-indices 1,2 denote in general momentum, isospin, and spin.
The energy density of NM can then be expressed as
_N =
∑_1 n_1(k) ( k^2/2m_1 + 1/2U_1(k) )
.
Thus, the nucleon-nucleon interaction potential V is the only necessary input
in the calculation process.
In this work, we adopt the
Argonne V_18 (V18) <cit.>
and
Bonn-B (BOB) <cit.>
potentials,
supplemented with compatible microscopic three-body forces
<cit.>.
This is a common prescription adopted in the BHF approach,
and allows to reproduce correctly the saturation point
of symmetric NM and related properties.
In order to obtain the EOS,
we impose cold, neutrino-free, charge neutral, and catalyzed matter
consisting of neutrons, protons, and leptons (e^-,μ^-)
in beta equilibrium due to weak interactions.
Therefore, the energy density of NM can be expressed as
(ρ_n,ρ_p,ρ_e,ρ_μ) =
(ρ_nm_n+ρ_pm_p) + _N(ρ_n,ρ_p)
+ _e(ρ_e) + _μ(ρ_μ)
,
where _e,μ are the energy densities of electrons and muons,
and m_n,p are the masses of neutrons and protons, respectively.
Furthermore, a quadratic dependence on the proton fraction
is well fulfilled
<cit.>,
_N(ρ_n,ρ_p) = _SNM(ρ)
+ (1 - 2)^2 _sym(ρ) ,
being _sym(ρ) the symmetry energy density,
_sym(ρ) = _PNM(ρ) - _SNM(ρ) .
Therefore, for the treatment of beta-stable matter,
it is only necessary to calculate the energy densities for
symmetric nuclear matter (SNM) and pure neutron matter (PNM).
For practical use, we employ the convenient empirical parametrizations
given in Refs. <cit.>.
We have shown in <cit.> that going beyond the parabolic approximation
affects the results for NS structure only in a very marginal way.
The various chemical potentials
of the particle species i=n, p, e, μ
can be computed from the energy density, Eq. (<ref>),
μ_i = ∂/∂ρ_i ,
and this allows to solve the equations for beta-equilibrium,
μ_p + μ_e = μ_n ≡μ_B ,
μ_e = μ_μ ,
together with charge neutrality,
ρ_p - ρ_e - ρ_μ≡ρ_C = 0 ,
for the equilibrium composition ρ_i at fixed baryon density
ρ_B=ρ=ρ_p+ρ_n.
Finally the EOS is given by
p() = ρ_B^2 d / d ρ_B(ρ_i(ρ_B))/ρ_B
= ρ_B d /d ρ_B -
= ρ_B μ_B - .
The BHF approach provides only the EOS for the bulk matter region
ρ≳ 0.13
without cluster formation, and therefore it has to be
joined with a low-density crust EOS.
In this paper we adopt the Shen2020 EOS <cit.>,
which belongs to the class of so-called unified EOSs,
and is frequently used
for the simulations of core-collapse supernova and NS mergers.
We notice that the high-mass domain that we are mainly interested in,
is in any case hardly affected by the structure
of this low-density transition region <cit.>.
The choice of the crust model can influence the predictions of
radius and related deformability to a small extent,
of the order of 1% for R_1.4<cit.>,
which is negligible for our purpose.
Even neglecting the crust completely,
NS radius and deformability do not change dramatically <cit.>.
Due to the absence of strict theoretical and observational constraints
on how to join the core and crust EOSs,
we use the simplest way,
a continuous transition
at the point with the same pressure and energy density.
The possible influence of the core-crust transition construction
on the NROs will be discussed in following.
§.§ Quark matter
As in Ref. <cit.>,
we adopt the Dyson-Schwinger model (DSM) <cit.>
to describe the deconfined quark phase,
which provides a continuous approach to quantum chromodynamics (QCD).
The fundamental quantity of the DSM is the quark propagator S(p;μ)
at finite chemical potential μ,
which satisfies the Dyson-Schwinger equation
S(p;μ)^-1 = Z_2 [ i γ·p
+ i γ_4(p_4 + iμ) + m_q ] + Σ(p;μ)
with the renormalized self-energy expressed as
Σ(p;μ) = Z_1 g^2(μ) ∫d^4 q/(2π)^4 D_ρσ(k;μ)
^a/2γ_ρ S(q;μ)
^a/2Γ_σ(q,p;μ) ,
where D_ρσ(k≡ p-q;μ) is the full gluon propagator,
Γ_σ(q,p;μ) is the full quark-gluon vertex, and
Z_1 and Z_2 are the quark-gluon vertex and quark wavefunction
renormalization constants.
Moreover, ^a are the Gell-Mann matrices,
and m_q is the current-quark bare mass.
Knowing the quark-gluon vertex and gluon propagator,
one can solve the equation and obtain the quark propagator.
In our work,
the so-called rainbow approximation and a
chemical-potential-modified Gaussian-type effective interaction
<cit.> are adopted,
see Ref. <cit.> for details.
The EOS for cold QM is obtained following Refs. <cit.>.
The quark number density, pressure, and energy density
for each quark flavor at zero temperature can be obtained as
ρ_q(μ_q) = 6∫d^4p/(2π)^4tr_D[-γ_4 S_q(p;μ_q) ] ,
p_q(μ_q) = p_q(μ_q,0) + ∫_μ_q,0^μ_q dμρ_q(μ) ,
_q(μ_q) = -p_q(μ_q) + μ_q ρ_q(μ_q) .
The baryon chemical potential and total baryon number density
in the quark phase are
μ_B = μ_u + 2μ_d ,
ρ_B = ρ_u+ρ_d+ρ_s/3 ,
and the total pressure and energy density are given
by summing contributions from all quark flavors
and those from electrons and muons.
The pressure of QM at zero density is determined by a
phenomenological bag constant <cit.>,
B_DS = -∑_q=u,d,s p_q(μ_q,0) ,
which is set to 90<cit.>.
The beta equilibrium and charge neutrality in the pure quark phase
are expressed as
μ_d = μ_u + μ_e = μ_u + μ_μ = μ_s ,
ρ_C = 2ρ_u-ρ_d-ρ_s/3 - ρ_e - ρ_μ = 0 .
In this work we adopt the Gibbs construction <cit.>
for the phase transition between hadron phase and quark phase.
In combination with the respective beta-equilibrium conditions
Eqs. (<ref>) and (<ref>),
the chemical and mechanical equilibrium in the mixed phase are expressed as
μ_B,N = μ_B,Q ,
μ_e,N = μ_e,Q ,
p_N( μ_e,μ_B) = p_Q(μ_e,μ_B) = p_M(μ_e,μ_B) ,
where the subscripts “N", “Q", and “M"
represent NM, QM, and the mixed phase, respectively.
In the mixed phase,
the local charge neutrality conditions Eqs. (<ref>) and (<ref>)
are replaced by the global condition
χρ_C,Q + (1-χ)ρ_C,N = 0 ,
where χ is the volume fraction of QM in the mixed phase.
Consequently,
the baryon number density ρ_B,M and energy density _M
of the mixed phase can be determined as
ρ_B,M = χρ_B,Q + (1-χ)ρ_B,N ,
_M = χ_Q + (1-χ)_N .
Specifically, in the Gibbs construction
the pressure and energy density in HSs
are continuous functions of the baryon density,
at variance with the Maxwell phase transition <cit.>.
§ NEUTRON STARS
§.§ Hydrostatic equilibrium structure
Due to the strong gravitational field in NSs,
their structure and dynamical evolution are ruled
by the Einstein equation in general relativity,
R_μν - 1/2g_μνR = 8π G T_μν ,
where R_μν is the Ricci tensor,
R is the Ricci scalar, and
G is the gravitational constant.
The energy-momentum tensor is
T_μν = pg_μν + (p+)u_μ u_ν ,
where g_μν is the metric tensor,
p is the pressure,
is the energy density,
and u_μ is the four-velocity.
For simplicity, we consider static spherically symmetric stars,
described by the Schwarzschild metric
<cit.>
The general static spherically-symmetric metric
which describes the geometry of a static NS can be written as
ds^2 = e^ν(r)dt^2 - e^(r)dr^2
- r^2(dθ^2+sin^2θ dϕ^2) ,
where e^ν(r) and e^(r) are metric functions.
The TOV equations <cit.>
obtained from the Einstein field equation for the metric are
dp/dr = G(+p)(m+4π r^3p)/r^2(2Gm/r-1) ,
dm/dr = 4π r^2 ,
and the corresponding metric functions
e^(r) = (1-2Gm/r)^-1 ,
ν(r) =
-2G ∫_r^∞ dr' e^(r')/r'^2( m + 4π r'^3 p ) .
The boundary conditions
m(r=0)=0, p(r=0)=p_c, and p(R)=0,
where p_c is the central pressure,
lead to equilibrium configurations in combination with the EOS of the NS matter,
thus obtaining radius R and mass M=m(R)
of a NS for a given central pressure or density.
§.§ Non-radial oscillations
Thorne developed a complete theory for NROs of NSs
from the Einstein field equations <cit.>.
The perturbation of the fluid in the star is described
by the Lagrangian displacement vector ξ^ in terms of
the dimensionless perturbation functions W(r) and V(r),
ξ^r = r e^-/2 W Y^l_m e^i t ,
ξ^θ = -V ∂_θ Y^l_m e^i t ,
ξ^ϕ = -(sinθ)^-2 V ∂_ϕ Y^l_m e^i t ,
where Y^l_m(θ,ϕ) are the usual spherical harmonics,
and the eigenvalue = 2π f is the frequency of the NRO.
The eigenfunctions W(r) and V(r) are determined by the pulsation equations.
The full NRO equations can be found in the literature
<cit.>.
As we mainly focus on the g-mode oscillations,
in this work we consider the relativistic Cowling approximation,
which disregards the perturbations in the metric <cit.>.
The validity of the Cowling approximation has been confirmed in
Refs. <cit.>,
which find relatively small deviations of the g-mode oscillation frequencies
compared to the full solutions.
As for the other two modes,
this approximation yields about 10–30% accuracy
of the f-mode frequencies
and about 20% for the p mode.
The oscillation equations in Cowling approximation are
r dW/dr = ( g/c_s^2 - 3 ) W
+ e^/2( ^2 r^2/c_s^2 e^ν - l(l+1) ) V
,
r dV/dr = e^/2( N^2/^2 - 1 ) W
+ ( 2g + N^2 r^2/g e^ν- - 2 ) V ,
with g ≡ -r(dp/dr) / (p+),
and N being the Brunt-Väisälä (BV) frequency defined as
N^2 ≡g^2/r^2( 1/c_e^2-1/c_s^2) e^ν- .
In the Newtonian approximation N is the frequency of the perturbed
fluid elements forced by buoyancy to perform harmonic oscillations.
The BV frequency depends on the difference of the inverse squared
equilibrium speed of sound c_e
and adiabatic speed of sound c_s,
caused by the deviation from beta-equilibrium during fast enough oscillations.
The former is defined as the derivative of the EOS in beta equilibrium,
c_e^2 ≡dp/dr/d/dr = dp/d ,
while,
assuming that all weak reactions are slow compared to the oscillation timescale,
the squared adiabatic speed of sound is
c_s^2 ≡( ∂ p/∂)_S,Y_i
= Δ p/Δ ,
where S and Y_i denote entropy and the particles fractions
affected by weak reactions, respectively.
It is related to the adiabatic index of the fluid,
γ = ( 1 + /p) c_s^2 ,
which drives the response of the stellar material to pulsational perturbations.
However, one should note that Eq. (<ref>) is only adequate
in the pure hadron/quark phases.
In the mixed phase,
one also needs to consider the transition between NM and QM,
as well as the independent expansion/contraction of NM/QM
during the oscillation.
The related conversion rate/time scale between hadron and quark phases
is still an open question,
and current calculations are model dependent.
Following the argument of <cit.>,
the preferred conversion timescale would be slow at the hadron-quark interface,
although a rapid timescale cannot be discarded <cit.>.
Therefore, herein we neglect the phase transition
between NM and QM in the mixed phase,
keeping all particles fractions Y_i constant
in NM and QM separately.
Note that this means that the strong chemical equilibrium
between NM and QM is violated, i.e.,
the isospin chemical potentials in NM and QM are different during oscillations.
The volume fraction of QM in the mixed phase changes during the oscillation,
to keep the pressure equilibrium between NM and QM.
Accordingly, the squared adiabatic speed of sound in the mixed phase
is modified as <cit.>
c_s^-2 = χ''_Q + (1-χ')'_N - /p'-p ,
where p and are the pressure and energy density in beta-equilibrium,
p'=p+Δ p is the pressure during oscillations,
'_Q, '_N are the energy densities of QM and NM
during oscillations,
and χ' is determined by p'_Q=p'_N =p' during oscillations.
In this work, we focus on the influence of the core on the NROs,
as in recent literature <cit.>.
For simplification,
we will make the approximation that c_s=c_e in the crust,
and correspondingly the BV frequency N_crust=0.
The influence of the crustal N on the core modes of NROs is small,
which will be discussed in the following section.
In order to determine the eigenfrequencies of oscillation,
one also needs boundary conditions <cit.>, which,
in the NS center, are given by
W(0) + lV(0) = 0 ,
while at the outer surface of the star,
the Lagrangian perturbation of the pressure should vanish,
Δ p(R) = γ p
[ -e^-/2(rdW/dr + 3W) - l(l+1) V ](R) = 0 .
Due to the homogeneousness of the oscillation equations
Eqs. (<ref>,<ref>),
one can impose arbitrarily
W(r=0)=1 and V(r=0)=-1/2
at the center.
Then integrating Eqs. (<ref>,<ref>)
from center to the surface with the boundary conditions
yields the discrete eigenfrequencies _i
and the eigenfunctions W_i,V_i.
For the quadrupole (l=2) oscillations of pure NSs and HSs,
they can be ordered as
_g_n<…<_g_1<_f<_p_1<…<_p_n,
where n is the number of nodes.
§.§ GW damping time
The damping time of oscillations through GW emission is
= 2E/P_GW ,
where E is the total energy stored in the oscillation,
and P_GW is the power of the GW radiation released by the mode.
The energy per radial distance
of an eigenmode in Cowling approximation
is given by <cit.>dE/dr = ^2/2 (p+) e^(-ν)/2
r^4 [ W^2 + l(l+1)V^2 ] ,
and its power can be estimated as <cit.>
P_GW = G(l+1)(l+2)/8π (l-1)l[ 4π^l+1/(2l+1)!!∫_0^R dr r^l+2]^2 ,
where is the Eulerian perturbation of the energy density,
in Cowling approximation given as <cit.> = -(p+)
[ e^-/2(3W + r dW/dr) + l(l+1) V ]
- r d/dr e^-/2 W .
It has been pointed out <cit.>
that the different terms in this equation are of different signs
and tend to cancel each other,
which renders a reliable numerical evaluation very delicate.
We will come back to this problem later.
The radiation power is related to the GW strain (metric perturbation),
which in quadrupole approximation and transverse-traceless (TT) gauge
is <cit.>
h_ij^TT(t,D) =
2G/DQ̈_ij^TT(t-D/c) ,
where i,j=1,2,3 are the indices in Cartesian coordinates,
D is the distance to the source,
G is the gravitational constant,
the two dots represent the second time derivative,
and the traceless quadrupole moment is
Q_ij^TT(t) = ∫ d^3 (t,)
( x_i x_j - 1/3δ_ij||^2 ) .
The metric perturbation tensor can be decomposed as
𝐡^TT = h_+ _+ + h_×_× ,
where _+ and _×
are the unit tensors of plus and cross polarization.
In the case of a symmetric metric,
the cross polarization h_× is zero,
Q_ij has only diagonal components
Q_11 = Q_22 = -1/2 Q_33,
and the GW strain can be calculated by <cit.>
h_+ = 3Gsin^2/2DQ̈_33 ,
where is the inclination angle.
In this work, we choose sin=1.
After some derivation, Q̈_33 can be written as
Q̈_33 = | Q̈_33| e^-i t
= ∫ dr r^2 sinθ dθ dϕ
r^2 (sin^2θ - 1/3)
d^2 /dt^2 ,
and thus
|Q̈_33| =
4√(π/5)/3^2 ∫ dr r^4 (r) ,
where is given by Eq. (<ref>).
So the amplitude of the GW strain can be rewritten as
|h_+| = 3G|Q̈_33|/2D ,
and depends, as the radiation power, on (r).
§ NUMERICAL RESULTS
§.§ EOS and equilibrium structure of neutron stars
As discussed above, we use the BHF EOS with BOB or V18 potential
for the pure NM.
Regarding the QM EOS in HSs,
there is a free model parameter ,
which represents the strength of the
in-medium modification of the Gaussian-type effective interaction in the DSM.
Here we choose = 1,2 and = 1,1.5
in combination with the BHF BOB and V18 EOSs, respectively,
labeled as BOB/V18+DS,
to satisfy both the requirements of >2 and causality,
as discussed in detail in <cit.>.
The energy density, squared equilibrium speed of sound,
and squared adiabatic speed of sound as functions of the pressure
are shown in Fig. <ref>.
The colors/types of curves refer to the different combinations
of BHF and DSM EOS.
The EOS of the mixed phase (broken lines) is generally softer
than that of the pure NM (solid lines),
whereas pure QM emerges at too high densities
that cannot be reached in HSs in our approach.
However, the QM onset density is strongly dependent on the theoretical model
adopted for the description of QM.
We notice that both sound speeds in pure NM
become superluminal at high densities
(but quite close to the configuration),
due to the non-relativistic character of the BHF theory.
However, in our model,
the phase transition to QM occurs always at lower density,
and consequently causality is never violated.
The equilibrium speed of sound c_e is particularly sensitive
to the composition of the matter.
One can find a small discontinuity at p≈5
due to the onset of muons
(hardly visible because of the scale),
and a sharp discontinuous drop at the phase transition point,
due to the appearance of QM.
Unlike c_e, the adiabatic speed of sound c_s is always continuous
with increasing pressure,
independently of the emergence of muons or quarks.
This is because it is defined with fixed particle composition, Eq. (<ref>).
Similar results were obtained in Ref. <cit.>,
using different NM and QM EOSs.
In Fig. <ref> we show the difference of squared inverse sound speeds
1/c_e^2-1/c_s^2 as function of the baryon number density in NS matter.
This difference determines the profile of the local oscillation frequency,
i.e., the BV frequency, Eq. (<ref>).
As discussed above, we approximate c_s=c_e and N=0 in the crust,
therefore the difference is zero below the core-crust transition density.
In the core with the pure BHF EOS,
c_s and c_e increase with density,
and therefore 1/c_e^2-1/c_s^2 decreases.
There is a first spike around ρ_B ≃ 0.153
due to the muon onset,
and at larger densities a second much sharper spike due to the appearance of QM.
In the mixed phase the difference decreases and then increases again
when approaching the pure quark phase.
We stress that the (sharp) change of 1/c_e^2-1/c_s^2
is mainly due to the (sharp) change of c_e,
which is very sensitive to the change of particle species,
see Fig. <ref>.
Furthermore we notice that,
whereas the differences in the purely hadronic phase become very small
and rapidly approach zero,
those in the mixed phase are larger and can rise very quickly.
This behavior already hints to larger values of the g-mode frequencies
and a strong dependence on the QM EOS
in hybrid stars compared to the purely hadronic stellar configurations.
The mass-radius relations of pure NSs and HSs with the various considered EOSs
are shown in Fig. <ref>.
The broken curve segments indicate the hybrid star branches.
One notes that the differences between HSs and pure NSs are even smaller
than the differences between pure NSs with different BHF EOSs.
Therefore, it is difficult to distinguish HSs from pure NSs
with only M(R) observations.
Within our model, pure QM matter does not appear in the core of HSs.
All plotted EOSs
(in particular the V18 models)
fulfill the constraints from present observations on NS mass and radius,
in particular the recent mass-radius results of the NICER mission
for the pulsars J0030+0451 <cit.>
and J0740+6620 <cit.>.
The combined (strongly model-dependent) analysis
of both pulsars together with the GW170817 event observations
<cit.>
yields improved limits on the radius
R_2.08=12.35±0.75<cit.>,
but in particular on R_1.4, namely
12.45±0.65<cit.>,
11.94^+0.76_-0.87<cit.>, and
12.33^+0.76_-0.81 or
12.18^+0.56_-0.79<cit.>,
which are shown as horizontal black bars in the figure.
The BHF V18 EOS is well compatible with these constraints
<cit.>,
and also its maximum mass ≈ 2.36
exceeds the currently known lower limits.
The BOB EOS is stiffer and allows a maximum mass of even 2.51.
Some theoretical analyses of the GW170817 event
indicate also an upper limit on the maximum mass
of ∼2.2–2.4<cit.>,
with which the V18 EOS would be compatible as well.
However, those are very model dependent,
in particular the still to-be-determined temperature dependence of the EOS
<cit.>.
In Fig. <ref> we show the profiles of both the
equilibrium and adiabatic squared speed of sound,
and the BV frequency
in NSs with masses M=1.4, 2.0
for different EOSs.
The speed of sound generally increases from the crust to the center of the NS,
apart from the density region close to the pure quark phase or a sudden drop of c_e due to the onset of QM
(e.g., upper right panel),
which does not take place in the 1.4 configurations
shown in the left panels.
By definition, the BV frequency vanishes in the center
and increases towards the crust,
exhibiting sharp decreases at the phase transition point or when muons disappear.
We see that in the inner core of HSs,
the BV frequency is much larger than in pure NSs.
The BV frequency is a local property in NSs which cannot be observed directly,
but it is closely related to the global g-mode frequency.
Accordingly, one can consider the BV frequency and the g-mode oscillations
as useful probes of the appearance of QM.
We will discuss this in detail now.
§.§ Non-radial oscillations of neutron stars
In this work, we investigate the quadrupole oscillations (l=2)
of both pure NSs and HSs.
For illustration,
we show some typical solutions
for the radial and tangential displacement perturbations
W(r) and V(r) in Fig. <ref> .
The left panels contain the results of four representative
f, g_1, g_2, and p_1 eigenmodes
of a 1.4 NS with the V18 EOS,
exhibiting the expected number of nodes,
whereas the right panel displays
the g_1 mode of 2.0 NSs with various EOSs.
In this case, for purely hadronic NSs (solid lines),
one can see quite similar oscillation amplitudes nearly independent
of the nuclear EOS,
whereas the amplitudes in HSs (broken lines) decrease more quickly
in the inner core and remain smaller in the outer layers.
Therefore, the oscillation in HSs occurs mainly in the inner core,
and might reveal information about the QM/mixed phase.
The W(r) eigenfunction exhibits a smooth behavior over the entire star's profile,
even at the radial distance corresponding to the mixed phase onset;
this is at variance with V(r),
which shows sudden kinks when QM appears.
Now we turn to the discussion of the NRO frequencies in NSs and HSs,
for g, f, and p modes.
As known, they are classified according to the different restoring forces
acting in the fluid,
and are characterized by different frequencies.
In Fig. <ref>,
we show the NRO frequencies of NSs as functions of NS mass.
One can see that f_g_1 of pure NSs lies in the range 0.2–0.4 kHz,
and increases slowly with the NS mass.
The difference of the eigenfrequencies with BOB and V18 EOSs
is always about 0.1 kHz,
which is related to the corresponding difference of the BV frequencies,
Fig. <ref>,
and in particular to the different NS radii,
Fig. <ref>:
the smaller V18 star is oscillating faster.
The same qualitative correlations are observed for the HSs,
which exhibit much higher eigenfrequencies up to 0.9 kHz.
Therefore f_g_1 might be a good observable to distinguish HSs from pure NSs.
Again, our results are similar to those discussed in
Refs. <cit.>.
Equivalent features are observed
for the much higher eigenfrequencies of f mode and p_1 mode,
above 2 kHz and 7 kHz, respectively.
But in this case,
the differences between HSs and pure NSs are not larger
than the difference between pure NSs with different models.
Therefore, they can not be used as good observables
to distinguish HSs from purely hadronic NSs.
The eigenfrequencies of several representative modes
of NSs with M=1.4,2.0 and various EOSs
are also listed in Table <ref>.
One can see that the frequencies of higher-order g modes decrease
and those of higher-order p modes increase.
These results are qualitatively similar to those recently published in
Ref. <cit.>.
§.§ GW emission and damping of g_1 mode
In the previous section,
we have pointed out the significant difference of the g-mode frequencies
between massive NSs and HSs.
In the following, we investigate a closely related observable,
the damping time of oscillations through GW emission,
Eq. (<ref>).
Before illustrating the results,
we remind that three possible damping mechanisms can act on g-mode oscillations, i.e., relaxation toward chemical equilibrium,
viscous damping,
and damping due to emission of GWs.
In Ref. <cit.> damping times of the core g modes
(as well as of crustal discontinuity g modes)
of order 10^8–10^11s were obtained
(but are subject to delicate numerical cancellations).
Thus damping due to emission of GWs is very inefficient,
and the other mechanisms are dominant.
Our results are shown in Fig. <ref>(a)
for g_1-mode oscillations with various EOSs
as a function of NS mass.
In the low-mass region (≲1.4),
we obtain also very large values of the damping time,
and even a divergence at certain masses.
This large value of is due to the smallness of the integral
for the GW power, Eq. (<ref>),
caused by cancellations between the individual terms of Eq. (<ref>).
The integral represents a superposition of GWs emitted from perturbations
of the energy quadruple moment at different layers of the NS.
This is illustrated in Fig. (<ref>),
which shows the Eulerian perturbation
of the energy density, (r), Eq. (<ref>),
in 1.4 and 2.0 NSs.
Similar as the perturbation functions W(r) and V(r),
the perturbation of the energy (quadruple moment)
also has nodes at certain radii.
The sign flip of represents a half-period difference
of the oscillation phase of the energy quadruple moment.
Therefore the GWs emitted from domains with different signs of
will interfere with each other,
which results in cancellations of the power output.
In our models, we obtain contributions
of positive in the inner core
and negative in the outer layers
of the same order of magnitude.
As a result, we obtain large values of the damping time ,
and even a divergence at a certain mass.
We stress that the (small) values of the GW power are quite model dependent,
which could be greatly influenced by various approximations,
an so do the values of the damping time <cit.>.
Fig. <ref>(b) shows that
for massive pure NSs the positive contribution in the inner core
is dominant,
and thus the damping time in Fig. <ref>(a)
is about 10^6–10^8s (∼ days),
and decreases with the NS mass.
This means that the g_1 mode of a pure NS is likely
to be a stable and long-lasting source of GWs,
if no other very strong damping mechanisms dominate.
But for the hybrid stars,
the positive contributions of in the inner core are much larger,
and the damping time decreases very quickly by several orders of magnitude
with respect to pure NSs.
Thus the behavior of the g_1-mode GW damping time
shows again a significant difference between HSs and pure NSs,
just like the frequencies.
The much smaller damping time of HSs indicates a much stronger GW strain
|h_+|, Eq. (<ref>).
This quantity depends on the oscillation amplitudes W and V.
Their normalization can be determined from the total energy E of oscillation
through Eq. (<ref>).
Choosing a typical energy scale E ∼ 10^51erg <cit.>
and a typical distance D ∼ 15Mpc (star in the Virgo cluster),
we show in Fig. <ref>(b)
the GW strain amplitude of NS and HS g_1-mode oscillations.
One can see that |h_+| for pure NSs with low masses is much lower,
with even a zero point,
which corresponds to the high damping time and its divergence in the upper panel.
For NSs with larger masses, |h_+| increases with the NS mass,
while for HSs the equivalent irregular behavior as for is exhibited.
Therefore,
our results for both the damping time and the strain amplitude
suggest stronger GW g_1-mode radiation of HSs than pure NSs,
which could thus be good observables to distinguish them from each other.
§.§ Prospects of observation
Some of these features are likely to be detected
by the next generation of GW detectors
<cit.>,
while the frequencies of f and p modes are not in the range of sensitivity
of current ground-based detectors.
Although the GW strain emitted by NSs in the Virgo cluster is only
of the order 10^-25,
a |h_+| of the order 10^-22
could be obtained for NSs in our galaxy (D∼10kpc),
which is within the detection ability of present GW detectors.
The minimum energy that should be released
to be detectable in present and planned GW observatories
can be estimated as <cit.>:
E_GW/ = 3.5 × 10^361+4 Q^2/4 Q^2S_n/1s( S/ND/10kpcf/1kHz)^2
,
where
Q =π f is the quality factor,
S_n is the noise power spectral density of the detector,
and
S/N is the signal-to-noise ratio.
Table <ref> lists some representative values,
for typical distances
D=10kpc (star in our galaxy)
and D=15Mpc (star in the Virgo cluster),
taking S/N = 8
and
S_n^1/2=2×10^-23s^1/2
(representative of Advanced LIGO-Virgo at ∼ kHz frequency <cit.>),
and S_n^1/2=10^-24s^1/2
(illustrative of the planned third-generation ground-based
Einstein Observatory at the same frequencies <cit.>).
Although the minimum detectable energy of NSs in the Virgo cluster
is of the order 10^52–10^53erg,
higher than the typical energy that can be released by a NRO g mode,
the threshold for stars in our galaxy is only 10^46–10^47erg,
much lower than this typical energy.
Therefore, those events could be detected by present and planned
GW observatories.
§ CONCLUSIONS
In this work we investigated non-radial quadrupole oscillations
of cold and isolated NSs,
including pure NSs and HSs.
We adopted the BHF theory for NM, the DSM for QM,
and the Gibbs construction for their phase transition.
Based on the equilibrium structure,
we solved the equations for the non-radial l=2 oscillations
within Cowling approximation,
and obtained the radial and tangential displacement perturbations in NSs
as well as the eigenfrequencies of g, f, and p modes for various EOSs.
The emergence of QM influences strongly the two kinds of sound speed
and the BV frequencies in HSs,
and consequently their g-mode oscillations.
We find eigenfrequencies f_g_1∼ 300Hz for pure NSs,
which increase very slowly with the NS mass,
while those of HSs increase very quickly with NS mass,
reaching above 700Hz.
All these frequencies are in the sensitivity range
of current ground-based GW detectors.
This shows a clear difference of the g-mode frequency
between pure NSs and HSs,
which can thus be a good observable to distinguish them.
Such a difference is not obvious for the f and p modes.
The concurrent shorter g_1 damping times of HSs correspond
to larger GW strain and radiation power,
and thus easier detection than for pure NSs.
Estimates of the GW strain h_+ and minimum detectable energy E_GW
suggest that the GWs from the NRO g_1 mode of NSs/HSs in our galaxy
could be detected by present and planned detectors.
To sum up, the g_1 mode is the most suitable mode to
provide a window on the internal composition of the compact object.
In this work we disregarded the contribution of the crust
to the g-mode oscillations
by using the approximation N_crust=0.
In Ref. <cit.> the coupling between core and crust NRO modes
has been carefully analyzed and their mutual interference was found
sufficiently small, i.e.,
the frequency and damping time of the core modes are only weakly influenced
by the crust contribution,
especially for high-mass stars.
We have confirmed this conclusion by calculations
involving the Shen EOS N_crust,
which will be the subject of a separate paper.
The accurate computation of this feature requires in particular a careful
treatment of density discontinuities
due to changes of the chemical composition.
This might occur
inside the crust <cit.>,
at the core-crust boundary,
or at the critical point from HM to QM
with a Maxwell phase transition <cit.>.
The associated discontinuity g modes
might have similar frequencies as
and thus mix with the core modes <cit.>.
Apart from cold isolated NSs,
quadrupole oscillations also occur in various newly born NSs,
after NS mergers or supernova explosions,
which are expected to be more energetic and easier observable.
In such newly born NSs,
one needs to consider more realistic environment effects,
such as the EOS at finite temperature
<cit.>,
the temperature/entropy distribution in NSs,
the neutrino trapping effects,
and also rotation.
We leave these to future work.
We acknowledge financial support from the National Natural Science Foundation of China - Grant No. 12205260.
Journal of Cosmology and Astroparticle PhysicsJCAPapsrev4-1
The oscillation equations in Cowling approximation are
-d/dr{γ p/r^2 e^ν/2[ e^-/2dW/dr + l(l+1) V ]}
+ [ e^ν/2/2d/dr( e^-/2/r^2dν/dr)
- ^2/r^2 e^(-ν)/2] (p+) W
-l(l+1)(p+) d/dr(e^ν/2) V/r^2 = 0 ,
-^2 r^2 e^-ν (p+) V + l(l+1) γ p V
+ γ p e^-/2dW/dr
+ dp/dr e^-/2 W = 0 .
|
http://arxiv.org/abs/2303.06667v1
|
20230312141038
|
Evidence for self-organized criticality phenomena in prompt phase of short gamma-ray bursts
|
[
"Xiu-Juan Li",
"Wen-Long Zhang",
"Shuang-Xi Yi",
"Yu-Peng Yang",
"Jia-Lun Li"
] |
astro-ph.HE
|
[
"astro-ph.HE"
] |
0000-0001-6469-8725]Li, Xiu-Juan^
School of Cyber Science and Engineering, Qufu Normal University, Qufu 273165, China
0000-0001-6469-8725]Zhang, Wen-Long
School of Physics and Physical Engineering, Qufu Normal University, Qufu 273165, China
0000-0001-6469-8725]Yi, Shuang-Xi^†
School of Physics and Physical Engineering, Qufu Normal University, Qufu 273165, China
*0000-0001-6469-8725]Yang, Yu-Peng
School of Physics and Physical Engineering, Qufu Normal University, Qufu 273165, China
*0000-0001-6469-8725]Li, Jia-Lun
[email protected];[email protected]
School of Physics and Physical Engineering, Qufu Normal University, Qufu 273165, China
The prompt phase of gamma-ray burst (GRB) contains essential information regarding the physical nature and central engine,
which are as yet unknown. In this paper, we investigate the self-organized criticality (SOC) phenomena in GRB prompt phase as done in X-ray flares of GRBs.
We obtain the differential and cumulative distributions of 243 short GRB pulses, such as
peak flux,
FWHM, rise time, decay time, and peak time in the fourth BATSE TTE Catalog with the Markov Chain Monte Carlo (MCMC) technique. It is found that these distributions can be well described by
power-law models. In particular, comparisons are made
in 182 short GRB pulses in the third Swift GRB Catalog from 2004 December to 2019 July. The results are essentially consistent with those in BATSE ones. We notice that there is no obvious power-law index evolution across different energy bands for either BATSE or Swift sGRBs. The joint analysis suggests that GRB prompt phase can be explained by a Fractal-Diffusive, Self-Organized Criticality (FD-SOC) system with the spatial dimension S = 3 and the classical diffusion β = 1. Our findings show that GRB prompt phases and X-ray flares possess the very same magnetically dominated stochastic process and mechanism.
§ INTRODUCTION
Gamma-ray burst (GRB) is a sudden release of gamma-ray emission, which lasts from milliseconds to thousands
of seconds. Despite many studies done on GRBs, the natures are still strongly debated. The lightcurves of GRB prompt phases are the imprints of the activities of central engine and contain the key information of internal energy dissipation and physical mechanisms. In general, it is difficult to accurately extract the properties of GRB lightcurves due to their notoriously complex and irregular structures. Fortunately, a fraction of GRBs are overwhelmingly single-peaked and double-peaked <cit.> providing valuable insights into the
physical processes by which GRBs release energy.
<cit.> reported that a real, many-bodied, physical system in an external field assembles itself into a critical state which can be triggered by a small perturbation and give rise to an avalanche-like chain reaction of any size due to some driving forces. This is known as the concept of self-organizing criticality (SOC) proposed as an
attempt to explain the existence of self-similarities over extended ranges of spatial and temporal scales in a wide variety
of systems.
It is worth noting that the SOC phenomena are commonly discussed in many astrophysical systems, such as solar flare, stellar flares, lunar craters, the asteroid belt, Saturn ring particles, magnetospheric substorms, radiation belt electrons, pulsar glitches, soft gamma-ray repeaters, black-hole objects, blazars, cosmic rays, X-ray bursts, and fast
radio bursts <cit.>, etc.
As a common astrophysical phenomena in the universe, X-ray flares are observed in
a good fraction of GRB afterglows <cit.>. It is well known that GRB X-ray flares
are attributed to the erratic GRB central engine activities just as the GRB prompt emission components which also provide important clues to the nature of the central
engines <cit.>. For example, the similar lag-luminosity relation provides strongly evidence for the direct link between GRB X-ray flares and prompt phases <cit.>.
<cit.> investigated the statistical properties of X-ray flares of GRBs and found that both GRB X-ray flares and solar
flares might origin from the similar physical
mechanism, i.e., they might be produced by a magnetic
reconnection process and thus both can be well
explained by physical framework of a SOC system. Moreover, the further investigation based on a large sample of Swift GRB X-ray flares reported obtained the similar conclusions <cit.>.
Thus, it is necessary to determine whether the GRB prompt phases can also be explained by the SOC model and if so to probe the possible SOC behavior in GRB prompt phases, etc.
From a more physical point of view, <cit.> developed the definition of SOC systems and proposed an analytical macroscopic SOC model. Adopting the expectation criteria proposed by the above model, we can identify an SOC system by examining the power-law-like distributions of relevant observed parameters <cit.>. Recently, <cit.> investigated the properties of BATSE GRBs with multi-pulses in their prompt lightcurves reported by <cit.>. By fitting the distributions of several observed pulses parameters, they tentatively suggested that SOC phenomena exist indeed in prompt phase of GRBs. However, the indisputable fact is that their investigations were
mainly performed for the bursts with at least three pulses and single-peaked and double-peaked bursts were not
included <cit.>. In this study, we systematically compile the temporal
properties of the single-peaked and double-peaked GRB pulses in the fourth BATSE TTE Catalog and the third Swift/BAT catalog given by our recent works <cit.> and perform a analysis focusing on the differential and cumulative distributions of characterized pulse parameters to search for the evidences of the SOC system. Particularly, in order to avoid instrumental selection effect, we examine whether the distributions evolve among different energy channels for both satellite bursts. Sample selection and data analysis are presented in
Section 2. Section 3 displays our main results. We discuss some possible physical explanations of the results in Section 4. Finally, we summarize the results in Section 5.
§ DATA AND METHOD
Our recent works <cit.> utilized the empirical “KRL” function proposed by <cit.> to fit the lightcurves of short GRBs in the fourth BATSE TTE Catalog and the third Swift GRB Catalog from 2004 December
to 2019 July. For BATSE sGRBs, the photon counts are accumulated into four standard
energy channels, labeled as Ch1 (25-55 keV), Ch2 (55-110 keV), Ch3 (110-320 keV), and Ch4 (≥320 keV). Similarly, the mask-weighted lightcurve data of Swift sGRBs are taken
from the Swift website <cit.> for four energy
channels: Ch1 (15-25 keV), Ch2 (25-50 keV),
Ch3 (50-100 keV), and Ch4 (100-350 keV).
In total, 243 BATSE and 182 Swift pulses are obtained. Note that the pulse numbers in different energy channels are different due to either selection effect or low signal-to-noise ratio. Then, we extract the parameters of these pulses, including peak flux (f_ m), full width at half-maximum (FWHM), peak time (t_ m), rise time(t_ r), and decay time (t_ d). The detailed data processing refers to our previous works <cit.>.
To identify the possible SOC features in GRB prompt phases, we study in detail the differential and cumulative distributions of these temporal parameters. Here, a empirical thresholded power-law distribution function is used to fit the differential occurrence frequency distributions of GRBs <cit.>, which can be written as,
N_ diff=dN(x)/dx∝(x_0d+x)^-α_d, x_1 ≤ x ≤ x_2,
where N is the number of events, x_0d is a constant by considering the threshold effects, x_ 1 and x_ 2 are the minimum and maximum values of scale-free range, and α_ d is the power-law index of differential distribution, respectively. This size function is identical to a “Generalized
Pareto distribution” <cit.>, the “Generalized Pareto Type II distribution” <cit.>, and the “Lomax distribution” <cit.>.
The uncertainty of the differential distribution is given by σ _diff,i=√(N_bin,i)/ x_i, where N_bin,i refers to the number of events of the i-bin, and x_i is the bin size.
According to <cit.>, the cumulative distribution function of Equation <ref> can be obtained as,
N_ cum(>x)=1+(N-1) ×(x_2+x_0c)^1-α_c-(x+x_ 0c)^1-α_c/(x_2+x_0c)^1-α_c -(x_1+x_0c)^1-α_c,
where N is the total number of events, x_0c is a constant by considering the threshold effects, and α_ c is the power-law index of cumulative distribution. The uncertainty of the cumulative distribution in a given bin i is estimated with σ _cum,i=√(N_i), where N_ i refers to the number of events of the bin.
We use the standard reduced chi-square (χ_ν ^2) goodness to identify a best fit. The χ_ν can be written as
χ_ν,diff=√(1/(n_x-n_par)∑_i=1^n_x[N_fit,diff(x_i)-N_obs,diff(x_i)]^2/σ_diff,i^2)
for the differential distribution function, and
χ_ν,cum=√(1/(n_x-n_par)∑_i=1^n_x[N_fit,cum(x_i)-N_obs,cum(x_i)]^2/σ_cum,i^2)
for the cumulative distribution function <cit.>,
where n_ x is the number of logarithmic bins, n_ par is the number of the free parameters, N_ diff,obs(x_i) and N_ cum,obs(x_i) are the observed values, N_ diff,fit(x_i) and N_ cum,fit(x_i) are the corresponding theoretical values for differential distribution and cumulative distribution, respectively. Note that the points below the threshold x_0 are just noise and do not contribute to the accuracy of the best-fit power-law index, thus they are ignored when the reduced chi-square is calculated.
Markov chain Monte Carlo (MCMC) method is used to fit GRB data for the self-organized criticality model with PYTHON package pymc[https://pypi.org/project/pymc/] and obtain the optimal distribution parameters and the 95% confidence regions.
§ RESULTS
§.§ Distributions
The differential and cumulative distributions are fitted with Equations <ref> and <ref>. The fitting results are shown in Figures <ref> - <ref> for BATSE bursts and Figures <ref> - <ref> for Swift bursts, respectively. In each Figure, the differential and cumulative distributions for the total sample are shown in panels (a) and (b). Note that we adopt a rank-order
plot to get the differential distributions. The detailed method refers to Section 7.1.3 in <cit.>. In addition, in order to analyse the possible evolution from low to high energy channel, the distributions of different energy channels for both satellite
bursts are fitted. The fitting results are shown in panels (c) - (f). It's important to note that the cumulative
distribution rather than differential distribution is used due to the fact that the sample number of individual energy channel
is not sufficient to bin the data. The detailed fitting results are summarized in Tables <ref> and <ref>.
From Figures <ref> - <ref> (a), we find that all the parameters of BATSE GRBs possess the similar power-law differential distributions. In Figure <ref> (a), the best-fitting power-law index of peak flux for the total BATSE sample is 2.48 ± 0.02. The result is larger than the value of 2.09 ± 0.18 measured by <cit.> for a sample of BATSE bursts whose lightcurves have more than two pulses. However, it can be found from Figure <ref> (a) that the best-fitting power-law index of FWHM for the total BATSE sample is 1.89 ± 0.12, which is
quite close to the value of 1.82 ^+0.14_-0.15 given by <cit.>.
In addition, the similar power-law differential distributions of rise time, decay time, and peak time with indexes of 1.89 ± 0.12, 1.92 ± 0.10, and 2.46 ± 0.05 can be found in Figures <ref> - <ref> (a), respectively.
For cumulative distributions, the best-fitting power-law index of peak flux for the total BATSE sample is 3.05 ± 0.02 in Figure <ref> (b), which is larger than the value of 1.99 ^+0.16_-0.19 reported by <cit.>. Particularly, it can be seen from Figure <ref> (b) that the best-fitting power-law index of FWHM for the total BATSE sample is 2.00 ± 0.01, which is also larger than the value of 1.75 ^+0.11_-0.13 given by <cit.>. The best-fitting power-law indexes of rise time, decay time, and peak time are 2.10 ± 0.01, 2.20 ± 0.01, and 2.50 ± 0.01 for the total BATSE sample (see Figures <ref> - <ref> (b) ).
Figure <ref> (c) - (f) show the cumulative distributions of peak flux from BATSE Ch1 to Ch4. Similar results can be seen from Figures <ref> - <ref> (c) - (f).
The mean values of these power-law indexes of peak flux, FWHM, rise time, decay time, and peak time of four individual channels are 2.29 ± 0.13, 1.87 ± 0.07, 1.85 ± 0.08, 1.92 ± 0.05, and 2.41 ± 0.05, respectively. We find that there is almost no significant power-law index evolution across different energy bands, indicating that the self-organized criticality may quite be likely to exist in GRB systems or, in other words, be intrinsic.
Significantly, similar results are obtained for Swift GRBs in Figures <ref> - <ref>. Overall, the results for Swift GRBs are approximately consistent with those of BATSE GRBs. In Figures <ref> - <ref> (a), the best-fitting power-law indexes of differential distributions of peak flux and FWHM for the whole Swift sample are 2.44 ± 0.07 and 1.87 ± 0.13, both similar to the values of BATSE GRBs. Similarly, we can see from Figures <ref> - <ref> (a) that the power-law differential distributions of rise time, decay time, and peak time for the total Swift sample with the indexes of 1.82 ± 0.13, 1.86 ± 0.14, and 1.75 ± 0.17, respectively, which are slightly smaller than those of BATSE GRBs.
Meanwhile, we find that the cumulative distributions of the total Swift sample can also be well described by power-law model with the indexes of 2.50 ± 0.01, 1.99 ± 0.01, 1.99 ± 0.01, 1.99 ± 0.02, and 1.97 ± 0.03 for peak flux, FWHM, rise time, decay time, and peak time, respectively, as shown in Figures <ref> - <ref> (b).
The mean values of these indexes of four individual channels are 2.40 ± 0.05, 1.81 ± 0.08, 1.80 ± 0.07, 1.80 ± 0.08, and 1.83 ± 0.07, respectively. Above all, it can be found that there is also no significant power-law index evolution across different energy bands for Swift GRBs. On the other hand, the fact that there is no significant instrumental effect between BATSE and Swift bursts, strengthens the evidences of the self-organized criticality in GRB systems.
§.§ SOC
For a fractal-diffusive SOC model, <cit.> predicted power-law distributions for duration and peak flux with the indexes α_T = (1+S)β/2 and α_P = 2-1/S, where S = 1, 2, 3 is Euclidean space dimensions of SOC system and β is the diffusive spreading exponent. According to the prediction, it is easy to obtain the indexes α_P= 1.67 and α_T= 2 for S = 3 and the classical diffusion with β = 1.
Our results can be used to derive the possible Euclidean space dimension of GRB SOC system. Owing to the small differences between the best-fitting power-law indexes of
differential and cumulative distributions, we choose the cumulative case to examine GRB system. Furthermore, considering invariance of the power-law index on energy,
we adopt the mean value of power-law indexes of four individual channels to check. For example, the mean value of power-law index of FWHM for BATSE GRB is 1.87 ± 0.07 and can determine the Euclidean space dimension S = 3 according to the prediction of the FD-SOC model with the theoretical index α_T = 2. The result is very consistent with those of BATSE GRBs with at least three pulses reported by <cit.>. Similarly, the Euclidean space dimension can be obtained using the results of rise time, decay time, and peak time. Although the results are slightly smaller than the theoretical index α_T = 2, Euclidean space dimension of GRB SOC system is essentially in agreement with the model prediction for S = 3.
It is worth pointing out that it is difficult to determine which dimension for peak flux since the value is obviously larger than the theoretical index 1.67 for S = 3. This phenomenon is similar to that reported by <cit.>. The steeper index of the peak flux distributions can be explained due to the fainter peak fluxes in small bin size (5ms and 8ms).
§ DISCUSSIONS
l c c c c c c c
The best-fitting parameters with the power-law models for BATSE GRBs.
Parameters Energy Band Satellite x_ 0d x_ 0c α_ d α_ c χ_ν^2
peak flux total sample BATSE 7.34±0.40 – 2.48±0.02 – 2.67
peak flux total sample BATSE – 14.94±0.08 – 3.05±0.02 1.28
peak flux Ch1 BATSE – 6.81±2.70 – 2.17±0.31 0.22
peak flux Ch2 BATSE – 7.18±0.38 – 2.48±0.03 0.85
peak flux Ch3 BATSE – 10.88±0.53 – 2.48±0.02 1.03
peak flux Ch4 BATSE – 6.32±2.65 – 2.02±0.40 0.11
FWHM total sample BATSE 0.10±0.03 – 1.89±0.12 – 1.36
FWHM total sample BATSE – 0.20±0.00 – 2.00±0.01 2.93
FWHM Ch1 BATSE – 0.11±0.05 – 1.77±0.21 0.21
FWHM Ch2 BATSE – 0.20±0.01 – 1.98±0.03 1.45
FWHM Ch3 BATSE – 0.19±0.01 – 1.97±0.04 1.07
FWHM Ch4 BATSE – 0.07±0.03 – 1.75±0.20 0.11
t_ r total sample BATSE 0.04±0.01 – 1.89±0.12 – 2.83
t_ r total sample BATSE – 0.08±0.00 – 2.10±0.01 2.86
t_ r Ch1 BATSE – 0.08±0.04 – 1.65±0.29 0.35
t_ r Ch2 BATSE – 0.08±0.00 – 1.97±0.04 1.08
t_ r Ch3 BATSE – 0.08±0.00 – 1.97±0.04 0.98
t_ r Ch4 BATSE – 0.02±0.01 – 1.82±0.16 0.15
t_ d total sample BATSE 0.05±0.01 – 1.92±0.10 – 2.31
t_ d total sample BATSE – 0.13±0.00 – 2.20±0.01 3.48
t_ d Ch1 BATSE – 0.12±0.03 – 1.90±0.16 0.48
t_ d Ch2 BATSE – 0.11±0.01 – 1.98±0.03 1.62
t_ d Ch3 BATSE – 0.09±0.00 – 1.98±0.03 1.15
t_ d Ch4 BATSE – 0.05±0.02 – 1.80±0.14 0.12
t_ m total sample BATSE 0.21±0.02 – 2.46±0.05 – 1.78
t_ m total sample BATSE – 0.28±0.01 – 2.50±0.01 3.21
t_ m Ch1 BATSE – 0.18±0.03 – 2.41±0.09 0.51
t_ m Ch2 BATSE – 0.23±0.01 – 2.47±0.04 1.55
t_ m Ch3 BATSE – 0.28±0.02 – 2.46±0.06 0.93
t_ m Ch4 BATSE – 0.19±0.05 – 2.30±0.17 1.07
l c c c c c c c
The best-fitting parameters with the power-law models for Swift GRBs.
Parameters Energy Band Satellite x_ 0d x_ 0c α_ d α_ c χ_ν^2
peak flux total sample Swift 0.15±0.02 – 2.44±0.07 – 2.06
peak flux total sample Swift – 0.16±0.00 – 2.49±0.01 1.73
peak flux Ch1 Swift – 0.11±0.02 – 2.36±0.12 0.42
peak flux Ch2 Swift – 0.26±0.03 – 2.43±0.09 0.93
peak flux Ch3 Swift – 0.17±0.03 – 2.43±0.09 0.41
peak flux Ch4 Swift – 0.13±0.03 – 2.36±0.16 1.10
FWHM total sample Swift 0.05±0.02 – 1.87±0.13 – 1.29
FWHM total sample Swift – 0.08±0.00 – 1.99±0.01 0.58
FWHM Ch1 Swift – 0.04±0.02 – 1.73±0.15 0.06
FWHM Ch2 Swift – 0.07±0.02 – 1.86±0.18 0.25
FWHM Ch3 Swift – 0.08±0.01 – 1.88±0.12 0.33
FWHM Ch4 Swift – 0.03±0.01 – 1.75±0.18 0.12
t_ r total sample Swift 0.01±0.01 – 1.82±0.13 – 1.37
t_ r total sample Swift – 0.04±0.00 – 1.99±0.01 0.89
t_ r Ch1 Swift – 0.01±0.01 – 1.58±0.17 0.13
t_ r Ch2 Swift – 0.03±0.01 – 1.88±0.12 0.14
t_ r Ch3 Swift – 0.03±0.01 – 1.94±0.08 0.79
t_ r Ch4 Swift – 0.03±0.01 – 1.81±0.20 0.22
t_ d total sample Swift 0.05±0.01 – 1.86±0.14 – 1.25
t_ d total sample Swift – 0.05±0.00 – 1.99±0.02 0.54
t_ d Ch1 Swift – 0.04±0.01 – 1.78±0.19 0.11
t_ d Ch2 Swift – 0.03±0.02 – 1.68±0.20 0.27
t_ d Ch3 Swift – 0.05±0.01 – 1.88±0.12 0.22
t_ d Ch4 Swift – 0.02±0.01 – 1.87±0.13 0.28
t_ m total sample Swift 0.04±0.02 – 1.75±0.17 – 1.43
t_ m total sample Swift – 0.07±0.00 – 1.97±0.03 0.28
t_ m Ch1 Swift – 0.04±0.01 – 1.79±0.17 0.11
t_ m Ch2 Swift – 0.05±0.01 – 1.78±0.15 0.18
t_ m Ch3 Swift – 0.05±0.01 – 1.90±0.11 0.26
t_ m Ch4 Swift – 0.04±0.01 – 1.83±0.15 0.20
After Swift was launched, the bright X-ray flares are detected in nearly half of GRBs <cit.>. Generally, X-ray flares are characterized as the late central engine activities, through a mechanism similar to that of GRB prompt emissions <cit.>. At present, some of theoretical models of GRB and X-ray flares involve magnetic reconnection scenario <cit.>. <cit.> suggested that the differential rotation of millisecond magnetar after compact star mergers can lead to windup of interior
poloidal magnetic fields to toroidal fields, which are strong enough to
float up and break through the stellar surface. Once penetrating through the surface, the toroidal fields with different polarity may reconnect and give rise to original GRB and multiple X-ray flares.
In the Internal Collision-induced Magnetic Reconnection and Turbulence (ICMART) model proposed by <cit.>, internal collisions distort the ordered magnetic field lines in the ejecta. Then, GRBs and X-ray flares can be triggered by magnetic reconnection in the distorted magnetic field. The ICMART model can well reproduce the properties of GRB prompt phases and X-ray flares simultaneously.
Our statistical results of the similar statistical framework of SOC system of GRBs and X-ray flares support the model and can impose strong constraints on the same magnetically dominated stochastic process and mechanism of them.
<cit.> studied three statistical properties: power-law frequency distributions for energies, durations and waiting times of GRB X-ray flares with known redshift. They suggested that GRB X-ray flares can be explained with the same statistical framework with solar flares and correspond to a one-dimensional SOC system. In our previous work <cit.>, we studied the peak times, rise times, decay times, waiting times, and durations of a larger GRB X-ray flare sample and further strengthened the self-organized criticality in GRB X-ray flares. Nevertheless, the Euclidean space dimension S = 3 is
different from the result reported by <cit.>. As to GRB prompt phases, it is very exciting that our conclusion is consistent with that reported by <cit.> in despite of different GRB samples. It can be naturally explained by the theory that GRB prompt phases and X-ray flares arise from different active stages of internal shocks <cit.>. The radial component of magnetic fields decays faster with radius <cit.>. Thus, the early GRB prompt phases near to the central engine is in a 3-dimensional form while the X-ray flares are closer to one dimension rather
than three dimensions <cit.>. It is worth noting that GRB optical
flares are found to share a similar physical origin to X-ray flares and similar frequency distributions further confirm the SOC nature of GRB system <cit.>.
§ CONCLUSIONS
In this paper, we have systematically studied the differential and cumulative distributions
of short GRBs from the fourth BATSE TTE Catalog and the third Swift GRB Catalog from 2004 December to
2019 July. For the first time, we presented the joint analysis among the different individual energy bands
in both BATSE and Swift sGRBs. Our major results are summarized as follows:
1. We find that GRBs have similar power-law distributions with GRB X-ray flares for peak flux, FWHM, rise time, decay time, and peak time, thus both can be attributed to a SOC process.
2. There is no obvious power-law index evolution across different energy bands.
3. It is found that the results for Swift sGRBs are essentially consistent with those in BATSE ones.
4. According to <cit.>, our results are used to derive the possible Euclidean space dimensions of the GRB SOC system and obtain the spatial dimension S = 3.
In this work, our survey is restricted to the BATSE and Swift short GRBs and shed new light on the physical processes of compact binaries mergers. In fact, some long GRBs are found to originate from moderately-magnetized millisecond
pulsars with hyperaccreting accretion disks after the collapses of massive stars <cit.>. Thus, it is worth exploring the SOC behavior in long GRB prompt emissions. On the one hand, the longer duration enhances the chance of analyzing the multi-pulses (more than three) within a single burst. On the other hand, the higher detection rate of long GRBs makes it possible to obtain enough pulses to perform the statistics. Therefore, further search for GRBs, especially those with X-ray flares observed simultaneously from the Fermi, HXMT, GECAM, and SVOM catalogs can help to unveil the real physical mechanism of GRBs in the future.
§ ACKNOWLEDGEMENTS
We thank the referee for very helpful suggestion and
comments. This work is supported by the National Natural Science Foundation of
China (Grant No. U2038106), and China Manned Spaced Project (CMS-CSST-2021-A12).
[Arnold(2015)]Arnold2015Arnold, B.C. 2015, Pareto Distributions (2nd ed.). Chapman and Hall/CRC. https://doi.org/10.1201/b18141
[Abdo et al.(2011)]Abdo2011 Abdo, A. A., Ackermann, M., Ajello, M., et al. 2011, , 734, L27. doi:10.1088/2041-8205/734/2/L27
[Aschwanden(2011)]Aschwanden2011 Aschwanden, M. J. 2011, Self-Organized Criticality in Astrophysics, by Markus J. Aschwanden. Springer-Praxis, Berlin ISBN 978-3-642-15000-5, 416p.
[Aschwanden(2012)]Aschwanden2012 Aschwanden, M. J. 2012, , 539, A2. doi:10.1051/0004-6361/201118237
[Aschwanden(2014)]Aschwanden2014 Aschwanden, M. J. 2014, , 782, 54. doi:10.1088/0004-637X/782/1/54
[Aschwanden(2015)]Aschwanden2015 Aschwanden, M. J. 2015, , 814, 19. doi:10.1088/0004-637X/814/1/19
[Aschwanden & Dudok de Wit(2021)]Aschwanden2021 Aschwanden, M. J. & Dudok de Wit, T. 2021, , 912, 94. doi:10.3847/1538-4357/abef69
[Aschwanden(2022)]Aschwanden2022 Aschwanden, M. J. 2022, , 934, 33. doi:10.3847/1538-4357/ac6bf2
[Bak et al.(1987)]Bak1987 Bak, P., Tang, C., & Wiesenfeld, K. 1987, , 59, 381. doi:10.1103/PhysRevLett.59.381
[Burrows et al.(2005)]Burrows2005 Burrows, D. N., Romano, P., Falcone, A., et al. 2005, Science, 309, 1833. doi:10.1126/science.1116168
[Chang et al.(2021)]Chang2021 Chang, X. Z., Peng, Z. Y., Chen, J. M., et al. 2021, , 922, 34. doi:10.3847/1538-4357/ac14b6
[Cheng et al.(2020)]Cheng2020 Cheng, Y., Zhang, G. Q., & Wang, F. Y. 2020, , 491, 1498. doi:10.1093/mnras/stz3085
[Chincarini et al.(2010)]Chincarini2010 Chincarini, G., Mao, J., Margutti, R., et al. 2010, , 406, 2113. doi:10.1111/j.1365-2966.2010.17037.x
[Dai et al.(2006)]Dai2006 Dai, Z. G., Wang, X. Y., Wu, X. F., et al. 2006, Science, 311, 1127. doi:10.1126/science.1123606
[Du et al.(2021)]Du2021 Du, M., Yi, S.-X., Liu, T., et al. 2021, , 908, 242. doi:10.3847/1538-4357/abd6bd
[Giannios(2006)]Giannios2006 Giannios, D. 2006, , 455, L5. doi:10.1051/0004-6361:20065578
[Hakkila & Preece(2011)]Hakkila2011 Hakkila, J. & Preece, R. D. 2011, , 740, 104. doi:10.1088/0004-637X/740/2/104
[Hakkila et al.(2018)]Hakkila2018 Hakkila, J., Horváth, I., Hofesmann, E., et al. 2018, , 855, 101. doi:10.3847/1538-4357/aaac2b
[Hosking & Wallis(1987)]Hosking1987Hosking, Jonathan R. M. & Jamie Wallis. 1987, Technometrics, 29, 339. doi:10.1080/00401706.1987.10488243
[Johnson(1994)]Johnson1994 Johnson, N. L., Kotz, S., & Balakrishnan, N. 1994, Continuous Univariate Distributions, Vol. 1
[Kocevski et al.(2003)]Kocevski2003 Kocevski, D., Ryde, F., & Liang, E., 2003, , 596, 389
[Kumar & Zhang(2015)]Kumar2015 Kumar, P. & Zhang, B. 2015, , 561, 1. doi:10.1016/j.physrep.2014.09.008
[Lazarian et al.(2020)]Lazarian2020 Lazarian, A., Eyink, G. L., Jafari, A., et al. 2020, Physics of Plasmas, 27, 012305. doi:10.1063/1.5110603
[Li et al.(2020)]Lxj1 Li, X.-J., Zhang, Z.-B., Zhang, C.-T., et al. 2020, , 892, 113. doi:10.3847/1538-4357/ab7a94
doi:10.3847/1538-4357/aaac2b
[Li et al.(2021)]Lxj2 Li, X. J., Zhang, Z. B., Zhang, X. L., et al. 2021, , 252, 16. doi:10.3847/1538-4365/abd3fd
[Li et al.(2015)]Li2015 Li, Y.-P., Yuan, F., Yuan, Q., et al. 2015, , 810, 19. doi:10.1088/0004-637X/810/1/19
[Lien et al.(2016)]Lien2016 Lien, A., Sakamoto, T., Barthelmy, S. D., et al. 2016, , 829, 7. doi:10.3847/0004-637X/829/1/7
[Liu et al.(2017)]Liu2017 Liu, T., Gu, W.-M., & Zhang, B. 2017, , 79, 1. doi:10.1016/j.newar.2017.07.001
[Lu & Hamilton(1991)]Lu1991 Lu, E. T. & Hamilton, R. J. 1991, , 380, L89. doi:10.1086/186180
[Lyu et al.(2020)]Lv2020 Lyu, F., Li, Y.-P., Hou, S.-J., et al. 2020, Frontiers of Physics, 16, 14501. doi:10.1007/s11467-020-0989-x
[Lomax (1954)]Lomax1954 Lomax, K. S. 1954, J. Am. Stat. Assoc., 49, 847. doi:10.1080/01621459.1954.10501239
[Margutti et al.(2010)]Margutti2010 Margutti, R., Guidorzi, C., Chincarini, G., et al. 2010, , 406, 2149. doi:10.1111/j.1365-2966.2010.16824.x
[Melatos et al.(2008)]Melatos2008 Melatos, A., Peralta, C., & Wyithe, J. S. B. 2008, , 672, 1103. doi:10.1086/523349
[Mészáros(2006)]M2006 Mészáros, P. 2006, Reports on Progress in Physics, 69, 2259. doi:10.1088/0034-4885/69/8/R01
[Romano et al.(2006)]Romano2006 Romano, P., Moretti, A., Banat, P. L., et al. 2006, , 450, 59. doi:10.1051/0004-6361:20054172
[Tang et al.(2019)]Tang2019 Tang, C.-H., Huang, Y.-F., Geng, J.-J., Zhang, Z.-B. 2019, ApJS, 245, 1. doi:10.3847/1538-4365/ab4711
[Wang & Dai(2013)]Wang2013 Wang, F. Y. & Dai, Z. G. 2013, Nature Physics, 9, 465. doi:10.1038/nphys2670
[Wang & Yu(2017)]Wang20171 Wang, F. Y. & Yu, H. 2017, , 2017, 023. doi:10.1088/1475-7516/2017/03/023
[Wang et al.(2021)]Wang2021 Wang, F. Y., Zhang, G. Q., & Dai, Z. G. 2021, , 501, 3155. doi:10.1093/mnras/staa3912
[Wang et al.(2017)]Wang20172 Wang, J. S., Wang, F. Y., & Dai, Z. G. 2017, , 471, 2517. doi:10.1093/mnras/stx1728
[Wei et al.(2021)]Wei2021 Wei, J.-J., Wu, X.-F., Dai, Z.-G., et al. 2021, , 920, 153. doi:10.3847/1538-4357/ac2604
[Wei(2022)]Wei2022 Wei, J.-J. 2022, arXiv:2212.08813
[Xie et al.(2022)]Xie2022 Xie, L., Wei, D.-M., Wang, Y., et al. 2022, , 934, 125. doi:10.3847/1538-4357/ac7c13
[Yi et al.(2015)]Yi2015 Yi, S.-X., Wu, X.-F., Wang, F.-Y., et al. 2015, , 807, 92. doi:10.1088/0004-637X/807/1/92
[Yi et al.(2016)]Yi2016 Yi, S.-X., Xi, S.-Q., Yu, H., et al. 2016, , 224, 20. doi:10.3847/0067-0049/224/2/20
[Yi et al.(2017)]Yi2017 Yi, S.-X., Yu, H., Wang, F. Y., et al. 2017, , 844, 79. doi:10.3847/1538-4357/aa7b7b
[Yi et al.(2022)]Yi2022 Yi, S.-X., Du, M., & Liu, T. 2022, , 924, 69. doi:10.3847/1538-4357/ac35e7
[Zhang et al.(2006)]ZhangB2006 Zhang, B., Fan, Y. Z., Dyks, J., et al. 2006, , 642, 354. doi:10.1086/500723
[Zhang & Yan(2011)]ZhangB2011 Zhang, B. & Yan, H. 2011, , 726, 90. doi:10.1088/0004-637X/726/2/90
[Zhang & Zhang(2014)]Zhang2014 Zhang, B. & Zhang, B. 2014, , 782, 92. doi:10.1088/0004-637X/782/2/92
[Zhang et al.(2022)]Zhang2022 Zhang, W.-L., Yi, S.-X., Yang, Y.-P., et al. 2022, Research in Astronomy and Astrophysics, 22, 065012. doi:10.1088/1674-4527/ac6aac
|
http://arxiv.org/abs/2303.06846v1
|
20230313042424
|
Improved quantum error correction with randomized compiling
|
[
"Aditya Jain",
"Pavithran Iyer",
"Stephen D. Bartlett",
"Joseph Emerson"
] |
quant-ph
|
[
"quant-ph"
] |
Department of Applied Mathematics, University of Waterloo, Waterloo, Ontario N2L 3G1, Canada.
Institute for quantum computing, University of Waterloo, Waterloo, Ontario N2L 3G1, Canada.
Keysight Technologies Canada Inc., Mississauga, Ontario L5N 2M2, Canada.
Department of Applied Mathematics, University of Waterloo, Waterloo, Ontario N2L 3G1, Canada.
Institute for quantum computing, University of Waterloo, Waterloo, Ontario N2L 3G1, Canada.
Xanadu, Toronto, Ontario M5G 2C8, Canada.
Centre for Engineered Quantum Systems, School of Physics, University of Sydney, Sydney, New South Wales 2006, Australia.
Department of Applied Mathematics, University of Waterloo, Waterloo, Ontario N2L 3G1, Canada.
Institute for quantum computing, University of Waterloo, Waterloo, Ontario N2L 3G1, Canada.
Keysight Technologies Canada Inc., Mississauga, Ontario L5N 2M2, Canada.
Current hardware for quantum computing suffers from high levels of noise, and so to achieve practical fault-tolerant quantum computing will require powerful and efficient methods to correct for errors in quantum circuits. Here, we explore the role and effectiveness of using noise tailoring techniques to improve the performance of error correcting codes. Noise tailoring methods such as randomized compiling (RC) convert complex coherent noise processes to effective stochastic noise. While it is known that this can be leveraged to design efficient diagnostic tools, we explore its impact on the performance of error correcting codes. Of particular interest is the important class of coherent errors, arising from control errors, where RC has the maximum effect – converting these into purely stochastic errors. For these errors, we show here that RC delivers an improvement in performance of the concatenated Steane code by several orders of magnitude. We also show that below a threshold rotation angle, the gains in logical fidelity can be arbitrarily magnified by increasing the size of the codes. These results suggest that using randomized compiling can lead to a significant reduction in the resource overhead required to achieve fault tolerance.
Improved quantum error correction with randomized compiling
Joseph Emerson
Received: date / Accepted: date
===========================================================
§ INTRODUCTION
Noise is pervasive in present-day quantum computation. The theory of fault tolerance was developed to guarantee reliable computations in the presence of noise. However, fault tolerant constructions demand a large overhead in terms of additional resources required to encode a logical computation in a way that is resilient to errors. Achieving the target logical error rates as required by various applications with the limited amount of resources in terms of the number of physical qubits is a challenging task. Along with designing better error correcting codes, decoders and high quality hardware components of a quantum computer, there are other ways of reducing logical error rates. Active noise tailoring by randomized compiling (RC) <cit.> is a potential candidate for two key reasons. First, RC significantly simplifies the form of the noise on the encoded quantum information. Second, RC can be used to transform an unknown error model into one that is adapted to the error correction capabilities of a particular code.
Randomized compiling tools were leveraged to accurately predict the performance of quantum error correction schemes in Ref. <cit.>. Although simplifying the form of the noise makes the performance more predictable, it was observed that RC can sometimes degrade the performance of an error correcting code. We can understand this effect by using the χ-representation <cit.> of a physical noise process. In this representation, the action of noise on a quantum state ρ is given by: (ρ) = ∑_i,jχ_i,jP_iρ P_j where P_i denote Pauli matrices in the n-qubit Pauli group _n without phases, i.e., P_i ∈n/{± 1, ± i}. Noise tailoring methods such as RC can transform the elements of the χ-matrix, for example by removing off-diagonal elements χ_i,j∀ i ≠ j. This mathematical transformation is commonly referred to as twirling <cit.>.
If one were to remove the contribution of χ_i,j corresponding to Pauli errors that are correctable by the decoder, this could have a negative impact of the code's performance. In general, noise tailoring methods are oblivious to the details of what error terms are relevant for quantum error correction.
The impact of twirling the noise on the performance of error correction schemes has been explored in the literature under various settings. The performance of surface codes under coherent and incoherent error models have been compared in Ref. <cit.>, and using numerical studies it was noted that while the threshold is similar in both cases, the subthreshold performance of the twirled channel is significantly better than the original coherent error model. In another setting, analytical calculations of the logical error rate of repetition codes under rotation errors reveal that coherent errors can accumulate faster, leading to worse logical error rates than their corresponding Pauli approximations <cit.>. The necessity of active coherence-suppression methods for codes with large distances was also noted, but their impact on the code’s performance was not explored. For the Toric code under coherent error models, a laborious analysis has shown that the effective logical channel approaches an incoherent channel provided the noise decreases with increasing code size <cit.>. However, in the scenario where the error rate remains constant independent of the code size, there are several challenges to arriving at a similar conclusion. In Ref. <cit.>, the poor predictability of the logical error rate and the code’s pseudo threshold under coherent errors provided by their twirled counterparts was identified, reinforcing the need for active noise tailoring. The impact of twirling the noise for complex error models, such as combinations of stochastic errors and rotations around an arbitrary non-Pauli axis, is unknown. The scaling of the potential gains from twirling with increased code-concatenation levels remains unexplored.
In this paper, we analyze the impact of RC on the performance of quantum error correction. In particular, we show that RC improves the performance of a concatenated Steane code under a coherent noise model (specifically, a tensor product of arbitrary identical unitary errors). This positive result demonstrates that RC tools can play a key role in achieving fault tolerance. We present a detailed study of the performance gains with respect to changes in the axis of rotation and the number of levels of concatenation. We identify a special axis of rotation for a given concatenation level where maximum gains from RC are achieved. We note that this axis can be different from the axes of rotation for which the best pseudo-threshold for the code is achieved. It has been observed, in previous studies, that randomized compiling can also degrade logical performance <cit.>. Our study shows that a wide class of physically motivated error models do not exhibit such behaviour. However, we identify some complex noise models where such degradation can occur and provide numerical results for the same.
The paper is structured as follows. In section <ref>, we introduce the necessary background material including noise processes, randomized compiling and quantum error correction. Section <ref> discusses the methods used to study the impact of randomized compiling on the logical performance. In section <ref>, we present analytical studies for gains offered by randomized compiling using realistic error models. Finally, in section <ref> we provide concluding remarks and describe some interesting open problems.
§ BACKGROUND
In this section, we review the mathematical description of noise processes in quantum circuits as well as the formalism of stabilizer quantum error correction.
§.§ Noise in quantum circuits
The interaction of a quantum system with its environment manifests as errors on the stored quantum information. While the system and its environment together undergo unitary time evolution, the system's reduced dynamics is often a non-unitary map. Markovian noise processes are described by completely positive trace preserving (CPTP) maps : ρ↦(ρ). One of the common ways to represent a CPTP map is using the χ-matrix: χ(), a 4× 4 matrix where: (ρ) = ∑_i,jχ_i,j P_iρ P_j, where P_i, P_j are Pauli matrices.
A special subclass of noise processes that are widely analyzed in developing fault-tolerant protocols is Pauli channels. They correspond to the probabilistic action of Pauli matrices on the input state, i.e., (ρ) = ∑_i,jχ_i,i P_iρ P_i, where χ_i,i can be interpreted as the probability of the Pauli error P_i.
While it is easy to study quantum error correction on Pauli error models, unfortunately realistic noise is often poorly approximated by Pauli error models. This causes a severe disparity between error models that can be accurately analyzed in theory and those that occur in experiments. Noise tailoring, achieved through Randomized compiling <cit.>, is a promising tool that helps resolve this disparity. With RC, the average logical performance of a QEC scheme over several compilations with random Pauli gates can be well approximated by the performance of the QEC scheme under an effective Pauli error model. The effective Pauli error model is nothing but the Pauli twirl of the underlying CPTP noise process , denoted by () defined as
()(ρ) = ∑_P ∈_n P (P ρ P) P .
We will use the notation ^T to denote the Pauli Twirl of the CPTP map : ().
§.§ Quantum Error Correction
An [[n,k]] stabilizer code is a 2^k dimensional space defined as: = { |ψ⟩ : S_i|ψ⟩ = |ψ⟩ , 1 ≤ i≤ n-k}, where S_i are stabilizer generators. See Ref. <cit.> for an introduction to stabilizer codes and fault tolerance. Concatenated codes are a family of codes where we encode the physical qubits at level ℓ using the code at level ℓ-1. This is a way of constructing larger codes from smaller ones and these codes are typically used to guarantee error suppression in fault tolerance proofs <cit.>.
Measuring stabilizer generators yields a signature of the error that occurred called a syndrome. Inferring the error from the syndrome is called decoding. There are several ways to define a decoder, the simplest of which is the minimum weight decoder. It selects a Pauli error of minimum Hamming weight consistent with the observed syndrome. While some errors on the encoded states can be undone by quantum error correction, there are uncorrectable errors that cause unwanted logical operations on the encoded states under a quantum error correction routine. These uncorrectable errors determine the logical error rate. A valuable tool to define the logical error rate is the effective channel, which encapsulates the effect of a physical noise process and a quantum error correction protocol on the encoded quantum information.
Besides the error-correcting code and the underlying physical noise process, the effective channel is a function of the measured error syndrome s. We will use the notation ^s_1 to denote the effective channel where the subscript “1" refers to one encoding level. The relevance of the subscript becomes crucial for concatenated codes <cit.>, where ^s_ℓ refers to the effective channel for a level-ℓ concatenated code. A particularly useful quantity is the average of logical channels ^s_ℓ over all syndrome outcomes, denoted by _ℓ:
_ℓ = ∑_s^s_ℓ(s) ,
where (s) is the probability of observing the outcome s <cit.>. The average logical channel _ℓ indicates how quantum error correction suppresses the effect of physical errors, on average. We will use logical infidelity r(_ℓ) <cit.> as a measure of the logical error rate.
The average logical infidelity for a code under a noise process is calculated using the following equation: <cit.>
r(_1) = 1 - ∑_E,E^'∈_C
s(E) = s(E^') , E = E^'ϕ(E) ϕ^⋆(E^') χ_E,E^' ,
where χ_i,j represents the (i,j)^th entry of the χ-matrix of , _C is the set of correctable errors, E is the logical component in the decomposition of E with respect to the Stabilizer group and ϕ(E) is specified by R_s(E) E = ϕ(E) S for any Pauli error E and some stabilizer S. We use this expression at various points to calculate the logical infidelity. To calculate the entries of the χ-matrix of the effective logical channel we use the following general expression: <cit.>
χ(_1)_l,m = ∑_E,E^'∈_C
s(E) = s(E^') , E = E^'ϕ(E, l) ϕ^⋆(E^', m) χ_E P_l,P_mE^' .
where R_s(E) |E P_l| = ϕ(E,l) S |P_l|, for l ∈{0,1,2,3}, any Pauli error E and some stabilizer S. Here |P| stands for the bare Pauli without any associated global phase.
We calculate the χ-matrix for logical channels at higher levels i.e, for ℓ>1 by recursing the expression in Eq.(<ref>) and using the entries of χ(_ℓ-1) in the right hand side to evaluate χ(_ℓ).
§ METHODS
The goal of this paper is twofold. First, we want to identify important scenarios for physical errors wherein RC can be leveraged to improve the performance of quantum error correcting codes. Second, identify settings under which such performance gains cannot be guaranteed. For the first goal, we study the performance of concatenated Steane code under realistic error models. We start off by simple rotations about Z-axis and progressively move to arbitrary rotations followed by a combination of coherent and stochastic error models. For the second goal, we generate numerical results for a large ensemble of noise processes belonging to more complex noise models which involve random rotations on different qubits and arbitrary CPTP maps. All the performance metrics in this paper are derived in the memory model and assume perfect syndrome extraction. Simulations with gate dependent errors can be pursued in the future.
For both the goals, it is crucial to understand how RC can be applied alongside quantum error correction in practice. We follow the methods of Ref. <cit.>. The main idea can be summarized as follows. Recall that noise tailoring by randomized compiling is achieved by inserting random Pauli gates in a circuit such that its net effect does not change the logical output of the circuit. Consequently, the average output distribution of the circuit over all possible Pauli random gates can be understood by studying the response of the original circuit against Pauli noise on the individual components. In the same spirit, we insert random Pauli gates around all the individual components of a quantum error correction circuit. There is no need to account for sources of noise in the extra Pauli random gates because they can be absorbed into the original elements of the quantum error correcting circuit. The theory of RC prescribes exponentially many compilations of the underlying circuit to achieve perfect twirling. However, in practice, only a handful compilations can be realized <cit.>. Despite this practical limitation, we assume the ideal application of RC in this paper for simplicity. We leave the details of this procedure to the appendix section <ref>.
We now have two variations of the average fidelity. First, the standard notion – average fidelity over all syndrome outcomes, r(_1), defined in Eq. (<ref>). Second, the average fidelity over syndrome outcomes as well as logically equivalent compilations of the quantum error correction circuit, which we will denote r_rc. Note that the number of random compilations for a circuit with n elements grows as (4^n). In the ideal case, where we have considered all of these compilations in r_rc(_1), it reduces to r(^T_1).
While Eq. (<ref>) addresses the logical channel of a block code, we can easily extend these definitions for a concatenated code assuming a hard decoder <cit.>. In this case, the logical channel at level-ℓ can be recursively defined in as a function whose input physical channels are the logical channels at level-(ℓ-1). We will use the notation r(_ℓ) and r(^T_ℓ) to denote the logical channels of a level-ℓ concatenated code without RC and with RC, respectively. Their ratio, denoted by δ_ℓ, where
δ_ℓ = r(_ℓ)/r(^T_ℓ),
is an indicator of the performance gain due to RC, which we will estimate for various error models. Note that δ_ℓ > 1 indicates a performance gain whereas δ_ℓ < 1 denotes a performance loss.
§ RESULTS AND DISCUSSION
This section is devoted to case studies of performance gains from RC for the concatenated Steane code, under various interesting classes of error models, and inferences we can draw from these studies. Markovian errors can be broadly classified into unital and non-unital maps. Since non-unital components of a noise map do not impact the error rate significantly <cit.>, we restrict our attention to unital maps in this paper. In particular, we choose coherent rotations which form an important class of unital maps. In practice, these typically arise from imperfect pulses used to implement quantum gates in the hardware. Interestingly, these are also the class of errors on which randomized compiling has the maximum effect of turning them into purely incoherent noise.
§.§ Rotation about Lgaxis
While we ideally want to study the impact of RC on the performance of a quantum error correcting code under general coherent errors, let us first start with a simple yet interesting model – rotations about the Z-axis. Although the RC process tailors the underlying physical noise, irrespective of the choice of the code, through this example we show that in fact the gains produced from RC can be arbitrarily increased by choosing codes of increasing distances.
Recall that the rotation about Z-axis is specified by ρ→ R_Z(ω)ρ R_Z(-ω) where
R_Z(ω) = cos (ω/2) I + i sin (ω/2) Z .
Applying the rotation independently across all n = 7 the physical qubits of the Steane code, is specified by the map
(ρ̅) = R^ n_Z(ω) ρ̅ R^ n_Z(-ω)
.
The performance of the Steane code under the above error model, can be inferred from Eq. (<ref>), where the correctable errors _ can be defined with respect to the minimum weight decoder. Explicitly enumerating all correctable errors, we find that there are 22 correctable errors of weight at most one, and 42 two-qubit ones. Since we are confined to rotations about the Z-axes, we can limit ourselves to the correctable errors of Z-type. Reserving the details of our derivation to Appendix <ref>, we find
r(_1) ≈ 63 (ω/2)^4 - 476 (ω/2)^6 + 𝒪(ω^8) .
In comparison, the logical infidelity for quantum error correction with randomized compiling is
r(^T_1) ≈ 21 (ω/2)^4 - 112 (ω/2)^6 + 𝒪(ω^8) .
Finally, the performance gain from RC quantified using the metric δ_1 defined in eq. <ref> can now be estimated as
δ_1 = r(_1)/r(^T_1)≈ 3 - 5/3 (ω)^2 + 𝒪(ω^4) .
We now show that the above modest performance gains can be made arbitrarily large by concatenating the Steane code with itself. It is possible to extend the analysis above via recursion to approximate the effective logical channel for a level ℓ concatenated Steane code for ℓ > 1. The details of this procedure can be found in Appendix <ref>. The approximate logical channel allows us to estimate the performance of level ℓ concatenated Steane code and study the impact of randomized compiling on it.
To understand the impact of RC with the number of levels, we can do a leading order analysis of the recursive relations used to construct the average logical channel, described in Appendix <ref>. We find that for small rotation angle ω, the average infidelity of the logical channel scales as
r(_ℓ) ≈ 63^2^ℓ - 1 (ω/2)^2^ℓ + 1 ,
r(^T_ℓ) ≈ 21^2^ℓ - 1 (ω/2)^2^ℓ + 1 .
Subsequently, the scaling of gain δ_ℓ with the levels of concatenation is given by
δ_ℓ≈ 3^2^ℓ - 1 - (5×2^l-1×3^2^l-3) ω^2 + O(ω^4) .
Figure <ref> corroborates this scaling law for the exact value of the logical error rates of the concatenated Steane code, in other words, showing that log(log(δ_ℓ))) is approximately a linear function of ℓ. Note that the above analysis is accurate for small rotation angles.
Varying the rotation angles leads us to another important discovery. Figure <ref> shows the gains from randomized compiling for a range of rotation angles for levels 1 ≤ℓ≤ 5. The gains from RC grow significantly with increase in number of levels of the code. The figure suggests the presence of a threshold rotation angle ω_⋆ below which arbitrary gains from RC can be achieved by increasing the size of the code (levels of concatenation). On the contrary, for rotations ω > ω_⋆, the trend reverses.
We now turn to more general noise models, where we will find that the presence of a threshold in the case of rotations about the Z-axis, extends to the general case.
§.§ Rotation about an arbitrary axis
While the above analysis considered coherent error models described by rotations about the Z-axis, it is straightforward to apply these ideas to rotations about any of the Pauli axes. We now investigate average gains due to RC for a rotation about an arbitrary axis.
We consider a general error model where the physical qubits of a code undergo rotations about an arbitrary axes of the Bloch sphere, described by the unitary matrix U, i.e., (ρ̅) = U^⊗ nρ̅ (U^†)^⊗ n. The following parameterization for U <cit.> is useful for our analysis:
[ cos(ω/2) + i sin(ω/2) cos(θ) i e^-iϕsin(ω/2) sin(θ); i e^-iϕsin(ω/2) sin(θ) cos(ω/2) - i sin(ω/2) ].
where 0 ≤θ≤π and 0 ≤ϕ≤ 2 π define the axis (in polar angles) about which each qubit is rotated, and ω gives the magnitude of the rotation. For example, θ = ϕ = 0 can be identified with rotations about the Z-axis. The performance gain from RC can be defined following Eq. <ref>, as a function of the parameters δ(θ, ϕ, ω). The average gain for an unknown axis is computed as
δ_ℓ(ω) = 1/2 π∫_0^2π dϕ∫_0^πsin(θ) dθδ_ℓ(θ,ϕ, ω) ,
for ℓ = 1. Likewise, for concatenated codes, δ_ℓ denotes the average gain in performance for level ℓ. This is similar to the conclusion drawn for the case of rotations about the Z-axis. First of all we see that for all coherent errors RC improves the performance of the Steane code. Furthermore, performance gains are largest for coherent errors that correspond to rotations about the X,Y or Z axes.
Using the general techniques developed in the appendix to approximate the effective logical channel of a level-ℓ concatenated code, we can estimate the gains δ_ℓ in average performance due to RC over the various rotation axes. Similar to the case of Z-rotations, Fig. <ref> suggests the presence of a threshold ω_⋆ wherein for rotation angles ω≤ω_⋆ the gains can be arbitrarily increased by choosing codes of larger distance, whereas the trend reverses for ω > ω_⋆.
Note that threshold angle ω_⋆ for rotations about an unknown axis is higher the threshold for rotations about the Z-axes, i.e., ω_⋆ > ω_⋆. This can be explained as follows. In the case of a generic non-Pauli axis, the twirled noise model, i.e., is in the presence of RC, is composed of a probabilistic mixture of X, Y and Z type errors. Whereas, in the case of a fixed Pauli axis, we only have errors of one type (either X, Y or Z). For a fixed error budget, specified by fidelity, the case of a non-Pauli axis results in the error strength spread over a larger number of correctable errors than the case of a fixed Pauli axis which would include relatively higher weight Pauli errors of one type. Hence, the Steane code has better error correction capability. Figure <ref> provides evidence to our argument by showing that the threshold angle for performance gains from RC under rotations about various axes, is higher for non-Pauli axes compares to the Pauli ones. As a consequence, we also note that for rotation angles ω_⋆ < ω < ω_⋆, the largest gains from RC are achieved for rotations axes that lie between the X, Y and Z axes as opposed to the individual Pauli axes.
§.§ Composition of coherent and stochastic map
So far, we have shown that RC always improves the performance of quantum error correcting codes under coherent errors. Generic unital maps can be approximately described as a composition of a coherent error and a Pauli error model <cit.>. In what follows, we consider a more general unital map where we model coherent errors in a similar fashion as in the previous section and for Pauli errors, we choose the depolarizing error model, i.e.,
≃ (_dep∘_coh)^⊗ n,
where
_coh(ρ) = U ρ U^†,
_dep(ρ) = (1-p) ρ + p/2𝕀.
and U can be parameterized using Eq. (<ref>). In what follows, we will study the impact of RC under the approximation given by Eq. (<ref>). Note that both the coherent as well as the incoherent parts of the error model contribute to the strength of noise, for instance, the average gate fidelity. While RC only affects the coherent part of the error process, we expect that for a fixed noise strength, the performance gain due to RC under the error model described above will diminish with increasing p. This expectation is supported by the numerical simulations presented in Fig. <ref>, where we present numerical estimates of δ_ℓ(ω,p) for several depolarizing strengths p. Here, δ_ℓ(ω,p) is defined analogous to Eq. (<ref>) as
δ_ℓ(ω,p) = 1/2 π∫_0^2π∫_0^πδ_ℓ(θ, ϕ, ω, p) sin(θ) dθ dϕ .
Note that in all of the error models considered so far, we have only observed gains in performance due to RC. However, amongst the most general CPTP maps including the unital as well as non-unital types, we have identified cases under which RC can lead to a loss in the performance. Some examples of these maps are mentioned in Appendix <ref>.
§ CONCLUSION
The application of randomized compiling in fault tolerance is attractive for two reasons. First, amongst the exponentially growing number of parameters controlling a physical noise process, RC effectively eliminates the impact of most of them on a QEC scheme. Second, since RC removes multiple noise sources, we expect the code to perform better. This paper provides concrete evidence to show that RC improves the performance of quantum error correction under a wide class of coherent errors. We have identified noise regimes where gains are drastic for the case of concatenated Steane codes. In particular, it grows doubly exponentially with the number of levels, under small rotations about a Pauli axis. Our results can be extended to guarantee performance gains under generic unital noise processes, leveraging tools from <cit.> that approximate a unital noise process as a composition of a coherent and an incoherent error model. These observations strengthen the need for active noise tailoring methods as a crucial component of a fault tolerant scheme.
Performance gains offered by RC also depend on the strength of errors affecting the physical qubits. We stumbled upon an interesting observation that indicates gains decrease when the amount of coherent rotation error passes beyond a threshold value. To the best of our knowledge a threshold of this nature hasn't been reported in earlier works. The threshold helps estimate the maximum possible noise that can be alleviated on a hardware device by leveraging RC tools. We also carried out extensive studies to analyze the variation of this threshold with the features of the underlying coherent error model.
Beyond the paradigm of identical unital maps across all physical qubits, we argue that unilateral conclusions about performance gains due to RC cannot be made, i.e., it depends strongly on the microscopic details of the underlying physical noise process. Our arguments are strengthened by numerical studies of complex physical noise processes that revealed some cases where the code's performance can also degrade in the presence of RC. In Ref. <cit.>, it was shown that twirled noise processes may improve or degrade thresholds depending on the decoding algorithm used. In this paper we arrive at a similar conclusion by exploring different error models for the minimum weight decoder.
Obtaining efficiently computable estimates for performance gains due to RC in different experimental setups would be crucial to optimizing fault tolerance resources in near-term applications. In the absence of exact values, it would be useful to provide bounds for the impact of RC on the code’s performance. Although RC's impact on performance depends strongly on the underlying noise process, it is still interesting to see that it can provide significant gains for a wide variety of realistic error models and relevant error regimes.
To ensure a performance gain from a noise tailoring technique, such as RC, ideally, we want to cancel the impact of those terms in the underlying noise process, which correspond to uncorrectable errors – since these add to the logical infidelity. It would be worthwhile to explore ways of controlling physical noise sources to ensure that RC always offers a gain in performance. It would also be interesting to explore different Twirling gate sets that can tailor the noise process to suppress terms that contribute negatively to the logical channel’s fidelity. Although we identified a handful of cases where a performance loss is observed, it will be noteworthy to develop cheap experimental protocols to ascertain whether performing error correction with RC will be significantly beneficial for a given device.
This research was undertaken thanks in part to funding from the Canada First Research Excellence Fund. Research was partially sponsored by the ARO and was accomplished under Grant Number: W911NF-21-1-0007. SDB acknowledges support from the Australian Research Council (ARC) via the Centre of Excellence in Engineered Quantum Systems (EQuS) project number CE170100009.
§ LOGICAL FIDELITY CALCULATION FOR ROTATION ABOUT Z-AXIS
In this appendix section, we will derive the logical performance of Steane code under a unitary noise process described by a small over-rotation about the Z-axis, i.e. (ρ) = R_Z(ω)ρ R_Z(-ω) where
R_Z(ω) = cos (ω/2) I + i sin (ω/2) Z .
Recall that the Steane code is a [[n,k]] quantum code with n = 7, k = 1, whose encoded states are fixed by the Stabilizer group generated by n-k generators:
= ⟨ ZZZZIII, ZZIIZZI, ZIZIZIZ, XXXXIII, XXIIXXI, XIXIXIX⟩ .
The effect of the unitary noise in eq. <ref> on each of the n qubits in the encoded state can be written as
^n(ρ̅) = R^n_Z(ω) ρ̅ R^n_Z(-ω)
= ∑_w ∈^2n_2 (-1)^∑_j=n+1^2n w_j (cos(ω/2))^2n-|w| (i sin(ω/2))^|w| (_j=1^n Z^w_j) ρ̅ (_j=n+1^2n Z^w_j) .
where |w| is the Hamming weight of the binary sequence w ∈^2n_2.
To understand the effect of RC on performance, we need to estimate the total contribution to logical fidelity from terms in the noise process whose effect is rendered useless by RC. Since the noise model in eq. <ref> only applies Z-type errors, it suffices to consider the effect of correctable errors E and E^' that are purely Z-type, besides the identity. In other words, E, E^'∈⟨ Z_1, Z_2, …, Z_n⟩. Table <ref> shows the contribution to the logical fidelity that is eliminated by RC. Each of the four rows in the table is associated with a χ-matrix element of a particular form, labelled by γ_i for 1≤ i ≤ 4.
Table <ref> provides all the ingredients necessary to compute the logical infidelity of the Steane code under the RC setting:
r(^T_1) = 1 - (κ_1 + 7 κ_2 + 7 κ_3 + 7 κ_4) ,
= 1/512 (256 - 231 cos(ω) - 49 cos(3 ω) + 21 cos(5 ω) + 3 cos(7 ω)) .
Note that the coefficient appearing alongside each ϕ_i in eq. <ref> corresponds to its multiplicity, i.e., the number of combinations of errors E, E^' that result in the same value of ϕ_i. In the absence of RC, the logical infidelity can be calculated using both tables <ref> and <ref>:
r(_1) = 1-(κ_1 + 7 κ_2 + 7 κ_3 + 7 κ_4 + 14 γ_1 + 14 γ_2 + 42 γ_3 + 14 γ_4) ,
= 1/64 (32 - 21 cos(ω) - 14 cos(3 ω) + 3 cos(7 ω)) .
The above expressions describe the logical infidelities for level-1 concatenated Steane code in the RC and non-RC settings. The gain δ_1 can be calculated as the ratio of the above quantities. The appendix section <ref> discusses the recursion to compute the average logical channel for level-ℓ concatenated Steane code followed by the computation of the different metrics at level-ℓ.
§ LOGICAL CHANNEL FOR THE CONCATENATED STEANE CODE
In this appendix section, we will describe the computation of the average logical channel for the level-ℓ concatenated Steane code under rotations about the Z-axis described in section <ref>. Ideally, we would like to take an exact average over conditional channels corresponding to all possible syndromes of the level-ℓ concatenated Steane code. However, the number of syndromes and hence the number of conditional channels grow exponentially with the number of physical qubits and the analysis becomes intractable beyond a few levels. Instead, in this section we compute an approximation wherein we recurse over the individual entries of the level-1 logical channel to arrive at the level-ℓ logical channel. We will achieve this in two broad steps:
* Computation of level-1 logical channel.
* Establish a recursion to compute level-(ℓ+1) from level-ℓ logical channel.
For a given noise process , we refer to its χ-matrix as χ() and the corresponding logical χ-matrix as χ(_1). The following equation prescribes a way to calculate the entries of χ() from χ() <cit.>.
χ(_1)_l,m = ∑_E,E^'∈_C
s(E) = s(E^') , E = E^'ϕ(E, l) ϕ^⋆(E^', m) χ_E P_l,P_mE^' .
where _C refers to the set of correctable errors, P_i denotes the logical version of Pauli P_i, and R_s(E) |E P_l| = ϕ(E,l) S |P_l|, for l ∈{0,1,2,3}, any Pauli error E and some stabilizer S. Here |P| stands for the bare Pauli without any associated global phase. Note that, since the error model is a rotation about the Z-axis, we have _C = ⟨{S_j Z_i : 1 ≤ i ≤ n , S_j∈_Z}⟩. Here Z_i refers to a single qubit Z error on qubit i and _Z = ⟨ ZZZZIII, ZZIIZZI, ZIZIZIZ ⟩.
It is easy to see that the average logical channel for the level-ℓ concatenated Steane code χ(_ℓ) takes the form <cit.>:
χ(_ℓ) = [ [χ(_ℓ)]_0,0 0 0 [χ(_ℓ)]_0,3; 0 0 0 0; 0 0 0 0; ([χ(_ℓ)]_0,3)^* 0 0 1-[χ(_ℓ)]_0,0 ],
where ([χ(_ℓ)]_0,3)^* denotes the complex conjugate of [χ(_ℓ)]_0,3.
First, we compute the entries for the level-1 matrix χ(_1). Using Table <ref>, we have
[χ(_1)]_0,0 = κ_1 + 7 ∑_i=1^3 ϕ_i + 28 χ_3 + 14 ∑_j=1^4 χ_j ,
= 1/64 (21 cos(ω)+14 cos(3 ω)-3 cos(7 ω)+32) .
Table <ref> provides all the ingredients necessary to compute [χ(_1)]_0,3. Taking into account the multiplicities of terms of each kind, we have
[χ(_1)]_0,3 = ζ_1 + 42 ζ_4 + 7 ∑_i=2^8 ζ_i ,
= -1/8 i sin^3(ω) (9 cos(2 ω)+3 cos(4 ω)+2) .
In the second step, we establish a recursion to compute the individual entries of χ(_ℓ) from the entries of χ_ℓ-1() under hard-decoding algorithm. After massaging the expressions in equations <ref> and <ref>, we observe that
[χ(_ℓ+1)]_0,0 = f_0,0([χ(_ℓ)]_0,0), and
[χ(_ℓ+1)]_0,3 = f_0,3([χ(_ℓ)]_0,3),
where
f_0,0(z) = z^2 (63 - 434 z + 1260 z^2 - 1848 z^3 + 1344 z^4 - 384 z^5), and
f_0,3(z) = -2 z^3 (7 + 84 z^2 + 192 z^4).
Combining the above two steps, we compute all the entries of [χ(_ℓ+1)].
For small rotation angle ω, we observe from equations <ref> and <ref> that upto leading order
[χ(_ℓ)]_0,0 ≈1 - 63^2^ℓ- 1 (ω/2)^2^ℓ+1, and
[χ(_ℓ)]_0,3 ≈- i 14^3^ℓ- 1/2 (ω/2)^3^ℓ.
Note that with increase in number of levels ℓ, for small angle ω, [χ(_ℓ)]_0,0→ 1 and [χ(_ℓ)]_0,3→ 0. This is expected because for small angles, the channel is close to the identity channel and the error correction procedures is able to correct all the errors. Also, note that the off diagonal entry approaches 0 faster than the diagonal entry approaches 1. This is a consequence of the process of error correction decohering the physical channel <cit.>.
Now, we compute the logical χ-matrix corresponding to the noise process under RC i.e. χ(^T_ℓ). The matrix in this case takes the form:
χ(^T_ℓ) = [ [χ(^T_ℓ)]_0,0 0 0 0; 0 0 0 0; 0 0 0 0; 0 0 0 1-[χ(^T_ℓ)]_0,0 ].
Similar to the nonRC case, we first compute the entries for the level-1 matrix χ(^T_1). Using the ingredients from table <ref>, we have
[χ(^T_1)]_0,0 = 1/512 (256 + 231 cos(ω) + 49 cos(3 ω) - 21 cos(5 ω) - 3 cos(7 ω)) .
The recursive relation to calculate the above quantity for higher levels is given by:
[χ(^T_ℓ+1)]_0,0 = g_0,0([χ(^T_ℓ)]_0,0) ,
where
g_0,0(z) = z^2 (21 - 98 z + 210 z^2 - 252 z^3 + 168 z^4 - 48 z^5) .
For small rotation angle ω, upto leading order
[χ(^T_ℓ)]_0,0≈ 1 - 21^2^ℓ - 1 (ω/2)^2^ℓ+1 .
The above expression indicates that [χ(^T_ℓ)]_0,0→ 1 with increase in number of concatenation levels ℓ provided the angle of rotation is below the threshold.
Having arrived at an expression for the average logical channel for a level-ℓ concatenated code, we can now define the logical error rate using the infidelity and diamond distance metrics. The logical infidelity takes the simple closed form:
r_ℓ = 1 - [χ(_ℓ)]_0,0 .
§ NUMERICAL RESULTS FOR COMPLEX NOISE MODELS
In this appendix section, we will present numerical studies of the performance of concatenated Steane codes under two distinct models of general Markovian noise. The results are presented as scatter plots formatted as follows. Each point is associated to the performance of a physical noise process. While the X- coordinate is used to denote the physical error rate, its Y-coordinate denotes the ratio between the performance in the non-RC setting and the RC setting, measured by δ_ℓ in eq. <ref>. Note that RC can either improve or degrade the code's performance. We have used a dashed line at δ_ℓ = 1 to identify the breakeven region where RC has no impact on the performance. Points that lie below the dashed line, coloured in red, identify physical channels where a degradation in performance is observed. On the other hand, points in green that lie above the dashed line identify physical channels where RC provides a performance gain. The points in grey, that lie close to the dashed line should be ignored since they correspond to cases where the relative difference between the logical error rates for the non-RC and RC cases is negligible: less than 10%.
The first complex error model is a unitary model where each qubit experiences a different random rotation about an arbitrary non-Pauli axis n̂, specified by U of the form
U = e^-i π/2δn̂·σ⃗ ,
where δ is the angle of rotation. Hence, the n-qubit unitary errors in our model are of the form ⊗_i=1^n U_i, where U_i in prescribed by eq. <ref>. We control the noise strength by setting the rotation angles δ_i drawn from the normal distribution: (μ_δ, μ_δ), where 10^-3≤μ_δ≤ 10^-1. Fig. <ref> shows the performance gain metric under this error model. It demonstrates that there exist some instances where RC provides a performance gain of 10x, as well as others where RC causes a performance degradation of 10x.
The second error model is described by the i.i.d action of a random single qubit CPTP map, on each of the physical qubits of the code. The random CPTP map on a single qubit is derived from unitary dynamics U on a Hilbert space of three qubits <cit.>. The unitary matrix U is generated form a random Hermitian matrix H using U = e^-i H t, where 0 ≤ t ≤ 1 provides a handle on the strength of noise described by the resulting CPTP map. We vary the noise strength by controlling t in the range [0.001, 0.1]. Figure <ref> shows RC’s impact on the performance of concatenated Steane codes under physical CPTP maps. The absence of a clear trend showing a performance gain or degradation is evident for level-2 in fig. <ref>. Even across physical CPTP maps with similar fidelity, while for one instance, RC induces a performance gain of up to three orders of magnitude, for another, it inflicts a loss in performance of similar magnitude.
The case of level-1 performance under physical CPTP maps in fig. <ref> is rather different from the level-2 case in <ref>. Over the large ensemble of 18000 physical CPTP maps, we observe that RC always leads to performance gains for the level-1 Steane code. These performance gains can be explained as follows. First of all, a CPTP map can be well approximated by its leading Kraus operator K, which is derived from the largest eigenvector of its Choi matrix <cit.>. Furthermore, in an i.i.d physical error model, K can be expressed as a tensor product. In terms of K, the leading contributions to infidelity come from chi-matrix entries χ_i,j expressed as:
χ_i,j = (K P_i) (K^† P_j) ,
where P_i is a single qubit of one type (X, Y or Z), and P_j = P_i S for some stabilizer S, is a three-qubit error of the same type as P_i. In the low noise regime, the off-diagonal entries of K are small, especially for incoherent CPTP maps, where K is close to a Positive sem-definite matrix <cit.>. Using the fact that the trace inner product between K and the Pauli matrix Z is a real number d given by d = K_1,1 - K_2,2, we can conclude that χ_i,j in eq. <ref> for Z-type errors P_i and P_j of weights 1 and 3 respectively, is always positive. In other words, the χ_i,j∼ d^4 for some d ≪ 1. Removing such terms should degrade the performance of the code. On the contrary, removal of χ_i,j for uncorrectable errors P_i, P_j leads to performance gains. The largest of these chi-matrix entries can be identified with two Z-type Pauli errors P_i, P_j, each having weight two. This property can be associated with the fact that the Steane code is degenerate: there exists a logical operator whose weight is smaller than that of a stabilizer. Repeating a similar analysis as before, we find that the corresponding χ_i,j for these uncorrectable errors, also scale as d^4 for some d ≪ 1. Their removal leads to performance gains. Note that there are more uncorrectable errors than correctable ones and the corresponding chi-matrix elements have comparable magnitudes. Hence, we find that RC is more likely to induce performance gains. Note that higher concatenation levels of the Steane code do not correspond to degenerate codes. Hence, we cannot guarantee a performance gain or degradation in those cases, as shown in fig. <ref>
§ APPLYING RC IN A FAULT TOLERANCE SCHEME
Randomized compiling <cit.> is a technique that tailors a general Markovian noise process into an effective Pauli noise process. In this appendix section, we will briefly review how we can apply randomized compiling in a fault-tolerant setting. This procedure was first described in Ref. <cit.>.
In fault tolerant circuits, each logical gate G is sandwiched between quantum error correction () routines. Similar to Ref. <cit.>, we divide logical gates into two sets: _1 and _2, calling them easy and hard gates respectively. A requirement for _1 and _2 is
G T G^† = (T) C
for all easy logical gates C∈_1, n-qubit Pauli gates T and hard gates G. Here (T) refers to the compilation of the Pauli gate T in the routine. The above requirement can be proven to be true using results from standard randomized compiling <cit.>.
Figure <ref> shows a canonical presentation of a quantum circuit, where the k-th clock cycle is composed of an easy gate C_k and a hard gate G_k, sandwiched between routines. Noise processes affecting easy and hard gates are denoted by _1,k and _2,k respectively. These complex processes can be tailored to Pauli errors by inserting Pauli gates T_1,k, T^†_1,k,T_2,k, T^†_2,k as shown in fig. <ref>. However, to guarantee that they be applied in a noiseless fashion, we compile them into the existing gates in the fault tolerant circuit. This is achieved as follows. First T^†_1,k and T_2,k are compiled into following _1,k, resulting in (T^†_1,kT_2,k). Secondly, T^†_2,k is propagated across G_k, and compiled with C_k+1T_k+1, resulting in a dressed gate C^D_k+1 defined by
C^D_k+1 = G_k T_k G_k^†C_k+1 T_k+1 .
Using eq. <ref>, it is easy to see that C^D_k+1 is equivalent to quantum error correction followed by an easy gate.
Figure <ref> shows the result of compiling all of the twirling gates into the easy gates and quantum error correction routines. Note that the compiled circuit is logically equivalent to the original circuit in the absence of noise. However, in the presence of noise, the average output of the circuit is dictated by the performance of (T) averaged over the different choices of Pauli gates T. This is what we refer to as in the RC setting. In practice, this average performance can be achieved by repeating every iteration (shot) of the algorithm with a different Pauli operation compiled into the constituent routines. In this paper, we have used the performance of the routine under the twirled noise process as a proxy to the performance of in the RC setting, for the analytical and numerical studies.
|
http://arxiv.org/abs/2303.07074v1
|
20230313125231
|
On Lyapunov functions for open Hegselmann-Krause dynamics
|
[
"Renato Vizuete",
"Paolo Frasca",
"Elena Panteley"
] |
eess.SY
|
[
"eess.SY",
"cs.SI",
"cs.SY",
"math.OC"
] |
Spatial Attention and Syntax Rule Enhanced Tree Decoder for Offline Handwritten Mathematical Expression Recognition
Zihao Lin1 Jinrong Li2 Fan Yang1Shuangping Huang13Xu Yang4
Jianmin Lin2Ming Yang2
March 30, 2023
===================================================================================================================
In this paper, we provide a formulation of an open Hegselmann-Krause (HK) dynamics where agents can join and leave the system during the interactions. We consider a stochastic framework where the time instants corresponding to arrivals and departures are determined by homogeneous Poisson processes. Then, we provide a survey of Lyapunov functions based on global and local disagreement, whose asymptotic behavior can be used to measure the impact of arrivals and departures. After proving analytical results on these Lyapunov functions in the open system, we illustrate them through numerical simulations in two scenarios characterized by a different number of expected agents.
§ INTRODUCTION
Hegselmann-Krause (HK) model is one of the most important opinion dynamics characterized by bounded confidence interactions <cit.>. For a population of n agents indexed in a set ={ 1,…,n}, each agent i in the network holds a real-valued opinion x_i∈ and interacts with other agents only if the difference between their opinions remain inside the confidence interval of the agent, determined by a specific threshold:
ẋ_i(t)=∑_j:| x_i(t)-x_j(t)|<1 (x_j(t)-x_i(t)), for all i∈ .
Since its original formulation, several extensions of this dynamics have been considered to reproduce additional characteristics of more realistic social interactions. For instance, multidimensional dynamics has been formulated in <cit.>, heterogeneous threshold were studied in <cit.> and noisy states have been considered in <cit.>. However, changes in the set of agents have not yet been incorporated in the study of the HK dynamics.
In many social interactions, the group of individuals does not remain constant since new agents may join the system and others leave. This happens specially in interactions taking place over online platforms (Facebook, Twitter, etc.) where agents can connect and disconnect in an easy manner. A similar behavior has been observed at the level of communications networks for the control of connected vehicles <cit.>. The importance of these phenomena has been highlighted in <cit.> as an important feature that must be taken into account in the analysis of dynamic social interactions.
A multi-agent system characterized by a time-varying set of agents is called open multi-agent system (OMAS), where replacements, arrivals and departures can occur <cit.>. Depending on the type of system, different approaches may be used for its analysis, including time-invariant finite superset <cit.>, multi-mode multi-dimensional systems <cit.>, or continuum of agents <cit.>, etc.
One of the most important challenges in the study of OMAS is the definition of the graph topology during arrivals and departures of agents. In this sense, the HK model avoids any ambiguity since the network topology is automatically defined based on the states of the agents. However, even if the graph topology is well defined, it remains another important question: How to analyze OMAS when the size of the system can change? To the best of our knowledge, there are no results to handle this type of systems. Due to the time-varying dimension, trajectories cannot be well defined due to the lost of the information (departures) and new information coming into the system (arrivals). Several approaches based on the use of scalar functions independent of the dimension of the system have been considered for the analysis of OMAS <cit.>. For relatively simple systems, the choice of this scalar function is evident, as in the case of consensus where the variance is a good measure of disagreement. Nevertheless, the choice is not straightforward for more complex dynamics. For general dynamical systems, Lyapunov functions appear as a potential tool to be used in OMAS. The problem then becomes to measure the changes on properties of the Lyapunov functions due to the arrivals and departures. In the case of the HK dynamics, several Lyapunov functions have been used for the analysis of stability and some of them have completely different behaviors, such that it is possible that only few of them are suitable for the analysis in the open scenario.
Preliminary works in an open HK model have only studied the particular case of replacements where the opinion of agents change abruptly to mimic dynamic groups <cit.>. Since the problem is highly complex and asymptotic properties cannot be ensured for the trajectories, most of the previous works rely on simulations of order parameters associated with the dynamics to evaluate the performance under replacements. Regarding stability, the authors in <cit.> have considered the addition of new agents only as perturbations to analyze the stability of existing clusters (connected components).
In this paper, we present a formulation of an open HK dynamics where agents can join and leave the system according to homogeneous Poisson processes, such that the size of the system is time-varying. Based on the characteristics of the HK dynamics, we propose Lyapunov functions for the analysis of the open system, that are formulated as alternative versions of well-known Lyapunov functions for the closed system (no arrivals and departures). We perform an analysis of these functions focused on three important properties: asymptotic value, continuity in time, and monotonicity in time. Finally, relying on numerical simulations we discuss the advantages and drawbacks of the Lyapunov functions in closed and open scenarios.
Outline. In Section <ref> we define the relevant Lyapunov functions and discuss their properties, while distinguishing between functions that measure global or local disagreement. In Section <ref> we extend the discussion to Open HK dynamics, by simulations. The final Section <ref> comments on the opportunities for future research.
§ LYAPUNOV FUNCTIONS IN CLOSED HK DYNAMICS
The differential equation (<ref>) usually has no differentiable solutions (classical solutions) since the right-hand side of the equation can be discontinuous when the interaction topology changes, which can prevent x from being differentiable. For this reason, we consider Carathéodory solutions of (<ref>), which correspond to solutions of the integral equation:
x_i(t)=x_i(t_0)+∫_t_0^t ∑_j:| x_i(τ)-x_j(τ)|<1 (x_j(τ)-x_i(τ)) dτ,
for all i∈. The set of equilibria of (<ref>) is known to be
F={x∈ℝ^n: for every (i,j)∈×,
either x_i=x_j or | x_i-x_j|≥ 1}
and the following convergence result is available.
For almost every initial condition, there exists a solution for (<ref>) that converges to a limit x^*∈ F.
In this work, we consider that all the initial states of the agents x_i(t_0) belong to an interval [a,b]: due to the characteristics of the HK dynamics, they will remain inside this interval during the evolution of the dynamics.
Due to the existence of temporary clusters in the HK dynamics, we will analyze two types of Lyapunov functions based on disagreement of the states: we refer to global disagreement when the states of the agents are compared with all the other agents in the system independently of the clusters, and local disagreement when the state of the agents are compared only with the states of the agents in the current clusters.
§.§ Global disagreement functions
In this subsection, we consider Lyapunov functions that measure the disagreement among all the agents in the system. A natural candidate to measure the global disagreement is the variance, defined as:
U_0(x):=1n∑_i=1^n (x_i-x̅)^2,
where x̅=1/n∑_i=1^n x_i is the average value. This function has been used to prove stability of the equilibria set (<ref>) in <cit.>.
Similarly to the variance, we can also define the disagreement function between all the agents of the system through the function:
V_0(x):=1n^2∑_i,j=1^n(x_i-x_j)^2.
Additionally, we introduce another classical Lyapunov function, which has been used in <cit.>:
T_0(x):=12n∑_i=1^n x_i^2=1/2nx^2,
where · denotes the Euclidean norm.
Even if it might not be apparent that T_0(x) measures disagreement, it is formulated in terms of global information of the system and, as the following simple result shows, its behavior is equivalent to the functions (<ref>) and (<ref>).
For the Lyapunov functions (<ref>), (<ref>) and (<ref>), we have:
V_0(x)=2U_0(x)=4T_0(x)-2x̅^2.
First, we find an equivalence between the functions U_0(x) and T_0(x):
U_0(x)
=1n∑_i=1^n(x_i^2-2x_ix̅+x̅^2)
=1n(∑_i=1^nx_i^2-2x̅∑_i=1^n x_i+∑_i=1^nx̅^2)
=1n(∑_i=1^nx_i^2-2(nx̅)x̅+nx̅^2)
=2T_0(x)-x̅^2.
Next, we find an equivalence between the functions V_0(x) and U_0(x):
V_0(x)
=1n^2∑_i,j=1^n(x_i^2-2x_ix_j+x_j^2)
=1n^2(n∑_i=1^nx_i^2-2(∑_i=1^n x_i)(∑_j=1^n x_j)+n∑_j=1^nx_j^2)
=1n^2(2n∑_i=1^n x_i^2-2n^2x̅^2)
=2U_0(x),
which yields the desired result.
The non-increase in time of U_0(x(t)) and T_0(x(t)) have been proved in <cit.> and <cit.> respectively.
In addition to the previous functions, we also introduce the following Lyapunov function that has been proposed in <cit.> for a generalized model of the HK dynamics:
W_0(x):=1/n^2∑_i,j:x_i-x_j<1x_i-x_j^2+∑_i,j:x_i-x_j≥ 11.
This function is composed by two sums, where the first sum measures the disagreement among the agents that interact, and the second sum counts the agents that do not interact. The first term is thus a measure of “local” disagreement: as such, it will be studied in the next section (where it will be denoted as V). The second term, however, renders it dependent on global information and thus a measure of global disagreement. Function W_0(x(t)) is continuous but, unlike the previous functions in this section, W_0(x(t)) is not differentiable along the trajectories of (<ref>). Further properties of W_0 can be deduce from the properties of V studied below.
§.§ Local disagreement functions
One of the main drawbacks on the use of Lyapunov functions based on global disagreement is that even if the functions are non-increasing, their asymptotic values are not zero when the system presents several clusters[In this paper, we call clusters the connected components of the graph associated to the HK dynamics.]. We can see this behavior by analyzing the function U_0(x(t)) whose asymptotic value is given by:
lim_t→∞ U_0(x(t))=1n∑_i=1^K n_i(k_i-1n∑_j=1^K n_jk_j )^2,
where K is the final number of clusters, k_i is the final value of the agents in cluster i and n_i is the number of agents in the cluster i. In fact, we can observe that lim_t→∞U_0(x(t))=0 only when K=1, which means consensus of all the agents of the system, a not so common situation in the HK dynamics. Clearly, from Proposition <ref>, we conclude that the other two functions V_0 and T_0, do not converge to zero. Similarly, if at the end, we have agents in different clusters, the sum ∑_i,j:x_i-x_j≥ 11≠ 0 in the function W_0(x(t)).
In the context of OMAS, we would like to have functions converging to zero at least for a closed dynamics, such that any deviation from the zero value is due only to the impact of arrivals and departures. For this reason, we bring forward potential Lyapunov functions based on local disagreement.
§.§.§ Function V(x)
First, let us consider a variant of the function V_0(x) by restricting the disagreement function V_0(x) to the set D={i,j:| x_i-x_j|<1}. Then, we define the function:
V(x):=1/n^2∑_i,j:| x_i-x_j|<1(x_i-x_j)^2.
Clearly V(x)≥ 0 and it can be shown <cit.> that along the trajectories x(t) of (<ref>)
V(x(t))=-1/nddtU_0(x(t)).
Since from Theorem 2 in <cit.>, every solution x(t) converges to a limit x^*∈ F, then the function V(x(t)) converges to 0.
The function V(x(t)) can also be intuitively expressed as
V(x(t))=1/nx(t)^TL_tx(t),
where L_t is the Laplacian of the interaction graph at time t, and its k-th derivative (on its domain of definition) can be obtained to be
d^(k)/dt^(k)V(x(t))=(-2)^k/nx(t)^TL_ t^k+1x(t).
We now consider the monotonicity properties of V(x(t)).
With the exception of a countable set of times, V(x(t)) is non-increasing.
Between the times at which a topology change occurs, we have a constant number of clusters m≤ n. For each cluster we can define a function:
V_0_ℓ(x)=∑_j,k=1^c_ℓ (x_j-x_k)^2, ℓ∈{1,…,m},
where c_ℓ is the number of agents in cluster ℓ. Then, the function V(x(t)) can be expressed as:
V(x(t))=1/n^2∑_ℓ=1^m V_0_ℓ(x(t))
Since all functions V_0_ℓ(x(t)) are non-increasing (being, up to constants, disagreement functions (<ref>) restricted to the cluster), the proof is completed.
Unlike function V_0(x(t)), function V(x(t)) can be discontinuous and also not monotonic in time, because of the changes in the topology. Indeed, this function can increase during the evolution of the HK dynamics due to the switching topology, as the following example shows.
Let us consider three agents x_1, x_2, x_3 such that x_1<x_2<x_3, | x_1-x_2|<1, | x_3-x_2|<1 and | x_1-x_3| >1. In this case, agent x_1 is interacting only with agent x_2, while agent x_2 is interacting also with agent x_3. Next, we analyze the event characterized by | x_3-x_1|=1 and we denote by V(x(t^-)) the value of the function V(x(t)) before this event. In this case, the function V(x(t^-)) is given by:
V(x(t^-))=(x_1-x_2)^2+(x_2-x_1)^2+(x_2-x_3)^2+(x_3-x_2)^2.
However, after the event, when agent x_3 is inside the range of agent x_1 and all the three agents are interacting, the function V(x(t^+)) is:
V(x(t^+)) =(x_1-x_2)^2+(x_1-x_3)^2+(x_2-x_1)^2
+(x_2-x_3)^2+(x_3-x_1)^2+(x_3-x_2)^2
=V(x(t^-))+(x_1-x_3)^2+(x_3-x_1)^2
=V(x(t^-))+2.
More generally, we have that when two agents begin to interact, a new edge is added to the interaction graph, and when two agents stop interacting, an edge is removed from the interaction graph. Therefore, the changes of V(x(t)) during switching events can be expressed as:
V(x(t^+))=V(x(t^-))+2(e_a-e_r),
where e_a and e_r are the number of edges added and removed respectively during the switching event.
§.§.§ Function U(x)
Following the approach in <cit.>, we consider the spectral decomposition of the Laplacian matrix:
L=VΛ V^T.
The matrix V can be decomposed in two parts as V=[V_0,V_-] where the n× m and n×(n-m) matrices V_0 and V_- respectively, are constructed from eigenvectors corresponding to zero and negative eigenvalues respectively. Let us define the error as:
e(x):=V_-V_-^Tx,
and the function:
U(x):=1ne(x)^Te(x).
The function U(x) is such that
U(x)=1n∑_i=1^n (x_i-x̅_i)^2,
where x̅_i is the average of the states of the agents in the cluster to which x_i belongs.
By definition:
U(x)=1/nV_-V_-^Tx^TV_-V_-^Tx
=1/nx^TV_-V_-^TV_-V_-^Tx.
We use the properties V_-V_-^T=I_n-V_0V_0^T and V_-^TV_-=I_n-m to obtain:
U(x)=1/nx^TV_-I_n-mV_-^Tx
=1/n∑_i=1^nx_i^2-x^TΓ x,
where Γ is a block matrix given by:
Γ=[ Γ_1 0 ⋯ 0; 0 Γ_2 ⋯ 0; ⋮ ⋮ ⋱ ⋮; 0 0 ⋯ Γ_m ],
and each block is a matrix of ones multiplied by 1/m_i where m_i is the size of the block (cluster). Then, we have:
U(x) =1/n∑_i=1^n x_i^2-∑_j=1^m m_jx̅_j^2
=1/n∑_i=1^n x_i^2+∑_j=1^m (m_jx̅_j^2-2m_jx̅_j^2)
=1/n∑_i=1^n x_i^2+∑_i=1^n x̅_i^2-2∑_j=1^m x̅_j(m_jx̅_j)
=1/n∑_i=1^n x_i^2+∑_i=1^n x̅_i^2-2 ∑_i=1^nx̅_i x_i.
Based on this result,
we can observe that the function U(x) is a variant of the classical Lyapunov function U_0(x) in which the average value is computed only among the agents belonging to the clusters of the system.
When t→∞, the graph will be partitioned into clusters whose nodes satisfy the condition | x_i(t)-x_j(t) |<1. Since Theorem 2 in <cit.> implies that the agents in each cluster of the graph will reach consensus, we have that the value of the mean x̅_i will coincide with the value of all the agents in the cluster such that:
lim_t→∞ U(x(t))=0.
In the next proposition we provide an additional proof of the convergence of U(x(t)) based on its monotonicity in time.
The function U(x(t)) along the trajectories x(t) of dynamics (<ref>) is non-increasing for all t and
lim_t→∞U(x(t))=0.
Before presenting the proof of Proposition <ref>, we introduce the following lemma.
Let a_1, a_2,…,a_n; b_1,b_2,…,b_n be real numbers such that b_1,b_2,…,b_n>0. Then
a_1^2b_1+a_2^2b_2+⋯+a_n^2b_n≥(a_1+a_2+⋯+a_n)^2b_1+b_2+⋯+b_n,
with equality if and only if
a_1b_1=a_2b_2=⋯=a_nb_n.
Let us consider the function U(x(t)) between two possible switching times of dynamics (<ref>). In this case, the function corresponds to the variance of each cluster of the graph, which is non-increasing. Now, we examine the behavior of the function during the switching times. If the clusters remain the same during a switching time, then we have:
U(x(t^+))=U(x(t^-)).
For dynamics (<ref>), the order between agent opinions is preserved and if at some time instant the distance between two consecutive agent opinions x_i and x_i+1 is larger than or equal to 1, it remains so forever <cit.>. This implies that two different clusters cannot merge.
Next, we analyze the case when a cluster with m agents is partitioned into k clusters during a switching time. Then, before the switching event, we get:
U(x(t^-))=U^0+∑_i=1^m(x_i-1/m∑_j=1^m x_j)^2=U^0+∑_i=1^m x_i^2-1/m(∑_i=1^m x_i)^2,
where U^0 corresponds to the clusters without modification. After the switching event, we obtain:
U(x(t^+))=U^0+
∑_i=1^m x_i^2-(1/m_1(∑_i=1^m_1 x_i)^2+⋯+1/m-m_k-1(∑_i=m_k-1+1^m x_i)^2).
Then, by using Lemma <ref>, it holds:
1/m(∑_i=1^m x_i)^2≤1/m_1(∑_i=1^m_1 x_i)^2+⋯+1/m-m_k-1(∑_i=m_k-1+1^m x_i)^2,
such that:
U(x(t^-))≥ U(x(t^+)).
Since clusters are independent, if more than one cluster is partitioned during the same switching time, the inequality (<ref>) is valid for each cluster and (<ref>) is the only possible behavior for U(x(t)) during switching times.
An alternative proof of the limit of U(x(t)) can be given by using its derivative between switching times, which is negative if x(t)∉ F and zero otherwise:
d/dtU(x(t))=-nV(x(t))=-1/n∑_i,j:| x_i-x_j|<1(x_i-x_j)^2.
(Edges in a cluster)
Unlike the function V(x(t)), the addition and removal of edges between agents in the same cluster do not modify the value of the function U(x(t)).
§.§ Comparison between functions
To summarize the arguments above, we report in Table <ref> the characteristics of the functions introduced in this work. Since U_0, V_0 and T_0 are equivalent as per Proposition <ref>, we only present the characteristics of U_0. In the perspective of studying the Open HK dynamics, the ideal Lyapunov functions should have the properties of being continuous, non-increasing, and converging to zero. Inspecting the table highlights that no available function satisfy this combination of properties.
§ LYAPUNOV FUNCTIONS IN OPEN HK DYNAMICS
In the open system, the dynamics in continuous time of the agents is characterized by (<ref>), and the additional changes are due to arrivals and departures, that generate a time-varying set of agents (t).
We say that an agent j∈(t^-) leaves the system at time t if:
(t^+)=(t^-)∖{j},
where (t^-) is the set of agents before the departure and (t^+) is the set of agents after the departure of agent j. Thus, (t^+)=(t^-)-1.
We say that an agent j [The label of agent j is different from the labels of all the agents that have interacted in the system from time t_0 until time t.] joins the system at time t if:
(t^+)=(t^-)∪{j},
where (t^-) is the set of agents before the arrival and (t^+) is the set of agents after the arrival of agent j. Thus, (t^+)=(t^-)+1.
In this open system, the solution of each agent x_i satisfies
x_i(t)=x_i(t_a_i)+∫_t_a_i^t ∑_j∈(τ):| x_i(τ)-x_j(τ)|<1 (x_j(τ)-x_i(τ)) dτ,
for all t∈t_a_i,t_d_i, where t_a_i and t_d_i are the time instants of the arrival and departure, respectively, of agent i. If agent i was already present at time t_0, we consider t_a_i=t_0. If agent i never leaves the system, we consider that the solution (<ref>) is valid for all t≥ t_a_i.
To analyze this open system, we consider a stochastic setting where the time instants corresponding to arrivals and departures are determined by homogeneous Poisson processes. Following an approach similar to <cit.>, we make the following assumptions about the occurrence of departures and arrivals.
[Departure process]
The departure instant of an agent j is determined by a homogeneous Poisson process N_t^(j) with rate λ_d>0 associated with the agent. Thus, all the departure instants in the system are determined by a Poisson process N_t^(D) with rate λ_D(t)=λ_dn(t) [The global Poisson process N_t^(D) associated with all the arrivals is not homogeneous since the rate λ_D is time-varying.].
[Arrival process]
The arrival instants are determined by a homogeneous Poisson process N_t^(A) with rate λ_A>0.
During an arrival, an agent j joins the system with a state x_j determined by a random variable Θ, which takes values according to a continuous distribution with support in the interval [a,b], with mean m and variance σ^2.
In OMAS, the size of the systems is time-varying and even if several Lyapunov functions can be used to prove stability of the HK dynamics, some of them may not be adequate to evaluate the impact of arrivals and departures. It is obvious that in OMAS, the Lyapunov functions cannot be continuous since when an agent joins or leaves the network, the energy of the system is abruptly modified, generating a jump (discontinuity).
§.§ Simulations of Open HK dynamics
We perform numerical simulations of an open HK dynamics to evaluate the behavior of the Lyapunov functions subject to arrivals and departures.
We consider a system composed by n_0=10 agents whose initial values are drawn from a uniform distribution 𝒰[0,6]. For the closed system, the number of agents is constant (i.e., n(t)=n_0 for all t) and we compute the expected values of the Lyapunov functions U_0(x(t)), U(x(t)) and V(x(t)) considering 10000 realizations of the process. Then, we perform the simulations of an open HK dynamics with λ_A=5 and two different values of λ_d. From the theory of birth-death processes, the asymptotic value of the expected number of agents is given by <cit.>:
lim_t→∞n(t)=λ_A/λ_d.
In the first scenario, we choose λ_d=0.4, which gives us lim_t→∞n(t)=12.5, such that asymptotically, the expected number of agents is greater than the initial number n_0. In the second scenario, we use λ_d=0.62, which corresponds to lim_t→∞n(t)=8.06, such that we expect a smaller average number of agents in the long run. The expectation of the Lyapunov functions are again computed over 10000 realizations of the process.
Fig. <ref> presents the trajectories of the states for one realization in the first scenario with λ_d=0.4, where we can observe the instants of arrivals and departures of agents corresponding to the appearance of new trajectories and disappearance of current trajectories respectively. For this particular realization, 19 new agents join the system and 20 departures take place, such that the number of agents at the end of the time interval considered for the simulation is 9. The initial number of clusters is 2 but new clusters appear and merge during the evolution of the dynamics, generating 3 clusters at the end. It is clear that arrivals and departures modify the number of clusters in time depending on the interval [a,b] considered for the assignment of the initial states of the interacting agents.
In Fig. <ref>, we present the simulations of U_0(x(t)), U(x(t)) and V(x(t)) in a closed and open scenario. In the left plots, we present the functions corresponding to the realization of the process in Fig. <ref>, that is with λ_d=0.4. In the case of U_0(x(t)), the discontinuities of the function are due only to arrivals and departures, while in the case of U(x(t)) and V(x(t)), the discontinuities are due to both the openness and the changes in the clusters due to the HK dynamics.
In the right plots, the solid blue line corresponds to the simulation of the expectation of the Lyapunov functions in the closed system, the dashed red line corresponds to the simulation of the open system with λ_d=0.4 and the dash-dotted yellow line corresponds to the simulation with λ_d=0.62.
Several observations can be made from these simulations.
Most importantly, the Lyapunov functions based on local disagreement, U(x(t)) and V(x(t)), have non-zero asymptotic values due to the arrivals and departures in the open scenarios, in contrast to the closed scenario. Hence, the derivation of upper bounds on their asymptotic values can be useful to evaluate the impact of arrivals and departures.
In the case of U_0(x(t)), instead, such an upper bound would not provide useful information, because a positive value of the function may correspond to a closed or an open system.
Perhaps surprisingly, the asymptotic value of the Lyapunov function based on global disagreement U_0(x(t)), can be lower for open systems. This behavior is due to the fact that the arrival of agents may help to join different clusters of agents, decreasing the value of the variance U_0(x(t)) in the system. This fact is remarkable since usually the metrics associated with a system (e.g., order parameters, Lyapunov functions, mean squared errors) that are used to evaluate its performance, exhibit a worse behavior for a time-varying set of agents (see for instance <cit.>).
§ CONCLUSIONS AND FUTURE WORK
In this paper, we introduced the problem of the HK dynamics in open multi-agent systems where agents may join and leave the network during the interactions. We formulated the problem using a stochastic setting where the arrivals and departures of agents are determined by Poisson processes. We considered several Lyapunov functions, based either on global or local disagreement, as potential tools for the analysis of this system. Finally, we provided numerical simulations for two different scenarios to show the relevance of the Lyapunov functions based on local disagreement to measure the impact of arrivals and departures in the HK dynamics.
The simulations corroborate the fact that functions based on local disagreement are promising tools to study bounded-confidence opinion dynamics in open systems.
The natural continuation of this work is the full analysis of the open HK system and, in particular, studying the asymptotic value of the Lyapunov functions through the derivation of appropriate upper bounds, depending on the arrival and departure processes. A further extension would be to analyze the performance of a social HK model where interactions are also restricted by a graph topology <cit.>, extended to the case of open systems.
IEEEtran
|
http://arxiv.org/abs/2303.07280v1
|
20230313165411
|
Vision-Language Models as Success Detectors
|
[
"Yuqing Du",
"Ksenia Konyushkova",
"Misha Denil",
"Akhil Raju",
"Jessica Landon",
"Felix Hill",
"Nando de Freitas",
"Serkan Cabi"
] |
cs.CV
|
[
"cs.CV",
"cs.AI",
"cs.LG"
] |
Align and Attend: Multimodal Summarization with Dual Contrastive Losses
Bo He^1Part of this work was done when Bo was an intern at Adobe Research., Jun Wang^1, Jielin Qiu^2, Trung Bui^3, Abhinav Shrivastava^1, Zhaowen Wang^3
^1University of Maryland, College Park ^2Carnegie Mellon University ^3Adobe Research
{bohe,abhinav}@cs.umd.edu, [email protected], [email protected], {bui,zhawang}@adobe.com
March 30, 2023
========================================================================================================================================================================================================================================================================================================================================================
§ INTRODUCTION
Being able to detect successful (i.e., preferred) behaviour is a crucial prerequisite for training intelligent agents. For example, a signal of successful behaviour is necessary as a reward for policy learning, or as an evaluation metric for identifying performant policies. As such, in this work we are concerned with developing accurate and generalisable success detectors, which classify if a behaviour is successful or not. While it is possible to engineer success detectors in specific domains, such as games <cit.> or control tasks <cit.>, in most real-world tasks they can be challenging to define. Success detection in realistic settings can be difficult not only due to challenges with identifying the environment state (e.g., detecting a particular object configuration from pixels), but also due to ambiguities about what a successful state is (e.g., subjective goals, such as “generate an entertaining story”).
One possible approach for developing success detectors is through reward modelling with preference data <cit.>. However, the trained preference models are often accurate only for the fixed set of tasks and narrow environment conditions observed in the preference-annotated training data, and thus they require extensive labour-intensive annotations for better coverage. This presents a significant bottleneck, as we would like success detectors to be able to generalise broadly – for instance, once a success detector learns what “successfully picking up a block” looks like, it should be able to detect this behaviour even if the background or agent morphology changes thanks to a semantic understanding of “picking up a block”.
Consider success detection in robotic manipulation, where tasks are specified with language instructions and observations consist of images. We posit that generalisable success detection is useful for learning generalisable policies in this domain. Here, effective success detectors should generalise to task variations along two axes. Firstly, they should generalise to language variations in the task specification. For instance, a model that is trained on detecting success for the instruction “lift a rubber duck” should also accurately measure success for “lift a toy duck object”. Secondly, success detectors should generalise to visual variations. For example, if a camera moves or additional objects are introduced in the scene, the model should still reliably detect success on accomplishing a known task. Standard reward models are typically trained for fixed conditions and tasks, and are thus unable to generalise to such variations. As such, adapting success detectors to new conditions typically requires collecting a new annotated dataset and re-training the model.
In this work, we aim to train success detectors that are robust with respect to variations in both language specifications and perceptual conditions. To this end, we leverage large pretrained vision-language models (VLMs), such as Flamingo <cit.>, as a foundation for learning success detectors. We hypothesize that Flamingo's pretraining on vast amounts of diverse language and visual data will enable learning more robust success detectors. In particular, we show that the same simple approach of finetuning Flamingo with human annotations leads to generalisable success detection across vastly different domains.
This simple approach allows us to use a unified architecture and training scheme, where we require only 1) videos describing the world state, and 2) text describing the desired behaviour or task. We reframe the problem of success detection as a visual question answering (VQA) task and refer to this formulation as SuccessVQA (Figure <ref>).
Concretely, we finetune Flamingo for success detection on three diverse domains: a simulated household <cit.>, real-world robotic manipulation, and in-the-wild egocentric human videos <cit.>. The universality of the SuccessVQA task formulation is instrumental in enabling use of the same training architecture in a wide range of tasks and environments. We demonstrate that the resulting success detectors are capable of zero-shot generalisation to unseen conditions (both in language and vision) where bespoke learned reward models fail.
§ RELATED WORK
Vision-Language Models (VLMs) Multimodal vision-language models (VLMs) have shown remarkable success in recent years, where VLMs can serve as a foundation for various tasks using language, vision, or arbitrary combinations of modalities. VLMs can be trained with contrastive objectives <cit.> and/or generative objectives <cit.>. In this work we rely on the Flamingo model <cit.>, which leverages a contrastive objective for pretraining the vision encoder on text-and-image pairs. This is combined with a frozen pretrained language model though the Perceiver Resampler and interleaved cross-attention layers, and optimized with a generative objective. We approach success detection as a closed-form visual question answering (VQA) task. However, unlike other applications of VLMs in single-image VQA tasks <cit.>, we rely on videos to specify the world state, making our work more similar to video QA tasks <cit.>. While the original Flamingo work demonstrates capabilities on video understanding, we extend this approach to training video-based reward models. Variants of our approach (e.g., by reducing the video input to a single frame) can also be applied with other VLMs built on large language models <cit.>.
Reward Modelling Reward modelling is often necessary when it is challenging to hard-code a reward function for an agent to learn from. To circumvent this, there has been a rich body of prior work on learning reward functions from data. When rewards are accessible through a simulator, one can use supervised learning to train a reward model for model-based agent learning <cit.>. However, many tasks can be difficult to simulate and hand-engineer simulated rewards for. To overcome this challenge, one can learn reward models from human data. When demonstrations of desirable behaviour are available, one can leverage inverse reinforcement learning (IRL), where the key idea is to recover a reward function that best explains expert behaviour <cit.>. However, IRL relies on access to such expert demonstrations, makes assumptions about the relationship between the expert actions and the true reward, and can be difficult to learn.
When demonstrations are difficult to acquire, a more natural way of providing human feedback is through comparative preferences that indicate the degree to which certain agent behaviour is desirable. This can be done with comparisons of whole episodes <cit.>, trajectory segments <cit.>, or even synthesized hypothetical trajectories <cit.>. These methods then fit a reward function as a preference-predictor, e.g., using a Bradley-Terry model <cit.>. Nevertheless, preferences are not always the most natural form of feedback from humans, and in many cases we would like the exploit the goal-oriented nature of many tasks we care about. In other words, sometimes it can be easier for a person to provide direct success labels or scalar rewards with respect to a given goal. This can be done online in response to observed agent actions and state transitions <cit.>. In robotics, proposed methods vary from sparse, single frame annotations <cit.> to dense, whole trajectory annotations <cit.>. In this work we learn from reward annotations, focusing on training success detectors which can be viewed as binary reward functions. Since collecting human annotations for each new task and environment can be expensive, we aim to study whether pretrained, large VLMs can enable learning more generalisable success detectors from human annotations.
Large-Scale Pretraining for Success Detectors
Our work falls under the general category of using foundation models as reward models. In language modelling, reward models are typically trained by finetuning a pretrained LLM with human preferences over LLM generations. This reward model can then be used to finetune an LLM with filtered supervised finetuning or reinforcement learning from human feedback (RLHF) <cit.>. For embodied agents, large-scale datasets of in-the-wild human videos have been used to train reward models <cit.>. Rather than using human reward annotations of agent behaviours, these methods rely on task-annotated human videos of successful behaviours. Most similar to our work, some prior approaches propose using contrastive VLMs as reward models. In simulated robot domains, <cit.> propose using CLIP <cit.> to generate task rewards from a text-based goal description and pixel observations. <cit.> leverage large-scale Minecraft data to finetune a Minecraft-specific video CLIP model for detecting alignment (i.e., reward) with text task descriptions. Our work differs in that we leverage a generative VLM built on a frozen large language model, which we hypothesize enables better language generalisation. We also apply our method to three vastly different domains, including real-world domains where ground truth rewards are difficult to obtain, and thus directly make use of human annotations.
§ SUCCESSVQA: SUCCESS DETECTION AS A VQA TASK
Our primary contribution is SuccessVQA, a framework that allows us to train multi-task success detectors by directly leveraging powerful pretrained VLMs, such as Flamingo. In SuccessVQA, the VLM is given a visual input representing the state of the world (e.g., a single image or a short video clip) and a question asking if the specified task is successfully accomplished. This problem formulation has several advantages:
* It allows us to unify success detection across domains, using the same architecture and training scheme. We consider three domains: a simulated 3D playroom used in prior research on language-conditioned interactive agents () <cit.>, real robotic manipulation, and “in-the-wild" human videos from Ego4D <cit.>.
* Relying on a pretrained vision-language model enables us to harness the advantages of pretraining on a large multimodal dataset. We hypothesize that this is the reason for better generalisation to both language and visual variations.
* The task and state specification allows us to unify treatment of success detection in tasks defined either by singular successful states or target behaviours (i.e., detecting success requires reasoning across multiple frames).
SuccessVQA Datasets
To create the SuccessVQA datasets, we use behaviour trajectories annotated by humans to indicate whether a task is completed successfully, and if so, when a success occurs. There may be multiple annotations per trajectory from different human raters. In the cases where raters disagree, success or failure is determined by a majority vote, and the median (across the raters who annotated success) of the first annotated success frame is used as the 'point of success'. All subsequent frames are also successful, unless the task is reversed (e.g. removing a gear after inserting it for the robotics domain). To generate SuccessVQA examples, a trajectory is split into non-overlapping subsequences (Figure <ref>). For simplicity, we make the clip lengths the same as the pretraining clip lengths used for Flamingo: by first creating subsequences of length 211 frames, then downsampling from 30 FPS to 1 FPS to create 8-frame subsequences. We then generate the VQA question using one of two methods. When trajectories correspond to some known task, we use the template: , for example, (see Figure <ref>, first and second rows). When no task is provided but there is a narration corresponding the actions in the clip, as in Ego4D, we use a frozen Flamingo model to rephrase the narrations into questions. For example, given a narration , we convert it to the question (see Figure <ref>, last row). Finally, the answer is generated: if the given subsequence ends in success frames, and otherwise.
Training and Evaluation
We finetune the Flamingo (3B) vision-language model on the SuccessVQA dataset for each domain. Specifically, we finetune all the vision layers (vision encoder, perceiver, and cross attention layers) and keep the language layers frozen. In the experiments we refer to this model as the . For evaluation we compute clip-level success detection accuracy against the ground truth human annotations on held-out trajectories. In the simulated household and robotics domains (Sections <ref> and <ref>) we also compute episode-level accuracy to directly compare against baseline bespoke success detection models, denoted . Note that these baselines were hand-designed independently and tuned specifically for each domain. While these models differ from Flamingo in both pretraining schemes and architecture, they represent a best attempt at designing an accurate reward model for in-distribution evaluations. Episode-level success detection is computed as follows: first, we generate subsequences from the test trajectories in the same way as during training. Next, the success detection model classifies each clip individually for success, as illustrated in Figure <ref>. We consolidate the classifications in one of two ways. 1) When the success is completely defined by the observed environment state (as in the robotics tasks), we only look at the first and the last clip of an episode. Then, the entire episode as successful if the first clip is in a failure state and the last clip is in a success state. 2) When the success is defined by a particular behaviour (as in the simulated household domain), if any subsequence in an episode is classified as success we classify the episode as successful. We report balanced accuracy on the test episodes, as there can be a large imbalance between the number of successful and failure episodes in the dataset. A random model would achieve 50% balanced accuracy.
Experiments overview
We use the SuccessVQA problem formulation to train success detectors across a diverse range of tasks in vastly different domains: simulated household or (Section <ref>), robotics (Section <ref>), and Ego4D videos (Section <ref>). We investigate whether Flamingo as a success detector model backbone enables generalisation across the following axes:
* language generalisation (Section <ref>). Can we accurately detect success for novel tasks specified with language? To answer this question, we evaluate generalisation to unseen tasks specified with language. For example, if we train on detecting success for the task , can we accurately detect success for the task ? For these experiments, we use simulated tasks in the environment where the trajectory dataset contains a large and diverse set of language-specified tasks.
* visual robustness (Section <ref>). Can we detect success in the presence of unseen visual variations? To answer this question, we evaluate success detection accuracy for a known semantic task, but in the presence of naturalistic visual perturbations. In these experiments, we use real-world robotic manipulation tasks where we introduce visual variations at test-time using different camera viewpoints and distractor objects.
We compare our model against bespoke evaluation models designed and trained specifically for each domain. We do not necessarily expect the Flamingo-based models to outperform the bespoke models in a given in-distribution scenario. Rather, we aim to investigate whether the Flamingo-based models have better robustness to both aforementioned language and visual changes, while also not requiring any domain-specific architectural or training changes. We emphasize that the benefit of SuccessVQA is the simple task formulation that can be applied across a wide range of domains and is directly amenable for use with large pretrained VLMs. Finally, in Section <ref> we show an example of an in-the-wild SuccessVQA dataset derived from Ego4D <cit.>. Initial results for success detection in this domain are promising, and we hope to encourage further work on accurate reward modelling in unstructured real-world settings.
§ LANGUAGE ROBUSTNESS WITH INTERACTIVE AGENTS ()
In this section we train and evaluate success detectors in the simulated environment, a diverse 3D house environment designed for training language-conditioned interactive agents <cit.>. The environment consists of “a randomised set of rooms, with children’s toys and domestic objects, as well as containers, shelves, furniture, windows, and doors" (see Figure 1 in <cit.>). The tasks are generated from human-human interactions in the , where a setter is instructed to provide a task via language for a solver, e.g., . Success detectors in this environment can serve as automated evaluators for trained policies.
There are two properties in this environment that are particularly challenging for automated success detection: large language variety and the environment's multi-task nature. Large language variations are present because the tasks were originally generated from human interactions, and people are likely to use diverse language to specify even semantically similar tasks. For example, the task of bringing an object to the setter can be phrased in many ways: , , . Moreover, success detection in this environment is intrinsically multi-task in its nature because: (1) there is a vast set of possible tasks that can be specified with different utterances, and (2) the behaviour of different people and trained agents can vary greatly for the same task. For automated evaluation, it is not scalable to train a new model for each language and task variation.
§.§ Methodology
Training Dataset
We use tasks and trajectories from the Standardized Test Suite (STS), designed specifically for evaluating learned Interactive Agents <cit.>. We focus on the movement-based tasks: tasks that require the solver agent to move around and interact with the environment. The STS consists of a set of "scenarios that typify the behaviour [the Interactive Agents team] wishes to evaluate" <cit.>, and various trained agent policies are tasked with accomplishing the given scenarios. These test episodes are then annotated by human raters to indicate if a task is successfully completed and if so, at which frame success occurred. We use these annotations to create a SuccessVQA dataset for finetuning and to train a model for comparison. The training set consists of STS and human interaction data collected between September 2021 to April 2022 (see Figure <ref>), 546,887 trajectories in total (1,421,111 clips).
Baseline Success Detectors
For the baseline, we use a success detection model specifically designed for the STS independently of this work. There are two types of baseline models: whole episode evaluation and autoregressive evaluation. As the whole episode model consistently outperformed the autoregressive model, in this section we only report the results from that baseline (see Appendix <ref> for additional results). This model creates a downsampled set of 32 frames from the entire evaluation episode and embeds the images with a ResNet-101. The agent input and output text are embedded using a learned text embedding. All embeddings are then concatenated together and fed to a transformer with an MLP head that predicts the likelihood the episode was successful. In addition to training on success detection, an auxiliary instruction-matching contrastive loss is applied.
Evaluation
To select the best success detection model, we use the model and checkpoint with the highest balanced accuracy on a held-out validation split from the same distribution as the training data. We then evaluate the chosen success detector model across three different test sets:
* Test 1: unseen episodes (in distribution) – a randomly held-out 10% of training dataset trajectories, which includes rephrasings of training tasks. This dataset contains 175,952 clips.
* Test 2: unseen behaviour (out of distribution agents) – trajectories generated by new agents on tasks seen in the training dataset, including rephrasings of training tasks. These agents potentially demonstrate novel behaviour. This allows us to assess success detector robustness to unseen behaviours on known tasks, which is important as it determines if we can reuse the same models even as agent behaviour evolves over time (i.e. the success detector should be accurate even when the agent solves a known task in a novel way).
This dataset contains 462,061 clips.
* Test 3: unseen tasks (out of distribution tasks and agents) – the most challenging setting: trajectories generated by new agents on new tasks not seen during training. For examples of how these tasks differ from the training set, see Table <ref>. Note that this set comprises completely new tasks as well as rephrasings of said tasks. As the tasks are new, the success detector models need to master a semantic understanding of language to properly generalise to success detection in this set. This dataset contains 272031 clips.
§.§ Experimental Results
Table <ref> presents the episode-level balanced accuracy on each test set. We find that without finetuning, the accuracy of the Flamingo model is close to random chance (see Appendix <ref> for details). This is unsurprising, as the IA domain differs greatly from Flamingo's pretraining data. With finetuning on the same training set, matches the performance of in both Test 1 (unseen episodes) and Test 2 (unseen behaviour). More importantly, in Test 3 (unseen tasks), the performance of a bespoke model drops to a random chance, while outperforms it by a significant margin (10%), see Table <ref>.
As the instructions in Test 3 are for novel tasks, not just rephrasings of tasks seen during training, this experiment demonstrates that the success detector exhibits some amount of semantic understanding of the scenes. We hypothesize that this is possible due to Flamingo's large language model backbone and web-scale pretraining. That said, there is still a large margin for improvement on the most challenging test set. For future work, it would be interesting to investigate how different model scales, dataset sizes, or cross-finetuning with different datasets can affect generalisation.
§ VISUAL ROBUSTNESS WITH ROBOTIC MANIPULATION
In this section we train and evaluate success detectors on a family of real-life robotic gear manipulation tasks with a Panda robot arm. There are six tasks corresponding to inserting or removing a small, medium, or large gear within a basket (Figure <ref>). We consider visual observations from a basket camera.
Ideally, a success detector should remain accurate under naturalistic visual changes, such as different camera view angles, lighting conditions, or backgrounds. Furthermore, as the performance of learned policies improves, we may want to introduce new objects or tasks to the environment. It quickly becomes impractical to re-annotate and re-train success detectors from previous tasks in new conditions, thus making it important to train visually robust success detectors. For example, a model that has learned to detect successful gear insertion should still be able to robustly detect success even if the basket has additional task-irrelevant distractor objects or the camera angle changes. To investigate this, we experiment with zero-shot evaluations on episodes with such visual changes.
§.§ Methodology
Training dataset
Human operators provide 101,789 demonstrations for 6 tasks using a 6DoF control device. Each episode is then annotated by humans with rewards for each task (e.g., every episode has 6 reward annotations, one for each task). Human annotators label positive rewards for all frames with a success state (i.e., if the task is solved), and zero rewards otherwise. Note that it is possible for a task to be accidentally undone in the same episode, at which point the reward annotation would revert to zero. The reward annotations and corresponding episode frames are then converted into SuccessVQA examples (see Figure <ref>). The ground truth VQA answer is obtained from the human annotations: clip answers are labelled successful if they contain only a single transition from zero to positive reward or only have positive rewards throughout, otherwise they are labelled as unsuccessful. We train a single success detector model for all 6 tasks.
Baseline Success Detector
As a baseline, we consider a ResNet-based <cit.> per-frame success classification model, tuned specifically for this task by the robotics team. The ResNet-18 is pretrained on ImageNet, and the classification layer is swapped out for a binary classification layer. We finetune a separate success classification model for each of the 6 gear tasks, with image augmentations applied during training. This is distinct from our method where we train a single multi-task model across all 6 conditions. We consider an episode successful if the first and last frames[We find that incorporating more frames does not improve episode-level accuracy.] of the episode are classified as a failure (output < 0.5) and success (output > 0.5) correspondingly. We will further refer to the baseline model as bespoke success detector ().
Evaluation
To compare against the , we look at episode-level balanced accuracy. Given an evaluation episode, we consider the episode successful under if the first clip is classified as unsuccessful and the last clip is classified as successful (see Figure <ref> in the Appendix). This matches the episode-level classification scheme of .
We conduct the evaluation on three test sets (see Figure <ref>):
* Test 1: In-domain episodes (first row),
* Test 2: Episodes with a viewpoint variation, using a different (back) camera (second row),
* Test 3: Episodes with distractor objects in the basket, but the original camera (last row).
The last two settings are designed to test the robustness of the models to naturalistic visual perturbations in the environment. The trained success detectors can then either be used as automated evaluators or reward models for agent training.
§.§ Experimental results
§.§.§ In-Domain Performance
In Test 1, we conduct an in-domain evaluation where the test set comes from the same visual conditions as the training set (see Figure <ref>, top row). The test set includes all the training episodes and an additional held out 2076 episodes.
The results in Table <ref> show that while the consistently outperforms the , the performance of the model is still comparable for the insertion task. Note that the accuracy of the Flamingo model on the remove tasks is lower, which we hypothesize is likely due to a data balancing issue. We have 5 times more training data available for insertion than removal, and training a single model across all tasks likely led to a tradeoff in accuracy between the insertion and removal tasks, which are temporal opposites of each other.
We further verify that the FT Flamingo 3B success detector can be used to train useful policies using reward-filtered behaviour cloning (BC). In filtered BC, we first use FT Flamingo 3B to classify demonstration episodes as successes or failures for a particular task. Then, we use only the episodes classified as success for BC training. Table <ref> shows the average success rates of the policies evaluated on 20 episodes with manual resets. In manual resets no extra gears are pre-inserted on the pegs for the insert task and only the one relevant gear is pre-inserted for the remove tasks. The success rates vary between 50% and 75%, suggesting that the accuracy of the success detector models is sufficient for some amount of policy training. To compare with the model, we also conduct filtered BC training with the reward model and evaluate an insert large gear policy over 100 episodes with automated resets. In automated resets, policies for different tasks are run in sequence one after another and any number of gears might be already inserted at the start of the episode, presenting a harder scenario. In this case, the success rate is 30% with is and 33% with . This provides a preliminary proof-of-concept that the difference in reward model accuracy does not lead to a large difference in policy performance. We leave more detailed policy evaluations to future work.
§.§.§ Visual Robustness
Next, we focus on testing the generalisation capabilities of success detectors. We measure zero-shot accuracy on two natural visual variations described above: Test 2 and Test 3.
In Test 2, we look at zero-shot robustness to different viewpoints (Figure <ref>, middle row). Given that the success detectors were only trained on frames from the front basket camera, we evaluate robustness by measuring success detector accuracy on episodes recorded with the back basket camera. As we can see in Table <ref>, changing the camera angle drastically hurts the quality of (accuracy decreases of 10-50 absolute percentage points) while the performance of is more stable (accuracy decreases by less than 10%). Note that in some tasks the performance of the bespoke model drops to the level of random guessing, essentially rendering the model useless for success detection. With this, FT Flamingo 3B becomes the best performing model in 5 out of 6 tasks.
Next, in Test 3 we look at zero-shot robustness in the setting where some distractor objects (two pegs and a board, see Figure <ref>, last row) are introduced. Table <ref> shows that detecting success on known tasks across this novel visual setting causes a 4-30% (absolute percentage points) drop in balanced accuracy for the bespoke model, while the accuracy mostly stays stable for the Flamingo-based models, with a 4.5% drop in accuracy at most.
These two experiments demonstrate that Flamingo-based success detection models are robust to natural visual variations. We hypothesize that the pretrained Flamingo-based success detection model is better suited to zero-shot visual generalisation than the bespoke baseline reward model, as Flamingo is pretrained on a diverse set of visual data with corresponding language grounding. While the baseline model was also pretrained and used image augmentations during task finetuning, it was not exposed to such a diverse set of visual data or language. Large-scale diverse pretraining might contribute to better semantic tasks recognition under naturalistic visual changes. These encouraging results suggest that pretrained VLM-based success detectors are likely better suited to the real-world tasks involving unstructured, open, and evolving settings.
§ REAL WORLD SUCCESS DETECTION WITH EGO4D
In this section we describe creating a SuccessVQA dataset using “in-the-wild" egocentric videos of humans performing tasks. This present a much more diverse setting than the prior two domains, in both visuals and language. We construct this dataset using annotations from the Ego4D dataset <cit.>, where unlike prior benchmarks in action recognition, the focus is on detecting a temporal point of success for a given action. It is an example of a realistic, unstructured setting where the ground-truth success labels can be obtained only from human annotations. While the success detector model shows initial promising results, our experiments show that the benchmark is nonetheless very challenging with much room for future progress.
Ego4D is a publicly available dataset of egocentric human-in-the-wild videos. The videos show people executing common tasks (e.g., washing dishes, cleaning cars, gardening). To generate “successful" and “unsuccessful" action sequences, we make use of annotations from the Ego4D Forecasting + Hands & Objects (FHO) dataset, where corresponding narrations describe the actions of the camera wearer in the videos. Additionally, critical state changes are annotated: “how the camera wearer changes the state of an object by using or manipulating it–which we call an object state change” <cit.>. Each narration is centered on an 8-second clip, which is further annotated with action verbs, object nouns, and state change types corresponding to the narration and clip, as well as the critical frames PRE, Point of No Return (PNR), and POST for indicating when the state change has occurred. The PNR frame annotates the start of the state change, the PRE frame indicates a point before the state change, and the POST frame is a point after the state change is completed.
We propose using the critical frame annotations as annotations of “success" for the behaviour described in the narration. Specifically, we treat PNR frame as a point at which “success" occurs. To generate a negative example for a clip, we use the frames in the 8-second clip prior to the PRE frame. These frames do not contain the point of success, but they often demonstrate the beginning of the relevant action. We then generate the questions for SuccessVQA by rephrasing the narrations into questions using Flamingo, as shown in Figure <ref>.
Unlike the and robotics domains where there is only one relevant task per episode, a single Ego4D “episode" (i.e. video) can have multiple narrations corresponding to different actions. Thus, instead of episode-level accuracy we evaluate success detection accuracy on clips taken from held out videos. In our experiments, finetuned on the SuccessVQA dataset attains 99% training balanced accuracy and 62% test set balanced accuracy. For context, zero shot and 4-shot Flamingo models only achieve 50% and 52%.
That is, without finetuning, the Flamingo model is not capable of detecting success. Providing a few examples with few-shot prompting improves performance, but very slightly. However, finetuning Flamingo on the in-domain Ego4D SuccessVQA examples achieves a significant improvement over random chance. That said, there is still a large gap between train and test performance. We find that it is currently difficult to generalise to completely unseen videos and language tasks, so this domain provides an exciting avenue for future work.
§ CONCLUSION
In this work we propose SuccessVQA – a reformulation of success detection that is amenable to pretrained VLMs such as Flamingo. We investigate success detection across a wide range of domains: simulated language-conditioned interactive agents, real-world robotic manipulation, and “in-the-wild" human videos. We find that the pretrained VLM has comparable performance on most in-distribution tasks, and increased robustness across language and visual changes compared to task-specific reward models, and emphasize that our contribution is a more universal success detection task formulation that can be applied easily across vastly different domains. VLMs can be used as policies, see e.g., <cit.>, but in this work we have demonstrated that there is also great value in using them as reward models. In contrast to VLMs as policies, VLMs as rewards focuses on the `what to do' and not on `how to do it'. We therefore expect such models to transfer more easily than policies when the same task can be accomplished in many ways, and where fine visual details are not necessary (e.g., grasp angle for fine motor control).
That said, this method has some limitations. There still exist some gaps between the Flamingo-based reward models and the bespoke reward models in our experiments, especially in some tasks in the robotics environment. Furthermore, inference with a larger VLM is expensive, making online success detection challenging. Lastly, we find that finetuning on a sufficient amount of in-domain data is necessary for robust success detection, as zero-shot or few-shot performance is not sufficient yet. Nonetheless, we are optimistic that further progress on broadly improving VLMs will result in more accurate few-shot success detection.
To address the limitations of the current approach, improving inference speed or distillation to a smaller model can help with efficient online success detection. Before deployment as a reward model for learning policies, we need further investigations into model accuracy and thorough characterizations of the effects of false positives and false negatives. So far we have experimented with a Flamingo 3B, but larger models might bring further improvements in robustness and generalisation. Another interesting avenue would be to investigate the practicality of in-domain few-shot generalisation to novel tasks (e.g., train on `insert gear' tasks, then detect success on `remove gear' after prompting with a few examples). An interesting question is when to choose few-shot or finetuning and how to combine the two. The shared SuccessVQA format can enable shared finetuning across different datasets (e.g., combining Ego4D SuccessVQA and VQAv2 <cit.>) to study the impact of cross-task transfer. Lastly, the flexibility in input format of VLM models allows us to consider success detection tasks where the task is specified visually (e.g., with a goal image) or the state is described in language (e.g., a dialogue agent) in the same framework as the current work.
§ ACKNOWLEDGEMENTS
We would like to thank Olivia Watkins and Antoine Miech for careful proofreading of the paper and detailed comments. We would also like to thank the DM Robotics Team, the Interactive Agents team, and the Flamingo team for insightful discussions and research support.
§ SIMULATED HOUSEHOLD DOMAIN
To evaluate agent policies on the standardized set of scenarios (STS), each agent is first given a period of context to replay up to a "continuation point", after which the agent policy is used to complete the trajectory. Each continuation is then evaluated offline by human annotators as either successful or failure, along with the point at which success or failure occurs. These human annotations are then used to rank agent policies, using the proportion of successful annotations they receive. For more details on the evaluation procedure, see <cit.>.
§.§ Baseline Evaluation Models
While human evaluations provide the ground truth signal for assessing agent capabilities, the cost of annotations scales directly with the number of evaluations for each new task and agent. Thus, there has been interest in automating the evaluation protocol to enable evaluation to scale over time. Ideally, an automated evaluation model will condition on an episode of agent behaviour and the input task utterance, and output a classification whether or not the task is successful.
Currently two baseline evaluation models have been developed for the STS: whole-episode and autoregressive models. In both cases, the reward annotations for a particular episode are aggregated using majority voting.
Whole episode evaluation models.
For these models, we first preprocess an STS episode by downsampling it to 32 frames and tokenizing the text instruction and agent responses. The images are then embedded with a ResNet-101, the input and output text are embedded, and these embeddings are concatenated together and fed to a transformer with 16 layers and 16 attention heads. The transformer output is fed through two MLP heads: one to predict the likelihood of the episode being successful, P(success), and an auxiliary contrastive loss, P(matching). P(success) is supervised with the aggregated reward annotations, and P(matching) is trained to predict whether an instruction matches the episode or has been shuffled.
Autoregressive evaluation models.
The autoregressive evaluation models use the same architecture as the Playhouse agents, which takes inputs on a per-frame basis, rather than at the episode level. The model embeds the images and language for each frame, passes the embeddings to a multimodal transformer followed by an LSTM, and is asked to predict success or no-success on a per frame basis. The success of an entire episode is then determined by whether or not any single frame was predicted to be successful.
§ ROBOTICS DOMAIN
§.§ Ground truth in robotics domain
Figure <ref> shows how the ground truth success and failure labels are assigned to the full episodes. For an episode to be successful, it must start in a failure state and terminate in a success state.
§.§ Data Efficiency in robotics domain
We investigate whether the pretraining used for Flamingo makes it more amenable to accurate success detection in the lower-data regime. For this set of experiments, we train on only 100-200 episodes (100x less than the tens of thousands of episodes used in the above experiments) per task and evaluate on the same in-domain test set. As shown in Table <ref>, for five of the six tasks the Flamingo-based model is less affected by the smaller dataset than the ResNet-based model.
|
http://arxiv.org/abs/2303.06840v1
|
20230313040642
|
DDFM: Denoising Diffusion Model for Multi-Modality Image Fusion
|
[
"Zixiang Zhao",
"Haowen Bai",
"Yuanzhi Zhu",
"Jiangshe Zhang",
"Shuang Xu",
"Yulun Zhang",
"Kai Zhang",
"Deyu Meng",
"Radu Timofte",
"Luc Van Gool"
] |
cs.CV
|
[
"cs.CV"
] |
DDFM: Denoising Diffusion Model for Multi-Modality Image Fusion
Zixiang Zhao^1,2 Haowen Bai^1 Yuanzhi Zhu^2 Jiangshe Zhang^1 Shuang Xu^3
Yulun Zhang^2 Kai Zhang^2 Deyu Meng^1 Radu Timofte^2,4 Luc Van Gool^2
^1Xi’an Jiaotong University ^2Computer Vision Lab, ETH Zürich
^3Northwestern Polytechnical University ^4University of Wurzburg
Received: date / Accepted: date
============================================================================================================================================================================================================================================================================================================================
empty
Multi-modality image fusion aims to combine different modalities to produce fused images that retain the complementary features of each modality, such as functional highlights and texture details. To leverage strong generative priors and address challenges such as unstable training and lack of interpretability for GAN-based generative methods, we propose a novel fusion algorithm based on the denoising diffusion probabilistic model (DDPM). The fusion task is formulated as a conditional generation problem under the DDPM sampling framework, which is further divided into an unconditional generation subproblem and a maximum likelihood subproblem. The latter is modeled in a hierarchical Bayesian manner with latent variables and inferred by the expectation-maximization algorithm. By integrating the inference solution into the diffusion sampling iteration, our method can generate high-quality fused images with natural image generative priors and cross-modality information from source images. Note that all we required is an unconditional pre-trained generative model, and no fine-tuning is needed. Our extensive experiments indicate that our approach yields promising fusion results in infrared-visible image fusion and medical image fusion. The code will be released.
§ INTRODUCTION
Image fusion integrates essential information from multiple source images to create high-quality fused images <cit.>, encompassing various source image types like digital <cit.>, multi-modal <cit.>, and remote sensing <cit.>. This technology provides a clearer representation of objects and scenes, and has diverse applications such as saliency detection <cit.>, object detection <cit.>, and semantic segmentation <cit.>. Among the different subcategories of image fusion, Infrared-Visible image Fusion (IVF) and Medical Image Fusion (MIF) are particularly challenging in Multi-Modality Image Fusion (MMIF) since they focus on modeling cross-modality features and preserving critical information from all sensors and modalities. Specifically, in IVF, fused images aim to retain both thermal radiation from infrared images and detailed texture information from visible images, thereby avoiding the limitations of visible images being sensitive to illumination conditions and infrared images being noisy and low-resolution. While MIF can assist in diagnosis and treatment by fusing multiple medical imaging modalities for precise detection of abnormality locations <cit.>.
There have been numerous methods devised recently to address the challenges posed by MMIF <cit.>, and generative models <cit.> have been extensively utilized to model the distribution of fused images and achieve satisfactory fusion effects.
Among them, models based on Generative Adversarial Networks (GANs) <cit.> are dominant. The workflow of GAN-based models, illustrated in <ref>a, involves a generator that creates images containing information from source images, and a discriminator that determines whether the generated images are in a similar manifold to the source images.
Although GAN-based methods have the ability to generate high-quality fused images, they suffer from unstable training, lack of interpretability and mode collapse, which seriously affect the quality of the generated samples. Moreover, as a black-box model, it is difficult to comprehend the internal mechanisms and behaviors of GANs, making it challenging to achieve controllable generation.
Recently, Denoising Diffusion Probabilistic Models (DDPM) <cit.> has garnered attention in the machine learning community, which generates high-quality images by modeling the diffusion process of restoring a noise-corrupted image towards a clean image. Based on the Langevin diffusion process, DDPM utilizes a series of reverse diffusion steps to generate promising synthetic samples <cit.>.
Compared to GAN, DDPM does not require the discriminator network, thus mitigating common issues such as unstable training and mode collapse in GAN. Moreover, its generation process is interpretable, as it is based on denoising diffusion to generate images, enabling a better understanding of the image generation process <cit.>.
Therefore, we propose a Denoising Diffusion image Fusion Model (DDFM), as shown in <ref>c.
We formulate the conditional generation task as a DDPM-based posterior sampling model, which can be further decomposed into an unconditional generation diffusion problem and a maximum likelihood estimation problem. The former satisfies natural image prior while the latter is inferred to restrict the similarity with source images via likelihood rectification. Compared to discriminative approaches, modeling the natural image prior with DDPM enables better generation of details that are difficult to control by manually designed loss functions, resulting in visually perceptible images. As a generative method, DDFM achieves stable and controllable generation of fused images without discriminator, by applying likelihood rectification to the DDPM output.
Our contributions are organized in three aspects:
* We introduce a DDPM-based posterior sampling model for MMIF, consisting of an unconditional generation module and a conditional likelihood rectification module. Sampling of fused images is achieved solely by a pre-trained DDPM without fine-tuning.
* In likelihood rectification, since obtaining the likelihood explicitly is not feasible, we formulate the optimization loss as a probability inference problem involving latent variables, which can be solved by EM algorithm. Then the solution is integrated into the DDPM loop to complete conditional image generation.
* Extensive evaluation of IVF and MIF tasks shows that DDFM consistently delivers favorable fusion results, effectively preserving both the structure and detail information from the source images, while also satisfying visual fidelity requirements.
§ BACKGROUND
§.§ Score-based diffusion models
Score SDE formulation
Diffusion models aim to generate samples by reversing a predefined forward process that converts a clean sample x_0 to almost Gaussian signal x_T by gradually adding noise.
This forward process can be described by an Itô Stochastic Differential Equation (SDE) <cit.>:
dx = -β(t)/2x_tdt + √(β(t))dw,
where dw is standard Wiener process and β(t) is predefined noise schedule that favors the variance-preserving SDE <cit.>.
This forward process can be reversed in time and still in the form of SDE <cit.>:
.9!dx = [-β(t)/2x_t - β(t) ∇_x_tlog p_t(x_t)]dt + √(β(t))dw,
where dw corresponds to the standard Wiener process running backward and the only unknown part ∇_x_tlog p_t(x_t) can be modeled as the so-called score function s_θ(x_t,t) with denoising score matching methods, and this score function can be trained with the following objective <cit.>:
𝔼_t𝔼_x_0𝔼_x_t | x_0 [s_θ(x_t, t) - ∇_x_tlog p_0t(x_t | x_0)_2^2 ],
where t is uniformly sampled over [0, T] and the data pair (x_0,x_t) ∼ p_0(x) p_0t(x_t |x_0).
Sampling with diffusion models
Specifically, an unconditional diffusion generation process starts with a random noise vector x_T ∼𝒩(0,𝐈) and updates according to the discretization of <ref>.
Alternatively, we can understand the sampling process in the DDIM fashion <cit.>, where the score function can also be considered to be a denoiser and predict the denoised x̃_0|t from any state x_t at iteration t:
x̃_0|t = 1/√(α̅_t)(x_t + (1 - α̅_t)s_θ(x_t,t)),
and x̃_0|t denotes the estimation of x_0 given x_t. We use the same notation α_t=1-β_t and α̅_t = ∏_s=1^t α_s following Ho <cit.>.
With this predicted x̃_0|t and the current state x_t, x_t-1 is updated from
x_t-1 = √(α_t)(1-α̅_t-1)/1-α̅_tx_t+√(α̅_t-1)β_t/1-α̅_tx̃_0|t+σ̃_t z,
where z∼𝒩(0,𝐈) and σ̃_t^2 is the variance which is usually set to 0.
This sampled x_t-1 is then fed into the next sampling iteration until the final image x_0 is generated.
Further details about this sampling process can be found in the supplementary material or the original paper <cit.>.
Diffusion models applications
Recently, diffusion models have been improved to generate images with better quality than previous generative models like GANs <cit.>.
Moreover, diffusion models can be treated as a powerful generative prior and be applied to numerous conditional generation tasks.
One representative work with diffusion models is stable diffusion which can generate images according to given text prompts <cit.>.
Diffusion models are also applied to many low-level vision tasks. For instance, DDRM <cit.> performs diffusion sampling in the spectral space of degradation operator 𝒜 to reconstruct the missing information in the observation y.
DDNM <cit.> shares a similar idea with DDRM by refining the null-space of the operator 𝒜 iteratively for image restoration tasks.
DPS <cit.> endorses Laplacian approximation to calculate the gradient of log-likelihood for posterior sampling and it is capable of many noisy non-linear inverse problems.
In ΠGDM <cit.>, the authors employ few approximations
to make the log-likelihood term tractable and hence make it able to solve inverse problems with even non-differentiable measurements.
§.§ Multi-modal image fusion
The deep learning-based multi-modality image fusion algorithms achieve effective feature extraction and information fusion through the powerful fitting ability of neural networks. Fusion algorithms are primarily divided into two branches: generative methods and discriminative methods.
For generative methods <cit.>, particularly the GAN family, adversarial training <cit.> is employed to generate fusion images following the same distribution as the source images.
For discriminative methods, auto encoder-based models <cit.> use encoders and decoders to extract features and fuse them on a high-dimensional manifold.
Algorithm unfolding models <cit.> combine traditional optimization methods and neural networks, balancing efficiency and interpretability.
Unified models <cit.> avoid the problem of lacking training data and ground truth for specific tasks.
Recently, fusion methods have been combined with pattern recognition tasks such as semantic segmentation <cit.> and object detection <cit.> to explore the interactions with downstream tasks. Self-supervised learning <cit.> is employed to train fusion networks without paired images. Moreover, the pre-processing registration module <cit.> can enhance the robustness for unregistered input images.
§.§ Comparison with existing approaches
The methods most relevant to our model are optimization-based methods and GAN-based generative methods.
Conventional optimization-based methods are often limited by manually designed loss functions, which may not be flexible enough to capture all relevant aspects and are sensitive to changes in the data distribution.
While incorporating natural image priors can provide extra knowledge that cannot be modeled by the generation loss function alone.
Then, in contrast to GAN-based generative methods, where unstable training and pattern collapse may occur, our DDFM achieves more stable and controllable fusion by rectifying the generation process towards source images and performing likelihood-based refinement in each iteration.
§ METHOD
In this section, we first present a novel approach for obtaining a fusion image by leveraging DDPM posterior sampling. Then, starting from the well-established loss function for image fusion, we derive a likelihood rectification approach for the unconditional DDPM sampling.
Finally, we propose the DDFM algorithm, which embeds the solution of the hierarchical Bayesian inference into the diffusion sampling. In addition, the rationality of the proposed algorithm will be demonstrated.
For brevity, we omit the derivations of some equations and refer interested readers to the supplementary material.
It is worth noting that we use IVF as a case to illustrate our DDFM, and MIF can be carried out analogously to IVF.
§.§ Fusing images via diffusion posterior sampling
We first give the notation of the model formulation. Infrared, visible and fused images are denoted as i∈ℝ^HW, v∈ℝ^3HW and f∈ℝ^3HW, respectively.
We expect that the distribution of f given i and v, , p(f|i,v), can be modeled, thus f can be obtained by sampling from the posterior distribution.
Inspired by <ref>, we can express the reverse SDE of diffusion process as:
.896!d f=[-β(t)/2f-β(t) ∇_f_tlog p_t(f_t|i,v)]dt+√(β(t)) d w,
and the score function, , ∇_f_tlog p_t(f_t|i,v), can be calculated by:
.9!∇_f_tlog p_t(f_t|i,v) =∇_f_tlog p_t(f_t)+∇_f_tlog p_t(i,v|f_t)
≈∇_f_tlog p_t(f_t)+∇_f_tlog p_t(i,v|f̃_0|t)
where f̃_0|t is the estimation of f_0 given f_t from the unconditional DDPM. The equality comes from Bayes' theorem, and the approximate equation is proved in <cit.>.
In <ref>, the first term represents the score function of unconditional diffusion sampling, which can be readily derived by the pre-trained DDPM. In the next section, we explicate the methodology for obtaining ∇_f_tlog p_t(i,v|f̃_0|t).
§.§ Likelihood rectification for image fusion
Unlike the traditional image degradation inverse problem y=𝒜(x)+n where x is the ground truth image, y is measurement and 𝒜(·) is known, we can explicitly obtain its posterior distribution. However, it is not possible to explicitly express p_t(i,v|f_t) or p_t(i,v|f̃_0|t) in image fusion. To address this, we start from the loss function and establish the relationship between the optimization loss function ℓ(i,v,f̃_0|t) and the likelihood p_t(i,v|f̃_0|t) of a probabilistic model.
For brevity, f̃_0|t is abbreviated as f in <ref>.
§.§.§ Formulation of the likelihood model
We first give a commonly-used loss function <cit.> for the image fusion task:
min_ff-i_1+ϕf-v_1 .
Then simple variable substitution x=f-v and y=i-v are implemented, and we get
min_xy-x_1+ϕx_1.
Since y is known and x is unknown, this ℓ_1-norm optimization equation corresponds to the regression model:
y=kx + ϵ
with k fixed to 1. According to the relationship between regularization term and noise prior distribution, ϵ should be a Laplacian noise and x is governed by the Laplacian distribution. Thus, in Bayesian fashion, we have:
p(x) =ℒ𝒜𝒫(x; 0, ρ) =∏_i, j1/2 ρexp(-|x_i j|/ρ),
p(y|x) =ℒ𝒜𝒫(y;x,γ)=∏_i, j1/2 γexp(-|y_i j-x_i j|/γ),
where ℒ𝒜𝒫(·) is the Laplacian distribution. ρ and γ are scale parameters of p(x) and p(y|x), respectively.
In order to prevent ℓ_1-norm optimization in <ref> and inspired by <cit.>, we give the <ref>:
For a random variable (RV) ξ which obeys a Laplace distribution, it can be regarded as the coupling of a normally distributed RV and an exponentially distributed RV, which in formula:
.887!ℒ𝒜𝒫(ξ ; μ, √(b / 2))=∫_0^∞𝒩(ξ ;μ, a) ℰ𝒳𝒫(a ; b) d a.
Therefore, p(x) and p(y|x) in <ref> can be rewritten as the following hierarchical Bayesian framework:
{[ y_i j | x_i j, m_ij∼𝒩(y_i j ; x_i j, m_ij); m_ij∼ℰ𝒳𝒫(m_ij ; γ); x_i j | n_i j∼𝒩(x_i j ; 0, n_i j); n_i j∼ℰ𝒳𝒫(n_i j ; ρ) ].
where i=1, …, H and j=1, …, W.
Through the above probabilistic analysis, the optimization problem in <ref> can be transformed into a maximum likelihood inference problem.
In addition, following <cit.>, the total variation penalty item r(x) = ∇x_2^2 can be also added to make the fusion image f better preserve the texture information from v, where ∇ denotes the gradient operator. Ultimately, the log-likelihood function of the probabilistic inference issue is:
ℓ(x) =log p(x, y)-r(x)
=-∑_i, j[(x_i j-y_i j)^2/2 m_ij+x_i j^2/2 n_i j]-ψ/2∇x_2^2,
and probabilistic graph of this hierarchical Bayesian model is in <ref>b. Notably, in this way, we transform the optimization problem <ref> into a maximum likelihood problem of a probability model <ref>.
Additionally, unlike traditional optimization methods that require manually specified tuning coefficients ϕ in <ref>, ϕ in our model can be adaptively updated by inferring the latent variables, enabling the model to better fit different data distributions. The validity of this design has also been verified in ablation experiments in <ref>.
We will then explore how to infer it in the next section.
§.§.§ Inference the likelihood model via EM algorithm
In order to solve the maximum log-likelihood problem in <ref>, which can be regarded as an optimization problem with latent variables, we use the Expectation Maximization (EM) algorithm to obtain the optimal x.
In E-step, it calculates the expectation of log-likelihood function with respect to p(a, b | x^(t), y), , the so-called 𝒬-function:
𝒬(x | x^(t))=𝔼_a, b | x^(t), y[ℓ(x)].
Then in M-step, the optimal x is obtained by
x^(t+1)=max_x𝒬(x | x^(t)).
Next, we will show the implementation detail in each step.
E-step <ref> gives the calculation results for the conditional expectation of latent variables, and then gets the derivation of 𝒬-function.
The conditional expectation of the latent variable 1/m_ij and 1/n_ij in <ref> are:
𝔼_m_ij|x_ij^(t),y_ij[1/m_ij] =√(2(y_ij-x_ij^(t))^2/γ),
𝔼_n_ij|x_ij^(t)[1/n_ij] =√(2[x_ij^(t)]^2/ρ).
For convenience, we set m̃_i j≡1 / m_ij and ñ_i j≡1 / n_i j.
From <ref> we know that m_ij∼ℰ𝒳𝒫(m_ij;γ)=Γ(m_ij;1,γ). Thus, m̃_i j∼ℐ𝒢(1,γ), where Γ(·,·) and ℐ𝒢(·,·) are the gamma distribution and inverse gamma distribution, respectively.
Then we can get the posterior of m̃_i j by Bayes' theorem:
log p(m̃_i j | y_i j, x_i j)=log p(y_i j | x_i j, m_ij)+log p(m̃_i j)
= -3/2logm̃_i j-m̃_i j(y_i j-x_i j)^2/2-1/γm̃_i j+ constant.
Subsequently, we have
.887!p(m̃_i j | y_i j, x_i j)=ℐ 𝒩(m̃_i j;√(2(y_i j-x_i j)^2 / γ), 2 / γ),
where ℐ𝒩(·,·) is the inverse Gaussian distribution. For the posterior of ñ_i j, it can be obtain similar to <ref>:
log p(ñ_i j | x_i j)=log p(x_i j | n_i j)+log p(ñ_i j)
=-3/2logñ_i j-ñ_i j x_i j^2/2-1/ρñ_i j+constant,
and therefore
p(ñ_i j | x_i j)=ℐ 𝒩(ñ_i j ; √(2 x_i j^2 / ρ), 2 / ρ).
Finally, the conditional expectation of 1/m_ij and 1/n_ij are the mean parameters of the corresponding inverse Gaussian distribution <ref>, respectively.
Afterwards, the 𝒬-function <ref> is derived as:
𝒬 =-∑_i, j[m_i j/2(x_i j-y_i j)^2+n_i j/2 x_i j^2]-ψ/2∇x_2^2
∝ -m⊙(x-y)_2^2-n⊙x_2^2-ψ∇x_2^2,
where m_ij and n_i j represent 𝔼_m_ij|x_ij^(t),y_ij[1/m_ij] and 𝔼_n_ij|x_ij^(t)[1/n_ij] in <ref>, respectively. ⊙ is the element-wise multiplication. m and n are matrices with each element being √(m_ij) and √(n_ij), respectively.
M-step Here, we need to minimize the negative Q-function with respect to x. The half-quadratic splitting algorithm is employed to deal with this problem, i.e.,
min_x,u,k ||m⊙(x-y)||_2^2+||n⊙x||_2^2+ ψ||u||_2^2,
s.t. u=∇k, k=x.
It can be further cast into the following unconstraint optimization problem,
min_x,u,k ||m⊙(x-y)||_2^2+||n⊙x||_2^2+ ψ||u||_2^2
+ η/2( ||u-∇k||_2^2+||k-x||_2^2 ) .
The unknown variables k,u,x can be solved iteratively in the coordinate descent fashion.
Update k: It is a deconvolution issue,
min_kℒ_k = ||k-x||_2^2+||u-∇k||^2_2.
It can be efficiently solved by the fast Fourier transform (fft) and inverse fft (ifft) operators, and the solution of k is
k = ifft{ fft(x)+ fft(k_h)⊙ fft(u)/1+ fft(k_h)⊙ fft(k_h)},
where · is the complex conjugation.
Update u: It is an ℓ_2-norm penalized regression issue,
min_uℒ_u = ψ||u||_2^2+η/2 ||u-∇k||_2^2.
The solution of u is
u = η/2ψ+η∇k.
Update x: It is a least squares issue,
min_xℒ_x = ||m⊙(x-y)||_2^2+||n⊙x||_2^2+η/2||k-x||_2^2.
The solution of x is
x = (2m^2⊙y+ηk) ⊘ (2m^2+2n^2+η),
where ⊘ denotes the element-wise division, and final estimation of f is
f̂ = x + v.
Additionally, hyper-parameter γ and ρ in <ref> can be also updated after the sampling from x (<ref>) by
γ = 1/hw∑_i,j𝔼[m_ij], ρ = 1/hw∑_i,j𝔼[n_ij].
§.§ DDFM
Overview
In <ref>, we present a methodology for obtaining a hierarchical Bayesian model from existing loss function and perform the model inference via the EM algorithm.
In this section, we present our DDFM, where the inference solution and diffusion sampling are integrated within the same iterative framework for generating f_0 given i and v. The algorithm is illustrated in <ref>.
There are two modules in DDFM, the unconditional diffusion sampling (UDS) module and the likelihood rectification, or say, EM module.
The UDS module is utilized to provide natural image priors, which improve the visual plausibility of the fused image. The EM module, on the other hand, is responsible for rectifying the output of UDS module via likelihood to preserve more information from the source images.
Unconditional diffusion sampling module
In <ref>, we briefly introduce diffusion sampling. In <ref>, UDS (in grey) is partitioned into two components, where the first part estimates f̃_0|t using f_t, and the second part estimates f_t-1 using both f_t and f̂_0|t. From the perspective of score-based DDPM in <ref>, a pre-trained DDPM can directly output the current ∇_f_tlog p_t(f_t), while ∇_f_tlog p_t(i,v|f̃_0|t) can be obtain by the EM module.
EM module
The role of the EM module is to update f̃_0|t⇒f̂_0|t.
In <ref>, the EM algorithm (in blue and yellow) is inserted in UDS (in grey). The preliminary estimate f̃_0|t produced by DDPM sampling (line 5) is utilized as the initial input for the EM algorithm to obtain f̂_0|t (line 6-13), which is an estimation of the fused image subjected to likelihood rectification.
In other words, EM module rectify f̃_0|t to f̂_0|t to meet the likelihood.
§.§ Why does one-step EM work?
The main difference between our DDFM and conventional EM algorithm lies in that the traditional method requires numerous iterations to obtain the optimal x, , the operation from line 6-13 in <ref> needs to be looped many times. However, our DDFM only requires one step of the EM algorithm iteration, which is embedded into the DDPM framework to accomplish sampling. In the following, we give <ref> to demonstrate its rationality.
One-step unconditional diffusion sampling combined with one-step EM iteration is equivalent to one-step conditional diffusion sampling.
The estimation of f̂_0|t in conditional diffusion sampling, refer to <ref>, could be expressed as:
f̂_0|t(f_t,i,v)=1/√(α̅_t)[f_t+(1-α̅_t) s_θ(f_t, i,v)]
= 1/√(α̅_t){f_t+(1-α̅_t)[s_θ(f_t)+∇_f_tlog p_t(i,v|f_t)]}
≈ f̃_0|t(f_t)+1-α̅_t/√(α̅_t)∇_f_tlog p_t(i,v|f̃_0|t)
= f̃_0|t(f_t)-ζ_t ∇_x̃_0ℒ_x(i,v,x̃_0).
<ref> are respectively based on the definition of Score-based DDPM, Bayes' theorem, and proof in <cit.>.
For <ref>, although optimization <ref> has a closed-form solution (<ref>), it can also be solved by gradient descent:
.88!x̂_0 = x̃_0 + ∇_x̃_0ℒ_x(k,u,x̃_0)
=x̃_0 + ∇_x̃_0ℒ_x(i,v,x̃_0)
where the second equation holds true because as the input for updating x̂_0 (<ref>), k and u are functions of i and v. ζ_t in <ref> can be regraded as the update step size.
Hence, conditional sampling f̂_0|t(f_t,i,v) can be split as an unconditional diffusion sampling f̃_0|t(f_t) and one-step EM iteration ∇_x̃_0ℒ_x(i,v,x̃_0), corresponding to UDS module (part 1) and EM module, respectively.
§ INFRARED AND VISIBLE IMAGE FUSION
In this section, we elaborate on numerous experiments for IVF task to demonstrate the superiority of our method. More
related experiments are placed in supplementary material.
§.§ Setup
Datasets and pre-trained model
Following the protocol in <cit.>, IVF experiments are conducted on the four test datasets, , TNO <cit.>, RoadScene <cit.>, MSRS <cit.>, and M^3FD <cit.>. Note that there is no training dataset due to that we do not need any fine-tuning for specific tasks but directly use the pre-trained DDPM model. We choose the pre-trained model proposed by <cit.>, which is trained on ImageNet <cit.>.
Metrics
We employ six metrics including entropy (EN), standard deviation (SD), mutual information (MI), visual information fidelity (VIF), Q^AB/F, and structural similarity index measure (SSIM) in the quantitative experiments to comprehensively evaluate the fused effect. The detail of metrics is in <cit.>.
Implement details
We use a machine with one NVIDIA GeForce RTX 3090 GPU for fusion image generation. All input images are normalized to [-1, 1]. ψ and η in <ref> are set to 0.5 and 0.1, respectively.
Please refer to the supplementary material for selecting ψ and η via grid search.
§.§ Comparison with SOTA methods
In this section, we compare our DDFM with the state-of-the-art methods, including
the GAN-based methods group:
FusionGAN <cit.>,
GANMcC <cit.>,
TarDAL <cit.>, and
UMFusion <cit.>;
and the discriminative methods group:
U2Fusion <cit.>,
RFNet <cit.>, and
DeFusion <cit.>.
Qualitative comparison
We show the comparison of fusion results in <ref>. Our approach effectively combines thermal radiation information from infrared images with detailed texture information from visible images. As a result, objects located in dimly-lit environments are conspicuously accentuated, enabling easy distinguishing of foreground objects from the background. Moreover, previously indistinct background features due to low illumination now possess clearly defined edges and abundant contour information, enhancing our ability to comprehend the scene.
Quantitative comparison
Subsequently, six metrics previously mentioned are utilized to quantitatively compare the fusion outcomes, as presented in <ref>. Our method demonstrates remarkable performance across almost all metrics, affirming its suitability for different lighting and object categories.
Notably, the outstanding values for MI, VIF and Qabf across all datasets signify its ability to generate images that adhere to human visual perception while preserving the integrity of the source image information.
§.§ Ablation studies
Numerous ablation experiments are conducted to confirm the soundness of our various modules. The above six metrics are utilized to assess the fusion performance for the experimental groups, and results on the Roadscene testset are displayed in <ref>.
Unconditional diffusion sampling module
We first verify the effectiveness of DDPM. In Exp. 1, we eliminate the denoising diffusion generative framework, thus only the EM algorithm is employed to solve the optimization <ref> and obtain the fusion image. In fairness, we keep the total iteration number consistent with DDFM.
EM module
Next, we verify the components in the EM module. In Exp. 2, we removed the total variation penalty item r(x) in <ref>. Then, we remove the Bayesian inference model. As mentioned earlier, ϕ in <ref> can be automatically inferred in the hierarchical Bayesian model. Therefore, we manually set ϕ to 0.1 (Exp. 3) and 1 (Exp. 4), and used the ADMM algorithm to infer the model.
In conclusion, the results presented in Tab. <ref> demonstrate that none of the experimental groups is able to achieve fusion results comparable to our DDFM, further emphasizing the effectiveness and rationality of our approach.
§ MEDICAL IMAGE FUSION
In this section, MIF experiments are carried out to verify the effectiveness of our method.
Setup
We choose 50 pairs of medical images from the Harvard Medical Image Dataset <cit.> for the MIF experiments, including image pairs of MRI-CT, MRI-PET and MRI-SPECT. The generation strategy and evaluation metrics for the MIF task are identical to those used for IVF.
Comparison with SOTA methods
Qualitative and quantitative results are shown in <ref>. It is evident that DDFM retains intricate textures while emphasizing structural information, leading to remarkable performance across both visual and almost all numerical metrics.
§ CONCLUSION
We propose DDFM, a novel generative image fusion algorithm based on the denoising diffusion probabilistic model (DDPM).
The generation problem is split into an unconditional DDPM to leverage image generative priors and a maximum likelihood subproblem to preserve cross-modality information from source images.
We model the latter using a hierarchical Bayesian approach and its solution based on EM algorithm can be integrated into unconditional DDPM to accomplish conditional image fusion.
Experiments on infrared-visible and medical image fusion demonstrate that DDFM achieves promising fusion results.
ieee_fullname
|
http://arxiv.org/abs/2303.07060v1
|
20230313122819
|
Parametric Estimation of Tempered Stable Laws
|
[
"Till Massing"
] |
math.ST
|
[
"math.ST",
"math.PR",
"stat.TH",
"60E07, 60G51, 62F12, 62P20"
] |
a]Till MassingFaculty of Economics, University of
Duisburg-Essen, Universitätsstr. 12, 45117 Essen, Germany.
E-Mail:
[email protected]
Parametric Estimation of Tempered Stable Laws
[
March 30, 2023
=============================================
Tempered stable distributions are frequently used in financial applications (e.g., for option pricing) in which the tails of stable distributions would be too heavy. Given the non-explicit form of the probability density function, estimation relies on numerical algorithms as the fast Fourier transform which typically are time-consuming. We compare several parametric estimation methods such as the maximum likelihood method and different generalized method of moment approaches. We study large sample properties and derive consistency, asymptotic normality, and asymptotic efficiency results for our estimators. Additionally, we conduct simulation studies to analyze finite sample properties measured by the empirical bias and precision and compare computational costs. We cover relevant subclasses of tempered stable distributions such as the classical tempered stable distribution and the tempered stable subordinator. Moreover, we discuss the normal tempered stable distribution which arises by subordinating a Brownian motion with a tempered stable subordinator. Our financial applications to log returns of asset indices and to energy spot prices illustrate the benefits of tempered stable models.
60E07;60G51;62F12;62P20
activate=true
§ INTRODUCTION
We discuss parametric estimation methods for some well-known subclasses of tempered stable distributions. Estimation relies heavily on numerical methods as the probability density function is not given in closed form. This paper aims to compare available estimation methods both from an analytical as well as from a practical point of view.
Tempered stable distribution are relevant from both a theoretical perspective and in the context of financial applications. Since tempered stable distributions are infinitely divisible, they can be used as the underlying marginal distribution for tempered stable processes. They arise by tempering the measure of stable distributions with a suitable tempering function. Tempered stable distributions were introduced in <cit.>, where the associated process was called smoothly truncated flight, which itself is a generalization of Tweedie distributions <cit.>. Since then, tempered stable distributions have been generalized in several directions by mainly generalizing the class of tempering functions. <cit.> presents a general framework for tempered stable distributions which contain the parametric subclasses to be considered in this paper. Further developments are surveyed in <cit.>.
The three subclasses we consider in this paper are the tempered stable subordinator (a one-sided distribution with finite variation), the classical tempered stable distribution (with the classical exponential tempering), and the normal tempered stable distribution (which is a normal-variance mixture with a tempered stable subordinator). The CGMY distribution <cit.> is a well-known special case of the classical tempered stable distribution which was introduced to model log-returns of stock prices. Tempered stable distributions have frequently been used for financial applications <cit.>. Furthermore, <cit.> and <cit.> propose tempered stable distributions because the tails of tempered stable distributions are not too heavy for option pricing (contrary to stable distributions).
Estimation methods for generalized tempered stable distributions are still an active area of research. We compare various well-established estimation methods in the literature. The first is the traditional maximum likelihood (ML) method, which works by numerical optimization and Fourier inversion, see <cit.>. <cit.> proves strong consistency of the maximum likelihood estimator (MLE). <cit.> propose moment methods which are easier and faster than the ML method. We also use the generalized method of moments estimator by <cit.> that is based on empirical characteristic functions and the generalized method of moments on a continuum of moment conditions by <cit.>. The latter method already turned out to be useful to estimate stable distributions, see <cit.>. Further available methods include the method of simulated quantiles <cit.>, and non- or semiparametric methods <cit.>.
This paper contributes to the literature in three ways. First, we derive asymptotic theory for the ML method and the generalized method of moments for the three classes of tempered stable distributions. More precisely, we prove asymptotic efficiency and asymptotic normality of the estimators by verifying the set of sufficient conditions. Second, we compare finite sample properties of the estimators in a Monte Carlo study. Third, we illustrate that tempered stable distributions are more suitable in financial applications than stable distributions because the tails of the latter are too heavy. For this, we study log-returns of three financial time series namely the S&P 500, the German DAX, and the German EEX electricity spot prices.
The remainder of this paper is organized as follows. Section <ref> presents formal definitions and properties of tempered stable distributions and their important subclasses. Section <ref> discusses the estimation strategies and states their general asymptotic results. Section <ref> contains our theoretical results. All proofs are relegated to the appendix. In Section <ref> we conduct a simulation study to analyze finite sample properties. We discuss financial applications in Section <ref>. Section <ref> concludes.
§ TEMPERED STABLE DISTRIBUTIONS
To establish notation, we describe some general properties of tempered stable distributions and the considered special cases in this paper. Recall that by the Lévy-Khintchine formula every process can uniquely be described by its characteristic triple (a,B,Π), where a denotes the trend, B the diffusion matrix and Π the measure. Important special cases are so called stable (or α-stable) processes (see <cit.> or <cit.>). Stable processes in d dimensions are characterized by the measure
M( r, u) = r^-1-α r σ( u),
where α∈(0,2) and σ is a finite, non-zero measure on the (d-1)-dimensional unit sphere S^d-1. In one dimension the measure takes the form
M( r) = (δ_+/r^1+α1_(0,∞)(r)+δ_-/|r|^1+α1_(-∞,0)(r)) r,
with δ_+,δ_-≥0 s.t. (δ_+,δ_-)≠(0,0).
Tempered stable distributions arise by tempering the measure of a stable distribution by a tempering function. The measure of d-dimensional tempered stable measure with a general tempering function is
Q( r, u) = r^-1-α q(r,u) r σ( u),
where q:(0,∞)× S^d-1→ (0,∞) is a Borel function s.t. q(·,u) is completely monotone with lim_r→∞q(r,u)=0 for each u∈ S^d-1, i.e., (-1)^n∂^n/∂ r^nq(r,u)>0 for all r>0,u∈ S^d-1, n∈ℕ_0. It is called a proper tempered stable distribution if, in addition, lim_r↓0q(r,u)=1 for each u∈ S^d-1. <cit.> generalize tempered stable distributions by allowing q to only fulfill lim_r→0||q(r,·)-g(·)||_L^1(S^d-1,σ)=0 for some non-negative function g∈ L^1(S^d-1,σ). There are various ways of choosing q (see <cit.> for some examples). In this paper, we mainly focus on the exponential (or classical) tempering function where we apply an exponentially decreasing function. See the next subsections for details. For both stable and tempered stable distributions the diffusion matrix B is zero.
§.§ Tempered stable subordinator
The first special case we discuss is the tempered stable subordinator (TSS). It is constructed from the stable subordinator which is a non-negative, increasing process with α-stable marginals. In this case, the stability parameter α needs to be in (0,1). Its measure is
δ/r^1+α1_(0,∞)(r) r,
where δ>0 is a scale parameter. For exponential tempering, the measure of the TSS distribution is given by
Q_TSS( r)=e^-λ rδ/r^1+α1_(0,∞)(r) r,
where λ>0 is the tempering parameter.
Let Y∼ TSS(α,δ,λ) be a TSS distributed random variable. Using (<ref>) it is possible to derive the characteristic function of the TSS distribution, see <cit.> for a proof of
φ_TSS(t;θ):=𝔼_θ[e^itY]= exp(δΓ(-α)((λ-it)^α-λ^α)),
with parameter vector θ=(α,δ,λ).
The probability density function of tempered stable distributions is generally not available in closed form. For the TSS distribution we can make use of the identity
f_TSS(y;θ)=e^-λ y-λ^αδΓ(-α)f_S(α,δ)(y),
where f_TSS(y;θ) denotes the density function of the TSS distribution, see <cit.>. S(α,δ) denotes the distribution of the α-stable subordinator with scale parameter δ and f_S(α,δ)(y) denotes its density, which is (except of a few special cases) not available in closed form. However, many software packages (like the stabledist or Tweedie packages in R) have fast computation routines based on series or integral representations. Combining such series representation with (<ref>) we obtain a series representation for the TSS distribution
f_TSS(y;θ)=e^-λ y-λ^αδΓ(-α)-1/π∑_k=1^∞(-1)^k/k!Γ(1+α k)Γ(1-α)^k(δ/α)^ky^-(1+α k)sin(απ k),
see <cit.>.
The estimation method in Section <ref> makes use of matching theoretical with empirical cumulants. Therefore, we state the cumulant generating function of the TSS distribution
ψ_TTS(t;θ)= δΓ(-α)((λ-t)^α-λ^α),
for t≤λ, derived in <cit.>. Thus, the m-th order cumulants κ_m=.^n/ t^nψ(t)|_t=0 are given by
κ_m=Γ(m-α)δ/λ^m-α, m∈ℕ.
Simulation, which we need in the Monte Carlo study, of TSS distributed random variates is straightforward by an acceptance-rejection algorithm, i.e., we first generate U∼𝒰(0,1) and V∼ S(α,δ). If U≤e^-λ V we set Y:=V, otherwise we repeat the first step, see <cit.>. For the generation of stable random numbers see, e.g., <cit.>. See <cit.> for the more efficient double rejection method.
§.§ Classical tempered stable distribution
Second, we discuss one dimensional classical tempered stable (CTS) distributions. They are defined by their measure
Q_CTS( r)=(e^-λ_+rδ_+/r^1+α1_(0,∞)(r)+e^-λ_-|r|δ_-/|r|^1+α1_(-∞,0)(r)) r.
α∈(0,2) is the stability parameter, δ_+,δ_->0 are scaling parameters, λ_+,λ_->0 are tempering parameters and μ is a location parameter. The indices + and - refer to the positive and negative parts of the distribution (centered around μ). We collect all parameters in the vector θ=(α,δ_+,δ_-,λ_+,λ_-,μ). Note that for the CTS distribution the parameter vector θ is different than for the TSS distribution.
Let X∼ CTS(α,δ_+,δ_-,λ_+,λ_-,μ). The characteristic function is given by <cit.>
φ_CTS(t;θ):=𝔼_θ[e^itX] =exp(itμ+δ_+Γ(-α)((λ_+-it)^α-λ_+^α+itαλ_+^α-1).
. +δ_-Γ(-α)((λ_-+it)^α-λ_-^α-itαλ_-^α-1)),
for all θ∈(0,2)×(0,∞)^4×ℝ such that α≠1. For θ_1=(1,δ_+,δ_-,λ_+,λ_-,μ) the characteristic function of the CTS distribution instead has the form
φ_CTS(t;θ) =exp(itμ+δ_+((λ_+-it)log(1-it/λ_+)+it).
. +δ_-((λ_-+it)log(1+it/λ_-)-it)).
Note that the characteristic function (and hence the density function) is discontinuous at α=1, which affects the compact domain for which asymptotic analysis is possible <cit.>.
As for the TSS distribution, the density function of the CTS distribution does not exist in closed form. Crucially, even a simple relationship with a stable density as for the TSS distribution in (<ref>) is not available. For numerical evaluations it is therefore necessary to rely on algorithms like the fast Fourier transform <cit.> applied to the characteristic function (<ref>).
As for the TSS distribution, we specify the cumulant generating function
ψ_CTS(t;θ) = tμ+δ_+Γ(-α)((λ_+-t)^α-λ_+^α+tαλ_+^α-1)
+δ_-Γ(-α)((λ_-+t)^α-λ_-^α-tαλ_-^α-1),
for t∈[-λ_-,λ_+]. We use theoretical cumulants for cumulant matching below. The m-th order cumulants can be derived from (<ref>) and take the form
κ_m=Γ(m-α)δ_+/λ_+^m-α+(-1)^mΓ(m-α)δ_-/λ_-^m-α,
for m≥ 2 and κ_1=μ.
To explain a feasible simulation algorithm we first discuss the relationship between the CTS distribution and the TSS distribution of the previous subsection by introducing a related distribution. The relation to the CTS distribution will become apparent in the following.
Closely related to the TSS distribution is the centered and totally positively skewed tempered stable distribution TS^'(α,δ,λ) which is defined by its characteristic function
exp(δΓ(-α)((λ-it)^α-λ^α+itαλ^α-1)),
for α∈(0,1)∪(1,2). For α∈(0,1), we have the relation that if Y∼ TSS(α,δ,λ), then Y-δΓ(1-α)λ^α-1∼ TS^'(α,δ,λ). In particular,
f_TS^'(y;α,δ,λ)=f_TSS(y-δΓ(1-α)λ^α-1;α,δ,λ).
For α∈(0,1)∪(1,2), we additionally have
f_TS^'(y;α,δ,λ)=e^-λ y-λ^αδ(α+1)Γ(-α)f_S(α,δ)(y-Γ(1-α)δλ^α-1),
where S(α,δ) is the totally positively skewed stable distribution with measure δ r^-α-11_(0,∞)(r) r.
Using this, CTS distributed random variables can be constructed from totally positively skewed tempered stable random variables in the following way. Let Y_+∼ TS^'(α,δ_+,λ_+) and Y_-∼ TS^'(α,δ_-,λ_-) and μ∈ℝ. Then
X:= Y_+ - Y_- +μ∼ CTS(α,δ_+,δ_-,λ_+,λ_-,μ).
Simulation of classical tempered stable variables therefore reduces to simulation of totally positively skewed tempered stable random variables. However, this is more involved than for the subordinator as the simple acceptance-rejection does not work for α∈(1,2). <cit.> present several remedies, e.g., a truncated series representation by <cit.>. We opt for the simulation approach of <cit.>, i.e., using an approximate acceptance-rejection algorithm which works as follows: first fix a number c>0. Second, simulate U∼𝒰(0,1) and V∼ S(α,δ). If U≤e^-λ (V+c) we set Y:=V -Γ(1-α) δλ^α-1, otherwise we return to the second step. The algorithm is not exact, i.e., Y TS^'(α,δ,λ). The number c controls the degree of approximation and also the acceptance rate. For c too small the approximation might not be sufficient. For large c the approximation improves; yet, the acceptance probability decreases and therefore the runtime elongates.
§.§ Normal tempered stable distribution
A further model for financial applications is the normal tempered stable (NTS) distribution. It is constructed as a classical normal variance mixture, see <cit.>. For this, let Y∼ TSS(α,δ,λ), with (α,δ,λ)∈(0,1)×(0,∞)^2. Let W∼ N(0,1) independent of Y and β,μ∈ℝ.
Set
Z=√(Y)W+β Y+μ.
Then, Z is NTS(θ) distributed, where for this case θ=(α,β,δ,λ,μ).
We can also obtain the NTS distribution by tempering a stable distribution. The corresponding tempering function can be found in <cit.>. Note that the tempering function is not completely monotone but is in the class of generalized tempered stable distributions of <cit.>.
For our parametrization, the characteristic function now takes the form
φ_NTS(t;θ)=E[e^itZ]= exp(itμ+δΓ(-α)((λ-itβ+t^2/2)^α-λ^α)).
As for the CTS distribution, the density function is not available in closed form and numerical computation relies on the FFT.
As cumulants do not have an easy pattern as for the other examples we omit them. We also do not propose a cumulant matching estimation method here.
Simulation of NTS distributed random variables is easy given the TSS distribution and Brownian motion realizations by invoking (<ref>).
§ ESTIMATION METHODS
This section discusses some parametric estimation strategies available in the literature. We apply these to the tempered stable distributions considered above and derive asymptotic efficiency and normality in the next section. In this section, we briefly present the methods and some known general asymptotic results. We state maintained assumptions in Appendix <ref>. Throughout this section let X be a random variable following one of the tempered stable distributions of Section <ref> and let f(x;θ) denote its density function, depending on the parameter vector θ. Also denote by
φ_θ(t):=𝔼_θ[e^itX]
its characteristic function, where 𝔼_θ is the expectation operator w.r.t. the data generating process indexed by θ. Let θ_0 be the unknown true parameter vector. In this paper, we only consider the case of an i.i.d. sample X_1,…,X_n with density function f(x;θ).
§.§ Maximum likelihood estimation
Maximum likelihood estimation is standard in the literature and frequently used, for example in <cit.>. We numerically maximize the log-likelihood function
ℓ(θ)=∑_j=1^nlog f(X_j;θ)
w.r.t. θ.
As described in the preceding section, the density functions of our distributions are not available in closed form but either via a series representation (TSS) or via the Fourier inversion (CTS and NTS)
f(x;θ)=1/2π∫_ℝe^-itxφ_θ(t) t
based on the characteristic function φ_θ(t). In practice, we use the FFT algorithm to approximate (<ref>).
Among others <cit.> (which we here follow) proved the limiting behavior of the maximum likelihood estimator as given in the following proposition.
Under Assumption <ref> in Appendix <ref>, the ML estimator
θ̂_n,ML=_θ∈Θℓ(θ)
is consistent and
n^1/2(θ̂_n,ML-θ_0)ℒ→N(0,I_θ_0^-1),
as n→∞, where I_θ_0^-1 denotes the inverse of the Fisher information matrix.
§.§ Generalized Method of Moments
The generalized method of moments (GMM) by <cit.> is suitable for estimating tempered stable laws. One approach to define moment conditions is to use the theoretical characteristic function φ_θ(t) of X.
The sample analogue for the realizations {X_j}_j=1,…,n is
φ̂_n(t)=1/n∑_j=1^n e^itX_j.
We form moment conditions
𝔼_θ_0[h(t,X_j;θ)]=0
for all t∈ℝ^d, where
h(t,X_j;θ)=e^itX_j-φ_θ(t).
The sample analogue is denoted by
ĥ_n(t;θ)=1/n∑_j=1^n h(t,X_j;θ)=φ̂_n(t)-φ_θ(t).
We now review some approaches on how to choose a set of t's to obtain appropriate moment conditions. One way is to to choose a finite grid {t_1,…,t_R}⊂ℝ. <cit.> show that the asymptotic variance of the estimator can be made arbitrarily close to the Cramér-Rao bound by selecting the grid sufficiently fine. However, as argued by <cit.>, the grid size must not be larger than the sample size. Otherwise, the problem becomes ill-posed since the asymptotic variance matrix of the moment conditions becomes singular. <cit.> generalize the empirical characteristic function GMM approach by introducing an estimator based on a continuum of moment conditions (CGMM). They derive that the asymptotic variance attains the Cramér-Rao bound. They solve the singularity issue of the asymptotic variance matrix by applying a suitable regularization. We discuss this approach in more detail below. For the case of the GMM estimator based on a discrete set of moment conditions, we follow <cit.> in the numerical computations and also use a regularization to make the scheme numerically stable. We use an equally spaced grid. Other suggestions can be found in <cit.>.
Next, we describe the CGMM estimation method of <cit.> based on <cit.> and <cit.>. We start by introducing some notation. Let π be a probability density on ℝ and L^2(π) be the Hilbert space of complex valued functions such that
L^2(π)={f: ℝ→ℂ : ∫|f(t)|^2π(t) t<∞}.
The inner product on L^2(π) is defined as
⟨ f,g⟩_L^2(π)=∫ f(t) g(t)π(t) t
and the norm on L^2(π) as
||g||_L^2(π)^2=∫ |g(t)|^2π(t) t.
Let K be the asymptotic variance-covariance operator associated with the moment functions h(t,X;θ). K is an integral operator that satisfies
K: L^2(π) → L^2(π)
f ↦ g, where g(s)=∫ k(s,t)f(t)π(t) t,
where k(s,t) is a kernel given by
k(s,t)=𝔼_θ[h(s,X;θ)h(t,X;θ)].
Then the efficient CGMM estimator is given by
θ̂=_θ⟨ K^-1ĥ_n(·;θ),ĥ_n(·;θ)⟩_L^2(π).
The above CGMM is non-feasible because we need an estimate K̂_n for K. It is possible to estimate (<ref>) with
k̂_n(s,t)=1/n∑_j=1^n(e^is^'X_j-φ̂_n(s))(e^it^'X_j-φ̂_n(t)).
However, an empirical operator K̂_n with kernel function k̂_n(s,t) is non-invertible. Therefore, <cit.> estimate K^-1 by
K̂_n,γ_n^-1=(K̂_n^2+γ_n I)^-1K̂_n.
γ_n is (depending on the sample size) a sequence of hyperparameters which allow K̂_n,γ_n^-1f to exist for all f∈ L^2(π) and to dampen the sensitivity of K̂_n,γ_n^-1f to variation in the input f.
Then, the feasible CGMM estimator is given by
θ̂_n,CGMM(γ_n)=_θ⟨K̂_n,γ_n^-1ĥ_n(·;θ),ĥ_n(·;θ)⟩_L^2(π).
<cit.> show that the CGMM estimator is consistent, asymptotically efficient and asymptotically normal (for stationary Markov processes) given a set of assumptions. An earlier version <cit.> proves the statement for i.i.d. data with a simpler set of assumptions. We use their assumptions and prove that the tempered stable distributions fulfill them. More precisely, in general the CGMM estimator satisfies the following asymptotic result.
Under the Assumptions <ref> in the Appendix, the CGMM estimator is consistent and
n^1/2(θ̂_n,CGMM(γ_n)-θ_0)ℒ→N(0,I_θ_0^-1),
as n, γ_nn^1/2→∞ and γ_n→0, where I_θ_0^-1 denotes the inverse of the Fisher information matrix.
In practice, we require a reasonable choice of the regularization parameter γ_n. <cit.> derived the optimal estimator for γ_n. However, we choose for simplicity an ad-hoc method for selecting the regularization parameter as <cit.> found that the specific choice of the regularization parameter does not have a striking impact on the estimation precision in their simulations for the stable distribution.
§.§ Cumulant matching
We also discuss a method of cumulants approach which follows <cit.>. They match empirical cumulants with their theoretical counterparts. We extend this by using 's () GMM framework. We call the approach generalized method of cumulants (GMC) to distinguish it from the GMM method using characteristic function moment conditions. However, it fits well into 's () framework allowing for standard asymptotic theory. It works as follows. Let
𝔼_θ_0[g(X;θ)]=0
denote the theoretical moment conditions and
1/n∑_j=1^ng(X_j;θ)=0
the empirical moment conditions. We build the function g by the relation between moments and cumulants given by
E(X) =κ_1,
E(X^2) =κ_2+κ_1^2,
E(X^3) =κ_3+3κ_2κ_1+κ_1^3,
E(X^4) =κ_4+4κ_3κ_1+3κ_2^2+6κ_2κ_1^2+κ_1^4,
⋮
E(X^p) =∑_m=1^p B_p,m(κ_1,…,κ_p-m+1),
where B_p,m denote incomplete Bell polynomials. In particular for p moment conditions, we choose g(X;θ)=(g_1,…,g_p)^' to be
g_1 =X-κ_1,
g_2 =X^2-κ_2-κ_1^2,
⋮
g_p =X^p-∑_m=1^p B_p,m(κ_1,…,κ_p-m+1).
Here, the theoretical cumulants κ_m for the TSS distribution are given in (<ref>) and, for the CTS distribution, given in (<ref>). For the NTS distribution cumulants do not have an easy-to-use pattern which is why we do not use this method for the NTS distribution. The asymptotic result then is the following proposition. The proof can be found in <cit.>.
Under the assumptions of <cit.> in Theorems 2.6 and 3.4, the GMC estimator
θ̂_n,GMC=_θ∈Θ(1/n∑_j=1^ng(X_j;θ))^'Ω̂^-1(1/n∑_j=1^ng(X_j;θ)),
is a consistent for θ_0 and, moreover,
n^1/2(θ̂_n,GMC-θ_0)ℒ→N(0,(G^'Ω^-1G)^-1),
with G=.𝔼_θ[∂ g(X;θ)/∂θ]|_θ=θ_0, Ω=𝔼_θ_0[g(X;θ)g(X;θ)^'] and Ω̂^-1 is a consistent estimator of Ω^-1.
§ ASYMPTOTIC RESULTS
We present our asymptotic results for the ML, the CGMM and the GMC estimation method. The GMM method of <cit.> has already been discussed to have problems with the singularity of the asymptotic covariance matrix. All proofs can be found in Appendix <ref>. We start with a theorem for the ML estimator.
The ML estimator θ̂_n,ML for θ_0∈int(Θ) of
(a) the TSS(α,δ,λ) distribution with θ=(α,δ,λ)∈Θ=[ε,1-ε]×[ε,M]^2,
(b) the TS'(α,δ,λ) distribution with θ=(α,δ,λ)∈Θ=([ε,1-ε]∪[1+ε,2-ε])×[ε,M]^2
(c) the CTS(α,δ_+,δ_-,λ_+,λ_-,μ) distribution with θ=(α,δ_+,δ_-,λ_+,λ_-,μ)∈Θ=([ε,1-ε]∪[1+ε,2-ε])×[ε,M]^4×[-M,M],
(d) the NTS(α,β,δ,λ,μ) distribution with θ=(α,β,δ,λ,μ)∈Θ=[ε,1-ε]×[-M,M]×[ε,M]^2×[-M,M],
is consistent, asymptotically normal and asymptotically efficient as n→∞.
<cit.> has already established strong consistency. Therefore, it only remains to show asymptotic normality and efficiency.
We next show that the CGMM also possesses the desired asymptotic properties for our tempered stable distributions.
The CGMM estimator θ̂_n,CGMM(γ_n) for θ_0∈int(Θ) of
(a) the TSS(α,δ,λ) distribution with θ=(α,δ,λ)∈Θ=[ε,1-ε]×[ε,M]^2,
(b) the TS'(α,δ,λ) distribution with θ=(α,δ,λ)∈Θ=([ε,1-ε]∪[1+ε,2-ε])×[ε,M]^2
(c) the CTS(α,δ_+,δ_-,λ_+,λ_-,μ) distribution with θ=(α,δ_+,δ_-,λ_+,λ_-,μ)∈Θ=([ε,1-ε]∪[1+ε,2-ε])×[ε,M]^4×[-M,M],
(d) the NTS(α,β,δ,λ,μ) distribution with θ=(α,β,δ,λ,μ)∈Θ=[ε,1-ε]×[-M,M]×[ε,M]^2×[-M,M],
is consistent, asymptotically normal and asymptotically efficient as n→∞ and γ_nn^1/2→∞ and γ_n→0.
<cit.> showed that the method of cumulant matching is locally consistent, i.e., the equations of the moment conditions do have a root which is unique in an open neighborhood by the implicit function theorem. However, the assumptions of Proposition <ref> require that the root is unique for the whole domain. We show that this does not hold by constructing counterexamples for a global inverse function theorem.
The GMC estimator θ̂_n,GMC is locally but not globally consistent (i.e., there may be multiple roots).
§ MONTE CARLO STUDY
In this section, we compare empirical properties of the proposed estimators in a simulation study. In order to do so, we simulate n=100 and n=1000 random numbers distributed according to the distributions TSS(0.5, 1,1), CTS(1.5, 1,1,1,1,0), and NTS(0.5,0,1,1,0). We estimate the parameters using the ML, the GMM method according to <cit.>, the CGMM method according to <cit.>. For the TSS and CTS distributions we additionally compute the GMC estimator using three different numbers of moment conditions, i.e., the just-identified case (3 moment conditions for TSS, 6 moment conditions for CTS) and two overidentified cases (4 and 5 moment conditions for TSS, 7 and 8 moment conditions for CTS). We choose a regularization parameter 0.01 and a cut-off regularization <cit.> for GMM and a Tikhonov regularization for CGMM. Further details on computational settings are available upon request. The implemented routines will be published in an R package. We repeat the experiments in 10,000 independent Monte Carlo replications.
Table <ref> shows empirical bias and empirical root mean squared errors (RMSE) (in parenthesis) for the TSS distribution for each of the parameters. In the last column, we display the average runtime for estimation in seconds. The striking difference is that while the GMM and the GMC estimation performs in less than a second ML and CGMM need considerably more time to compute. As expected, the estimates are more precise for a larger sample. Importantly, all methods (except the MLE) suffer from a small sample size which implies that the algorithms run into boundary solutions (i.e., finding stability parameters close to zero). This implies a negative empirical bias for α. The ML estimator outperforms the other methods followed by CGMM. The GMC with 4 moment conditions also works fairly well, adding further moment conditions has no additional value.
Table <ref> shows similar experimental results for the CTS distribution. Again, we report the empirical bias and the RMSE for each of the parameters. As expected, estimating 6 parameters is more demanding than estimating 3 as above. We see that for the GMC and GMM methods extremely high values of bias and RMSEs occur, which is due to rare extremely high parameter estimates. Therefore, we also compute the median absolute deviation from the true parameters, printed in square brackets. Generally, we observe that all methods fail to provide good estimates for 100 observations. In this case, the optimization algorithms find boundary solutions for many of the randomly drawn sets. Thus, the CTS distribution should only be used as a model if the sample size is not too small. The GMC and GMM methods also fail for 1000 observations for most of the Monte Carlo replications. For 1000 observations, the ML estimator performs better than the latter methods. However, it still has difficulties to estimate the stability index correctly in some instances. The CGMM method has the longest runtime but works fairly well especially compared with the other estimators. Boundary estimates rarely occur.
Table <ref> presents the results for the NTS distribution. For this distribution, we only use the CGMM, the GMM and the ML methods. As before a larger sample is beneficial since small samples lead to boundary estimates. For example, the bias and RMSE for β are very large for the GMM method because of large outliers. As for the CTS above, the CGMM method seems to perform better than ML and much better than the GMM method, which performs poorly even for a larger sample.
To conclude, the CGMM works good for all three examples and is the only reliable estimator for the CTS distribution. Unfortunately, the runtime is quite lengthy as well as for the ML estimator, which finds boundary solutions more frequently. The GMM and GMC estimators only work for the TSS subordinator. Therefore, we recommend to use the CGMM estimator for the CTS and NTS distribution.
§ APPLICATIONS
We discuss financial applications to motivate the use of tempered stable distributions. Tempered stable distributions have already been proposed to model log-returns of financial assets, see e.g., <cit.>. In the case of electricity markets, e.g., <cit.> models the evolution of electricity spot prices by a tempered stable driven Ornstein-Uhlenbeck process.
We here analyze log-returns of three financial assets. We consider the S&P 500 index (2012-06-01 to 2022-05-31), the German DAX index (2012-06-01 to 2022-05-31), and base-load spot prices from the German power exchange EEX (2018-09-30 to 2022-05-31). We obtain daily data from Refinitiv's Eikon. Before modeling tempered stable distributions we perform some simple manipulations and fit preliminary models to clean the data. In this order, we first deseasonalize the data of the EEX regarding its weekly profile by applying a moving average filter, see <cit.>. Second, we exclude the rare cases of negative prices of the EEX. Next, we compute log-returns for the three indices (for the EEX we also omit all log-returns next to days with negative prices). Last, we fit GARCH(1,1) models (with normal errors) to each of the log-return series to remove stochastic volatility from the data which can mistakenly interpreted as evidence for heavy tailed distributions <cit.>. With this approach, we follow <cit.> who found that this quasi-MLE performs nearly identically as to a correctly specified MLE of a GARCH model with CTS or NTS distributed errors as in <cit.>.
Figures <ref> to <ref> show the original time series (a), the (deseaonalized) log-returns (b), and the GARCH residuals (c). We observe in panels (b) that for each of the series of log-returns stochastic volatility is apparent. The GARCH residuals do not exhibit volatility clustering anymore. However, the residuals reveal skewness and heavy tails which is why we next fit tempered stable distributions to them.
We compare the CTS and the NTS distributions with a univariate stable distribution as a baseline model. Needless to say, there are plenty of other models for log-returns in the literature, e.g., generalized hyperbolic models (and their subclasses) by <cit.>, or finite mixture models <cit.>. For conciseness, we do not present them here but refer to the aforementioned references and <cit.> for a comparison.
To compare the goodness-of-fit we use the Kolmogorov-Smirnov (KS) and the Anderson-Darling (AD) statistics. Lower statistics indicate a better fit. It is known that the KS distance better reflects the fit around the center of the distribution while the AD statistics concentrates on the tails of the distributions <cit.>. Of course, the CTS and the NTS distributions have a larger number of parameters hence a better fit is to be expected. Therefore, we also compute the Akaike Information Criterion (AIC) and the Bayesian Information Criterion (BIC) to penalize large models to avoid overfitting. The penalization of larger models is higher for the BIC.
For brevity, we decide to only present estimates and plots obtained with the CGMM estimator. The reason for this choice is that it performed best in the simulation study in Section <ref>. Table <ref> shows parameter estimates for the three time series and the three distributions. Table <ref> presents KS, AD, AIC, and BIC statistics.
For the KS and AD statistics we observe a mixed pattern. For the S&P 500 the stable distribution is favored while for the DAX and EEX the CTS or NTS distributions have lower values. While in each case the NTS distribution has the lowest AIC, the stable distribution always has the lowest BIC. To visualize goodness-of-fit we moreover depict QQ-plots.
Figures <ref>–<ref> plot sample quantiles versus theoretical quantiles for the different scenarios. The solid line is the reference line. We observe that, although in some cases the stable distribution has lower KS or AD statistics, the QQ-plots suggest that the tails of the stable distribution are too heavy. CTS and NTS distributions seem to provide a better fit.
§ CONCLUSION AND FUTURE WORK
This paper derived asymptotic efficiency results for parametric estimation methods of the tempered stable subordinator, the classical exponentially tempered stable distribution and the normal tempered stable distribution. We conducted a Monte Carlo study to establish finite sample properties. It turned out that the GMM estimator with a continuum of moment conditions outperformed other methods. We discussed why tempered stable distributions are relevant in financial applications.
Asymptotic results for other tempering functions or the derivation of a set of conditions to ensure asymptotic efficiency for general tempering function are subject of future work.
§ ACKNOWLEDGEMENTS
Financial support of the German Research Foundation (Deutsche Forschungsgemeinschaft, DFG) via the project 455257011 is gratefully acknowledged.
The author is grateful to Christoph Hanck for valuable comments which helped to substantially improve this paper. Full responsibility is taken for
all remaining errors.
agsm
§ APPENDIX: ASSUMPTIONS
(i) θ̂_n,ML is consistent for θ_0.
(ii) θ_0 is an interior point of Θ which is compact.
(iii) f(x;θ) is twice continuously differentiable and f(x;θ)>0 in a neighborhood 𝒩 of θ_0.
(iv) ∫sup_θ∈𝒩||∂ f(x;θ)/∂θ|| x<∞, ∫sup_θ∈𝒩||∂^2 f(x;θ)/∂θ∂θ^'|| x<∞.
(v) I_θ_0=.𝔼_θ[(∂log f(X;θ)/∂θ)(∂log f(X;θ)/∂θ)^']|_θ=θ_0 is positive definite.
(vi) 𝔼_θ[sup_θ∈𝒩||∂^2 log f(X;θ)/∂θ∂θ^'||]<∞.
(i) The observed data {x_1,…,x_n} are i.i.d. realizations of X which has values in ℝ^dand has p.d.f. f(x;θ) with θ∈Θ⊂ℝ^q and Θ is compact.
(ii) π is the p.d.f. of a distribution that is absolutely continuous with respect to the Lebesgue measure and strictly positive for all x∈ℝ^d
(iii) The equation
E_θ_0[e^it^'X]-φ_θ(t)=0 for all t∈ℝ^p, π-a.s.
has a unique solution θ_0 which is an interior point of Θ.
(iv) f(x;θ) is continuously differentiable with respect to θ on Θ.
(v) ∫sup_θ∈Θ||∂ f(x;θ)/∂θ|| x<∞.
(vi) I_θ_0=.𝔼_θ[(∂log f(X;θ)/∂θ)(∂log f(X;θ)/∂θ)^']|_θ=θ_0 is positive definite.
§ APPENDIX: PROOFS
(a) We will follow <cit.> who proved asymptotic normality for stable distributions. Although he did not consider stable subordinators explicitly it is a corollary of his theorem. This is because (in his notation) the skewness parameter β is fixed at α and does not need to be estimated. Thus the proof for stable subordinators follows along his lines. We check the conditions of Assumption <ref>. We also call these regularity conditions throughout. <cit.> proved condition (i). (ii) Θ is compact by construction. The density function (<ref>) for the TSS distribution is twice continuously differentiable with respect to the parameters by the twice continuous differentiability of the density of the stable subordinator <cit.> which implies (iii). To show (iv), we make use of (<ref>) and bound the partial derivatives
|∂ f_TSS(y;θ)/∂ϑ|≤ C_θ· f_TSS(y;θ)+|∂ f_S(α,δ)(y)/∂α|, ϑ=α,
f_TSS(y;θ)+|∂ f_S(α,δ)(y)/∂δ|, ϑ=δ,
f_TSS(y;θ) +yf_TSS(y;θ), ϑ=λ,
where C_θ is a positive, finite constant which depends on θ but not on y. Because θ∈Θ which is compact and because C_θ can be taken to be continuous in θ which follows from (iii), C_θ can be bounded by a constant C. The result now follows by the regularity of the stable subordinator <cit.> and because the expected value of a TSS distribution exists. The second part of (iv) follows analogously. In order to show (v), we follow <cit.> and show the equivalent condition that for every θ∈Θ and for every a=(a_1,a_2,a_3)∈ℝ^3 the function
g(a,y)=a_1∂ f_TSS(y;θ)/∂α+a_2∂ f_TSS(y;θ)/∂δ+a_3∂ f_TSS(y;θ)/∂λ
is identically 0 for all y if and only if a_1=a_2=a_3=0. g(a,y) is of the form ∫e^-iytϕ(a,t) t, where ϕ is a linear combination of derivatives of the TSS characteristic function given in (<ref>) and g(a,y)≡0 iff ϕ(a,y)≡0. The partials are
ϕ_1=∂φ_TSS(t;θ)/∂α =φ_TSS(t;θ)δΓ(-α)(((λ-it)^αlog(λ-it)-λ^αlog(λ))-((λ-it)^α-λ^α)ψ(-α)),
ϕ_2=∂φ_TSS(t;θ)/∂δ =φ_TSS(t;θ)Γ(-α)((λ-it)^α-λ^α),
ϕ_3=∂φ_TSS(t;θ)/∂λ =φ_TSS(t;θ)δΓ(-α)(α(λ-it)^α-1-αλ^α-1),
where ψ(x)=Γ^'(x)/Γ(x) denotes the digamma function. The characteristic function given in (<ref>) is non-zero for each t which implies that it is sufficient to study the latter terms of ϕ_1,ϕ_2,ϕ_3. ϕ_1 is a linear combination of ((λ-it)^αlog(λ-it)-λ^αlog(λ)) and ((λ-it)^α-λ^α), ϕ_2 is a multiple of ((λ-it)^α-λ^α), and ϕ_3 is a multiple of (α(λ-it)^α-1-αλ^α-1).
Since ϕ_1 is the only linear combination with term (λ-it)^αlog(λ-it) it follows a_1=0. Therefore, it is necessary for ψ(x)=0 for all t that also a_2=a_3=0.
To show (vi), we recall that <cit.> proved the statement for the stable distribution. By (<ref>),
∂^2/∂θ∂θ^'log f_TSS(y;θ)=∂^2/∂θ∂θ^'(-λ y-λ^αδΓ(-α))+∂^2/∂θ∂θ^'log f_S(α,δ)(y),
which elements can be bounded in absolute value by a function C(y), independent of θ, which is bounded in any closed y-interval. Following <cit.>, it is therefore only necessary to study the behavior of C(y) at its limit points. <cit.> showed that for y→∞ the corresponding C(y) for the stable distribution is of the order O(log^2|y|). For y→0, we can follow his lines with the same arguments (deriving an absolutely continuous series). Hence, C(y) for the tempered stable subordinator is of order O(|y|).
This implies that ∫_0^∞ C(y)f_TSS(y;θ) y<∞ for each θ∈Θ.
(b) The proof is analogously to (a) but replacing relation (<ref>) with (<ref>).
(c) Conditions (i) and (ii) work just as in (a). For (iii) and (iv), we use that by (<ref>)
f_CTS(x+μ;θ)=∫_-∞^∞f_+(x+y)f_-(y) y,
where f_+ is the density of Y_+∼ TS^'(α,δ_+,λ_+) and Y_-∼ TS^'(α,δ_-,λ_-). This ensures (iii). In order to show (iv),
∂ f_CTS(x;θ)/∂θ =∂/∂θ∫_-∞^∞f_+(x+y-μ)f_-(y) y
=∫_-∞^∞∂/∂θ(f_+(x+y-μ)f_-(y)) y
=∫_-∞^∞(∂ f_+(x+y-μ)/∂θf_-(y)+∂ f_-(y)/∂θf_+(x+y-μ)) y.
In the second line we used the regularity of the TS' density derived in part (b) and the easy relation (<ref>). Hence,
∫_-∞^∞sup_θ∈Θ||∂ f_CTS(x;θ)/∂θ|| x
≤ ∫_-∞^∞∫_-∞^∞sup_θ∈Θ||∂ f_+(x+y-μ)/∂θf_-(y)|| y x
+ ∫_-∞^∞∫_-∞^∞sup_θ∈Θ||∂ f_-(y)/∂θf_+(x+y-μ)|| y x
= ∫_-∞^∞∫_-∞^∞sup_θ∈Θ||∂ f_+(x+y-μ)/∂θf_-(y)|| x y
+ ∫_-∞^∞∫_-∞^∞sup_θ∈Θ||∂ f_-(y)/∂θf_+(x+y-μ)|| x y
≤ ∫_-∞^∞sup_θ∈Θ|f_-(y)|∫_-∞^∞sup_θ∈Θ||∂ f_+(x+y-μ)/∂θ|| x y + ∫_-∞^∞sup_θ∈Θ||∂ f_-(y)/∂θ||∫_-∞^∞sup_θ∈Θ|f_+(x+y-μ)| x y
< ∞,
where we used Fubini's Theorem. The left inner integral in (<ref>) is finite by part (b) and of order O(log(x)x^-1-α). The right inner integral isof order O(x^-1-α). Therefore, both double integrals are finite. The second part of (iv) follows analogously. (v) follows analogously to part (a), in particular, if we again denote (ϕ_1,…,ϕ_6)^'=∂φ_CTS(t;θ)/∂θ we observe that ϕ_1 is the only linear combination with terms (λ_+-it)^αlog(λ_+-it) and (λ_-+it)^αlog(λ_-+it), which implies a_1=0. ϕ_2 is a linear combination of t and (λ_+-it)^α, ϕ_3 is a linear combination of t and (λ_-+it)^α, ϕ_4 is a linear combination of t and (λ_+-it)^α-1, ϕ_5 is a linear combination of t and (λ_-+it)^α-1, and ϕ_6 is a multiple of t. This implies a_2=a_3=a_4=a_5=0 and hence a_6=0. As in (a), we have to consider the limiting behavior of C(x) which is the function which bounds the elements of ∂^2/∂θ∂θ^'log f_CTS(x;θ) in absolute value. Because of the convolution property (<ref>), the tails behave as O(|x|) for x→±∞, which proves (vi).
(d) (i) and (ii) as above. For the remainder we use the subordination property of the NTS distribution, i.e.,
f_NTS(z;θ)=∫_0^∞f_N(z;μ+β y,y)f_TSS(y;α,δ,λ) y,
where f_N(z;m,s^2) denotes the density of the normal distribution with mean m and variance s^2. Similarly to <cit.>, we can show that |∂ f_N(z;μ+β y,y)/∂μ|≤C/y and |∂ f_N(z;μ+β y,y)/∂β|≤ C for all θ∈Θ. Additionally, because |f_N(z;μ+β y,y)|≤C/y, we have for ϑ∈(α,δ,λ) that |∂ f_N(z;μ+β y,y)f_TSS(y;α,δ,λ)/∂ϑ|≤C/y|∂ f_TSS(y;α,δ,λ)/∂ϑ| such that
∂ f_NTS(z;θ)/∂θ=∫_0^∞∂/∂θ(f_N(z;μ+β y,y)f_TSS(y;α,δ,λ)) y
holds by property (iv) for the TSS distribution. (iv) follows analogously as in (c) because
∫_-∞^∞sup_θ∈Θ||∂ f_NTS(z;θ)/∂θ|| z
≤ ∫_-∞^∞∫_0^∞sup_θ∈Θ||∂/∂θ(f_N(z;μ+β y,y)f_TSS(y;α,δ,λ))|| y z
= ∫_0^∞∫_-∞^∞sup_θ∈Θ||∂/∂θ(f_N(z;μ+β y,y)f_TSS(y;α,δ,λ))|| z y.
In order to bound (<ref>), we discuss the partial derivatives separately. For ∂/∂ϑ, ϑ∈(α,δ,λ),
∫_0^∞∫_-∞^∞sup_θ∈Θ||∂/∂ϑ(f_N(z;μ+β y,y)f_TSS(y;α,δ,λ))|| z y
≤ ∫_0^∞sup_θ∈Θ||∂/∂ϑf_TSS(y;α,δ,λ)||∫_-∞^∞sup_θ∈Θ|f_N(z;μ+β y,y)| z y
≤ C∫_0^∞1/√(y)sup_θ∈Θ||∂/∂ϑf_TSS(y;α,δ,λ)|| y
< ∞,
by (<ref>) and by the regularity of the stable distribution. For ∂/∂μ, (<ref>) is bounded by
∫_0^∞sup_θ∈Θ||f_TSS(y;α,δ,λ)||∫_-∞^∞sup_θ∈Θ||∂/∂μf_N(z;μ+β y,y)|| z y
≤ C∫_0^∞1/ysup_θ∈Θ||f_TSS(y;α,δ,λ)|| y
< ∞,
by the regularity of the normal distribution. For ∂/∂β,
∫_0^∞sup_θ∈Θ||f_TSS(y;α,δ,λ)|∫_-∞^∞sup_θ∈Θ||∂/∂βf_N(z;μ+β y,y)|| z y
≤ C∫_0^∞sup_θ∈Θ||f_TSS(y;α,δ,λ)|| y
< ∞.
The second part of (iv) follows analogously. (v) follows in a similar fashion as in (a) and (c).
As in (a)–(c), it is for (vi) enough to consider the behavior of C(z) for z→±∞, where C(z) is the function which bounds the elements of ∂^2/∂θ∂θ^'log f_NTS(z;θ) in absolute value. With the same arguments as above it holds that
∂^2 f_NTS(z;θ)/∂θ∂θ'=∫_0^∞∂^2/∂θ∂θ'(f_N(z;μ+β y,y)e^-λ y-λ^αδΓ(-α)f_S(y;α,δ)) y.
We use that by the series representation for the parameter derivatives of <cit.> the second derivatives of the stable distribution are of order O(y^-α-1log(y)^2). Tedious computations thus yield that C(z)=O(z^2log(|z|)^2), which implies (iv).
We check the conditions of Assumption <ref> for the tempered stable subordinator. The other two cases follow analogously. (i) Θ is compact by construction and π is chosen in such a way that it fulfills (ii). (iii) holds because
exp(δΓ(-α)((λ-it)^α-λ^α))=exp(δ_0Γ(-α_0)((λ_0-it)^α_0-λ_0^α_0))
has to hold for each t which uniquely determines α=α_0,λ=λ_0 and thus also δ=δ_0. (iv)–(vi) have been shown in the proof of Theorem <ref>.
The crucial assumption for consistency of a GMC estimator is that W𝔼_θ_0[g(X_j;θ)]=0 only if θ=θ_0, where W is a positive definite matrix. (For the efficient GMC estimator we would choose W=Ω^-1.) <cit.> showed that cumulant matching for the CTS distribution this holds locally by the local inverse function theorem. A generalization to GMC is straightforward. However, we argue now why this only holds locally.
Consider for simplicity the TSS distribution and three moment conditions. The argument carries over to the other cases. <cit.> proved the following version of the Hadamard-Caccioppoli global inverse function theorem: Let f:X→ Y be a local homeomorphism with X,Y path-connected Hausdorff spaces and Y is simply connected. Then f is a homeomorphism onto Y if and only if it is a proper function, i.e., the preimage f^-1(K) of any compact set K⊂ Y is compact. We will use the equivalent statement that whenever a sequence {x_n}⊆ X satisfies x_n→ x for some x∈∂ X then f(x_n)→ y for y∈∂ Y, where ∂ X denotes the boundary of X.
Let
f:(0,1)× (0,∞)×(0,∞) → (0,∞)^3
θ ↦ (Γ(1-α)δ/λ^1-α,Γ(2-α)δ/λ^2-α,Γ(3-α)δ/λ^3-α).
<cit.> showed that f is a local homeomorphism. Obviously, X and Y are path-connected Hausdorff spaces and Y is simply connected. Take a sequence θ_n such that α_n→0 and δ_n≡δ,λ_n≡λ. This fulfills that θ_n→(-∞,1,∞)∈∂ X. However, f(θ_n)→(Γ(1)δ/λ,Γ(2)δ/λ^2,Γ(3)δ/λ^3)∉∂ Y. Therefore the local homeomorphism is not global.
The issue of global invertibility is not solved if we extend the possible parameter space of the index α to (-∞,1), which is technically possible to define distribution on this space <cit.>. In this case, we can construct a sequence such that α_n→-∞, δ_n≡1 and λ_n=Γ(1-α_n)^1/1-α_n. Thus, θ_n→∂ X, but, f(θ_n)→ (1,e,e^2)∉∂ Y.
|
http://arxiv.org/abs/2303.07291v1
|
20230313171136
|
Anyon condensation in the string-net models
|
[
"Chien-Hung Lin",
"Fiona J. Burnell"
] |
cond-mat.str-el
|
[
"cond-mat.str-el",
"math-ph",
"math.MP",
"quant-ph"
] |
School of Physics and Astronomy, University of Minnesota, Minneapolis, Minnesota 55455, USA
We study condensation of abelian bosons in string-net models, by constructing a family of Hamiltonians that can be tuned through any such transition. We show that these Hamiltonians admit two exactly solvable, string-net limits: one deep in the uncondensed phase, described by an initial, uncondensed string net Hamiltonian, and one deep in the condensed phase, described by a final, condensed string net model.
We give a systematic description of the condensed string net model in terms of the uncondensed string net and the data associated with the condensing abelian bosons.
Specifically, if the uncondensed string net is described by a fusion category 𝒞, we show how the string labels and fusion data of the fusion category 𝒞̃
describing the condensed string net can be obtained from that of 𝒞 and the data describing the string oeprators that create the condensing boson.
This construction generalizes previous approaches to anyon condensation in string nets, by allowing the condensation of arbitrary abelian bosons, including chiral bosons in string nets constructed from (for example) Chern-Simons theories, which describe time-reversal invariant bilayer states. This gives a method for obtaining the full data for string nets without explicit time-reversal symmetry from such bilayer models.
We illustrate our approach with several examples.
Anyon condensation in the string-net models
Fiona J. Burnell
March 30, 2023
===========================================
Anyon condensation in the string-net models
Fiona J. Burnell
March 30, 2023
===========================================
§ INTRODUCTION
The universal, low-energy properties of gapped phases of quantum matter are described using two principles: symmetry and topological order.
Considerable effort in recent years has gone into expanding our understanding of the resulting geneaology of quantum phases that cannot be described by the Landau paradigm of spontaneously broken symmetries, unveiling many new intriguing possibilities for strongly interacting systems.
Among the earliest notable exceptions to Landau's framework are topologically ordered phases in 2+1 dimensions,<cit.>,
which harbor emergent point-like particles (known as anyons) with fractional statistics.
The long-ranged properties of topologically ordered phases are captured by a mathematical structure known as a unitary modular tensor category (UMTC) <cit.>, which describes the rules governing fusion and braiding of point-like excitations. Thus our knowledge of the possible topologically ordered phases – much like our knowledge of the possible symmetry groups – is quite be complete. Given this, it is natural to ask which phases can, in principle, be related by second-order phase transitions?
In the case of topological order, this question is closely related to the question of which topological orders are related by so-called anyon condensation transitions (see <cit.> for a brief review). Such transitions were first studied in the context of conformal field theory<cit.>, and they have been discussed for general UMTC's in the mathematical literature <cit.>. Refs. <cit.> described how, in the context of 2+1 dimensional topologically ordered phases, these transitions physically correspond to processes in which emergent bosons condense; the topological order obtained is then a direct consequence of the new, condensed, vacuum.
Anyon condensation has proven useful in understanding not only the structure of topological phases<cit.>, but also when they admit gappable boundaries<cit.>, and how to create non-abelian topological orders<cit.> or topological defects<cit.> from abelian ones.
Moreover, the possibility of condensing anyons to change a topological order also opens up the door for novel second-order critical points which may not have analogues in conventional symmetry-breaking transitions<cit.>. Recently, it has been observed that anyon condensation can also be used to study certain dynamical processes in open quantum systems and quantum codes <cit.>.
In studying anyon condensation, it is useful to have a lattice Hamiltonian that can be tuned between the two phases in question. This establishes beyond a doubt that a direct transition between the two topological orders can occur, and enables a variety of analytical and numerical approaches to be used to study both the corresponding phase transitions, and verify the above description of the condensed phase <cit.>. Lattice models of anyon condensation are also useful for constructing Hamiltonians realizing symmetry-enriched topological orders <cit.>.
The present work focuses on a family of 2D topological orders known as Drinfeld centers, which are believed to be the most general class of (bosonic) topological orders compatible with gapped boundaries <cit.>. These can be realized by commuting projector lattice models known as string nets <cit.>. The string net construction begins not from the UMTC describing the anyon model, but from a pivotal fusion category C, which describes the Hamiltonian and ground states. The full topological order (i.e. UMTC) is exhibited by studying so-called string operators, which realize point-like anyonic excitations at their end-points. A number of works have previously studied anyon condensation in these models <cit.>.
However, the literature so far has focused primarily on transitions which condense a particular type of boson within these string net models, corresponding to excitations of only the plaquette term in the string net Hamiltonian. For such condensation processes a general prescription exists<cit.> to modify the string-net Hamiltonian by adding a term which can drive anyon condensation; in the limit that this term is very large the Hamiltonian reduces to a new string net model realizing the topological order of the condensed phase, constructed from a sub-category of the original fusion category 𝒞. In other words, the data for the string net model of the condensed phase follows straightforwardly from that of the uncondensed phase. (The relation between the string operators of the condensed and uncondensed phases, however, is not quite so straightforward).
Here, we will describe a general formalism that describes condensation of arbitrary abelian bosons in string-net models.[An abelian boson is simply a boson that has a unique fusion outcome with any other anyon in the theory.] First, we describe an extended version of the string net construction, obtained by extending the Hilbert space using an approach similar to that of Ref. <cit.>, albeit tailored to simplify the description of the condensed phase. Within this extended Hilbert space, we construct a family of model Hamiltonians that can be tuned through a transition involving the condensation of any abelian boson, and outline the topological order expected for the resulting condensed phase. Our modified model has the advantage that deep in the condensed phase, a general prescription can be given to identify both the low-energy effective Hilbert space and the ground state. We describe how the Hilbert space of the condensed phase can be described by a new, effective, set of string labels (i.e. a new effective fusion category 𝒞̃), whose relationship to the original label set can be calculated explicitly. We further show that the ground state of the condensed phase is also a string-net ground state, described by the data of the new fusion category 𝒞̃. In this regime, our Hamiltonian acts like the regular string net Hamiltonian on the new label set.
Moreover, we obtain an explicit expression for the fusion data of 𝒞̃ in terms of 𝒞 and the condensing bosons.
The relationship between the topological order of the uncondensed and condensed anyon models can be
characterized by the fate of the anyons of the original topological order in this condensed vacuum. First, anyons that braid non-trivially with any of the condensing bosons become confined, and are absent from the topological order of the condensed theory. Second, two anyons that are related by fusion with one of the condensing bosons must be identified in the condensed phase, meaning that topologically speaking, they correspond to the same excitation. Finally, certain non-abelian anyons can split into multiple distinct anyon types after condensation. For condensation of abelian bosons, these relationships are well known in conformal field theory, where they go by the name of central extensions<cit.>, and the S and T matrices of the final topological orders can be computed explicitly.
However, as noted by Ref. <cit.>, the task of computing the full topological data - namely F and R matrices - is significantly more challenging.
Our approach does not easily give us access to the full topological data of the anyon model – indeed, though the confinement, identification, and splitting of anyons in the final topological order is apparent from the form of our Hamiltonian, in our approach the associated topological data is inferred only indirectly, through the emergence of the new string net data 𝒞̃, which in turn implies a new set of anyon- creating string operators. However,
we show that our approach to string net condensation does allow one to straightforwardly compute the data of the fusion category underlying the condensed phase, as we demonstrate explicitly in a number of examples.
An interesting application of the condensation transitions studied here is that they can take a string net with an explicit time-reversal symmetry (of the type described in the original work by Levin and Wen<cit.>) into one that does not admit a naive time-reversal transformation (described in detail in Ref. <cit.>). One example that we will discuss in detail is the transition from SU(2)_4 ×SU(2)_4 to U(1)_3 ×SU(2)_4, for which 𝒞 = SU(2)_4 has all of the symmetries assumed by Ref. <cit.>, while C̃ = TY_3 does not.
The paper is organized as follows. In Sec. <ref>, we review some basics of general string-net ground states, and introduce the extended string-net Hilbert space that we use to study anyon condensation.
In Sec. <ref>, we introduce a family of modified string net Hamiltonians, which can be tuned across a transition condensing an arbitrary abelian boson.
We describe the effective Hilbert space deep in the condensed phase in Sec. <ref>, where we discuss how the string types in 𝒞̃ are related to those in 𝒞. In Sec. <ref>, we study the condensed ground state, and show that it is indeed a string net. In particular, we show how the new ground state allows one to describe the fusion data of 𝒞̃, verify that this fusion data is indeed consistent, and argue that the full Hamiltonian projected into the condensed Hilbert space is indeed the associated string net Hamiltonian.
We illustrate our construction with concrete examples in Sec. <ref>. A number of technical details are elaborated on in the appendices.
§ EXTENDED STRING-NET MODELS
In this section, we introduce the extended string-net models that we will use for our models of anyon condensation.
§.§ Review: Generalized string net models
We begin by reviewing the string-net construction. Here we use the generalized string-net construction of Ref. <cit.> (see also Refs. <cit.>), since the symmetries assumed in the original construction<cit.> are not always present in the condensed phase.
We defer a discussion of string-net Hamiltonians to Sec. <ref>, and here focus on the string-net Hilbert space, together with its ground states and certain excited states.
§.§.§ The string-net ground state
The string net model consists of a Hamiltonian whose ground state(s) obey certain special properties, which we now describe.
These string-net ground states live in a Hilbert space of string-net configurations, each of which is defined on an oriented, trivalent graph. (Though the string-net Hamiltonians are defined on the honeycomb lattice, this lattice structure is not necessary to describe the string-net ground states.) Throughout this work, we use the convention that all strings are oriented upward, i.e. the orientation vector has positive projection onto the ŷ direction. We therefore require this projection to be non-zero, such that our strings cannot have horizontal tangent vectors.
The string net configuration is obtained by assigning to each edge i a label (or string type) a_i.
The combinations of string types { (a,b; c)} that are allowed to meet at a vertex is dictated by a set of branching rules– i.e. if (a,b;c) is among the branching rules, then the vertices
-0.22in
< g r a p h i c s >
-0.22in
< g r a p h i c s >
are allowed.
The set of all string-net configurations which satisfy the above branching rules form an orthonormal basis for the string-net Hilbert space ℋ.
We will call those states in this string-net Hilbert space string net states.
In order to be able to define a string-net ground state, our label set and branching rules must satisfy certain conditions.
First, defining
δ^ab_c= {[ 1, if {a,b;c} is allowed; 0, otherwise. ]. ,
the branching rules must satisfy:
∑_e δ^ab_e δ^ec_d = ∑_f δ^bc_f δ^af_d .
It follows that if (a,b;c) is allowed, then so are (c̅, a; b̅), (b, c̅; a̅), and (b̅ , a̅, c̅).
Second, our label set must contain a null label, which we denote 0, and depict diagrammatically with a dashed line. This label is trivial in the sense that edges carrying this null label can be added to or deleted without changing the physical state (i.e. a null labeled edge is physically equivalent to having no edge at all). Note that we will use 0 to denote the trivial string label, and 1 to denote a trivial anyon.
Finally, for each string type a, we require that our label set contains a dual string type a̅, such that the branching rules must contain (a,a̅;0) and (a̅,a; 0) (but not (a,b;0) for any b ≠a̅). The null string 0 is self-dual, 0=0̅.
The string-net ground state |Φ⟩ is described by two sets of parameters: a set of complex numbers F^abc_def, known as the F symbols, depending on 6 string types a,b,…,f, and a positive number d_a for each string type a, often called its quantum dimension. These determine the relative coefficients of different string net configurations in the ground state, via the relations:
Φ(-0.22in
< g r a p h i c s >
) =∑_f F^abc_defΦ(-0.22in
< g r a p h i c s >
)
Φ(-0.22in
< g r a p h i c s >
) =∑_c √(d_c/d_a d_b)Φ(-0.22in
< g r a p h i c s >
)
Φ(-0.22in
< g r a p h i c s >
) =δ_c,d√(d_a d_b/d_c)Φ(-0.22in
< g r a p h i c s >
)
Φ(-0.22in
< g r a p h i c s >
) =∑_f (F^abc_d)_fe^-1Φ(-0.22in
< g r a p h i c s >
)
Here a,b,c,… are arbitrary string types (including the null string) and the shaded regions represent arbitrary string-net configurations which are not changed from on side of the equation to the other. The symbol δ_c,d=1 if c=d and δ_c,d=0 otherwise.
The relative amplitudes in Eqs. (<ref>) are unchanged by horizontal bendings of the strings, but are not invariant under vertical bending. Indeed, we do not allow smooth vertical bends in our string-net graphs at all; only kinks, which are equivalent to vertices (a, a̅; 0) or (a̅,a; 0). These can be added or removed using the appropriate F symbols.
The F-symbols and quantum dimensions are not free parameters. Rather,
to have a well-defined wave function Φ, the parameters {F^abc_cde,F̃^abc_cde,
d_a} need to satisfy:
F^fcd_eglF^abl_efk =∑_h F^abc_gfh F^ahd_egk F^bcd_khl
F^abc_def =1 if a or b or c=0
d_a =d_a̅=1 if a=0 .
These constraints are in fact quite limiting; solutions are described mathematically by a pivotal fusion category.
In addition, to ensure that the string-net Hamimltonian is Hermitian, we require:
(F^abc_d)^-1_ef = (F^abc_dfe)^*
|F^abb̅_ac0| = √(d_c/d_a d_b)δ^ab_c
d_a = d_a̅
where (F^abc_d)^-1 is the matrix inverse of (F^abc_d), whose matrix elements are (F^abc_d)_ef≡ F^abc_def.
The conditions (<ref>) also imply that the quantum dimensions obey:
d_a d_b = ∑_c d_c
where the sum runs over all values of c that satisfy the branching rules.
Local unitary transformations of the string net wave function
result in new coefficients {F̂, d̂}, which are related to the original coefficients {F, d} via the gauge transformation:
F̂^abc_def =F^abc_def·f^ab_ef^ec_d/f^bc_f f^af_d
d̂_a =d_a .
Here f^ab_c parametrize the local unitary transformation; they are complex functions defined on upward vertices, with the downward vertices transformed by 1/f^ab_c. To preserve the constraints listed above, we require
|f^ab_c| =1,
f^ab_c=1 if a or b=0.
It is convenient to note that the local rules (<ref>) imply the following identities:
Φ(-0.22in
< g r a p h i c s >
) =∑_f [F^ab_cd]_efΦ(-0.22in
< g r a p h i c s >
)
Φ(-0.22in
< g r a p h i c s >
) =∑_f [F̃^ab_cd]_efΦ(-0.22in
< g r a p h i c s >
)
with
[F^ab_cd]_ef
=(F^ceb_f)_da^-1 d_e d_f /d_d d_a
[F̃^ab_cd]_ef = F^ceb_fadd_e d_f /d_a d_d
§.§.§ Abelian string operators
Next, we review the string operators that create point-like anyon excitations when acting on the ground state. Here we focus on the case where these anyons are abelian bosons, since these are the excitations we wish to condense. (For a discussion of more general string operators, see Ref. <cit.>.)
Recall that an abelian anyon is defined by the fact that it has a unique fusion product with any other anyon in the theory; it is a boson if it has trivial statistics with itself.
To create a particle-antiparticle pair (a, a̅) at two points in our lattice, we act on the string-net ground state with a string operator W_a(P) along an oriented path P. This creates a at the final endpoint of P, and its antiparticle a̅ at the initial endpoint. On a given string-net state X|, we depict this action by drawing an a-labeled string along the path P under the string-net graph. The string label a specifies both a choice of one or more string types, and some extra data required to resolve crossings between the path P and
the string-net graph.
If a ≡ϕ is an abelian anyon, the label ϕ corresponds to a single string type s,
meaning that in regions where P does not cross any edges of the string-net, we replace the label ϕ with s on upward-oriented segments of P, and s̅ on downward-oriented segments of P. Further, s (and s̅) must have a unique fusion product with all other string types, meaning that for each a, the branching rules contain (a,s; a') (and also (s,a; a')) for only one a', which we will sometimes denote as a' ≡ a × s. It follows that
d_s = d_s̅ = 1,
and thus d_a = d_a' by Eq. (<ref>).
In this case the coefficients associated with the moves (<ref>) and (<ref>) are unity.
For abelian anyons, the crossings are resolved using the rules:
<-0.22in
< g r a p h i c s >
|=w_ϕ(a)<-0.22in
< g r a p h i c s >
|
<-0.22in
< g r a p h i c s >
|=w̅_ϕ(a)<-0.22in
< g r a p h i c s >
|
Here w_ϕ(a),w̅_ϕ(a)
are complex-valued functions of the string type a, with w_ϕ(0)=w̅_ϕ(0)
=1.
These rules, together with the local string-net rules (<ref>), dictate how to fuse the ϕ-string into the string-net graph,
giving a new string-net states X'|, multiplied by a product of w_ϕ,w̅_ϕ.
This defines the action of W_ϕ(P) in terms of the parameters (s,w,w̅). For every abelian anyon ϕ, there is an inverse anyon ϕ̅, obeying ϕ×ϕ̅ = 1, where 1 denotes the identity anyon.
To ensure that W_ϕ(P) creates point-like excitations in the string-net ground state, we choose the parameters (s,w,w̅) such that when acting on the string-net ground state |Φ⟩, the path independence condition:
W_ϕ(P)|Φ=W_ϕ(P')|Φ
is satisfied for any two upward paths P,P' with the same end points.
Eq. (<ref>) will be satisfied if the corresponding parameters (s,w,w̅) obey
w_ϕ(a)w_ϕ(b) =C_s(a,b,c) w_ϕ(c),
w̅_ϕ(a) =w_ϕ(a)^-1
w_ϕ(a)w_ϕ̅(a) =C_a(s,s̅,0)^-1
with
C_s(a,b,c)=F^sab_c'a'cF^abs_c'cb'/F^asb_c'a'b'
where x' = x× s for x=a,b,c, and (a,b;c) is allowed by the branching rules. Given a set of F-symbols satisfying (<ref>,<ref>) and a choice of the string s, in general we will find multiple solutions to Eqs. (<ref>) for w_ϕ. We label these by m, and the corresponding anyon by ϕ=(s,m) where s is the string type created by the corresponding string operator W_ϕ and m labels distinct solutions for a given s.
For example, the ℤ_N string-net model has N string types a∈{0,1,…,N-1} with ℤ_N branching rules (a,b;c=a+b( mod N)).
There are N distinct solution to (<ref>)<cit.>
F(a,b,c)=e^2π i pa/N^2(b+c-[b+c]_N).
labeled by p=0,…,N-1. The arguments a,b,c take values in 0,…,N-1 and [b+c]_N denotes b+c (mod N) with values also taken in 0,…,N-1.
Each ℤ_N string-net model has N^2 topologically distinct quasiparticle excitations labeled by ϕ=(s,m) where s,m=0,1,…,N-1. The corresponding string operators W_ϕ are defined by the string parameters
w_ϕ(a)=e^2π i(psa/N^2+ma/N).
The braiding statistics of quasiparticles can be extracted from the commutation algebra of the corresponding string oeprators. (see Ref. LinLevinstrnet, LevinWenstrnet, LinLevinBurnell for details). Specifically, the exchange statistics of ϕ=(s,m) is
e^iθ_ϕ = w_ϕ(s).
Thus self-bosons satisfy
w_ϕ(s)=1.
If ϕ = (s,m) and χ = (r,n) are two abelian bosons that we wish to condense simultaneously, then they must have trivial braiding. This requires that<cit.>
w_ϕ(r) w_χ(s) = 1 .
§.§ Extended string-net model
In the usual string-net construction, if s ≠ 0, W_ϕ(P) creates states outside of the string net Hilbert space, since near the endpoints of P there is no way to fuse an s-labeled string into the string net graph without creating vertices that violate the branching rules.
When we are only interested in the topological nature of the excitations, the resulting ambiguity in the action of W_ϕ(P) near the endpoints is unimportant, since it affects only the immediate vicinity of the excitation and hence cannot impact its topological properties. In order to condense ϕ, however, we require a more careful treatment of these endpoints. We achieve this by extending the string-net Hilbert space.
§.§.§ Extended string-net Hilbert space
The extended string-net Hilbert space, ℋ_{ϕ}, is defined with respect to a set {ϕ} of abelian bosons that we wish to condense.
Since every finite abelian group is isomorphic to a direct product of cyclic groups, we can assume without loss of generality that the group is G=ℤ_N_1×…×ℤ_N_k. To understand how to condense all bosons in G, it is therefore sufficient to understand how to condense bosons in a single ℤ_N_j factor; thus in what follows, for simplicity we will often restrict ourselves to the case that the set of bosons to be condensed comprise a cyclic group.
The string-nets in ℋ_{ϕ} are oriented trivalent graphs with two types of edges, as shown in Fig. <ref>. The first type, which we will simply call edges, are edges connecting two trivalent vertices. Each such edge carries a string label as defined in ℋ.
The second type of edge, which we will call sticks, has one end-point at a trivalent vertex, and one open endpoint. A stick carries a |G|-spin label, which takes values in the set of abelian bosons {ϕ}. This spin label ϕ=(s,m) also dictates a string label s associated with the stick; we require the labels at each trivalent vertex to satisfy the branching rules, and the total G-spin label (i.e. the sum of spin labels of all sticks) must be trivial.
An orthonormal basis for the extended Hilbert space ℋ_ϕ is thus given by the set of all oriented trivalent graphs with sticks which (1) satisfy the branching rules at each trivalent vertex, and (2) have a net trivial G-spin.
To describe these extended string-nets on the lattice, we work on a decorated honeycomb lattice: at the center of each edge of the honeycomb lattice, we add an upward-pointing stick (see Fig. <ref> (b)). We introduce two types of spins on the decorated lattice: link spins, which live on its edges, and end spins, which live at the endpoints of each stick.
The link spins take values in the string types {0, a, b, c, ...} of the standard string-net model, and end spins take values in excitation labels {ϕ}. We require a stick carrying a label ϕ=(s,m) to have the string label s, and that all trivalent vertices satisfy the branching rules.
§.§.§ W_ϕ(P) in the extended string-net Hilbert space
In the following, we will use the extended string-net Hilbert space in two ways. First, we may use it to describe a system whose ground state is the original string-net ground state, but which can also describe certain excited states that are not allowed in the original string-net Hilbert space. In this case, sticks with non-trivial labels appear only in excited states, and the string-net ground state is exactly as described in Sec. <ref>.
Second, in order to describe the condensed phase, we can view all sticks as part of the ground-state Hilbert space. This will allow us to describe a modified set of local rules capturing the condensed phase, as we discuss in Sec. <ref>.
Here, we take the first perspective, and describe the action of the string operator W_ϕ(P) in the extended Hilbert space. The action of W_ϕ(P) on the string net ground state |Φ⟩ is exactly as specified in Sec. <ref> away from the end-points of P. However, we now require P to begin and end on two sticks. In adddition to its action on the edge labels, W_ϕ(P) acts by raising the end spin at the final and initial end-point of the path P by ϕ and ϕ, respectively.
When {ϕ} is a set of abelian bosons with trivial mutual statistics, we can describe any string operator W_ϕ(P) as a product of “basic string operators" W^i_ϕ, each of which connects a pair of sticks on adjacent edges.
The four basic string operators on the decorated honeycomb lattice act along the four paths p_1,p_2,p_3,p_4 shown in Fig. <ref>(a).
The operators W_ϕ^1,W_ϕ^2 act on paths p_1 and p_2 centered at upward vertices, while W_ϕ^3,W_ϕ^4 act on paths p_3 and p_4, centered at the downward vertices.
Their action is defined as follows. Let a,b,c,d and e,f,g denote the initial link spin states along p_i and on the external legs of p_i respectively, and let ϕ_a,ϕ_b be the initial end spin states at stick a,b respectively (see Fig. <ref>).
The matrix elements of W^i_ϕ between an initial state a,b,c,d,e,f,g,ϕ_a,ϕ_b and a final state a',b',c',d',e,f,g,ϕ_a',ϕ_b' are then given by
W_ϕ,a'b'c'd';ϕ_a'ϕ_b'^1,abcd;ϕ_aϕ_b(efg) =w̅_ϕ(f) δ_ϕ_a×ϕ,ϕ_a'δ_ϕ_b×ϕ̅,ϕ_b'×
F^eas_c'ca'
F^cfs_d'df'
(F^csf_d'c'f')^*
F^ss̅b_b 0 b'
(F^d s b'_gd'b)^*
W_ϕ,a'b'c'd';ϕ_a'ϕ_b'^2,abcd;ϕ_aϕ_b(efg) =
δ_ϕ_a×ϕ,ϕ_a'δ_ϕ_b×ϕ̅,ϕ_b'×
F^eas_c'ca'
F^fcs_d'dc'
F^ss̅b_b 0 b'
(F^d s b'_gd'b)^*
W_ϕ,a'b'c'd';ϕ_a'ϕ_b'^3,abcd;ϕ_aϕ_b(efg) =w_ϕ(f) δ_ϕ_a×ϕ,ϕ_a'δ_ϕ_b×ϕ̅,ϕ_b'×
F^eas_c'ca'
(F^dfs_c'cf')^*
F^dsf_c'd'f'
F^ss̅b_b 0 b'
(F^d s b'_gd'b)^*
W_ϕ,a'b'c'd';ϕ_a'ϕ_b'^4,abcd;ϕ_aϕ_b(efg) =
δ_ϕ_a×ϕ,ϕ_a'δ_ϕ_b×ϕ̅,ϕ_b'×
F^eas_c'ca'
(F^fds_c'cd')^*
F^ss̅b_b 0 b'
(F^d s b'_gd'b)^*
Here x' = x × s (or x ×s̅, if x=b), where
we use multiplicative notation for the abelian group operation on both edge and end spins.
Notice that the matrix elements of open string operators are not invariant under local unitary transformations of the form (<ref>), and thus are gauge dependent.
When ϕ are cyclic abelian bosons with trivial mutual statistics, there exists a convenient gauge
F(s^i,s^j,s^k)≡ F^s^is^js^k_s^(i+j+k)s^(i+j)s^(j+k)=1
where s^i,s^j,s^k are any string types associated with condensing bosons (see Appendix <ref>). We will work in the gauge (<ref>) in the rest of the paper.
In the gauge (<ref>), the basic string operators have the following important properties, which we derive in Appendix <ref>.
First, all basic string operators commute with each other:
[W_ϕ^i,W_ϕ'^j]=0.
Second, one can show that
W^i†_ϕ =W^i_ϕ̅
for i=1,2,3,4.
Finally, a general string operator can be expressed as a product of simple string operators.
First, W_ϕ_1^i, W_ϕ_2^i along the same path p_i can be combined as
W_ϕ_1^i · W_ϕ_2^i =W_ϕ_1×ϕ_2 ^i
where the · operation is defined by
W_ϕ_3=ϕ_1×ϕ_2,a_3b_3̅c_3d_3;ϕ_a×ϕ_3,ϕ_b×ϕ̅_3^i,abcd;ϕ_aϕ_b(efg) =
W_ϕ_1,a_1b_1̅c_1d_1;ϕ_a×ϕ_1,ϕ_b×ϕ̅_1^i,abcd;ϕ_aϕ_b(efg) ×
W_ϕ_2,a_3b_3̅c_3d_3;ϕ_a×ϕ_3,ϕ_b×ϕ̅_3^i,a_1b_1̅c_1d_1,ϕ_a×ϕ_1,ϕ_b×ϕ̅_1(efg)
for i=1,…,4. Thus if the set of condensing bosons is cyclic and generated by ϕ, we can express all basic string operators as products of the basic string operator W^i_ϕ.
Second,
let P be a path obtained from a union of two basic paths, p_i(r_1,r_2), which begins on a stick at positions r_1, and ends on a stick at position r_2, and p_j(r_2,r_3), which begins on the stick at r_2 and ends on a stick at r_3 (see Fig. (<ref>)). (Note that it is because w_ϕ(s) =1 that we can combine string end-points into a single string that crosses the sticks).
Then we have:
W_ϕ(P) = W_ϕ^i, (12) W_ϕ^j,(23)
and similarly for paths composed of more than two concatenated segments, as shown in the Figure. Here we define W_ϕ^i, (12) = W^i_ϕ if p_i(r_1,r_2) is oriented upwards, and (W^i_ϕ)^† otherwise. By joining string operators along multiple basic paths in this way, we can thus express W_ϕ(P) as a product of basic string operators for any path P. (Note that since the basic string operators commute, the order in which we apply them is unimportant.)
It follows that any product of ϕ-string operators for ϕ in our chosen set of abelian bosons can be expressed as a product of basic string operators.
§ LATTICE HAMILTONIANS FOR CONDENSING ABELIAN BOSONS
Next, we identify a lattice Hamiltonian H(J) within the extended string-net Hilbert space that, by tuning a parameter J, can bring a system through a transition in which a set of abelian bosons is condensed.
Our lattice Hamiltonian has the general form
H(J)= H_𝒞 - J H_1 .
Here H_𝒞 is a Hamiltonian in the extended string-net Hilbert space whose ground state is exactly the original string-net ground state; it can be viewed as a modification of the original string-net Hamiltonian (see Refs. <cit.>) appropriate to the extended string-net Hilbert space. H_1 is a term which creates particle- antiparticle pairs of anyons in the set {ϕ} of condensing bosons. Here, for simplicity, we take this set to be a cyclic group of order p, which we denote ϕ = {ϕ^i, i = 1, ... , p}. with ϕ^p = 1.
We will show that H(J) has the following properties. First, H(J=0) is identical to the original string-net Hamiltonian when acting on states where all stick labels are trivial, and states with sticks carrying non-trivial labels ϕ^i have a finite energy cost. Thus in this limit
string-net eigenstates with sticks carrying non-trivial labels ϕ^i correspond to gapped excited states, and the ground state is the original string-net ground state |Φ⟩.
Second, H(J = ∞) is a commuting projector model with a frustration-free ground state |Ψ⟩, in which excitations in the set ϕ have condensed, in the sense that they are present in arbitrary number in the ground state. Third, |Ψ⟩ can be obtained by applying a certain projector to the J=0 ground-state | Φ⟩. Thus we can describe the J= ∞ ground state explicitly in terms of the string types and local rules associated with |Φ⟩, and use this description to investigate the topological data of the condensed phase.
It is worth noting that, as we show below, the ground state of H(J) for any J contains only excitations on the sticks, and no plaquette defects. Thus for ϕ^p = 1, the critical point separating condensed and uncondensed phases is always of the Potts or clock variety, depending on the specific choice of H_1. Here we have chosen a Potts- like version, resulting in first order transitions for p ≥ 3.
§.§ The Hamiltonian H_𝒞
We first define the Hamiltonian H_𝒞 in the extended string-net Hilbert space ℋ_ϕ of the honeycomb lattice (see Fig. <ref>).
H_𝒞 is of the form
H_𝒞=-∑_e Q_e -∑_p B_p^ϕ
The two sums run over end spins e and plaquettes p of the decorated honeycomb lattice.
The operator Q_e acts on the end spins
Q_e=δ_e,1
where δ_e,1=1 if e=1 (no excitation) and δ_e,1=0 otherwise (ϕ excitations).
The operator Q_e penalizes the states with ϕ excitations at ends of sticks. Note that unlike in the usual string-net Hamiltonian, we have not included a term imposing the branching rules at each vertex; instead, we will work exclusively in the string-net Hilbert space, where these are necessarily satisfied.
The operator B_p^ϕ on the decorated honeycomb lattice is more complicated, but the main idea is as follows. First, [B_p^ϕ, B_p'^ϕ] = [B_p^ϕ,Q_e] =0, ensuring that H_𝒞 is a sum of commuting projectors. Second, analogous to the plaquette term in the usual string-net models<cit.>,B_p^ϕ maps between different string-net configurations in the extended string-net Hilbert space, ensuring that the ground states (for which all stick labels are trivial) obey the local rules (<ref>). Indeed, when acting on states where all stick labels are trivial, our plaquette term is identical to that of the generalized string net models <cit.>. Third, unlike the plaquette term of the usual string-net models, B_p^ϕ commutes with the string operators W_ϕ^k(P) even for paths P ending or beginning on the plaquette p.
We note that here we use a prescription that ensures that B_p^ϕ commutes with W_ϕ(P) for any choice ϕ = (s,m); this allows us to discuss all abelian anyon condensation transitions on the same footing. For some classes of models, however (those for which the fusion category describing the string types is braided), an alternative and potentially computationally simpler formulation of the Hamiltonian resulting in the same condensed phase exists; this is discussed in Appendix <ref>.
We now describe the operator B_p^ϕ in detail. B_p^ϕ has the form:
B_p^ϕ=∑_s=0^N-1d_s/DB_p^ϕ,s
where D=∑_s=0^N-1d_s^2 and B_p^ϕ,s describes a 27 spin interaction involving the 24 link spins around p and 3 end spins inside p (see Fig. <ref>).
Its action can be understood as a sequence of three operations:
B_p^ϕ,s=∑_ϕ_10,ϕ_11,ϕ_12 W^†_ϕ_10,ϕ_11,ϕ_12 B_p^s W_ϕ_10,ϕ_11,ϕ_12
where the sums run over the possible spin labels of the three sticks inside p, with
W_ϕ_10,ϕ_11,ϕ_12=
(W_ϕ_10^1)^†𝒫_ϕ_10·
W_ϕ_11^1 𝒫_ϕ_11·
W_ϕ_12^3 𝒫_ϕ_12
Here 𝒫_ϕ_a=|ϕ_aϕ_a| projects the end spin label of stick a onto ϕ_a, and (W_ϕ_10^1)^†,W_ϕ_11^1,W_ϕ_12^3 are basic string operators (see Eq. (<ref>)) that lower the spin label on sticks 10, 11, and 12 by ϕ_10, ϕ_11, and ϕ_12 respectively.
The operator W_ϕ_10,ϕ_11,ϕ_12 therefore moves any excitations on the sticks
inside the plaquette p to sticks outside of p:
<-0.32in
< g r a p h i c s >
|
W_ϕ_10,ϕ_11,ϕ_12=C_1 ·<-0.32in
< g r a p h i c s >
|.
This action is nontrivial only if {ϕ_10,ϕ_11,ϕ_12} contains non-trivial end spin labels. In particular, it is trivial when acting on ground states of H_𝒞.
The second operation B_p^s is the same as the plaquette operator defined in the Ref. LevinWenstrnet which adds a loop of type-s string around the boundary of p:
<-0.32in
< g r a p h i c s >
|B_p^s =
<-0.32in
< g r a p h i c s >
|
=∑_i_1'… i_6' C_2 ·<-0.32in
< g r a p h i c s >
|.
Finally, the operation W^†_ϕ_10,ϕ_11,ϕ_12 moves the excitations {ϕ^10,ϕ^11,ϕ^12} back to the appropriate sticks in p:
<-0.32in
< g r a p h i c s >
|W_ϕ_10,ϕ_11,ϕ_12^†=C_3 ·<-0.32in
< g r a p h i c s >
|.
Here C_1,C_2,C_3 are the corresponding matrix elements of the three operations. The product C_1 · C_2 · C_3 gives the matrix elements of B_p^ϕ,s.
More precisely, the matrix elements of B_p^ϕ,s are defined by
<-0.32in
< g r a p h i c s >
| B_p^ϕ,s
=∑_i'_1…'_6-0.32in
< g r a p h i c s >
|
B^s,i_1… i_6j_1… j_6_p,i'_1… i'_6j'_1… j'_6(e_1… e_12;ϕ_10,ϕ_11,ϕ_12)
where
B^s,i_1… i_6j_1… j_6_p,i'_1… i'_6j'_1… j'_6(e_1… e_12;ϕ_10,ϕ_11,ϕ_12)=
d_s√(d_i_1d_j'_2d_i_3d_i_4d_j'_5d_j_6/d_i'_1d_j_2d_i'_3d_i'_4d_j_5d_j'_6)×
(F^s̅i_1 e_7_j'_1i'_1j_1)^*
(F^s̅j_1e_2_i'_2j'_1i_2)^*
(F^s̅i_2e_8_j'_2i'_2j_2)^*
F^s̅i_3e_3_j'_2i'_3j_2
(F^s̅i_3e_9_j'_3i'_3j_3)^*
(F^e_5i_4s_j'_5j_5i'_4)^* ×
F^e'_6j_6s_j'_5j_5j'_6
F^j_6ss̅_j_6j'_60
(F^i_4ss̅_i_4i'_40)^*
(F^i'_6s̅i_1_e'_1j_6i'_1)^*
F^i'_4s̅j_3_e'_4i_4j'_3×
W^1,e_10e_13 j_4e_4;ϕ_10ϕ_13_ϕ̅_10,0e_13' i_4e_4';1ϕ_13'(i_4j_3f_4)
W_ϕ_10,e_10e_13 j'_4e_4;ϕ_10ϕ_13^1 ,0e_13'i'_4e_4';1ϕ_13'(i'_4j'_3f_4)
×
W^1,e_14 e_11e_6i_5;ϕ_14ϕ_11_ϕ_11,e'_140e_6'j_5;ϕ_14'1(f_6j_6j_5)
W_ϕ̅_11,e_14 e_11e_6i'_5;ϕ_14ϕ_11^1 ,e_14'0e_6'j'_5;ϕ_14' 1(f_6j'_6j'_5) ×
W^3,e_15 e_12e_1i_6;ϕ_15ϕ_12_ϕ_12,e_15'0e_1' j_6;ϕ_15'1(f_1i_1j_6)
W_ϕ̅_12,e_15 e_12e_1i'_6;ϕ_15ϕ_12^3 ,e_15'0e_1'j'_6;ϕ_15'1(f_1i'_1j'_6)
Here e_7,e_8… e_12 take values in abelian string types and thus j_p=i_p× e_p+6 for p=1…6 while e_1'=e_1× e_12,e_4'=e_4×e̅_10 and e'_6=e_6× e_11.
The matrix elements of W^1_ϕ,W^3_ϕ,W_ϕ^1†,W_ϕ ^3 † are defined in (<ref>) and (<ref>).
From this explicit form, one can check that the plaquette operator B_p^ϕ,s commutes with any basic string operator W_ϕ^i^j (and hence any string operator W_ϕ^i(P)):
[B_p^ϕ,s,W_ϕ^i^j]=0.
We leave the derivation to Appendix <ref>.
We can now show that
H_𝒞 (<ref>) has the following properties. First, it is a sum of commuting projectors:
clearly [Q_e, Q_e'] = [Q_e, B_p^ϕ] = 0, since B_p^ϕ does not alter the value of the spin-label on any stick, and hence preserves the eigenvalue of Q_e.
Moreover, in Appendix <ref> we show that [B_p^ϕ, B_p'^ϕ ] =0. Essentially, this results from the fact that the two plaquette operators commute in the absence of excitations on the sticks, and also that the string operator used to move a stick excitation off the shared edge between two adjacent plaquettes commutes with B^ϕ_p, where p is the plaquette that the stick points outward from.
It follows that, like the conventional string-net Hamiltonians, H_𝒞 is exactly solvable.
Second, there exists at least one state that satisfies Q_e=B_p^ϕ=1 for all e,p; this state is therefore a ground state. Clearly, states with only trivial stick labels satisfy Q_e = 1 at every vertex; when restricted to theese states, H_𝒞 reduces to the original string-net model, whose ground state |Φ is an eigenstate of the plaquette term of the corresponding Hamiltonian with eigenvalue 1 on every plaquette<cit.>. When Q_e ≡ 1, |Φ⟩ is therefore also an eigenstate satisfying B_p^ϕ≡ 1. In other words, H_𝒞 is exactly solvable, and its ground state(s) are exactly the string-net ground states defined by the local rules (<ref>).
Though they have the same ground state(s), the excited states of our extended string-net model differ from those of conventional string-net Hamiltonians.
In conventional string nets, where sticks are not included,
excited eigenstates are either string-net states with B_p^ϕ=0 on some plaquettes, or states that violate the branching rules and hence are outside of the string-net Hilbert space (for which necessarily we also have B_p^ϕ=0 on some plaquettes).
In our models, however, there are ϕ^j-type excitations of H_𝒞 satisfying B_p^ϕ=1 everywhere, with Q_e = 0 on some sticks.[We note that if we allow states outside of the string net Hilbert space, this leads to a redundancy, since in our extended Hilbert space ϕ can also be realized by an eigenstate with Q_e ≡ 1, with either some B_p^ϕ=0 or a violation of the branching rules.]
As a consequence, the ground state of H(J) satisfies B_p^ϕ≡ 1 for every positive J.
§.§ The Hamiltonian H_1
To define H_1, we begin by defining the projector along the path p_i,i=1,2,3,4:
P_ϕ^i( r) =1/p∑_k=1^pW_ϕ^k^i ( r)
where the sum runs over basic open string operators W_ϕ^k^i with ϕ^k ∈ϕ, and r indexes a unit cell of the honeycomb lattice.
The set of operators {P_ϕ^i} form commuting projectors.
The operator H_1 is defined as a sum of commuting projectors over all neighboring sticks
H_1=∑_i, rP_ϕ^i ( r)
By (<ref>), we have [H_1, B_P^ϕ] =0. Thus, H_1 creates excitations only of Q_e in H_𝒞, while leaving the operator B_P^ϕ in its ground state on every plaquette.
§.§ Condensed phase and the J →∞ limit
For J sufficiently large, the string net describes a new topological phase, in which the anyons {ϕ^j, 1 ≤ j < q } have condensed.
That this is so can be most easily understood by considering the limit J →∞.
Since H_1 is a sum of commuting projectors, in the J→∞ limit, the low-energy Hilbert space ℋ̃ consists of states in the image of the projector:
P_ϕ=∏_i, rP_ϕ^i ( r) .
These states have eigenvalue 1 under all terms in H_1.
To leading order in 1/J, the effective Hamiltonian, which acts within the low energy Hilbert space ℋ̃, is
H_𝒞̃=P_ϕ H_𝒞 P_ϕ=-∑_p P_ϕ B_p^ϕ+ const .
In the second equality, we use (<ref>) and the fact that H_ϕ≡∑_e P_ϕ Q_e P_ϕ is simply the number of ways to combine operators in P_ϕ to obtain a trivial label on every vertex, which is a system size independent constant.
Note that since P_ϕ and B_p^ϕ are projectors, and [P_ϕ, B_p^ϕ ]=[B_p^ϕ , B_p'^ϕ ]=0, P_ϕ B_p^ϕ are also commuting projectors.
Moreover, if |Φ is the ground state of H_𝒞, we have P_ϕ B_p^ϕ (P_ϕ |Φ ) =P_ϕ |Φ for every p. Hence
the ground state |Ψ of H_D is given by[In fact, projecting any state |Φ_ex satisfying B_p^ϕ|Φ_ex =|Φ_ex in this way gives the ground state |Ψ of H_D. This is because such states have the form |Φ_ex=W_ϕ(P)|Φ, and as P_ϕ W_ϕ(P)=P_ϕ, we have P_ϕ|Φ_ex=P_ϕ W_ϕ(P)|Φ=P_ϕ |Φ. ]
|Ψ=P_ϕ |Φ.
To show that |Ψ is indeed a state in which the bosons ϕ have condensed, we expand the projector
P_ϕ according to:
P_ϕ=1/p^2 N_V∑_{ϕ_j, r_ij}W_{ϕ_j, r_ij}
Here N_V is the number of vertices on our honeycomb lattice; for each such vertex there are two simple string operators. (Note that throughout this paper, we will assume boundary conditions where this is the case). W_{ϕ_j, r_ij} is the composite string operator which creates excitations {ϕ_j} using string operators along the paths { r_ij} on the lattice, and the sum runs over all possible configurations {ϕ_j, r_ij} on the lattice, subject to the constraint that ∏_j ϕ_j = 1.
We can use (<ref>) to expand the new ground state (<ref>) as
|Ψ =1/p^2 N_V∑_{ϕ_j, r_ij} W_{ϕ_j, r_ij} |Φ .
In other words, the ground state |Ψ is a superposition of all possible configurations of ϕ excitations – a ϕ condensed state.
We can also make some educated guesses about the topological order in the condensed phase by studying the effect of P_ϕ on low-lying excited states of H_𝒞. These are created by generalized versions of the string operators W_ϕ(P), which we deonte W_α(P), where P describes a path on the lattice, and α is the anyon type. The data associated with W_α(P) is essentially the same as that for W_ϕ(P), except that resolving string crossings requires a matrix Ω_α(a), rather than a scalar w_ϕ(a); a detailed description can be found in Ref. <cit.>. Unless α = ϕ^j, here we require that P starts and ends at vertices of the lattice, rather than on sticks.
Consider how the operators P_ϕ^i ( r) act on the string operators W_α(P).
The latter can suffer one of three possible fates. First, if
W_ϕ(P) W_α(P) = W_α'(P)
then the operators W_α(P), W_α'(P) have identical actions on states in the image of P_ϕ. This suggests that in the limit J →∞, the two anyons α and α' have been identified, meaning that they comprise a single anyon type in the condensed phase. For example, all of the condensing bosons {ϕ^k } are identified with the vacuum in the condensed phase.
This conclusion agrees with the expectations of other approaches to anyon condensation<cit.>.
Note that if
W_ϕ^r(P) W_α(P) = W_α(P)
for r| p, then in the condensed phase W_α(P) becomes identified with r-1 distinct anyon string operators, rather than with q-1. For example, if r=1, W_α(P) does not become identified with any other anyon string operators. Though this statement seems rather innocuous here, in fact in such cases α splits into multiple anyon types after condensation<cit.>. We will not discuss the splitting at the level of anyons in detail here; however it is closely related to the splitting of string net labels which, as we show in Section <ref>, arises in the ground states of our condensed string net model.
Second, if α braids non-trivially with one of the condensing bosons ϕ, then when the path P_1 crosses P_2, and ϕ is an abelian boson,<cit.>
W_ϕ̅(P_1) W_α(P_2) W_ϕ(P_1) = S_αϕ/S_α1 W_α(P_2) W_ϕ(P_1)
In this case, the string operator W_α(P) maps states in the image of P_ϕ (for which W_ϕ(P_1) |Ψ⟩ = |Ψ⟩ for every choice of P_1) to states outside of this image. This suggests that α anyons are no longer a point-like excitations in the condensed phase, and become confined, again agreeing with expectations based on other approaches to anyon condensation.
In the following sections, rather than pursue the analysis of anyon string operators, we will instead focus on the fate of the string net ground state in the condensed phase. We will show how to describe the ground state of H_𝒞(J →∞)
as a conventional string net of the type described in Ref. <cit.>. Such string net ground states can always be associated with a commuting projector string net Hamiltonian<cit.>, whose topological order can be inferred directly from the string net data. (Specifically, it is the Drinfeld center of the fusion category comprising the string net). Thus this approach allows us to identify the topological order of the condensed phase without requiring an explicit discussion of anyon string operators in the condensed phase.
§ THE CONDENSED HILBERT SPACE
In order to understand the condensed phase,
we begin by studying the effective Hilbert space
ℋ̃ = span{X̃|:X̃|P_ϕ = X̃|}.
that describes states of finite energy in the limit J →∞, which we refer to as the condensed Hilbert space. Our goal is to show that ℋ̃ can be thought of as a new (non-extended) string-net Hilbert space, whose basis states are string-net states with new string labels and new branching rules.
To construct a basis state X̃| in the effective Hilbert space defined by Eq. (<ref>), we begin with a reference state X| in the uncondensed string-net Hilbert space ℋ. The corresponding basis state in ℋ̃ is:
X̃|=X|P_ϕ
Since W^i_ϕ^k ( r ) P_ϕ^i( r ) = P_ϕ^i( r ) for every i and r, we have
W_{ϕ_j, r_ij} P_ϕ = P_ϕ W_{ϕ_j, r_ij} =P_ϕ .
Consequently, if X' | = X | W_{ϕ_j, r_ij}, then X|P_ϕ = X'|P_ϕ. Thus, to construct a basis
of ℋ̃, we must find a suitable basis {X_0|} of ℋ such that X^i_0| W_{ϕ_j, r_ij} | X_0^j⟩ = δ_ij.
Since we are interested in identifying a set of string-net labels appropriate to the condensed phase, we take {X_0| } to be states in the string-label basis – i.e., X_0^j | has a fixed string label for every edge.
To find the new string-label basis {X̃|}, we consider two classes of condensing bosons. The first class is ϕ = (0,m) – i.e. the string operator W_ϕ(P) does not change the string labels of edges that it acts on. This type of condensation, which does not require the extended Hilbert space, has been discussed in detail in Ref. <cit.>. The second class, with ϕ = (s,m), condenses bosons whose string operators do change the string net labels. These condensation transitions do require the extended Hilbert space that we introduce here.
We start with the first case, ϕ=(0,m). For any edge in the lattice, P_ϕ contains an equal contribution from ϕ^j-labeled strings that cross that edge, for every j (see Fig. <ref>). Thus,
<-0.22in
< g r a p h i c s >
| P_ϕ=
<-0.22in
< g r a p h i c s >
| 1/p∑_i=1^p w_ϕ^i(a) =
<-0.22in
< g r a p h i c s >
| δ_w_ϕ(a),1
where p is the order of ϕ.
Thus, only string types a with
w_ϕ(a)=1
remain after condensation of ϕ=(0,m) bosons.
Hence, the new string-label basis {X̃|} is simply the subset of states in X_0 | containing only string types a satisfying Eq. (<ref>). We say that the remaining string labels, which do not appear in the low-energy Hilbert space after condensation, are confined.
Now, we consider the second case, ϕ=(s,m). If ϕ contains a subgroup ϕ_m^j⊂ϕ which is generated by ϕ_m^j =(0,m^j), then by the same reasoning as above, the string types a that appear in the condensed Hilbert space must satisfy
w_ϕ_m^j(a)=1,
with other string types being confined.
We find it useful to reorganize the deconfined string types into new string labels as follows.
First, we define the new null string label via:
0̃= ⊕_j=0^q-1 s^j .
where we have assumed the condensing bosons form a cyclic group generated by ϕ = (s,m), with s^q= 1 and q|p. Here the symbol ⊕ means that, in the original string net basis, an edge carrying the label 0̃ carries a superposition of labels in the set {s^j }.
Similarly, other condensed string types are given by superpositions of the form:
ã=⊕_j=0^q-1 (a × s^j ).
It is convenient to pick a particular representative for ã in the original label set, which we will denote a. We denote the remaining terms on the right-hand side of Eq. (<ref>) as:
a^j ≡ a × s^j , a^0 ≡ a
Then all a^j project to the same condensed string type, while if b ≠ a × s^j, then a and b project to different string types. As we discuss in detail below, if one or more of the labels obey a^r = a for some r |q, in the condensed phase the single string type a splits into multiple string types ã_1, ... ã_q/r.
Finally,
the branching rules for the new string labels can be deduced from the branching rules of the original string labels. In the absence of splitting, given the branching rules (a,b;c), the new branching rules are (ã,b̃;c̃). We discuss the new branching rules in the presence of splitting in Sec. <ref>.
The condensed string labels, together with the associated branching rules, define the string-label basis in the condensed Hilbert space.
Specifically, a string-net state X̃ | ∈ℋ̃ has edges labeled with the condensed string types {0̃, ã, b̃, ... }, and satisfies the new branching rules (ã,b̃;c̃) at each vertex. Note that ℋ̃ should be viewed as a conventional string-net Hilbert space, since after condensation all sticks are effectively in the trivial vacuum state.
§.§ Mapping between new and old string net labels
Since X̃| = X | P_ϕ, any state in ℋ̃ can also be expressed as a superposition of string-net states in our original Hilbert space ℋ_ϕ. This superposition contains states in which each edge label is replaced by an appropriate superposition of original string net labels, with the branching rules obeyed at every trivalent vertex, and arbitrary allowed labels on the sticks. Notationally, we represent the resulting string-net configurations in the original label set by X∈X̃, where X represents a labeling of edges in the original string-net basis, and X̃ represents the corresponding labels in the condensed basis.
Explicitly, we may write
X̃|= 1/p^2 N_V∑_X∈X̃ C(X)X|
where
C(X) are numerical coefficients.
The coefficients C(X) are highly constrained.
For any X_1,X_2∈X̃, X_1| is related to X_2| by the action of some composite string operator W({ϕ_j, r_ij}):
X_1|W({ϕ_j, r_ij})=W({ϕ_j, r_ij})_X_2^X_1 X_2 |
where W({ϕ_j, r_ij})_X_2^X_1 is the relevant matrix element of W({ϕ_j, r_ij}), and for a fixed configuration ϕ_j, r_ij the state X_2 is unique as the condensing anyons are abelian. Since the composite string operator is unitary, we equivalently have
W({ϕ_j, r_ij})|X_2 = W({ϕ_j, r_ij})_X_2^X_1|X_1.
Therefore, the coefficients satisfy:
C(X_2) =X̃ | X_2 = X̃ |W({ϕ_j, r_ij})| X_2
= W({ϕ_j, r_ij})_X_2^X_1X̃ | X_1
=W({ϕ_j, r_ij})_X_2^X_1 C(X_1) .
where in the first line, we have used Eq. (<ref>). Eq. (<ref>) allows us to determine the coefficients C(X), up to an overall coefficient C(X_0) for each distinct reference configurations {X_0}.
§.§ Vertex coefficients
Solutions { C(X) } to Eq. (<ref>) can be expressed C(X) = ∏_v C_v(X), where the product runs over all trivalent vertices in the extended string-net cofiguration X, and C_v(X) is a coefficient that depends only on the three string labels surrounding the vertex v.
This is because the action of any string operator can be broken up into a product of actions of simple string operators, with each simple string operator acting at a single honeycomb vertex and the vertices associated with nearby sticks.
Thus for each simple string operator, Eq. (<ref>) can be reduced to a set of equations relating products of at most three of the vertex coefficients C_v(X) to at most three of the vertex coefficients C_v(X'). We will show that the resulting equations are self-consistent, and sufficient to fully determine the coefficients of any configuration X ∈X̃ from that of a reference configuration X_0.
To parametrize the vertex coefficients C_v(X), we define a set of root vertices, which contain one representative vertex (a,b; c) in the original string label set for each condensed vertex (ã, b̃; c̃).
Then any condensed string net state X̃ | can be obtained by projecting a reference string-net state X_0| for which all vertices are root vertices. Conversely, any two states that differ by at least one root vertex project to two distinct states in ℋ̃.
We then define two types of vertex coefficients: {A^ab_c } associated with the root vertices (a,b; c), and {B^a^jb^k_c^j+k}, associated with the remaining vertices (a^j, b^k; c^j+k), where a^j ≡ a × s^j. The coefficients { B^a^jb^k_c^j+k} can be expressed in terms of {A^ab_c } using Eq. (<ref>). On the other hand, {A^ab_c }, which are associated with the vertex coefficients of our reference configuration, are not fully determined, and in some cases admit multiple, physically distinct solutions.
We begin by defining the root vertices. Again, we have two cases to consider.
The first case is the ϕ=(0,m) condensed phases. In this case, we define the root vertices by
-0.22in
< g r a p h i c s >
, -0.22in
< g r a p h i c s >
where a,b,c are the deconfined string types which satisfy (<ref>), and (a,b;c) satisfies the branching rules. In this case all vertices are root vertices.
The second case is the ϕ=(s,m) condensed phase. In this case, for each new string label ã, we choose a representative label a ∈ã. We define two classes of root vertices. First, we have the root vertices:
-0.22in
< g r a p h i c s >
, -0.22in
< g r a p h i c s >
,
where s^i denotes the string type associated with the boson ϕ^j q + i, and 0 ≤ i < q. (Here, as above, we take ϕ = (s,m), with ϕ^p = 1 and s^q = 0, where q|p.) In this case, for reasons that will become apparent shortly, it is convenient to consider all different powers i to be root vertices, in spite of the fact that all of these correspond to the same projected label 0̃.
Second, we have root vertices with two non-null string types in the two upper (lower) legs of upward (downward) vertices:
-0.22in
< g r a p h i c s >
, -0.22in
< g r a p h i c s >
with a,b ∉0̃ ,
where (a,b;c) satisfies the original branching rules.
The vertex coefficients associated with root vertices for general ϕ=(s,m) are defined by:
C(-0.22in
< g r a p h i c s >
)∼ A^as^i,
C(-0.22in
< g r a p h i c s >
)∼1/A^as^i
and
C(-0.22in
< g r a p h i c s >
)∼ A^ab_c,
C(-0.22in
< g r a p h i c s >
)∼1/A^ab_c with a,b∉0̃.
for root vertices (<ref>) and (<ref>) respectively.
Here ∼ means equality up to factors associated with other vertices in the grey area. The vertex coefficients A^ab_c,A^as^i are complex numbers which satisfy that
A^ab_c=A^a s^i=1 if a or b=0.
In the absence of splitting, these are not constrained, and can be any complex number of unit modulus; in particular, we may choose them all to be 1.
The ϕ=(0,m) condensed phases can be thought of special cases of the ϕ=(s,m) condensed phases where s=0 and thus 0̃={0}. In this case, the vertex coefficients (<ref>) associated with root vertices (<ref>) correspond to a gauge choice for our string net model<cit.>.
When s ≠ 0, to find the coefficients C(X) in Eq. (<ref>), we define a set of vertex coefficients associated with non-root vertices via:
C(-0.22in
< g r a p h i c s >
)∼ B^s^ia,
C(-0.22in
< g r a p h i c s >
)∼1/B^s^ia
and
C(-0.22in
< g r a p h i c s >
)∼ B^a^jb^k_c^i+j,
C(-0.22in
< g r a p h i c s >
)∼1/B^a^jb^k_c^i+j.
where B^a^jb^k_c^i+j are complex numbers, and at least one of (k,j) are non-zero, such that at least one of a^j, b^k are not in our chosen set of reference labels.
The division into A-type and B-type vertex coefficients is useful since the latter are fully determined by the root vertex coefficients A^ab_c,A^a s^i using Eq. (<ref>).
The coefficients A^ab_c and A^a s^i, on the other hand, are not fixed by Eq. (<ref>) provided that a × s^r ≠ a for any r< q.
In this case, coefficients C(X) in (<ref>) can be parametrized as
C(X) =C(X_0) ∏_v∈ X B_v
where the product runs over all vertices v in X and B_v is the corresponding vertex coefficient.
The coefficient C(X_0) associated with the given reference configuration X_0 is determined by the root vertex coefficients via:
C(X_0) = ∏_v∈ X_0 A_v
where v runs over all root vertices in X_0 and A_v is the corresponding root vertex coefficient. When a × s^r ≠ a for any r< q we will find that all choices of root vertex coefficients are equivalent, and the freedom to choose C(X_0) amounts to a gauge choice.
If a^r = a for some r | q, the parametrization of C(X) is similar. However, in this case Eq. (<ref>) imposes additional constraints on the root vertex coefficients A^a s^k. In this case we find that only A^a s^k for k ≤ r are free parameters, and that there are q/r distinct solutions for each of these coefficients. These distinct solutions correspond to the fact<cit.> that after condensation the label a splits into q/r distinct labels; correspondingly we also obtain multiple vertex coefficients A^a b_c.
We now discuss each of these cases in turn.
§.§.§ Case 1: a^k ≠ a
First, let us verify that a solution to Eq. (<ref>) can be expressed as a product of vertex coefficients – i.e. that any mapping between two configurations with the same sets of initial and final vertices has the same numerical coefficient. If a^k ≠ a for any a or k, then it suffices to consider sequences of simple string operators connecting the same inital and final vertex configurations. The properties of basic string operators outlined in Eqs. (<ref>) - (<ref>), as well as the consistency conditions (<ref>) and (<ref>), ensure that all combinations of basic string operators relating a given initial and final set of vertices will have the same numerical coefficient.
Second, we use Eq. (<ref>) to solve for the B-type vertex coefficients in terms of { A^a s^i, A^ab_c }.
First, consider vertices where both a and b legs are powers of the condensing label s. In this case, in the gauge (<ref>), and using w_ϕ(s^j) = 1, all non-vanishing string operator matrix elements are simply +1, and we have
A^0 s^j A^0 s^-jB^s^js^-j= A^00 = 1
B^s^i s^j A^0 s^i A^0 s^j B^s^i+j s^-i-j = A^00 = 1 .
It follows that, given the condition (<ref>),
B^s^i s^j = 1
for any i,j.
Next suppose a ∉0̃, with b=s^i, and a^j ≠ a. In this case, we have
A^a s^k B^a^k, s^l-k B^s^l,s^-k = A^a s^l (F^as^k s^l-k_a^l a^k s^l )^*
where the coefficient is obtained by acting on the vertex (a, s^l; a^l) with the product W^1_ϕ^k W^2_ϕ^-k.
Given Eq. (<ref>), this fixes B^a^k, s^l-k in terms of A^a s^l and A^a s^k.
If a,b ≠ s^k, we have
A^a s^j A^b s^k B^a^j, b^k_c^j+k B^c^j+ks̅^j+k= W_jk (abc) A^ab_c ,
The matrix element is given by acting with the product W^2_ϕ^k W^1_ϕ^j on the vertex (a,b; c) (see Fig. <ref>):
W_jk (abc) =w̅_ϕ^j(b) F^a b s^j_c^j c b^j (F^a s^j b_c^j a^j b^j)^* F^a^j b s^k_c^j+k c^j b^k (F^c s^j s̅^j_c c^j 0 F^c^j s^k s̅^j+k_c c^j+ks̅^j)^*
Given Eq. (<ref>), this fixes B^a^j, b^k_c^j+k in terms of A^ab_c and { A^a s^j}.
Finally, using string paths of the form
-0.22in
< g r a p h i c s >
we have
B^s^j a^i W_j̅ j (s^j, a^i, a^i+j) = B^a^j s^i
B^s^j a W_j̅ j (s^j, a, a^j)
= A^a s^i ,
which shows that both B^s^i a and B^s^k a^j can be expressed in terms of A^a s^j-type vertex coefficients.
These relations have a particularly simple form: From Eq. (<ref>), we can show that
W_j̅ j (s^j, a, a^j)
= w_ϕ^j(a)
where we have used Eqs. (<ref>,<ref>), as well as the identity
F^a s^j s̅^j_a a^j 0 F^s^j s̅^j s^j_s^j 0 0 ( F^ a^j, s̅^j, s^j_a^j a 0)^* = 1
which follows from Eq. (<ref>).
This leaves us with the vertex coefficients A^ab_c and A^a s^j (where a, b ≠ s^k). The former are clearly free parameters, since by definition there is no ϕ string operator that takes such a root vertex to another root vertex. Indeed, they represent a choice of gauge for the F matrices describing the condensed phase (see Eq. (<ref>)), and can be set to 1.
To see that A^a s^j are also free parameters, we note that there is a residual gauge freedom when solving (<ref>).
Specifically, given a set of vertex coefficients that satisfy Eq. (<ref>),
we can construct an infinite class of other solutions Ã^a b_c, B̃^a^j b^k_c^j+k via:
Ã^a b_c=A^a b_c ·g(a)g(b)/g(c) , B̃^a^j b^k_c^j+k=B^a^j b^k_c^j+k·g(a^j)g(b^k)/g(c^j+k) .
Here a,b and c are any string labels (including s^j), and
g(a) is any function with
g(s^i)g(s^j)=g(s^i+j), g(0)=1.
It is straightforward to verify that the transformations (<ref>) do not alter the equalities dictated by the action of any of the basic string operators at a vertex.
When a^i≠ a^j for i≠ j (mod q), the gauge transformation (<ref>) fully fixes the coefficients A^a s^i: we can always choose the ratio g(a)/g(a^j) to set
A^a s^j = 1 .
Accordingly, we have
B^s^j a = w_ϕ^j(a) , B^a^j s^i-j= (F^as^js^i-j_a^ia^j s^i)^*
by Eqs. (<ref>) and (<ref>).
§.§.§ Case 2: a^r = a
If a^r=a for some r|q,
there are additional constraints relating the coefficients A^a, s^nr, and we cannot set these to 1 using transformations of the form (<ref>).
We begin by considering configurations involving only vertices of the form (a, s^jr; a), j = 1,... q/r, and their cyclic permutations.
We first show that for such configurations, there exists a solution to Eq. (<ref>) that can be expressed as a product of vertex coefficients. To show this, we must establish that the coefficients relating configurations with the same sets of initial and final vertices do not depend on the relative positions of these vertices – an issue that did not crop up in case 1. For example, using a W^1-type simple string acting on a vertex (a, s^j, a) with sticks on the two a legs carrying labels s^i and s^k, we can derive:
A^a s^(i+l) r A^a s^(k-l) r = A^a s^i r A^a s^k r F^ a s^j r s^ l r_a a s^(j+l)r (F^ a s^ l r s^j r_a a s^(j+l)r )^*
×
F^a s^i r s^l r_a a s^(i+l) r F^ s^lrs̅^lr s^k r_s^kr 0 s^(k-l)r ( F^ a s^lr s^(k-l)r _a a s^kr )^*
where we have removed a common factor of A^a s^j r (which is non-zero) from both sides, and used w_ϕ^j(s^k) =1 for all j,k.
This can be true only if the coefficient does not depend on j.
Similar consistency requirements arise from acting with W^2_ϕ^lr on a vertex (s^jr, a; a) and with W^2_ϕ̅^lrW^1_ϕ^lr on a vertex (a, a̅; s^jr).
In Appendix <ref>, using the conditions (<ref>, <ref>), we show that in all three cases, in the gauge (<ref>), the coefficients are indeed independent of j. (A similar result holds for vertices of the form (a, s^i + j r; a^i) with i<r, for which the coefficient is also indepedent of j).
Thus we see that, for configurations with only vertices involving a^j, a̅^k (j,k < r), and powers of s^ i, the simple string operators at each vertex yield a consistent set of equations for the A^a s^j.
Having established that a consistent solution exists, let us solve for the coefficients A^a s^nr. (As above, the coefficients A^a s^i for i < r can be consistently set to 1 by a gauge transformation). Taking k=l=1 in Eq. (<ref>),
we find:
A^a s^(i+1) r = A^a s^i r A^a s^ r F^a s^i r s^ r_a a s^(i+1) r F^ s^rs̅^r s^ r_s^kr 00 F^a s^j r s^r_ a a s^(j+1)r (F^ a s^r s^jr_a a s^(j+1)r )^*
As shown in Eq. (<ref>), in fact
F^a s^j r s^lr_ a a s^(j+l)r = F^ a s^lr s^jr_a a s^(j+l)r
It follows that in our gauge of choice,
A^a s^n r = (A^a s^ r )^n ∏_k=1^n-1 ( F^a s^k r s^ r_a a s^(k+1) r )
Thus of the q/r vertex coefficients A^a s^n r, we can freely choose only one, which we take to be A^a, s^r.
Moreover, the coefficient A^a s^ r is not unconstrained: taking n = q/r in Eq. (<ref>), and noting that s^(q/r) r = 0, we see that
(A^a s^ r )^q/r = ∏_k=1^q/r-1 ( F^a s^k r s^ r_a a s^(k+1) r )^*
Thus, we see that A^a s^ r must be a q/r^th root of the product on the right-hand side, and we have exactly q/r possible choices for this coefficient, which we label (A^a s^ r)_i, i = 1, ... q/r.
We note that the product on the right-hand side (and hence also (A^a s^ r)_i) has modulus 1, since by unitarity ( F^a s^k r s^ r_a a s^(k+1) r )^* F^a s^k r s^ r_a a s^(k+1) r =1.
.
Physically, the fact that we obtain multiple, physically inequivalent choices of A^a s^n r implies that in the condensed phase, the string label a
“splits" into q/r distinct label types, which we denote
ã_μ =(a, μ) , μ=1,…,q/r
Here (a, μ) indicates that any vertex associated with the label ã_μ is assigned a vertex coefficient consistent with the choice (A^a s^r )_μ= [ ∏_k=1^q/r-1 ( F^a s^k r s^ r_a a s^(k+1) r )^*]^μ r /q.
Armed with this knowledge of splitting, we may return to scrutinize other types of vertices. Vertex coefficients for vertices (a,b;c) where none of the three string labels split can be solved for as above; this includes all vertices of the form (b, s^j; b^j) for 0 ≤ j < q where b × s^j ≠ b for any j < q. Thus consider a vertex of the form (a,b; c) (or one of its cyclic permutations), where a^r = a, but b and c do not split. Attaching a stick carrying the label s^rl to the a edge, the analog of Eq. (<ref>) is:
(A^a s^(j+l) r)_μ A^b s^k B^a, b^k_c^j r+k B^c^jr+ks̅^jr+k=
(A^a s^l r)_μ F^a s^l r s^jr_a a s^(l+j)r W_jk (abc) A^ab_c ,
This set of equations allows for a consistent definition of B^a, b^k_c^jr +k in terms of A^ab_c only if the l-dependence of the two sides cancels. Indeed, (see Eq. <ref>)
(A^a s^(j+l) r)_μ/(A^a s^l r)_μ (F^a s^l r s^jr_a a s^(l+j)r)^* = (A^a s^jr)_μ
so the l dependence is indeed trivial, and a consistent definition is possible. Note that the coefficient B^a, b^k_c^jr +k on the left-hand side of Eq. (<ref>)
will depend on the choice of μ; correspondingly, we define the q/r vertex coefficients (B^a b^k_c^jr+k)_μ.
Similar considerations apply for the cyclic permutations (c̅, a; b̅), (b, c̅; a̅).
Finally, consider a vertex of the form (a,b; c) where at least two of the labels split. For example, suppose that a^r = a, c^r = c, and consider applying a W^1_ϕ^lr string operator to the vertex (a,b; c), with sticks on the a and c edges initially labeled by s^ir and s^kr respectively. This gives the relation:
A^a s^(i+l) r A^c s^(k-l) r A^a b_c
=A^a b_c A^a s^i r A^c s^k rw̅_ϕ^lr(b) F^ a b s^ l r_c c b^lr (F^ a s^ l r b_c a b^lr )^*
× F^a s^i r s^l r_a a s^(i+l) r ( F^ c s^lr s^(k-l)r_c c s^k r )^* F^s^lrs̅^lr s^ k r_ s^ k r 0 s^ (k-l) r
Note that in this case, A^ab_c appears on both sides of the equation. If the coefficient on the right-hand side does not depend on b, then we can simply cancel these factors and we recover an equation that is satisfied by solutions to (<ref>) (see Eq. (<ref>)). However, in general the coefficient is invariant only under replacing b → b^jr for some integer j, and may be different for distinct choices of b (see Appendix (<ref>)). The resolution to this is that we must replace Eq (<ref>) with the equation:
(A^a s^l r)_μ/(A^c s^l r)_ν (A^a b_c)^μ_ν = (A^a b_c)^μ_ν M_l(a,b,c)
where we have used Eqs. (<ref>) and (<ref>) to simplify the factors associated with vertices A^a s^ir, A^c s^jr, and
M_l(a,b,c) = w̅_ϕ^lr(b) F^ a b s^ l r_c c b^lr ( F^ a s^ l r b_c a b^lr )^*
encodes the dependence on the label b.
Thus either (A^a b_c)^μ_ν = 0, or
(A^a s^ l r)_ν = (A^c s^lr)_μ M_l(a,b,c) .
In general, this gives us a condition that fixes the values of (μ,ν) for which (A^a b_c)^μ_ν≠ 0, and hence specifies the fusion rules of the new, split anyon labels.
Note that the conditions for (A^a b_c)^μ_ν, (A^c̅ a_b̅)^μ_ν, and (A^b c_a)^μ_ν to be non-vanishing involve different coefficients in general.
In Appendix <ref>, we show that when (a,b;c) is allowed by the branching rules, there is necessarily at least one choice of (μ,ν) such that (A^a b_c)^μ_ν≠ 0, and hence at least one choice of (μ,ν) for which (ã_μ, b̃; c̃_ν) is allowed by the new branching rules. (We also show that the same is true for the cyclic permutations (A^c̅ a_b̅)^μ_ν, and (A^b c_a)^μ_ν of this vertex). Indeed, provided that b̃ does not split, generically there are q/r such solutions.
This allows us to partially characterize the fusion rules of the new theory. For example, suppose that only vertices of the form (c̅, a; b̅) are allowed by the branching rules, where b × s^v ≠ b for any 0 < v < q.
In the condensed Hilbert space, we have
(∑_ν =1^q/rc̃̅̃_ν ) × (∑_μ =1^q/rã_μ ) = q/r∑_b̃̅̃b̃̅̃
where the sum on the right-hand side runs over all distinct choices of b̃̅̃ that are compatible with the original branching rules.
Since a × s^r = a, c × s^r = c, we have s^r ×( c̅× a) = c̅× a; hence if (c̅, a; b̅) is allowed by the fusion rules, then so is (c̅, a; b̅^j r) for any j. Consequently, provided that (c̅, a; b̅^k) is not allowed by the branching rules of the original theory for any 0<k < r, in the condensed phase there are q/r copies of b̃̅̃ in the fusion product c̃̅̃×ã.
This corresponds exactly to the number of distinct choices of (μ, ν) that solve Eq. (<ref>) – i.e. the number of choices of (μ, ν) for which (c̃̅̃ , ã_μ; b̃̅̃) is allowed by the new branching rules.
In this case, each copy of b̃̅̃ can be associated with a distinct solution, such that typically the Hilbert space at the vertex (c̃̅̃ , ã_μ; b̃̅̃) is one dimensional (i.e. the new theory does not have fusion multiplicity). In particular, there is no fusion multiplicity associated with the vacuum 0̃, since the cyclic property of the fusion rules ensures that only vertices of the form (a, a; s^jr) are allowed.
The possible fusion rules for other types of vertices, such as vertices (ã_μ, b̃_λ; c̃_ν ) where all three labels split, are discussed in Appendix <ref>.
In summary, the new Hilbert space ℋ̃ consists of string-net states with both unsplit string types of the form (<ref>), (<ref>), whose branching rules are fixed by those of the original labels, and split string types given by (<ref>), whose branching rules are fixed by a combination of those of the original theory, and the solutions to Eq. (<ref>).
§ STRING NET MODEL OF THE CONDENSED PHASE
We now show that the ground state |Ψ⟩ of our extended string-net model as J →∞ can be expressed as an ordinary string net ground state using the new label set {ã_i, b̃, c̃, ... }.
In particular, we show how to use the vertex coefficients { A^ab_c , B^a^j, b^k_c^j+k}
described in the previous section to obtain the fusion data describing the string net in the condensed phase. If there is no splitting, we find that the vertex coefficients, together with the fusion data of the original category, fully fix the fusion data for the condensed string net. With splitting, these do not fully fix the fusion data; the remaining freedom can be eliminated by imposing the consistency conditions (<ref>).
§.§ The topological data for the condensed phases
Deep in the condensed phase, the basis states in ℋ̃ allow us to express the condensed ground state |Ψ = P_ϕ |Φ as a new string-net condensed state with amplitudes
Ψ (X̃ ) ≡X̃|Ψ
= 1 /p^2 N_V∑_X∈X̃ C_X̃ (X) X |Ψ
≡1 /p^2 N_V∑_X∈X̃ C_X̃(X) Ψ(X).
Here
the sum over X∈X̃ is over all configurations of uncondensed string labels compatible with the configuration X̃. Note that when one or more labels split there are multiple distinct solutions for the vertex coefficients, associated with the multiple distinct split string labels; in this case the coefficients C(X) depend not only on X but on the choice of which label in each set {ã_μ} is in the configuration X̃; to indicate this dependence, we have added a subscript, denoting the coefficient C(X) as C_X̃(X).
§.§.§ Topological data in theories without splitting
We first describe how to use Eq. (<ref>) to obtain the topological data associated with the condensed string net in theories where none of the original labels split.
We begin by simplifying Eq. (<ref>), using the relation:
C_X̃(X_1)Ψ(X_1)= C_X̃(X_2)Ψ(X_2) for any X_1,X_1∈X̃.
To see that these are equal, observe that on the one hand, we have
C_X̃(X_2)=C_X̃(X_1)W(P)^X_1_X_2
for any X_1,X_2 ∈X̃ by (<ref>,<ref>).
On the other hand, the new ground state |Ψ satisfies
Ψ(X_2) = X_2|Ψ=X_1|W(P)|Ψ/W(P)^X_1_X_2=Ψ(X_1)/W(P)^X_1_X_2.
Here we use (<ref>) in the second equality and (<ref>) in the third equality.
Putting (<ref>,<ref>) together, we establish (<ref>).
By using (<ref>), we can rewrite (<ref>) as
Ψ (X̃ )= C(X_0)Ψ(X_0)
were X_0 denotes a reference configuration of our choice from the set X ∈X̃; in the following it will be convenient to choose X_0 to have only trivial labels on all sticks.
Observe that in the absence of splitting, each vertex in X̃ corresponds to q^2 configurations X, obtained by acting with W^1_ϕ_j W^2_ϕ^k for 0 ≤ j,k < q at each vertex. Each such configuration appears p/q times when we act with P_ϕ on X_0.
Thus summing over X ∈X̃ and expressing all terms in terms of Ψ(X_0) gives a factor of p^2 for each vertex, which exactly cancels the normalization pre-factor.
We can use the amplitudes of this new ground state to define the new F-symbols F^ãb̃c̃_d̃ẽf̃ and quantum dimensions d_ã by
Ψ( -0.22in
< g r a p h i c s >
) =∑_f̃F^ãb̃c̃_d̃ẽf̃Ψ(-0.22in
< g r a p h i c s >
)
Ψ( -0.22in
< g r a p h i c s >
) = δ_c̃,d̃√(d_ã d_b̃/d_c̃)Ψ(-0.22in
< g r a p h i c s >
).
Here the grey regions denote the part of the configuration that is identical on both sides of the equation.
To relate the new coefficients to the old ones,
consider a pair of reference configurations X_0, X_0' related by one of the local moves in Eq. (<ref>). For convenience, we choose all reference configurations to be closed configurations in which all sticks carry the trivial label.
These closed configurations are generated by those terms in P_ϕ containing only closed loops of simple string operators, all of which act as the identity on the ground state |Φ⟩ of the original string net. (Recall that |Ψ = P_ϕ |Φ).
Thus when X_0, X_0' are closed configurations, Ψ(X_0) ∝Φ(X_0), and similarly for X_0'. Note that the constant of proportionality here depends only on the number of closed loop string operators in P_ϕ, and is the same for all reference configurations.
Using the fact that Φ(X_0), Φ(X_0') are related by the original local rules, and applying (<ref>) to both sides of (<ref>),
we conclude that when none of the labels ã, ... f̃ split, the old data and the new data are related by
B^ab_e B^ec_d /B^bc_f B^af_d F^abc_def=F^ãb̃c̃_d̃ẽf̃
d_a = d_ã
(The local moves (<ref>) and (<ref>) lead to the same definition (<ref>) of d_ã).
Here B^ab_c (which can also be root vertex coefficients A^ab_c) are the vertex coefficients defined in (<ref>) -(<ref>) and { F^abc_def,d_a } are the original F-symbols and quantum dimensions for the ground state Φ.
The labels a,b,c,d in F^abc_def are chosen such that they are compatible with the branching rules of the old theory, and such that a∈ã,b ∈b̃, c∈c̃, d∈d̃.
This expression thus fully fixes the new F-symbols in terms of the old F-symbols and the vertex coefficients. Further, comparing this to the expression (<ref>) for gauge transformations of the F-symbols, we can see that the root vertex coefficients A^ab_c with a,b ≠ s^i are simply gauge transformations of the new F's. (The remaining vertex coefficients, which are fully fixed by the choice of A^ab_c, ensure that the left-hand side of the equation is independent of the specific choice a,b,c,d,e,f used in the calculation.)
§.§.§ Topological data in theories with splitting
In theories with splitting, instead of expressing amplitudes in terms of a single reference configuration, we replace Eq. (<ref>) with:
Ψ (X̃ )= 1/N(X_0)∑_X_0 ∈X̃ C_X̃(X_0)Ψ(X_0)
were X_0 denotes the set of reference configurations that are compatible with the choice of condensed labels X̃, and contain only trivial labels on the sticks. The reason for this replacement is that in theories with splitting, a single reference configuration X_0 may not be sufficient to uniquely fix X̃ via the choice of vertex coefficients entering C_X̃(X_0). We therefore instead keep the minimum number of configurations in our sum necessary to ensure that the right-hand side describes coefficients associated with a specific condensed label set, which is a sum over all configurations compatible with X̃ for which all sticks carry the trivial label.
Unlike in the unsplit case, the number of configurations associated with each reference configuration X_0 in the sum does not, in general, fully cancel the pre-factor of 1/p^2 N_V in Eq. (<ref>).
Here N(X_0) counts the number of distinct products of simple string operators that leave X_0 unchanged – meaning that they change neither the labels on the sticks, nor any of the edge labels. This number depends on the number of closed loops in X_0 along which all labels split. Relative to the unsplit case, the number of distinct configurations X in the sum (<ref>) is reduced by N(X_0).
To find F^ãb̃c̃_d̃ẽf̃,
we note that:
Ψ( -0.22in
< g r a p h i c s >
)
= ∑_e∈ẽ(B^ab_e)^μν_λ (B^ec_d)^λρ_σΦ(-0.22in
< g r a p h i c s >
)
= ∑_e∈ẽ(B^ab_e)^μν_λ (B^ec_d)^λρ_σ
×∑_f F^abc_defΦ(-0.22in
< g r a p h i c s >
)
In the last equality, the labels μ, ν, ρ, σ identify the external split legs as ã_μ, b̃_ν, c̃_ρ, and d̃_σ respectively. However, it can happen that there is more than one solution f̃_κ compatible with both the old label f, and the new fusion rules. In other words, there may be more than one choice of κ for which (B^bc_f)^νρ_κ (B^af_d)^μκ_σ≠ 0.
We conclude that the old data and the new data are related by
∑_e:e∈ẽ (B^ab_e)^μν_λ (B^ec_d)^λρ_σ/ (B^bc_f)^νρ_κ (B^af_d)^μκ_σ F^abc_def=∑_f̃: f∈f̃ F^ã_μb̃_νc̃_ρ_d̃_̃σ̃ẽ_̃λ̃f̃_̃κ̃ .
To find d_ã, we observe that we also have:
Ψ (∑_X̃∈ X_0X̃ )
=1 /N(X_0) ∑_X̃∈ X_0 C_X̃ (X_0) Ψ(X_0).
where in this case, we can choose a single reference configuration. Letting X̃ be a configuration with single closed loop carrying the label ã, and X_0 to have a single loop carrying the label a, we find that the number of terms in the sum is precisely N(X_0), and that all terms in the sum contribute equally. From this, we conclude that
d_a = ∑_ã: a∈ãd_ã .
Thus, we see that in theories with splitting, the original fusion data and vertex coefficients do not fully fix all of the new F's. In this case, the remaining freedom must be used to ensure that the new F's satisfy the consistency conditions (<ref>), as well as the unitarity conditions (<ref>).
§.§ Consistency conditions for F^ãb̃c̃_d̃ẽf̃
We now show that the new data { F^ãb̃c̃_d̃ẽf̃} satisfy the consistency conditions (<ref>).
We begin with the condition (<ref>), which requires F^ãb̃c̃_d̃ẽf̃=1 if ã or b̃ or c̃=0̃.
We wish to show that the right-hand side is equal to 1 if a, b, or c are powers of s.
Indeed, using Eq. (<ref>), one can show:
B^a b^i_c^i B^b s^i/B^c s^i B^a b_c F^a b s^i_c^i c b^i =
B^a s^i B^a^i b_c^i/B^a b^i_c^i B^s^i b F^a s^i b_c^i a^i b^i =
B^a^i b_c^i B^ s^i a/B^a b_c B^s^i c F^s^i a b_c^i a^i c = 1
If a, b, or c are powers of s, then there are no sums in Eq. (<ref>); thus Eq. (<ref>) ensures that the new F's satisfy Eq. (<ref>).
To see that the first term in Eq. (<ref>) is equal to unity, apply a W^2_ϕ^i-type string to the vertex (a,b;c), with the stick on the c edge carrying the label s^i. From Eq. (<ref>), in the gauge (<ref>), the matrix element associated with this string operator is F^a b s^i_c^i c b^i, and Eq. (<ref>) implies that B^c s^i B^a b_c = B^a b^i_c^i B^b s^iF^a b s^i_c^i c b^i.
The second equality is obtained by applying a product of the form W^2_ϕ^iW^1_ϕ^-i to a configuration with the two vertices (a, s^i; a^i) and (a^i, b; c^i), and using Eqs. (<ref>), (<ref>), and (<ref>).
The third equality can be obtained by acting with a W^1_ϕ^i string on the vertex (a,b; c), with an s^i labeled stick on the c edge. In our gauge of choice, the corresponding matrix element is w_ϕ^i(b) F^a b s^i_c^i c b^i (F^a s^i b_c^i a^- b^i)^*, which by Eq. (<ref>) is equal to w_ϕ^i(a) w̅_ϕ^i(c) (F^s^i a b_c^i a^i c)^*.
This gives
A^ab_c A^c s^iω̅_ϕ^i(c) = F^s^i a b_c^i a^i cω̅_ϕ^i(a)A^a s^i B^a^i b_c
Using Eq. (<ref>), we obtain the stated result.
Next, we turn to the pentagon identity (<ref>).
Multiplying both sides of (<ref>) by B^fc_g B^gd_e B^ab_f, and summing over f∈f̃ and g∈g̃, gives
∑_f∈f̃,g∈g̃F^fcd_eglF^abl_efk B^fc_g B^gd_e B^ab_f
=∑_f∈f̃,g∈g̃,hF^abc_gfhF^ahd_egkF^bcd_khl
B^fc_g B^gd_e B^ab_f
We fist consider the right hand side of (<ref>). Using Eq. (<ref>), we have:
∑_h,g∈g̃(∑_f∈f̃ F^abc_gfhB^ab_fB^fc_g)F^ahd_egkF^bcd_khlB^gd_e
=∑_h,h̃∋ hF^ãb̃c̃_g̃f̃h̃(∑_g∈g̃F^ahd_egkB^ah_gB^gd_e)F^bcd_khlB^bc_h
=∑_h̃,k̃∋ kF^ãb̃c̃_g̃f̃h̃ F^ãh̃d̃_ẽg̃k̃(∑_h∈h̃F^bcd_khlB^hd_kB^bc_h)B^ak_e
=∑_h̃,k̃∋ k,l̃∋ lF^ãb̃c̃_g̃f̃h̃ F^ãh̃d̃_ẽf̃h̃ F^b̃c̃d̃_k̃h̃l̃ B^cd_lB^bl_kB^ak_e
(In the third line, we exploit the fact that ∑_h,h̃∋ h=∑_h̃,h∈h̃). A similar treatment of the right hand side of (<ref>)
gives ∑_l̃∋ l,k̃∋ kF^f̃c̃d̃_ẽg̃l̃F^ãb̃l̃_ẽf̃k̃B^bl_kB^ak_eB^cd_l.
Thus the new F-symbols satisfy:
∑_l̃∋ l,k̃∋ k F^f̃c̃d̃_ẽg̃l̃F^ãb̃l̃_ẽf̃k̃=∑_l̃∋ l,k̃∋ k∑_h̃F^ãb̃c̃_g̃f̃h̃F^ãh̃d̃_ẽg̃k̃F^b̃c̃d̃_k̃h̃l̃.
If a^r ≠ a for any r<q, then the sums over l̃ and k̃ can be dropped, and the new F-symbols automatically satisfy the pentagon identity (<ref>).
Otherwise, Eq. (<ref>) only constrains certain sums of the new F's, and we must use the remaining freedom to choose the new F's to satisfy Eq. (<ref>).
§.§ Effective Hamiltonian
We have seen that the ground state |Ψ⟩ of the condensed phase is a string net state, described in terms of the new labels {ã}, with new F symbols and quantum dimensions given by Eqs. (<ref>), (<ref>), together with the consistency conditions (<ref>). Since |Ψ⟩ is also a ground state of the effective Hamiltonian in the condensed phase, this suggests that our effective Hamiltonian acts on the labels in the new basis as a (conventional) string net Hamiltonian.
In the absence of splitting, it is relatively straightforward to see that this is indeed the case. Consider the action of P_ϕ B^ϕ_p on a state ⟨X̃ | in our new string-net basis. As above, we can use the fact that ⟨X̃ | P_ϕ B^ϕ_p = ⟨X̃ | B^ϕ_p = C(X_0) ⟨ X_0| B^ϕ_p, where X_0 is a configuration compatible with X̃, and for which all stick labels are trivial.
We thus have
⟨X̃ | B^ϕ,t_p
= ∑_X_0' C(X_0) ⟨ X'_0| B^t, i_1... i_6j_1...j_6_p, i_1'... i_6'j_1'...j_6'(e_1,... e_12;𝕀,𝕀,𝕀)
where j_k= i_k, j_k'= i_k' for k=4,5,6, and e_10= e_11 = e_12 = 0. Here ⟨ X'_0| is identical to ⟨ X_0| except on the boundary of the plaquette p, where edges labeled i_1 ... i_6, j_1... j_6 in ⟨ X_0| now carry labels i'_1 ... i'_6, j'_1... j'_6.
Applying Eq. (<ref>) repeatedly, we find that the matrix element can be expressed as a product of new F symbols:
∑_X'C(X_0) ⟨ X'| B^t, i_1... i_6j_1...j_6_p, i_1'... i_6'j_1'...j_6'(e_1,... e_12;𝕀,𝕀,𝕀) =
∑_X' C(X') ⟨ X'| B^t̃,ĩ'_1…ĩ'_6 ĩ'_1…ĩ'_6_p,ĩ'_1…ĩ'_6ĩ'_1…ĩ'_6(ẽ_1…ẽ_6 0̃…0̃;𝕀,𝕀,𝕀)
= ⟨X̃'| B̃_p,ĩ'_1…ĩ'_6^t̃,ĩ_1…ĩ_6(ẽ_1…ẽ_6)
where the matrix elements of B_p^t are defined in (<ref>), with the old F-symbols in the first line replaced by the new F-symbols in the second and third lines. Matrix elements of the plaquette string operator B^t̃_p acting on states with all sticks carrying the trivial label are exactly the matrix elements of the conventional string-net plaquette operator (see Ref. <cit.>) which we denote B̃_p,ĩ'_1…ĩ'_6^t̃,ĩ_1…ĩ_6(ẽ_1…ẽ_6) in the third line.
Thus our effective Hamiltonian in the string-net phase is exactly the new string net Hamiltonian.
The situation in theories with splitting is similar, though more subtle due to the fact that a single label t in the original theory can represent multiple labels t̃_μ in the new theory.
§ EXAMPLES
In this section, we work out some illustrative examples.
We begin by considering condensation in the abelian
ℤ_2, ℤ_4, ℤ_6, ℤ_4×ℤ_4 string-net models.
In abelian theories there is never any splitting, and the new fusion data follows directly from the coefficients B^a_i, b^j_c^k+k.
We also describe condensation of abelian bosons in two non-abelian string-net models, based on the fusion categories Rep(S_3) and SU(2)_4.
In these models, we also fully construct the new Hilbert space ℋ̃ after condensation and compute new F-symbols and quantum dimensions for the condensed phases.
Throughout our discussion of abelian string-net models, we will use
F(a,b,c)=F^abc_def
for brevity, since other indices can be deduced from the abelian branching rules.
Moreover, for string nets based on the group G=ℤ_N, there are N distinct solutions to (<ref>), with the explicit form<cit.>
F(a,b,c)=e^2π i pa/N^2(b+c-[b+c]).
The integer parameter p=0,…,N-1 labels the N distinct solutions. The arguments a,b,c take values in 0,…,N-1 and [b+c] denotes b+c (mod N) with values also taken in 0,…,N-1.
For each of the N distinct solutions, we can construct a corresponding string-net model.
Each such string net model has N^2 topologically distinct quasiparticle excitations labeled by ϕ=(s,m) where s,m=0,1,…,N-1. The string operator W_ϕ(P) which creates ϕ=(s,m) is defined by (<ref>) with the string parameters
w_ϕ(a)=e^2π i(psa/N^2+ma/N)
§.§ ℤ_2 string-net model
To set the stage, we begin with the ℤ_2 string-net model, whose condensation transitions and phase diagram have been studied extensively in the literature <cit.>.
Here, we briefly review how our construction replicates these results.
The ℤ_2 string-net model has two types of strings {0,1} with dual strings 0̅=0,1̅=1. The branching rules are {(a,b;c) with a+b=c mod 2 }.
There are two distinct solutions F(1,1,1)=±1 to (<ref>). The corresponding models are the Toric code<cit.> and the double semion model respectively.
The Toric code has two ℤ_2 bosons ϕ=(1,0) and ϕ=(0,1), while the double semion model has one ℤ_2 boson ϕ=(0,1).
We first consider the condensation of ϕ=(0,1) in the two models, as the two condensed phases are identical. After condensation, only string type a which satisfies w_ϕ(a)=(-1)^a=1 remains, namely the remaining string type is 0̃={0} and thus the Hilbert space ℋ̃ is the vacuum state which is the same as the vacuum state in ℋ_ϕ. Hence, there is no string-net topological order after ϕ condensation.
Next, we consider the ϕ=(1,0) condensation in the Toric code. After condensation, the new string type is 0̃={0,1} and thus ℋ̃ is the vacuum state which is the equal superposition of all states in ℋ_ϕ. Thus there is no string-net topological order after ϕ condensation.
With the Hamiltonian described here, all of these phase transitions are in the 2+1D Ising universality class.
§.§ ℤ_4 string-net model
We next show how our construction allows us to construct certain condensed phases of the ℤ_4 string net model. The full phase diagram of this model was studied in detail in Ref. <cit.>.
The ℤ_4 string-net model has four types of strings {0,1,2,3} with dual strings 0̅=0,1̅=3,2̅=2,3̅=1. The branching rules are {(a,b;c) with a+b=c mod 4}. The Hilbert space consists of all possible string-nets with the above string types and branching rules.
There are four distinct solutions to the self-consistency conditions (<ref>)
F(a,b,c)=e^i 2π p a(b+c-[b+c]_4)/4^2
labeled by p=0,1,2,3. Here [x]_n=x mod n.
The corresponding ℤ_4 string-net models realize the topological order described by the Chern-Simons theory with the K-matrix
K= ( [ 0 4; 4 -2p ]).
All four models have a ℤ_4 boson ϕ=(0,1) and a ℤ_2 boson ϕ=(0,2). In addition, the p=0 model has other two ℤ_2 bosons ϕ=(2,0) and ϕ=(2,2).
We consider the topological order after condensation of each of these bosons.
As in the ℤ_2 case, condensing ϕ=(0,1) leads to a trivial order. Thus,
we begin with the condensation of ϕ=(0,2). In the condensed phase, the remaining string types a are those which satisfy w_ϕ(a)=e^i 2π2a/4=1, namely, the remaining string types are a∈{0,2}.
Thus the Hilbert space ℋ̃ after ϕ-condensation contains string-nets with the new string labels {0̃={0},1̃={2}} and the ℤ_2 branching rules.
As discussed in Eq. (<ref>), in this case all non-vanishing vertex coefficients can be set to 1. Solving Eq. (<ref>),
we then find that the F symbols of the condensed phase are simply a subset of those of the uncondensed phase. Specifically:
all A=1 ,F(1̃,1̃,1̃)=1, d_1̃=1
for the p=0,2 models, and
all A=1, F(1̃,1̃,1̃)=-1, d_1̃=1
for the p=1,3 models.
Thus, the ϕ=(0,2) condensed phase in the p=0,2 models is described by the Toric code while the ϕ=(0,2) condensed phase in the p=1,3 models is described by the double semion model.
Condensing ϕ=(1,0) also leads to a trivial topological phase; thus we
next turn to the condensation of the ϕ=(2,0) and ϕ=(2,2) bosons in p=0 model.
The Hilbert space ℋ̃ for both cases contains string-nets with the new string types {0̃={0,2},1̃={1,3}} and the ℤ_2 branching rules.
To find the topological order for after condensation, we solve for the vertex coefficients, and use Eq. (<ref>) to deduce the topological data of the condensed phase.
When the condensing boson is ϕ=(2,0), we find that
all A=1, F(1̃,1̃,1̃)=1, d_1̃=1.
In this case, the condensed F-symbols are simply a subset of the uncondensed ones; this is always the case when condensing (q,0)-type bosons in untwisted abelian lattice gauge theories. Thus, the ϕ=(2,0) condensed phase is described by the Toric code.
When condensing boson is ϕ=(2,2), in contrast, not all vertex coefficients can be chosen to be unity. In this case, we can choose:
A^t2=(-1)^t, other A=1, F(1̃,1̃,1̃)=-1, d_1̃=1.
with t=0,1,2,3. Thus, the ϕ=(2,2) condensed phase is described by the double semion model.
§.§ ℤ_6 string-net models
The ℤ_6 string-net model has six types of strings {0,1,2,…,5}. The dual string type is defined by a̅=6-a mod 6 while the branching rules are the triplets (a,b;c) that satisfy a+b=c (mod 6). By using the general solution
F(a,b,c)=e^i 2π p a(b+c-[b+c]_6)/6^2,
we can construct six distinct string-net models labeled by p=0,1,…,5. The corresponding topological order can be described by the Chern-Simons theory with the K-matrix
K= ( [ 0 6; 6 -2p ]).
Analogously to the previous examples, condensing a ℤ_6 boson
results in a trivial topological phase. Thus we focus on condensing
the ℤ_2 and ℤ_3 abelian bosons, which are summarized for the 6 distinct ℤ_6 string-net models in Table <ref>.
We first consider condensing ℤ_3 bosons.
Condensing ϕ=(0,2), which is a boson for any p, leaves the string types {0̃={0},1̃={3}} with ℤ_2 branching rules.
In this case, the condensed phase is described by:
all A=1, F(1̃,1̃,1̃)=1, d_1̃=1
for the p=0,2,4 models
and
all A=1, F(1̃,1̃,1̃)=-1, d_1̃=1
for the p=1,3,5 models.
Thus, the ϕ=(0,2) condensed phase in the p=0,2,4 models is described by the Toric code while the ϕ=(0,2) condensed phase in the p=1,3,5 models is described by the doubled semion model.
Second, we condense the ℤ_3 boson ϕ=(2,0) in the p=0 model
and the ℤ_3 boson ϕ=(2,2) in the p=3 model.
The new string labels are {0̃={0,2,4},1̃={1,3,5}} with ℤ_2 branching rules after condensation.
Analogous to the ℤ_4 case, we find
all A=1, F(1̃,1̃,1̃)=d_1̃=1
for condensation of ϕ=(2,0) in the p=0 model and
A^12=A^32=A^52=-1,other A=1,
F(1̃,1̃,1̃)=-1, d_1̃=1.
for condensation of ϕ=(2,2) in the p=3 model.
Thus the two condensed phases are described by the Toric code and the doubled semion model respectively.
Next, we consider condensing ℤ_2 bosons.
When the condensing boson is ϕ=(0,3), the remaining string types are {0̃={0},1̃={2},2̃={4}} with ℤ_3 branching rules.
After solving (<ref>), we find
all A=1, F(ã,b̃,c̃)=e^i2πqã(b̃+c̃-[b̃+c̃]_3̃)/9, d_ã=1
with q=0 for the p=0,3 models and q=1 for the p=1,4 models and q=2 for the p=2,5 models.
Thus, the ϕ=(0,3) condensed phase in the p=0,3 models is described by the ℤ_3 string-net model with q=0 while
the ϕ=(0,3) condensed phase in the p=1,4 and p=2,5 models is described by the ℤ_3 string-net model with q=1 and q=2 respectively.
Finally, we condense the ϕ=(3,0),(3,1),(3,2) bosons in the ℤ_6 string-net models with p=0,2,4 respectively.
The new string types after condensation are {0̃={0,3},1̃={1,4},2̃={2,5}} with ℤ_3 branching rules.
Condensing ϕ=(3,0) in the p=0 model, all vertex coefficients can be taken to be 1, and we obtain:
all A=1, F(ã,b̃,c̃)=1, d_ã=1.
To condense ϕ=(3,1) in the p=2 model, we may take:
A^13=A^43=e^i2π/3,A^23=A^53=e^-i2π/3, other A=1
F(1̃,1̃,2̃)=F(1̃,2̃,1̃)=F(1̃,2̃,2̃)=e^-i2π/3,
F(2̃,2̃,1̃)=F(2̃,1̃,2̃)=F(2̃,2̃,2̃)=e^i2π/3, other F =1
d_ã=1.
Finally, to condense ϕ=(3,2) in the p=4 model, we obtain:
A^13=A^43=e^-i2π/3,A^23=A^53=e^i2π/3, other A=1
F(1̃,1̃,2̃)=F(1̃,2̃,1̃)=F(1̃,2̃,2̃)=e^i2π/3,
F(2̃,2̃,1̃)=F(2̃,1̃,2̃)=F(2̃,2̃,2̃)=e^-i2π/3, other F=1
d_ã=1.
Thus the three condensed phases are described by the ℤ_3 string-net models labeled by p=0,2,1 respectively.
We summarize the condensed phases after condensing abelian bosons in the ℤ_6 models in Table <ref>.
§.§ ℤ_4×ℤ_4 string-net model
The ℤ_4×ℤ_4 string-net model has 16 types of strings labeled by a∈{(a_1,a_2),a_1,a_2∈{0,1,2,3}} with dual strings a̅=(a̅_1,a̅_2)=(4-a_1,4-a_2). The branching rules are {(a_i,b_i;c_i) with a_i+b_i=c_i mod 4} with i=1,2. The Hilbert space consists of all possible string-nets with the above string types and branching rules.
The general form of solutions to the self-consistency conditions (<ref>) for ℤ_N ×ℤ_N string net models is known<cit.>.
Here, we consider one such solution, for which:
F(a,b,c)=e^i 2π a^T 𝐍^-1𝐏𝐍^-1 (b+c-[b+c])
with
𝐍= ( [ 4 0; 0 4 ]),
𝐏= ( [ 0 2; 0 0 ]).
Here the square bracket [b+c] denotes a 2-component vector whose i-th component is b_i+c_i (mod 4).
From the solution (<ref>), we can construct the ℤ_4×ℤ_4 string-net Hamiltonian.
We focus on the four ℤ_2 bosons in the model and we denote them by
ϕ_1=(2,0,0,3), ϕ_2=(2,0,0,1),
ϕ_3=(2,0,2,1), ϕ_4=(2,0,2,3).
Here the bosons are labeled by (s_1,s_2,m_1,m_2) with s_1,s_2 being the flux and m_1,m_2 being the charge carried by the particle.
Now, we consider the condensation of the four bosons ϕ_i in the ℤ_4×ℤ_4 model in order.
In the ϕ_i condensed phase, we define the 2-component new string labels by
ã=(ã_1,ã_2)={(a_1,a_2),(2+a_1,a_2)}
with a_1∈{0,1},a_2∈{0,1,2,3}
To find the topological order for the ϕ_i condensed phase, we have to solve for the vertex coefficients.
First, we find that
all A =1 for ϕ_1 condensed phase
A^a,(2,0) =(-1)^a_2, other A=1 for ϕ_2 condensed phase.
For the ϕ_1 condense phase, we then solve Eq. (<ref>) to find:
F(ã,b̃,c̃)=e^i 2πã^T 𝐍̃^-1𝐏̃𝐍̃^-1 (b̃+c̃-[b̃+c̃])
with
𝐍̃= ( [ 2 0; 0 4 ]),
𝐏̃= ( [ 0 1; 0 0 ]).
For the ϕ_2 condensed phase, the new F-symbol is gauge equivalent to (<ref>).
Thus the topological order in ϕ_1 or ϕ_2 condense phase is described by the Chern-Simons theory with K-matrix<cit.>
K= ( [ 0 0 2 0; 0 0 0 4; 2 0 0 -1; 0 4 -1 0 ]).
Second, we find that
A^a,(2,0) =(-1)^a_1+a_2, other A=1 for ϕ_3 condensed phase
A^a,(2,0) =(-1)^a_1, other A=1 for ϕ_4 condensed phase.
For the ϕ_4 condensed phase, we find that F(ã,b̃,c̃) is given by (<ref>)
with
𝐍̃= ( [ 2 0; 0 4 ]),
𝐏̃= ( [ 1 1; 0 0 ]).
The new F-symbol for the ϕ_3 condensed phase is gauge equivalent to (<ref>).
Thus the topological order in ϕ_3 or ϕ_4 condense phase is described by the K-matrix
K= ( [ 0 0 2 0; 0 0 0 4; 2 0 -2 -1; 0 4 -1 0 ]).
§.§ S_3 string-net model
Our last two examples concern condensation transitions involving splitting.
We begin with the S_3 string-net model (constructed from the fusion category Rep(S_3), which has three types of strings {0,1,2} with dual strings 0̅=0,1̅=1,2̅=2. The branching rules are
{(0,0;0),(1,0;1),(2,0;2),
(1,1;0)(1,1;1),(1,1;2),(1,2;1),(2,2;0)}.
Here the triplets (a,b;c) are understood as the fusion a× b=c and are symmetric in the first two labels a,b.
The nontrivial F-symbols and d to self-consistency conditions (<ref>) are
F^111_1ef=
( [ 1/2 -1/√(2) 1/2; -1/√(2) 0 1/√(2); 1/2 1/√(2) 1/2 ])
F^111_211=F^112_111=F^121_111=F^211_111=-1
d_0=d_2=1, d_1=2
where the matrix indices e,f can be 0,1,2.
The model has 8 quasiparticles. Among them, there is a ℤ_2 abelian boson, which we denote ϕ=(2,0). The corresponding string operator is defined by the string parameter
w_ϕ(a)=(-1)^a.
Since 2 × 1 = 1× 2 = 1, condensing ϕ will cause the original string label 1 to split into two distinct labels, which we denote 1̃_1, 1̃_2.
To describe the Hilbert space ℋ̃ after condensation, we first
solve (<ref>) for A^s^ia. The
two distinct solutions are:
(A^21)_1= (A^12)_2 = 1, (A^12)_1 =(A^21)_2 =- 1.
Thus, the new string labels for ℋ̃ are
0̃={0,2}, 1̃_1={1}, 1̃_2={1}.
The branching rules can be deduced from the branching rules for the old string labels and are given by
[Before condensation, we have 1×1=0+1+2. After condensation, the fusion becomes (1̃_1+1̃_2)×(1̃_1+1̃_2)=0̃+1̃_1+1̃_2+0̃. Thus, 1̃_1,1̃_2 can be either self-dual or not self-dual. However, from the associativity of the fusion 1̃_1× (1̃_2×1̃_1)=(1̃_1×1̃_2)×1̃_1, we conclude 1̃_1×1̃_2=0̃,1̃_1×1̃_1=1̃_2,1̃_2×1̃_2=1̃_1. This can also be deduced directly from Eq. (<ref>).]
{(0̃,1̃_1;1̃_1),
(0̃,1̃_2;1̃_2),
(1̃_1,1̃_2;0̃),
(1̃_1,1̃_1;1̃_2),
(1̃_2,1̃_2;1̃_1)}
Thus the condensed phase has ℤ_3 (abelian) branching rules.
Next, we want to find the topological order in the ϕ condensed phase.
A solution for the full vertex coefficients is given by Eq. (<ref>), together with:
(A^1 1_0)^1,2 =(A^1 1_0)^2,1=(A^11_2)^1,2=-(A^11_2)^2,1=1
(A^11_1)^1,1_2 (A^11_1)^2,2_1=√(2),
where (A^1 1_0)^1,2 is the coefficient that is relevant to the (1̃_1, 1̃_2; 0) vertex in the condensed phase, (A^11_1)^1,1_2 is relevant to the (1̃_1, 1̃_`; 1̃_2) vertex, and so on.
Using this data, it is possible to solve (<ref>) for the fusion data in the condensed phase:
F^1̃_a 1̃_a 1̃_a_0 1̃_b 1̃_b
=F^1̃_a 1̃_a 1̃_b_1̃_a1̃_b 0
=F^1̃_a 1̃_b 1̃_a_1̃_a 0 0
=F^1̃_b 1̃_a 1̃_a_1̃_b 0 1̃_b=1
for a,b∈{1,2}.
With the data, we can construct ground states and lattice Hamiltonian for the condensed phase. It turns out the topological order in the condensed phase is described by the ℤ_3 string-net model charactered by the K-matrix
K= ( [ 0 3; 3 0 ]).
In other words, this is an untwisted (p=0) ℤ_3 string net model.
§.§ SU(2)_4 string-net model
The SU(2)_4 string-net model has five string types {0,1,2,3,4} with all strings being self dual. The branching rules are
{(a,0;a) for a=0,1,2,3,4,
(a,a;0),(a,a;2),(a,2;1),(a,2;3) for a=1,3,
(1,3;2),(1,3;4),(1,4;3),(3,4;1)
(2,2;0),(2,2;2),(2,2;4),(2,4;2),(4,4;0) }
If we only keep the even labels, the above branching rules (<ref>) are the same as the branch rules for the S_3 model (<ref>). The data {F,d} satisfying (<ref>) are known and we refer the readers to Ref. BondersonThesis for details.
The model has 25 particles. Among these, there is one ℤ_2 abelian boson, which we denote ϕ=(4,0). The corresponding string operator is defined by the string parameter
w_ϕ(a)=(-i)^a.
We consider the string net obtained by condensing ϕ=(4,0).
Since the string labels obey 2 × 4 = 4 × 2 = 2, the label 2 will split into two distinct string types after condensation, which we denote 2̃_1 and 2̃_2.
We first define ℋ̃ after condensation. Specifically, solving for the vertex coefficients A^4,a, we obtain:
A^41=1, A^43=-1, A^14=A^34=-i,
(A^42)_1 = (A^24)_2 = 1, (A^24)_1 =(A^42)_2 =- 1.
Thus, the new string labels for ℋ̃ are
0̃={0,4}, 1̃={1,3}, 2̃_1={2}, 2̃_2={2}.
The new branching rules can be deduced from the old branching rules, together with Eq. (<ref>), and are given by
{(1̃,1̃;0̃),(1̃,1̃;2̃_1),(1̃,1̃;2̃_2),
(1̃,2̃_1;1̃),(1̃,2̃_2;1̃),
(2̃_1,2̃_1;2̃_2),(2̃_1,2̃_2;0̃),(2̃_2,2̃_2;2̃_1).
}
Thus, ℋ̃ is the string-net Hilbert space with new string labels (<ref>) and branching rules (<ref>).
Next, we want to find {F,d} in the ϕ condensed phase.
A valid choice of the full vertex coefficients is given by (<ref>), together with:
(A^11_2)_1 =-√(2), (A^12_1)^1=-1/√(2), (A^22_2)^1 1_2=1/√(2),
(A^11_2)_2 =1, (A^12_1)^2=1, (A^22_2)^2 2_1=-2,
where (A^12_1)^2=1 pertains to the vertex (1̃, 2̃_2; 1̃) and so on.
Using these, and Eq. (<ref>),
we find the nontrivial new F-symbols are
F^1̃1̃1̃_1̃00=
F^1̃1̃1̃_1̃02̃_a=
F^1̃1̃1̃_1̃2̃_a0=-1/√(3),
F^1̃1̃1̃_1̃2̃_a2̃_b=-1/√(3)e^-i 2π ab/3,
F^1̃2̃_a 1̃_2̃_b1̃1̃=F^2̃_a1̃2̃_b_1̃1̃1̃=e^-i 2π ab/3,
F^1̃2̃_a2̃_b_1̃1̃0=F^2̃2̃_b1̃_1̃01̃=-1.
Here a≠ b=1,2. Interestingly, the data (<ref>) are exactly the ℤ_3 Tambara-Yamagami category<cit.> (TY_3). The TY_3 category has 4 labels [0]=0̃,[1]=2̃_1,[2]=2̃_2,σ=1̃. The first 3 labels have ℤ_3 fusion rules. The last label σ represents the symmetry defect:
[a]×σ =σ
σ×σ =[0]+[1]+[2].
With the data (<ref>), we can construct the ground state and effective string-net model for the ϕ condensed phase. The braiding data of excitations, the S, T matrices, are known in Ref. TYcatST.
Thus, condensing the ℤ_2 boson in the SU(2)_3 string net, we obtain the TY_3 string net. In this case, because the input fusion category is modular, this transition is analogous to condensing the ℤ_2 boson in the top layer of an SU(2)_4 ×SU(2)_4 bilayer system. The resulting topological order is SU(3)_1 ×SU(2)_4, which is exactly that of the TY_3 string net.
§ DISCUSSION
In this paper, we have systematically studied condensation of arbitrary abelian bosons in string-net models. We have introduced a Hamiltonian that tunes the system through a condensation transition, and given a detailed description of the string net in the condensed phase.
We have shown how, in the low-energy Hilbert space of the condensed phase, the input fusion category 𝒞 of the uncondensed string net becomes a new fusion category 𝒞̃, with both the effective Hamiltonian and the ground state in the condensed phase being 𝒞̃ string nets. Finally, we have shown how both the labels and the fusion data for 𝒞̃ can be calculated directly from the data of the string operators of the condensing bosons, together with the fusion data of 𝒞.
Because the transitions discussed here involve condensation of abelian bosons, the degrees of freedom that become gapless at the critical point can all be mapped onto variables in a Potts model, using a method similar to that described in Ref. <cit.>. By modifying H_1, one could also achieve phase transitions in the clock universality class.
One useful result of our construction is the possibility of systematically extracting not only the label set, but also the fusion data of 𝒞̃, by solving for the vertex coefficients implied by the string operators W^a_ϕ^j.
We note that Ref. Eliens similarly introduced vertex coefficients when studying the effect of anyon condensation on the fusion and braiding data of the UMTC describing the topological order, and used these to determine the F and R symbols for the condensed theory.
The vertex coefficients that we introduce here can be viewed as analogs of Ref. Eliens's vertex coefficients, albeit for the fusion category underpinning the string net, rather than for the UMTC associated with the anyon model itself.
One potential application of our construction, illustrated in the last example, is to obtain the fusion data for string nets of lower symmetry by condensing anyons in string nets with higher symmetry. For example, we can begin with a string net that has explicit time-reversal symmetry, such as SU(2)_4 ×SU(2)_4, and condense a chiral abelian boson in one of the two copies, to obtain a string net that does not have time reversal symmetry. This is useful because the data for many high-symmetry string nets, such as those constructed from rational conformal field theories, is known.
A second potential application is to string nets realizing symmetry enriched topological phases, where the enriching symmetry is abelian. Specifically, condensing ℤ_p abelian anyons can be viewed as “un-gauging" a ℤ_p symmetry, and a modification of the construction here can lead to condensed phases in which the models exhibit a global ℤ_p symmetry, similar to the constructions of Refs. Heinrich16,ChengAPS. Such a construction may enable a simpler string-net realization of many of these symmetries than in the existing literature. It also gives a framework that could be used to construct similar models with anyon-permuting symmetry at the boundary of a three-dimensional Walker-Wang string net.
Note added Shortly before completing this work, we became aware of Ref. <cit.>, which also discusses anyon condensation in string net models, including some non-abelian examples.
§ ACKNOWLEDGMENTS
C.-H. Lin thanks Lan Tian, Chenjie Wang, and Yidun Wan for helpful discussions. FJB is grateful for the support of NSF DMR 1928166.
§ PROPERTIES OF ABELIAN STRING OPERATORS
In this section, we prove the basic properties of our abelian string operators that we use in the main text.
§.§ Finding a gauge where F-symbols are trivial
Many of the properties of abelian string operators that we will use are valid only in the gauge where F (s^i, s^j, s^k) =1, where we use the notation F(a,b,c) = F^a b c_abc, ab, bc appropriate to F-symbols involving only abelian string labels. To see that such a gauge exists, we use the fact that if ϕ = (s,m) to be a boson, then w_ϕ(s) =1. (We note that while w_ϕ(a) is not gauge invariant for general a, w_ϕ(s), which represents the self-twist of the particle, is a gauge-invariant quantity).
From Eq. (<ref>), we see that
w_ϕ(s) w_ϕ(s^j) = F(s, s^j,s) w_ϕ (s^j+1)
If s^2 = 0 and j=1, F(s, s^j,s) is gauge invariant, and this tells us that only if F(s, s^j,s) =1 can (s,m) be a boson. Otherwise, under gauge transformations, we have
F̂(s, s^j,s) = F(s, s^j,s) f^s s^j_s^j+1/f^s^j s_s^j+1f^s^j+1 s_s^j+2/f^s s^j+1_s^j+2
where our string net construction requires f^s 0_s = f^0 s_s = 1.
For 1 ≤ j < p-1, we can use the ratio f^s^j+1s _s^j+2 / (f^ss^j+1_s^j+2) to fix F(s, s^j, s) = 1, where s^p = 0.
Further, we have w_ϕ(s) w_ϕ(s^p-1) = F(s, s^p-1,s) w_ϕ (0), and hence also F(s, s̅, s) = 1, where s̅ = s^p-1.
It follows that in this gauge, for all i,j, we have
F(s, s^i, s) = 1 , F(s,s^i, s^j ) F(s^i, s^j, s) = F(s^i, s, s^j) .
In this gauge, we see that w_ϕ(s^j) = 1 for all j.
Next, consider F(s, s^j, s^k) with k>1.
Under gauge transformations, we have:
F̂(s, s^j,s^k) = F(s, s^j,s^k) f^s s^j_s^j+1/f^s s^j+k_s^j+k+1f^s^j+1 s^k_s^j+k+1/f^s^j s^k_s^j+k
For k>1, and a fixed choice of f^s s^i_s^i+1 for each i, we can set all of these to 1 by fixing the ratio f^s^j+1 s^k_s^j+k+1/f^s^j s^k_s^j+k. (In this case, this also works for j= p-1).
Thus, if w_ϕ(s) = 1, we have enough gauge freedom to simultaneously set F(s, s^j, s^k) = 1 for all j,k. Using the pentagon relation, we also have
F(s,s^i, s^j) F(s,s^i+j, s^k) F(s^i, s^j, s^k)
= F(s^i+1, s^j, s^k) F(s, s^i, s^j+k)
In the gauge where F(s, s^j, s^k) = 1 for all j,k, we find that
F(s^i, s^j, s^k) = F(s^i+1, s^j, s^k)
from which it follows that F(s^i, s^j, s^k) = 1 for all i,j,k.
§.§ Basic string operators in a general gauge
The gauge choice F(s^i, s^j, s^k) = 1 is convenient, because the action of the operator W_ϕ(P) is identical to acting with a string operator with a fixed end-point that is located away from the stick, and fusing it into the lattice appropriately. With a different gauge choice, the difference between the operator W_ϕ(P) and such open string operators can be described by a gluing operator O_l,
whose action is defined by
<-0.22in
< g r a p h i c s >
|O_l
=F(a,s_1,s_2)<-0.22in
< g r a p h i c s >
|
<-0.22in
< g r a p h i c s >
|O_l
=F(s_2,s_1,a)^-1<-0.22in
< g r a p h i c s >
|
<-0.22in
< g r a p h i c s >
|O_l
=<-0.22in
< g r a p h i c s >
|
<-0.22in
< g r a p h i c s >
|O_l
=F(s_2,a,s_1)<-0.22in
< g r a p h i c s >
|
Here a denotes the string label of the stick, and
the grey region denotes the configuration which does not change.
In addition, in this gauge, when taking the product W_ϕ^1^i · W_ϕ^2^i, we may ignore the vertical bendings of the jointed path p^i∪ p^j. For example, consider two basic string operators W_ϕ^1^i,W_ϕ^2^i along the same path p_i. When acting the composite operator W_ϕ^1^i · W_ϕ^2^i on the vacuum state, we have
vac|W_ϕ^1^i· W_ϕ^2^i =
<-0.16in
< g r a p h i c s >
|
=<-0.16in
< g r a p h i c s >
|
=<-0.16in
< g r a p h i c s >
| θ_s_1,s_2
=vac|W_ϕ^1×ϕ^2^i ·θ_s_1,s_2
with
θ_s_1,s_2=F(s_2,s̅_2,s̅_1)/F(s_1,s_2,s̅_1×s̅_2).
Here we use (<ref>) to remove the loop in the second line at the expense of the factor θ_s_1,s_2.
Thus, in a general gauge, we do not have W_ϕ^1^i· W_ϕ^2^i=W_ϕ^1×ϕ^2^i.
Instead, we find:
W_ϕ^3=ϕ^1×ϕ^2,a_3b_3̅c_3d_3;ϕ^a×ϕ^3,ϕ^b×ϕ^3^i,abcd;ϕ^aϕ^b(efg)=
W_ϕ^1,a_1b_1̅c_1d_1;ϕ^a×ϕ^1,ϕ^b×ϕ^1^i,abcd;ϕ^aϕ^b(efg) ×
W_ϕ^2,a_3b_3̅c_3d_3;ϕ^a×ϕ^3,ϕ^b×ϕ^3^i,a_1b_1̅c_1d_1,ϕ^a×ϕ^1,ϕ^b×ϕ^1(efg) ×θ_s_1,s_2,a,b ^-1
with
θ_s_1,s_2,a,b=F(s_2,s̅_2,s̅_1)F(s̅_2,s̅_1,b)/F(s_1,s_2,s̅_1×s̅_2)F(a,s_1,s_2)
for i=1,…,4.
In addition, one can show that
W^i †, a'b'c'd';ϕ^a'ϕ^b'_ϕ,abcd;ϕ^aϕ^b (efg)=
W^i,a'b'c'd';ϕ^a'ϕ^b'_ϕ̅,abcd;ϕ^aϕ^b(efg) ·θ_s,s̅,a,b^-1
for i=1,2,3,4.
§.§ Properties of basic string operators in the gauge F(s^i, s^j, s^k ) = 1
Next, we establish the properties of basic string operators in the gauge
F(s^i,s^j,s^k)=1 .
First, from equations (<ref>,<ref>), we see that in this gauge,
W_ϕ^1^i· W_ϕ^2^i =W_ϕ^1+ϕ^2^i
and
W_ϕ^i†=W_ϕ̅^i.
Second, all basic string operators commute:
[W_ϕ^i,W_ϕ'^j]=0.
This follows from Eq. (<ref>) if i=j (i.e. if the two paths are the same). If the two paths intersect only on one stick (for example, i=1, j=3), this follows from the fact that using Eq. (<ref>), one can show that the two operator products differ by a factor of F(s^i, b× s, s^j), which is unity if b labels a stick. If i=1, j=2, we can use the identity
w_ϕ(f) w_ϕ(s) = F^s f s_f”, f', f' w_ϕ(f × s)
to show that w̅_ϕ(f) F^s f s_f”, f', f' = w̅_ϕ(f × s), which shows that [W_ϕ^1, W_ϕ^2] = 0. We can use this, together with Eq. (<ref>), to show that [W_ϕ^i^1, W_ϕ^j^2] = 0. A similar argument shows [W_ϕ^i^3, W_ϕ^j^4] = 0.
Moreover, in this gauge we have F^s s̅ b_b' 0 b' = w_ϕ(b) = 1 when b is a string label associated with the condensing boson. It follows that W_ϕ^1 W_ϕ^3 = W_ϕ (p_1 ∪ p_3), where the path p_1 ∪ p_3 crosses straight under the b-labeled stick. Similar results hold for other products of simple string operators with paths that overlap only on a single stick. Using the identity (derived from Eq. (<ref>)) F^f s̅ s_f, f×s̅,0 F(s̅ s s̅) = F^f ×s̅, s, s̅_f ×s̅, f, 0, the product W_ϕ^1 W_ϕ̅^2 can similarly be shown to be equal to an operator running along the path (p_1 ∪ p_2), which directly connects the two sticks. (The consistency relations ensure that any deformation of this path which does not change the end-points yields the same operator).
Thus, in this gauge, we may express a general string operator by concatenating string operators along a series of adjacent basic paths.
§ DIAGRAMMATICAL REPRESENTATION OF THE B_P^Φ,S OPERATOR
In this section, we present the graphical representation of B_p^ϕ,s in H_𝒞 (<ref>) which lead to the matrix elements in Eq. (<ref>), as well as an alternative (simpler) formulation
The action of B_p^ϕ,s in H_𝒞 is defined by
B_p^ϕ,s=∑_ϕ_10,ϕ_11,ϕ_12W_ϕ_10,ϕ_11,ϕ_12 B_p^s W^†_ϕ_10,ϕ_11,ϕ_12.
with
W_ϕ_10,ϕ_11,ϕ_12=𝒫_ϕ_10 W^1_ϕ_10·𝒫_ϕ_11 W^1_ϕ_11·𝒫_ϕ_12 W^3_ϕ_12.
Here the sums run over three end spins states ϕ_10,ϕ_11,ϕ_12 in p. The 𝒫_ϕ_i=|ϕ_iϕ_i| is the projector to the end spin state |ϕ_i and W^1_ϕ_10,W^1_ϕ_11,W^3_ϕ_12 are three basic string operators defined in (<ref>). The B_p^s is defined to add a loop-s to the boundary of p after W_ϕ_10,ϕ_11,ϕ_12 moves the excitations {ϕ_10,ϕ_11,ϕ_12} to the exterior of p. Finally, after fusing the loop-s to the boundary of p, W^†_ϕ_10,ϕ_11,ϕ_12 moves back the excitations to p.
Diagrammatically, the matrix elements of B_p^ϕ,s can be obtained by
<-0.32in
< g r a p h i c s >
|B_p^ϕ,s
=<-0.32in
< g r a p h i c s >
|
W_ϕ_10,ϕ_11,ϕ_12 B_p^s W^†_ϕ_10,ϕ_11,ϕ_12
=C_1 <-0.32in
< g r a p h i c s >
| B_p^s W^†_ϕ_10,ϕ_11,ϕ_12
=C_1 <-0.32in
< g r a p h i c s >
| W^†_ϕ_10,ϕ_11,ϕ_12
=C_1 ∑_i_1'i_2'…_6' C_2_a<-0.32in
< g r a p h i c s >
| W^†_ϕ_10,ϕ_11,ϕ_12
=C_1 ∑_i_1'i_2'…_6' C_2_a C_2_b<-0.32in
< g r a p h i c s >
| W^†_ϕ_10,ϕ_11,ϕ_12
=C_1 ∑_i_1'i_2'…_6' C_2_a C_2_b C_2_c<-0.32in
< g r a p h i c s >
| W^†_ϕ_10,ϕ_11,ϕ_12
=C_1 ∑_i_1'i_2'…_6' C_2_a C_2_b C_2_c C_3 <-0.32in
< g r a p h i c s >
|
≡∑_i_1'i_2'…_6'<-0.32in
< g r a p h i c s >
| B^s,i_1… i_6j_1… j_6_p,i'_1… i'_6j'_1… j'_6(e_1… e_12;ϕ_10,ϕ_11,ϕ_12)
where
B^s,i_1… i_6j_1… j_6_p,i'_1… i'_6j'_1… j'_6(e_1… e_12;ϕ_10,ϕ_11,ϕ_12)=C_1C_2_a C_2_b C_2_c C_3
with
C_1=W^1,e_10e_13 j_4e_4;ϕ_10ϕ_13_ϕ̅_10,0e_13' i_4e_4';1ϕ_13'(i_4j_3f_4)
W^1,e_14 e_11e_6i_5;ϕ_14ϕ_11_ϕ_11,e'_140e_6'j_5;ϕ_14'1(f_6j_6j_5)
× W^3,e_15 e_12e_1i_6;ϕ_15ϕ_12_ϕ_12,e_15'0e_1' j_6;ϕ_15'1(f_1i_1j_6)
C_2_a C_2_b C_2_c=
1/d_s√(d_i'_1d_j_2d_i'_3d_j_3d_i'_4d_j_5d_j'_6/d_e'_1d_j'_2d_i_3d_e'_4d_j'_5)×
[F^i'_1e_7_s̅j_1]_i_1j'_1[F^j'_1e_2_s̅i_2]_j_1i'_2[F^i'_2e_8_s̅j_2]_i_2j'_2
[F̃_s̅j_2^i'_3e_3]_i_3j'_2
[F^i'_3e_9_s̅j_3]_i_3j'_3×
[F^j_5s_e_5i'_4]_i_4j'_5
[F̃_e_6'j'_6^j_5s]_j_6j'_5
[F̃_j_60^j'_6s̅]_sj_6
[F^i'_4s̅_i_40]_si_4
[F^j_6i_1_j'_6i'_1]_s̅e_1'
[F̃_i'_4j'_3^i_4j_3]_s̅e_4'
C_3=
W_ϕ_10,e_10e_13 j'_4e_4;ϕ_10ϕ_13^1 ,0e_13'i'_4e_4';1ϕ_13'(i'_4j'_3f_4)
×
W_ϕ̅_11,e_14 e_11e_6i'_5;ϕ_14ϕ_11^1 ,e_14'0e_6'j'_5;ϕ_14' 1(f_6j'_6j'_5)
× W_ϕ̅_12,e_15 e_12e_1i'_6;ϕ_15ϕ_12^3 ,e_15'0e_1'j'_6;ϕ_15'1(f_1i'_1j'_6)
where ϕ'_13 = ϕ_13×ϕ_10, and similarly for ϕ'_14, ϕ'_15. Each product is unique because all stick labels have abelian fusion rules.
Here e_7,e_8… e_12 take values in abelian string types and thus j_p=i_p× e_p+6 for p=1…6 while e_1'=e_1× e_12,f_1' = f_1 × e_12, e_4'=e_4×e̅_10, f_4'=f_4×e̅_10, e'_6=e_6× e_11 and f'_6=f_6× e_11.
The functions W^1,abcd;ϕ^aϕ^b_ϕ,a'b'c'd';ϕ^a'ϕ^b'(efg),W^3,abcd;ϕ^aϕ^b_ϕ,a'b'c'd';ϕ^a'ϕ^b'(efg) are defined in (<ref>), and we have used the fact that (W^j_ϕ)^† = W^j_ϕ̅.
By using (<ref>) to simplify (<ref>), we obtain B^s,i_1… i_6j_1… j_6_p,i'_1… i'_6j'_1… j'_6(e_1… e_12;ϕ_10,ϕ_11,ϕ_12) in Eq. (<ref>).
§.§ Simplified condensation Hamiltonian for string nets constructed from braided fusion categories
When the fusion category used to construct the string net is itself an anyon model, a somewhat simpler formulation can be used to describe certain condensation transitions. We include it here as it may be of interest for, e.g., numerical studies <cit.>.
The existence of a braiding means that in addition to the rules (<ref>), the string labels also obey rules to determine what happens when an a-labeled string crosses over or under a b-labeled one:
< g r a p h i c s >
In these models, if the string net labels correspond to anyons described by a unitary modular tensor category 𝒞, then the particle-like excitations of the string net are anyons in the category 𝒞×𝒞 – i.e. the string net realizes two copies of the anyon model, with opposite chiralities. The bosons a ×a are plaquette defects<cit.>, and can be condensed as described in Ref. <cit.>. Using the original string-net construction, however, a boson a (a), corresponding to an anyon in the category 𝒞 (𝒞), violates both vertex and plaquette terms. However, using a modification of the
Walker-Wang construction of 3D string nets<cit.>, it is rellatively straightforward to construct a modified plaquette term for which open string operators creating these anyons commute with all plaquette terms.
When the condensing anyons are all from 𝒞, we can do this in the generalized string-net Hilbert space depicted in Fig. <ref>, and impose the constraint that at each trivalent vertex in the new lattice, the combination of edge labels is allowed by fusion. As in the construction outlined in the main text, we energetically penalize any sticks carrying a label other than the identity.
Finally, we modify the plaquette operator's action on configurations where the sticks carry non-trivial labels, to ensure that B_p commutes with open string operators ending on the sticks. This can be done by threading the loop carrying the plaquette label under all sticks, and using the fusion and braiding rules (<ref>,<ref>) to resolve the diagram and obtain the matrix elements, using exactly the same procedure as in the 3D Walker-Wang string net models (see <cit.>). Intuitively, this construction can be viewed as starting from a single layer of the Walker-Wang Hamiltonian, with a smooth lower boundary (see <cit.>), and open vertical edges extending upwards out of the plane. In the full 3D construction, our sticks thus correspond to edges of vertical plaquettes, and anyon condensation is achieved by adding “half-plaquette" operators along these vertical plaquettes. Commutativity of adjacent plaquette operators, as well as of plaquette operators with the anyon string operators corresponding to adding such vertical plaquettes, follows from commutativity of the full Walker-Wang Hamiltonian.
Similarly, to condense a set of bosons that are all from 𝒞, we reverse the procedure above, drawing a Walker-Wang model with a smooth upper boundary, and keeping half-plaquettes extending downwards from this plane. In this case, plaquette operator matrix elements are obtained by drawing the plaquette loop over the sticks, and then using appropriate fusion and braiding rules. Condensing some anyons in 𝒞, and some in 𝒞, can similarly be achieved by adding two sticks on each edge, one extending above the plane, and one below it.
The procedure for identifying string net data in the condensed phase using this construction is exactly analogous to that of the more general construction outlined in the main text.
§ SHOWING THAT B_P_1^Φ,T_1,B_P_2^Φ,T_2 COMMUTE
In this section, we will show that the operators B^ϕ,t_1_p_1 and B^ϕ,t_2_p_2 commute with one another. We only need to consider two cases. One case is when two plaquettes are the same p_1=p_2. The other case is when p_1 and p_2 are adjacent since two operators will commute if p_1 and p_2 are further apart.
The first case is when two B_p^ϕ,t operators act on the same plaquette p_1=p_2=p. We will show B_p^ϕ,t_1 and B_p^ϕ,t_2 commute if the branching rules δ^t_1,t_2_u are symmetric in t_1,t_2.
We note that B_p^ϕ,t_1B_p^ϕ,t_2=∑_ϕ_10,ϕ_11,ϕ_12 W_ϕ_10,ϕ_11,ϕ_12 B_p^t_1B_p^t_2 W^†_ϕ_10,ϕ_11,ϕ_12. Thus, to show that B^ϕ,t_1_p,B^ϕ,t_2_p commute, it is sufficient to show that B^t_1_p, B^t_2_p commute.
To this end, we compute
-0.22in
< g r a p h i c s >
| B_p^t_1B_p^t_2
=-0.22in
< g r a p h i c s >
|
=∑_u,u'-0.22in
< g r a p h i c s >
| √(d_u d_u')/d_t_1d_t_2
=∑_u-0.22in
< g r a p h i c s >
|
|[F^t_1t̅_1_uu̅]_t̅_20|^2
|[F^ut̅_2_t_10]_t_2t_1|^2
d_t_1 d_u/d_t_2
=∑_uδ^t_1 t_2_u-0.22in
< g r a p h i c s >
|
Here we use |[F^t_1t̅_1_uu̅]_t̅_20|^2=d_t_2/d_t_1d_u and |[F^ut̅_2_t_10]_t_2t_1|^2=|F^t_1t_2t̅_2_t_1u0|^2d_t_1d_t_2/d_u=δ^t_1t_2_u from (<ref>). Thus, we have
B_p^t_1B_p^t_2=∑_uδ^t_1 t_2_uB^u_p.
If δ^t_1 t_2_u is symmetric in t_1,t_2, then B_p^t_1B_p^t_2=B_p^t_2B_p^t_1 and thus B^ϕ,t_1_p,B^ϕ,t_2_p commute.
In general, δ^t_1 t_2_u is not symmetric in t_1,t_2 and thus B^ϕ,t_1_p,B^ϕ,t_2_p do not commute.
The second case is when the two B_p^ϕ,t operators act on two adjacent plaquettes p_1,p_2. We want to show that B_p_1^ϕ,t_1B_p_2^ϕ,t_2=B_p_2^ϕ,t_2B_p_1^ϕ,t_1.
To show this, we write down the matrix elements of the operators on each side by (<ref>) and then show they are equal.
In fact, it is sufficient to compare the factors for the two operations which are different. These factors depend on the spin states on the shared boundary between p_1,p_2 (see Fig. <ref>).
Specifically, we write down the factors which are different. First, the action of B_p_1^ϕ,t_1B_p_2^ϕ,t_2 on the shared boundary contributes the factors
∑_a”b”a”'b”'w_ϕ(a”)/w_ϕ(a)[F̃^sa”_bt_2]_ab”[F^a”'s_t_1b”]_a”b”
Second, the action of B_p_2^ϕ,t_2B_p_1^ϕ,t_1 on the shared boundary contributes the factors
∑_a'b'a”b”a”'b”'w_ϕ(a”')/w_ϕ(a')[F̃^sa”'_b't_2]_a'b”'[F^a's_t_1b]_ab'
F^t_1at_2_a”'a'a”F̃^t_1bt_2_b”'b'b”.
Here x'=x × t_1,x”=x × t_2,x”'=x × t_1 × t_2 for x=a,b and a+s=b.
All we need is to show that (<ref>) = (<ref>).
To this end, we use (<ref>) and (<ref>) to simplify (<ref>) and (<ref>) as
∑_a”b”a”'b”' w_ϕ(t_2)F^ast_2_b”bt'_2(F^t_1a”s_b”'a”'b”)^*/F^at_2s_b”a”t'_2.
and
∑_a'b'a”b”a”'b”'w_ϕ(t_2) F^a'st_2_b”'b't'_2 F^t_1at_2_a”'a'a” (F^t_1as_b'a'b F^t_1bt_2_b”'b'b”)^*/F^a't_2s_b”'a”'t'_2
respectively. Here t_2'=t_2+ s.
The next step is to simplify (<ref>) further. By using the two pentagon identities
F^a'st_2_b”'b't'_2F^t_1at'_2_b”'a'b”=F^t_1as_b'a'bF^t_1bt_2_b”'b'b”F^ast_2_b”b't'_2
F^t_1at'_2_b”'a'b”F^a't_2s_b”'a”'t'_2=∑_hF^t_1at_2_a”'a'hF^t_1 h s_b”'a”'b”F^at_2s_b”ht'_2
and the unitary conditions
∑_b'F^t_1bt_2_b”'b'b”(F^t_1bt_2_b”'b'b”)^*=1
∑_a'F^t_1at_2_a”'a'a”(F^t_1at_2_a”'a'h)^*=δ_a”h,
we can show (<ref>)=(<ref>). This completes the proof that the B_p_1^ϕ,t_1,B_p_2^ϕ,t_2 terms commute with one another.
§ SHOWING THAT [B_P^Φ,S,W_Φ^I]=0
In this section, we show that B_p^ϕ,s and W_ϕ^i commute with one another. For our purpose, it is sufficient to show they commute in the gauge (<ref>). In fact, we check that B_p^ϕ,s and W_ϕ^i commute in any gauge.
It suffices to show that the basic string operators W_ϕ^i^k commute with B_p^ϕ,s since any W_ϕ^i can be constructed by gluing the basic string operators along the path.
Thus, we only have to consider the case when the basic string operators W_ϕ^i^k are around the vertices surrounding the plaquette p since it is clear that two operators commute if they are further apart.
There are two independent basic string operators which act around each vertex surrounding the plaquette p (see Fig. <ref>(a)). We need to show all 12 basic string operators commute with B_p^ϕ,s. Among 12 string operators, there are 6 string operators like W_ϕ^i^4, whose ends lie outside p, 4 string operators like W_ϕ^i^1 which intersect p and 2 string operators like W_ϕ^i^2 whose ends lie inside p. We will show that W_ϕ^i^4,W_ϕ^i^1, W_ϕ^i^2 commute with B_p^ϕ,s. In a similar way, one can show other basic string operators also commute with B_p^ϕ,s.
First, we want to show that W^4_ϕ^i B_p^ϕ,s = B_p^ϕ,s W^4_ϕ^i (see Fig. <ref>(b)). To show this, we write out their matrix elements and compare the factors which are different. Specifically, we need to show that the product from the left of the equation
W_ϕ^i,k_ir_i̅m_iq_i^4,krmq(pnt) W_ϕ^l,k_i+l0m_i+ln_l^3,k_ilm_in(pq_if)×
W_ϕ^l,k_ilm_in_s^3†,k_i+l0m_i+lf_s(pq_i+s̅f_s) (F^s̅q_ir_i̅_t_sq_i+s̅tF^f_ss̅q_i_m_i+l+sfq_i+s̅)^*
and the product from the right
W_ϕ^i,k_ir_i̅m_iq_i+s̅^4,krmq_s̅(pn_st_s̅) W_ϕ^l,k_l0m_ln_l^3,klmn(pqf)×
W_ϕ^l,klmn_s^3†,k_l0m_lf_s(pq_s̅f_s) (F^s̅qr_t_sq_s̅tF^f_ss̅q_m_l+sfq_s̅)^*
are equal.
Here x_y=x+y and the matrix elements of W_ϕ^k are defined in (<ref>).
By using (<ref>) to write W_ϕ^k† in terms of W_ϕ̅^k and (<ref>,<ref>) to write w in terms of F symbols, we can then show they are equal by (<ref>).
Second, we want to show that W^1_ϕ^i B_p^ϕ,s = B_p^ϕ,s W^1_ϕ^i (see Fig. <ref>(b)). Again, we write down the matrix elements of both sides of the equation and compare the difference between the two. Specifically, from the left is the product
W^1,abcd_ϕ^i,a_ib_i̅c_id_i(efg)
W^1,a_ib_i̅c_id_i_ϕ^b+ϕ̅^i,a_b0c_bd_b(efg)W^1†,a_b0c_bd_b+s_ϕ^b+ϕ̅^i,a_ib_i̅c_id_i+s(ef_sg_s)
while from the right is the product
W^1,abcd_ϕ_b,a_b0c_bd_b(efg)W^1†,a_b0c_bd_b+s_ϕ_b,abcd_s(ef_sg_s)
W^1,abcd_s_ϕ^i,a_ib_i̅c_id_i+s(ef_sg_s)
Writing everything in terms of F symbols by (<ref>, <ref>, <ref>), one can show they are equal by (<ref>).
Third, we want to show that W^2_ϕ^i B_p^ϕ,s = B_p^ϕ,s W^2_ϕ^i (see Fig. <ref>(b)). We write down the their matrix elements and compare the difference. Specifically, from the left we have
W^2,nbfd_ϕ^i,n_ib_i̅f_id_i(pcg)
W^1,ab_i̅cd_i_ϕ^b+ϕ̅^i,a_b+i̅0c_b+i̅d_b(ef_ig) ×
W^3,mn_i0p_ϕ^n+ϕ^i,m_n+i0o_n+ip_n+i(qrf_i)
W^1†,a_b+i̅0c_b+i̅g_s_ϕ^b+ϕ^i,ab_i̅cd_i+s(ef_i+sg_s) ×
W^3†,m_n+i0o_n+if_i+s_ϕ^n+ϕ^i,mn_i0p_s(qr_s̅f_i+s)
F^c_b+i̅f_is_g_sgf_i+s
F^f_iss̅_f_if_i+s0
(F^f_i+ss̅r_o_n+if_i r_s̅)^*
and from the right we have
W^1,abcd_ϕ^b,a_b0c_bd_b(efg)
W^3,mnop_ϕ^n,m_n0o_np_n(qrf)
W^1†,a_b0c_bd_b+s_ϕ^b,abcd_s(ef_sg_s)
W^3†,m_n0o_np_n+s_ϕ^n,mnop_s(qr_s̅f_s)
W^2,nbf_sd_s_ϕ^i,n_ib_i̅f_i+sd_i+s(p_scg_s)
F^c_bfs_g_sgf_s
F^fss̅_ff_s0
(F^f_ss̅r_o_nf r_s̅)^*.
Similarly, by a straightforward but tedious computation, one can show they are equal by (<ref>).
§ CONSISTENCY OF SOLUTIONS FOR VERTEX COEFFICIENTS IN THE PRESENCE OF SPLITTING
If a^r = a and c^r = c, then a W^1_ϕ^jr operator at a vertex (a, b; c) does not change the labels about this vertex; its only effect is to change the labels of the two adjacent sticks. Thus, we obtain:
A^a s^(i+j) r A^c s^(k-j) r A^a b_c = A^a s^i r A^c s^k r A^a b_c w̅_ϕ^jr(b) F^ a b s^ j r_c c b^jr (F^ a s^ j r b_c a b^jr )^*
× F^a s^i r s^j r_a a s^(i+j) r ( F^ c s^jr s^(k-j)r_c c s^k r )^*
where we have used the gauge (<ref>). If A^ab_c is non-zero, this can be true only if the coefficient does not depend on b.
Similarly, applying a W^2_ϕ^jr operator at a vertex (b, a; c), we obtain:
A^a s^(i+j) r A^c s^(k-j) r A^ ba_c = A^a s^i r A^c s^k r A^ b a _c F^ b a s^ j r_c c b^jr
× F^a s^i r s^j r_a a s^(i+j) r ( F^ c s^jr s^(k-j)r_c c s^k r )^*
Finally, applying W^2_ϕ^-jr W^1_ϕ^jr to a vertex (a,c; b) with a s^r= a and c s^r = c gives:
A^a s^(i+j) r A^c s^(k-j) r A^ ac_b = A^a s^i r A^c s^k r A^ ac _b w̅_ϕ^jr(c) (F^ c s^jr s^- j r_c c 0)^*
× (F^a s^jr c_b a c)^* F^a s^i r s^j r_a a s^(i+j) r F^ c s^kr s^-jr_c c s^(k-j) r
Similar equations appear about downward-oriented vertices, involving the string operators W^3_ϕ^lr, W^4_ϕ^lr; however these do not impose any new conditions required for consistency.
We now show that the coefficients identified above are independent of b for different choices of b that are related by fusion with s^rj. Iterating this, we see that the coefficients are the same for any b in the fusion orbit of s^jr. In particular, for j=1 we see that the coefficient is the same for any b in the fusion orbit of s^r. Moreover, the string operator W^i_ϕ^jr =( W^i_ϕ^r)^j; hence we conclude that, or any j, the coefficients in Eqs. (<ref>- <ref>) are the same for all b in the fusion orbit of s^r, and for any j.
We begin with Eq. (<ref>). Using Eq. (<ref> a), we find
F^ a s^j r b_c a b^jr F^a b^jr s^jr_c c b^2jr F^s^jr b s^jr_b^2jr b^jr b^jr
=F^ab s^jr_c c b^jr F^ a s^jr b^jr_c a b^2jr .
Next, we multiply both sides of the equation by w_ϕ^jr(b^(jr)), and use Eq. (<ref>) to see that
w_ϕ^jr(b) w_ϕ^jr(s^jr) = w_ϕ^jr(b^(jr)) F^s^jr b s^jr_b^2jr b^jr b^jr .
Since w_ϕ^jr(s^jr) = 1, we thus find:
w_ϕ^jr(b)F^ a s^j r b_c a b^jr (F^ab s^jr_c c b^jr )^*
= w_ϕ^jr(b^(jr))F^ a s^jr b^jr_c a b^2jr( F^a b^jr s^jr_c c b^2jr)^* .
Iterating this result, we see that the coefficient is the same for all choices of b in the same fusion orbit of s^r.
Next, consider Eq. (<ref>). Eq. (<ref> a) stipulates:
F^s^jr b a _c b^jr c F^s^jr c s^kr_c c c F^b a s^kr_cca = F^b^jr a s^kr_c c a F^s^jr b a_c b^jr c
Further, since s^jr c = c, we have
w_ϕ^jr(c) w_ϕ^jr(s^kr) = F^s^jr c s^kr_c c c F^ c s^kr s^jr_c c s^(k+j)r/F^c s^jr s^kr_c c s^(k+j)rw_ϕ^jr(c)
and hence F^s^jr c s^jr_c c c = 1.
It follows that F^b a s^jr_cca = F^b^jr a s^jr_c c a, and the coefficient is the same for any b in the fusion orbit of s^jr.
Finally, consider Eq. (<ref>). We have simplified the coefficient on the right-hand side as follows. Similar to Eq. (<ref>), the product of W^2_ϕ^-jr W^1_ϕ^jr on the vertex (a,c; b) can be expressed
w̅_ϕ^jr(c) F^ a c s^jr_b^jr b c ( F^a s^jr c_b^jr a c )^* (F^b s^jr s^t-jr_b^t b^jr s^t)^* (F^b^jr s^-jr s^t_b^t b s^t - jr)^* F^a c s^-jr_b b^jr c
× F^a s^i r s^j r_a a s^(i+j) r F^ c s^kr s^-jr_c c s^(k-j) r
where the stick on the a edge initially carries the label s^ir, that on the c edge carries a label s^kr, and that on the b edge carries s^t.
However, we can use Eq. (<ref>) to show that when a s^r = a and c s^r = c,
F^b^jr s^-jr s^t_b^-t b s^t - jr F^b s^jr s^t-jr_b^-t b^jr s^t = F^b s^jr s^-jr_b b^jr 0 F^ s^jr s^-jr s^t_s^t 0 s^t-jr
and
F^ a c s^jr_b^jr b c F^a c s^-jr_b b^jr c F^c s^jr s^-jr_c c 0 = F^b s^jr s^-jr_b b^jr 0
Thus, in the gauge (<ref>), Eq. (<ref>) can be simplified to give:
w̅_ϕ^jr(c) ( F^a s^jr c_b^jr a c )^* (F^c s^jr s^-jr_c c 0)^*
We can show that the coefficient is the same for any b in the fusion orbit of s^jr:
F^a s^jr c_b a c F^a c s^jr_ b^jr b c F^s^jr c s^jr_c c c = F^a c s^jr_b^jr bc F^a s^jr c_b^jr a c
Cancelling the redundant factors on both sides, and noting that by Eq. (<ref>), F^s^jr c s^jr_c c c =1, we see that F^a s^jr c_b a c = F^a s^jr c_b^jr a c, and again by iterating we find our result.
Now, if b is an abelian particle, and a × s^r = a, c × s^r = c, then a × c = ∑_j b^jr + ..., where ... cannot contain b^l for l ≠ jr. This follows from the cyclic property of the branching rules. Suppose (a,c; b) and (a,c; b^j) are allowed by the branching rules. Then so are (c, b̅^-j; a) and (b̅^-j, a; c̅). However, if b^j = b × s^j = s^j × b, then we must also have (b̅, a; c̅^j). If j = l r then c̅^j = c̅, and the outcome of fusing b̅ with a is unique. Otherwise, however, we see that fusing b̅ with a can have at least two different outcomes; hence b is not an abelian string label. In particular, if b = s^j, it follows that all equations associated with acting with string operators s^jr on the vertices (a,s^j; a), (s^j, a; a), and (a, a̅; s^j) are consistent. This allows us to solve for the coefficients A^a s^j.
In general, however, vertices of the form (for example) (b, a;c) and ( g,a; c), where g ≠ b s^j, can lead to multiple equations of the form (<ref>), which relate the same pairs of coefficients A^a s^(i+l) r,A^c s^(k-l) r to A^a s^i r A^c s^k r. If F^ b a s^ l r_c c b^lr≠ F^ g a s^ l r_c c g^lr, these equations are mutually inconsistent unless we choose either A^ba_c = 0 or A^ga_c = 0. The resolution to this is to recognize that since both a and c split, there are multiple non-zero choices for the coefficient: A^ba_c =(A^ba_c)_ij, denoting a choice of ã_i and c̃_j. For a given b, we find that the coefficient F^ b a s^ l r_c c b^lr takes on at most p/r distinct values (and similarly for other vertices); hence we expect to find at least one non-zero (A^ba_c)_ij for each i.
§.§ Relations between coefficients A^a s^jr when a^r = a
Suppose a^r = a. Eq. (<ref>a) gives:
F^a s^lr s^jr_a a s^(l+j)r F^a s^(l+j)r s^k r_a a s^(l+j+k)r F^s^lr s^jr s^k r_s^(l+j+k)r s^(l+j)r s^(j+k)r
= F^a s^jr s^kr_a a s^(j+k)r F^a s^lr s^(j+k)r_a a s^(l+j+k)r
In our gauge of choice, taking j → j-1 and k=1 in the above expression gives
F^a s^lr s^jr_a a s^(l+j)r
= F^a s^lr s^(j-1)r_a a s^(l+j-1)r F^a s^(l+j-1)r s^ r_a a s^(l+j)r/F^a s^(j-1) r s^r_a a s^jr
Using this expression repeatedly, we can show that
F^a s^lr s^j r_a a s^(l+j)r = ( ∏_k = 0^j-1 F^a s^(l+k)r s^r_a a s^(l+k+1)r/∏_k = 1^j-1 F^a s^kr s^r_a a s^(k+1)r )
= ( ∏_k = l^l+j-1 F^a s^k r s^r_a a s^(k+1)r/∏_k = 1^j-1 F^a s^kr s^r_a a s^(k+1)r )
From this, we see that
F^a s^lr s^j r_a a s^(l+j)r/ F^a s^jr s^l r_a a s^(l+j)r = ( ∏_k = l^l+j-1 F^a s^k r s^r_a a s^(k+1)r/∏_k = j^l+j-1 F^a s^k r s^r_a a s^(k+1)r ) ( ∏_k = 1^l-1 F^a s^kr s^r_a a s^(k+1)r/∏_k = 1^j-1 F^a s^kr s^r_a a s^(k+1)r )
Without loss of generality, assume that l>j. Then:
( ∏_k = l^l+j-1 F^a s^k r s^r_a a s^(k+1)r/∏_k = j^l+j-1 F^a s^k r s^r_a a s^(k+1)r ) =1/∏_k = j^l-1 F^a s^k r s^r_a a s^(k+1)r
( ∏_k = 1^l-1 F^a s^kr s^r_a a s^(k+1)r/∏_k = 1^j-1 F^a s^kr s^r_a a s^(k+1)r ) = ∏_j^l-1 F^a s^k r s^r_a a s^(k+1)r
so that
F^a s^lr s^j r_a a s^(l+j)r = F^a s^jr s^l r_a a s^(l+j)r
Further, from the expression (<ref>),
(A^a s^n r)_μ = (A^a s^ r )_μ^n ∏_k=1^n-1 ( F^a s^k r s^ r_a a s^(k+1) r )
we see that
(A^a s^(j+l) r)_μ/(A^a s^l r)_ν = (A^a s^ r )_μ^j+l/(A^a s^ r )_ν^l ∏_k=1^j+l-1 ( F^a s^k r s^ r_a a s^(k+1) r ) /∏_k=1^l-1 ( F^a s^k r s^ r_a a s^(k+1) r )
= (A^a s^ r )_μ^j+l/(A^a s^ r )_ν^l ∏_k=l^j+l-1 ( F^a s^k r s^ r_a a s^(k+1) r )
Hence:
(A^a s^(j+l) r)_μ/(A^a s^l r)_ν (A^a s^j r)_ρ = (A^a s^ r )_μ^j+l/(A^a s^ r )_ν^l (A^a s^ r )_ρ^j∏_k=l^j+l-1 ( F^a s^k r s^ r_a a s^(k+1) r ) /∏_k=1^j-1 ( F^a s^k r s^ r_a a s^(k+1) r )
= (A^a s^ r )_μ^j+l/(A^a s^ r )_ν^l (A^a s^ r )_ρ^j F^a s^lr s^j r_a a s^(l+j)r
where in the last line, we have used Eq. (<ref>). Evidently, if all factors come from the same solution (i.e. μ = ν = ρ), then the right-hand side is simply F^a s^lr s^j r_a a s^(l+j)r.
§.§ Vertices where multiple labels split
For vertices where multiple labels split (and none of the labels are a power of s), we must address two questions. First, is it the case that for every choice of b, there exists at least one pair (μ, ν) for which Eq. (<ref>) can be satisfied? If not, we must conclude that at least one of the particles a,b, or c must be confined.
Recall that if s^q=1, then if w_ϕ^q(b) ≠ 1, n b does not correspond to any label in our effective Hilbert space; hence in this case we must set (A^ab_c)^μ_ν = 0 for all μ,ν.
When w_ϕ^q(b) = 1, W^1_ϕ^q acts as the identity operator at the vertex (a,b;c), since it is an excitation of the form (0,m) which does not involve any fusion.
Applying the operator W^1_ϕ^r q/r times, in the gauge (<ref>) we obtain the matrix element
M_1(a,b,c))^q/r( ∏_k=1^q/r-1 F^a s^kr s_a a s^(k+1)r) ) ( ∏_k=1^q/r-1 (F^c s^r s̅^kr_c c s̅^(k-1)r)^* )
Since W^1_ϕ^q = ( W^1_ϕ^r)^q/r, it follows that:
( M_1(a,b,c))^q/r = ( ∏_k=1^q/r-1 (F^a s^kr s_a a s^(k+1)r)^* ) ( ∏_k=1^q/r-1 (F^c s^r s̅^kr_c c s̅^(k-1)r) )
hence M_1(a,b,c) is a q/r^th root of the product
on the right-hand side. Now, A^a s^r is a q/r^th root of ∏_k=1^q/r-1( F^a s^kr s^r_a a s^(k+1)r)^*, while A^c s^r is a q/r^th root of ∏_k=1^q/r-1 (F^c s^krs^r_c c s̅^(k+1)r)^* = ( ∏_k=1^q/r-1 F^c s^r s̅^k r_c c s^(k+1)r)^-1, where we have used Eq. (<ref>). Thus A^a s^r/A^c s^r is also a q/r^th root of the product on the right-hand side. It follows that for every b, there exists at least one choice of μ, ν for which Eq. (<ref>) is satisfied – in which case it is also satisfied for b^kr, 0 ≤ k < q/r.
This suggests that for a fixed M_1(a,b,c) of modulus 1, we expect q/r distinct solutions A_μ^a s^r/A_ν^c s^r =M_1(a,b,c)e^ 2 π i n r/q, 0 ≤ n < q/r.
At this point, it is worth commenting on the fusion rules of the new theory. In the most general case, we have
(∑_μ =1^q/rã_μ ) × (∑_ν =1^q/rc̃_ν ) = q/r∑_b̃ | b × s^r ≠ b c_b b̃ + ∑_d̃| d × s^v = d∑_λ c_d,λd̃_λ .
The first sum contains any terms that do not split, and the second contains terms that do).
As discussed in the main text, if (a, c; b^k) is not an allowed vertex for any 0 < k < r, then c_b = 1; otherwise, c_b counts the number of distinct k, 0 ≤ k < r, for which (a, c; b^k) is allowed. The second sum runs over labels d for which d × s^v = d, with 0 < v < q. In this case, in the condensed theory a fusion channel d̃_λ appears with a coefficient c_d, λ, whose value depends on v, r, and the number of values of λ for which the new fusion rules admit solutions.
As discussed in the main text, when c_b=1, the number of distinct values of (μ, ν) for which (ã_μ, c̃_ν; b̃) is allowed by the branching rules is equal to the number of copies of b̃ on the right, and the new theory need not have fusion multiplicity.
If c_b >1,
the label b̃ = ∑_j=1^q-1 b^j at the vertex (ã_μ, c̃_ν; b̃) may be associated with multiple different values of the coefficient M_l(a,b^j,c). Each distinct coefficient then corresponds to a distinct set of solutions (μ,ν) to Eq. (<ref>). Thus, if { M_l(a,b^j,c), 0 ≤ j < r } are all distinct, then we can find up to c_b q/r distinct solutions to Eq. (<ref>), and again the new theory need not have fusion multiplicities. On the other hand, if these coefficients are not all distinct, then in general fusion multiplicities are expected, meaning that the coefficients (A^ab_c)^μ_ν are matrices.
The situation for vertices (ã_μ, c̃_ν; d̃_λ) is similar, except that in this case if v and r are not mutually prime, additional constraints are imposed which fix which coefficients (A^ab_c)^μ, λ_ν are non-zero. Again, we cannot rule out the possibility of fusion multiplicities and the need to make these coefficients matrices.
|
http://arxiv.org/abs/2303.06720v1
|
20230312175604
|
QTrail-DB: A Query Processing Engine for Imperfect Databases with Evolving Qualities
|
[
"Maha Asiri",
"Mohamed Y. Eltabakh"
] |
cs.DB
|
[
"cs.DB"
] |
Imperfect databases are very common in many applications due to various reasons
ranging from data-entry errors, transmission or integration errors, and wrong instruments' readings,
to faulty experimental setups leading to incorrect results.
The management and query processing of imperfect databases
is a very challenging problem as it requires incorporating the data's qualities within the database engine.
Even more challenging, the qualities are typically not static and may evolve over time.
Unfortunately, most of the state-of-art techniques deal with the data quality problem as
an offline task that is in total isolation of the
query processing engine (carried out outside the DBMS).
Hence, end-users will receive the queries' results
with no clue on whether or not the results can be trusted for further analysis and decision making. In this paper, we propose the it“” system that fundamentally extends the
standard DBMSs to support imperfect databases with evolving qualities.
introduces a new quality model based on the new concept of
“Quality Trails”, which captures the evolution of the data's qualities over time.
extends the relational data model to incorporate the quality trails within the database system.
We propose a new query algebra, called “QTrail Algebra”,
that enables seamless and transparent propagation and derivations
of the data's qualities within a query pipeline. As a result, a query's answer
will be automatically annotated with quality-related information at the tuple level.
propagation model leverages the
thoroughly-studied propagation semantics
present in the DB provenance and lineage tracking literature,
and thus there is no need for developing a new query optimizer.
is developed within PostgreSQL and experimentally evaluated using
real-world datasets to demonstrate its efficiency and practicality.
QTrail-DB: A Query Processing Engine for Imperfect Databases with Evolving Qualities
Maha Asiri, Mohamed Y. Eltabakh
Computer Science Department, Worcester Polytechnic Institute (WPI), MA, USA.
{mmasiri, meltabakh}@wpi.edu
March 30, 2023
===============================================================================================================================================
§ INTRODUCTION
In most modern applications it is almost a fact that the working databases may not be perfect and may contain
low-quality data records <cit.>.
The presence of such low-quality data is due to many reasons including missing or wrong values,
redundant and conflicting information from multiple sources, human errors in data entry,
machine and network transmission errors, or even wrong assumptions or instruments' calibration
during scientific experimentations that lead to inaccurate results.
A recent science survey has revealed that 80.3% of the participant research and scientific groups
have admitted that their working databases contain records of low quality, which puts their analysis
and explorations at risk <cit.>.
Moreover, it has been reported in <cit.> that wrong decisions and uninformed analysis resulting from imperfect databases cost US businesses around 600 billion dollars each year.
Even more challenging, the qualities of the data tuples are typically not static,
instead they may change over time (evolve) depending on various events taking place in the database.
The emerging scientific applications are excellent examples in which tracking and maintaining
the data's qualities is of utmost importance <cit.>.
For example, Figure <ref> illustrates a possible sequence of operations that may take place
in biological databases.
First, a data tuple r (e.g., a gene tuple) can be imported from an external source to the local database.
At that time, r would be assigned an initial quality score depending on the source's credibility.
Then, a scientist may insert a comment highlighting a possible error in the tuple (e.g., the gene's start position does not seem correct),
based on which r's quality should be decreased.
After a while, a verification step that compares the local data with an external repository
may confirm that r contains an incorrect value, which will further decrease r's quality.
Subsequent actions in the database may either increase or decrease r's quality over time, e.g.,
Steps 4 and 5 in Figure <ref>, which are an update operation on r (e.g., correcting the gene's start position), and
the addition of a scientific article matching r's new content, respectively,
should both enhance r's quality.
In general, each tuple in the database may have its quality and trustworthy changing over time
based on different operations taking place in the database.
In such imperfect databases with dynamic and evolving qualities over time,
the standard query processing that treats all tuples the same while ignoring their qualities
is indeed a very limited approach. For example,
several interesting and challenging questions may arise beyond the standard data querying, which include:
* What was the quality of tuple r before the last revision?
* Why r's quality has drastically dropped at time t, and what did we do to fix that?
* Given my complex query, e.g., involving selection, joins, grouping and aggregation, and set operators, what is quality of each output tuple? Can I trust the results and build further analysis on them or not?
* Given my query, how to execute it on only the high-quality tuples, e.g., the quality is above a certain threshold? How to join, select, or order the tuples based on their qualities?
* Among the low-quality tuples in the database, which ones are more important, e.g., frequently participate in queries' answers, to investigate first?
Certainly, supporting these types of questions is of critical importance to end-users and high-level applications.
On one hand, without modeling and keeping tracking of the quality information in a systematic way, crucial
information will be lost.
On the other hand, without assessing the quality of the output results,
scientists and decision makers will become less confident about the obtained results.
And hence, building any further analysis on low-quality data may not
only lead to wrong decisions, but also result in wasting scientists' efforts, resources, and budgets <cit.>.
It is clear that supporting these types of questions warrants the need for fundamental changes in the underlying DBMS.
In this paper, we propose the “” system,
an advanced query processing engine for imperfect databases with evolving qualities.
We identify three major tasks to be addressed, which are:
§.§ Task 1-Systematic Modeling of Evolving Qualities
With the large scale of modern databases, even a very small percentage of low-quality data may translate to a very large number of low-quality records. This makes it very challenging and time-consuming process to identify, isolate, or fix these records instantaneously. Therefore, the underlying database engine must be able to capture and model the data qualities in a systematic way, and also keep track of their evolution over time, e.g., when and why the quality changes (Refer to the aforementioned Questions 1 & 2).
§.§ Task 2-Quality Propagation and Assessment of Query Results
It is impractical to assume that applications can freeze their working databases until all records have been fixed, and then enable them for querying. It is a continuous process of collecting and generating data of various degrees of qualities—with possible interleaving of offline efforts to verify and fix the imperfect tuples. Therefore, it is unavoidable to query the data while having tuples of different qualities. Hence, the query processing engine must be extended to manipulate not only the data values but also their associated qualities. Each tuple r in the output results should have an inferred and derived quality based on input tuples contributed to r's computation (Refer to the aforementioned Question 3).
§.§ Task 3-Quality-Driven Processing and Curation
Another important type of processing—beyond only propagating and deriving the output's quality—is the ability to query the data based on their qualities, i.e., quality-driven processing.
This includes the ability to, for example, select, join, or order the data tuples based on their qualities, and possibly combine such quality-driven processing with the standard query operators in a single query plan (Refer to the aforementioned Question 4). Another type of analytics is the quality-driven curation in which end-users may want to, for example, track how low-quality tuples affect queries' results, or rank the low-quality tuples according to their participation in queries for investigation and fixing purposes (Refer to the aforementioned Question 5). Enabling this type of quality-driven processing mandates core changes in the database engine.
In this paper, we will focus on the first two tasks (Tasks 1 & 2), while deferring Task 3 to future work.
proposes a full integration of the data's qualities into all layers of a DBMS. This integration includes introducing a new quality model that captures the evolving qualities of each data tuple over time, called a “Quality Trail”,
extending the relational data model to encompass the quality trails, and proposing a new relational algebra, called “QTrail Algebra”, that enables seamless and transparent propagation and derivations of the data's qualities within a query pipeline.
Hence, each output tuple from a complex query plan will be annotated with its derived and inferred quality based on the contributing input tuples. Moreover, we show that extensions do not alter the query optimization rules, and hence the standard optimizers can be still used.
The key contributions of this paper are summarized as follows:
* Proposing the “” system that treats data's qualities as
an integral component within relational databases. In contrast to existing related work, e.g., the offline quality management, and the generic provenance tracking systems, is the first to quantify and model the data's qualities, and fully integrate them within the data processing cycle. (Section <ref>)
* Introducing a new quality model based on the new concept of “quality trails” that captures the evolving quality history of each data tuple over time. The new model enables advanced processing and querying over the quality trails, which is not possible in the traditional single-score quality models. (Section <ref>)
* Proposing a new query algebra, called “QTrail Algebra” that extends the semantics of the standard query operators to manipulate and propagate the quality trails in a pipelined and transparent fashion. Each operator annotates each of its output tuples with a quality trail that is inferred and derived from the contributing input tuples. We also propose new quality-specific operators and integrate them within the other operators. (Section <ref>)
* Studying the viability of leveraging the powerful query optimizers of relational databases into . We prove that under the new QTrail Algebra and by following the propagation semantics of provenance-based techniques, the standard equivalence and transformation rules are still applicable. (Section <ref>)
* Developing the prototype system within the PostgreSQL engine, and evaluating its performance using real-world biological datasets. Given the new value-added features, the results show acceptable overheads of compared to the standard query execution of traditional databases. (Sections <ref> and <ref>)
§ RELATED WORK
Due to its critical importance, data quality has been extensively studied in literature.
The most related to our work are the following.
§.§ Cleaning and Repairing Technique
A main thread of research is on data cleaning, repairing, and cleansing, where potential low-quality data records are identified, and then fixed <cit.>. The underlying techniques in these system vary significantly from fully-automated heuristics-based techniques <cit.>, comparison-based with external sources and repositories <cit.>, and rule-driven techniques <cit.>, to human-in-the-loop mechanisms <cit.>. With the variety of algorithms and techniques for data cleaning, several extensible and generic frameworks have been proposed to integrate these algorithms, e.g., <cit.>. The common theme in all of these systems is that they all work offline and in total isolation from query processing. And since the data is evolving and growing rapidly in all modern applications, the repairing task is a never-ending time-consuming process.
Therefore, it is inevitable that the data will be subject to querying, analysis, and decision making, while it contains low-quality records. Unfortunately, during query processing, none of the above techniques can provide any support for assessing the
quality of the results or enabling quality-aware processing. Even worse, if these techniques have identified potential erroneous records and marked them as pending verification or fixing—which may take long time to complete, there is no mechanism to integrate such observations into query processing.
§.§ Quality Assessment Techniques
On the other hand, very little attention is given to quality assessment at query time. It has beed addressed in the context of mining operations <cit.>, sensor data <cit.>, and relational databases <cit.>. The core of these techniques is based on statistical assumptions about the underlying data, e.g., defining statistical measures such as completeness, soundness, and probability of error. And then, each technique studies its domain-specific operations and how they affect the statistical measures.
A major limitation in these systems is that the assumed statistics may not be available in many applications. For example, the work in <cit.>—which is the most related to —assume that the probability of error in each column in the database is known in advance, which is not the case in many applications. And even if this knowledge is available, it a coarse-grained knowledge over an entire column and not tied to specific tuples, e.g., 1% error rate in column X means that among every 100 values in X, it is expected to find 1 error. Consequently, the estimated output quality is also coarse-grained and cannot be linked to specific tuples. Moreover, these systems assume a single-score quality model without taking into account the fact that data records are long-lived and their qualities evolve over time.
is fundamentally different from the above mentioned two categories in that: (1) It proposes a more rich quality model based on the quality trails instead of the single-score quality model, (2) It does not put any assumptions on the data's characteristics, e.g., estimated error rate, instead the quality trails will be incrementally created and maintained as the database evolves over time, and (3) Its quality model is fully integrated within the query processing engine.
is complementary to the cleaning and repairing techniques in that they together can provide
a more comprehensive solution that combines the online quality-aware query processing, and the offline repairing process, respectively.
§.§ Uncertain and Probabilistic Databases
Another big area of research is focusing on uncertain and probabilistic databases <cit.>. In these systems, a given data value (or an entire tuple) can be uncertain, and hence it is represented by a possible set of values, a probability distribution function over a given range, or a probability of actual presence. In uncertain databases, the query engine is extended to operate on these uncertain values and tuples, and enforce correct semantics (called “possible worlds”).
Although uncertainty is related to data qualities in some sense, these systems are fundamentally different from since the notion of “quality” is not part of these systems. Therefore, the uncertain and probabilistic DBs can neither model or keep track of the data's qualities, nor enable advanced quality-driven query processing as proposed by the system.
§.§ Data Lineage and Provenance
Data provenance is directly related to data quality since the tuples' qualities are certainly based on their provenance. Several systems have addressed the derivation and propagation of the provenance information, e.g., <cit.>, and even some systems such as Trio <cit.> have combined the uncertainty with the provenance.
leverages the thoroughly-studied theoretical foundations and propagation semantics present in the provenance literature. However, there is still a big gap between capturing the raw provenance information, and the stage in which this information translates to quality-based knowledge and analytics. For example,
* Provenance systems can report the roots of each output tuple r—which may include 100s of other tuples' Ids—but they cannot inform scientists whether or not the results are of high quality and worthy of being used in further analysis. Currently, obtaining this knowledge involves a tremendous unrealistic manual effort if at all possible.
* Provenance systems do not provide quantifiable measures on which queries can interact, i.e., lineage information are usually opaque objects with no easy way to apply conditions or transformations on. And
* Provenance systems do not capture the history (or evolution) of the data tuples, and thus executing the same query Q at times t_1 and t_2 would return the same provenance information even if some changes between t_1 and t_2 have altered the records' qualities without changing their content, e.g., curation information is added that increase the virtue of the records.
addresses these issues and fills in this gap.
§ QTRAIL-DB DATA & QUALITY MODELS
has an extended data model, where each data tuple carries—in addition to its data values—a “quality trail”
encoding the evolving quality of this tuple. More formally, for a given relation R having n data attributes,
each data tuple r ∈ R has the schema of: r = ⟨ v_1, v_2, ..., v_n, 𝒬_r⟩, where v_1, v_2, ..., v_n are the data values of r, and 𝒬_r is r's quality trail. 𝒬_r is a vector in the form of 𝒬_r = ⟨ q_1, q_2, ..., q_z ⟩, where each point q_i is a quality transition defined as follows.
A quality transition represents a change in a tuple's quality and it
consists of a 4-ary vector ⟨score, timestamp, triggeringEvent, statistics⟩, where “score” is a quality score ranging between 1 (the lowest quality) and MaxQuality (the highest quality), “timestamp” is the time at which the score becomes applicable, “triggeringEvent” is a text field describing the event that triggered this quality transition, and “statistics” field contains various statistics that will be maintained and updated during query processing.Only “score”, and “timestamp” are mandatory fields, while “triggeringEvent”, and “statistics” are optional fields.
Since r's quality is evolving over time, the length of 𝒬_r's vector is also increasing over
time by the addition of new transitions (Refer to Figure <ref>). The quality trail is formally defined as follows.
A quality trail of a given tuple r ∈ R is denoted as 𝒬_r and is represented as a vector of quality transitions. The transitions in 𝒬_r are chronologically ordered, i.e., 𝒬_r[i].timestamp < 𝒬_r[i+1].timestamp ∀ i. Moreover, the quality transitins have a stepwise changing pattern,
i.e., 𝒬_r[i] is the valid transition over the time period [𝒬_r[i].timestamp, 𝒬_r[i+1].timestamp).
Referring to the data tuple r from Figure <ref>, its corresponding quality trail is depicted in Figure <ref>. With each of the actions highlighted in Figure <ref>, r's quality trail will change (evolve) from the L.H.S (the insertion time) to the R.H.S (the current time). Each point in the quality trail is a quality transition. For example, at time t_4, a new quality transition is added to the trail consisting of: ⟨ 4, t_4, “updating a wrong value", {...}⟩. This transition remains valid (the most recent one) until time t_5 when a new transition is added. The statistics field and its usage will be discussed in more detail in Section <ref>.
§ QUALITY PROPAGATION AND ASSESSMENT OF QUERY RESULTS
In this section, we present the extended query processing engine of for propagating the quality trails within a query plan. To enable such derivation and propagation in a transparent and pipelined way, we propose a new SQL algebra, called “QTrail Algebra", in which the standard query operators have been extended to seamlessly manipulate the quality trails associated with each tuple. In , each operator will consume and produce tuples conforming to the data model presented in Section <ref>. In this section, we assume the quality trails have been created and maintained (The focus of Section <ref>), and thus we will focus now on the query-time propagation.
Fortunately, in the provenance literature, the propagation semantics of the tuples' lineage is a well studied problem under the
different operators. In specific, we use the same semantics as in the Trio system <cit.>. Therefore, after each algebraic transformation, we can track the input tuples contributing to a specific output tuple without the need for re-inventing the wheel. Yet, the unsolved challenge is how to translate this knowledge to derivations over the quality trails? For example, assume that two tuples r_1 and r_2 will join together to produce an output tuple r_o, and from the existing literature, it is established that both r_1 and r_2 form the lineage of r_o. The remaining question is that given the quality trails of r_1 and r_2, what will be the derived quality trail of r_o? In the following, we study the semantics of deriving the quality trails of each output record from its contributing input records.
§.§ Selection Operator (σ_p(R))
The operator applies data-based selection predicates p over relation R, and reports the qualifying tuples. Predicates p reference only the data values v_1, v_2, ..., v_n within the tuples. The extension to the selection operator is straightforward since the content of the qualifying tuples do not change, and thus the output quality trails remain unchanged. The algebraic expression is:
σ_p(R) = {r = ⟨ v_1, v_2, ..., v_n, 𝒬_r⟩∈ R | p(r) = True }
§.§ Projection Operator π_a_1, a_2, ..., a_n(R)
In , the quality trails are at the tuple level, and not tied to specific attribute(s) within the tuple. Therefore, the projection operator will not change the quality of its input tuples.
That is:
π_a_1, a_2, ..., a_n(R) = {r' = ⟨ a_1, a_2, ..., a_n, 𝒬_r⟩} ∀ r ∈ R.
§.§ Merge Operator (Ω(𝒬_1, 𝒬_2, ...))
Several of the relational operators, e.g., join, grouping, aggregation, among others, involve merging (or combining) multiple input tuples together to form one output tuple. Therefore, the corresponding input quality trails may also need to be merged and combined together. To perform this merge operation over quality trails, we introduce the new Merge operator Ω(𝒬_1, 𝒬_2, ...). This operator is not a physical operator, instead it is a logical operator that executes within other physical operators, e.g., join, grouping, and duplicate elimination.
The Merge operator's logic is presented in Figure <ref>, and its functionality is illustrated using the example in Figure <ref>. Assume combining three tuples r_1, r_2, and r_3 having quality trails 𝒬_r1, 𝒬_r2, and 𝒬_r3, respectively. All quality trails are typically aligned from the R.H.S (which is the query time Q_t), i.e., each quality trial must have a valid transition at time Q_t. However, the trails are not necessarily aligned from the L.H.S since the data tuples may be inserted into the database at different times (See Figure <ref>). The quality trail of the output tuple 𝒬_o is derived using a sweep line algorithm over the input quality trails starting from left to right and jumping over the transition points as illustrated in Figure <ref> (Lines 1-3 in Figure <ref>). The basic idea behind the algorithm is that the quality of the output tuple at any given point in time t should be the lowest among the qualities of the contributing tuples at time t. This is based on the intuition that low-quality inputs produce low-quality outputs, and that an output tuple should have a high quality at time t only if all its contributing input tuples have high qualities at t.
Referring to the example in Figure <ref>, the sweep line starts at Position 1, where only 𝒬_r1 exists and has a quality level 4-star, which will be produced in the output. The line then jumps to Position 2, where 𝒬_r3 starts participating with a quality level 3-star, and hence a 3-star transition will be added to 𝒬_o. The sweep line keeps moving to the subsequent positions, and at each position, it calculates the lowest quality score among the input participants to be the output's quality score at this position (Lines 5-7 in Figure <ref>). For example, referring to the example in Figure <ref>(a), at time t_4, the contributing input qualities from 𝒬_r1, 𝒬_r2, and 𝒬_r3, are 2-star, 3-star, and 5-star, and thus the corresponding quality transition on 𝒬_o will have a 2-star score.
Although 𝒬_o's quality scores reflect only the lowest score among the input values, the statistics field associated with each quality transition is intended to provide deeper insights on the other values contributing to the score. Initially, the statistics associated with each quality transition, e.g., Min, Max, Avg, are set to the transition's score value as illustrated in Figure <ref>. And then, as the transitions get merged, new statistics are computed and get attached to the new quality transition. For example, the sweep line at Position 6 encounters scores 4-star, 2-star, and 1-star transitions along with their initial statistics. Notice that 𝒬_r2's active transition at Position 6 is still the 2-star transition occurred at Position 5 (at time t_5). These statistics will be combined by the Merge operator to compute the new statistics of the 𝒬_o's new transition (Line 8 in Figure <ref>). The example illustrates maintaining the Min, Max, and Avg statistics. However, in general, any type of aggregates that can be incrementally computed under the addition of new values, e.g., aggregates that are algebraic, e.g., Avg() and Stddev(), or distributive under insertion, e.g., Sum(), Count(), Min(), Max() can be supported <cit.>[Algebraic aggregates are those that need small or constant extra storage in order to be computed incrementally. Distributive-under-insertion aggregates are those that can be incrementally computed without extra storage when new data is added.].
Finally, the newly created transition is added to the output quality trail (Line 10 in Figure <ref>).
§.§ Theta Join Operator (R _p S)
Given two tuples r ∈ R and s ∈ S having quality trails 𝒬_r, and 𝒬_s, respectively. If r and s qualify for the data-based join predicate p and produce a joint tuple z, then z will inherit the merged qualities of its two components r and s. The same intuition of the Merge operator applies where z's quality at any given point in time t should be the lowest among the contribution tuples. The algebraic expression is:
R _p S = {⟨ r.v_1, ..., r.v_n, s.v'_1, ..., s.v'_m, Ω(𝒬_r, 𝒬_s) ⟩ |
r ∈ R, s ∈ S, and p(r, s) = True }
The Cartesian Product (R X S) and Natural Join (R S) operators follow the same algebraic expression as the Theta Join operator. The only difference is that p is True for the Cartesian Product operator, whereas p consists of equality predicates on the common attributes for the Natural Join operator.
The Outer Join operators (Left, Right, and Full outer joins) are direct extensions to the above-mentioned inner join operators. Without loss of generality, assume a tuple r ∈ R will be in the output without a counterpart joining tuple from S, i.e., S's values will be nulls, then r will inherit its own quality trail. That is, r's corresponding output tuple will be:
{⟨ r.v_1, ..., r.v_n, null, ...,null, 𝒬_r⟩}, ∀ r ∈ R, ∄ s ∈ S | p(r, s) = True
§.§ Grouping and Aggregation (γ_a_1, a_2, ..., a_m, F_1(β_1), ...F_z(β_z)(R))
Grouping and aggregation are among the most interesting and challenging operators in . A key challenge lies in that in order to accurately infer the qualities of the output tuples, we need to keep track of the actual tuples participating in the aggregation. For example, for some aggregation functions only few tuples within each group influence the output values. Referring to Figure <ref>, assume that we group tuples r_1, r_2, and r_3 based on column β and aggregate over column α. The three illustrated queries in Figure <ref>(a) compute different aggregation functions, i.e., Sum(), Max(), and { Min() & Max()}, respectively. Clearly, for the Sum() function all of the tuples r_1, r_2, and r_3 have contributed to the output tuple.In contrast, for the Max() function, only r_1 contributed to the output, while in Query 3 computing both the Min() and Max(), both r_1, and r_3 have contributed to the output.
In , we support two semantics, which are the coarse-grained provenance-based semantics, and a new fine-grained semantics. In the coarse-grained semantics the aggregation functions are treated as black boxes, and hence all tuples within each group are assumed to participate in generating the output (black-box aggregation-unaware approach). In this case, all corresponding quality trails within each group will be merged together to derive the output's quality. This is the approach used in provenance-tracking Trio system <cit.>. Although straightforward, this semantics is coarse grained and pessimistic, and may lead to under estimating the outputs' qualities unnecessarily. Recall that, according to the Merge operator, as more quality trails are merged, the derived quality may only decrease and can never increase. As these pessimistic derivations accumulate within a query plan, the final results may become useless and cannot be trusted because of its imprecisely-derived low quality.
implements supports also another open-box aggregation-aware semantics that identifies the minimal set of input tuples affecting the produced aggregation, and only those tuples are used to derive the output's quality. For example, as illustrated in Figure <ref>(a), the different queries will produce different associated quality trails depending on the involved aggregation function, e.g., in Query 2, the output tuple has an assigned 𝒬_r1 quality trail since only tuple r1 was involved. The merit of this semantics lies in avoiding unnecessary degradation of the output's qualities, and thus increasing the worthiness and usage of the produced results. However, implementing the open-box semantics requires extending the communication mechanism between the aggregation functions and the grouping operator as described next.
In general, any aggregation function in —which relies on PostgreSQL DBMS <cit.>—has three basic methods, i.e., Initialize(), Iterative(), and Finalize() (See Figure <ref>(b)). The Initialize() function executes once before streaming the input records, Iterative() is called for each input record to update the aggregator's internal state, and Finalize() executes once after all tuples have been processed to finalize the aggregator's output value. The proposed extension involves maintaining a character array, called contributionArray, by each aggregator function. And then, for each input tuple and based on the aggregator's semantics, the function decides on whether the tuple: (1) Certainly contributes to the output, i.e., adding “+” to the array, (2) Certainly does not contribute to the output, i.e., adding “-” to the array, or (3) The tuple is in-doubt and it is not clear yet, i.e., adding “?” to the array (See the R.H.S Iterative() method in Figure <ref>(b)). In addition to accumulating each tuple's status in the contributionArray, this status is also returned to the grouping operator for an incremental update as we will discuss in sequel. Finally, the Finalize() method will return the contributionArray to the grouping operator as illustrated in the figure.
While the aggregator function is manipulating the contributionArray, enforces two invariants that the grouping operator will depend on to ensure correctness, which are (1) The “+” and “-” values are permanent and cannot be altered, and (2) By the time of returning the contributionArray from the aggregator's Finalize() function, the array must not have any in-doubt tuples, i.e., any “?” entires must be converted to either “+” or “-”. This is logical since the execution of the Finalize() method means that the aggregator has seen all its input tuples and knows exactly the ones actually contributed to the output.
The grouping operator on the other hand—which may call multiple aggregation functions within a single query—maintains a global state across the different aggregation functions (See L.H.S of Figure <ref>(b)). More specifically, the operator maintains a character array, called globalArray_G for each constructed group G. And then, for a given input tuple r belonging to G, if all aggregation functions return a “-” status, then r's quality trail 𝒬_r is immediately purged and “-” will be augmented to globalArray_G. This is because r is certainly not contributing to G's output. In contrast, if any aggregation function returns a “+” status, then 𝒬_r is immediately merged into the quality trail of G's output 𝒬_G. Otherwise, r's status is not decided yet, and hence a “?” will be augmented to globalArray_G and 𝒬_r will be buffered by the grouping operator (See the Grouping operator's Iterative method in Figure <ref>(b)). Finally, in the operator's Finalize() method, after all aggregation functions complete their work, the grouping operator will check the final status of the in-doubt tuples, say r. If any aggregation function alters its “?” status to “+”, then the r's quality trail will be retrieved from the buffer and merged into 𝒬_G, otherwise r's quality trail will be dropped.
The proposed extension of the grouping operator is internal to the database system and entirely transparent to the outside world. For the aggregation functions, we have extended the built-in functions, e.g., Min(), Max(), and Avg(), to implement the new semantics. For new user-defined aggregation functions, the DB developer needs to implement the manipulation of the contributionArray according to the function's semantics. In most aggregation functions that we have extended, this manipulation requires minimal effort, e.g., less than 10 additional lines of code. In return, the effect on the accuracy of the inferred qualities can be significant [In the worst case, an aggregation function may blindly return “+” for each input, which will revert back to the black-box semantics.].
§.§ Grouping Under Memory Constraints
As presented in Figure <ref>(b), the grouping operator may buffer the quality trail 𝒬_r into memory if r's status is not decided yet (The last two lines of the Iterative() method). However, for scalability, the grouping operator must be able to operate under limited memory, e.g., a memory buffer of max size M, without crashing. To achieve this and to avoid frequent writes to disk, which slows down the processing, we deploy an algorithm called “BufferClean()”. This algorithm is executed by the grouping operator when the allotted memory buffer is full. The functionality of BufferClean() is simple and involves retrieving the up-to-date contributionArray from the aggregation functions with the hope that the status of some of the buffered tuples has changed to either “+” or “-”. In such case, their quality trails can be taken out from the buffer. In the worst case, if BufferClean() did not free up some space, then the memory buffer is written to disk, and will be later retrieved when the Finalize() method is called Interestingly, the BufferClean() algorithm can be very effective in many cases, and entirely avoids the need to write to disk because several of the common aggregation functions that may require buffering, e.g., Min(), and Max(), may start discarding previous candidates as they see few more tuples (See the experiments in Section <ref>).
§.§ Set Operators
The semantics of the set operators ∩, ∪, and - is extended in the same way as the other operators, i.e., if an output tuple is coming from both relations, then it will inherit the merged quality trails of the contributing input tuples. Otherwise, the output tuple is coming from only one relation, and hence it will carry its own quality trail.The extended algebraic expressions of the set operators are defined as:
R ∩ S = {⟨ z.v_1, ..., z.v_n, Ω(𝒬_R.z, 𝒬_S.z) ⟩ | z ∈ R & z ∈ S}
R - S = {⟨ r.v_1, ..., r.v_n, 𝒬_r⟩ | r ∈ R & r ∉ S}
R ∪ S = { z | z ={[ ⟨ z.v_1, ..., z.v_n, Ω(𝒬_R.z,𝒬_S.z)⟩ if C_1; ⟨ z.v_1, ..., z.v_n, 𝒬_z⟩ if C_2 ]}
where
C_1 = (z ∈ R & z ∈ S), and C_2 = (z ∈ R xor z ∈ S)
§.§ Duplicate Elimination δ(R)
This operator involves eliminating duplicate tuples and keeping only one copy. In , two tuples r = ⟨ v_1, v_2, ..., v_n, 𝒬_r⟩ and s = ⟨ z_1, z_2, ...., z_n, 𝒬_s⟩ are considered identical iff they are identical in the data part, i.e., r.v_i = s.z_i, 1 ≤ i ≤ n. For each group G of identical tuples, the quality trail of G's output tuple is derived by merging the quality trails of G's input tuples.
§ QUERY OPTIMIZATION IN
A key advantage of building upon the propagation semantics in provenance literature such as the Trio system <cit.>, i.e., the input tuples contributing to the quality of an output tuple o are those that are considered o's lineage, is the retention of the equivalence and optimization rules in relational databases. However, such retention cannot be directly claimed because some of the operators apply a complex merge function over the quality trails (See the Merge operator Ω in Section <ref>).
Therefore, it is important to study the properties of this Merge operator,
based on which we can prove other algebraic properties.
The Merge operator has the following two properties:
Commutativity: Ω(𝒬_1, 𝒬_2) = Ω(𝒬_2, 𝒬_1)
Associativity: Ω(Ω(𝒬_1, 𝒬_2), 𝒬_3) =
Ω(𝒬_1, Ω(𝒬_2, 𝒬_3))
=Ω(𝒬_1, 𝒬_2, 𝒬_3)
Sketch of Proof:
The proof of Commutativity is straightforward since
the computation of each new transition (Lines 5-9 in Figure <ref>)
are not sensitive to the order of the input quality trails, e.g., 𝒬_1 and 𝒬_2.
The Min() and StatsCombine() functions in Lines 6 and 8, respectively, treat their input values as a set,
and hence the order does not matter.
The proof of Associativity relies on that the primitive operations that generate each new transition from the input ones
are themselves associative. That is, the Min() function in Line 6 is associative, and also
StatsCombine() function, which combines the underlying statistics, involves associative functions.
Recall that the statistics need to be either algebraic (E.g., AVG and STDEV), or
distributive under insertion (E.g., SUM, COUNT, MIN, MAX), and all of these functions are associative.
Based on Lemma <ref>, we prove in the following theorem that
the 's operators are order insensitive as it is the case in the standard relational operators.
Each operator in is guaranteed to generate the same quality-annotated output tuples independent of the inputs' order.
Sketch of Proof: The standard relational operators are all order-insensitive as they execute under the Set or Bag semantics. And hence, they produce the same output independent of the inputs' order. The extended counterpart operators in can be categorized into three categories: (1) Operators that do not apply any manipulation over the quality trails, e.g., σ, π, and -, (2) Operators that apply the Merge operator to combine the quality trails, e.g., , γ, ∩, and δ, and (3) Operators that fit in the two aforementioned cases, e.g., outer joins, and ∪. The operators in the 1^st category, by default, retain the order-insensitive property. The operators in the 2^nd, and 3^rd categories are also guaranteed to infer the same quality for each output tuple independent of the inputs' order according to Lemma <ref>. Therefore, Theorem <ref> is guaranteed to hold.
Theorem <ref> is important as it guarantees the consistency of each operator's output independent of the inputs' order.
One direct application of Theorem <ref> is proving that the grouping operator
will produce output tuples having the same inferred qualities
despite the possible buffering of some quality trails until the
end of the operator's execution (See the Iterative() function inside the grouping operator in Figure <ref>).
§ CREATION & MAINTENANCE OF QUALITY TRAILS
In this section, we present the creation and maintenance mechanisms of the quality trails.
Since is a generic engine, the goal is to design a set of APIs that will act as the interface between and
the external world, e.g., the tools and applications' logics that can assess the quality scores and pass them to .
More specifically, allows the database developers to manipulate the
quality trails as any other attribute in the database, e.g., modifying and extending quality trails
in response to specific changes in the database from within the standard database triggers and UDFs.
The quality trails are designed as special attributes added to the database relations, i.e., each
relation R has an automatically-added special attribute called “QTrail”.
QTrail attribute is of a newly added user-defined type representing an
array of quality transitions (Refer to Definitions <ref>, and <ref>).
On top of this new type, a set of manipulation functions has been developed
as presented in Figure <ref>. These built-in functions are by no means comprehensive,
but they are basic functions on top of which
the database developers may create more semantic-rich functions.
In Figure <ref>, we present few of the developed functions.
For example, assuming a given quality trail r.QTrail, the
getQualityTrail() function returns the quality trail as an array of quality transitions,
while getSize() function returns the number of transitions in the quality tail.
The functions addTransition() and replaceTransition() can be used to
alter an exiting quality trail by adding a new transition, or by modifying and replacing an existing transition, respectively.
These functions internally double check that the timestamps of the transitions should be always monotonically increasing,
otherwise the modification will be rejected.
The trim() function enables trimming a given quality trail according to some
criteria, e.g., by specifying a direction (L.H.S or R.H.S), and a number of
transitions to keep. has several different signatures for the trim() function.
This function is useful, especially if an application prefers not to keep the entire
history of the quality trail—which can be large, and
instead limit the scope to specific number of transitions or until specific time in the past.
In addition to these functions, we have also developed a set of function to manipulate
a given quality transition, e.g., building a quality transition, and setting or retrieving specific fields within a transition[Other storage schemes are possible without affecting
the core functionalities of . Only the implementation of the APIs may change.].
It is important to highlight that the tuples' quality trails are
exposed as normal attributes only for the maintenance and update purposes.
The objective from this feature is to make a generic engine with broader applicability to a wide range of application.
However, this is entirely orthogonal to the quality propagation and assessment proposed
in Section <ref>.
First, quality propagation does not require explicit querying
of the quality trails, i.e., users' queries will be written in the standard way as
in Example 1 in Section <ref>, and the quality trails will automatically propagate along with queries' results.
And second, the propagation semantics is too complex to be delegated to end-users and
to be encoded in each query. That is why automatically and transparently
manage the propagation semantics.
§ EXPERIMENTS
Setup:
is implemented within the PostgreSQL DBMS <cit.>. A Quality Trail is modeled as a
new data type, i.e., a dynamic array of quality transitions.
The default storage scheme is called “QTrail-Scheme”, in which
each of the users' relations is automatically augmented with
a new “QTrail” column as presented in Section <ref>.
is experimentally evaluated using an AMD Opteron Quadputer compute server with two 16-core
AMD CPUs, 128GB memory, and 2 TBs SATA hard drive.
is compared with the plain PostgreSQL DBMS to
study the overheads associated with the new functionalities (w.r.t both time and storage).
No other work in literature offer functionaries similar to to compare with,
especially that the work in <cit.> has not been experimentally evaluated.
§.§ Application Datasets
We use a subset of the curated UniProt real-world biological database <cit.>. UniProt offers a
comprehensive repository for protein and functional information for various species.
We extracted four main tables including Protein, Gene, Publication, and Comment.
The tables are connected through the following relationships: The Protein table
has a many-to-one relationship with Gene, many-to-many relationship with Publication, and one-to-many relationship with Comment.
The Gene table has also a many-to-many relationship with Publication, and one-to-many relationship with Comment.
The Comment table contains free-text comments and notes related to the genes and proteins.
These comments are extracted from the fields marked with “CC" within the UniProt entires—which indicates a free-text comment field.
Our dataset consists of approximately 750,000 protein records (≈ 4.7GBs), 1.3 x 10^6 gene records (≈ 8GBs),
12 x 10^6 publication records (≈ 4.5GBs), and 8 x 10^6 comment records (≈ 6.5GBs).
Thus, the total size of the dataset is approximately 24GBs.
§.§ Workload
We focus on tracking the qualities of the tuples in the Gene and Protein tables under the addition of new publications and comments.
The quality score varies between 1 (the lowest quality), and 10 (the highest quality).
To build the quality trails, we implemented an “After Insert" database trigger on each of the Publication and Comment tables
such that with the insertion of a new publication or comment, the quality of the corresponding gene or protein will be updated.
We assume that the insertion of a new publication increases the
quality (unless the quality score is already the maximum, in which case the new quality transition will have the same score as the previous one).
For the comment values, each comment in UniProt has a code indicating the type of this comment. One
of these types is “CAUTION”, which indicates a possible error or confusion in the data.
All comments having the “CAUTION” type are assumed to decrease the quality
(unless the quality score is already the minimum, in which case the new quality transition will have the same score as the previous one).
For the other comment values, we randomly labeled each one as “+”, “-”, or “∼”, which
indicates increasing, decreasing, or retaining the previous quality score,
respectively [We used random labeling since developing a free-text semantic extraction tool (or leveraging an existing tool) is not the focus of this paper.].
Unless otherwise is specified, we assume the following:
(1) Each increase or decrease in the quality score is performed one step at a time, i.e., ± 1,
and (2) If a quality transition is storing statistics—Referred to as “Full Transitions”— then three types of statistics are maintained,
which are the {Min, Max, Avg = (Sum, Count)}.
The insertions of the publication and comment records are randomly interleaved because the
database does not maintain a global timestamp ordering the records' creation.
When evaluating the query performance of , we compare against the standard query processing
in which the quality trails are not even stored in the database.
Finally, the query optimizer of PostgreSQL has not been touched or modified, and hence the queries
used in the evaluation are optimized in the standard way.
§.§ Storage and Maintenance Evaluation
In Figure <ref>, we study the storage overhead introduced by the quality trails.
To put the comparison into perspective, we compare “QTrail-Scheme" with another alternative
where the quality trails of a given table R are stored in a separate table R-QTrail (OID, QTrail)
that has one-to-one relationship with R. This scheme is referred to as “Off-Table Scheme".
We study the storage overheads under the two
cases of: (1) Full Transitions, where each quality transition has content in all its fields; the mandatory ones (score, and timestamp),
and optional ones (triggeringEvent, and statistics) (Figure <ref>(a)).
In this case, the triggeringEvent field is a string of length varying between 50 and 100 bytes.
And (2) Minimal Transitions, where each quality transition has content in only the mandatory fields (Figure <ref>(b)).
In each of the two figures, we measure the overhead under different constraints on the maximum size of a quality trail (the x-axis).
The values Limit-5, Limit-10, and Unlimited indicate keeping only up to the last 5, 10, or ∞ transitions.
The y-axis shows the absolute storage overhead, while the percentages inside the rectangle boxes show the overhead—more specifically that of the QTrail-Scheme—as
a percentage of the sum of Gene and Protein sizes (≈ 12.7GBs).
As Figures <ref>(a) and <ref>(b) show, there is no big difference between both storage schemes in all cases.
The Off-Table scheme is slightly higher because of the storage of the unique tuple Id values (OID column).
In general, the quality trails do not introduce much storage overhead even under the worst case where the entire quality history is stored, e.g.,
the overhead is around 18% (for Full Transitions), and 3.7% (for Minimal Transitions).
It is worth highlighting that under the Unlimited case, the longest quality trail consisted on 37 transitions.
In Figure <ref>, we study the maintenance overhead of the quality trails.
We consider the Unlimited case of quality trails.
To have fair comparison, we measure the time of updating a quality trail, e.g., adding new transitions,
w.r.t the time of updating other traditional fields, e.g., updating a text or integer fields.
In all cases, the update operation takes place from within an After Insert trigger over the Comment table as
described in the experimental workload above. Inside the trigger, the corresponding gene is retrieved to update its data or its quality trail (See Example 2 in Section <ref>).
The retrieval from the DB uses a B-Tree index on the Gene.ID column.
Each operation is repeated 20 times, and their average is what we report.
As illustrated in Figure <ref>, we use the operation of updating a string field, more
specifically replacing a segment of Gene.Seq field with another segment, as our reference operation. That is,
its execution time is normalized to value 1, and the other operations will be measured relative to this operation.
The relative performance of updating an integer field, more specifically Gene.StartPos, it also depicted in the figure.
On average, the overhead of updating the integer field is around 94% of updating the string field.
For updating the quality trails, we consider both the QTrail-Scheme, and the Off-Table Scheme,
and the two cases of Full Transition, and Minimal Transition. For each case,
we run a batch that consists of 20 transactions inserting records into
the Comment table, which yield to updating the genes' quality trails.
On the x-axis, we report the average performance over the entire batch under two scenarios:
(1) The batch is the 1^st, i.e., all quality trails are empty, and (2) The batch is the Last, where all other records have been
inserted and the quality trails are almost complete.
The results in Figure <ref> show that operating on and updating a quality trail structure is very comparable to updating other database fields.
Under the QTrail-Scheme, where the table to be queried and update is the Gene table,
the relative overhead ranged from 0.98% (The 1^st batch with minimal transitions) to 1.11% (The last batch with full transitions).
The performance of the Off-Table Scheme, where the table to be queried and updated is called Gene-QTrail,
is almost the same except for the 1^st batch case, where the Gene-QTrail table is empty.
§.§ SSP Query Performance
In the next experiments, we evaluate the propagation and derivation of the quality trails at query time under various types of queries.
In Figure <ref>, we present the performance of Select-Project (SP) queries. The query templates are presented in Figure <ref>(c).
On the x-axis of Figures <ref>(a) and <ref>(b), we vary the query selectivity from 0.01% (corresponds to 75 protein tuples, or 130 gene tuples)
to 0.5% (corresponds to 3,750 protein tuples, or 6,500 gene tuples), and consider the two storage schemes QTrail-Scheme and Off-Table Scheme.
The y-axis measures the propagation overhead of the quality trails w.r.t the standard query
performance, i.e., no quality trail storage or propagation.
We consider the propagation of the quality trails under the max size constraints of Limit-5, Limit-10, and Unlimited.
Under each configuration, we execute 5 queries on each of the Gene and Protein tables, and then report the average of the
observed overheads across the 10 queries.
Figures <ref>(a) and <ref>(b) show the results under the cases
where the queries are executed without and with an index, respectively.
The results show a big difference between the QTrail-Scheme and the Off-Table Scheme.
This is mainly because the two operators that directly read from disk, i.e., the table-scan and index-scan operators,
have different implementation under the two storage schemes. In the QTrail-Scheme, they are implemented such
that they read the quality trails from the data tuples without any additional overhead. Whereas in the Off-Table Scheme,
they are implemented to join the data tuples with the other table that contains the quality trails.
All the other operators are independent of the physical storage of the quality trails as they read them from the operators' buffers in the query pipeline.
Since join is an expensive operation, the Off-Table Scheme encounters higher overhead.
In Figure <ref>(a), the query selectivity does not play a big factor because a complete table scan
is performed regardless of the selectivity, which dominates most of the cost.
In contrast, in Figure <ref>(b), an index is used to select the data tuples satisfying
the query's predicates, and thus the performance is more sensitive to the
query selectivity.
For the ff-Table Scheme, the overhead increases as the selectivity increases—and consequently the join cost increases.
As the figure shows the Off-Table Scheme encounters between 2.5x and 6x higher overhead compared to the
QTrail-Scheme.
It is important to highlight that the select and project operators do not apply any manipulation over the quality trails, and thus the encountered
overheads are mostly due to the additional storage introduced by the quality trails.
§.§ Join Query Performance
In Figure <ref>, we measure the performance of join queries.
We consider joining the Gene and Protein tables using the query syntax highlighted in Figure <ref>(c).
Before the join operation, a selection predicated is applied over the Gene table, and
the selectivity of this predicates is varied between 0.01% to 0.5% as depicted on the x-axis of Figures <ref>(a), and <ref>(b).
The query is evaluated under two different query plans representing two different join types, i.e.,
in Plan 1 the join operator uses an index on the the gene Ids stored in the Protein table (Protein.GID),
whereas in Plan 2 such index does not exist, and thus the join is performed using block-based nested-loop algorithm.
In Figure <ref>, we only report the results of the Full Transition case as
the results of the Minimal Transition case exhibit similar trends, but with smaller overhead percentages.
In Figure <ref>(a), since both the selection and join operations are utilizing indexes, the quality trails' extra storage
does not contribute much to the execution time overhead.
That is why there is no big difference in performance under the different maximum sizes of
quality trails (Limit-5, Limit-10, and Unlimited).
In the case of the QTrail-Scheme, the execution
overhead is mostly contributed to the merge operations applied over the quality trails within the join operator.
Whereas, the Off-Table Scheme encounters the same overhead from the merge operations plus
the additional join needed to link the data tuples to their quality trails, which is implicitly performed inside
the index-scan over both tables. This join overhead is clearly dominating the merge operations' overhead.
On the other hand, the performance results in Figure <ref>(b) are mostly not sensitive to the
query's selectivity. This is because a full-table scan over the Protein table will be performed in all cases,
which dominates the overhead. That is also the reason why the Unlimited case shows
a clear higher overhead compared to the Limit-5 and Limit-10 cases, i.e., the difference in I/Os
becomes a distinguishing factor among the three cases.
§.§ Aggregation Query Performance
For the grouping queries, the type of the aggregation function(s) plays an important role.
This is because some aggregation functions, e.g., COUNT, SUM, AVG, do not require any buffering for the input quality trails,
while other functions, e.g., MIN, and MAX, will most probably require buffering.
In Figure <ref>, we study the aggregation performance under these two types of aggregators (Figure <ref>(c)).
Query Q1 involves one function COUNT(), which always returns “+” for each input tuple, and hence the quality trails are incrementally merged.
In contrast, Query Q2 involves two functions MIN() and MAX(), and each may return “-” if the tuple is certainly not contributing to the function's result,
or “?” if the tuple may contribute. Since the minimum and maximum values cannot be determined until the last tuple is seen, then the quality trails of the
in-doubt tuples will need to be buffered. In our implementation of the MIN() (or MAX()) functions, if multiple tuples have the same
minimum (or maximum) value, then they all contributing to the output result.
In this set of experiments, we will focus only on the QTrail-Scheme since it has proven superiority over the Off-Table Scheme.
The results in Figure <ref>(a) show that changing the maximum buffer size (the x-axis) has no effect on the performance since COUNT(*) does not require buffering.
Nevertheless, the transition size (either Full or Minimal) and the maximum
allowed size of a quality trail (either Limit-5, Limit-10, or Unlimited), are both affecting the performance.
This is because the grouping query requires a full table scan, and thus as the storage overhead of the quality trails increases, the execution time also increases.
The storage overhead also plays the same effect in Figure <ref>(b). However, Q2 does buffering, and thus the allowed buffer size affects the performance.
As presented in Section <ref>, when the buffer is full, the grouping operator will execute the BufferClean() function trying to avoid un-necessary disk-writes, and
get rid of the in-doubt tuples (“?” ) that have changed their status to not-contributing (“-”).
Figure <ref>(b) shows the number of BufferClean() calls in each case.
For example, for the minimal-size transitions with 8MBs buffer size, only two BufferClean() calls are
executed for the Unlimited case, and zero calls for the Limit-5 and Limit-10 cases.
For this experiment, these BufferClean() calls are very effective since the in-doubt tuples can be resolved fast as more tuples are seen, and thus no disk writes are
required even under the smallest buffer size of 2MBs. Therefore, depending on the different configurations, the relative execution overhead (w.r.t the standard query)
varies between 8% and 31% as illustrated in the figure.
In some aggregation function, the execution of BufferClean() may not be always effective, and thus the grouping operator will need to write the buffer's content to disk.
To study such effect, in Figure <ref>, we repeat the same experiment of Query Q2 reported in Figure <ref>(b), but in this case we disable the
BufferClean() function. And hence, the grouping operator has to write the buffer to disk when full.
The results in Figure <ref> confirm the same trend as the other experiment
with the exception of having a higher execution overhead (between 0% in the best case to 6.5% in the worst case).
It is worth mentioning that if an aggregation function requires extensive buffering for the quality trails, e.g., the MEDIAN() function would buffer all its input quality trails,
then most probably this function would also require extensive buffering of the data
values. In this case and for performance considerations, these functions can easily implement the
coarse-grained semantics, i.e., returning “+” for each input tuple, and hence no quality trail buffering is needed.
To illustrate the benefits from implementing the open-box aggregation-aware quality derivation for the grouping and aggregation operators,
we repeat the aggregation query Q2 under the black-box aggregation-unaware implementation, i.e., all input tuples within a group
contribute to the output's quality of the Min() and Max() functions (Figure <ref>).
We randomly sampled 200 tuples from the query's output, and report in Figure <ref>,
the quality score of the most recent transition for these tuples (in a sorted order).
The results confirm that the black-box approach can severely and unnecessarily under estimate the tuples' qualities.
For example, in the open-box approach, most tuples have quality scores higher than 6.
Whereas, in the black-box approach, most tuples have the lowest quality score of 1.
§ CONCLUSION
We proposed as an advanced query processing engine for imperfect databases with evolving qualities.
At the conceptual level, enables high-level applications to
model their data's qualities inside the database system, keep track of how the qualities evolve over time,
and build more informed decisions based on the automatically quality-annotated query results.
At the technical level, involves several novel contributions including:
(1) Introducing a new quality model based on the new concept of “quality trails” in contrast to the commonly-used single-score quality model,
(2) Extending the relational data model to include the quality trails,
(3) Proposing a new query algebra, called “QTrail Algebra”, which extends the standard query operators as well as
introduces new quality-related operators for the propagation and derivation of quality trails at query time,
and (4) Proving that 's query optimizer can inherit and leverage the logic of the standard query optimizers
without the need for customized optimizers.
The experimental evaluation has shown the practicality of , and the efficiency of its design choices.
|
http://arxiv.org/abs/2303.06909v1
|
20230313075437
|
Deciphering the unusual stellar progenitor of GRB~210704A
|
[
"R. L. Becerra",
"E. Troja",
"A. M. Watson",
"B. O'Connor",
"P. Veres",
"S. Dichiara",
"N. R. Butler",
"T. Sakamoto",
"K. O. C. Lopez",
"F. De Colle",
"K. Aoki",
"N. Fraija",
"M. Im",
"A. S. Kutyrev",
"W. H. Lee",
"G. S. H. Paek",
"M. Pereyra",
"S. Ravi",
"Y. Urata"
] |
astro-ph.HE
|
[
"astro-ph.HE"
] |
firstpage–lastpage
Effects of Nb Doping on the Charge-Density Wave and Electronic Correlations in the Kagome Metal Cs(V_1-xNb_x)_3Sb_5
Hai-Hu Wen
March 30, 2023
===================================================================================================================
GRB 210704A is a burst of intermediate duration (T_90∼ 1-4 s) followed by a fading afterglow and an optical excess that peaked about 7 days after the explosion.
Its properties, and in particular those of the excess, do not easily fit into the well established classification scheme of GRBs as being long or short,
leaving the nature of its progenitor uncertain.
We present multi-wavelength observations of the GRB and its counterpart, observed up to 160 days after the burst.
In order to decipher the nature of the progenitor system, we present a detailed analysis of the GRB high-energy properties (duration, spectral lag, and Amati correlation), its environment, and late-time optical excess.
We discuss three possible scenarios: a neutron star merger, a collapsing massive star, and an atypical explosion possibly hosted in a cluster of galaxies. We find that traditional kilonova and supernova models do not match well the properties of the optical excess, leaving us with the intriguing suggestion that this event was an exotic high-energy merger.
(stars:) gamma-ray burst: individual: GRB 210704A – (transients:) gamma-ray bursts
§ INTRODUCTION
Gamma-ray bursts (GRBs) are the brightest explosive events in the universe <cit.>. They are classified according to their duration T_90 and spectral hardness <cit.>. The population of short GRBs (SGRBs) typically has T_90≲ 2 s and harder spectra, whereas the population of long GRBs (LGRBs) typically has T_90≳ 2 s and softer spectra <cit.>. However, there is overlap between the two populations, and so in some cases it is not clear whether a burst with intermediate properties belongs to the one population or the other <cit.>.
Nowadays, it is known that at least some SGRBs are the consequence of mergers between compact objects, driven by angular momentum and energy losses to gravitational radiation <cit.> and as such are sources of gravitational wave emission <cit.>. These mergers are followed by a luminous and short-lived kilonova emission, visible at optical and near-infrared wavelengths <cit.>.
In contrast, LGRBs are thought to be the result of the core-collapse of a star <cit.> whose mass exceeds about 10 M_⊙ <cit.>.
In this scenario, the optical emission from the SN appears a few days after the GRB, when the afterglow has faded sufficiently and the component powered by radioactive heating can be seen. This leads to two ways to identify the presence of a SN associated with a LGRB. First, through a “rebrightening” or “excess” in the optical /nIR light curve of the LGRB, visible for several days/weeks after the burst as a consequence of the SN emission <cit.>.
Second, by the appearance of the broad spectral lines characteristic of rapidly expanding ejecta.
The identification of a SN associated with GRB 980425 <cit.> and of several more in the following years (see, e.g., ) confirmed that this scenario applies to most LGRBs.
In this work, we investigate the nature of GRB 210704A, a burst first classified as a SGRB, but later considered to be of intermediate duration. We study the high-energy properties of the GRB prompt phase, and present X-ray, optical, and infrared observations of its afterglow to 15 days after the burst. These observations show that the afterglow initially fades but then becomes brighter again in the optical and, to a less extent, in the near-infrared. We also present late HST observations of a possible host galaxy. We derive constraints on the redshift of the bursts and consider three possible host environments: a nearby galaxy, a nearby cluster of galaxies, and a distant galaxy. We explore different scenarios to explain our data, and eliminate all of the those involving standard SGRBs or LGRBs. We are left with the intriguing possibility that GRB 210704A was an exotic transient in a cluster at z≈ 0.2.
Our paper is organised as follows. In section <ref>, we present the observations with Fermi, Swift, Chandra, GTC, LDT, Gemini, Subaru, HST, and other telescopes. In section <ref> we present our analysis. We discuss the nature of the GRB in section <ref>. Finally, in section <ref> we summarise our results.
§ OBSERVATIONS
§.§ Gamma-rays
The prompt gamma-ray emission of GRB 210704A was detected by six instruments: Fermi/GBM <cit.>, AGILE/MCAL <cit.>, Fermi/LAT <cit.>, AstroSat/CZTI <cit.>, Konus-Wind <cit.>, INTEGRAL/SPI-ACS, and INTEGRAL/ISGRI <cit.>.
Hereafter, we use the Fermi/GBM trigger time as reference time T = 2021 July 4 19:33:24.59 UTC.
<cit.> estimated a duration of about T_90 = 1.06 s based on the AGILE/MCAL data (0.4-100 MeV), and classified it as a SGRB.
A similar short duration, T_90 = 1.0± 0.4 s (20-200 keV), was derived by the analysis of the AstroSat/CZTI dataset <cit.>.
<cit.> reported instead that the Fermi/GBM light curve consisted of a main bright peak with a duration T_90 of about 4.7 s (50-300 keV), with possible faint emission extending to T+20 s <cit.>.
In the time interval between T and T+10 s, high-energy (>100 MeV) emission was detected by the Fermi/LAT <cit.> with a photon flux of (1.6±0.3)×10^-3 ph cm^-2 s^-1 and a photon index of -1.74±0.13.
The LAT localization was RA, Dec (J2000) = 159.08, +57.31 with a 90% error radius of 6.7 arcmin, critical to enable follow-up observations with narrow-field instruments.
<cit.> reported Konus-Wind observations of a bright peak
in the interval from T to T+2 s followed by a weaker pulse peaked at T+4.5 s (20 keV - 4 MeV). Finally, <cit.> estimated a duration of T_90 = 3.5± 0.7 s (>80 keV) based on the INTEGRAL/SPI-ACS data.
All the durations T_90 cited above are summarised in Table <ref>.
The values of T_90 reported in GCNs range from 1.0 to 4.7 seconds (see Table <ref>) and do not unambiguously aid in the classification of GRB 210704A.
This discrepancy can largely be understood by considering Figure <ref>, which shows the Fermi/GBM light curves in three energy bands.
It shows that the observed emission in the soft energy range (8-50 keV; top panel) consists of a weak precursor, followed by strong initial peak with a duration of less than 2 seconds and then an extended tail out to about 6 seconds with two weaker peaks at about 3.5 and 4.8 seconds.
However, the precursor and tail are not seen in the harder 300-1000 keV band.
Therefore, we suggest that gamma-ray instruments that are not sensitive to soft (≲50 keV) energies would not detect the extended emission and would measure shorter values of T_90.
This sort of instrumental selection effect is well known <cit.> and can explain the short T_90 measured by AGILE/MCAL, but does not completely explain the short value measured by AstroSat/CZTI.
We conclude that from the prompt gamma-ray light curve alone it is not clear whether the GRB is a LGRB or a SGRB with temporally extended spectrally soft emission.
§.§ X-rays
Following the localisation by the Fermi/LAT,
the X-Ray Telescope (XRT) aboard Swift initiated automated Target of Opportunity (ToO) observations of the field <cit.>.
A first visit was carried out between T+53.5 ks and T+61.6 ks for a total exposure of 2.6 ks. This led to the identification of the X-ray afterglow at an enhanced position of RA, Dec (J2000) = 10:36:05.21 +57:12:59.1 with a 90% uncertainty radius of 2.7.
Monitoring of the source continued until T + 5.3 d, when the X-ray afterglow fell below the XRT detection threshold.
In our analysis, we use light curves and spectra from the UK Swift Science Data Centre (UKSSDC) on-line repository <cit.>.
The XRT light curve displays a simple power-law decline, t^-α with α=1.3±0.2.
The time-averaged XRT spectrum, from T+53 ks to T+455 ks, is best described by an absorbed power-law with a photon index Γ=1.7±0.2 and hydrogen column density N_ H = 5.6× 10^19 cm^-2 fixed at the Galactic value.
Based on this model, the unabsorbed X-ray flux (0.3–10 keV) at 11 hrs is approximately 8×10^-13 erg cm^-2 s^-1, in agreement with the distribution of X-ray fluxes of bright SGRBs <cit.>.
In order to characterise the afterglow temporal evolution at late times, we requested Director's Discretionary Time (DDT) observations with the Chandra X-ray Telescope. The target was observed with the ACIS-S3 camera, starting at 01:32:42 UTC on 2021 July 22 (T+14.25 d) for a total exposure of 19.8 ks (ObsID: 25093; PI: Troja). The Chandra data were processed using 4.12 with Version 4.9.0.
At the afterglow position we detect 12 photons within a 1 extraction radius.
After correcting for PSF-losses, we derive a count rate of (6.6^+2.1_-1.7) × 10^-4 cts s^-1 in the 0.5-7.0 keV energy range.
This translates to an unabsorbed X-ray flux of (1.3^+0.4_-0.3) × 10^-14 erg cm^-2 s^-1 in the 0.3-10 keV energy band using the best fit parameters derived from the Swift/XRT spectrum.
The combined Swift/Chandra light curve is best described by a power-law decay with α=1.26±0.04.
§.§ Optical and Infrared Photometry
We carried out an extensive campaign of follow-up observations using
the Deca-Degree Optical Transient Imager (DDOTI; ),
the Large Monolithic Imager (LMI) on the 4.3-m Lowell Discovery Telescope (LDT; ), the Near Infra-red Imager (NIRI) and the Gemini Multi-Object Spectrographs (GMOS) instruments on the 8.1-m Gemini-North Telescope <cit.>, the Hyper Suprime-Cam (HSC) on the Subaru 8.2 m telescope <cit.>, and the Optical System for Imaging and low-Intermediate-Resolution Integrated Spectroscopy (OSIRIS) instrument on the 10.4-m Gran Telescopio de Canarias (GTC; ).
Table <ref> gives a log of the observations.
This dataset was supplemented by archival observations from the
Hubble Space Telescope (HST) obtained with the Wide Field Camera 3 (WFC3), and
from the Canada-France-Hawaii Telescope (CFHT) obtained with MegaPrime/MegaCam during December 2004 (PI: Tanvir and Cowie) (observationID: G013.158.521+57.697)
and retrieved from the MegaPipe image stacking pipeline[https://www.cadc-ccda.hia-iha.nrc-cnrc.gc.ca/en/megapipe/access/graph.html].
Data were processed following standard techniques for CCD data reduction (e.g., bias subtraction, flat-fielding, cosmic-ray rejection).
The Gemini images were reduced using the Gemini package v1.14[https://www.gemini.edu/observing/phase-iii/understanding-and-processing-data/data-processing-software/gemini-iraf-general], whereas the GTC, LDT and Subaru images were reduced using custom Python-based software. The HST data were processed using standard procedures within the package <cit.>. The final pixel scale was 0.09/pix for WFC3/IR (F105W and F160W filters) and 0.03/pix for the WFC3/UVIS data.
We performed PSF photometry on the optical images using <cit.>. To minimize systematic errors in the calibration, we calibrated all of the r and z photometry using the same six nearby Sloan Digital Sky Survey (SDSS) Data Release 12 (DR12) stars <cit.>.
In the nIR images from Gemini, only a weak signal is visible at the GRB position. We estimated its brightness by performing forced aperture photometry, calibrated against nearby Two Micron All-Sky Survey (2MASS; ) sources. Due to the low number of
2MASS sources within the NIRI field of view and their likely extended nature, a systematic error of 0.1 mag was added to the absolute calibration of the nIR photometry.
We performed photometry of the two galaxies S1 and S2 (see Figure <ref>) in the late-epoch HST images using using aperture photometry and the photometric zeropoints in the image headers. We will discuss the possibility of these galaxies being the host of the GRB in <ref>, but for the time being we will simply note that S1 is almost coincident with the GRB position and therefore our ground-based observations combine the flux of both the GRB counterpart and S1.
Our photometry is shown in Table <ref> (with upper limits being 3σ) and Table <ref> and is plotted in Figure <ref>. All our magnitudes were converted to an AB scale and not corrected for Milky Way extinction, E(B-V) = 0.007 <cit.>. We also include additional measurements from the literature <cit.>.
§.§ Optical Spectroscopy
Optical spectroscopy of the afterglow at T + 1.1 d was obtained by <cit.>
using the OSIRIS instrument on GTC. We downloaded their calibrated spectrum from the GRBSpec database <cit.>, and show it in Figure <ref>.
<cit.> noted the clear presence of a continuum down to at least 4200 Å, which implies z < 3.6.
They also noted a tentative detection of a broad absorption dip at about 4050 Å, which they interpreted as Ly-α at z = 2.34. We note that this feature occurs in a part of the spectrum that is quite noisy, which calls its reality into doubt.
They also commented on possible low-significance detections of absorption from OI (1302/1304 Å), SiII (1260 Å), and CII (1334 Å),
but the absence of corresponding absorption from CIV and SiIV.
Another clue to the GRB redshift comes
from the lack of MgII absorption features.
The MgII doublet was observed with a mean rest-frame equivalent width of about 3.8 Å in 27 of the sample of 31 LGRBs observed by <cit.> and <cit.>.
The optical spectrum of GRB210704A has a signal-to-noise ratio (SNR) of at least 5 from 5000 to 7200 Å and shows no strong absorption lines. For this reason, we suggest that if the GRB is similar to typical LGRBs, then the absence of MgII disfavours the redshift range
0.8<z<1.6. However, if the GRB is similar to typical SGRBs, whose spectra do not show strong host absorption lines, then we have the weaker constraint that the redshift is less than 3.6.
§ ANALYSIS
§.§ Amati correlation
Given the ambiguity of the GRB duration, we will consider its properties in the context of the Amati correlation <cit.>. For this, we analysed the Fermi/GBM data from T-0.2 to T+6.1 s and found the best fitting function was a Band function with α=-0.59±0.02, β=-2.95± 0.20, and E_ peak= 283± 8 keV.
The fluence in the 10-1000 keV interval (observer's frame) is F=(2.3±0.3)× 10^-5 erg cm^-2. In the top panel of Figure <ref>, we show the position of the GRB at z = 0.1, 0.4, 0.8, and 2.34. We also show the populations of SGRBs and LGRBs from <cit.>. We see that GRB 210704A is consistent with being a SGRB at low redshift (z<0.4) or with being a LGRB at higher redshift (z ≳ 0.4).
§.§ Spectral lag
We also consider the spectral lag GRB 210704A in the context of other GRBs, following <cit.> and <cit.>.
We derive the GRB peak flux by fitting the spectrum of the brightest 1.024 s interval <cit.> with a Band function.
The best fit model yields α=-0.36± 0.02, β=-2.82± 0.12, E_ peak= 302± 8 keV), and a peak flux of F=(1.53± 0.02)× 10^-5 erg cm^-2 s^-1.
From this value, we derive the isotropic-equivalent peak luminosity,
L_ peak, by assuming different redshifts.
For example, at z=0.5 the measured peak flux corresponds to L_ peak = (5.46 ± 0.07)× 10^51 erg s^-1 in the comoving 50–300 keV energy range.
We calculated the lag between the energy bands 25–50 keV and 100–300 keV using the 10 ms resolution light curve and the sum of the signals from the three brightest Fermi NaI detectors (1, 3 and 5).
The lag was determined by the maximum of the cross-correlation function between the two light curves. We fit a 4th-degree polynomial around the peak in order to accurately determine the lag. We find that the lag is:
τ = 80± 9 ms,
in which the uncertainties are 1σ.
We estimated the uncertainty by adding Poisson noise to the data <cit.> and repeating the cross-correlation analysis.
In the bottom panel of Figure <ref>, we show the spectral lag (corrected for redshift as (1+z)^0.67, following ) and peak luminosity L_ peak of the GRB at z=0.1, 0.4, 0.8, and 2.34. We also show the populations of LGRBs and SGRBs from <cit.> and <cit.>.
We see that, for any redshift, the GRB lag is longer than typical SGRBs.
Its luminosity fits within the distribution
of cosmological LGRBs for z ≳ 0.8, whereas for lower redshifts its location in the lag-luminosity diagram would be unusual.
Other outliers in a similar position are
GRB 031203 and GRB 060729A, peculiar LGRBs associated with bright supernovae.
§.§ Afterglow
In the standard fireball model for GRBs, the afterglow emission is produced by external shocks resulting from the interaction between the relativistic jet and the circumstellar medium <cit.>.
Typically, the afterglow phase can be explained as synchrotron radiation from a power-law energy distribution of shocked electrons, N(E)∝ E^-p, which lead to the observed flux density being a series of power-laws segments as a function of time t and frequency ν as F_ν∝ t^-αν^-β <cit.> in which F_ν is the observed flux density and α and β are the temporal and spectral indices, respectively.
The early optical and X-ray data can be fit with a with a simple absorbed power-law of slope β=0.84±0.02 (see Figure <ref>), indicating that they belong to the same spectral segment and therefore they are expected to display the same temporal decay.
We identify this segment as ν_m≲ν_opt≲ν_X≲ν_c (and therefore a slow-cooling regime), where ν_m is the synchrotron characteristic frequency and ν_c is the cooling frequency <cit.>.
In this case, F_ν∝ν^(1-p)/2 and the electron index is p=2.68±0.04.
For a fireball expanding into a uniform density medium, the relation of flux density and time is F_ν∝ t^3(1-p)/4. With the electron index previously estimated, we obtain F_ν∝ t^-1.26±0.03.
A simple power-law decay of slope -1.26 is consistent with X-ray observations at all epochs and with the early optical observations (see Figure <ref>). However, beginning at T+5.5 d, it underpredicts the observed optical and near-infrared emission.
We interpret this as evidence of an additional component powering the late-time optical/nIR light curve and will return to discuss it in detail in <ref>.
From the condition that the X-ray afterglow is in slow-cooling regime, we derive an upper limit on the circumburst density n following <cit.>:
n ≲ 0.4 (1+z/ 2)^-6/11(t/ 1 d)^-4/11(E_ K,iso/10^52 erg)^-6/11
(ϵ_e/0.1)^-40/33(ϵ_B/10^-5)^-5/9 cm^-3,
which is consistent with densities typical of the interstellar medium, and disfavors the high-density environment where some LGRBs are found.
Finally, by assuming that the GeV flux is also produced by external forward shocks,
we can use the flux above 100 MeV <cit.> as proxy for the blastwave kinetic energy <cit.>. For p≈2.6, we obtain:
E_ K,iso≈ 10^53(1+z/3)^-1(d_L,28/5)^1.74(F_LAT/ 0.2 nJy)^0.87(t/ 5 s)^1.25
(ϵ_e/0.1)^-1.38(ϵ_B/10^-3)^0.13 erg,
where d_L,28 is the luminosity distance in units of 10^28 cm.
For z≳2, this value fits well within the distribution of LGRBs.
§.§ Late-time Excess
The light curves in Figure <ref> are compared to the standard power-law afterglow. A late-time flattening is expected due to the contribution of the source S1, underlying the GRB position. This model (solid lines) underpredicts the optical and, to a less extent, near-infrared photometry from T+5 d to T+15 d. We consider this to be indicative of an excess component in addition to the afterglow. We identify the peak of this excess at around T+6.5 d, when the observed light is 3-5 times brighter than the afterglow+S1 model.
Figure <ref> shows the spectral energy distribution (SED) of the GRB counterpart at
two epochs, T+1.1 d and T+5.5 d, respectively.
The earlier SED is well described by a power-law function, as expected for a non-thermal afterglow spectrum.
The later SED shows an excess in the optical (grz) and J band.
We consider a simple model for the excess, treating it as black-body emission arising from a spherical fireball in expansion and ignoring relativistic effects. The rest-frame parameters of this model are the temperature T' and radius R' of the photosphere.
In the observer's frame, the spectrum will have the shape of a black-body with T_ obs = T'/(1+z).
If we fit this simple black-body model to the grzJK data in Figure <ref>, we obtain T_ obs≈ 3800 K (orange thin line) and a reduced χ^2 ≈ 2 as this model severely underpredicts the K-band measurement.
This discrepancy could be due the presence of broad line spectral features that either suppress the K-band emission or enhance the zJ-band measurements.
In the latter case, if we exclude the zJ-band points from the fit, the continuum is
well described by a hotter black-body with T_ obs≈ 9000 K (blue thick line).
We examine both these models in more detail when we discuss likely progenitors and redshifts in <ref>.
§.§ Environment
The field of GRB 210704A is shown in Figure <ref>.
The GRB region shows an overdensity of low-redshift galaxies, notably
the galaxy WISEA J103604.24+571327.7 (labelled G1 in Figure <ref>) at z = 0.0817 and the galaxies' cluster 400d J1036+5713 at z = 0.203 <cit.>.
Two faint (r≈25 AB mag) sources (labelled S1 and S2 in Figure <ref>) lie closer to the GRB position and are also plausible candidate host galaxies.
Unfortunately, optical spectroscopy does not allow us to conclusively determine the redshift of GRB 210704A and use this redshift to determine the host galaxy (see <ref>). Therefore, we analyse the projected angular offsets between the galaxies and the GRB to quantify the probability of association.
We determined the positions, statistical uncertainties, and half-light radii using the pre-explosion r-band image from MegaPrime/MegaCam for S1 and S2, and the Gemini/GMOS-N r-band image obtained at T+10.44 d for the GRB afterglow and the other host candidates. We likewise confirm the offsets with the HST imaging and derive the photometry for these galaxies in the HST filters (see Table <ref>). To determine the offset for each galaxy we followed the methods outlined by <cit.>.
We first aligned the afterglow image (Gemini) and pre-explosion image (MegaPrime) using to identify point sources in each image and then to determine the astrometric solution. Using 19 common point sources between the two images, we derive a relative astrometric uncertainty of σ_tie ∼ 0.09. This astrometric uncertainty is included in the offset determination.
Using the Equations 1 to 3 from <cit.> and the galaxy number counts from deep optical imaging <cit.>, the probability of finding an unrelated galaxy of magnitude m_r or brighter within the vicinity of a GRB can be approximated as:
P_ ch =1-exp(-π r^2_ i× 10^a (m_r - m_0) + b ),
with a=0.36, b = -2.42, and m_0=24 for galaxies fainter than m_r≳19 mag
and a=0.56, b = -4.80 and m_0=18 for brighter galaxies.
The effective radius r_ i depends on the projected angular separation R_0 between the GRB and the galaxy and on the half-light radius R_half of the galaxy. We take r_ i=2R_ half for S1 since GRB 210704A is localized inside the detectable light, whereas for other candidates we use r_ i=(R^2_ 0+4R^2_ half)^1/2 because the GRB position is well outside the light of these galaxies. In Table <ref>, we summarize the information on the galaxies that have P_ ch<0.15.
Often a galaxy is more likely to be the host than all the other ones, however, in the crowded field of GRB 210704A, two galaxies have comparably low probabilities of chance alignment with the GRB.
The bright nearby galaxy G1, located about 29from the afterglow, has a low chance coincidence probability of 0.5%. However, the faint galaxy S1, detected close to the afterglow position, has
a similarly probability of 2%.
§.§ The Properties of the Possible Host Galaxy G1
According to the spectrum from the Sloan Digital Sky Survey Data Release 7, the galaxy G1 shows the signature of Ca H and K (at 3934 Å and 3969 Å respectively), the G-band (4304 Å), Mg (5175 Å) and Na (5894 Å) absorption lines, all of which are consistent with an old population. Moreover, the decomposition of stellar populations and their analysis using pyPipe3D[<http://ifs.astroscu.unam.mx/pyPipe3D/>], suggest of an old dominant population. Nevertheless, the analysis confirms that a young population is also present, with about 15% of the light corresponding to stars of less than 2 Gyr of age.
Based on its spectral properties and observed morphology, we classify G1 as a Sa/Sb galaxy.
§.§ The Properties of the Possible Host Galaxy S1
We do not have a spectroscopic redshift for S1. Therefore, we modelled its SED (Table <ref>) using <cit.> using the methodology previously described in <cit.>. The model parameters are the redshift z, total mass M, galaxy age t_ age, e-folding timescale τ, extinction A_V, and metallicity Z. We use these parameters to derive the stellar mass M_* and the star formation rate (SFR) as outlined in <cit.>. Following <cit.>, we apply uniform priors in log t_ age, log τ, log Z, and A_V. We leave the redshift as a free parameter with a uniform prior between 0 and 5. We performed a fit to the data using the package <cit.>.
We obtain a photometric redshift z_phot=2.15±0.10, driven by the flux increase in the
F160W filter interpreted as the 4000 Å break
(see Figure <ref>).
The best fit yields a galaxy's stellar mass M_*=(1-3)× 10^9 M_⊙, a sub-solar metallicity Z/Z_⊙=0.3^+0.4_-0.2, a moderate star formation rate SFR=2.5^+1.7_-0.9 M_⊙ yr^-1, a relatively young stellar population with age t_m=0.8±0.5 Gyr, and an intrinsic extinction of A_V=0.30±0.15 mag.
These parameters are typical of GRB host galaxies in this redshift range for both long and short GRBs <cit.>, although the low metallicity tends to favor the former class.
Moreover, the galaxy's absolute magnitude of M_ r=-21.0 is similar to other host galaxies associated to LGRBs <cit.>.
§.§ A Possible Host Cluster
The overdensity of galaxies
in this vicinity of the burst is related to the X-ray cluster 400d J1036+5713 (see Figure <ref>).
The cluster has an estimated mass of approximately 9×10^13 and a virial radius of R_500≈3. As shown in Figure <ref>, the GRB afterglow lies about 1.5 from the peak of the X-ray diffuse emission, within the cluster's angular radius.
In this case, the probabilities reported in Table 2 might overestimate the chance of a random alignment between the GRB and the galaxies in the cluster.
To better estimate this value we consider the Swift XRT Cluster Survey <cit.> and search for the number of X-ray clusters serendipitously located within 2 arcmin of a GRB position. Among over 300 long GRB fields examined in the survey, only 4 closely intercept an X-ray cluster, from which we derive a chance probability of P_ ch≈0.012, comparable to the probabilities derived for S1 and G1.
If we factor in the cluster brightness and consider only sources with f_X ≳2 × 10^-13 erg cm^-2 s^-1, then the probability of a chance alignment drops to 10^-3. A spurious GRB/cluster association is therefore unlikely, although not impossible when considering the large sample of more than 1500 Swift bursts. Notably, the only other known case of an association with an X-ray cluster is the short GRB 050509B <cit.>.
§ DISCUSSION
In this section, we interpret and discuss the physical implications of the results obtained in section <ref>. We consider the nature of the burst (SGRB or LGRB), its redshift, and its likely environment (G1, S1 or the galaxy cluster). For distances, we assume a ΛCDM model with a H_0=67.8 km s^-1 Mpc^-1 <cit.>.
§.§ A nearby short GRB
We first consider the possibility of a GRB hosted by the bright (M_r≈-21.5) galaxy G1 (WISEA J103604.24+571327.7) at z = 0.08168. This is supported by the low probability of coincidence of only 0.5% (see Table <ref>).
The relatively large projected offset of about 52 kpc from G1 is an important constraint.
The observed distribution for LGRBs does not extend beyond 10 kpc <cit.>, which allows us to disfavour this possibility. Furthermore, the high-energy properties of GRB 210704A do not resemble those of nearby LGRBs <cit.>.
The case for a SGRB is less clear. Between 5% and 25% of SGRBs are observed to lie beyond 20 kpc from their host galaxies <cit.>. Assuming an age of 1–0.1 Gyr for the GRB progenitor, the inferred offset would require an intrinsic kick velocity of v_ kick≈50–500 km s^-1, in the range observed for Galactic NS binaries.
A SGRB at z ∼ 0.08 would be consistent with the properties of other cosmological SGRBs (section <ref>), and would not obey the spectral lag-luminosity relation of LGRBs (section <ref>) as observed in the case of other nearby events <cit.>.
Therefore, based on the GRB high-energy properties and its location, a nearby SGRB remains a plausible option.
On the other hand, the observed peak luminosity and peak time of the excess emission do not match well the properties of the kilonova AT2017gfo:
the peak brightness would be about two magnitudes fainter (M_r=-14.6) than AT2017gfo (M_r=-16.4), and the peak time would be several days later. It was no later than T+12 hours for AT2017gfo whereas for GRB 210704A we observe a maximum around T+7 days.
Using the one-zone model of <cit.>, a radioactively powered transient peaks at a time t_peak given by
t_peak≈ 1.5 d (M_ej/0.01 M_⊙)^0.5(κ/1 cm^2 g^-1)^0.5(v_ej/0.1 c)^-0.5
where M_ ej is the ejecta mass,
v_ ej its velocity, and κ its opacity.
To explain a peak of about 7 days, one needs to either increase the mass to of order 0.1 and/or increase the opacity. As a result, the spectral peak would shift to redder wavelengths than the ones observed in this case.
Alternatively, a delayed peak can be explained by a low expansion velocity, v≈0.01 c. This latter solution
is consistent with the simple blackbody model for the optical/nIR excess, which, at a redshift of 0.08, implies temperatures of 4000-10000 K and expansion velocities of 20000-2000 km s^-1, slower than typical merger ejecta.
We also compared our case to the library of simulated kilonova light curves by <cit.>, incorporating a broad range of ejecta compositions, morphologies and viewing angles.
We find that, although the luminosities of the kilonova models are in agreement with the observations for z ≲ 0.4, the optical peak can only range from a few hours up to a couple of days after the explosion, whereas we observe a peak at T+7 d.
We note that the mismatch between the observed peak and the kilonova timescale applies to any SGRB up to z≈1, and therefore we can rule out any typical kilonova in this range.
§.§ A distant long GRB
We next consider the possibility that GRB 210704A is associated with the faint source S1. Intuitively, this may appear as the most likely association given the positional coincidence between S1 and the GRB. However, the probability of chance coincidence is 2% (Table <ref>), the highest among the three possible host candidates.
The high-redshift derived from the photometric fit in <ref> is consistent with the weak absorption feature in the afterglow optical spectrum (section <ref>). This provides us with tantalizing evidence that GRB 210704A was indeed located at z≈2.3.
At this distance, its rest-frame duration would be ≲1.5 s.
However, its other high-energy properties such as spectral lag (section <ref>), peak energy, and energetics (section <ref>), would fit within the distribution of typical LGRBs (see Figure <ref>).
In this high-redshift scenario, the case of GRB 210704A is reminiscent of other bursts, such as GRB 090426A <cit.> and GRB 200826A <cit.>, characterized by a short duration of the gamma-ray emission despite likely having collapsing massive stars as progenitors.
Based on the observed BATSE distribution of GRB durations <cit.>, a small fraction of LGRBs (≲1%) is expected to last less than 2 s. It is therefore not surprising to find some of these examples within the sample of over 1,000 bursts discovered by Swift.
However, in the case of GRB 210704A, the observed optical bump would be challenging to explain with standard SN models.
At a redshift of 2.3, the simple blackbody model adopted for the optical/nIR excess implies a
temperature of 30000 K and a sub-relativistic velocity of ∼ 0.2 c. The second solution of a colder black body peaking in the observed J-band requires a superluminal speed, and is thus considered unphysical.
The observed magnitude of the excess of r≈23 AB at T+7 d implies an absolute magnitude of M_UV≈-23.2 at T+2.3 d (rest-frame) (after subtracting the afterglow contribution), brighter than most known SNe <cit.> and AT2018cow-like events <cit.> (see Figure <ref>). The only event whose brightness in UV is comparable with the excess of GRB 210704A is the Dougie tidal disruption event (TDE) candidate <cit.>. However,
known TDEs evolve on slower timescales than the excess of GRB210704A.
Mechanisms capable of producing such a high peak brightness and rapid rise time are rare.
For instance, the interaction between the SN shock wave and a dense environment, or the continued energy injection from a long-lived central engine are also expected to act on longer timescales than the ones observed here <cit.> .
<cit.> suggested that, for the most energetic explosions (≳10^52 erg), a shock breakout propagating through a dense stellar wind could produce strong emission in excess of 10^44 erg s^-1, peaking
in the UV on timescales of a few days after the burst. This emission becomes dominant when the Ni^56 yield is low
as expected if the star directly collapses to a black hole.
§.§ A nearby peculiar GRB
A final possibility is that GRB 210704A is a peculiar GRB associated with a member of the galaxy cluster at z = 0.203.
<cit.> showed that progenitor systems formed within a cluster are likely to be retained within the potential well of its halo, regardless of the intrinsic kick velocity of the progenitor system. However, due to the high merger activity in such crowded environment, the GRB may happen far from its true birthplace. As a result, its host galaxy cannot be confidently identified based on its spatial proximity.
A cluster environment, although rarely associated with a GRB, has been discussed in the case of both SGRBs and LGRBs.
The connection with SGRBs naturally arises as NS binaries with long merger timescales are expected to track the stellar mass density and reside in evolved stellar environments.
However, as discussed in section <ref>, a SGRB produced by a typical NS merger would not produce a kilonova compatible with the luminosity and late-onset of the optical excess.
In the case of LGRBs, their typical progenitors, young massive stars <cit.>, are not found in clusters, and a merger-driven explosion with unusual progenitors appears to be the most likely explanation. For example, black hole and neutron star systems (BH-NS), black hole and white dwarf (BH-WD), white dwarf and neutron star (WD-NS) or WD-WD encounters have been considered <cit.>.
An exotic progenitor system could explain the unusual high-energy properties of this event and why they do not fit within the standard relations of typical LGRBs for z∼0.2. In addition, we note that the only other LGRB possibly associated with a galaxy cluster is GRB 050911 <cit.>, whose prompt emission was a short duration (∼1 s) peak followed by a weak 16 s long tail and as such resembles the light curve of GRB 210704A. A LGRB produced by an exotic merger system could also give rise to a peculiar optical transient, although in this case, predictions are less secure.
Assuming that the optical excess is radioactively-powered, we consider the case of ejecta with pure nickel abundance. This is justified by the rapid evolution of the optical emission, comparable to the ^56Ni half-life timescale of about 6 d.
At a redshift of z ≈ 0.2, the optical bump would peak at an absolute magnitude of M_r≈-16.5, corresponding to a luminosity of about 10^42 erg s^-1. The peak bolometric luminosity can be related to the ejecta mass M_ej using Arnett's law, L_pk≈ϵ_ Ni(t_pk) M_ej, where ϵ_ Ni(t_pk) ≈ 5×10^43 erg s^-1 is the energy generation rate at 6 d (rest-frame).
The derived mass M_ej≈0.1 is much smaller than in a typical SN, and indicative of a weaker explosion.
Based on the black-body fit of the optical excess, we derived a temperature of 4500–10000 K and ejecta velocity v_ ej≈0.2-0.02 c.
Therefore, the basic properties of the optical excess, such as its luminosity and fast timescales, could be reproduced by an explosion ejecting a low-mass shell of fast-moving material, composed mainly of ^56Ni.
At first order, this is consistent with the predictions of an accretion-induced collapse (AIC) of a WD <cit.>,
driven for example from a WD-WD encounter <cit.>.
§ SUMMARY
We have presented broadband observations of GRB 210704A, its afterglow, and environment.
After its discovery, the burst was initially classified as a SGRB.
Our analysis of the high-energy prompt emission shows that the GRB duration is affected by instrumental selection effects, and that the GRB lies at the intersection between SGRBs and LGRBs.
We place the GRB in the context of the Amati and spectral lag correlations, and show that these can provide information on the nature of the GRB at different possible redshifts.
An additional peculiar feature of this GRB is an optical/nIR excess, observed to peak at about T+7 days (observer's frame)
at a magnitude r≈23.2 AB.
We identified this excess by comparing our optical and nIR photometry with a simple afterglow model derived from the X-ray data.
We consider three possible host environments and distance scales: the galaxy G1 at z ≈ 0.08, the galaxy S1 at z ≈ 2.3, and a galaxy's cluster at z≈0.2. We also discuss three different progenitors: a standard SGRB with a kilonova, a standard LGRB with a SN, and an exotic LGRB, perhaps an accretion-induced collapse of a WD <cit.>.
None of the standard explanations is entirely satisfactory. A SGRB followed by a kilonova, perhaps associated with G1, explains the short duration of the prompt gamma-ray emission, its other high-energy properties, and the large distance from the host galaxy. However, the color and timescales of the observed optical excess imply an expansion velocity not typical for the ejecta of a compact binary merger.
On the other hand, a LGRB associated with the galaxy S1 remains consistent with all the high-energy properties of the event but is challenged by the extreme luminosity of the optical excess. No known transient matches the high luminosity, blue color, and rapid timescales implied by the observations.
Finally, we considered an exotic progenitor, involving the merger of a WD with another compact objects (either a BH, a NS, or another WD), in the cluster at z ≈ 0.2.
Such stellar encounters can explain GRB durations longer than the canonical 2 seconds and could be followed by fast-evolving optical transients consistent with the observed excess. This is the only scenario that matches all the observed properties of GRB210704A although, admittedly, is also the least constrained one.
The difficulty we have had in identifying the progenitor of GRB 210704A highlights the limitations of the traditional GRB dichotomy in long/short, collapsars/mergers events. Although valid for the majority of bursts, it is not sufficient to describe the GRB population in its entirety. The large Swift sample of well-localized bursts has been instrumental to identify these oddball GRBs and start exploring their possible origins. In the next few years, the arrival of the Vera C. Rubin Observatory will undoubtedly enlarge the sample of exotic transient events and perhaps help us find analogues to GRB 210704A.
§ RESEARCH DATA POLICY
The data underlying this article will be shared on reasonable request to the corresponding author.
§ ACKNOWLEDGEMENTS
We thank the staff of GTC and Gemini for scheduling and executing the observations included in this work, especially Antonio Cabrera and David Garcia.
This project has received funding from the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme, grant 101002761 (BHianca; PI: Troja).
Some of the data used in this paper were acquired with the RATIR instrument, funded by the University of California and NASA Goddard Space Flight Center, and the 1.5-meter Harold L. Johnson telescope at the Observatorio Astronómico Nacional on the Sierra de San Pedro Mártir, operated and maintained by the Observatorio Astronómico Nacional and the Instituto de Astronomía of the Universidad Nacional Autónoma de México. Operations are partially funded by the Universidad Nacional Autónoma de México (DGAPA/PAPIIT IG100414, IT102715, AG100317, IN109418, IG100820, and IN105921). We acknowledge the contribution of Leonid Georgiev and Neil Gehrels to the development of RATIR.
Some of the data used in this paper were acquired with the DDOTI instrument at the Observatorio Astronómico Nacional on the Sierra de San Pedro Mártir. DDOTI is partially funded by CONACyT (LN 232649, LN 260369, LN 271117, and 277901), the Universidad Nacional Autónoma de México (CIC and DGAPA/PAPIIT IG100414, IT102715, AG100317, IN109418, and IN105921), the NASA Goddard Space Flight Center and is partially funded by the University of Maryland (NNX17AK54G). DDOTI is operated and maintained by the Observatorio Astronómico Nacional and the Instituto de Astronomía of the Universidad Nacional Autónoma de México. We acknowledge the contribution of Neil Gehrels to the development of DDOTI.
We thank the staff of the Observatorio Astronómico Nacional.
We thank Ori Fox, Antonio Castellanos-Ramírez, Yuri Cavecchi and Sebastián F. Sánchez for their useful comments. We also thank Rubén Sánchez Ramírez and Aishwarya Thakur for their support in the reduction of GTC data.
We acknowledge support from the DGAPA/UNAM IG100820 and IN105921. RLB acknowledges support from CONACyT and DGAPA postdoctoral fellowships.
M.I. and G.S.H.P. acknowledge the support from the National Research Foundation grants No. 2020R1A2C3011091 and No. 2021M3F7A1084525, and the R&D program (Project No. 2022-1-860-03) of the Korea Astronomy and Space Science Institute.
This research is based in part on data collected at the Subaru Telescope, which is operated by the National Astronomical Observatory of Japan. We are honored and grateful for the opportunity of observing the Universe from Maunakea, which has the cultural, historical, and natural significance in Hawaii.
This work is partly based on data obtained with the Gran Telescopio Canarias (GTC), installed in the Spanish Observatorio del Roque de los Muchachos of the Instituto de Astrofísica de Canarias, in the island of La Palma, and with the instrument OSIRIS, built by a Consortium led by the Instituto de Astrofísica de Canarias in collaboration with the Instituto de Astronomía of the Universidad Autónoma de México. OSIRIS was funded by GRANTECAN and the National Plan of Astronomy and Astrophysics of the Spanish Government.
The scientific results reported in this article are based in part on observations made by the Chandra X-ray Observatory through Director's Discretionary Time (ObsID: 25093; PI: Troja).
This work made use of data supplied by the UK Swift Science Data Centre at the University of Leicester.
RLB dedicates this work to Cicerón. Thanks for sharing your life with me. I will always love you.
99
[Abbott et al.2017a]Abbott2017 Abbott B. P., et al., 2017a, PhRvL, 119, 161101
[Ahumada et al.2020]SDSS16 Ahumada R., Prieto C. A., Almeida A., Anders F., Anderson S. F., Andrews B. H., Anguiano B., et al., 2020, ApJS, 249, 3. doi:10.3847/1538-4365/ab929e
[Ahumada et al.(2021)]Ahumada2021 Ahumada, T., Singer, L. P., Anand, S., et al. 2021, Nature Astronomy, 5, 917. doi:10.1038/s41550-021-01428-7
[Alam et al.2015]SDSS12 Alam S., Albareti F. D., Allende Prieto C., Anders F., Anderson S. F., Anderton T., Andrews B. H., et al., 2015, ApJS, 219, 12. doi:10.1088/0067-0049/219/1/12
[Amati et al.2008]Amati2008 Amati L., Guidorzi C., Frontera F., Della Valle M., Finelli F., Landi R., Montanari E., 2008, MNRAS, 391, 577. doi:10.1111/j.1365-2966.2008.13943.x
[Antonelli et al.(2009)]Antonelli09 Antonelli, L. A., D'Avanzo, P., Perna, R., et al. 2009, , 507, L45. doi:10.1051/0004-6361/200913062
[Arnett1982]Arnett1982 Arnett W. D., 1982, ApJ, 253, 785. doi:10.1086/159681
[Barbieri et al.2019]Barbieri2019 Barbieri C., Salafia O. S., Colpi M., Ghirlanda G., Perego A., Colombo A., 2019, ApJL, 887, L35. doi:10.3847/2041-8213/ab5c1e
[Becerra et al.2017]Becerra2017 Becerra R. L., Watson A. M., Lee W. H., Fraija N., Butler N. R., Bloom J. S., Capone J. I., et al., 2017, ApJ, 837, 116. doi:10.3847/1538-4357/aa610f
[Beckwith et al.2006]Beckwith2006 Beckwith S. V. W., Stiavelli M., Koekemoer A. M., Caldwell J. A. R., Ferguson H. C., Hook R., Lucas R. A., et al., 2006, AJ, 132, 1729. doi:10.1086/507302
[Beniamini et al.2015]Beniamini2015 Beniamini P., Nava L., Duran R. B., Piran T., 2015, MNRAS, 454, 1073. doi:10.1093/mnras/stv2033
[Berger2010]Berger2010 Berger E., 2010, ApJ, 722, 1946. doi:10.1088/0004-637X/722/2/1946
[Berger et al.2011]Berger2011 Berger E., Chornock R., Holmes T. R., Foley R. J., Cucchiara A., Wolf C., Podsiadlowski P., et al., 2011, ApJ, 743, 204. doi:10.1088/0004-637X/743/2/204
[Berretta et al.2021]30375 Berretta A., Longo F., Axelsson M., Bissaldi E., Piron F., Arimoto M., Fermi-LAT Collaboration, 2021, GCN, 30375
[Bertin & Arnouts1996]Bertin1996 Bertin E., Arnouts S., 1996, A&AS, 117, 393
[Bloom, Kulkarni, & Djorgovski2002]Bloom2002 Bloom J. S., Kulkarni S. R., Djorgovski S. G., 2002, AJ, 123, 1111. doi:10.1086/338893
[Bloom et al.2006]Bloom2006 Bloom J. S., Prochaska J. X., Pooley D., Blake C. H., Foley R. J., Jha S., Ramirez-Ruiz E., et al., 2006, ApJ, 638, 354. doi:10.1086/498107
[Breeveld, Lien, & Swift/UVOT Team2021]30389 Breeveld A. A., Lien A. Y., Swift/UVOT Team, 2021, GCN, 30389
[Burenin et al.2007]ROSAT Burenin R. A., Vikhlinin A., Hornstrup A., Ebeling H., Quintana H., Mescheryakov A., 2007, ApJS, 172, 561. doi:10.1086/519457
[Campana et al.2006]Campana2006 Campana S., Mangano V., Blustin A. J., Brown P., Burrows D. N., Chincarini G., Cummings J. R., et al., 2006, Natur, 442, 1008. doi:10.1038/nature04892
[Cartier et al.2021]Cartier2021 Cartier R., Hamuy M., Contreras C., Anderson J. P., Phillips M. M., Morrell N., Stritzinger M. D., et al., 2021, arXiv, arXiv:2108.09828
[Cucchiara et al.2013]Cucchiara2013 Cucchiara A., Prochaska J. X., Zhu G., Ménard B., Fynbo J. P. U., Fox D. B., Chen H.-W., et al., 2013, ApJ, 773, 82. doi:10.1088/0004-637X/773/2/82
[Cutri et al.2003]Cutri2003 Cutri R. M., Skrutskie M. F., van Dyk S., Beichman C. A., Carpenter J. M., Chester T., Cambresy L., et al., 2003, tmc..book
[D'Ai et al.2021]30379 D'Ai A., Kennea J. A., Tohuvavohu A., Sbarufatti B., Page K. L., Beardmore A. P., Melandri A., et al., 2021, GCN, 30379
[D'Avanzo et al.2021]30385 D'Avanzo P., D'Elia V., Fiorenzano A., Padilla C., CIBO Collaboration, 2021, GCN, 30385
[D'Avanzo et al.2021]30432 D'Avanzo P., D'Elia V., Campana S., De Pasquale M., Melandri A., Rossi A., Salvaterra R., et al., 2021, GCN, 30432
[de Ugarte Postigo et al.2012]deUgarte2012 de Ugarte Postigo A., Fynbo J. P. U., Thöne C. C., Christensen L., Gorosabel J., Milvang-Jensen B., Schulze S., et al., 2012, A&A, 548, A11. doi:10.1051/0004-6361/201219894
[de Ugarte Postigo et al.2014]deUgarte2014 de Ugarte Postigo A., Blazek M., Janout P., Sprimont P., Thöne C. C., Gorosabel J., Sánchez-Ramírez R., 2014, SPIE, 9152, 91520B. doi:10.1117/12.2055774
[de Ugarte Postigo et al.2021]30392 de Ugarte Postigo A., Kann D. A., Thoene C., Blazek M., Agui Fernandez J. F., Fynbo J. P. U., Izzo L., et al., 2021, GCN, 30392
[Dichiara et al.2021]30383 Dichiara S., Troja E., Butler N., Watson A. M., Becerra R. L., Kutyrev A., Lee W. H., et al., 2021, GCN, 30383
[Dichiara et al.2021]Dichiara2021 Dichiara S., Troja E., Lipunov V., Ricci R., Oates S. R., Butler N. R., Liuzzo E., et al., 2021, arXiv, arXiv:2111.14861
[Dimple et al.2022]Dimple2022 Dimple, Misra K., Ghosh A., Arun K. G., Gupta R., Kumar A., Resmi L., et al., 2022, arXiv, arXiv:2202.01191. doi:10.48550/arXiv.2202.01191
[Drout et al.2017]Drout17 Drout M. R., Piro A. L., Shappee B. J., Kilpatrick C. D., Simon J. D., Contreras C., Coulter D. A., et al., 2017, Sci, 358, 1570. doi:10.1126/science.aaq0049
[Eichler et al.1989]Eichler1989 Eichler D., Livio M., Piran T., Schramm D. N., 1989, Natur, 340, 126. doi:10.1038/340126a0
[Evans et al.2009]Evans2009 Evans P. A., Beardmore A. P., Page K. L., Osborne J. P., O'Brien P. T., Willingale R., Starling R. L. C., et al., 2009, MNRAS, 397, 1177. doi:10.1111/j.1365-2966.2009.14913.x
[Evans et al.2017]Evans17 Evans P. A., Cenko S. B., Kennea J. A., Emery S. W. K., Kuin N. P. M., Korobkin O., Wollaeger R. T., et al., 2017, Sci, 358, 1565. doi:10.1126/science.aap9580
[Evans & Swift Team2021]30374 Evans P. A., Swift Team, 2021, GCN, 30374
[Fong, Berger, & Fox2010]Fong2010 Fong W., Berger E., Fox D. B., 2010, ApJ, 708, 9. doi:10.1088/0004-637X/708/1/9
[Fong & Rastinejad2021]30445 Fong W., Rastinejad J., 2021, GCN, 30445
[Fraija2015]Fraija2015 Fraija N., 2015, ApJ, 804, 105. doi:10.1088/0004-637X/804/2/105
[Fryer, Burrows, & Benz1998]Fryer1998 Fryer C., Burrows A., Benz W., 1998, ApJ, 496, 333. doi:10.1086/305348
[Fryer, Hungerford, & Young2007]Fryer2007 Fryer C. L., Hungerford A. L., Young P. A., 2007, ApJL, 662, L55. doi:10.1086/519523
[Fynbo et al.2009]Fynbo2009 Fynbo J. P. U., Jakobsson P., Prochaska J. X., Malesani D., Ledoux C., de Ugarte Postigo A., Nardini M., et al., 2009, ApJS, 185, 526. doi:10.1088/0067-0049/185/2/526
[Galama et al.1998]Galama1998 Galama T. J., Vreeswijk P. M., van Paradijs J., Kouveliotou C., Augusteijn T., Böhnhardt H., Brewer J. P., et al., 1998, Nature, 395, 670. doi:10.1038/27150
[Garcia-Cifuentes al.2023]Garcia-Cifuentes2023 Garcia-Cifuentes, K., Becerra R. L., De Colle F., Cabrera J. I., del Burgo, C. 2023, ApJ, submitted
[Gehrels et al.2005]Gehrels2005 Gehrels N., Sarazin C. L., O'Brien P. T., Zhang B., Barbier L., Barthelmy S. D., Blustin A., et al., 2005, Natur, 437, 851. doi:10.1038/nature04142
[Gehrels et al.2006]Gehrels2006 Gehrels N., Norris J. P., Barthelmy S. D., Granot J., Kaneko Y., Kouveliotou C., Markwardt C. B., et al., 2006, Natur, 444, 1044. doi:10.1038/nature05376
[Gehrels & Razzaque2013]Gehrels2013 Gehrels N., Razzaque S., 2013, FrPhy, 8, 661. doi:10.1007/s11467-013-0282-3
[Giacomazzo, Rezzolla, & Stergioulas2011]Giacomazzo2011 Giacomazzo B., Rezzolla L., Stergioulas N., 2011, PhRvD, 84, 024022. doi:10.1103/PhysRevD.84.024022
[Gonzaga et al.2012]Gonzaga2012 Gonzaga S., Hack W., Fruchter A., Mack J., 2012, drzp.book
[Granot & Sari2002]Granot2002 Granot J., Sari R., 2002, ApJ, 568, 820. doi:10.1086/338966
[Grossman et al.2014]Grossman2014 Grossman D., Korobkin O., Rosswog S., Piran T., 2014, MNRAS, 439, 757. doi:10.1093/mnras/stt2503
[Hakkila et al.2018]Hakkila+18smoke Hakkila J., Lesage S., McAfee S., Hofesmann E., Maly Taylor C., Cannon T., 2018, ApJ, 863, 77. doi:10.3847/1538-4357/aad335
[Hjorth & Bloom2012]Hjorth2012 Hjorth J., Bloom J. S., 2012, grb..book, 169
[Ho et al.(2020)]Ho2020 Ho, A. Y. Q., Perley, D. A., Kulkarni, S. R., et al. 2020, , 895, 49. doi:10.3847/1538-4357/ab8bcf
[Hosseinzadeh et al.2017]Hosseinzadeh2017 Hosseinzadeh G., Arcavi I., Valenti S., McCully C., Howell D. A., Johansson J., Sollerman J., et al., 2017, ApJ, 836, 158. doi:10.3847/1538-4357/836/2/158
[Johnson et al.2019]Johnson2019 Johnson B. D., Leja J. L., Conroy C., Speagle J. S., 2019, ascl.soft
[Kashikawa et al.2004]Kashikawa2004 Kashikawa N., Shimasaku K., Yasuda N., Ajiki M., Akiyama M., Ando H., Aoki K., et al., 2004, PASJ, 56, 1011. doi:10.1093/pasj/56.6.1011
[Kann et al.2021]30391 Kann D. A., de Ugarte Postigo A., Thoene C., Blazek M., Agui Fernandez J. F., Martin-Fernandez P., 2021, GCN, 30391
[Kann et al.2021]30401 Kann D. A., de Ugarte Postigo A., Thoene C., Blazek M., Agui Fernandez J. F., Maicas N., Lamadrid (COAJ J. L., 2021, GCN, 30401
[Kann et al.2021]30443 Kann D. A., Izzo L., Galindo Guil F. J., Kasikov A., 2021, GCN, 30443
[Kim et al.2021]30384 Kim V., Pozanenko A., Krugov M., Belkin S., Pankov N., IKI FuN G., 2021, GCN, 30384
[King, Olsson, & Davies2007]King2007 King A., Olsson E., Davies M. B., 2007, MNRAS, 374, L34. doi:10.1111/j.1745-3933.2006.00259.x
[Kouveliotou, et al.1993]Kouveliotou93 Kouveliotou C., et al., 1993, ApJL, 413, L101
[Kumar & Piran2000]Kumar2000 Kumar P., Piran T., 2000, ApJ, 532, 286. doi:10.1086/308537
[Kunzweiler et al.2021]30369 Kunzweiler F., Biltzinger B., Berlato F., Burgess J., Greiner J., 2021, GCN, 30369
[Le Fèvre et al.2004]LeFevre2004 Le Fèvre O., Vettolani G., Paltani S., Tresse L., Zamorani G., Le Brun V., Moreau C., et al., 2004, A&A, 428, 1043. doi:10.1051/0004-6361:20048072
[Lee & Ramirez-Ruiz2007]Lee2007 Lee W. H., Ramirez-Ruiz E., 2007, NJPh, 9, 17. doi:10.1088/1367-2630/9/1/017
[Levan et al.2006]Levan2006 Levan A. J., Wynn G. A., Chapman R., Davies M. B., King A. R., Priddey R. S., Tanvir N. R., 2006, MNRAS, 368, L1. doi:10.1111/j.1745-3933.2006.00144.x
[Levan et al.2021]30381 Levan A. J., Campana S., Kann D. A., D'Avanzo P., 2021, GCN, 30381
[Levesque2014]Levesque2014 Levesque E. M., 2014, PASP, 126, 1. doi:10.1086/674531
[Lyutikov & Toonen2019]LyutikovToonen2019 Lyutikov M., Toonen S., 2019, MNRAS, 487, 5618. doi:10.1093/mnras/stz1640
[MacFadyen & Woosley1999]MacFadyen1999ApJ MacFadyen A. I., Woosley S. E., 1999, ApJ, 524, 262. doi:10.1086/307790
[Malacaria, Meegan, & Fermi GBM Team2021]30380 Malacaria C., Meegan C., Fermi GBM Team, 2021, GCN, 30380
[Mazzali et al.2006]Mazzali2006 Mazzali P. A., Deng J., Nomoto K., Sauer D. N., Pian E., Tominaga N., Tanaka M., et al., 2006, Natur, 442, 1018. doi:10.1038/nature05081
[McCracken et al.2003]McCracken2003 McCracken H. J., Radovich M., Bertin E., Mellier Y., Dantel-Fort M., Le Fèvre O., Cuillandre J. C., et al., 2003, A&A, 410, 17. doi:10.1051/0004-6361:20031081
[Mendel et al.2014]Mendel2014 Mendel J. T., Simard L., Palmer M., Ellison S. L., Patton D. R., 2014, ApJS, 210, 3
[Metcalfe et al.2001]Metcalfe2001 Metcalfe N., Shanks T., Campos A., McCracken H. J., Fong R., 2001, MNRAS, 323, 795. doi:10.1046/j.1365-8711.2001.04168.x
[Minaev & Pozanenko2020]Minaev2020 Minaev P. Y., Pozanenko A. S., 2020, MNRAS, 492, 1919. doi:10.1093/mnras/stz3611
[Minaev et al.2021a]30444 Minaev, Pozanenko, Chelovekov, Grebenev, GRB IKI FuN, 2021, GCN, 30444
[Minaev et al.2021b]30452 Minaev P., Pozanenko A., Chelovekov I., Grebenev S., GRB IKI FuN, 2021, GCN, 30452
[Mirabal et al.2006]Mirabal2006 Mirabal N., Halpern J. P., An D., Thorstensen J. R., Terndrup D. M., 2006, ApJL, 643, L99. doi:10.1086/505177
[Miyazaki et al.2018]Miyazaki2018 Miyazaki S., Komiyama Y., Kawanomoto S., Doi Y., Furusawa H., Hamana T., Hayashi Y., et al., 2018, PASJ, 70, S1. doi:10.1093/pasj/psx063
[Moss et al.2022]Moss2022 Moss M., Lien A., Guiriec S., Cenko S. B., Sakamoto T., 2022, ApJ, 927, 157. doi:10.3847/1538-4357/ac4d94
[Nakar & Piran(2017)]nakar17 Nakar, E. & Piran, T. 2017, , 834, 28. doi:10.3847/1538-4357/834/1/28
[Narayan, Paczynski, & Piran1992]Narayan1992 Narayan R., Paczynski B., Piran T., 1992, ApJL, 395, L83. doi:10.1086/186493
[Norris, Marani, & Bonnell2000]Norris2000 Norris J. P., Marani G. F., Bonnell J. T., 2000, ApJ, 534, 248. doi:10.1086/308725
[Norris2002]Norris2002 Norris J. P., 2002, ApJ, 579, 386. doi:10.1086/342747
[O'Connor, Beniamini, & Kouveliotou2020]OConnor2020 O'Connor B., Beniamini P., Kouveliotou C., 2020, MNRAS, 495, 4782. doi:10.1093/mnras/staa1433
[O'Connor et al.2021]OConnor2021 O'Connor B., Troja E., Dichiara S., Chase E. A., Ryan G., Cenko S. B., Fryer C. L., et al., 2021, MNRAS, 502, 1279. doi:10.1093/mnras/stab132
[O'Connor et al.2021]30451
O'Connor, B., Troja, E., Zack, E., Dichiara, S., Gatkine, P., Durbak J. M., Cenko, S. B., Kutyrev, A., & Veilleux, S. 2021, GCN, 30451
[O'Connor et al.2022]OConnor2022 O'Connor B., Troja E., Dichiara S., Beniamini P., Cenko S. B., Kouveliotou C., González J. B., et al., 2022, MNRAS.tmp. doi:10.1093/mnras/stac1982
[O'Connor et al.2023]OConnor2023 O'Connor B., Troja E., Ryan G., Beniamini P., van Eerten H., Granot J., Dichiara S., et al., 2023, arXiv, arXiv:2302.07906. doi:10.48550/arXiv.2302.07906
[Page et al.2006]Page2006 Page K. L., King A. R., Levan A. J., O'Brien P. T., Osborne J. P., Barthelmy S. D., Beardmore A. P., et al., 2006, ApJL, 637, L13. doi:10.1086/500430
[Palmerio, et al.2019]Palmerio2019 Palmerio J. T., et al., 2019, A&A, 623, A26
[Pankov et al.2021]30440 Pankov N., Belkin S., Kim V., Pozanenko A., Krugov M., GRB IKI FuN, 2021, GCN, 30440
[Pastorello et al.2010]Pastorello2010 Pastorello A., Smartt S. J., Botticella M. T., Maguire K., Fraser M., Smith K., Kotak R., et al., 2010, ApJL, 724, L16. doi:10.1088/2041-8205/724/1/L16
[Perley et al.2019]Perley2019 Perley D. A., Mazzali P. A., Yan L., Cenko S. B., Gezari S., Taggart K., Blagorodnova N., et al., 2019, MNRAS, 484, 1031. doi:10.1093/mnras/sty3420
[Perley et al.2021]Perley2021 Perley D. A., Ho A. Y. Q., Yao Y., Fremling C., Anderson J. P., Schulze S., Kumar H., et al., 2021, MNRAS, 508, 5138. doi:10.1093/mnras/stab2785
[Planck Collaboration et al.2014]Planck2014 Planck Collaboration, Ade P. A. R., Aghanim N., Alves M. I. R., Armitage-Caplan C., Arnaud M., Ashdown M., et al., 2014, A&A, 571, A1. doi:10.1051/0004-6361/201321529
[Poolakkil et al.2021]Poolakkil2021 Poolakkil S., Preece R., Fletcher C., Goldstein A., Bhat P. N., Bissaldi E., Briggs M. S., et al., 2021, ApJ, 913, 60. doi:10.3847/1538-4357/abf24d
[Prasad et al.2021]30378 Prasad V., Sawant P., Waratkar G., Vibhute A., Bhalerao V., Bhattacharya D., Rao A. R., et al., 2021, GCN, 30378
[Qin et al.2013]Qin2013 Qin Y., Liang E.-W., Liang Y.-F., Yi S.-X., Lin L., Zhang B.-B., Zhang J., et al., 2013, ApJ, 763, 15. doi:10.1088/0004-637X/763/1/15
[Rastinejad et al.2021]Rastinejad2021 Rastinejad J. C., Fong W., Kilpatrick C. D., Paterson K., Tanvir N. R., Levan A. J., Metzger B. D., et al., 2021, ApJ, 916, 89. doi:10.3847/1538-4357/ac04b4
[Rastinejad et al.2021]30433 Rastinejad J., Levan A., Fong W., Tanvir N. R., Rouco Escorial A., 2021, GCN, 30433
[Richardson et al.2014]Richardson2014 Richardson D., Jenkins R. L., Wright J., Maddox L., 2014, AJ, 147, 118. doi:10.1088/0004-6256/147/5/118
[Richmond et al.1996]Richmon1996 Richmond M. W., van Dyk S. D., Ho W., Peng C. Y., Paik Y., Treffers R. R., Filippenko A. V., et al., 1996, AJ, 111, 327. doi:10.1086/117785
[Ridnaia et al.2021]30388 Ridnaia A., Frederiks D., Golenetskii S., Lysenko A., Svinkin D., Tsvetkova A., Ulanov M., et al., 2021, GCN, 30388
[Rosswog & Ramirez-Ruiz2002]Rosswog2002 Rosswog S., Ramirez-Ruiz E., 2002, MNRAS, 336, L7. doi:10.1046/j.1365-8711.2002.05898.x
[Rueda et al.2018]Rueda2018 Rueda J. A., Ruffini R., Wang Y., Aimuratov Y., Barres de Almeida U., Bianco C. L., Chen Y. C., et al., 2018, JCAP, 2018, 006. doi:10.1088/1475-7516/2018/10/006
[Ruffert & Janka1998]Ruffert1998 Ruffert M., Janka H.-T., 1998, A&A, 338, 535
[Salafia et al.2021]Salafia2021 Salafia O. S., Ravasio M. E., Yang J., An T., Orienti M., Ghirlanda G., Nava L., et al., 2021, arXiv, arXiv:2106.07169
[Sari, Piran, & Narayan1998]Sari1998 Sari R., Piran T., Narayan R., 1998, ApJL, 497, L17. doi:10.1086/311269
[Savaglio, Glazebrook, & Le Borgne2009]Savaglio09 Savaglio S., Glazebrook K., Le Borgne D., 2009, ApJ, 691, 182. doi:10.1088/0004-637X/691/1/182
[Schlegel, Finkbeiner, & Davis1998]Schlegel1998 Schlegel D. J., Finkbeiner D. P., Davis M., 1998, ApJ, 500, 525. doi:10.1086/305772
[Sharon & Kushnir2020]SharonKushnir2020 Sharon A., Kushnir D., 2020, ApJ, 894, 146. doi:10.3847/1538-4357/ab8a31
[Speagle2020]dynesty Speagle J. S., 2020, MNRAS, 493, 3132.
[Sun et al.2021]30411 Sun T.-R., Hu Y.-D., Fernandez-Garcia E., Caballero-Garcia A. J. C.-T. M. D., Castro Tirado M. A., Martin-Fernandez P., 2021, GCN, 30411
[Tanvir et al.2013]Tanvir13 Tanvir N. R., Levan A. J., Fruchter A. S., Hjorth J., Hounsell R. A., Wiersema K., Tunnicliffe R. L., 2013, Natur, 500, 547. doi:10.1038/nature12505
[Toba et al.2014]Toba2014 Toba Y., Oyabu S., Matsuhara H., Malkan M. A., Gandhi P., Nakagawa T., Isobe N., et al., 2014, ApJ, 788, 45. doi:10.1088/0004-637X/788/1/45
[Troja et al.2008]Troja2008 Troja E., King A. R., O'Brien P. T., Lyons N., Cusumano G., 2008, MNRAS, 385, L10. doi:10.1111/j.1745-3933.2007.00421.x
[Troja et al.2012]Troja2012 Troja E., Sakamoto T., Guidorzi C., Norris J. P., Panaitescu A., Kobayashi S., Omodei N., et al., 2012, ApJ, 761, 50. doi:10.1088/0004-637X/761/1/50
[Troja et al.2019]Troja2019 Troja E., Castro-Tirado A. J., Becerra González J., Hu Y., Ryan G. S., Cenko S. B., Ricci R., et al., 2019, MNRAS, 489, 2104. doi:10.1093/mnras/stz2255
[Troja et al.2021]30390 Troja E., Butler N., Watson A. M., Kutyrev A., Lee W. H., Richer M. G., Fox O., et al., 2021, GCN, 30390
[Troja et al.2022]Troja2022 Troja E., Fryer C. L., O'Connor B., Ryan G., Dichiara S., Kumar A., Ito N., et al., 2022, Natur, 612, 228. doi:10.1038/s41586-022-05327-3
[Troja, Watson, & O'Connor2021]30442 Troja E., Watson A., O'Connor B., 2021, GCN, 30442
[Tundo et al.2012]Tundo2012 Tundo E., Moretti A., Tozzi P., Teng L., Rosati P., Tagliaferri G., Campana S., 2012, A&A, 547, A57. doi:10.1051/0004-6361/201219038
[Tunnicliffe et al.2014]Tunnicliffe2014 Tunnicliffe R. L., Levan A. J., Tanvir N. R., Rowlinson A., Perley D. A., Bloom J. S., Cenko S. B., et al., 2014, MNRAS, 437, 1495. doi:10.1093/mnras/stt1975
[Ukwatta et al.2010]Ukwatta+10lag Ukwatta T. N., Stamatikos M., Dhuga K. S., Sakamoto T., Barthelmy S. D., Eskandarian A., Gehrels N., et al., 2010, ApJ, 711, 1073. doi:10.1088/0004-637X/711/2/1073
[Ursi et al.2021]30372 Ursi A., Pittori C., Verrecchia F., Tavani M., Argan A., Cardillo M., Casentini C., et al., 2021, GCN, 30372
[Valenti et al.2008]Valenti2008 Valenti S., Benetti S., Cappellaro E., Patat F., Mazzali P., Turatto M., Hurley K., et al., 2008, MNRAS, 383, 1485. doi:10.1111/j.1365-2966.2007.12647.x
[Villar et al.2017]Villar2017 Villar V. A., Guillochon J., Berger E., Metzger B. D., Cowperthwaite P. S., Nicholl M., Alexander K. D., et al., 2017, ApJL, 851, L21. doi:10.3847/2041-8213/aa9c84
[Vinkó et al.2015]Vinko2015 Vinkó J., Yuan F., Quimby R. M., Wheeler J. C., Ramirez-Ruiz E., Guillochon J., Chatzopoulos E., et al., 2015, ApJ, 798, 12. doi:10.1088/0004-637X/798/1/12
[Volnova et al.2021]30465 Volnova A., Moskvitin A., Pozanenko A., Pankov N., Belkin S., IKI FuN G., 2021, GCN, 30465
[Watson et al.2021]30436 Watson A. M., Troja E., Becerra R. L., Sánchez R., Thakur A., Dichiara S., Butler N., et al., 2021, GCN, 30436
[Williams et al.2023]Williams2023 Williams M. A., Kennea J. A., Dichiara S., Kobayashi K., Iwakiri W. B., Beardmore A. P., Evans P. A., et al., 2023, arXiv, arXiv:2302.03642. doi:10.48550/arXiv.2302.03642
[Wollaeger et al.2021]Wollaeger2021 Wollaeger R. T., Fryer C. L., Chase E. A., Fontes C. J., Ristic M., Hungerford A. L., Korobkin O., et al., 2021, ApJ, 918, 10. doi:10.3847/1538-4357/ac0d03
[Woosley1993]Woosley1993 Woosley S. E., 1993, ApJ, 405, 273. doi:10.1086/172359
[Woosley & Bloom2006]Woosley2006 Woosley S. E., Bloom J. S., 2006, ARA&A, 44, 507. doi:10.1146/annurev.astro.43.072103.150558
[Yang et al.2022]Yang2022 Yang J., Ai S., Zhang B.-B., Zhang B., Liu Z.-K., Wang X. I., Yang Y.-H., et al., 2022, Natur, 612, 232. doi:10.1038/s41586-022-05403-8
[Zemp, Ramirez-Ruiz, & Diemand2009]Zemp2009 Zemp M., Ramirez-Ruiz E., Diemand J., 2009, ApJL, 705, L186. doi:10.1088/0004-637X/705/2/L186
[Zhang et al.2021]Zhang2021 Zhang B.-B., Liu Z.-K., Peng Z.-K., Li Y., Lü H.-J., Yang J., Yang Y.-S., et al., 2021, NatAs, 5, 911. doi:10.1038/s41550-021-01395-z
[Greiner et al.2015]Greiner2015 Greiner J., Mazzali P. A., Kann D. A., Krühler T., Pian E., Prentice S., Olivares E. F., et al., 2015, Natur, 523, 189. doi:10.1038/nature14579
|
http://arxiv.org/abs/2303.07023v1
|
20230313114107
|
Strong, weak or no balance? Testing structural hypotheses against real networks
|
[
"Anna Gallo",
"Diego Garlaschelli",
"Renaud Lambiotte",
"Fabio Saracco",
"Tiziano Squartini"
] |
physics.soc-ph
|
[
"physics.soc-ph",
"physics.data-an"
] |
IMT School for Advanced Studies, Piazza San Francesco 19, 55100 Lucca (Italy)
INdAM-GNAMPA Istituto Nazionale di Alta Matematica (Italy)
IMT School for Advanced Studies, Piazza San Francesco 19, 55100 Lucca (Italy)
INdAM-GNAMPA Istituto Nazionale di Alta Matematica (Italy)
Lorentz Institute for Theoretical Physics, University of Leiden, Niels Bohrweg 2, 2333 CA Leiden (The Netherlands)
Mathematical Institute, University of Oxford, Woodstock Road, OX2 6GG Oxford (United Kingdom)
`Enrico Fermi' Research Center (CREF), Via Panisperna 89A, 00184 Rome (Italy)
Institute for Applied Computing `Mauro Picone' (IAC), National Research Council, Via dei Taurini 19, 00185 Rome (Italy)
IMT School for Advanced Studies, Piazza San Francesco 19, 55100 Lucca (Italy)
IMT School for Advanced Studies, Piazza San Francesco 19, 55100 Lucca (Italy)
INdAM-GNAMPA Istituto Nazionale di Alta Matematica (Italy)
Institute for Advanced Study, University of Amsterdam, Oude Turfmarkt 145, 1012 GC Amsterdam (The Netherlands)
The abundance of data about social, economic and political relationships has opened an era in which social theories can be tested against empirical evidence, allowing human behaviour to be analyzed just as any other natural phenomenon. The present contribution focuses on balance theory, stating that social agents tend to avoid the formation of `unbalanced', or `frustrated', cycles, i.e. cycles with an odd number of negative links. Such a statement can be made statistically rigorous only after a comparison with a null model. Since the existing ones cannot account for the heterogeneity of individual actors, we, first, extend the Exponential Random Graphs framework to binary, undirected, signed networks with local constraints and, then, employ both homogeneous and heterogeneous benchmarks to compare the empirical abundance of short cycles with its expected value, on several, real-world systems. What emerges is that the level of balance in real-world networks crucially depends on (at least) three factors, i.e. the measure adopted to quantify it, the nature of the data, the null model employed for the analysis. As an example, the study of triangles reveals that homogeneous null models with global constraints tend to favour the weak version of balance theory, according to which only the triangle with one negative link should be under-represented in real, social and political networks; on the other hand, heterogeneous null models with local constraints tend to favour the strong version of balance theory, according to which also the triangle with all negative links should be under-represented in real, social networks. Biological networks, instead, are found to be significantly frustrated under any benchmark considered here.
89.75.Fb; 89.65.-s; 02.50.Tt
Strong, weak or no balance? Testing structural hypotheses against real networks
Tiziano Squartini
March 30, 2023
===============================================================================
§ I. INTRODUCTION
Network theory has emerged as a powerful framework to model many different kinds of real-world systems, by representing their units as nodes and the interactions between them as links. Out of the many types of edges that have been considered so far, the signed one has recently seen its popularity revived <cit.>: the importance of the signed character of links lies in the possibility it offers to model positive as well as negative social interactions.
From an historical perspective, the interest in the study of signed networks is rooted into the so-called balance theory (BT), firstly proposed by Heider <cit.> and further developed by Cartwright and Harary. The choice, pursued by the latter ones, of adopting signed graphs to model it led to the birth of the so-called structural balance theory <cit.> which has not only found application in the study of human relationships but also in that of biological, ecological and economic systems <cit.>.
BT deals with the concept of balance: a complete, signed graph is said to be balanced if all its triads have an even number of negative edges, i.e. either zero (in this case, the three edges are all positive) or two (see Fig. <ref>). Informally speaking, the BT formalizes the principles `the friend of my friend is my friend' and `the enemy of my enemy is my friend'. Remarkably, the definition above leads to the so-called structure theorem, stating that a complete, signed graph is balanced if and only if its set of nodes can be partitioned into two, disjoint subsets whose intra-modular links are all positive and whose inter-modular links are all negative. In <cit.>, Cartwright and Harary extended the definition of balance to incomplete graphs, by including cycles whose length is larger than three: a (connected) network is said to be balanced when all cycles are positive, i.e. contain an even number of negative edges. Taken altogether, the results above constitute the so-called strong balance theory (SBT).
The framework of SBT has been extended by Davis in <cit.> where the concept of k-balanced networks is introduced: according to it, signed graphs whose set of nodes can be partitioned into k disjoint subsets with positive, intra-modular links and negative, inter-modular links are balanced. This generalized definition of balance leads to the formulation of the weak balance theory (WBT); according to it, the triad with all negative edges is balanced, since each node constitutes a group on its own and the links between these single-node clusters are negative (see Fig. <ref>).
Several metrics to decide if signed networks are strongly or weakly balanced have been proposed. In <cit.>, the degree of balance of a network is quantified by the number of edges that need to be removed, or whose sign must be reversed, in order to obtain a network each cycle of which has an even number of negative links; in <cit.>, it is quantified by the number of balanced, closed walks (i.e. closed walks with an even number of negative links) that are present in the network; in <cit.> an incomplete, signed network is deemed as balanced if it is possible to fill in all its missing links to obtain a complete, balanced graph according to the SBT; in <cit.>, the authors define three, different levels of balance: at the micro-scale, involving triads, at the meso-scale, involving larger subgraphs, and at the macro-scale, involving the entire network. Other approaches have been adopted in <cit.>, where the problem is studied from a spectral perspective, and in <cit.>, where the problem is studied by employing concepts borrowed from statistical physics (the authors assign each signed triad an energy, claiming that the networks at the `lowest temperature' are those whose triangles have no negative edges).
Other authors, instead, have focused on the complementary notion of balance, i.e. that of frustration, trying to quantify the extent to which signed networks are far from balance <cit.>: in <cit.>, the authors define the so-called balanced decomposition number, i.e. the (minimum) number of balanced groups into which nodes can be partitioned, and evaluate it by counting the (minimum) number of edges whose removal increases a network balance; in <cit.>, instead, the same index is evaluated by adopting the so-called switching signs method introduced in <cit.> and prescribing to count the (minimum) number of signs that must be reversed to balance a network; in <cit.>, the degree of (im)balance of a network is proxied by the magnitude of the smallest eigenvalue of the Laplacian matrix.
Empirical observations seem to point out that real-world, signed networks tend to be k-balanced, i.e. avoid establishing the patterns that are deemed as frustrated by the WBT: as an example, in <cit.>, the authors study a pair of online, social networks induced by the relationships between users, showing that their balance increases as the number of clusters into which nodes are partitioned is larger than two; in <cit.>, the authors notice that the weak formulation of the balance theory allows a better performance in predicting signs to be achieved.
Any measure of balance (or frustration) is not meaningful by itself: in order to perform a statistically sound analysis, its empirical value must be compared with the outcome of a properly defined benchmark model, i.e. a reference model preserving some of the network properties while randomizing everything else. The far most common null model for signed graphs is the one keeping the positions of edges fixed while shuffling their signs <cit.>; in <cit.>, the authors implement the canonical variant of the aforementioned exercise, assigning signs by means of a Bernoulli distribution; in <cit.>, the authors define a null model for randomizing both the presence and the sign of links. More complex null models have been proposed as well: in <cit.>, the authors implement the signed version of the Local Rewiring Algorithm (at each step, two edges with the same sign are selected and rewired, to preserve the total number of signed links that are incident to each node); its canonical variant is implemented in <cit.>, where the Balanced Signed Chung-Lu model (BSCL) is proposed - although it constrains also the average number of signed triangles each edge is part of. Finally, in <cit.>, the definition of models constraining the structural properties of signed networks has been explored within the framework of the Exponential Random Graphs (ERG).
Our contribution focuses on binary, undirected, signed networks, extending the ERG framework to include null models suitable for the analysis of signed graphs with `plus one', `minus one' and `zero' edges as well as those with just `plus one' and `minus one' edges. Afterwards, we employ them to inspect the statistical properties of the far most commonly studied patterns for this kind of analysis, i.e. triangles - the reasons behind this choice being, at least, two: 1) considering longer cycles is computationally expensive; 2) the contribution of short(er) cycles to frustration is argued to be more relevant than that of long(er) ones.
§ II. FORMALISM AND BASIC QUANTITIES
A signed graph is a graph where each edge can be positive, negative or missing. In what follows, however, we will focus on binary, undirected, signed networks: hence, each edge will be `plus one', `minus one' or `zero'. More formally, for any two nodes i and j, the corresponding entry of the adjacency matrix 𝐀 will be assumed to read a_ij=-1,0,+1 (with a_ij=a_ji, ∀ i<j). Since the total number of node-pairs is N(N-1)/2=N2 and any node-pair can be positively connected, negatively connected or disconnected, the total number of possible, binary, undirected, signed configurations (or, equivalently, the cardinality of the ensemble of binary, undirected, signed graphs) is |𝔸|=3^N2. To simplify the calculations, let us define the three functions of a generic entry, reading
a_ij^-=[a_ij=-1], a_ij^0=[a_ij=0], a_ij^+=[a_ij=+1]
where we have employed the Iverson's brackets notation (see Appendix A for more details): these new variables are mutually exclusive, i.e. {a_ij^-,a_ij^0,a_ij^+}={(1,0,0),(0,1,0),(0,0,1)}, sum to 1, i.e. a_ij^-+a_ij^0+a_ij^+=1, and induce the definition of the matrices 𝐀^+ and 𝐀^- (see Appendix A for more details).
The number of positive and negative links can be, respectively, defined as
L^+=∑_i=1^N∑_j=1
(j>i)^Na_ij^+ and L^-=∑_i=1^N∑_j=1
(j>i)^Na_ij^-;
analogously, the positive and negative degree of node i can be, respectively, defined as
k^+_i=∑_j=1
(j≠ i)^Na_ij^+ and k^-_i=∑_j=1
(j≠ i)^Na_ij^-
(naturally, 2L^+=∑_i=1^Nk_i^+ and 2L^-=∑_i=1^Nk_i^-). The advantage of adopting a definition based upon Iverson's brackets becomes evident when looking at the definitions above: each quantity is, now, computed on the corresponding, signed matrix whose entries are, by definition, positive; as a consequence, all quantities of interest are positive as well.
Let us, now, focus on the signed triads (see Fig. <ref>), i.e. the quantities representing the starting point to verify the (strong and weak versions of the) balance theory. According to the BT, a social system tends to arrange itself into a configuration satisfying the principles `the friend of my friend is my friend', `the friend of my enemy is my enemy', `the enemy of my friend is my enemy', `the enemy of my enemy is my friend' <cit.>: the SBT formalizes them by stating that the overall network balance increases with the number of triangles having an even number of negative edges (said to be balanced or `positive' since the product of the edge sings is a `plus') and decreases with the number of triangles having an odd number of negative edges (said to be unbalanced or `negative' since the product of the edge sings is a `minus'); the WBT, on the other hand, considers the triangle with all, negative edges balanced as well.
Upon considering that the row-by-column product of an arbitrary number of 𝐀^+ and 𝐀^- matrices allows us to count the abundance of closed walks whose signature matches the sequence of signs of the matrices - for example, the expression [𝐀^+𝐀^-𝐀^+]_ii counts the number of closed walks, whose length is 3 and whose signature is (+-+), starting from i and ending in i; the expression [𝐀^+𝐀^+𝐀^-𝐀^+]_ii=[(𝐀^+)^2𝐀^-𝐀^+]_ii counts the number of closed walks, whose length is 4 and whose signature is (++-+), starting from i and ending in i - the degree of balance of a network can be quantified upon calculating the abundance of (non-degenerate) triangles with an even number of negative links, i.e.
T^(+++) =1/3∑_i=1^NT^(+++)_i=Tr[(𝐀^+)^3]/6,
T^(+–) =1/2∑_i=1^NT^(+–)_i=Tr[𝐀^+(𝐀^-)^2]/2;
similarly, the degree of frustration of a network can be quantified upon calculating the abundance of (non-degenerate) triangles with an odd number of negative links, i.e.
T^(—) =1/3∑_i=1^NT^(—)_i=Tr[(𝐀^-)^3]/6,
T^(++-) =1/2∑_i=1^NT^(++-)_i=Tr[(𝐀^+)^2𝐀^-]/2;
(see Appendix B for more details).
The expressions provided above allow us to define several indices for quantifying the degree of balance of a network. According to the SBT, the total number of balanced patterns reads #_^sb=T^(+++)+T^(+–); equivalently, the total number of unbalanced patterns, according to the same variant of the BT, reads #_^su=T^(—)+T^(++-). Hence, the measure of `strong balance' reading
SBI=#_^sb/#_^sb+#_^su
remains naturally defined, as well as the measure of `strong frustration' reading SFI=1-SBI. On the other hand, the total number of balanced patterns, according to the WBT, reads #_^wb=T^(+++)+T^(+–)+T^(—) while the total number of unbalanced patterns, according to the same variant of the BT, reads #_^wu=T^(++-). Hence, the measure of `weak balance' reading
WBI=#_^wb/#_^wb+#_^wu
remains naturally defined, while the corresponding measure of `weak frustration' reads WFI=1-WBI.
The indices defined above quantify `unbalance' by measuring the abundance of locally frustrated patterns; one can define other indices of frustration, accounting for larger-scale structures: an example is provided by the `higher-order' frustration index reading
HOFI=L^+_∘+L^-_∙/L
and measuring the percentage of `misplaced' links, i.e. the total number of positive links between communities, L^+_∘, plus the total number of negative links within communities, L^-_∙, divided by the total number of links, L (the formalism is adapted from the one proposed in <cit.>).
§ III. RANDOMIZATION OF BINARY, UNDIRECTED, SIGNED GRAPHS
Let us, now, generalize the ERG framework to accommodate models for studying binary, undirected, signed graphs: we will follow the analytical approach introduced in <cit.>, and further developed in <cit.>, aimed at individuating the functional form of a probability distribution induced by a bunch of empirical properties to be preserved on average. The aforementioned approach prescribes to carry out a constrained maximization of Shannon entropy
S=-∑_𝐀∈𝔸P(𝐀)ln P(𝐀)
where the sum runs over the ensemble of |𝔸|=3^N2 binary, undirected, signed graphs a generic entry of which can assume the values -1, 0, +1.
In what follows, we will consider two classes of models, i.e. those keeping a network topology fixed and those letting the topology vary along with the edge signs: models belonging to the first class are better suited for studying systems where agents cannot choose `with whom' to interact but only `how', whereas models belonging to the second class are better suited for studying systems where agents can choose their neighbours as well <cit.>. Still, comparing the two types of recipes on the same configuration is instructive, as it allows the role played by signed constraints to be disentangled from the one played by non-signed constraints in shaping its structure.
§.§ Signed Random Graph Model
The Signed Random Graph Model (SRGM) is induced by the Hamiltonian
H(𝐀)=α L^+(𝐀)+β L^-(𝐀)
i.e. by the two, global constraints L^+(𝐀) and L^-(𝐀). According to the SRGM, each entry of a signed network is a random variable whose behaviour is described by the following finite scheme
a_ij∼[ -1 0 +1; p^- p^0 p^+ ] ∀ i<j
with
p^- ≡e^-β/1+e^-α+e^-β≡y/1+x+y,
p^+ ≡e^-α/1+e^-α+e^-β≡x/1+x+y
and p^0≡1-p^–p^+. In other words, a_ij obeys a generalized Bernoulli distribution whose probability coefficients are determined by the (Lagrange multipliers of the) imposed constraints (see Appendix C for more details): each positive link appears with probability p^+, each negative link appears with probability p^- and each missing link has a probability p^0.
In order to employ the SRGM for studying real-world networks, the parameters that define it need to be properly tuned: more specifically, one needs to ensure that ⟨ L^+⟩_SRGM=L^+(𝐀^*) and ⟨ L^-⟩_SRGM=L^-(𝐀^*), with the symbol 𝐀^* indicating the specific, empirical network under analysis. To this aim, one can maximize the likelihood function ℒ_SRGM(x,y)≡ln P_SRGM(𝐀^*|x,y) with respect to the unknown parameter(s) that define it <cit.>. Such a recipe leads us to find
p^+=2L^+(𝐀^*)/N(N-1), p^-=2L^-(𝐀^*)/N(N-1)
and p^0≡1-p^–p^+.
§.§ Signed Random Graph Model with fixed topology
The way the SRGM has been defined allows a network topological structure to vary along with the edge signs. A variant of the SRGM that keeps the topology of the network under analysis fixed while (solely) randomizing the edge signs is, however, definable. The Hamiltonian inducing it reads, again, H(𝐀)=α L^+(𝐀)+β L^-(𝐀) but the role of random variables is played by the entries of the adjacency matrix corresponding to the connected pairs of nodes, i.e. the ones for which |a_ij|=1. Each of them obeys the finite scheme
a_ij∼[ -1 +1; p^- p^+ ] ∀ i<j | |a_ij|=1
with
p^- ≡e^-β/e^-α+e^-β≡y/x+y,
p^+ ≡e^-α/e^-α+e^-β≡x/x+y;
in other words, each entry for which |a_ij|=1 obeys a Bernoulli distribution whose probability coefficients are determined by the (Lagrange multipliers of the) imposed constraints (see Appendix C for more details): each existing link is assigned a `plus one' with probability p^+ and a `minus one' with probability p^-.
The maximization of the likelihood function ℒ_SRGM-FT(x,y)≡ln P_SRGM-FT(𝐀^*|x,y) with respect to the unknown parameter(s) that define it leads us to find
p^+=L^+(𝐀^*)/L(𝐀^*), p^-=L^-(𝐀^*)/L(𝐀^*)
with L(𝐀^*) representing the (empirical) number of links characterizing the fixed topology under consideration.
Remarkably, the SRGM and the SRGM-FT are related via the simple expression
P_SRGM(𝐀)=P_RGM(𝐀)· P_SRGM-FT(𝐀)
involving the probability of the `usual' Random Graph Model (RGM) and stating that the probability of connecting any two nodes with, say, a positive link can be rewritten as the probability of connecting them with a link times the probability of assigning the latter a `plus one': in formulas, p^+_SRGM/p_RGM^+=p^+_SRGM-FT (see Appendix C for more details). Notice that if the network under analysis is completely connected, the SRGM and the SRGM-FT coincide.
Although the recipes implemented in <cit.> and <cit.> are similar in spirit to the SRGM and the SRGM-FT, the rigorous derivation of both models is provided here for the first time, together with the proof that the latter is nothing but the conditional version of the former.
§.§ Signed Configuration Model
The two, aforementioned versions of the SRGM are defined by constraints which are global in nature. Let us, now, consider a more refined null model, induced by constraints which, instead, are local.
The Signed Configuration Model (SCM) is induced by the Hamiltonian
H(𝐀)=∑_i=1^N[α_i k_i^+(𝐀)+β_i k_i^-(𝐀)]
i.e. by the two series of local constraints {k_i^+(𝐀)}_i=1^N and {k_i^-(𝐀)}_i=1^N. According to the SCM, each entry of a signed network is a random variable whose behaviour is described by the following finite scheme
a_ij∼[ -1 0 +1; p_ij^- p_ij^0 p_ij^+ ] ∀ i<j
with
p_ij^- ≡e^-(β_i+β_j)/1+e^-(α_i+α_j)+e^-(β_i+β_j)≡y_iy_j/1+x_ix_j+y_iy_j,
p_ij^+ ≡e^-(α_i+α_j)/1+e^-(α_i+α_j)+e^-(β_i+β_j)≡x_ix_j/1+x_ix_j+y_iy_j
and p_ij^0≡1-p_ij^–p_ij^+. In other words, a_ij obeys a generalized Bernoulli distribution whose probability coefficients are determined by the (Lagrange multipliers of the) imposed constraints (see Appendix C for more details): given any two nodes i and j, they are connected by a positive link with probability p_ij^+, by a negative link with probability p_ij^- and are disconnected with probability p_ij^0.
In order to tune the parameters defining the SCM to ensure that ⟨ k_i^+⟩_SCM=k_i^+(𝐀^*) and ⟨ k_i^-⟩_SCM=k_i^-(𝐀^*), ∀ i, let us maximize the likelihood function ℒ_SCM({x_i}_i=1^N,{y_i}_i=1^N)≡ln P_SCM(𝐀^*|{x_i}_i=1^N,{y_i}_i=1^N) with respect to the unknown parameter(s) that define it. Such a recipe leads us to find
k_i^+(𝐀^*) =∑_j=1
(j≠ i)^Nx_ix_j/1+x_ix_j+y_iy_j=⟨ k_i^+⟩ ∀ i,
k_i^-(𝐀^*) =∑_j=1
(j≠ i)^Ny_iy_j/1+x_ix_j+y_iy_j=⟨ k_i^-⟩ ∀ i
a system that can be solved only numerically, e.g. following the guidelines provided in <cit.> (see Appendix D for more details). Whenever x_i≪1 and y_i≪1, ∀ i, the `sparse-case' approximation of the SCM holds true and one can simplify the expressions of the probability coefficients, by rewriting them in a factorized fashion, i.e. p_ij^+≃ x_ix_j and p_ij^-≃ y_iy_j, ∀ i<j. Such a manipulation leads us to find
p_ij^+≃k_i^+(𝐀^*)k_j^+(𝐀^*)/2L^+(𝐀^*), p_ij^-≃k_i^-(𝐀^*)k_j^-(𝐀^*)/2L^-(𝐀^*)
a set of equations that is also known with the name of Signed Chung-Lu Model (SCLM).
The SCM has no precedents in the literature: while the model employed in <cit.> is microcanonical in nature, the variant considered in <cit.> is just an approximation of the proper, canonical one, whose derivation is provided here for the first time. Interestingly, the bipartite version of the SCM can be recovered as a special case of the Bipartite Score Configuration Model, proposed in <cit.>.
§.§ Signed Configuration Model with fixed topology
As for the SRGM, a variant of the SCM that keeps the topology of the network under analysis fixed while (solely) randomizing the signs of the edges can be defined. Again, its Hamiltonian reads H(𝐀)=∑_i=1^N[α_i k_i^+(𝐀)+β_i k_i^-(𝐀)] and the role of random variables is played by the entries of the adjacency matrix corresponding to connected pairs of nodes, i.e. the ones for which |a_ij|=1. Each of them obeys the finite scheme
a_ij∼[ -1 +1; p_ij^- p_ij^+ ] ∀ i<j | |a_ij|=1
with
p_ij^- ≡e^-(β_i+β_j)/e^-(α_i+α_j)+e^-(β_i+β_j)≡y_iy_j/x_ix_j+y_iy_j,
p_ij^+ ≡e^-(α_i+α_j)/e^-(α_i+α_j)+e^-(β_i+β_j)≡x_ix_j/x_ix_j+y_iy_j;
in other words, each entry for which |a_ij|=1 obeys a Bernoulli distribution whose probability coefficients are determined by the (Lagrange multipliers of the) imposed constraints (see Appendix C for more details): given any two, connected nodes i and j, their link is assigned a `plus one' with probability p_ij^+ and a `minus one' with probability p_ij^-.
The maximization of the likelihood function ℒ_SCM-FT({x_i}_i=1^N,{y_i}_i=1^N)≡ln P_SCM-FT(𝐀^*|{x_i}_i=1^N,{y_i}_i=1^N) with respect to the unknown parameter(s) that define it leads us to find
k_i^+(𝐀^*) =∑_j=1
(j≠ i)^Nx_ix_j/x_ix_j+y_iy_j=⟨ k_i^+⟩ ∀ i,
k_i^-(𝐀^*) =∑_j=1
(j≠ i)^Ny_iy_j/x_ix_j+y_iy_j=⟨ k_i^-⟩ ∀ i
(the formalism j≠ i is meant to indicate that the sums run over the connected pairs of nodes), a system that can be solved only numerically - again, along the guidelines provided in <cit.> (see Appendix D for more details).
Similarly to what has been observed for the SRGM and the SRGM-FT, the SCM and the SCM-FT are related via the simple expression
P_SCM(𝐀)=P_ICM(𝐀)· P_SCM-FT(𝐀)
involving the probability of a Configuration Model (CM) whose coefficients are `induced' by the ones of the SCM - whence the acronym: in formulas, (p_ij^+)_SCM/(p_ij^+)_ICM=(p_ij^+)_SCM/[(p_ij^+)_SCM+(p_ij^-)_SCM]=(p_ij^+)_SCM-FT, for any pair of nodes (see Appendix C for more details). Notice that if the network under analysis is completely connected, the SCM and the SCM-FT coincide.
The SCM-FT has no precedents in the literature: its derivation is provided here for the first time together with the proof that it is nothing but the conditional version of the SCM.
A summary of the null models introduced in the present section is provided in Table <ref>.
§ IV. RESULTS
Let us, now, employ our benchmarks to analyze a bunch of real-world networks (although many of them are induced by social relationships, we have also considered biological data).
The first dataset is the so-called `Correlates of Wars' (CoW) dataset <cit.>. It provides a picture of the international, political relationships across the years 1946-1997 and consists of 13 snapshots of 4 years each: a positive edge between any two countries indicates that they are allied, have a political agreement or are part of the same, governmental organization; conversely, a negative edge indicates that they are enemy, have a political disagreement or are part of different, governmental organizations (for more information about the CoW dataset, see <cit.>).
The second dataset collects information about the relationships among the ≃300.000 players of a massive multiplayer online game (MMOG) allowing users to experience alternative lives <cit.>. A positive edge between any two players indicates the existence of a friendship, an alliance, an economic relation; conversely, a negative edge indicates the existence of an enmity, a conflict, a fight. Since the network representing the MMOG dataset is directed, we have determined the signs of its undirected version by applying the following set of rules (allowing the total number of nodes to be preserved): +1·+1=+1; +1·-1=-1·+1=-1; -1·-1=-1; +1·0=0·+1=+1; -1·0=0·-1=-1.
Moreover, we have considered the networks collected in <cit.> and analyzed in <cit.>, i.e. three, gene-regulatory ones (GRNs - E. Coli, Macrophage, Epidermal Growth Factor Receptor), three, socio-political ones (SPNs - N.G.H. Tribes, Senate US, Monastery) and two, financial ones (FNs - Bitcoin Alpha and Bitcoin OTC).
For what concerns the GRNs, each node of them represents a gene, with positive links indicating activating connections and negative links indicating inhibiting connections. Specifically, E. Coli collects data about a transcriptional network of the bacterium Escherichia Coli; Macrophage collects data about a blood cell that eliminates substances such as cancer cells, cellular debris and microbes; Epidermal Growth Factor Receptor collects data about the protein that is responsible for cell division and survival in epidermal tissues.
For what concerns the SPNs, N.G.H. Tribes collects data about New Guinean Highland Tribes - here, a positive (negative) link denotes alliance (rivalry) - Monastery corresponds to the last frame of Sampson's data about the relationships between novices in a monastery <cit.> - here, a positive (negative) link indicates a positive (negative) interaction - and Senate US collects data about the members of the 108th US Senate Congress - here, a positive (negative) link indicates trust/similar political opinions (distrust/different political opinions).
Lastly, the FNs are `who-trust-whom' networks of Bitcoin traders on an online platform: a positive (negative) link indicates trust (distrust) between users <cit.>. The networks representing the FNs are weighted, directed ones: hence, after having binarized them by replacing each positive (negative) weight with a +1 (-1), we have made them undirected by applying the same rules adopted for the MMOG dataset.
From a purely empirical perspective, the vast majority of the networks considered here is characterized by a small link density c=2L/N(N-1) but a large percentage L^+/L of positive links. The connectance of the configurations constituting the CoW decreases from ≃0.2 to ≃0.1 and the percentage of positive links is steadily around ≃88%; on the other hand, the link density of the configurations constituting the MMOG is steadily around 0.003 and the percentage of positive links decreases from ≃98% to ≃60%. The GRNs have a link density ranging from ≃10^-3 to ≃10^-2 and a percentage of positive links ranging from ≃58% to ≃66%; the SPNs have the largest values of link density among the configurations in our basket, ranging from ≃0.3 to ≃0.5, and percentages of positive links ranging from ≃50% to ≃75%. Lastly, Bitcoin Alpha has a link density of ≃0.002 and a percentage of positive links of ≃90% while Bitcoin OTC has a link density of ≃0.001 and a percentage of positive links of ≃85%.
In order to test the validity of the balance theory in its two formulations, we need to compare the empirical abundance of the quantities defined in the previous sections with the one expected under (any of) our null models. To this aim, a very useful indicator is represented by the so-called z-score, reading z_m=[N_m(𝐀^*)-⟨ N_m⟩]/σ[N_m] where N_m(𝐀^*) is the empirical abundance of motif m as measured on 𝐀^*, ⟨ N_m⟩ is the expected abundance of motif m under the chosen null model and σ[N_m]=√(⟨ N_m^2⟩-⟨ N_m⟩^2) is the standard deviation of N_m under the same null model; z_m returns the number of standard deviations by which the empirical abundance of motif m differs from the expected one: a result |z_m|≤2 (|z_m|≤3) indicates that the empirical abundance of m is compatible with the one expected under the chosen null model at the 5% (1%) level of statistical significance; on the other hand, a result |z_m|>2 (|z_m|>3) indicates that the empirical abundance of m is not compatible with the one expected under the chosen null (at the aforementioned levels of statistical significance), which either under- or over-estimates it.
The calculation of our z-scores is carried out by numerically sampling the ensembles induced by our null models: as the entries of our adjacency matrix are treated as independent, random variables by each of them, the explicit generation of any 𝐀∈𝔸 can be carried out by drawing a real number u_ij∈ U[0,1] and posing a_ij=-1 if 0≤ u_ij≤ p_ij^-, a_ij=+1 if p_ij^-<u_ij<p_ij^-+p_ij^+ and a_ij=0 if p_ij^-+p_ij^+≤ u_ij≤ 1, ∀ i<j; in case we are considering models with fixed topology, the sampling algorithm becomes a_ij=-1 if 0≤ u_ij≤ p_ij^- and a_ij=+1 if p_ij^-<u_ij≤ 1, ∀ i<j.
As Fig. <ref> shows, the trends highlighted by the SRGM-FT support the WBT: in fact, the only, significantly over-estimated pattern is precisely the one deemed as frustrated by such a version of the BT whereas the empirical abundance of the triangle whose edges are all negative is always compatible with the one expected under such a null model; interestingly, also the empirical abundance of the triangle with two, negative edges is always compatible with the one expected under the SRGM-FT although its z-score is (basically always) smaller than the z-score of the purple motif. Conversely, the abundance of the triangle with three, positive edges is significantly under-estimated on both datasets.
The aforementioned results constitute the backbone of the narrative according to which the weak version of the BT is the one better supported by data <cit.>. A comparison with the trends highlighted by the SRGM, however, reveals such a conclusion to be only partially true: in fact, even if the pattern deemed as unbalanced by the WBT is often the one achieving the minimum z-score, some frustration persists once the topology is left to vary along with the edge signs. Again, the abundance of the triangle with three, positive edges is significantly under-estimated on both datasets - a tendency becoming more evident with time: when considering the CoW dataset, this result seems to mirror the increasingly peaceful environment established by world relationships; an analogous behaviour characterizes the triad with two, negative edges, on the MMOG dataset.
The results of our analysis on the SPNs lead to the same conclusion: as Fig. <ref> shows, the homogeneous null models (i.e. both the SRGM and the SRGM-FT) favour the WBT, by significantly over-estimating the pattern labeled as frustrated by it (i.e. the one corresponding to the triangle with a unique, negative link). Quite remarkably, biological networks show the opposite behaviour: in these cases, in fact, frustrated patterns are under-estimated by our homogeneous models, a result implying that the nodes belonging to the GRNs tend to arrange themselves into such configurations; even more remarkably, according to the SRGM-FT, they tend to avoid creating the triangular, balanced ones. Lastly, financial networks show a peculiar behaviour since their nodes avoid creating triangles with a unique, negative link but engage in significantly many triangles with all negative links.
The results of the analysis carried out in <cit.> suggest the SRGM-FT to be preferred to the SRGM as it provides a better explanation of empirical network structures. Fixing topology, however, does not represent the only solution to the problem: a viable alternative is that of considering a model such as the SCM, still letting the topology vary along with the edge signs but constraining a larger number of network properties. As Fig. <ref> shows, the predictions achieved under the SCM are much more accurate than the ones achieved under the SRGM: this is true for both datasets, as the z-scores decrease up to one order of magnitude; moreover, the empirical abundance of the triangular pattern with three, negative edges (one, negative edge) becomes fully compatible with the one predicted by the SCM, on the CoW dataset (on the MMOG dataset). Still, the motifs classified as balanced according to the SBT are always significantly under-estimated and the purple one is, now, significantly over-estimated on several snapshots of the MMOG dataset.
Interestingly, while the formation of triads with an odd number of negative links is strongly disfavoured according to the SCM-FT, the same benchmark under-estimates the number of triads with an even number of negative links, an evidence fully supporting the SBT; while this is particularly evident for the MMOG dataset, it holds true only for the first half of the CoW dataset, the second one confirming that such a system tend to be balanced in a very strict sense (i.e. only the triangular pattern with three, positive edges is systematically under-estimated).
The results of our analysis on the SPNs and FNs (see Fig. <ref>) let us conclude that both the SCM and the SCM-FT (i.e. the heterogeneous null models) allow for an overall better explanation of the empirical patterns to be obtained; still, the results concerning the identity of the significant ones are quite dataset-dependent. In fact, while homogeneous models favour the WBT on all datasets, heterogeneous models explain the abundance of the two, unbalanced motifs on the Monastery dataset while favouring the WBT on the N.G.H. Tribes dataset and the SBT on the Senate US, the Bitcoin Alpha and the Bitcoin OTC datasets. Financial networks keep showing a peculiar behaviour since the motif with all negative links is `more disfavoured' than the one with a unique, negative link. Again, biological networks behave differently: in these cases, in fact, frustrated patterns are largely under-estimated by any benchmark; even more so, according to both the SRGM-FT and the SCM-FT, the nodes belonging to the GRNs tend to avoid creating the balanced ones.
The conclusions supported by our null models can be (at least partially) reconciled once the evolution of the z-scores of the strong and weak balance indices are inspected: as Fig. <ref> shows, once the percentage of unbalanced motifs is considered, frustration is over-estimated by all benchmarks. For what concerns the CoW dataset, the SCM is the model performing best in reproducing (the evolution of) the SFI although it competes with the SCM-FT in reproducing (the evolution of) the WFI, on some snapshots. For what concerns the MMOG dataset, the SCM competes with the SRGM in reproducing (the evolution of) the WFI but is outperformed by both the SRGM and the SCM-FT in reproducing (the evolution of) the SFI. As already pointed out, biological networks are characterized by a non-trivial level of frustration, an evidence leading to the conclusion that their self-organization principles are markedly different from the ones shaping social networks.
§ IV. DISCUSSION
Several conclusions can be drawn from our analysis.
First, the validity of social theories such as the WBT and the SBT is both dataset-dependent and model-dependent: although each benchmark considered here over-estimates the percentage of frustrated patterns characterizing social networks (according to either variant of the balance theory), a more refined analysis reveals them to (strongly, in some cases) disagree on the specific kinds of motifs to be deemed as statistically significant.
Second, homogeneous benchmarks such as the SRGM and the SRGM-FT tend to favour the WBT, as the motif deemed as unbalanced by this variant of the theory is also the only one being significantly over-estimated by null models of the kind.
Third, heterogeneous benchmarks such as the SCM and the SCM-FT tend to favour the SBT; in fact, although the empirical patterns are, now, explained much better (the most accurate predictions are those provided by the SCM and concerning the SFI and the WFI), the observations which happen not to be explained by null models of the kind are related to the motifs deemed as unbalanced by the SBT, i.e. the ones with an odd number of negative links - interestingly enough, the triadic motif with just one, negative link attains a z-score which is sistematically smaller than the one attained by the triadic motif with three, negative links.
Fourth, according to either variant of the BT, frustration evaluated by means of the percentage of unbalanced motifs is over-estimated by any benchmark. The study of the HOFI, however, returns a quite different picture: in fact, as Fig. <ref> shows, algorithms that disregard the information provided by the edge signs depict networks whose level of mesoscopic frustration is quite large. To better illustrate this point, let us carry out a comparative analysis of the mesoscale, structural organization of the bunch of years of the CoW dataset covering the period 1986-1989. On the one hand, maximizing Newman's modularity reveals a structure with six modules (interestingly, USSR and USA, together with their allies, belong to different communities); still, the value of the HOFI attained by such a partition is HOFI≃0.13, i.e. one order of magnitude larger than the value of the HOFI output by the algorithm designed to minimize it and described in Appendix E (in words, the algorithm is fed with the number of modules output by modularity and partitions nodes in order to minimize the number of positive links between communities and the number of negative links within communities).
Interestingly, a more efficient way of recovering partitions with a lower level of frustration is that of running the Girvan-Newman (GN) algorithm <cit.> that ranks edges according to their betweenness and removes them in a top-down fashion. As it needs to be stopped when the desired number of modules is reached, it can be fed with the one output by modularity, i.e. six: upon doing so, the GN algorithm individuates a partition for which HOFI≃0.07. Such a result confirms the presence of correlations between purely structural and signed quantities (in fact, negative edges are among the ones with the largest values of betweenness centrality) that can be exploited to gain more insight about the organizing principles of signed networks.
§ V. CONCLUSIONS
Our work confirms that frustration is dependent on, at least, three factors: the measure adopted to quantify it, the nature of the data, the benchmark employed for the analysis.
Concerning the first and the second point, it is interesting to notice that whereas natural networks tend to establish a significantly large number of triadic relationships with an odd number of negative links, social networks do not. Still, the extent to which this happens crucially depends on the model employed as a benchmark: the presence of two pairs of alternative properties (homogeneous VS heterogeneous; free-topology VS fixed-topology) allows four, different models to be definable. Generally speaking, adopting fixed-topology benchmarks seems to enhance the detection of frustration with the corresponding, homogeneous (heterogeneous) variant favouring the WBT (SBT). The first part of such a conclusion is in line with other findings (e.g. the results in <cit.>, where the authors evaluate the statistical significance of all, signed triads under the SRGM-FT, concluding that the WBT frames empirical patterns better than the SBT); its second part, instead, is a novel result of the present contribution, which has pointed out the importance of model selection for testing social theories on real-world systems.
A behavioural explanation of the aforementioned results can be provided: agents that cannot choose with whom to interact but only `how' adopt a seemingly `intolerant' behaviour, strongly avoiding to engage in frustrated relationships; on the other hand, agents that are free to choose their neighbours seem to be more `tolerant', as they establish a significantly large number of patterns composed by entirely positive edges while accepting a potential, `residual' level of frustration.
At a structural level, the evidence that all z-scores provided by fixed-topology benchmarks are (in some cases, much) smaller than the ones provided by models letting the topology vary along with the edge signs suggests that shuffling the relatively few, negative links characterizing our datasets is enough to create (strongly disfavoured) structures that are unbalanced according to one of the variants of the BT.
When frustration is measured as the percentage of unbalanced triangles, instead, all models considered in the present paper over-estimate it; still, datasets exist whose level of frustration is perfectly compatible with that predicted by the SCM, i.e. once the tendency of single nodes to establish connections is accounted for: an example is provided by the CoW dataset, for which we find z_SFI≃ z_WFI≲ 0.
This is no longer true when non-local definitions of frustration are inspected: an example is provided by the HOFI which is not optimized alongside modularity. A similar conclusion is reached in <cit.> where authors analyze cycles of any length via a spectral approach, finding that real-world networks are far from balance at higher-order scales. In <cit.>, the authors find that the frustration of the Slashdot dataset is minimum when the number of communities is two, in agreement with the SBT, while the frustration of the Epinions dataset is minimum when the number of communities is larger than two, in agreement with the WBT; here, we find the HOFI of the bunch of years of the CoW dataset covering the period 1986-1989 to be minimum when the number of modules equals two, in agreement with the SBT (as confirmed by several runs of the algorithm described in Appendix E, carried out by imposing an increasing number of modules).
§ ACKNOWLEDGEMENTS
This work is supported by the European Union Horizon 2020 Program under the scheme `INFRAIA-01-2018-2019 - Integrating Activities for Advanced Communities', grant agreement n. 871042, `SoBigData++: European Integrated Infrastructure for Social Mining and Big Data Analytics'. DG acknowledges support from the Dutch Econophysics Foundation (Stichting Econophysics, Leiden, the Netherlands) and the Netherlands Organization for Scientific Research (NWO/OCW). RL acknowledges support from the EPSRC grants n. EP/V013068/1 and EP/V03474X/1. We also thank Michael Szell for sharing the Pardus dataset employed for the present analysis.
§ APPENDIX A.
REPRESENTING BINARY, UNDIRECTED, SIGNED NETWORKS
The three functions a_ij^-=[a_ij=-1], a_ij^0=[a_ij=0] and a_ij^+=[a_ij=+1] have been defined via the Iverson's brackets notation. Iverson's brackets work in a way that is reminiscent of the Heaviside step function, i.e. Θ[x]=[x>0]; in fact,
a_ij^-=[a_ij=-1]=
1, if a_ij=-1
0, if a_ij=0,+1
(i.e. a_ij^-=1 if a_ij<0 and zero otherwise),
a_ij^0=[a_ij=0]=
1, if a_ij=0
0, if a_ij=-1,+1
(i.e. a_ij^0=1 if a_ij=0 and zero otherwise),
a_ij^+=[a_ij=+1]=
1, if a_ij=+1
0, if a_ij=-1,0
(i.e. a_ij^+=1 if a_ij>0 and zero otherwise). The matrices 𝐀^+≡{a_ij^+}_i,j=1^N and 𝐀^-≡{a_ij^-}_i,j=1^N, thus, remain naturally defined.
§ APPENDIX B.
COUNTING TRIANGLES ON BINARY, UNDIRECTED, SIGNED NETWORKS
A well-known result states that the abundance of node-specific, unsigned triangles reads
2T_i =∑_j=1
(j≠ i)^N∑_k=1
(k≠ i,j)^Na_ija_jka_ki=[𝐀𝐀𝐀]_ii=[𝐀]^3_ii ∀ i;
let us, now, consider signed networks: the abundances of node-specific, signed triangles with an even number of negative links read
T_i^(+++) =∑_j=1
(j≠ i)^N∑_k=1
(k≠ i,j)^Na_ij^+a_jk^+a_ki^+/2=[𝐀^+𝐀^+𝐀^+]_ii/2=[𝐀^+]^3_ii/2 ∀ i,
T_i^(-+-) =∑_j=1
(j≠ i)^N∑_k=1
(k≠ i,j)^Na_ij^-a_jk^+a_ki^-/2=[𝐀^-𝐀^+𝐀^-]_ii/2 ∀ i,
T_i^(+–) =∑_j=1
(j≠ i)^N∑_k=1
(k≠ i,j)^Na_ij^+a_jk^-a_ki^-=[𝐀^+𝐀^-𝐀^-]_ii=[𝐀^+(𝐀^-)^2]_ii ∀ i,
T_i^(–+) =∑_j=1
(j≠ i)^N∑_k=1
(k≠ i,j)^Na_ij^-a_jk^-a_ki^+=[𝐀^-𝐀^-𝐀^+]_ii=[(𝐀^-)^2𝐀^+]_ii ∀ i
while the abundances of node-specific, signed triangles with an odd number of negative links read
T_i^(—) =∑_j=1
(j≠ i)^N∑_k=1
(k≠ i,j)^Na_ij^-a_jk^-a_ki^-/2=[𝐀^-𝐀^-𝐀^-]_ii/2=[𝐀^-]^3_ii/2 ∀ i,
T_i^(+-+) =∑_j=1
(j≠ i)^N∑_k=1
(k≠ i,j)^Na_ij^+a_jk^-a_ki^+/2=[𝐀^+𝐀^-𝐀^+]_ii/2 ∀ i,
T_i^(++-) =∑_j=1
(j≠ i)^N∑_k=1
(k≠ i,j)^Na_ij^+a_jk^+a_ki^-=[𝐀^+𝐀^+𝐀^-]_ii=[(𝐀^+)^2𝐀^-]_ii ∀ i,
T_i^(-++) =∑_j=1
(j≠ i)^N∑_k=1
(k≠ i,j)^Na_ij^-a_jk^+a_ki^+=[𝐀^-𝐀^+𝐀^+]_ii=[𝐀^-(𝐀^+)^2]_ii ∀ i.
Let us, now, write the expressions for the total abundances of signed triangles with an even number of negative links:
T^(+++) =1/3∑_i=1^NT^(+++)_i=1/6∑_i=1^N[𝐀^+𝐀^+𝐀^+]_ii=Tr[𝐀^+𝐀^+𝐀^+]/6=Tr[(𝐀^+)^3]/6,
T^(-+-) =1/2∑_i=1^NT^(-+-)_i=1/2∑_i=1^N[𝐀^-𝐀^+𝐀^-]_ii=Tr[𝐀^-𝐀^+𝐀^-]/2,
T^(+–) =1/2∑_i=1^NT^(+–)_i=1/2∑_i=1^N[𝐀^+𝐀^-𝐀^-]_ii=Tr[𝐀^+𝐀^-𝐀^-]/2=Tr[𝐀^+(𝐀^-)^2]/2,
T^(–+) =1/2∑_i=1^NT^(–+)_i=1/2∑_i=1^N[𝐀^-𝐀^-𝐀^+]_ii=Tr[𝐀^-𝐀^-𝐀^+]/2=Tr[(𝐀^-)^2𝐀^+]/2;
analogously, for the abundances of triangles with an odd number of negative links, reading
T^(—) =1/3∑_i=1^NT^(—)_i=1/6∑_i=1^N[𝐀^-𝐀^-𝐀^-]_ii=Tr[𝐀^-𝐀^-𝐀^-]/6=Tr[(𝐀^-)^3]/6,
T^(+-+) =1/2∑_i=1^NT^(+-+)_i=1/2∑_i=1^N[𝐀^+𝐀^-𝐀^+]_ii=Tr[𝐀^+𝐀^-𝐀^+]/2,
T^(++-) =1/2∑_i=1^NT^(++-)_i=1/2∑_i=1^N[𝐀^+𝐀^+𝐀^-]_ii=Tr[𝐀^+𝐀^+𝐀^-]/2=Tr[(𝐀^+)^2𝐀^-]/2,
T^(-++) =1/2∑_i=1^NT^(-++)_i=1/2∑_i=1^N[𝐀^-𝐀^+𝐀^+]_ii=Tr[𝐀^-𝐀^+𝐀^+]/2=Tr[𝐀^-(𝐀^+)^2]/2
(where each numeric factor avoids the corresponding pattern to be overcounted).
Since the trace of a matrix is invariant under a cyclic permutation of the members of its argument, the following result holds true
Tr[𝐀^+𝐀^-𝐀^-]/2=Tr[𝐀^-𝐀^+𝐀^-]/2=Tr[𝐀^-𝐀^-𝐀^+]/2
further implying that T^(+–)=T^(-+-)=T^(–+). As a consequence, the number of balanced patterns according to either variant of the BT can be defined in several, equivalent ways, i.e. #_^sb=T^(+++)+T^(+–)=T^(+++)+T^(-+-)=T^(+++)+T^(–+); analogously, #_^wb=T^(+++)+T^(+–)+T^(—)=T^(+++)+T^(-+-)+T^(—)=T^(+++)+T^(–+)+T^(—).
§ APPENDIX C.
PROBABILISTIC MODELS FOR BINARY, UNDIRECTED, SIGNED NETWORKS
The generalization of the ERG formalism for the analysis of binary, undirected, signed graphs rests upon the constrained maximization of Shannon entropy, i.e.
ℒ=S[P]-∑_i=0^Mθ_i[P(𝐀)C_i(𝐀)-⟨ C_i⟩]
where S=-∑_𝐀∈𝔸P(𝐀)ln P(𝐀), C_0≡⟨ C_0⟩≡1 sums up the normalization condition and the remaining M-1 constraints represent proper, topological properties. Such an optimization procedure defines the expression
P(𝐀)=e^-H(𝐀)/Z=e^-H(𝐀)/∑_𝐀∈𝔸e^-H(𝐀)=e^-∑_i=1^Mθ_iC_i(𝐀)/∑_𝐀∈𝔸e^-∑_i=1^Mθ_iC_i(𝐀)
that can be made explicit only after a specific set of constraints has been chosen.
§.§ Signed Random Graph Model
The first set of constraints we consider is represented by the properties L^+(𝐀) and L^-(𝐀). The Hamiltonian describing such a problem reads
H(𝐀)=α L^+(𝐀)+β L^-(𝐀);
as a consequence, the partition function reads
Z =∑_𝐀∈𝔸e^-H(𝐀)=∑_𝐀∈𝔸e^-α L^+(𝐀)-β L^-(𝐀)=∑_𝐀∈𝔸e^-∑_i=1^N∑_j(>i)=1^N(α a_ij^++β a_ij^-)=∑_𝐀∈𝔸∏_i=1^N∏_j=1
(j>i)^Ne^-α a_ij^+-β a_ij^-
=∏_i=1^N∏_j=1
(j>i)^N∑_a_ij=-1,0,1e^-α a_ij^+-β a_ij^-=∏_i=1^N∏_j=1
(j>i)^N(1+e^-α+e^-β)=(1+e^-α+e^-β)^N2
and induces the expression
P_SRGM(𝐀)=e^-α L^+(𝐀)-β L^-(𝐀)/(1+e^-α+e^-β)^ N 2≡x^L^+(𝐀)y^L^-(𝐀)/(1+x+y)^ N 2≡(p^-)^L^-(p^0)^L^0(p^+)^L^+
having posed p^-≡e^-β/1+e^-α+e^-β≡y/1+x+y, p^0≡1/1+e^-α+e^-β≡1/1+x+y and p^+≡e^-α/1+e^-α+e^-β≡x/1+x+y, where p^+ is the probability that any two nodes are linked by a positive edge, p^- is the probability that any two nodes are linked by a negative edge and p^0 is the probability that any two nodes are no linked at all. Hence, according to the SRGM, each entry of a signed network is a random variable following a generalized Bernoulli distribution, i.e. obeying the finite scheme
a_ij∼[ -1 0 +1; p^- p^0 p^+ ] ∀ i<j;
notice that while the expected value of the random variable a_ij reads ⟨ a_ij⟩=p^+-p^-, its variance reads Var[a_ij]=p^-[1+(p^+-p^-)]+p^+[1-(p^+-p^-)]. As a consequence, any network belonging to 𝔸 is a collection of i.i.d. random variables and obeys the finite scheme
𝐀∼⊗[ -1 0 +1; p^- p^0 p^+ ]
i.e. the directed product of the N2 finite schemes above.
The probability, under the SRGM, that a graph has exactly L^+ positive links and L^- negative links reads
P(L^-,L^+)=N2L^-,L^0,L^+(p^-)^L^-(p^0)^L^0(p^+)^L^+;
in other words, it is a multinomial distribution, i.e. a generalization of the binomial distribution in case there are more than two, possible outcomes for each trial. The combinatorial factor
N2L^-,L^0,L^+=N2!/L^-!L^0!L^+!
with L^0=N2-L=N2-(L^-+L^+), is the (multinomial) coefficient counting the total number of ways L links (L^+ of which are positive and L^- of which are negative) can be placed among the node-pairs. Hence, Eq. (<ref>) also represents the total number of graphs with a given number of signed links.
Naturally, it is possible to define the marginal random variables a_ij^+∼Ber(p^+) and a_ij^-∼Ber(p^-) which, in turn, induce the marginal probability distributions P(L^-)=Bin(N2,p^-), P(L^0)=Bin(N2,p^0) and P(L^+)=Bin(N2,p^+); from the latter ones, it follows that the total number of expected, positive links reads ⟨ L^+⟩=N2p^+ while the total number of expected, negative links reads ⟨ L^-⟩=N2p^-. Obviously, ⟨ L⟩=⟨ L^+⟩+⟨ L^-⟩=N2(p^-+p^+)≡N2p. In other words, it is possible to define a `traditional' Random Graph Model whose parameter is p≡ p(a_ij=-1)+p(a_ij=+1)=p^-+p^+.
Let us, now, move to describe the behaviour of the degree. The probability, under the SRGM, that a node has exactly k^+ positive links and k^- negative links reads
P(k^-,k^+)=N-1k^-,k^0,k^+(p^-)^k^-(p^0)^k^0(p^+)^k^+;
again, it obeys a multinomial distribution. The combinatorial factor
N-1k^-,k^0,k^+=(N-1)!/k^-!k^0!k^+!
with k^0=(N-1)-k=(N-1)-(k^++k^-), is the (multinomial) coefficient counting the total number of ways k links (k^+ of which are positive and k^- of which are negative) can be placed among the N-1 node-pairs each node individuates. The marginal random variables a_ij^+∼Ber(p^+) and a_ij^-∼Ber(p^-) also induce the marginal probability distributions P(k^-)=Bin(N-1,p^-), P(k^0)=Bin(N-1,p^0) and P(k^+)=Bin(N-1,p^+); from the latter ones, it follows that the expected, positive degree reads ⟨ k^+⟩=(N-1)p^+ while the expected, negative degree reads ⟨ k^-⟩=(N-1)p^-. Obviously, ⟨ k⟩=⟨ k^+⟩+⟨ k^-⟩=(N-1)(p^-+p^+)≡(N-1)p.
In order to determine the parameters that define the SRGM, let us maximize the likelihood function
ℒ_SRGM(x,y)≡ln P_SRGM(𝐀^*|x,y)=L^+(𝐀^*)ln(x)+L^-(𝐀^*)ln(y)-N2ln(1+x+y)
with respect to x and y. Upon doing so, we obtain the pair of equations
∂ℒ_SRGM(x,y)/∂ x=L^+(𝐀^*)/x-N21/1+x+y, ∂ℒ_SRGM(x,y)/∂ y=L^-(𝐀^*)/y-N21/1+x+y;
equating them to zero leads us to find L^+(𝐀^*)=N2x/1+x+y=N2p^+=⟨ L^+⟩ and L^-(𝐀^*)=N2y/1+x+y=N2p^-=⟨ L^-⟩, i.e.
p^+=2L^+(𝐀^*)/N(N-1), p^-=2L^-(𝐀^*)/N(N-1).
Naturally, p^0≡1-p^–p^+.
§.§ Signed Random Graph Model with fixed topology
Let us, again, consider the properties L^+(𝐀) and L^-(𝐀), to be satisfied by keeping a network topology fixed. The Hamiltonian describing such a problem still reads
H(𝐀)=α L^+(𝐀)+β L^-(𝐀)
but induces a partition function reading
Z= ∑_𝐀≡𝐀^*e^-H(𝐀)=∑_𝐀≡𝐀^*e^-α L^+(𝐀)-β L^-(𝐀)=∑_𝐀≡𝐀^*e^-∑_i=1^N∑_j(>i)=1^N(α a_ij^++β a_ij^-)=∑_𝐀≡𝐀^*∏_i=1^N∏_j=1
(j>i)^Ne^-α a_ij^+-β a_ij^-
= ∏_i=1^N∏_j=1
(j>i)^N∑_a_ij=-1,1e^-α a_ij^+-β a_ij^-=∏_i=1^N∏_j=1
(j>i)^N(e^-α+e^-β)=(e^-α+e^-β)^L
where the formalism j>i is meant to indicate the connected pairs of nodes. In other words, the support of the distribution becomes the set of node pairs i,j, with i<j, such that |a_ij|=1, inducing a set of admissible configurations whose cardinality amounts at 2^L. The expression above leads us to find
P_SRGM-FT(𝐀)=e^-α L^+(𝐀)-β L^-(𝐀)/(e^-α+e^-β)^L≡x^L^+(𝐀)y^L^-(𝐀)/(x+y)^L≡(p^-)^L^-(p^+)^L^+
having posed p^-≡e^-β/e^-α+e^-β≡y/x+y and p^+≡e^-α/e^-α+e^-β≡x/x+y where p^+ is the probability that any two, connected nodes are linked by a positive edge and p^- is the probability that any two, connected nodes are linked by a negative edge. Hence, according to the SRGM-FT, each entry of a signed network such that |a_ij|=1 is a random variable following a Bernoulli distribution, i.e. obeying the finite scheme
a_ij∼[ -1 +1; p^- p^+ ] ∀ i<j | |a_ij|=1.
The probability, under the SRGM-FT, that a graph has exactly L^+ positive links reads
P(L^+)=LL^+(p^-)^L^-(p^+)^L^+=LL^+(p^+)^L^+(1-p^+)^L-L^+
i.e. it is a binomial distribution, with L indicating the total number of unsigned links. As a consequence, the total number of expected, positive links reads ⟨ L^+⟩=Lp^+; analogously, L^-∼Bin(L,p^-). Similarly, the probability, under the SRGM-FT, that node i establishes exactly k_i^+ positive links reads
P(k_i^+)=k_ik_i^+(p^-)^k_i^-(p^+)^k_i^+=k_ik_i^+(p^+)^k_i^+(1-p^-)^k_i-k_i^+;
again, it is a binomial distribution, with k_i indicating the unsigned degree of node i. As a consequence, the expected, positive degree of node i reads ⟨ k_i^+⟩=k_ip^+; analogously, k_i^-∼Bin(k_i,p^-).
In order to determine the parameters that define the SRGM-FT, let us maximize the likelihood function
ℒ_SRGM-FT(x,y)≡ln P_SRGM-FT(𝐀^*|x,y)=L^+(𝐀^*)ln(x)+L^-(𝐀^*)ln(y)-L(𝐀^*)ln(x+y)
with respect to x and y. Upon doing so, we obtain the pair of equations
∂ℒ_SRGM-FT(x,y)/∂ x=L^+(𝐀^*)/x-L(𝐀^*)/x+y, ∂ℒ_SRGM-FT(x,y)/∂ y=L^-(𝐀^*)/y-L(𝐀^*)/x+y;
equating them to zero leads us to find L^+(𝐀^*)=L(𝐀^*)x/x+y=L(𝐀^*)p^+=⟨ L^+⟩ and L^-(𝐀^*)=L(𝐀^*)y/x+y=L(𝐀^*)p^-=⟨ L^-⟩, i.e.
p^+=L^+(𝐀^*)/L(𝐀^*), p^-=L^-(𝐀^*)/L(𝐀^*).
§.§ Signed Random Graph Model: free VS fixed topology
In order to clarify the relationship between the SRGM and the SRGM-FT, let us write
P_SRGM(𝐀) =P_RGM(𝐀)· P_SRGM(𝐀)/P_RGM(𝐀)
=p^L(1-p)^N2-L·(p^-)^L^-(p^+)^L^+(1-p^–p^+)^N2-L^–L^+/p^L(1-p)^N2-L
=p^L(1-p)^N2-L·(p^-)^L^-(p^+)^L^+(1-p^–p^+)^N2-L^–L^+/p^L^-p^L^+(1-p)^N2-L^–L^+
=p^L(1-p)^N2-L·(p^-/p)^L^-(p^+/p)^L^+(1-p^–p^+/1-p)^N2-L^–L^+;
since the RGM induced by the SRGM satisfies the relationship p≡ p^-+p^+, one has that
P_SRGM(𝐀) =p^L(1-p)^N2-L·(p^-/p)^L^-(p^+/p)^L^+
=P_RGM(𝐀)· P_SRGM-FT(𝐀)
the parameters defining the SRGM-FT being, now, p^-/p and p^+/p. Beside having have an intuitive meaning, i.e.
p^-/p =p^-/p^-+p^+=P(`link' ∩ `link -')/P(`link')=P(`link -' | `link'),
p^+/p =p^+/p^-+p^+=P(`link' ∩ `link +')/P(`link')=P(`link +' | `link')
these expressions are also consistent with the estimations of the parameters obtained via the likelihood maximization: in fact,
p^-/p =p^-/p^-+p^+=2L^-/N(N-1)/2L^-/N(N-1)+2L^+/N(N-1)=2L^-/N(N-1)/2L/N(N-1)=L^-/L,
p^+/p =p^+/p^-+p^+=2L^+/N(N-1)/2L^-/N(N-1)+2L^+/N(N-1)=2L^+/N(N-1)/2L/N(N-1)=L^+/L.
§.§ Signed Configuration Model
The second set of constraints we consider is represented by the properties {k_i^+(𝐀)}_i=1^N and {k_i^-(𝐀)}_i=1^N. The Hamiltonian describing such a problem reads
H(𝐀)=∑_i=1^N[α_i k_i^+(𝐀)+β_i k_i^-(𝐀)];
as a consequence, the partition function reads
Z =∑_𝐀∈𝔸e^-H(𝐀)=∑_𝐀∈𝔸e^-∑_i=1^N[α_i k_i^+(𝐀)+β_i k_i^-(𝐀)]=∑_𝐀∈𝔸e^-∑_i=1^N∑_j(>i)=1^N[(α_i+α_j)a_ij^++(β_i+β_j)a_ij^-]
=∑_𝐀∈𝔸∏_i=1^N∏_j=1
(j>i)^Ne^-(α_i+α_j)a_ij^+-(β_i+β_j)a_ij^-=∏_i=1^N∏_j=1
(j>i)^N∑_a_ij=-1,0,1e^-(α_i+α_j)a_ij^+-(β_i+β_j)a_ij^-=∏_i=1^N∏_j=1
(j>i)^N(1+e^-(α_i+α_j)+e^-(β_i+β_j))
and induces the expression
P_SCM(𝐀)=e^-∑_i=1^N[α_i k_i^+(𝐀)+β_i k_i^-(𝐀)]/∏_i=1^N∏_j=1
(j>i)^N(1+e^-(α_i+α_j)+e^-(β_i+β_j))≡∏_i=1^Nx_i^k_i^+(𝐀)y_i^k_i^-(𝐀)/∏_i=1^N∏_j=1
(j>i)^N(1+x_ix_j+y_iy_j)≡∏_i=1^N∏_j=1
(j>i)^N(p_ij^-)^a_ij^-(p_ij^0)^a_ij^0(p_ij^+)^a_ij^+
having posed p_ij^-≡e^-(β_i+β_j)/1+e^-(α_i+α_j)+e^-(β_i+β_j)≡y_iy_j/1+x_ix_j+y_iy_j, p_ij^0≡1/1+e^-(α_i+α_j)+e^-(β_i+β_j)≡1/1+x_ix_j+y_iy_j and p_ij^+≡e^-(α_i+α_j)/1+e^-(α_i+α_j)+e^-(β_i+β_j)≡x_ix_j/1+x_ix_j+y_iy_j, where p_ij^+ is the probability that nodes i and j are linked by a positive edge, p_ij^- is the probability that nodes i and j are linked by a negative edge and p_ij^0 is the probability that nodes i and j are no linked at all. Hence, according to the SCM, the generic entry of a signed network is a random variable following a generalized Bernoulli distribution, i.e. obeying the finite scheme
a_ij∼[ -1 0 +1; p_ij^- p_ij^0 p_ij^+ ] ∀ i<j;
as a consequence, any network belonging to 𝔸 is a collection of independent random variables, each one obeying the finite scheme
𝐀∼⊗[ -1 0 +1; p_ij^- p_ij^0 p_ij^+ ]
i.e. the directed product of the N(N-1)/2=N2 finite schemes above.
In the case of the SCM, L^+ is a random variable obeying the Poisson-Binomial distribution that we indicate as PoissBin(N2,{p_ij^+}_i,j=1^N); analogously, L^-∼PoissBin(N2,{p_ij^-}_i,j=1^N). Similarly, k_i^+ is a random variable obeying the Poisson-Binomial distribution that we indicate as PoissBin(N-1,{p_ij^+}_j=1^N); analogously, k_i^-∼PoissBin(N-1,{p_ij^-}_j=1^N). Hence, the total number of expected, positive links reads ⟨ L^+⟩=∑_i=1^N∑_j(>i)=1^Np_ij^+ while the total number of expected, negative links reads ⟨ L^-⟩=∑_i=1^N∑_j(>i)=1^Np_ij^-; analogously, ⟨ k_i^+⟩=∑_j(≠ i)=1^Np_ij^+ and ⟨ k_i^-⟩=∑_j(≠ i)=1^Np_ij^-.
In order to determine the parameters that define the SCM, let us maximize the likelihood function
ℒ_SCM({x_i}_i=1^N,{y_i}_i=1^N) ≡ln P_SCM(𝐀^*|{x_i}_i=1^N,{y_i}_i=1^N)
=∑_i=1^Nk_i^+(𝐀^*)ln(x_i)+∑_i=1^Nk_i^-(𝐀^*)ln(y_i)-∑_i=1^N∑_j=1
(j>i)^Nln(1+x_ix_j+y_iy_j)
with respect to x_i and y_i, ∀ i. Upon doing so, we obtain the system of equations
∂ℒ_SCM({x_i}_i=1^N,{y_i}_i=1^N)/∂ x_i =k_i^+(𝐀^*)/x_i-∑_j=1
(j≠ i)^Nx_j/1+x_ix_j+y_iy_j ∀ i,
∂ℒ_SCM({x_i}_i=1^N,{y_i}_i=1^N)/∂ y_i =k_i^-(𝐀^*)/y_i-∑_j=1
(j≠ i)^Ny_j/1+x_ix_j+y_iy_j ∀ i;
equating them to zero leads us to find
k_i^+(𝐀^*) =∑_j=1
(j≠ i)^Nx_ix_j/1+x_ix_j+y_iy_j=∑_j=1
(j≠ i)^Np_ij^+=⟨ k_i^+⟩ ∀ i,
k_i^-(𝐀^*) =∑_j=1
(j≠ i)^Ny_iy_j/1+x_ix_j+y_iy_j=∑_j=1
(j≠ i)^Np_ij^-=⟨ k_i^-⟩ ∀ i.
Although the system above can be solved only numerically, particular conditions exist under which the equations constituting it can be approximated and solved explicitly. They are collectively named `sparse-case' approximation of the SCM and hold true whenever x_i≪1 and y_i≪1, ∀ i. In this case, one can pose p_ij^+≃ x_ix_j and p_ij^-≃ y_iy_j, ∀ i<j, which allow the equations above to be simplified as follows
k_i^+(𝐀^*) ≃∑_j=1
(j≠ i)^Nx_ix_j ∀ i,
k_i^-(𝐀^*) ≃∑_j=1
(j≠ i)^Ny_iy_j ∀ i;
the latter ones induce the expressions x_i=k_i^+(𝐀^*)/∑_j=1^Nx_j=k_i^+(𝐀^*)/√(2L^+(𝐀^*)) and y_i=k_i^-(𝐀^*)/∑_j=1^Ny_j=k_i^-(𝐀^*)/√(2L^-(𝐀^*)), ∀ i, allowing us to find
p_ij^+≃k_i^+(𝐀^*)k_j^+(𝐀^*)/2L^+(𝐀^*),
p_ij^-≃k_i^-(𝐀^*)k_j^-(𝐀^*)/2L^-(𝐀^*).
The system of equations above is also known with the name of Signed Chung-Lu Model (SCLM).
§.§ Signed Configuration Model with fixed topology
Let us, again, consider the properties {k_i^+(𝐀)}_i=1^N and {k_i^-(𝐀)}_i=1^N, to be satisfied by keeping a network topology fixed. The Hamiltonian describing such a problem still reads
H(𝐀)=∑_i=1^N[α_i k_i^+(𝐀)+β_i k_i^-(𝐀)]
but induces a partition function reading
Z =∑_𝐀∈𝔸e^-H(𝐀)=∑_𝐀∈𝔸e^-∑_i=1^N[α_i k_i^+(𝐀)+β_i k_i^-(𝐀)]=∑_𝐀∈𝔸e^-∑_i=1^N∑_j(>i)=1^N[(α_i+α_j)a_ij^++(β_i+β_j)a_ij^-]
=∑_𝐀∈𝔸∏_i=1^N∏_j=1
(j>i)^Ne^-(α_i+α_j)a_ij^+-(β_i+β_j)a_ij^-=∏_i=1^N∏_j=1
(j>i)^N∑_a_ij=-1,1e^-(α_i+α_j)a_ij^+-(β_i+β_j)a_ij^-=∏_i=1^N∏_j=1
(j>i)^N(e^-(α_i+α_j)+e^-(β_i+β_j))
where the formalism j>i is meant to indicate the connected pairs of nodes. The expression above induces the expression
P_SCM-FT(𝐀)=e^-∑_i=1^N[α_i k_i^+(𝐀)+β_i k_i^-(𝐀)]/∏_i=1^N∏_j=1
(j>i)^N(e^-(α_i+α_j)+e^-(β_i+β_j))≡∏_i=1^Nx_i^k_i^+(𝐀)y_i^k_i^-(𝐀)/∏_i=1^N∏_j=1
(j>i)^N(x_ix_j+y_iy_j)≡∏_i=1^N∏_j=1
(j>i)^N(p_ij^-)^a_ij^-(p_ij^+)^a_ij^+
having posed p_ij^-≡e^-(β_i+β_j)/e^-(α_i+α_j)+e^-(β_i+β_j)≡y_iy_j/x_ix_j+y_iy_j and p_ij^+≡e^-(α_i+α_j)/e^-(α_i+α_j)+e^-(β_i+β_j)≡x_ix_j/x_ix_j+y_iy_j where p_ij^+ is the probability that nodes i and j are linked by a positive edge and p_ij^- is the probability that nodes i and j are linked by a negative edge. Hence, according to the SCM-FT, each entry of a signed network such that |a_ij|=1 is a random variable following a Bernoulli distribution, i.e. obeying the finite scheme
a_ij∼[ -1 +1; p_ij^- p_ij^+ ] ∀ i<j | |a_ij|=1.
In the case of the SCM-FT, L^+ is a random variable obeying the Poisson-Binomial distribution that we indicate as PoissBin(L,{p_ij^+}_i,j=1^N); analogously, L^-∼PoissBin(L,{p_ij^-}_i,j=1^N). Similarly, k_i^+ is a random variable obeying the Poisson-Binomial distribution that we indicate as PoissBin(k_i,{p_ij^+}_j=1^N); analogously, k_i^-∼PoissBin(k_i,{p_ij^-}_j=1^N). Hence, the total number of expected, positive links reads ⟨ L^+⟩=∑_i=1^N∑_j(>i)=1^Np_ij^+ while the total number of expected, negative links reads ⟨ L^-⟩=∑_i=1^N∑_j(>i)=1^Np_ij^-; analogously, ⟨ k_i^+⟩=∑_j(≠ i)=1^Np_ij^+ and ⟨ k_i^-⟩=∑_j(≠ i)=1^Np_ij^-.
In order to determine the parameters that define the SCM-FT, let us maximize the likelihood function
ℒ_SCM-FT({x_i}_i=1^N,{y_i}_i=1^N) ≡ln P_SCM-FT(𝐀^*|{x_i}_i=1^N,{y_i}_i=1^N)
=∑_i=1^Nk_i^+(𝐀^*)ln(x_i)+∑_i=1^Nk_i^-(𝐀^*)ln(y_i)-∑_i=1^N∑_j=1
(j>i)^Nln(x_ix_j+y_iy_j)
with respect to x_i and y_i, ∀ i. Upon doing so, we obtain the system of equations
∂ℒ_SCM-FT({x_i}_i=1^N,{y_i}_i=1^N)/∂ x_i =k_i^+(𝐀^*)/x_i-∑_j=1
(j≠ i)^Nx_j/x_ix_j+y_iy_j ∀ i,
∂ℒ_SCM-FT({x_i}_i=1^N,{y_i}_i=1^N)/∂ y_i =k_i^-(𝐀^*)/y_i-∑_j=1
(j≠ i)^Ny_j/x_ix_j+y_iy_j ∀ i;
equating them to zero leads us to find
k_i^+(𝐀^*) =∑_j=1
(j≠ i)^Nx_ix_j/x_ix_j+y_iy_j=∑_j=1
(j≠ i)^Np_ij^+=⟨ k_i^+⟩ ∀ i,
k_i^-(𝐀^*) =∑_j=1
(j≠ i)^Ny_iy_j/x_ix_j+y_iy_j=∑_j=1
(j≠ i)^Np_ij^-=⟨ k_i^-⟩ ∀ i.
The system above can be solved only numerically.
§.§ Signed Configuration Model: free VS fixed topology
In order to clarify the relationship between the SCM and the SCM-FT, let us write
P_SCM(𝐀) =P_FM(𝐀)· P_SCM(𝐀)/P_FM(𝐀)
=∏_i=1^N∏_j=1
(j>i)^Np_ij^a_ij(1-p_ij)^1-a_ij·∏_i=1^N∏_j=1
(j>i)^N(p_ij^-)^a_ij^-(p_ij^+)^a_ij^+(1-p_ij^–p_ij^+)^1-a_ij^–a_ij^+/∏_i=1^N∏_j=1
(j>i)^Np_ij^a_ij(1-p_ij)^1-a_ij
=∏_i=1^N∏_j=1
(j>i)^Np_ij^a_ij(1-p_ij)^1-a_ij·∏_i=1^N∏_j=1
(j>i)^N(p_ij^-)^a_ij^-(p_ij^+)^a_ij^+(1-p_ij^–p_ij^+)^1-a_ij^–a_ij^+/∏_i=1^N∏_j=1
(j>i)^Np_ij^a_ij^-+a_ij^+(1-p_ij)^1-a_ij^–a_ij^+
=∏_i=1^N∏_j=1
(j>i)^Np_ij^a_ij(1-p_ij)^1-a_ij·∏_i=1^N∏_j=1
(j>i)^N(p_ij^-/p_ij)^a_ij^-(p_ij^+/p_ij)^a_ij^+(1-p_ij^–p_ij^+/1-p_ij)^1-a_ij^–a_ij^+
where P_FM(𝐀) indicates the probability distribution of a generic, factorizable (null) model. Upon requiring p_ij≡ p_ij^-+p_ij^+, we turn the FM into a Configuration Model (CM) whose coefficients are `induced' by the ones of the SCM (in fact, k_i(𝐀^*)=k_i^-(𝐀^*)+k_i^+(𝐀^*)=∑_j(≠ i)=1^Np_ij^-+∑_j(≠ i)=1^Np_ij^+=∑_j(≠ i)=1^N[p_ij^-+p_ij^+]=∑_j(≠ i)=1^Np_ij) and obtain
P_SCM(𝐀) =∏_i=1^N∏_j=1
(j>i)^Np_ij^a_ij(1-p_ij)^1-a_ij·∏_i=1^N∏_j=1
(j>i)^N(p_ij^-/p_ij)^a_ij^-(p_ij^+/p_ij)^a_ij^+
=∏_i=1^N∏_j=1
(j>i)^Np_ij^a_ij(1-p_ij)^1-a_ij·∏_i=1^N∏_j=1
(j>i)^N(p_ij^-/p_ij)^a_ij^-(p_ij^+/p_ij)^a_ij^+
i.e. an expression that is the product of two probability distributions. Let us start from the second one, whose parameters read
p_ij^-/p_ij =p_ij^-/p_ij^-+p_ij^+=y_iy_j/(1+x_ix_j+y_iy_j)/x_ix_j/(1+x_ix_j+y_iy_j)+y_iy_j/(1+x_ix_j+y_iy_j)=y_iy_j/x_ix_j+y_iy_j,
p_ij^+/p_ij =p_ij^+/p_ij^-+p_ij^+=x_ix_j/(1+x_ix_j+y_iy_j)/x_ix_j/(1+x_ix_j+y_iy_j)+y_iy_j/(1+x_ix_j+y_iy_j)=x_ix_j/x_ix_j+y_iy_j
hence inducing the probability distribution of the SCM-FT, beside keeping the intuitive meaning made explicit by the expressions p_ij^-/p_ij=P(`link -' | `link') and p_ij^+/p_ij=P(`link +' | `link'). The first one, on the other hand, can be identified with the probability distribution of the `induced' CM:
p_ij=p_ij^-+p_ij^+ =y_iy_j/1+x_ix_j+y_iy_j+x_ix_j/1+x_ix_j+y_iy_j=y_iy_j+x_ix_j/1+x_ix_j+y_iy_j=
=𝐳_i·𝐳_j/1+𝐳_i·𝐳_j=|𝐳_i||𝐳_j|cosϕ_ij/1+|𝐳_i||𝐳_j|cosϕ_ij=√((x_i^2+y_i^2)cosϕ_ij)·√((x_j^2+y_j^2)cosϕ_ij)/1+√((x_i^2+y_i^2)cosϕ_ij)·√((x_j^2+y_j^2)cosϕ_ij)≡z_iz_jcosϕ_ij/1+z_iz_jcosϕ_ij
where 𝐳_i≡(x_i,y_i) is the vector of fitnesses of node i, z_i≡|𝐳_i|=√((x_i^2+y_i^2)) is its modulus and cosϕ_ij is the cosinus of the angle between vectors 𝐳_i and 𝐳_j. As a consequence, we can write
P_SCM(𝐀)=P_ICM(𝐀)· P_SCM-FT(𝐀).
Notice that when z_i=(x_i,0) and z_j=(x_j,0), cosϕ_ij=1 and p_ij=p_ij^+=x_ix_j/1+x_ix_j, i.e. the `induced' CM reduces to the proper CM: in this case, in fact, the information about signs is `redundant' as k_i(𝐀^*)=k_i^+(𝐀^*) and k_j(𝐀^*)=k_j^+(𝐀^*). On the other hand, when z_i=(x_i,0) and z_j=(0,y_j), cosϕ_ij=0 and p_ij=0, i.e. nodes i and j cannot be linked: in this case, in fact, k_i(𝐀^*)=k_i^+(𝐀^*) but k_j(𝐀^*)=k_j^-(𝐀^*), whence the impossibility of (consistently) attributing a sign to the edge between i and j.
§ APPENDIX D.
NUMERICAL OPTIMIZATION OF LIKELIHOOD FUNCTIONS
In order to numerically solve the systems of equations defining the SCM and the SCM-FT, we can follow the guidelines provided in <cit.>: more specifically, we will adapt the iterative recipe provided there to our (binary, undirected, signed) setting. First, let us consider the SCM whose system of equations can be rewritten as
x_i =k_i^+(𝐀^*)/∑_j=1
(j≠ i)^Nx_j/1+x_ix_j+y_iy_j⟹ x_i^(n)=k_i^+(𝐀^*)/∑_j=1
(j≠ i)^Nx_j^(n-1)/1+x_i^(n-1)x_j^(n-1)+y_i^(n-1)y_j^(n-1) ∀ i,
y_i =k_i^-(𝐀^*)/∑_j=1
(j≠ i)^Ny_j/1+x_ix_j+y_iy_j⟹ y_i^(n)=k_i^-(𝐀^*)/∑_j=1
(j≠ i)^Ny_j^(n-1)/1+x_i^(n-1)x_j^(n-1)+y_i^(n-1)y_j^(n-1) ∀ i;
analogously, the system of equations defining the SCM-FT can be rewritten as
x_i =k_i^+(𝐀^*)/∑_j=1
(j≠ i)^Nx_j/x_ix_j+y_iy_j⟹ x_i^(n)=k_i^+(𝐀^*)/∑_j=1
(j≠ i)^Nx_j^(n-1)/x_i^(n-1)x_j^(n-1)+y_i^(n-1)y_j^(n-1) ∀ i,
y_i =k_i^-(𝐀^*)/∑_j=1
(j≠ i)^Ny_j/x_ix_j+y_iy_j⟹ y_i^(n)=k_i^-(𝐀^*)/∑_j=1
(j≠ i)^Ny_j^(n-1)/x_i^(n-1)x_j^(n-1)+y_i^(n-1)y_j^(n-1) ∀ i.
In order for each iterative recipe to converge, an appropriate vector of initial conditions need to be chosen; here, we have opted the following ones: x_i=k_i^+(𝐀^*)/√(2L^+(𝐀^*)), ∀ i and y_i=k_i^-(𝐀^*)/√(2L^-(𝐀^*)), ∀ i. Besides, we have adopted two, different stopping criteria: the first one is a condition on the Euclidean norm of the vector of differences between the values of the parameters at subsequent iterations, i.e. ||Δθ⃗||_2=√(∑_i=1^N(Δθ_i)^2)≤10^-8; the second one is a condition on the maximum number of iterations of our iterative algorithm, set to 10^3.
The accuracy of our method in estimating the constraints has been evaluated by computing the maximum absolute error (MAE), defined as
MAE=max_i{|k_i^+(𝐀^*)-⟨ k_i^+⟩|, |k_i^-(𝐀^*)-⟨ k_i^-⟩|}
(i.e. as the infinite norm of the difference between the vector of the empirical values of the constraints and the vector of their expected values) and the maximum relative error (MRE), defined as
MRE=max_i{|k_i^+(𝐀^*)-⟨ k_i^+⟩|/k_i^+(𝐀^*), |k_i^-(𝐀^*)⟨ k_i^-⟩|/k_i^-(𝐀^*)}
(i.e. as the infinite norm of the relative difference between the vector of the empirical values of the constraints and the vector of their expected values).
The following tables sum up the time employed by our algorithm to converge as well as its accuracy in reproducing the constraints defining the SCM and the SCM-FT on each network considered in the present contribution. Overall, our method is fast and accurate: the numerical errors never exceed O(10^-1) and the time employed to achieve such an accuracy never exceeds minutes. To be noticed that the time required by our algorithm to solve the SCM is usually smaller than that required to solve the SCM-FT - although such a difference rises with the size of the considered configuration.
§ APPENDIX E.
INSPECTING HIGHER-ORDER FRUSTRATION ON SIGNED NETWORKS
In order to inspect the behaviour of frustration at the mesoscopic level, we have compared the partition induced by Newman's modularity maximization
Q=1/2L∑_i=1^N∑_j=1^N[a_ij-k_ik_j/2L]δ_c_ic_j
with the partition induced by the minimization of the `higher-order' frustration index reading
HOFI=L^+_∘+L^-_∙/L
and measuring the percentage of `misplaced' links, i.e. the total number of positive links between communities, L^+_∘, plus the total number of negative links within communities, L^-_∙, divided by the total number of links, L.
The definition above aims at capturing the `philosophy' behind the concept of frustration, introduced by Heider, rephrased by the structure theorem (stating that a signed network is balanced if and only if its nodes can be partitioned into two subsets with the links within them being positive and the links between them being negative) and extended by Davis, whose definition allows the number of subsets to be larger than two.
A frustration-based community detection algorithm where the number of blocks, say k, is fixed a priori, hence remains naturally defined (see below).
|
http://arxiv.org/abs/2303.07340v1
|
20230313175918
|
Optimal parallel wire cutting without ancilla qubits
|
[
"Hiroyuki Harada",
"Kaito Wada",
"Naoki Yamamoto"
] |
quant-ph
|
[
"quant-ph"
] |
[email protected]
Department of Applied Physics and Physico-Informatics, Keio University, Hiyoshi 3-14-1, Kohoku, Yokohama 223-8522, Japan
Department of Applied Physics and Physico-Informatics, Keio University, Hiyoshi 3-14-1, Kohoku, Yokohama 223-8522, Japan
[email protected]
Department of Applied Physics and Physico-Informatics, Keio University, Hiyoshi 3-14-1, Kohoku, Yokohama 223-8522, Japan
Quantum Computing Center, Keio University, Hiyoshi 3-14-1, Kohoku, Yokohama 223-8522, Japan
The circuit cutting techniques are widely used to execute quantum algorithms that require
more qubits than physically available; the idea is to decompose the original circuit to
smaller sub-circuits that are combined to simulate the original one by sampling.
However, they suffer from an inevitable issue that the sampling cost exponentially grows
with the number of cuts, and thus it is practically important to develop decomposition
methods working with smaller sampling cost.
This paper focuses on the parallel wire-cutting problem, meaning that the target to cut is
the identity channel acting on multiple qubits in parallel.
There are two previous studies.
The first one is a teleportation-based method that achieves this task with the use of
ancilla qubits, whose sampling cost was proven to be optimal.
The second one uses the technique of classical shadow to solve the problem without
any ancilla qubits, which however does not achieve the optimal sampling cost.
This paper gives a definitive solution to this problem.
That is, we develop the optimal parallel wire cutting without ancilla qubits, in the
same setup as that taken in the above previous studies.
Moreover, the developed ancilla-free method can be applied to the non-parallel case,
which also improves the sampling cost obtained in the previous study.
Optimal parallel wire cutting without ancilla qubits
Naoki Yamamoto
March 30, 2023
====================================================
§ INTRODUCTION
Quantum computers are expected to have significant advantage in certain tasks over classical ones <cit.>. In recent years, with the advent of Noisy Intermediate-Scale Quantum (NISQ) devices <cit.>, extensive research have been conducted to explore algorithms that may demonstrate usefulness of those near-term devices, e.g., quantum machine learning <cit.>, quantum simulation <cit.> and quantum chemical computation <cit.>. However, current NISQ devices have fundamental limitations in both quality and quantity of available qubits, which are major obstacles to their practical use.
To mitigate this problem, a wide range of approaches have been proposed, which effectively expand the size of quantum systems with the help of classical post-processing <cit.>. In particular, the methods of partitioning a quantum circuit <cit.> are useful. The idea is to decompose a quantum circuit into several subsystems and recover the original output by appropriately combining the output results from all the subsystems. The circuit partitioning method is categorized into mainly two techniques, depending on the type of target quantum circuits to be decomposed. One is the method to decompose the identity channel (or the wires) into linear combinations of measure-and-prepare channels with measurement followed by preparation of a quantum state, which is called the wire cutting (or circuit cutting or time-like cut) <cit.>.
The other one is called the gate cutting (or space-like cut), which decomposes a global channel into linear combinations of tensor products of local channels <cit.>, based on the quasiprobability decomposition methods widely used in error mitigation techniques <cit.>.
However, they have an inevitable problem that the variance of target quantities calculated using the subsystems exponentially increases with respect to the number of cut locations. Clearly, this sampling issue will become serious in practice, and several studies have been conducted to pursue a less-costly decomposition <cit.>.
In this paper, we consider the problem of wire cutting, for which the methods proposed
in <cit.> realize a smaller sampling cost than the
original scheme <cit.>.
Here we briefly describe these methods.
The idea of decomposing the n parallel identity channel (i.e., Id^⊗ n
with the single-qubit identity channel Id) is illustrated in Fig. <ref>.
That is, Id^⊗ n depicted with the blue rectangular is replaced by a
channel Φ which functions as an identity channel from the top n wires to the
bottom n wires;
additionally, to realize the wire cutting, the top and bottom wires are not connected
via any quantum resource, but any local operations and classical communication
(LOCC) is allowed.
Hence, the problem boils down to how to realize such Φ.
Ref. <cit.> employed the idea of classical shadow <cit.> for this purpose, as illustrated in Fig. <ref>(b1).
Specifically, a random unitary V^† followed by the computational basis
measurement on the top wire yields the output y, from which we input the state
V|y⟩⟨y|V^† (called the classical snapshot in
<cit.>) to the bottom wire; if V forms a unitary t-design
(t≥ 2) such as the Clifford random gate, then their ensemble average over V and y together with an additional input y' (which is a uniformly random vector in {0,1}^n) recovers the input state at the bottom wire.
Clearly the top and bottom wires in Φ in this case are separated, and thus the
entire circuit depicted in Fig. <ref>(a) is decomposed into two smaller
sub-circuits.
Note that this scheme does not use any ancilla qubit other than the top and bottom wires.
The sampling cost (a formal definition is given later) is reduced from the original
one 16^n to (2^n+1+1)^2, as summarized in Table <ref>.
Hence, we arrive at the first question: can we improve this sampling cost,
while keeping no-ancilla assistance?
Next, the idea of the method <cit.> is to use the quantum teleportation
to realize the identity channel from the top to bottom wires, as shown in
Fig. <ref>(b2) in the case of n=1.
As is well known, the teleportation needs to introduce ancilla qubits and a pre-shared
entangled state (Bell pair when n=1) between the ancilla and the bottom wires, followed
by an LOCC.
To realize wire cutting between the top and bottom wires, the authors of
<cit.> applied the gate cutting technique to the CNOT gate
used for generating the Bell pair; as a result, the Bell pair becomes virtual
and thereby the wire cutting is achieved.
The sampling cost in this case is (2^n+1-1)^2, as shown in Table <ref>.
Importantly, it was proven in <cit.> that this is the minimum cost
in the setup where an arbitrary LOCC is allowed for Φ, regardless of ancilla
assistance.
Here we arrive at the second question (this was indeed posed in <cit.>):
can we achieve this sampling cost, without using ancilla qubits?
The contribution of this paper is to give positive answers to the above two questions.
That is, we develop a method for cutting the parallel n wires with sampling cost
(2^n+1-1)^2, in the setup where we can perform any LOCC between the top and bottom wires but no ancilla qubit is allowed to use.
As mentioned above, this sampling cost is the minimum in this setup
<cit.>.
That is, we develop the optimal parallel wire cutting without ancilla qubits.
The idea is, roughly speaking, to remove the redundancy appearing in
the shadow-based method <cit.>.
Lastly we add a discussion on the case where the target to be decomposed is a non-parallel identity channel, i.e., the set of single-qubit identity channel Id that however cannot be collected to Id^⊗ n.
Remarkably, the teleportation-based scheme <cit.> assisted by
ancilla qubits can achieve the minimum sampling cost (2^n+1-1)^2, which is
the same cost as the parallel n wires cutting.
This is thanks to the ability of collective quasi-probability decomposition
on the entangling gates for the ancilla qubits and bottom wires.
However, in the absence of ancilla, such global operation is not available and
there have been no proposal to reach the cost (2^n+1-1)^2.
A simple strategy is to apply the 1-wire cutting method for all wires independently.
Then, the sampling cost for the original method <cit.>, the
shadow-based method <cit.>, and our proposed method are
16^n, 25^n, and 9^n, respectively.
Hence, though limited to the situation taking such simple strategy, our method surely
improves the cost reached by the original one.
§ PRELIMINARIES
We aim to simulate a large quantum circuit, by classically processing the result produced
from relatively small quantum circuits.
Let y∈{0,1}^N be the result of the computational basis measurement on
a given N-qubit quantum circuit with the input state |0⟩^⊗ N and
f:{0,1}^N→ [-1,1] be a classical postprocessing function.
Here, the expectation 𝔼_y[f(y)] over the outputs of the N-qubit
circuit is the target quantity to be estimated.
Note that this setting includes the estimation of the expectation of Pauli strings.
The wire cutting method <cit.> provides the strategy to calculate 𝔼_y[f(y)] by using smaller sub-circuits derived from the
original circuit; thus, we can simulate large quantum circuits beyond available
real quantum devices yet with overhead for classical postprocessing.
The method splits a large circuit into smaller ones by decomposing the single-qubit identity channel Id(∙) as follows;
Id(∙)
= ∑_i=1^8 c_i Tr[O_i(∙)] ρ_i,
where the observables O_i, quantum states ρ_i, and real coefficients c_i
are given by
O_1 =I, ρ_1 =|0⟩⟨0|, c_1 = +1/2,
O_2 =I, ρ_2 =|1⟩⟨1|, c_2 = +1/2,
O_3 =X, ρ_3 =|+⟩⟨+|, c_3 = +1/2,
O_4 =X, ρ_4 =|-⟩⟨-|, c_4 = -1/2,
O_5 =Y, ρ_5 =|+i⟩⟨+i|, c_5 = +1/2,
O_6 =Y, ρ_6 =|-i⟩⟨-i|, c_6 = -1/2,
O_7 =Z, ρ_7 =|0⟩⟨0|, c_7 = +1/2,
O_8 =Z, ρ_8 =|1⟩⟨1|, c_8 = -1/2.
Here, I,X,Y,Z denote the single-qubit identity and Pauli matrices;
|±⟩, |± i⟩, and {|0⟩,|1⟩} are eigenstates of X, Y,
and Z, respectively.
Note that the above set {O_i,ρ_i,c_i} is just one of decompositions
satisfying Eq. (<ref>).
In this decomposition, Tr[O_i(∙)] ρ_i represents a channel
that measures the expectation value of the observable O_i on the quantum state
entering the identity channel and prepares the new quantum state ρ_i.
That is, this channel separates the prepared state from the entering state by LO.
The decomposition of Id given by Eq. (<ref>) allows
us to simulate a large circuit by the weighted summation of smaller circuits.
To clarify this procedure, let us consider the decomposition of a 3-qubit quantum circuit shown in Fig. <ref> as an example.
This quantum circuit consists of the 3-qubit initial state |0⟩^⊗ 3 and
two unitary operators U_12 and U_23 where U_ab acts on the a-th and b-th qubits, followed by the computational basis measurements. Here, we decompose Id on the 2nd qubit wire between U_12 and U_23, indicated by the red circle in Fig. <ref>(a).
In this case, for each quantum circuit equipped with the i-th channel in Eq. (<ref>), there are 2 types of measurement results;
the computational-basis measurement at the terminal of the circuit, y=(y_1,y_2,y_3), and the eigenbasis measurement on O_i in the middle of the circuit, s∈{-1,1}; see Fig. <ref>(b).
These results follow the probability distribution conditioned on the index i as
P[y_1,s|i] := Tr[(|y_1⟩⟨y_1|⊗ E_is)U_12|0⟩⟨0|^⊗ 2 U_12^†],
P[y_2,y_3|i] := Tr[|y_2,y_3⟩⟨y_2,y_3|U_23(ρ_i⊗|0⟩⟨0|)U_23^†],
where E_is denotes the projector on the eigenspace with eigenvalue s of O_i.
Using these probabilities, the target expectation value can be written as
𝔼_y[f(y)]
=γ_1 ∑_i=1^8∑_y,s sign(c_i) s f(y) P[y_1,s|i]P[y_2,y_3|i]|c_i|/γ_1,
where sign(c_i) returns the sign of c_i.
Here, we defined
γ_1 to normalize the coefficient c_i as
γ_1 := ∑_i=1^8 |c_i|,
where the subscript "1" means the 1-qubit wire cutting.
Because |c_i|/γ_1 represents the probability of the i-th channel,
Eq. (<ref>) enables us to estimate the target quantity using the Monte-Carlo method with samples from the smaller quantum circuits.
More precisely, for each shot, we first choose the index i with probability |c_i|/γ_1 and then run the small sub-circuits obtained from the quantum circuit equipped with ith channel as in Fig. <ref>(b). Then, using the measurement outcomes y and s, we calculate the value of sign(c_i) s f(y). By repeating the above process and computing their arithmetic mean with multiplication of γ_1, we would finally obtain the desired expectation value. Importantly, (y_1,s) and (y_2,y_3) can be sampled from each small circuit in Fig. <ref>(b) respectively, and as a result we can estimate 𝔼_y[f(y)] over the 3-qubit system with the use of only 2-qubit circuits.
Finally, in the above example of Id, the total number of measurements required to calculate 𝔼_y[f(y)] within the error ε is
O(γ_1^2/ε^2).
Furthermore, if we apply the decomposition with γ_1 at n places in a quantum
circuit, the total number of measurements with the error ε results in
O(γ^2n_1/ε^2).
This exponential increase of the number of the required measurements, with respect to the number of cuts, is a serious problem for practical use.
Hence, it is important to find a decomposition that achieves the smallest possible
γ_1.
§ MAIN RESULTS
§.§ Measure-and-prepare channel
Our goal is to provide a new decomposition of the parallel n-qubit identity channel
via channels with LOCC.
Such component of channel taken in this paper is the measure-and-prepare channel
defined as
ℰ(∙):=∑_i a_iTr[E_i(∙)] ρ_i,
where a_i=± 1.
The operator set {E_i} is a positive operator-valued measure (POVM) which satisfies
∑_i E_i=I^⊗ n and E_i≥ 0 for all i. Also, ρ_i is an
n-qubit density operator, which are assumed to be efficiently prepared in quantum
circuits.
Note that all measure-and-prepare channels are contained in the class of channels
such that any LOCC between the top and bottom wires is allowed to use.
An example of this channel is depicted in Fig. <ref>, showing
the case where the POVM consists of unitary operations followed by the computational
basis measurement; in this figure, the bottom wire is lifted to the same line as that
of the top wire.
The measure-and-prepare channel (<ref>) contains several
types of channels analyzed in the previous studies.
For instance, we can easily check that each channel of the decomposition in
Eq. (<ref>), i.e., Tr[O_i(∙)]ρ_i, is a special
case of the measure-and-prepare channel over 1 qubit, because of the spectral
decomposition of the observable O_i whose eigenvalues are ± 1.
Also, the shadow-based wire cut method with randomized measurements <cit.>
can also be captured by this formalism (see Appendix <ref> for
a more detailed explanation.)
§.§ Wire cutting with grouping of commuting observables
The sophisticated decomposition of the single-qubit identity channel Id
(i.e., 1 wire) with the lowest overhead for classical postprocessing is highly
demanded due to its applicability to arbitrary position in a quantum circuit.
Here, let us consider the decomposition via a linear combination of single-qubit
measure-and-prepare channels:
Id(∙) = ∑_i=1^m c_i ℰ_i(∙),
where m is the number of principle measure-and-prepare channels in this decomposition,
and c_i is a real coefficient.
We define the sampling cost for the decomposition as (γ^(mp)_1)^2 where γ^(mp)_1 denotes the one-norm of
the coefficients {c_i}; that is,
:=(γ^(mp)_1)^2, γ^(mp)_1:=∑_i=1^m|c_i|.
The superscript means that the decomposition is based on measure-and-prepare channels.
Note that the definition of γ^ (mp)_1 is consistent with Eq. (<ref>), and γ^ (mp)_1 characterizes the total number of required measurements for the estimation of 𝔼_y [f(y)] as in Eq. (<ref>).
Recall that the decomposition of Id via the original method <cit.>
realizes γ_1=4 and thus the sampling cost 16, as shown in the previous section.
Here we show that the minimum value of γ^( mp)_1 is lower bounded as
γ^(mp)_1, min≥ 3,
where γ^(mp)_1, min is defined as
γ^(mp)_1, min:=min{ ∑_i=1^m|c_i| | Id = ∑_i=1^m c_iℰ_i, c_i∈ℝ, m∈ℕ, ℰ_i }.
The proof is provided in Appendix <ref>.
Here, recall that brenner2023optimal proved that, when an arbitrary LOCC
(including the measure-and-prepare channels) is allowed to use, the lower bound of
γ_n^ (LOCC) is given by
γ_n^ (LOCC)≥ 2^n+1-1,
where the superscript means a decomposition of Id^⊗ n based on LOCC channels.
In this sense, Eq. (<ref>) is not new.
However, the achievability of the lower bound was proven only for the teleportation-based
LOCC channels that use ancilla qubits.
In contrast, here we prove that the lower bound of Eq. (<ref>) is
achievable by explicitly constructing the following ancilla-free measure-and-prepare channel.
The single-qubit identity channel Id(∙) can be decomposed as
Id(∙)
=∑_i=1,2∑_j∈{0,1}Tr[ U_i|j⟩⟨j|U_i^†(∙) ]U_i|j⟩⟨j|U_i^†
-∑_j∈{0,1}Tr[ |j⟩⟨j|(∙) ]X |j⟩⟨j|X,
where U_1=H and U_2=SH, with H the Hadamard gate and S the phase gate.
This decomposition achieves the lower bound of Eq. (<ref>) as
γ^(mp)_1 =3.
The proof of Theorem <ref> is given in Appendix <ref>.
Figure <ref>(a) shows the graphical representation of the decomposition in Eq. (<ref>).
The idea of proof is as follows.
The original decomposition in Eq. (<ref>) has redundancy in the
measurement and the input state in terms of the basis that simultaneously diagonalize
commuting observables.
This redundancy can be eliminated by applying the grouping technique for commuting
observables such as I and Z via simultaneous diagonalization.
Noting that the input states and the coefficients c_i in Eq. (<ref>)
can be rewritten as observables (See Appendix <ref>), we can apply the
grouping technique for both the measurement and the input state; as a result, we arrive at
the decomposition Eq. (<ref>).
Based on the above 1 wire cutting result, we can have a simple discussion on how to
decompose a non-parallel n wire, i.e., the set of single-qubit identity channel Id
that cannot be collected to the parallel one, Id^⊗ n.
Even in this case, our decomposition (<ref>) improves the
base of the exponential scaling for the non-parallel n-wire cutting from the original
scaling 16^n by the conventional 1-wire cutting Eq. (<ref>)
to 9^n, without any ancilla qubits.
In other words, the decomposition (<ref>) allows us to cut arbitrary n-wire with the sampling cost 9^n even in the worst case (i.e., a non-parallel n-wire cutting).
Note that the multiple applications of the decomposition (<ref>)
for each wire cannot achieve the optimal sampling cost
(γ_n^ (LOCC))^2=(2^n+1-1)^2 <cit.>.
However, for the parallel n-wire cutting, an extension of the optimal 1-wire cutting
Eq. (<ref>) gives the optimal sampling cost in n-wire without
the help of ancilla qubits, as shown in the next subsection.
Another important feature of our decomposition is that it contains only 3 measure-and-prepare channels, while the original decomposition (<ref>) contains 8
channels.
Note that when we apply a decomposition including m channels in Eq. (<ref>)
to arbitrary n wires in a quantum circuit, the total number of circuits to be simulated
is give by O(m^n), which increases exponentially with respect to the number of cuts.
For the estimation of 𝔼_y[f(y)] with use of identity channel decompositions, it is practically useful to assign a uniform number of shots to each circuit in advance and run these circuits in parallel.
Therefore the number of channels m in a decomposition should be small to save the actual execution time.
For instance, when simulating a large circuit by cutting 3 locations with the above mentioned scheme, the total number of circuits to be implemented is 512 (=8^3) in using Eq. (<ref>), but in adopting our decomposition Eq. (<ref>) the quantity is 27 (=3^3).
Accordingly, this noticeable reduction of the total number of required circuits decreases the overall processing time compared to the conventional method.
Finally, to clearly see the existence of classical communication between the top and
bottom wire, let us reconsider the problem studied in Section <ref>.
Replacing the identity channel in the red circle in Fig. <ref>(a) with the
measure-and-prepare channel in Eq. (<ref>), there are 2 types
of measurement results; y=(y_1,y_2,y_3) and j∈{0,1} (instead of s
appeared in Eq. (<ref>)).
Unlike the original decomposition in Eq. (<ref>), the measure-and-prepare channel requires us to input the quantum state U_i|j⟩ or X|j⟩ depending on the measurement result j into the following quantum circuit to sample (y_2,y_3), and thus the probability distribution of these measurement results are given by (for simplicity, i=1,2)
P[y_1,j|i] := Tr[(|y_1⟩⟨y_1|⊗ U_i|j⟩⟨j|U_i^†)U_12|0⟩⟨0|^⊗ 2 U_12^†],
P[y_2,y_3|i,j] := Tr[|y_2,y_3⟩⟨y_2,y_3|U_23( U_i|j⟩⟨j|U^†_i⊗|0⟩⟨0|)U_23^†],
where the probability distribution of (y_2,y_3) is conditioned by both the index of channels i and the measurement result j.
Comparing with Eq. (<ref>), it is clear that the our decomposition employs classical communication between split quantum circuits.
§.§ Extension to parallel multi-qubit wire
In this subsection, we show an extension of Eq. (<ref>) to the
decomposition of the n-qubit parallel identity channel Id^⊗ n, via
n-qubit measure-and-prepare channels.
Similar to Theorem <ref>, we can derive the following decomposition of
Id^⊗ n by applying the grouping technique for mutually commuting
observables in n-qubit Pauli strings.
The n-qubit parallel identity channel Id^⊗ n(∙) can be decomposed as
Id^⊗ n(∙) =∑_i=1^2^n∑_j∈{0,1}^ nTr[ U_i|j⟩⟨j|U_i^†(∙) ]U_i|j⟩⟨j|U_i^†
-(2^n-1)∑_j∈{0,1}^ nTr[ |j⟩⟨j|(∙) ] ρ_j,
where |j⟩ denotes the n-qubit computational basis, and a new input state ρ_j depending on the measurement result j is defined as:
ρ_j=∑_k∈{0,1}^n1/2^n-1(1-δ_j,k)|k⟩⟨k|.
Here, δ_j,k is the Kronecker delta, and
{U_i}_i=1^2^n∪{I^⊗ n} denotes a set of unitary operators which
transform the computational base into 2^n+1 mutually unbiased bases.
The proof of Theorem <ref> is shown in Appendix <ref>.
Figure <ref>(b) shows the graphical representation of the decomposition (<ref>).
The sampling cost of the decomposition is characterized by
γ^(mp)_n =2^n+1-1,
where the subscript n means that the decomposition consists of n-qubit
measure-and-prepare channels.
When n=1, this decomposition yields the optimal single-qubit identity channel
decomposition (<ref>).
Let us now recall Eq. (<ref>), meaning that the sampling cost of
our decomposition (<ref>) achieves the lower bound.
That is, our decomposition is one of the the optimal parallel n wires cutting method
among all the LOCC-based schemes.
Surely the most notable feature of our wire cutting method is that, unlike the
teleportation-based method (which also achieves the optimal sampling cost), it does not
use any ancilla qubits.
The mutually unbiased bases (MUBs) in n-qubit system describe a grouping of the 4^n-1
n-qubit Pauli strings {I,X,Y,Z}^⊗ n∖ I^⊗ n into 2^n+1
commuting families each of which has 2^n-1 elements that are commuting with each other
<cit.>.
That is, commuting families of Pauli strings can be diagonalized simultaneously by MUBs.
The unitary operators {U_i} transforming the computational base into MUBs can be obtained from the circuit synthesis procedure using the stabilizer matrix for mutually commuting Pauli strings <cit.>.
Also, the circuits generated by this procedure require only O(n^2) gates in the worst case.
The decomposition (<ref>) contains (2^n+1) n-qubit
measure-and-prepare channels, which can be classified into two types of channels.
The first is represented as
Λ_i^(1)(∙) := ∑_j∈{0,1}^ nTr[ U_i|j⟩⟨j|U_i^†(∙) ]U_i|j⟩⟨j|U_i^†.
In practice, this channel can be realized by measurement on an entering state with the POVM { U_i|j⟩⟨j|U_i^†} and preparation of a quantum state U_i|j⟩⟨j|U_i^†, which depends on the measurement result j∈{0,1}^n.
The second is represented as
Λ^(2)(∙) := ∑_j∈{0,1}^ nTr[ |j⟩⟨j|(∙) ] ρ_j.
This can be implemented by measuring an entering state with {|b⟩⟨b|} (b∈{0,1}^n) and preparing a random quantum state based on the measurement result j.
The new input state is randomly selected from a set {|0⟩⟨0|, |1⟩⟨1|}^⊗ n excluding the quantum state |j⟩⟨j| with equal probability.
§ DISCUSSION AND CONCLUSIONS
We propose new decompositions of the identity channels for simulating a large quantum circuit with limited quantum resources in quantum circuit cutting framework. Applying the grouping technique for mutually commuting observables into the original decomposition <cit.>, we first construct a decomposition of the single-qubit identity channel with use of local operations and classical communication.
The decomposition achieves the lower bound of sampling cost that we have derived within any decomposition whose basis is a measure-and-prepare channel allowed to use classical communication.
Here, the principle measure-and-prepare channels also contain channels used in the previous works e.g., <cit.>.
Our decomposition improves the (worst-case) sampling cost for an arbitrary k-wire cutting from 16^k by the existing best decomposition to 9^k at the cost of classical communication but needs no ancilla qubits.
We also extend the decomposition of the single-qubit identity channel to that of the n-qubit parallel identity channel relying upon the grouping technique via simultaneous diagonalization in Pauli strings.
This decomposition has the sampling cost (2^n+1-1)^2, and thus it achieves the lowest cost proved in the previous paper <cit.> within any decomposition based on LOCC.
Moreover, unlike the previous method in <cit.>, our method does not use any ancilla qubits.
Thus our method is one of the most efficient decompositions for the n-qubit parallel identity channel in LOCC scheme in terms of both sampling cost and additional quantum resources.
Considering cuts for multiple wires including non-parallel ones in a quantum circuit, we first partition the wires into sets comprised of parallel wires and then apply our optimal decomposition for each of the sets.
However, this procedure does not have the optimal sampling cost in sense of global, though each set of parallel wires is decomposed by our decomposition with locally optimal cost.
Since the optimality of sampling cost (2^n+1-1)^2 derived in <cit.> holds for a non-parallel n-wire cutting, it is an open problem whether the globally optimal cutting can be accomplished without any additional ancilla qubits.
Our method would be a promising technique to create a larger quantum system from multiple systems with limited quantum resources using classical communication.
Acknowledgements:
We thank Dr. Suguru Endo for helpful discussions.
This work was supported by MEXT Quantum Leap Flagship Program Grants No. JPMXS0118067285 and No. JPMXS0120319794.
apsrev4-1
§ THE DESCRIPTION OF EXISTING QUANTUM CIRCUIT CUTTING BY THE MEASURE-AND-PREPARE CHANNELS.
§.§ Quantum circuit cutting introduced in peng2020prl
The decomposition of the single-qubit identity channel Id(∙) given in Eq. (<ref>) can be represented with the use of the 1-qubit measure-and-prepare channels defined in Eq. (<ref>):
Id(∙) = ∑_k=1^8 c_kℰ_k(∙), ℰ_k(∙) = ∑_i_k=0,1 a_i_kTr[ E_i_k(∙) ] ρ_i_k,
where the set {c_k,(a_i_k, E_i_k, ρ_i_k)_i_k}_k=1^8 follows the Table <ref>.
For instance, ℰ_3(∙) in Eq. (<ref>), which corresponds to Tr[X(∙)]|+⟩⟨+|, can be expressed by setting a_0=1, a_1=-1, {E_0,E_1} where E_0=|+⟩⟨+|, E_1=|-⟩⟨-|, and ρ_0=ρ_1=|+⟩⟨+| as in Fig. <ref>(b).
§.§ Quantum circuit cutting with randomized measurements in lowe2023quantum
The decomposition of the n-qubit parallel identity channel Id^⊗ n given in <cit.> can be expressed with the principle n-qubit measure-and-prepare channels as follows:
Id^⊗ n(∙) = (2^n+1) 𝔼_V[ ∑_i∈{0,1}^nTr[ V|i⟩⟨i|V^† (∙) ] V|i⟩⟨i|V^†] - 2^n ∑_i∈{0,1}^ nTr[ |i⟩⟨i| (∙) ] I^⊗ n/2^n
=𝔼_V∑_i∈{0,1}^ nTr[ V|i⟩⟨i|V^† (∙) ]ρ_ cs, ρ_ cs:=(2^n+1)V|i⟩⟨i|V^†-I^⊗ n ,
where {|i⟩}_i is the n-qubit computational base, and 𝔼_V[∙] denotes the expectation over a random unitary operator V forming a unitary 2-design.
Here, the first channel 𝔼_V[ ∑_i∈{0,1}^ nTr[ V|i⟩⟨i|V^† (∙) ] V|i⟩⟨i|V^†] can be considered as a measure-and-prepare channel composed of a random POVM {E_i}={V|i⟩⟨i|V^†}, a coefficient a_i=1, and a new input state ρ_i = V|i⟩⟨i|V^†.
The second term is also a measure-and-prepare channel with the computational basis measurement and the maximally-mixed state. These two channels are schematically illustrated in Fig. <ref>(c1)(c2).
§ PROOF OF EQ. (<REF>)
§.§ Pauli Transfer Matrix
In this subsection, we briefly describe the Pauli Transfer Matrix (PTM) representation of linear operators and channels <cit.> for the proof of the lower bound of γ_1,min^(mp) in Eq. (<ref>).
For the PTM representation, we firstly introduce the Pauli basis of the 4-dimensional Hilbert-Schmidt space, whose elements act on a single qubit system, as {|σ_i⟩⟩}_i=0^3 where σ_0=I/√(2), σ_1=X/√(2), σ_2=Y/√(2), and σ_3=Z/√(2).
Similarly, we set a basis of the 4^n-dimensional Hilbert-Schmidt space for an n-qubit system as {|σ_i⃗⟩⟩}_i⃗ where σ_i⃗:=σ_i_1⊗ ... ⊗σ_i_n, (i⃗=(i_1,⋯,i_n)) with i_k∈{0,1,2,3} being the index associated with the k-th qubit.
Note that a basis σ_i⃗=σ_i_1⊗ ... ⊗σ_i_n satisfies the orthonormality under the inner product on the Hilbert-Schmidt space, i.e., ⟨⟨σ_i⃗|σ_j⃗⟩⟩ = Tr[ σ_i⃗^†σ_j⃗]=δ_i⃗,j⃗.
Here, an n-qubit quantum state ρ can be represented as follows:
|ρ⟩⟩ = ∑_i⃗ρ_σ_i⃗ |σ_i⃗⟩⟩,
where ρ_σ_i⃗ = ⟨⟨σ_i⃗|ρ⟩⟩ is a real coefficient.
|ρ⟩⟩ is a 4^n-dimensional real column vector whose i⃗-th element is ρ_σ_i⃗.
Also, an n-qubit Hermitian operator O can be expressed as the same manner.
⟨⟨ O| = ∑_i⃗ O_σ_i⃗⟨⟨σ_i⃗|,
where O_σ_i⃗ = ⟨⟨ O|σ_i⃗⟩⟩. ⟨⟨ O| is a 4^n-dimensional real row vector whose i⃗-th element is O_σ_i⃗.
Lastly, a quantum channel Λ(∙) can be written as
S(Λ) = ∑_k⃗,l⃗ S(Λ)_σ_k⃗,σ_l⃗ |σ_k⃗⟩⟩⟨⟨σ_l⃗|,
where S(Λ)_σ_k⃗,σ_l⃗=⟨⟨σ_k⃗ |S(Λ)|σ_l⃗⟩⟩ can be calculated as Tr[σ_k⃗^† Λ(σ_l⃗) ].
S(Λ) is a 4^n× 4^n real matrix, generally called superoperator.
Combining these elements |ρ⟩⟩, ⟨⟨ O|, and S(Λ), we can write the expected value of the observable O for the quantum state Λ(ρ) as
⟨O|=⟩Tr[ O Λ(ρ) ]=⟨⟨ O |S(Λ)|ρ⟩⟩.
§.§ Proof of Eq. (<ref>)
Using the PTM representation, a single-qubit measure-and-prepare channel defined in Eq. (<ref>) can be written as:
S(ℰ) = ∑_i a_i |ρ_i⟩⟩⟨⟨ E_i |,
where ρ_i is a single-qubit quantum state with the bloch vector r_i:=(r_i^x, r_i^y,r_i^z), and its PTM representation is given by |ρ_i⟩⟩=(1,r_i^x,r_i^y,r_i^z)^T/√(2).
E_i=e_i^1I+e_i^xX+e_i^yY+e_i^zZ (where each e_i^(·) is a real coefficient) is a POVM element, and the corresponding matrix is ⟨⟨ E_i|=√(2)(e_i^1,e_i^x,e_i^y,e_i^z).
Also, we can write the superoperator of the single-qubit identity channel S( Id) as
S( Id) = [ 1 0 0 0; 0 1 0 0; 0 0 1 0; 0 0 0 1 ].
Then, using these representations, the single-qubit identity channel can be decomposed by a following set of coefficients and single-qubit measure-and-prepare channels:
{c_i, S(ℰ_i)=∑_k_i a_k_i|ρ_k_i⟩⟩⟨⟨ E_k_i|}_i,
if and only if the elements of the set satisfy
[ 1 0 0 0; 0 1 0 0; 0 0 1 0; 0 0 0 1 ]=∑_i c_i∑_k_i a_k_i[ e_k_i^1 e_k_i^x e_k_i^y e_k_i^z; r_k_i^xe_k_i^1 r_k_i^xe_k_i^x r_k_i^xe_k_i^y r_k_i^xe_k_i^z; r_k_i^ye_k_i^1 r_k_i^ye_k_i^y r_k_i^ye_k_i^y r_k_i^ye_k_i^z; r_k_i^ze_k_i^1 r_k_i^ze_k_i^x r_k_i^ze_k_i^y r_k_i^ze_k_i^z ].
Focusing on the lower right 3× 3 matrix in Eq. (<ref>), we obtain a necessary condition that a set {c_i, ℰ_i} forms a valid decomposition as follows:
[ 1 0 0; 0 1 0; 0 0 1 ]=∑_i c_i∑_k_i a_k_i[ r_k_i^xe_k_i^x r_k_i^xe_k_i^y r_k_i^xe_k_i^z; r_k_i^ye_k_i^y r_k_i^ye_k_i^y r_k_i^ye_k_i^z; r_k_i^ze_k_i^x r_k_i^ze_k_i^y r_k_i^ze_k_i^z ].
Now, evaluating the trace norm ∙_1 for the both side of Eq. (<ref>), and we get the following relation:
3 = || ∑_i c_i∑_k_i a_k_i[ r_k_i^xe_k_i^x r_k_i^xe_k_i^y r_k_i^xe_k_i^z; r_k_i^ye_k_i^y r_k_i^ye_k_i^y r_k_i^ye_k_i^z; r_k_i^ze_k_i^x r_k_i^ze_k_i^y r_k_i^ze_k_i^z ]||_1 ≤∑_i |c_i| ∑_k_i |a_k_i| || [ r_k_i^xe_k_i^x r_k_i^xe_k_i^y r_k_i^xe_k_i^z; r_k_i^ye_k_i^y r_k_i^ye_k_i^y r_k_i^ye_k_i^z; r_k_i^ze_k_i^x r_k_i^ze_k_i^y r_k_i^ze_k_i^z ]||_1
= ∑_i |c_i| ∑_k_i|| [ r_k_i^xe_k_i^x r_k_i^xe_k_i^y r_k_i^xe_k_i^z; r_k_i^ye_k_i^y r_k_i^ye_k_i^y r_k_i^ye_k_i^z; r_k_i^ze_k_i^x r_k_i^ze_k_i^y r_k_i^ze_k_i^z ]||_1,
where the first inequality comes from the triangle inequality and the homogeneity of the trace norm, and the second equality uses |a_k_i|=1.
From the definition of the trace norm, we have
|| [ r_k_i^xe_k_i^x r_k_i^xe_k_i^y r_k_i^xe_k_i^z; r_k_i^ye_k_i^y r_k_i^ye_k_i^y r_k_i^ye_k_i^z; r_k_i^ze_k_i^x r_k_i^ze_k_i^y r_k_i^ze_k_i^z ]||_1
= √((r_k_i^x)^2 + (r_k_i^y)^2 + (r_k_i^z)^2)√((e_k_i^x)^2 + (e_k_i^y)^2 + (e_k_i^z)^2)
≤√((e_k_i^x)^2 + (e_k_i^y)^2 + (e_k_i^z)^2),
where the inequality comes from the fact that the magnitude of the bloch vector is less than 1, i.e., (r_k_i^x)^2 + (r_k_i^y)^2 + (r_k_i^z)^2 ≤ 1.
Here, the eigenvalues μ_k_i,+, μ_k_i,- of a POVM element corresponding to ⟨⟨ E_k_i|=√(2)(e_k_i^1,e_k_i^x,e_k_i^y,e_k_i^z) are calculated as
μ_k_i,±=e_k_i^1±√((e_k_i^x)^2 + (e_k_i^y)^2 + (e_k_i^z)^2).
Since E_k_i is a positive semi-definite operator, we have
√((e_k_i^x)^2 + (e_k_i^y)^2 + (e_k_i^z)^2)≤ e_k_i^1.
Combining Eqs. (<ref>)-(<ref>), we obtain
3 ≤∑_i |c_i| ∑_k_i e_k_i^1.
Since the operator set {E_k_i}_k_i is a POVM, it satisfies ∑_k_i E_k_i = I, and the trace of this equation leads to
∑_k_i e_k_i^1 = 1.
Consequently, we derive
γ_1^(mp) = ∑_i |c_i| ≥ 3.
Also, we can conclude that γ_1,min^(mp)≥ 3.
§ PROOF OF THEOREM <REF>
The single-qubit identity channel Id(∙) can be decomposed as
Id(∙)=∑_i=1,2∑_j∈{0,1}Tr[ U_i|j⟩⟨j|U_i^†(∙) ]U_i|j⟩⟨j|U_i^† -∑_j∈{0,1}Tr[ |j⟩⟨j|(∙) ]X |j⟩⟨j|X,
where U_1=H and U_2=SH diagonalize Pauli X and Y, respectively.
(Here, H is the Hadamard gate, and S is the phase gate.)
This decomposition achieves the lower bound of Eq. (<ref>) as
γ^(mp)_1 =3.
The decomposition of a single-qubit identity channel Id(∙) proposed by peng2020prl is expressed as
Id(∙)=1/2∑_i=0^3Tr[ O_i (∙) ] O_i,
where O_0=I, O_1=X, O_2=Y, and O_3=Z.
Distributing the 0th term with the identity I into the other terms, we can transform Eq. (<ref>) into
Id(∙)=1/2{Tr[ X (∙) ] X + Tr[ I (∙) ] I } + 1/2{Tr[ Y (∙) ] Y + Tr[ I (∙) ] I } - 1/2{Tr[ I (∙) ] I - Tr[ Z (∙) ] Z }.
Here, by a simple calculation, each term in Eq. (<ref>) can be rewritten as follows.
1/2{Tr[ X (∙) ] X + Tr[ I (∙) ] I } = ∑_j∈{0,1}Tr[ H |j⟩⟨j| H (∙) ] H |j⟩⟨j| H,
1/2{Tr[ Y (∙) ] Y + Tr[ I (∙) ] I } = ∑_j∈{0,1}Tr[ SH |j⟩⟨j| HS^† (∙) ] SH |j⟩⟨j| HS^†,
1/2{Tr[ I (∙) ] I - Tr[ Z (∙) ] Z } = ∑_j∈{0,1}Tr[ |j⟩⟨j|(∙) ]X |j⟩⟨j|X,
Therefore, we obtain the decomposition of a single-qubit identity channel in Eq. (<ref>).
Note that the proof shown above uses Eq. (<ref>) presented in the previous study <cit.>, but the correctness of Eq. (<ref>) can also be shown by simple direct calculations.
More concretely, letting A be any 2×2 complex matrix, we define the channel ℰ(∙) as
ℰ(∙):= ∑_i=1,2∑_j∈{0,1}Tr[ U_i|j⟩⟨j|U_i^†(∙) ]U_i|j⟩⟨j|U_i^† -∑_j∈{0,1}Tr[ |j⟩⟨j|(∙) ]X |j⟩⟨j|X.
Then, it is possible to check that ℰ(A)=A, ∀ A directly, and thus we conclude ℰ(∙)= Id(∙).
Next, we show that γ_1^(mp) of our decomposition in Eq. (<ref>) is 3. Following the definition of the measure-and-prepare channel, the decomposition in Eq. (<ref>) can be represented as
Id(∙) = ∑_k=1^3 c_kℰ_k(∙), ℰ_k(∙)=∑_i_ka_i_kTr[ E_i_k(∙) ] ρ_i_k,
where the set {c_k,(a_i_k,E_i_k,ρ_i_k)_i_k}_k=1,2,3 follows the Table <ref>. By the definition of γ_1^(mp) in Eq. (<ref>) and a simple calculation, γ_1^(mp) of this decomposition is clearly 3.
§ PROOF OF THEOREM <REF>
The n-qubit parallel identity channel Id^⊗ n(∙) can be decomposed as
Id^⊗ n(∙) =∑_i=1^2^n∑_j∈{0,1}^nTr[ U_i|j⟩⟨j|U_i^†(∙) ]U_i|j⟩⟨j|U_i^†
-(2^n-1)∑_j∈{0,1}^ nTr[ |j⟩⟨j|(∙) ] ρ_j,
where |j⟩ denotes the n-qubit computational basis, and a new input state ρ_j depending on the measurement result j is defined as:
ρ_j=∑_k∈{0,1}^n1/2^n-1(1-δ_j,k)|k⟩⟨k|.
Here, {U_i}_i=1^2^n∪{I^⊗ n} denotes a set of unitary operators which transform the computational base into 2^n+1 mutually unbiased bases (MUBs).
The decomposition of the single-qubit identity channel Id(∙) proposed by peng2020prl can be represented as follows:
Id(∙)=1/2∑_i=0^3Tr[ O_i (∙) ] O_i,
where O_0=I, O_1=X, O_2=Y, and O_3=Z. Using Eq. (<ref>), the n-qubit parallel identity channel Id^⊗ n := Id⊗⋯⊗ Id can be written as
Id^⊗ n(∙)=1/2^n∑_P∈{I,X,Y,Z}^⊗ nTr[ P (∙) ] P.
We first partition the 4^n-1 n-qubit Pauli strings {I,X,Y,Z}^⊗ n∖ I^⊗ n into the 2^n+1 commuting families, each of which has 2^n-1 elements that are commuting each other.
Note that the commuting families have no overlap each other.
Then we write the commuting family as G_i = { P_ij}_j=1^2^n-1, (i=1,⋯,2^n+1), and therefore Eq. (<ref>) can be rewritten as
Id^⊗ n(∙)=1/2^nTr[I^⊗ n (∙)]I^⊗ n+1/2^n∑_i=1^2^n+1∑_P_ij∈ G_iTr[P_ij(∙)]P_ij.
Here, there are unitary operators {U_i}_i=1^2^n+1 creating mutually unbiased bases from the computational base <cit.>, each of which simultaneously diagonalizes all elements of G_i.
(The construction of U_i is described in Section III.C.)
Then P_ij∈ G_i is diagonalized as
P_ij^(z)=c_ij U_i^† P_ijU_i,
where c_ij∈{1,-1}, and P_ij^(z)∈{I,Z}^⊗ n∖ I^⊗ n.
Since it holds that P_ij≠ P_ij'⇒ P_ij^(z)≠ P_ij'^(z) for any j,j', each set { P_ij^(z)}_j=1^2^n-1 is equivalent to the set {I,Z}^⊗ n∖ I^⊗ n regardless of i.
Combining Eqs. (<ref>) and Eq. (<ref>), we obtain
Id^⊗ n(∙) =1/2^nTr[I^⊗ n (∙)]I^⊗ n+1/2^n∑_i=1^2^n+1∑_P_ij∈ G_iTr[P_ij(∙)]P_ij
=1/2^nTr[I^⊗ n (∙)]I^⊗ n+1/2^n∑_i=1^2^n∑_P_ij∈ G_iTr[P_ij(∙)]P_ij
+1/2^n∑_P^(z)∈{I,Z}^⊗ n∖ I^⊗ nTr[P^(z)(∙)]P^(z)
=1/2^n∑_i=1^2^n{Tr[I^⊗ n(∙)]I^⊗ n +∑_P_ij∈ G_iTr[ P_ij (∙) ] P_ij}-1/2^n{ 2^n Tr[ I^⊗ n (∙) ]I^⊗ n-∑_P^(z)∈{I,Z}^⊗ nTr[ P^(z)(∙) ]P^(z)}
=1/2^n∑_i=1^2^n∑_P^(z)∈{I,Z}^⊗ nTr[ U_iP^(z)U^†_i (∙) ]U_iP^(z)U^†_i-1/2^n{ 2^n Tr[ I^⊗ n (∙) ] I^⊗ n -∑_P^(z)∈{I,Z}^⊗ nTr[ P^(z) (∙) ] P^(z)},
where we chose a commuting family {I,Z}^⊗ n ∖ I^⊗ n as G_2^n+1 and used c_ij^2=1.
For the first term in Eq. (<ref>), we can write it as
∑_P^(z)∈{I,Z}^⊗ nTr[ U_iP^(z)U_i^† (∙) ]U_iP^(z)U_i^†
= ∑_P^(z)∈{I,Z}^⊗ nTr[ U_i( ∑_k,k'∈{0,1}^ n⟨k|P^(z)|k'||%s⟩⟩k⟨k'|) U_i^† (∙) ] U_i( ∑_l,l'∈{0,1}^ n⟨l|P^(z)|l'||%s⟩⟩l⟨l'|) U_i^†
= ∑_P^(z)∈{I,Z}^⊗ n∑_k,l∈{0,1}^ n⟨k|P^(z)|k|⟨%s|%s⟩⟩l|P^(z)|lTr[ U_i|k⟩⟨k| U_i^† (∙) ] U_i|l⟩⟨l| U_i^†
= ∑_k,l∈{0,1}^n{∑_P_1^(z)∈{I,Z}∑_P_2^(z)∈{I,Z}⋯∑_P_n^(z)∈{I,Z}∏_m=1^n⟨k_m|P_m^(z)|k_m|⟨%s|%s⟩⟩l_m|P_m^(z)|l_m}Tr[ U_i|k⟩⟨k| U_i^† (∙) ] U_i|l⟩⟨l| U_i^†
= ∑_k,l∈{0,1}^ n{∏_m=1^n(1+(-1)^k_m+l_m) }Tr[ U_i|k⟩⟨k| U_i^† (∙) ]U_i|l⟩⟨l| U_i^†,
where |k⟩=|k_1⟩⊗⋯⊗|k_n⟩ denotes the n-qubit computational basis, and P_m^(z) is a Pauli operator acting on the m-th qubit.
Since P^(z) is a diagonal matrix with respect to the computational basis, we can omit the indices k' and l' in the first equality.
Noting that
∏_m=1^n (1+(-1)^k_m+l_m) = {[ 2^n, (k = l); 0, (k≠l) ].= 2^nδ_k,l,
we have the following equation:
1/2^n∑_i=1^2^n∑_P^(z)∈{I,Z}^⊗ nTr[ U_iP^(z)U_i^† (∙) ]U_iP^(z)U_i^† = 1/2^n∑_i=1^2^n∑_k,l∈{0,1}^ n
2^nδ_k,lTr[ U_i|k⟩⟨k| U_i^† (∙) ] U_i|l⟩⟨l| U_i^†
= ∑_i=1^2^n∑_k∈{0,1}^nTr[ U_i|k⟩⟨k|U^†_i(∙) ]U_i|k⟩⟨k|U_i^†.
For the second term in Eq. (<ref>), we can transform the two components as
2^n Tr[ I^⊗ n (∙) ] I^⊗ n = 2^n ∑_k,l∈{0,1}^ nTr[ |k⟩⟨k| (∙) ] |l⟩⟨l|,
and
∑_P^(z)∈{I,Z}^⊗ nTr[ P^(z)(∙) ] P^(z) = 2^n ∑_k∈{0,1}^nTr[|k⟩⟨k| (∙)] |k⟩⟨k|,
where we used a special case of Eq. (<ref>) with U_i=I^⊗ n
Hence, we have
1/2^n{ 2^n Tr[ I^⊗ n (∙) ] I^⊗ n -∑_P^(z)∈{I,Z}^⊗ nTr[ P^(z) (∙) ] P^(z)} = ∑_k∈{0,1}^nTr[ |k⟩⟨k| (∙) ] (-|k⟩⟨k|+∑_l∈{0,1}^n|l⟩⟨l|)
= (2^n-1)∑_k∈{0,1}^nTr[ |k⟩⟨k|(∙) ] ∑_l∈{0,1}^ n1-δ_k,l/2^n-1|l⟩⟨l|.
Combining Eqs. (<ref>), (<ref>) and (<ref>), we establish the statement of Theorem <ref>.
|
http://arxiv.org/abs/2303.06636v1
|
20230312112424
|
Strong Converses for Memoryless Bi-Static ISAC
|
[
"Mehrasa Ahmadipour",
"Michele Wigger",
"Shlomo Shamai"
] |
cs.IT
|
[
"cs.IT",
"math.IT"
] |
=0
[4]
Strong Converses for Memoryless Bi-Static ISAC
Mehrasa Ahmadipour1, Michèle Wigger2, Shlomo Shamai3
1
UMPA, ENS de Lyon
<[email protected]>
2 LTCI Telecom Paris, IP Paris, 91120 Palaiseau, France, Emails:
<[email protected]>
3 Technion, Israel , Email: [email protected]
==============================================================================================================================================================================================================================================================================================
The paper characterizes the fundamental limits of integrated sensing and communication (ISAC) systems with a bi-static radar, where the radar receiver is located close to the transmitter and estimates or detects the state based on the transmitter's channel inputs and the backscattered signals. Two models are considered. In the first model, the memoryless state sequence is distributed according to a fixed distribution and the goal of the radar receiver is to reconstruct this state-sequence with smallest possible distortion. In the second model, the memoryless state is distributed either according to P_S or to Q_S and the radar's goal is to detect this underlying distribution so that the missed-detection error probability has maximum exponential decay-rate (maximum Stein exponent). Similarly to previous results, our fundamental limits show that the tradeoff between sensing and communication solely stems from the empirical statistics of the transmitted codewords which influences both performances. The main technical contribution are two strong converse proofs that hold for all probabilities of communication error ϵ and excess-distortion probability or false-alarm probability δ summing to less than 1, ϵ+δ < 1. These proofs are based on two parallel change-of-measure arguments on the sets of typical sequences, one change-of-measure to obtain the desired bound on the communication rate, and the second to bound the sensing performance.
Integrated sensing and communication, strong converse, change of measure arguments.
§ INTRODUCTION
Sensing is a promising new feature in the upcoming 6G <cit.> and WIFI standards <cit.>. In particular, huge technological efforts are being made to integrate radar systems with communication systems. Such integrated systems are especially appealing for autonomous driving applications or autonomous manufacturing sites (as part of the Industry 4.0). In integrated sensing and communication systems (ISAC), the idea is to use the backscattered signals from communication for radar applications to sense the environment, detect hazardous events, or infer properties of other terminals (e.g., velocities or directions of other cars).
While ISAC has inspired a plethora of works in the signal processing and communications community, see for example <cit.> and references therein, only few works were reported from the information-theoretic community <cit.>. The results in <cit.> and the present manuscript all focus on the system model in Figure <ref> consisting of a transmitter (Tx) sending a message to a receiver (Rx) over a state-dependent discrete memoryless channel (SDMC). A bistatic radar close to the Tx receives the backscattered signal modeled through generalized feedback. Due to the proximity to the Tx, this radar receiver also knows the Tx's channel inputs and compares them to its feedback outputs.
The works in <cit.> determined the fundamental performance limits of a detection-version of the model in Figure <ref>. Specifically in these works, the state sequence {S_t} is assumed constant over time, taking on one of multiple possible values depending on a underlying hypothesis, and the radar receiver aims to guess this hypothesis. Sensing performance is measured in terms of exponential decay-rate of the probability of error, either the minimum exponential decay-rate over all hypotheses <cit.> or the set of decay-rates that are simultaneously achievable under the different hypotheses <cit.>. The work <cit.> also studies a mono-static version of this problem, assuming that Tx coincides with the radar receiver and thus can use the generalized-feedback signals also for communication purposes. For this mono-static radar scenario however only a coding scheme but no converse is presented. The problem is known to be hard as it relates to the challenging close-loop controlled sensing problem <cit.>.
The first information-theoretic work <cit.> on ISAC determined the fundamental limits of the rate-distortion version of the ISAC problem in Figure <ref>. assuming that the Tx can use the feedback signals also for coding (i.e., under the close-loop coding assumption). Extensions to network scenarios and to scenarios with secrecy constraints were subsequently presented in <cit.>.
In this paper, we consider both the rate-distortion version and the hypothesis testing versions of the model in Figure <ref>. In our first model, the state sequence {S_t}_t≥ 1 is independent and identically distributed (i.i.d.) according to a given distribution P_S and the radar wishes to reconstruct this state sequence with smallest possible distortion. In our second model, the state-sequence {S_t} depends on a binary hypothesis ℋ∈{0,1}. If ℋ=0, then {S_t} is i.i.d. according to a distribution P_S or if ℋ=1, it is i.i.d. according to a distribution Q_S. We measure sensing performance in terms of Stein's exponent, i.e., in terms of the maximum exponential decay-rate of the missed-detection error probability (detecting P_S instead of Q_S) under a permissible threshold on the false-alarm probability (detecting Q_S instead of P_S).
For both our models, we determine the fundamental limits of communication rates and distortion/missed-detection error exponents that are simultaneously achievable.
Similarly to previous works <cit.> our limits exhibit a tradeoff between the sensing and communication performances, which however solely stems from the empirical statistics of the codewords used for communication.
The direct parts of our proofs follow immediately from existing works. Our contributions are the proofs of the converse results. In fact, we present strong converse proofs that hold whenever the maximum allowed probability of communication error ϵ and the maximum allowed distortion-excess probability or false-alarm probability δ satisfy ϵ+δ < 1. The converse proofs are extensions of the channel coding strong converse proof in <cit.> to incorporate also the sensing bounds. Interestingly, the same change-of-measure as in <cit.> can be used to obtain the desired bound on the rate of communication. Different changes-of-measure are used to obtain the desired bounds on the sensing performances.
Strong converse proofs based on change-of-measure arguments go back to Gu and Effros <cit.> and can be also found in various other works, e.g., <cit.>. The proof method was formalized and first applied to channel coding by Tyagi and Watanabe <cit.>. Recent works <cit.> slightly modified and simplified the technique in <cit.> by restricting the new measures to sequences on typical or conditionally-typical sets. This feature allows to circumvent resorting to variational characterizations for the multi-letter and single-letter problems as proposed in <cit.>. Notice that the works <cit.> also showed the utility of the proposed converse proof method for scenarios with expectation constraints, in which case the fundamental limits depend on the permissible error probabilities.
Notation:
Upper-case letters are used for random quantities and lower-case letters for deterministic realizations. Calligraphic font is used for sets. All random variables are assumed finite and discrete. We abbreviate the n-tuples (X_1,…, X_n) and (x_1,…, x_n) as X^n and x^n and the n-t tuples (X_t+1,…, X_n) and (x_t+1,…, x_n) as X_t+1^n and x_t+1^n. We further abbreviate independent and identically distributed as i.i.d. and probability mass function as pmf.
Entropy, conditional entropy, and mutual information functionals are written as H(·), H(·|·), and I(·;·), where the arguments of these functionals are random variables and whenever their probability mass function (pmf) is not clear from the context, we add it as a subscript to these functionals. The Kullback-Leibler divergence between two pmfs is denoted by D(··). We shall use 𝒯_μ^(n)(P_XY) to indicate the jointly strongly-typical set with respect to the pmf P_XY on the product alphabet 𝒳×𝒴 and parameter μ as defined in <cit.>. Specifically, denoting by n_x^n,y^n(a,b) the number of occurrences of the pair (a,b) in sequences (x^n,y^n):
n_x^n,y^n(a,b) = | {t (x_t,y_t)=(a,b) }| ,
a pair (x^n,y^n) lies in 𝒯_μ^(n)(P_XY) if
| n_x^n,y^n(a,b)/n - P_XY(a,b) | ≤μ, ∀ (a,b)∈𝒳×𝒴,
and n_x^n,y^n(a,b)=0 whenever P_XY(a,b)=0.
The conditionally strongly-typical set with respect to a conditional pmf P_Y|X from 𝒳 to 𝒴, parameter μ>0, and sequence x^n∈𝒳^n is denoted 𝒯_μ^(n)(P_Y|X, x^n) <cit.>. It contains all sequences y^n∈𝒴^n satisfying
| n_x^n,y^n(a,b)/n - n_x^n(a)/n P_Y|X(b|a) | ≤μ, ∀ (a,b)∈𝒳×𝒴,
and n_x^n,y^n(a,b)=0 whenever P_Y|X(b|a)=0. Here n_x^n(a) denotes the number of occurrences of symbol a in x^n. In this paper, we denote the joint type of (x^n,y^n) by π_x^ny^n, i.e.,
π_x^ny^n(a,b)≜n_x^n,y^n(a,b)/n.
Accordingly, the marginal type of x^n is written as π_x^n.
§ MEMORYLESS STATE AND AVERAGE DISTORTION AS A SENSING MEASURE
Consider the bistatic radar receiver model over a memoryless channel in Fig. <ref>. A transmitter (Tx) that wishes to communicate a random message M to a receiver (Rx) over a state-dependent channel. The message M is uniformly distributed over the set {1,…, 2^nR} with R>0 and n>0 denoting the rate and blocklength of communication, respectively. The channel from the Tx to the Rx depends on a state-sequence S^n=(S_1,…, S_n) which is i.i.d. according to a given pmf P_S.
For a given blocklength n, the Tx thus produces the n-length sequence of channel inputs
X^n = ϕ^(n) (M)
for some choice of the encoding function ϕ^(n){1,…, 2^nR}→𝒳^n.
Based on X^n and S^n the channel produces the sequences Y^n observed at the Rx and the backscattered signal Z^n. The channel is assumed memoryless and described by the stationary transition law P_YZ|XS implying that the pair (Y_t,Z_t) is produced according to the channel law P_YZ|XS based on the time-t symbols (X_t,S_t).
The Rx attempts to guess message M based on the sequence of channel outputs Y^n:
M̂ = g^(n)(Y^n)
using a decoding function of the form g^(n)𝒴^n →{1,…, 2^nR}.
Performance of communication is measured in terms of average error probability
p^(n)(error) := [ M̂≠ M ]
The radar receiver produces as a guess a reconstruction of the state sequence
Ŝ^n = h^(n)(X^n,Z^n),
based on the inputs and backscattered signals. Radar sensing performance is measured as average expected distortion
dist^(n)( Ŝ^n , S^n)≜1/n∑_i=1^n d (Ŝ_i, S_i),
for a given and bounded distortion function d(·,·).
In this context we have the following definition and result.
A rate-distortion pair (R,D) is (ϵ,δ)-achievable over the state-dependent channel (𝒳,𝒴, P_Y|XS) with state-distribution P_S, if there exists a sequence of encoding, decoding, and estimation functions {(ϕ^(n), g^(n), h^(n))} such that the average probability of error satisfies
_n→∞ p^(n)(error) ≤ϵ
and the excess distortion probability
_n→∞[ dist^(n)( Ŝ^n, S^n) > D]≤δ.
For any ϵ+δ <1, a rate-distortion pair (R,D) is (ϵ,δ)-achievable, if and only if, there exists a pmf P_X
satisfying
R = I_P_XP_SP_Y|XS(X;Y)
and
D ≥𝔼_P_XP_SP_Z|XS[ d(ŝ(X, Z), S) ]
where
ŝ(x,z) :=min_ŝ∈𝒮̂∑_s P_S|XZ(s|x,z) d( ŝ, s)
and
P_S|XZ(s|x,z) := P_S(s) P_Z|XS(z|x,s)/∑_s' P_S(s') P_Z|XS(z|x,s')
The limiting case ϵ, δ↓ 0 of the theorem was already proved in <cit.>. Achievability of the theorem follows thus directly from this previous result. The converse is proved in the following
subsection, also using the next lemma, which is from <cit.>.
Without loss in optimality, one can restrict to the per-symbol estimator
h^(n)(x^n,z^n)= (ŝ(x_1,z_1), …, ŝ(x_n,z_n) ).
§.§ Strong Converse Proof
Fix a sequence of encoding and decoding functions {(ϕ^(n), g^(n))}_n=1^∞ and consider the optimal estimator h^(n) in Lemma <ref>. Assume that (<ref>) and (<ref>) are satisfied. For readability, we will also write x^n(·) for the function ϕ^(n)(·).
Choose a sequence of small positive numbers {μ_n }_n=1^∞ satisfying
lim_n→∞μ_n = 0
lim_n→∞(n ·μ_n^2 )^-1 = 0.
Expurgation:
Fix η∈ (0,1-ϵ-δ] and let ℳ̃ be the set of messages m that satisfy the following two conditions:
rCl
[M̂ ≠M|M=m ] ≤ 1-η
[ dist^(n)( Ŝ^n, S^n) > D |M=m ] ≤ 1-η.
Since the set of messages not satisfying (<ref>) is at most of size
ϵ/(1-η) 2^nR,
and similarly also the set of
messages not satisfying (<ref>) is of size at most δ/(1-η)2^nR, we can deduce that the set ℳ̃ (which is the complement of the union of these two sets) is of size at least
(1- ϵ+δ/1-η)2^nR=(1-η - ϵ-δ)/(1-η)2^nR.
Define the random variable M̃ to be uniform over the set ℳ̃ and let
X̃^n=x^n(M̃),
and thus
|ℳ̃|/2^nR≥(1- ϵ+δ/1-η)= : γ.
Let T be a uniform random variable over {1,…, n}, independent of all other random variables and notice that
rCl
P_X̃_T(x) = 1/n ∑_t=1^n P_X̃_t(x)
= 1/n ∑_t=1^n 𝔼[1{ X̃_t(M̃)=x}]
= 𝔼[π_x^n(M̃)(x) ].
Let now {n_i} be an increasing subsequence of blocklengths so that the probability vector P_X̃_T converges and denote the convergence point by P_X:
rCl
lim_n_i →∞ 1/|ℳ̃| ∑_m∈M̃ π_x^n_i(m)(x)
=: P_X(x),
∀x ∈𝒳.
In the remainder of this proof, we restrict attention to this subsequence of blocklengths {n_i}.
Proof of Channel Coding Bound:
We first prove the converse bound for channel coding. To this end, consider the two conditions
rCl
g^(n)( y^n) = m
| π_s^n,x^n(m),y^n(a,b,c) - P_S(a) π_x^n(m)(b) P_Y|XS(c|a,b) | ≤ μ_n ,
and define for each message m ∈ℳ̃ the set
rCl
𝒟_𝒞,m := { (s^n,y^n) (<ref>) and (<ref>) }.
Introduce the new random variables (S^n_𝒞,Y^n_𝒞) of joint conditional pmf
rCl
P_S^n_𝒞 Y^n_𝒞|M̃ (s^n,y^n|m)
= P_S^⊗n(s^n) ·P_Y|XS^⊗n(y^n |x^n(m), s^n)/ Δ_𝒞,m ·1 { (s^n,y^n) ∈𝒟_𝒞,m },
for
rCl
Δ_𝒞,m := ∑_s^n,y^n P_S^⊗n(s^n) ·P_Y|XS^⊗n(y^n |x^n(m), s^n)
·1 { (s^n,y^n) ∈𝒟_𝒞,m }.
By <cit.> and Conditions (<ref>) and (<ref>), we have:
rCl
Δ_𝒞,m≥η-|𝒮||𝒳||𝒴|/4μ_n^2 n, ∀m ∈ℳ̃.
Moreover, for
M̃=m:
rCl
P_Y^n_𝒞|M̃=m(y^n)
= ∑_s^n P_S^⊗n(s^n) ·P_Y|XS^⊗n(y^n |x^n(m), s^n)/ Δ_𝒞,m ·1 { (s^n,y^n) ∈𝒟_𝒞,m }
≤ ∑_s^n P_S^⊗n(s^n) ·P_Y|XS^⊗n(y^n |x^n(m), s^n)/ Δ_𝒞,m
= P_Y|X^⊗n(y^n|x^n(m))/Δ_𝒞,m.
Continue to notice that:
rCl
R = 1/n H(M̃) - 1/n logγ
(a)= 1/n I( M̃ ; Y_𝒞^n)- 1/n logγ
= 1/n H(Y^n_𝒞) -1/n H(Y_𝒞^n |M̃ )- 1/n logγ
≤ 1/n ∑_i=1^n H(Y_𝒞,i) - 1/n H(Y_𝒞^n|M̃) - 1/n logγ
= H(Y_𝒞,T |T)- 1/n H(Y_𝒞^n|M̃) - 1/n logγ
≤ H(Y_𝒞,T)- 1/n H(Y_𝒞^n|M̃) -1/n logγ,
where we defined the random variable T to be uniform over {1,…,n} independent of the other random variables. Here, (a) holds because M̃=g(Y^n_𝒞) by Condition (<ref>).
Notice next that
rCl
P_X̃_TS_𝒞,𝒯Y_𝒞,T(x,s,y)
= 1/n ∑_t=1^n P_X̃_tS_𝒞,tY_𝒞,t(x,s,y)
= 1/n ∑_t=1^n 𝔼[ 1{X̃_t,S_𝒞,t,Y_𝒞,t)=(x,s,y)}]
= [ π_x^n(M̃)S_𝒞^nY_𝒞^n(x,s,y)]
However, by Condition (<ref>)
for any triple (x,s,y) with positive P_S(s) P_Y|XS(y|x,s) the following inequality is satisfied with probability 1:
rCl
|π_x^n(m)S^n_𝒞Y_𝒞^n(x,s,y) - π_x^n(m)(x) P_Y|XS(y|x,s)P_S(s) |
≤μ_n.
Notice that by (<ref>) and (<ref>) and
since μ_n_i→ 0 as n_i→∞:rCl
lim_i →∞ P_ X̃_TS_𝒞,TY_𝒞,T(x,s,y)= P_X(x) P_S(s)P_Y|XS(y|x,s),
which by continuity of the entropy functional implies
lim_n_i→∞ H(Y_𝒞,T) =H_P_XP_SP_Y|XS(Y).
Next, by definition and by (<ref>):
rCl
1/n_i H(Y^n_i_𝒞 |M̃=m)
= - 1/n_i ∑_y^n ∈𝒟_𝒞,m P_Y^n_i_𝒞|M̃=m(y^n_i) logP_Y_𝒞^n_i|M̃=m(y^n_i)
≥ - 1/n_i ∑_y^n_i ∈𝒟_𝒞,m P_Y^n_i_𝒞|M̃=m(y^n_i) logP_Y|X^⊗n(y^n_i|x^n_i(m))/ Δ_𝒞,m
= -1/n_i ∑_t=1^n_i ∑_y^n_i ∈𝒟_𝒞,m P_Y^n_i_𝒞|M̃=m(y^n_i) logP_Y|X(y_t|x_t(m))
+ 1/n_i logΔ_𝒞,m,
= -1/n_i ∑_t=1^n_i ∑_y_t∈𝒴 P_Y_𝒞,t|M̃=m(y_t) logP_Y|X(y_t|x_t(m))
+ 1/n_i logΔ_𝒞,m,
= -1/n_i ∑_t=1^n_i ∑_y∈𝒴 [ 1{ Y_𝒞,t=y } |M̃=m] logP_Y|X(y|x_t(m))
+ 1/n_i logΔ_𝒞,m,
= - ∑_x∈𝒳 ∑_y∈𝒴 [1/n_i ∑_t=1^n_i 1{x_t(m)=x,Y_𝒞,t=y } |M̃=m]
·logP_Y|X(y|x)
+ 1/n_i logΔ_𝒞,m,
= - ∑_x∈𝒳 ∑_y∈𝒴 ∑_s∈𝒮 [ π_x^n_i(m)S^n_i_𝒞 Y_𝒞^n_i(x,s,y)|M̃=m]
·logP_Y|X(y|x)
+ 1/n_i logΔ_𝒞,m,
where P_Y|X(y|x)=∑_s∈𝒮 P_Y|XS(y|x,s) P_S(s).
Averaging over all messages m∈ℳ̃, we obtain:
rCl
1/n_iH(Y^n_i_𝒞 |M̃)
≥ - ∑_x∈𝒳 ∑_y∈𝒴 ∑_s∈𝒮 [ π_x^n_i(M̃)S^n_i_𝒞Y_𝒞^n_i(x,s,y) ] ·logP_Y|X(y|x)
+ [ 1/n_i logΔ_𝒞,M̃].
By (<ref>) the term E[ 1/n_ilogΔ_𝒞,M̃] vanishes for increasing blocklengths, and thus using the definition of P_X in (<ref>),
fone can follow the same bounding steps as leading to (<ref>) to obtain:
rCl
lim_i→∞ 1/n_i H(Ỹ^n_i |M̃)
= - ∑_x∈𝒳 P_X(x) ∑_y ∈𝒴 ∑_s∈𝒮 P_S(s) P_Y|XS(y|x,s) logP_Y|X(y|x)
= H_P_XP_SP_Y|XS(Y|X).
Combining (<ref>) with (<ref>) and (<ref>), and since 1/n_ilogγ→ 0 as n→∞, we can conclude that
rCl
R ≤ H_P_XP_SP_Y|XS(Y) - H_P_XP_SP_Y|XS(Y|X)
= I_P_XP_SP_Y|XS(X;Y).
Proof of Distortion Bound:
Consider the two conditions
rCl
dist^(n)(h^(n)(x^n(m),z^n) , s^n) ≤ D
| π_s^n,x^n(m),z^n(a,b,c) - P_S(a) π_x^n(m)(b) P_Z|XS(c|a,b) | ≤ μ_n ,
and define for each message m ∈ℳ̃ the set
rCl
𝒟_𝒮,m := { (s^n,z^n) (<ref>) and (<ref>) }.
Recall the definition X̃^n=x^n(M̃) and the limit in (<ref>).
Define the new random variables (S^n_𝒮, Z^n_𝒮) of joint conditional pmf
rCl
P_S^n_𝒮Z^n_𝒮|M̃ (s^n,z^n|m)
= P_S^⊗n(s^n) ·P_Z|XS^⊗n( z^n |x^n(m), s^n)/ Δ_𝒮,m ·1 { (s^n,z^n) ∈𝒟_𝒮,m },
for
rCl
Δ_𝒮,m := ∑_s^n,z^n P_S^⊗n(s^n) ·P_Z|XS^⊗n(z^n |x^n(m), s^n)
·1 { (s^n,z^n) ∈𝒟_𝒮,m }.
Notice that by <cit.> and Conditions (<ref>) and (<ref>), we have:
rCl
Δ_𝒮,m≥η-|𝒮||𝒳||𝒵|/4μ_n^2 n, ∀m ∈ℳ̃.
Following similar steps to (<ref>)–(<ref>), by (<ref>) and definition (<ref>), we can conclude that
rCl
lim_n_i →∞ P_ X̃_TS_𝒮,TZ_𝒮,T(x,s,z) = P_X(x) P_S(s)P_Z|XS(z|x,s).
By Condition (<ref>), we have with probability 1:
rCl
D ≥ 1/n ∑_t=1^n d ( ŝ(X̃_t, Z_𝒮,t) , S_𝒮,t).
Therefore,
for any blocklength n_i:
rCl
D ≥ 1/n_i ∑_j=1^n_i 𝔼[ d ( ŝ(X̃_j, Z_𝒮,j) , S_𝒮,j)]
= 𝔼[ d ( ŝ(X̃_T, Z_𝒮,T) , S_𝒮,T) ],
and by (<ref>) in the limit as n_i→∞:
rCl
D ≥ 𝔼_P_XP_SP_Z|XS[ d ( ŝ(X, S) , S) ].
This concludes the proof of the converse.
§ STEIN'S EXPONENT AS A SENSING MEASURE
In this section we assume that the state-sequence S^n depends on a binary hypothesis ℋ∈{0,1}. Under the null hypothesis ℋ=0 it is i.i.d. according to the pmf P_S and under the alternative hypothesis ℋ=1 it is i.i.d. according to the pmf Q_S. The radar receiver attempts to guess the underlying hypothesis based on the inputs and backscattered signals, so it produces a guess of the form
ℋ̂ = h^(n)(X^n,Z^n) ∈{0,1}.
Radar sensing performance is measured in terms of Stein's exponent. That means, it is required that the type-I error probability
α_n:=[ ℋ̂=1|ℋ=0]
stays below a given threshold, while the type-II error probability
β_n :=[ ℋ̂=0|ℋ=1]
should decay exponentially fast to 0 with largest possible exponent.
A rate-exponent pair (R,E) is (ϵ,δ)-achievable over the state-dependent DMC (𝒳,𝒴, P_Y|XS) with state-distribution P_S, if there exists a sequence of encoding, decoding, and estimation functions {(ϕ^(n), g^(n), h^(n))} such that for each blocklength n the average probability of error satisfies
_n→∞ p^(n)(error) ≤ϵ, ℋ∈{0,1},
while the detection error probabilities satisfy:
_n→∞α_n≤δ,
and
-_n→∞1/nlogβ_n≥ E.
For any ϵ, δ≥ 0 satisfying ϵ+δ <1, a rate-exponent pair (R,E) is (ϵ,δ)-achievable, if and only if, there exists a pmf P_X
satisfying
R ≤min{ I_P_XP_SP_Y|XS(X;Y), I_P_XQ_SP_Y|XS(X;Y)},
and
E ≤𝔼_P_X[D( P_Z|X Q_Z|X) ]
where P_Z|X and Q_Z|X denote the conditional marginals of P_SP_Z|XS and Q_SP_Z|XS, respectively.
Achievability follows by standard random coding for a compound channel and by applying a Neyman-Pearson test at the radar receiver. The converse is proved in Appendix <ref>.
The works in <cit.> consider degenerate state-distributions where P_S and Q_S are deterministic distributions. In this case, our Theorem simplifies as follows.[Recall that <cit.> required exponential decrease both for the type-I and type-II error probabilities α_n and β_n. Their result is thus not a special case of ours.]
Assume degenerate state-distributions P_S(s_0)=1 and Q_S(s_1)=1 for two distinct symbols s_0,s_1∈𝒮. Then, for any ϵ, δ≥ 0 satisfying ϵ+δ <1, a rate-exponent pair (R,E) is (ϵ,δ)-achievable, if and only if, there exists a pmf P_X
satisfying
R ≤min{ I_P_XP_Y|X^(s_0)(X;Y), I_P_XP_Y|X^(s_1)(X;Y)},
and
E ≤𝔼_P_X[D( P_Z|XS(·|X,s_0) P_Z|XS(·|X,s_1) ] ,
where P_Y|X^(s)(y|x)≜ P_Y|XS(y| x,s) for any triple (x, s, y).
§ CONCLUSION AND FUTURE DIRECTIONS
In this paper we established the strong converse for two ISAC problems with bi-static radar whenever ϵ+δ < 1. Interesting future research directions include extensions to mono-static radar systems where the transmitter can apply closed-loop encodings depending also on past generalized feedback systems or systems with memory. Analyzing other sensing criteria is also of interest, such as the minimum exponential decay-rate over all hypotheses or the estimation error when the distribution of the state-sequence depends on a single continuous-valued parameter.
The setup where only part of the state or a noisy version of the state is to be estimated is also of interest, for instance, in scenarios in state-dependent fading channels where one
has no interest in estimating the fading. Notice that this setup is included in the rate-distortion model through an appropriate definition of the distortion measure. On a related note, our model also includes as special case the setups where the receiver has perfect or imperfect channel-state information by including this state-information as part of the output.
ieeetran
§ STRONG CONVERSE PROOF
Fix a sequence of encoding, decoding, and estimation functions {(ϕ^(n), g^(n), h^(n))}_n=1^∞. Assume that (<ref>) and (<ref>) are satisfied. For readability, we will also write x^n(·) for the function ϕ^(n)(·).
Choose a sequence of small positive numbers {μ_n } satisfying
lim_n→∞μ_n = 0
lim_n→∞(n ·μ_n^2 )^-1 = 0.
Expurgation: Fix η∈ (0,1-ϵ-δ] and let ℳ̃ be the set of messages m that satisfy the following two conditions:
rCl
[M̂ ≠M|M=m ] ≤ 1-η
[ ℋ̂=1|ℋ=0 , M=m ] ≤ 1-η.
The size of the set ℳ̃ satisfies
|ℳ̃|/2^nR≥(1- ϵ+δ/1-η)= : γ.
Define the random variable M̃ to be uniform over the set ℳ̃ and X̃^n=x^n(M̃).
Let T be uniform over {1,…, n} independent of all other quantities and notice that
rCl
P_X̃_T(x) = 𝔼[π_x^n(M̃)(x) ].
Consider an increasing subsequence of blocklengths n_i so that the probabilities P_X̃_T(x) converge and denote the convergence point by P_X:
lim_n_i →∞ P_X̃_T= P_X(x), x ∈𝒳.
Proof of Channel Coding Bound: Considering the sequence of blocklengths {n_i}_i=1^∞ and following steps (<ref>)–(<ref>) in the previous Section <ref>, once with the pmf P_S and once with the pmf Q_S, one can show that
R ≤min{ I_P_XP_SP_Y|XS(X;Y), I_P_XQ_SP_Y|XS(X;Y)},
where P_X denotes the pmf in (<ref>).
Proof of Stein's Exponent:
Consider conditions
rCl
h^(n)(x^n(m),z^n) ) = 0
| π_s^n,x^n(m),z^n(a,b,c) - P_S(a) π_x^n(m)(b) P_Z|XS(c|a,b) | ≤ μ_n ,
and define for each message m ∈ℳ̃ the set
rCl
𝒟_𝒮,m := { (s^n,z^n) (<ref>) and (<ref>) }.
Define the new random variables (Y^n_𝒮, Z^n_𝒮) of joint conditional pmf
rCl
P_S^n_𝒮 Z^n_𝒮|M̃ (s^n, z^n|m)
= P_S^⊗n(s^n) ·P_Z|XS^⊗n( z^n |x^n(m), s^n)/ Δ_𝒮,m ·1 { (s^n,z^n) ∈𝒟_𝒮,m },
for
rCl
Δ_𝒮,m := ∑_s^n,z^n P_S^⊗n(s^n) ·P_Z|XS^⊗n( z^n |x^n(m), s^n)
·1 { (s^n,z^n) ∈𝒟_𝒮,m }.
By <cit.> and Conditions (<ref>) and (<ref>), we have:
rCl
Δ_𝒮,m≥η-|𝒮||𝒳||𝒵|/4μ_n^2 n, ∀m ∈ℳ̃.
Following similar steps to (<ref>)–(<ref>), we can conclude that
rCl
lim_n_i →∞ P_ X̃_TS_𝒮,TZ_𝒮,T(x,s,z)
= P_X(x) P_S(s)P_Z|XS(z|x,s).
We next notice the inequalities:
rCl
β_n = [ ℋ̂=0 |ℋ=1]
= 1/2^nR ∑_m=1^2^nR [ ℋ̂=0 |ℋ=1, M=m]
≥ |ℳ̃|/2^nR ·1/|ℳ̃| ∑_m∈ℳ̃ [ ℋ̂=0 |ℋ=1, M̃=m]
≥ γ·𝔼_M̃[ [ ℋ̂=0 |ℋ=1, M̃=m] ],
and therefore,
rCl
- 1/n logβ_n
≤ - 1/n log𝔼_M̃[ [ ℋ̂=0 |ℋ=1, M̃=m] ] - 1/n logγ,
where notice that the term 1/nlogγ vanishes asymptotically for infinite blocklengths.
Defining
rCl Q_Z|X(z|x) := ∑_s Q_S(s) P_Z|SX(z|x,w)
P_Z|X(z|x) := ∑_s P_S(s) P_Z|SX(z|x,w),
we can further obtain:
rCl
- 1/n log𝔼_M̃[ [ ℋ̂=0 |ℋ=1, M̃=m] ]
= - 1/n logP_X̃^n Q_Z|X^⊗n(ℋ̂=0)
= 1/n D( P_X̃^nZ_𝒮^n (ℋ̂) P_X̃^n Q_Z|X^⊗n (ℋ̂) )
≤ 1/n D( P_X̃^nZ_𝒮^n P_X̃^n Q_Z|X^⊗n )
= 1/n ∑_m ∈ℳ̃ 1/|ℳ̃| ∑_z^n P_ Z_𝒮^n|X̃^n(z^n|x^n(m))
·log P_ Z_𝒮^n|X̃^n(z^n|x^n(m))/ Q_Z|X^⊗n(z^n|x^n(m) )
≤ 1/n ∑_m ∈ℳ̃ 1/|ℳ̃| ∑_z^n P_ Z_𝒮^n|X̃^n(z^n|x^n(m))
·log P_ Z|X^⊗n (z^n|x^n(m))/ Q_Z|X^⊗n(z^n|x^n(m) )
- 1/n ∑_m ∈ℳ̃ 1/|ℳ̃| logΔ_𝒮,m
= 1/n ∑_x^nP_X̃^n Z_𝒮^n(x^n,z^n) log P_ Z|X^⊗n (z^n|x^n)/ Q_Z|X^⊗n(z^n|x^n )
- 1/n 𝔼[ logΔ_𝒮,M̃ ]
= 1/n ∑_t=1^n ∑_x_t,z_t P_X̃_t Z_𝒮,t (x_t,z_t) log P_ Z|X (z_t|x_t)/ Q_Z|X(z_t|x_t )
- 1/n 𝔼[ logΔ_𝒮,M̃ ]
= ∑_x,z P_X̃_T Z_𝒮,T (x,z) log P_ Z|X (z|x)/ Q_Z|X(z|x)
- 1/n 𝔼[ logΔ_𝒮,M̃ ].
Combining (<ref>), (<ref>), and (<ref>), and considering the subsequence of blocklengths {n_i}, we conclude that
_i→∞ - 1/nlogβ_n_i≤𝔼_P_X[ D(P_Z|X Q_Z|X) ],
where we used that 1/n𝔼[ logΔ_𝒮,M̃] → 0 as n_i→∞ by (<ref>).
This concludes the proof of the converse.
|
http://arxiv.org/abs/2303.07098v1
|
20230313133810
|
Spatially resolved observations of outflows in the radio loud AGN of UGC 8782
|
[
"Rogemar A. Riffel",
"Rogério Riffel",
"Marina Bianchin",
"Thaisa Storchi-Bergmann",
"Gabriel Luan Souza de Oliveira",
"Nadia L. Zakamska"
] |
astro-ph.GA
|
[
"astro-ph.GA"
] |
firstpage–lastpage
Beyond Fish and Bicycles: Exploring the Varieties of Online Women's Ideological Spaces
Utkucan Balcı^1, Chen Ling^2, Emiliano De Cristofaro^3,
Megan Squire^4, Gianluca Stringhini^2, Jeremy Blackburn^1
^1Binghamton University, ^2Boston University, ^3University College London, ^4SPLC
========================================================================================================================================================================================================
We use optical Integral Field Spectroscopy (IFU) to study the gas emission structure and kinematics in the inner 3.4×4.9 kpc^2 region of the galaxy UGC 8782 (3C 293), host of a radio loud Active Galactic Nucleus (AGN). The observations were performed with the GMOS-IFU on the Gemini North telescope, resulting in a spatial resolution of ∼725 pc at the distance of the galaxy. While the stars present ordered rotation following the orientation of the large scale disc, the gas shows a disturbed kinematics. The emission-line profiles present two kinematic components: a narrow (σ≲200 km s^-1) component associated with the gas in the disc of the galaxy and a broad (σ≳200 km s^-1) component produced by gas outflows. Emission-line ratio diagrams indicate that the gas in the disc is excited by the AGN radiation field, while the emission of the outflow includes additional contribution of shock excitation due to the interaction of the radio jet with the environment gas. Deviations from pure rotation, of up to 30 km s^-1, are observed in the disc component and likely produced by a previous merger event. The broad component is blueshifted by ∼150-500 km s^-1 relative to the systemic velocity of the galaxy in all locations. We construct radial profiles of the mass outflow rate and kinetic power of the ionized gas outflows, which have the maximum values at ∼1 kpc from the nucleus with peak values of Ṁ_ out,Δ R=0.5±0.1 M_⊙ yr^-1 and K̇_ out,Δ R =(6.8±1.1)×10^41 erg s^-1. The kinetic coupling efficiency of these outflows are in the range of 1–3 per cent, indicating that they could be powerful enough to affect the star formation in the host galaxy as predicted by theoretical simulations.
galaxies: active – galaxies: kinematics and dynamics – galaxies: individual: UGC 8782 (3C 293).
§ INTRODUCTION
Feedback from active galactic nuclei (AGN) is claimed to play a major role in shaping massive galaxies, by quenching star formation and transforming them from star-forming to quiescent galaxies <cit.>.
A critical ingredient in the rapid quenching of star formation in AGN hosts are multi-phase gas outflows, which can push gas out of the galaxy or redistribute it, preventing it from collapsing to form stars. However, understanding the acceleration mechanisms of such outflows remains an important unknown piece of the galaxy evolution puzzle. This question can be addressed by spatially resolved observations of tracers of the multiple gas phases of AGN driven winds <cit.>.
Using a sample composed of all galaxies in the entire spectroscopic database of the Spitzer Space Telescope, <cit.> found that AGN hosts show a significant excess of H_2 emission compared to the expected emission from star formation in normal photo-dissociation regions. In a following up work, <cit.> cross-correlated the sample of <cit.> with the SDSS-III database. One important result of this work is that the excess of H_2 emission appears to be strongly related both to emission-line and kinematic shock diagnostics, such as [O i]λ6300 flux and velocity dispersion – as shown in Figure <ref>. These results suggest that the H_2 emission excess originates from wind-driven shocks in neutral and molecular gas <cit.>. These conclusions were based on single aperture spectra. Spatially resolved observations of the neutral and ionized gas emission can provide indirect information about the role of AGN winds in the production of the H_2 emission excess in the mid-IR.
It is very difficult to accelerate dense clouds of molecular gas up to velocities high enough to escape galaxies without them being fragmented and the molecules dissociated by the intense radiation field of the AGN. Recent theoretical models suggest that molecules may be formed inside the wind, and their emission may be produced by shock heating of the gas <cit.>. The CO emission is commonly used as a tracer of cold molecular (T ∼ 100 K) outflows in AGN hosts <cit.>, while the hot molecular phase (T>1000 K) can be studied via the H_2 near-infrared emission lines <cit.>. Not much is known about the warm molecular phase (T ∼ 200 – 1000 K) traced by the H_2 emission in the the mid-infrared, which can be studied in a spatially resolved way only now with the JWST. As such observations are very time demanding, it is essential to choose carefully the objects to be studied.
Here, we present optical integral field unit (IFU) observations of the central region of the galaxy UGC 8782, which are used to map the neutral and ionized gas emission structure and kinematics. This object was selected as a likely host of strong molecular outflow, by being among the galaxies with the highest values of H_2S(3)/PAHλ11.3μm, [O i]λ6300/Hα intensity line ratios and [O i]λ6300 velocity dispersion in the sample of <cit.>. It is identified by a circle in Fig. <ref> and direct observations of the warm molecular hydrogen emission will be obtained as part of an approved cycle 1 JWST proposal (Proposal 1928, PI: Riffel, R. A.).
UGC 8782 (3C 293) at a redshift of z = 0.045 <cit.> is a radio loud source <cit.> with nuclear activity classified as a Low-Ionization Nuclear Emission Region <cit.>. Optical images reveal complex morphology with filamentary dust lanes at hundreds of parsecs and kpc scales, likely as a result of a merger event <cit.>. This galaxy presents a double-double radio source, with 200 kpc outer lobes oriented approximately along the northwest-southeast direction and ∼4 kpc scale inner lobes along the east-west direction <cit.>. Outflows from the nucleus of UGC 8782 were observed in neutral hydrogen, with velocities of up to 1400 km s^-1, coming from the western radio hotspot <cit.> and in ionized gas, but with the highest velocities, of up to 1000 km s^-1, co-spatial with the eastern radio knot, at the opposite side of the neutral gas outflows <cit.>. These outflows have been interpreted by the authors as being produced by the interaction of the radio jet with the interstellar medium. <cit.> combined multi-frequency radio data of 3C 293, obtained with the International LOw Frequency ARray (LOFAR) telescope (ILT), Multi-Element Radio Linked Interferometer Network (MERLIN) and Very Large Array (VLA), to map the spectral index over a broad frequency range. They found that the inner radio lobes are part of a young jet-dominated radio source strongly interacting with the interstellar medium, likely driven the ionized outflows mentioned above.
By comparing the spectral indices of the inner radio structure to that from the structures at larger scales, the authors conclude that 3C 293 underwent at least two episodes of nuclear activity.
This paper is organized as follows: Section 2 presents the observations and data reduction procedure, while Section 3 describes the emission line fitting and stellar kinematics measurements. The results are presented in Section 4 and discussed in Section 5, and Section 6 summarizes our conclusions. We adopt a redshift based distance to UGC 8782 of 200 Mpc, for which 1 arcsec corresponds to ∼970 pc at the galaxy.
§ OBSERVATIONS AND DATA REDUCTION
UGC 8782 was observed on February 23, 2022 with the Gemini-North Multi Object Spectrograph <cit.> operating in the Integral Field Unit <cit.> mode, under the program code GN-2022A-Q-310 (PI: Riffel, R. A.). We used B600-G5323 grating and the one slit mode of the GMOS-IFU, which provides a field of view of 35×50. The observations of UGC 8782 were split into six exposures of 1200 sec, half centred at 6250Å and half at 5950Å, in order to account for the detector gaps.
The data reduction was performed with the gemini.gmos package with the iraf software following the standard procedures for spectroscopic data, which includes the subtraction of the bias level, trimming and flat-field correction, background subtraction for each science data, quantum efficiency correction, sky subtraction and wavelength calibration. The lacos algorithm <cit.> was used for cosmic rays removal and finally we performed the flux calibration, using observations of the standard star Feige 66 to construct the sensitivity function. The final data cubes for each individual exposure have an angular sampling of 01×01.
The final data cube for UGC 8782 was obtained by median combining the individual exposure data cubes using the peak of the continuum as reference for astrometry corrections among individual cubes. The final datacube covers the spectral region from 4650 to 7500 Å, which includes the most prominent optical emission lines seen in AGN spectra, from Hβ to [S ii]λ6731Å. The velocity resolution is ≈80 km s^-1 as estimated from the full width at half maximum (FWHM) of typical emission lines in the CuAr spectra used in the wavelength calibration and the angular resolution is ∼075 as estimated from the FWHM field stars in the UGC 8782 acquisition image, corresponding to the ∼725 pc at the distance of the galaxy.
§ MEASUREMENTS
§.§ Stellar Kinematics
We use the Penalized Pixel-Fitting (ppxf) method <cit.> to fit and subtract the stellar component from the observed spectra. The code finds the best fit of the observed spectra by convolving template spectra with the Line of Sight Velocity Distribution (LOSVD) assumed to be reproduced by Gauss-Hermite series. We fit the whole spectral region, masking out regions of strong emission lines and use as spectral templates those from the MILES-HC library <cit.>, which has a similar spectral resolution of our GMOS data. We allow ppxf to include multiplicative fifth order polynomials to further adjust the continuum shape of the template to the observed spectra. In addition, we use the clean parameter of ppxf to use the iterative sigma clipping method described in <cit.> to reject spectral pixels that deviates more than 3σ from the best fit, in order to exclude from the fit unmasked bad pixels, due to remaining sky lines and spurious features.
The output from the ppxf code includes measurements of the radial velocity (V_*) and stellar velocity dispersion (σ_*) at each spaxel, which are used to construct two-dimensional maps presented in Fig. <ref>. In addition, we subtract the best fit model at each spaxel from the observed spectra in order to produce a data cube free of the stellar population component, which is used to measure the emission-line properties.
§.§ Emission-line Fitting
We use the ifscube package <cit.> to fit the observed emission-line profiles by Gaussian curves. The fit is performed after the subtraction of the stellar component contribution from the observed spectra, and we allow the code to include two Gaussian curves (a narrow and a broad component) per emission line, as indicated by visual inspection of the spectra.
We use the cubefit routine from the ifscube package and fit the following emission lines simultaneously: Hβ, [O iii] λλ4959,5007, [O i] λ6300, [N ii] λλ6548,6583, Hα and [S ii] λλ6717,6731. Initial guesses of the Gaussian amplitude, centroid velocity, and velocity dispersion are provided to the code based on measurements of the nuclear spectrum using the splot iraf task, which are used to fit the nuclear spectrum. After a successful fit of the nuclear emission line profiles, the routine fits the surrounding spaxels following a radial spiral loop, using as initial guesses the best fit parameters obtained from successful fits of spaxels at distances smaller than 03 from the fitted spaxel, as defined by using the refit parameter. If the amplitude of one of the fitted Gaussians is smaller than three times the standard deviation of the nearby continuum, only one component is used. To account for possible remaining continuum emission, we also include 4th order polynomial, which is used to fit the continuum before the fitting of the emission lines.
During the fit, we tied the velocity and velocity dispersion (σ) of emission lines produced from the same species (Hβ and Hα; [O iii] λ5007 and [O iii] λ4959; [N ii]λ6548 and [N ii]λ6583; [S ii]λ6717 and [S ii]λ6731) for each kinematic component. We also fixed the [O iii] λ5007/[O iii]λ4959 and [N ii]λ6583/[N ii]λ6548 intensity line ratios of each component to their theoretical values of 2.98 and 3.06, <cit.>, respectively.
§ RESULTS
§.§ Spatially Resolved Observations
In Fig. <ref> we present a large scale giy image of UGC 8782 (left panel) from Pan-STARRS data archive <cit.>, along with a continuum (middle panel) and a [N ii]+Hα narrow band (right panel) image obtained from the GMOS data cube. The GMOS continuum image is obtained by computing the mean flux in a 100 Å window centred at 6100 Å. The blue dashed line shows the orientation of the galaxy's major axis <cit.>. The continuum distribution is elongated along the northeast–southwest direction, has a smaller PA (∼35^∘ East of North) than for the large-scale disk, with a secondary extended structure observed to the west of the nucleus at ∼13. The [N ii]+Hα narrow band image is obtained by integrating the fluxes within a spectral window from 6500 to 6640 Å– including these lines – using the cube with the contribution of the stellar population component subtracted. Extended gas emission is observed along the major axis of the galaxy, with a similar distribution as observed in the continuum. However, the strongest emission is observed at a structure located at 13 west from the nucleus.
Fig. <ref> presents results for the stellar and gas kinematics and emission distributions. The stellar velocity field presents a velocity gradient consistent with the orientation of the major axis of the large scale disc of PA=50^∘ <cit.> with blueshifts seen to the southwest and redshifts to the northeast of the nucleus. The stellar velocity dispersion map presents values in the range from 100 to 270 km s^-1 with a mean value of 205km s^-1 and standard deviation of 65 km s^-1. Thus, the observed stellar kinematics in UGC 8782 is consistent with the behaviour expected for a rotation disc with similar orientation of the large scale disc of the galaxy.
The emission-line flux distributions for the narrow component are elongated along the local stellar disk, following a similar orientation of that of the major axis of the continuum image, for all emission lines, as can be seen in the first column of Fig. <ref>. The corresponding velocity fields also present a similar velocity behaviour of that in the stellar velocity field, with blueshifts to the southwest and redshifts to the northeast. The gas velocity dispersion maps for the narrow component for all emission lines present values smaller than those observed for the stars, with values lower than 150 km s^-1 at most locations. The kinematics and emission structure of the narrow component is consistent with emission of gas in a rotating disc, similarly to that observed for the stars. The sightly larger velocity amplitude and smaller velocity dispersion values observed for the gas as compared to those of the stars can be explained by projection effects if the gas is located in a thin disc and the stars in a thicker distribution.
The broad component emission is extended mostly to the west of the nucleus for all emission lines. The emission peaks at ∼1 arcsec west of the nucleus are close to the border of a radio knot observed at 07 west. The centroid velocity of the broad component is blueshifted by about 200 km s^-1 and the σ maps present values of up to 400 km s^-1. The green contours overlaid to the Hα flux distribution and σ map for the broad component are from the 1360 MHz radio image obtained with the MERLIN array and presented by <cit.>. The highest fluxes for the broad components are observed co-spatially with the radio structure to the west and the highest velocity dispersion values are seen surrounding the western radio lobe, suggesting that the emission of the broad component is associated to the interaction of the radio jet with the ambient gas.
Following <cit.>, we estimate the visual extinction (A_V) using the Hα/Hβ intensity line ratio, by
A_V = 7.22 log[(F_Hα/F_Hβ)_ obs/2.86],
where (F_Hα/F_Hβ)_ obs is the observed Hα/Hβ flux ratio, adopting the <cit.> extinction law and an intrinsic flux ratio of F_Hα/F_Hβ=2.86 for H i case B recombination for an electron temperature of T_e = 10 000 K and electron density of N_e = 100 ^-3 <cit.>. The resulting maps for the narrow and broad line components are shown, respectively, in the top and bottom panels of Fig. <ref>. The A_ V map for the narrow component shows values in the range from 0 to 3.5 mag, with the highest ones seen at the northwest side of the galaxy, co-spatial with the dust structure seen in the large scale image of Fig. <ref>. The mean value is ⟨ A_V⟩=2.7±0.1 mag.
The broad component in the Hβ emission line is detected only in a few spaxels and thus its resulting A_V map shows a limited spatial coverage. The mean value for the broad component is ⟨ A_V⟩=1.7±0.4 mag.
The central panels of Fig. <ref> show the [S ii]λ6717/[S ii]λ6731 flux ratio maps for UGC 8782 for the narrow (top) and broad (bottom) components. For the narrow component, the lowest values of ∼ 0.9 are seen to the southwest of the nucleus, while the highest values of up to 1.6 are observed mostly to the northwest and north of the nucleus. For the broad component, the lowest values of ∼ 0.9 are seen to the west of the nucleus, close to the tip of the radio jet, while higher values of up to 2.6 are seen to the south. The [S ii]λ6717/[S ii]λ6731 ratio can be used to estimate the electron density (N_e) for intensity line ratios in the range of ∼0.5–1.4 <cit.>. Higher values of [S ii]λ6717/[S ii]λ6731 are produced in lower density gas, while lower ratios are associated to higher density clouds.
To estimate the electron density of the emitting gas for both kinematic components, we used the PyNeb python package <cit.> and assume an electron temperature of 1.5×10^4 K, a typical value observed in Seyfert nuclei <cit.>. The resulting N_e maps are shown in the right panels of Fig. <ref>. The map for the narrow component presents the highest values (>1700 cm^-3) to the southwest of the nucleus and the lowest values (<200 cm^-3) to the northeast, and a mean value of ⟨ N_e⟩=607±27 cm^-3. Most locations with detection of the broad component in the [S ii] doublet present ratios larger than 1.4, where the relation between the line ratio and N_e becomes flat <cit.>. These regions correspond to very low densities (≲50 cm^-3). The highest densities (∼1600 cm^-3) are found close to the edge of the radio jet to the west of the nucleus and the mean value is ⟨ N_e⟩=740±72 cm^-3.
Emission-line ratio diagrams can be used to identify the dominant gas ionization source in a galaxy. In the optical, the BPT <cit.> and WHAN <cit.> diagrams are commonly used for this purpose. In the top panels of Fig. <ref> we present the spatially resolved [O iii]λ5007/Hβ vs. [N ii]λ6583/Hα BPT diagram using the fluxes of the narrow line component, as well as a colour coded excitation map (right). The gray regions in the excitation map correspond to locations where at least one line is not detected above the 3-σ threshold. Most spaxels with detected emission in all four lines show ratios in the regions occupied by Low-Ionization Nuclear Emission Regions (LINERs) and transition objects (TOs). The blue triangle shown in the BPT diagram corresponds to the nucleus, as obtained using the line fluxes computed within a circular aperture of 05 radius.
The broad component of [O iii]λ5007 and Hβ is detected only in a few spaxels around the position of its emission peak (10 west of the nucleus) and thus we do not present its BPT diagram, but we compute the integrated fluxes within a 05 radius aperture centred at 10 west of the nucleus. The ratios for the narrow and broad component integrated within this aperture are shown as a black square and a black star, respectively.
The WHAN diagrams for the narrow and broad components, are shown in the middle and bottom panels of Fig. <ref>, along with their corresponding excitation maps. The WHAN diagram is particularly useful to separate emission of gas ionized by an AGN – which results in Hα equivalent widths, EW_Hα>3Å – from those that can be attributed to hot low-mass evolved stars (HOLMES) with EW_Hα<3Å <cit.>. The WHAN diagrams for UGC 8782 show that most points are located in the regions occupied by AGNs, and emission of gas excited by HOLMES can be neglected.
UGC 8782 presents [O i]λ6300 extended emission over most of the GMOS field of view (FoV). This emission line can be used as a tracer of shocks in neutral gas <cit.>. In Fig. <ref> we present plots of the [O i] velocity dispersion (σ_OI) versus the [O i]λ6300/Hα flux line ratio using measurements for the narrow (left panel) and broad (right panel) components. The narrow component presents 100 km s^-1≲σ_OI≲130 km s^-1 and -1.0≲ log([O i]/Hα≲-0.3, while for the broad component the ranges of values are 290 km s^-1≲σ_OI≲330 km s^-1 and -0.7≲ log([O i]/ Hα≲0.0. The black points correspond to mean values computed within bins of 0.05 dex in log [O i]λ6300/Hα, and the error bars represent the standard deviation of the velocity dispersion within each bin.
§.§ Integrated spectra at selected positions
Previous observations of UGC 8782 revealed broad emission line components associated to the eastern radio jet, with higher velocities and much fainter emission, as compared to the broad components seen to the west of the nucleus <cit.>. These authors interpreted this result as the broad components originating from a bipolar outflow, driven by the radio jet. As shown in the previous section, we do not detect this eastern broad component above 3-σ noise level in individual spaxels, but there is some extended emission to the north of the nucleus as observed for Hα and [N ii]λ6583 emission lines (Fig. <ref>). In order to investigate the origin of the broad component, we have extracted individual spectra within circular apertures of 04 radius (comparable to the seeing of the observations) centred at four positions: A) the nucleus; B) the location of the western radio hotspot (Δα=-11; Δδ=01); C) the location of the eastern radio hotspot (Δα=09; Δδ=00); D) 10 north of the nucleus and E) 10 south of the nucleus. The resulting spectra are shown as black dashed lines in Fig. <ref> and reveal the presence of broad line components in all locations, not only along the radio jet. We followed the same procedure described above and fitted each emission line by two Gaussian curves using the ifscube package, keeping the kinematics (velocity and σ) of the narrow and broad components tied, separately. The resulting models are shown in red in Fig. <ref> and the individual components are shown as green dotted and blue dashed-dotted lines, respectively.
As in <cit.> – who used optical integral-field spectrograph (OASIS) observations of UGC 8782 with the William Herschel Telescope (WHT) – we also find that the broad component emission in the western radio hotspot position is about one order of magnitude brighter than that in the eastern hotspot region. In addition, our GMOS data reveals broad component emission in regions perpendicular to the radio jet, as seen in the spectra extracted in regions to the north and to the south of the nucleus in Fig. <ref>. The broad component emission in these regions is stronger than those in the eastern radio hotspot location by a factor of 2, for example, when Hα line is considered. The broad component is blueshifted in all locations with velocities of -450±48 km s^-1 for the nucleus, -200±57 km s^-1 (for the eastern hotspot), -175±30 km s^-1 (western hotspot), -140±38 km s^-1 (10 south) and -365±40 km s^-1 (10 north). The widths of the broad component are in the range 380-560 km s^-1, with the lowest value observed at the south of the nucleus and the highest at the eastern radio hotspot.
In addition, in Fig. <ref> we present the W_ 80 map for the Hα emission line. This parameter corresponds to the width of the line profile containing 80 per cent of its total flux and can be used to identify gas outflows which typically present W_ 80>500 km s^-1 observed in the [O iii]λ5007 emission line <cit.>. The W_ 80 map for UGC 8782 presents values larger than this threshold at several location surrounding the nucleus, with the highest values of up to 900 km s^-1 seen to the west of the nucleus along the radio jet.
§ DISCUSSION
<cit.> used optical integral field spectroscopy, obtained with the OASIS-IFU on the 4.2 meters William Hershel Telescope, to study the gas kinematics in the inner 12×9 arcsec^2 of UGC 8782. Their observations covered the [N ii]+Hα and the [S ii] doublet emission lines with angular sampling ranging from 03×03 in the central regions to 36×27 in the outer regions. They detected a blueshifted broad component within the inner ≈ 2 arcsec along the east-west direction spanning the region between the inner radio lobes, slightly extended to the north of the nucleus. In addition, these authors analyse long-slit spectra along the positions angles 225^∘ and 93^∘, previously published by <cit.>, which show that the broad component is detected to distances of up to 5 kpc from the nucleus to both sides, along the radio jet. Although <cit.> do not present emission-line flux maps, they mention in their work that the broad component presents much higher peak fluxes in regions to the west of the nucleus, as compared to regions to the east of it. These authors interpret the broad component as being due to fast outflows driven by the radio jet, in an orientation such that the eastern side is approaching and the western side is receding. The
eastern radio jet intercepts the disc, pushing the gas out and the radio jet creates a cocoon that disturbs the gas in all directions <cit.>.
Here, we use higher quality IFU data to further investigate the gas emission structure and kinematics. As in previous works, our GMOS data clearly reveal the presence of a narrow and a broad component, associated to gas emission from the disc and from the outflow. In the following, we will characterize both emission structures.
§.§ Origin of the gas emission
The nuclear emission of UGC 8782 was previously classified as a LINER based on optical line ratios, and interpreted as being produced by shock excitation <cit.>. Our IFU data allow us to further investigate the origin of the gas emission, in a spatially resolved manner. The BPT diagram (Fig. <ref>) shows line ratios mostly in the region occupied by LINERs and transition objects, with the nuclear emission being consistent with a LINER-type ionization. At the location of the western radio hotspot, the line ratios for the narrow component are also consistent with a LINER-type ionization and for the broad component the observed line ratios are close to the borderline separating Seyferts and LINERs in the WHAN diagram, as defined in <cit.>. These results are consistent with the classification of UGC 8782 as a host of an AGN, based on the plot of the PAH 6.2 μ m equivalent width (EW_ PAH 6.2 μ m) versus the H_2 S(3)/PAH 11.3 μ m intensity line ratio using Spitzer data <cit.>.
Although the BPT and WHAN diagnostic diagrams are useful to separate photoionized gas by star forming regions, AGN and HOLMES, they are not sensitive to possible contributions from shocks <cit.>. The [O i]λ6300/Hα intensity line ratio is a well known tracer of shocks <cit.>. Shocks may be the dominant excitation mechanism of the [O i] emission if its velocity dispersion is larger than ∼150 km s^-1 and log [O i]λ6300/Hα≳ -1.0 <cit.>. The plots of σ_ OI versus log [O i]λ6300/Hα shown in Fig. <ref> reveal that, although log [O i]λ6300/Hα > -1.0 for the disc component, the velocity dispersion is low (100–130 kms^-1), suggesting that photoionization may be the be main mechanism in action. However, shocks with these velocities may also be able to excite the gas <cit.>. Indeed, an additional contribution of shocks cannot be discarded as a weak correlation (Pearson correlation coefficient R_P=0.14) is observed between [O i]λ6300/Hα and σ_ OI for the narrow component. The highest values of both parameters are observed in regions along the disc, outside the AGN ionization cone. This result is consistent with the detection of shock ionization by AGN winds in regions outside the AGN ionization structure, where shocked gas emission can be easily observed <cit.>, and with the detection of a broad component in the integrated spectra shown in Fig. <ref>. On the other hand, the broad outflow component shows much higher [O i]λ6300/Hα and σ_ OI and there is a stronger correlation between these two parameters (R_P=0.44), which suggests that shock excitation is important in the production of emission of the outflowing gas.
Thus, the main excitation mechanism of the gas in the disc may be photoionization by the central AGN of UGC 8782 as indicated by the observed emission line ratios and kinematics, with an additional contribution of shocks. On the other hand, the enhanced gas emission associated to radio hotspots, the observed intensity line ratios and the correlation between [O i]λ6300/Hα and σ_ OI indicate that shocks play an important role in the excitation of the gas in the outflow.
§.§ The disc component
The gas velocity field for the disc component (Fig. <ref>) shows a clear rotation pattern for all emission lines, with the line of nodes oriented approximately along the orientation of the major axis of the galaxy's large scale disc <cit.>. This behaviour is similar to that observed for the stars (Fig. <ref>) and in cold molecular gas, traced by the CO emission <cit.>. However, deviation from pure rotation is also observed in the ionized gas, as a discontinuity in velocities seen at ∼1 arcsec northeast of the nucleus. In order to better constrain the gas kinematics, we use the kinemetry method <cit.> to model the gas velocity field from the Hα narrow component. This method is a generalization of the surface photometry technique and can be used to model the observed velocity field by a set of ellipses under the assumption that the velocity profile along each ellipse satisfies a cosine law, using the Fourier expansion technique <cit.>.
Fig. <ref> shows, in the top panels, the observed Hα velocity field for the disc (narrow) component (left panel), the resulting best-fit model obtained by the kinemetry method (central panel) and the residual map obtained by subtracting the model from the observed velocities (right-panel). The bottom-left panel shows the radial variation of the kinematic position angle (PA) of the major axis of the fitted ellipses (in black) and the photometric PA (in red) obtained by modeling the continuum image (Fig. <ref>) using the photutils package <cit.>. The bottom-central and bottom-right panels show the harmonic coefficients k_1 and k_5/k_1, respectively. The k_1 term describes the velocity amplitude of bulk gas motions, while the k_5/k_1 term quantifies higher-order deviations from pure rotation <cit.>.
The photometric and kinematic PA of the major axis of the ellipses approximately follow each other, with the highest offset of less than 10^∘ observed at ∼07 and at 15 from the nucleus. These discrepancies are observed at the same distances of a redshifted structure north of the nucleus and an excess of blueshifts to the north-west of it, observed in the velocity field. The position angle of the major axis changes from Ψ_0=∼20^∘ close to the nucleus to Ψ_0=∼50^∘ in the outer regions, becoming similar to the values derived for the large scale disc using images in different bands <cit.> and from the analysis of the kinematics of the cold gas <cit.>. The near side of the disc corresponds to the northwestern side of the galaxy, where obscuration is higher <cit.>. A higher extinction at the northwestern side of the galaxy is also confirmed by our GMOS data in a map for the ratio between the red and blue stellar continuum, resulting in higher values to the northwestern side of the disc.
The rotation curve (bottom central panel in Fig. <ref>) shows increasing velocity values outward from the nucleus, reaching a maximum value of ∼130 km s^-1. The k_5/k_1 parameter shows values close to zero in the inner ∼1 arcsec, and growing outwards, reaching a maximum value of ∼0.15. This indicates that beyond the inner arcsec, the gas kinematics shows deviations that cannot be explained by regular rotation under the galaxy's gravitational potential. The residual map (top-right panel of Fig. <ref>) shows low values (≲30 km s^-1), but with a systematic pattern, supporting an additional kinematic component. Redshifted regions are observed approximately along the minor axis of the galaxy, while blueshifted residuals are seen mainly along the major axis of the galaxy. The complex gas kinematics observed in the disc component of UGC 8782 is likely produced by a merger event with a gas-rich galaxy, providing a gas reservoir to feed the central SMBH as suggested by previous studies <cit.>.
We can estimate the mass of ionized gas in the disc by
M_ ion=1.4 N_ e m_ p V f,
where m_ p is the mass of the proton, N_ e is the electron density, V is the volume of the emitting gas, the 1.4 factor is included to account for the contribution of He, and f is the filling factor which can be obtained from
L_ Hα≈4π j_ Hα V f,
where L_ Hα is the Hα luminosity and 4π j_ Hα/N_e^2=3.558×10^-25 erg cm^-3 s^-1 assuming the case B H ii recombination for the low-density limit and an electron temperature of 10 000 K <cit.>. Replacing f from Eq. <ref> into Eq. <ref>, we obtain
M_ ion≈ 7×L_ Hα/N_ e.
We calculate L_ Hα from the Hα fluxes for the disc component in each spaxel, after correcting them for extinction using the A_ V map from Fig. <ref> and the extinction law of <cit.>. For spaxels with no A_ V estimates, we use the mean A_ V value to correct the Hα flux. Using the N_ e values for the disc component and using their mean value in spaxels with no N_ e measurements, we obtain M_ ion=(1.1±0.4)×10^7 M⊙. The mass of ionized gas in the disc is about three orders of magnitude lower than the mass of cold gas in UGC 8782, of 2.2×10^10 M_⊙ <cit.>.
§.§ Properties of the outflows
The geometry of the multi-phase gas outflows in UGC 8782 is an intriguing question. Outflows in neutral gas are co-spatial with the western radio hotspot <cit.>, while previous studies of the ionized gas kinematics found that the highest velocity component arises from a region co-spatial with the eastern radio hotspot <cit.>. Shock-heated gas emission is detected in X-rays at the nucleus and inner radio jet, as well as in diffuse X-ray emission to the north and to the south of the nucleus <cit.>. The cold molecular counterpart of the outflows has not yet been detected, and IRAM Plateau de Bure interferometer observations of the CO emission give an upper limit of 7.1×10^8 M_⊙ for the mass of the cold gas outflow <cit.>. The eastern side of the inner radio jet is approaching us making an angle of ∼50^∘ with the line of sight <cit.>, consistent with the orientation of the galaxy
such that the northwestern side is nearer to us. The inclination of the disk is i=50±5^∘ (relative to the plane of the sky) as obtained from ellipse fitting of the continuum image and consistent with the large scale disc <cit.>.
<cit.> interpreted the ionized gas outflows in UGC 8782 as being driven by the radio jet, and a cocoon structure surrounding the radio jet disturbing the gas in the central region of the galaxy. They found that the outflows are detected in blueshifts on both sides of the nucleus, with higher velocities observed to the eastern side attributed to the interaction of the approaching (eastern side) radio jet with the ambient gas. As shown in Fig. <ref>, our GMOS data reveal the presence of a blueshifted broad component not only at the position of the radio hotspots but also from regions away of the radio structure. In addition, the velocities of the outflow are similar at locations co-spatial with the eastern and western radio hotspots. As already noticed by <cit.>, the flux of the broad component at the eastern hotspot is very low and marginally detected in their data, leading to a high uncertainty in the velocity of the outflow. Indeed, the example of line fits shown by these authors in their Fig. 3 seems to slightly overestimate the blue wing of the [S ii] lines leading to a higher inferred velocity, as compared to the most prominent outflow component detected at the location of the western radio hotspot.
In agreement with previous observations, our data also support a contribution of shock excitation of the gas in the outflow, as discussed above. The close association between the enhanced emission structures seen in ionized gas with the radio structures indicates that the shocks are produced by jet-cloud interaction. From the spectra extracted on selected locations (Fig. <ref>) we find that the outflow component is blueshifted at all positions, with the highest velocity observed for the nucleus. The outflows are seen in blueshifts at all locations surrounding the nucleus if they are produced by the cocoon created by the radio jet <cit.>, with the enhanced emission to the western side of the galaxy being produced by the interaction of the radio jet with the ambient gas of the galaxy. Enhanced emission-line widths in regions perpendicularly to the radio jet have been observed in nearby Seyfert galaxies, but with centroid velocities close to the systemic velocity of the galaxies, and interpreted as being due to jets perturbing the gas in the disc <cit.>, equatorial outflows predicted by torus wind models <cit.> or due to much wider opening angle outflows as compared to the AGN ionization cones <cit.>. The observed blueshifted velocities at all locations around the nucleus favor a scenario in which the ionized outflows in UGC 8782 present a spherical geometry, consistent with some theoretical predictions <cit.>.
To compute the mass of ionized gas in the outflow, first we correct the flux of the Hα broad component at each spaxel using the A_V values (Fig. <ref>) for the broad component and the extinction law of <cit.>. For spaxels with no A_V estimations, we use its mean value. Then, we compute the mass of the gas in each spaxel using Eq. <ref> and the observed N_e values for the outflow from Fig. <ref> or its mean value for spaxels with no density measurements. Finally, we sum the mass contributions of all spaxels resulting in a mass of ionized gas in the outflow of M_ out=(3.3±1.1)×10^6 M_⊙. This value corresponds to about 25 per cent of the total mass of ionized gas in the central region of UGC 8782.
We estimate the mass-outflow rate and kinetic power of the ionized gas outflows within circular rings with width Δ R=03 centred at the nucleus by
Ṁ_ out,Δ R=∑_iM^i_ out,Δ R V^i_ out,Δ R/Δ R,
and
K̇_ out,Δ R=∑_iM^i_ out,Δ R (V^i_ out,Δ R)^3/2Δ R,
where the sum is performed over velocity bins corresponding to the spectral sampling of the final data cube (∼45 km s^-1) with velocities in the range from -3000 to 3000 km s^-1, M^i_ out,Δ R is the mass of ionized gas within the ring at the velocity channel i and V^i_ out,Δ R corresponds to the absolute value of the velocity of the outflow. We constructed velocity channel maps for the Hα outflow component, using a datacube constructed by subtracting the models of the stellar population contribution and of the narrow Hα component and the [N ii] emission lines. To compute the mass within each channel and radial bin, we adopt the mean electron density value for the outflow component. Fig. <ref> presents the resulting radial profiles of mass-outflow rate (top panel) and kinetic power of the outflows (bottom panel). The error bars corresponds to the uncertainties propagated from the flux, velocity and electron density. The peaks of Ṁ_ out,Δ R and K̇_ out,Δ R occur at ∼1 arcsec, as expected by the enhanced emission at the location of the western radio hotspot, reaching values of 0.5±0.1 M_⊙ yr^-1 and (6.8±1.1)×10^41 erg s^-1, respectively. These are the lower limits because where there is ionized gas, there must be neutral gas as well because otherwise the clouds get over-ionized to a much higher ionization level than observed <cit.>. The peak mass outflow rate derived here is about 3 times larger than the value derived by <cit.>. This discrepancy is due to the different assumptions by these authors and in this work, and specifically due to the correction of the Hα fluxes for extinction, not performed in the previous work.
The kinetic power of the outflows is about two orders of magnitude smaller than the kinetic power of the radio jets in UGC 8782, of 2-4×10^43 erg s^-1 <cit.>, consistent with a jet-driven outflow.
We estimate the AGN bolometric luminosity (L_ bol) from the [O iii]λ5007 luminosity by L_ bol=3500 L_ [O III] <cit.>. Using the integrated [O iii]λ5007 luminosity, corrected by dust extinction the extinction law of <cit.>, we obtain L_ bol=(2.2±0.7)×10^43 erg s^-1. Using the relation of L_ bol with the Hα luminosity, L_ bol=2000 L_ Hα <cit.> the resulting bolometric luminosity is L_ bol=(2.5±0.4)×10^43 erg s^-1.
Finally, using the hard X-ray bolometric correction from <cit.> and the observed 2–10 keV flux from <cit.>, we obtain L_ bol≈7.2×10^43 erg s^-1. An advantage of using X-ray observations is that it is less sensitive to dust obscuration and to scattered or reprocessed emission than optical wavelengths, being a direct tracer of the AGN emission.
The kinetic power of the ionized outflows corresponds to ∼1–3 per cent of the bolometric luminosity of the AGN in UGC 8782, depending on the tracer used to estimate the bolometric luminosity. This indicates that the ionized gas outflows could be powerful enough to suppress the star formation in the host galaxy as the kinetic coupling efficiency of the outflow is larger than the minimum value required by simulations for AGN feedback to have an effective impact on the host galaxies <cit.>. In addition, the kinetic energy of the outflows represents less than 20 per cent of the total energy released by the outflow and the contribution from the other gas phases is expected to be non negligible. <cit.>. On the other hand, it is worth mentioning that the uncertainties in the outflow properties are usually high (up to two orders of magnitude), due to assumptions on their densities and geometry <cit.>.
§ CONCLUSIONS
We used GMOS-IFU observations of the radio loud AGN host UGC 8782 at a spatial resolution of ∼725 pc to study the gas emission structure and kinematics in the inner 3.4×4.9 kpc^2 of the galaxy. Our main conclusions are:
* The emitting gas presents high velocity dispersion as quantified by the W_ 80 maps, with values larger than 500 km s^-1 at several locations. The highest values are observed west (∼ 1 kpc) of the nucleus in regions co-spatial with the inner radio jet, indicating a jet-cloud interaction.
* The profiles of each emission line are fitted by two Gaussian curves: a narrow (σ≲200 km s^-1) and a broad (σ≳200 km s^-1) component. The narrow component traces the emission of the gas in the galaxy disc, while the broad component is consistent with gas outflows.
* The narrow component gas kinematics shows a pattern of disc rotation, similar to that of the stars. However, differences between the observed Hα velocity field and a rotation disc model of up to 30 km s^-1 are also present, likely associated to disturbed gas kinematics due to a previous galaxy merger process.
* The broad component is blueshifted by ∼150-500 km s^-1 relative to the systemic velocity of the galaxy and has a velocity dispersion of up to σ≈400 km s^-1. This component is detected for individual spaxels mainly at locations to the west and north of the nucleus, but it is observed in integrated spectra at several locations surrounding the nucleus.
* The BPT and WHAN diagnostic diagrams show that both disc and outflow components present values in the AGN region. Shock gas excitation is also supported for the outflow component by the enhanced emission co-spatial with the western radio hotspot and by a correlation between [O i]λ6300/Hα and σ_ OI, known shock tracers.
* We estimate the mass outflow rate and kinetic power of the ionized gas outflows at different distances from the nucleus. The highest values of these properties are observed at ∼1 kpc from the nucleus with values of Ṁ_ out,Δ R=0.5±0.1 M_⊙ yr^-1 and K̇_ out,Δ R =(6.8±1.1)×10^41 erg s^-1. The kinetic power of the outflows corresponds to 1–3 per cent of the AGN bolometric luminosity.
§ ACKNOWLEDGEMENTS
We thank to an anonymous referee for their constructive comments that helped improve this manuscript.
Based on observations obtained at the Gemini Observatory, which is operated by the Association of Universities for Research in Astronomy, Inc., under a cooperative agreement with the NSF on behalf of the Gemini partnership: the National Science Foundation (United States), National Research Council (Canada), CONICYT (Chile), Ministerio de Ciencia, Tecnología e Innovación Productiva (Argentina), Ministério da Ciência, Tecnologia e Inovação (Brazil), and Korea Astronomy and Space Science Institute (Republic of Korea).
This research has made use of NASA's Astrophysics Data System Bibliographic Services. This research has made use of the NASA/IPAC Extragalactic Database (NED), which is operated by the Jet Propulsion Laboratory, California Institute of Technology, under contract with the National Aeronautics and Space Administration.
R.A.R. acknowledges the support from Conselho Nacional de Desenvolvimento Científico e Tecnológico (CNPq) and Fundação de Amparo à pesquisa do Estado do Rio Grande do Sul (FAPERGS).
R.R. thanks to CNPq (Proj. 311223/2020-6, 304927/2017-1 and 400352/2016-8), FAPERGS (Proj. 16/2551-0000251-7 and 19/1750-2). M.B. and G.L.O thank to Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES, Proj. 0001).
§ DATA AVAILABILITY
The processed data used in this article will be shared on reasonable request to the corresponding author.
mnras
|
http://arxiv.org/abs/2303.06759v2
|
20230312213922
|
New Approximation Algorithms for Touring Regions
|
[
"Benjamin Qi",
"Richard Qi",
"Xinyang Chen"
] |
cs.CG
|
[
"cs.CG"
] |
[
Wenzheng Kuang
March 30, 2023
==================
We analyze the touring regions problem: find a (1+ϵ)-approximate Euclidean shortest path in d-dimensional space that starts at a given starting point, ends at a given ending point, and visits given regions R_1, R_2, R_3, …, R_n in that order.
Our main result is an 𝒪(n/√(ϵ)log1/ϵ + 1/ϵ)-time algorithm for touring disjoint disks. We also give an 𝒪 (min(n/ϵ, n^2/√(ϵ)) )-time algorithm for touring disjoint two-dimensional convex fat bodies. Both of these results naturally generalize to larger dimensions; we obtain 𝒪(n/ϵ^d-1log^21/ϵ+1/ϵ^2d-2) and 𝒪(n/ϵ^2d-2)-time algorithms for touring disjoint d-dimensional balls and convex fat bodies, respectively.
§ INTRODUCTION
We analyze the touring regions problem: find a (1+)-approximate Euclidean shortest path in d-dimensional space that starts at a given starting point, ends at a given ending point, and visits given regions R_1, R_2, R_3, …, R_n in that order. We present algorithms for the cases where the regions R_i are constrained to be unions of general convex bodies, convex fat bodies, or balls. To the best of our knowledge, we are the first to consider the cases where regions are disjoint convex fat bodies or balls in arbitrary dimensions. Consequently, our algorithms use techniques not previously considered in the touring regions literature (<ref>). Our algorithms work under the assumption that a closest point oracle is provided; closest point projection has been extensively used and studied in convex optimization and mathematics <cit.>.
Most prior work focuses on d=2 or significantly restricts the convex bodies. The special case where d=2 and all regions are constrained to be polygons is known as the touring polygons problem. Dror et al. <cit.> solved the case where every region is a convex polygon exactly, presenting an |V|n log|V|/n-time algorithm when the regions are disjoint as well as an |V|n^2 log|V|-time algorithm when the regions are possibly non-disjoint and the subpath between every two consecutive polygons in the tour is constrained to lie within a simply connected region called a fence. Here, |V| is the total number of vertices over all polygons. Tan and Jiang <cit.> improved these bounds to |V|n and |V|n^2-time, respectively, without considering subpath constraints.
For touring nonconvex polygons, Ahadi et al. <cit.> proved that finding an optimal path is NP-hard even when polygons are disjoint and constrained to be two line segments each. Dror et al. <cit.> showed that approximately touring nonconvex polygons with constraining fences is a special case of 3D shortest path with obstacle polyhedra, which can be solved in e^4/ϵ^2 time by applying results of Asano et al. <cit.>, where e is the total number of edges over all polyhedra. Mozafari and Zarei <cit.> improved the bound for the case of nonconvex polygons with constraining fences to |V|^2n^2/^2 time. Ahadi et al. <cit.> also solve the touring objects problem exactly in polynomial time, in which the R_i are disjoint, nonconvex polygons and the objective is to visit the border of every region without entering the interior of any region.
For touring disjoint disks, a heuristic algorithm with experimental results was demonstrated by Chou <cit.>. Touring disjoint unit disks was given in a programming contest and was a source of inspiration for this paper; an n/ϵ^2-time algorithm was given <cit.>. The main result that we show for disks is superior to both of these algorithms.
Polishchuk and Mitchell <cit.> showed the case where regions are constrained to be intersections of balls or halfspaces in d dimensions to be a special instance of a second-order cone program (SOCP), which runs in d^3c^1.5n^2log1/ϵ time using SOCP time bounds as a black box. Here, c is the number of halfspace or ball constraints.
The touring regions problem can be seen as the offline version of chasing convex bodies, in which convex bodies are given sequentially, and the algorithm must choose which point to go to on a convex body before the next convex body is revealed. Bubeck et al. <cit.> and Sellke <cit.> showed competitive ratios of 2^d and √(d logn), respectively.
§.§ Formal problem description
Given n sets of points (regions) R_1, R_2, …, R_n each a subset of ^d, a starting point p_0, and an ending point p_n+1,[For convenience, some of our results define the degenerate regions R_0≜{p_0} and R_n+1≜{p_n+1}. ] define the function D (^d)^n → as D(p_1, p_2, …, p_n) ≜∑_i=0^np_i-p_i+1_2.
Let 𝒜≜{(p_1, p_2, …, p_n) |∀ i, p_i ∈ R_i}⊆ (^d)^n. Find a tuple of points (tour) (p_1',p_2',…,p_n')∈𝒜 such that D(p_1', p_2', …, p_n') ≤ (1+)min_x ∈𝒜 D(x).
We consider three main types of regions: unions of convex bodies, convex fat bodies with constant bounded fatness, and balls.
We call a region R ⊂^d a union of k convex bodies if R = C_1 ∪ C_2 ∪…∪ C_k and each C_i is convex and compact. The C_i are allowed to intersect.
We primarily restrict to the case where k ≤1.
We say that a convex region R ⊂^d is fat if there exist balls h, H with radii 0<r_h ≤ r_H, respectively, that satisfy h ⊆ R ⊆ H ⊂^d and r_H/r_h =1.
Fat objects have been previously considered in a variety of computational geometry settings <cit.>.
One element of the problem that has not yet been determined is how we represent the sets of points R_1, R_2, …, R_n; this depends on what we restrict the regions to be:
* Unions of convex bodies: We are given each region in the form R_i = C_i, 1∪ C_i, 2∪…∪ C_i, k_i. Each of the convex bodies C_i, j may be accessed via a closest point oracle. This oracle allows us to call the function _i,j(p) on some point p, which returns the point p' ∈ C_i, j such that p-p' is minimized in 1 time (note that p' is unique due to convexity).
* Convex fat bodies: We have access to each of the convex bodies R_i via a closest point oracle. Additionally, for each region, we are given the radius r_h of the inscribed ball (as described in <ref>), and a constant upper bound on the quantity r_H/r_h over all regions.
* Balls: For each ball in the input we are given its center c ∈^d and its radius r ∈_>0.
We consider the 2-dimensional and general d-dimensional cases separately. In the d-dimensional case, we assume d is a constant (for example, we say 2^d = 1). We also consider the possibly non-disjoint versus disjoint cases separately, where the latter is defined by the restriction R_i ∩ R_j = ∅ for all 0≤ i<j≤ n+1.
*Motivation for our model
When considering general convex bodies, it is natural to augment the model of computation with oracle access to the bodies, including membership, separation, and optimization oracles <cit.>. In fact, when solving the touring regions problem for general convex bodies, a closest point oracle is necessary even for the case of a single region, where the starting point is the same as the ending point and the optimal solution must visit the closest point in the region to the starting point. Closest point oracles can be constructed trivially when the bodies are constant sized polytopes or balls. Closest point oracles have been used in the field of convex optimization <cit.>.
Our representations for unions of convex bodies, convex fat bodies, and balls, have the nice structure that each “contains” the next: we can trivially construct a closest point oracle for balls. Additionally, a ball is a specific type of convex fat body, which in turn is a specific type of convex body. We justify considering convex fat bodies as they are in some sense “between” balls and general convex bodies: they obey some of the packing constraints of balls. Considering unions of convex bodies allows us to represent a variety of non-convex and disconnected regions.
§.§ Summary of results
Our results and relevant previous results are summarized in <ref> and <ref>. We obtain a bound of n^2d-1(loglog n+1/^2d-2) time for the most general case of touring unions of convex bodies in d dimensions, where each region is a union of 1 convex bodies. This significantly improves to n/^2d-2 time if we restrict the regions to be disjoint convex fat bodies. Notice that this latter bound is linear in n; in fact, we show that any FPTAS for touring convex fat bodies can be transformed into one that is linear in n (<ref>). If the regions are further restricted to be balls, we can apply our new technique of placing points nonuniformly, and the time complexity improves to n/^d-1log^21/+1/^2d-2, which roughly halves the exponent of 1/ϵ compared to the convex fat bodies algorithm while retaining an additive 1/ϵ^2d-2 term.
Our 2D-specific optimizations allow us to obtain superior time bounds compared to if we substituted d=2 into our general dimension algorithms. In most cases, we save a factor of 1/ϵ. Notably, for convex fat bodies, we obtain an algorithm with linear time dependence on both n and 1/ϵ. For our main result of touring disjoint disks, we combine our optimizations for convex fat bodies and balls with 2D-specific optimizations.
theoremnonIsectDisksTwoD
There is an n/√()log1/+ 1/-time algorithm for touring disjoint disks.
With a new polygonal approximation technique, we use the result of <cit.> for touring polygons as a black box to obtain algorithms with a square root dependence on 1/ϵ, most notably an n^3.5/√(ϵ)-time algorithm for touring 2D convex bodies and an n^2/√(ϵ)-time algorithm for touring 2D disjoint convex fat bodies.
Approximation algorithms for touring polygons in 2D have been well-studied. As mentioned in the introduction, Tan and Jiang <cit.> improved on Dror et al.'s <cit.> exact solution for convex polygons, while Mozafari and Zarei <cit.> approximated unions of nonconvex polygons, which we include in <ref> for reference. One of our 2D-specific techniques can be used to improve the result of <cit.> from |V|^2n^2/^2 to |V|nlog |V|loglog n+|V|n/log|V|/+|V|^2α(|V|) time, where α is the inverse Ackermann function, obtaining a strictly better running time for the problem of touring possibly non-disjoint unions of polygons in 2 dimensions.
The c^1.5n^2log1/ϵ-time result for touring d dimensional convex bodies given by <cit.>, where each body is an intersection of balls and half spaces (with a total of c constraints) can be applied specifically to balls to yield an n^3.5log1/ϵ-time algorithm. Our algorithms for touring disjoint disks and balls all take time linear in n and are thus superior when ϵ is not too small.
§.§ Organization of the paper
We start in <ref> by considering unions of general convex bodies, using the closest point projection, pseudo-approximation, and 2D-specific optimizations. We then use the ideas of packing and grouping to obtain algorithms for convex fat bodies in <ref>. Finally, we optimize specifically for balls in <ref> by placing points non-uniformly.
§.§ Summary of techniques
Here, we introduce the techniques mentioned in the previous subsection.
*Placing points uniformly (<ref>)
A general idea that we use in our approximation algorithms is to approximate a convex body well using a set of points on its boundary. For previous results involving polygons or polyhedra <cit.>, this step of the process was trivial, as points were equally spaced along edges. In order to generalize to convex bodies in arbitrary dimensions, we equally space points on boundaries using the closest point projection oracle with a bounding hypercube (<ref>).
After discretizing each body into a set of points, we can solve the problem in polynomial time using dynamic programming (DP): for each point, we find and store the optimal path ending at it by considering transitions from all points on the previous region.
*Pseudo-Approximation (<ref>)
Let OPT be the optimal path length for touring regions. Consider some guess of the optimal path length for touring convex bodies L_APPROX≥ OPT, and then consider constructing a hypercube of side length 2L_APPROX centered at the starting point. We then equally space points on the boundary of the portions of the convex bodies which are inside the hypercube, and solve the problem assuming that the optimal path must travel through these points, which adds some additive error proportional to L_APPROX to the optimal path length. This is called a pseudo-approximation because the error bound only holds if L_APPROX≥ OPT, and if L_APPROX is much bigger than OPT, the additive error is very large.
The idea for using this pseudo-approximation to compute an actual approximation is to start with some naive large approximation of the optimal path length, and then continuously guess smaller values of the optimal path length and run the pseudo-approximation as a subroutine to generate better approximations, eventually finding a constant approximation in loglogn iterations. Once a constant approximation is found, the pseudo-approximation algorithm becomes an actual approximation algorithm, and is then used to find a (1+ϵ)-approximation. This method was used previously by <cit.> and <cit.>. An exposition about pseudo-approximation can be found in <cit.>.
*2D-specific optimizations (<ref>)
Previous approximation algorithms for related problems discretize the boundary of each convex region using 1/ϵ points. We present a new approach to approximate each boundary using a convex polygon with 1/√(ϵ) vertices (<ref>). This allows us to use previous exact algorithms for touring convex polygons as black boxes.
A separate approach is to use additively weighted Voronoi diagrams (<ref>) to optimize dynamic programming (DP) transitions from quadratic to near-linear time. When we additionally assume the input shapes are disjoint, we use properties of Monge matrices to optimize the transitions to expected linear time (<ref>).
*Packing and grouping (<ref>)
While our general algorithm for unions of convex regions has runtime (n^2d-1/^2d-2 ), we are able to improve this to n/^2d-2 time for convex fat bodies. The key ideas behind this improvement are packing and grouping.
We use a simple packing argument to show that the path length for visiting n disjoint convex fat bodies with radius r must have length at least Ω(r · n) for sufficiently large n (<ref>). This was used by <cit.> for the case of unit disks. However, it is not immediately clear how to use this observation to obtain improved time bounds when convex fat regions are not all restricted to be the same size.
The idea of grouping is to split the sequence of regions into smaller contiguous subsequences of regions (groups). In each group, we find the minimum-sized region, called a representative region, which allows us to break up the global path into smaller subpaths between consecutive representatives. The earlier packing argument now becomes relevant here, as we can show a lower bound on the total length of the optimal path in terms of the sizes of the representatives.
*Placing points non-uniformly (<ref>)
Previous approximation methods rely on discretizing the surfaces of bodies into evenly spaced points. For balls, we use the intuition that the portion of the optimal path from one ball to the next is “long” if the optimal path does not visit the parts of the surfaces that are closest together. This allows us to place points at a lower density on most of the surface area of each ball, leading to improved time bounds. We use this technique in conjunction with packing and grouping. For disks, we additionally apply the previously mentioned 2D-specific optimizations.
§ CONVEX BODIES
First, we consider the most general case of convex bodies (or unions of convex bodies), as variations of these techniques also apply to later results. We split the discussion into the general d-dimensional case and the 2-dimensional case. Omitted proofs for this section may be found in <ref>.
§.§ General dimensions
For the theorems in this section, we let |R_i| denote the number of convex bodies that together union to region R_i. Recall that the convex bodies which make up region R_i may overlap.
The first main ingredient is the closest point projection, which allows us to equally space points on each convex body. The proof is deferred to the appendix.
For a convex region C, define closest_C(p)≜argmin_c∈ Cc-p. For any two points p_1 and p_2, closest_C(p_1)-closest_C(p_2)≤p_1-p_2.
For any closed set X, let ∂ X denote the boundary of X.
Given a convex body C for which we have a closest point oracle and a hypercube ℋ with side length r, we can construct a set S⊂ C of 1/^d-1 points such that for all p ∈ (∂ C) ∩ℋ, there exists p' ∈ S such that p-p'≤ r.
First, we prove the statement for C = ℋ. For this case, it suffices to equally space points on each face of an axis-aligned hypercube defined by [0, r]^d. For example, for the face defined by x_d = 0, we place points in a lattice at all coordinates (x_1, x_2, …, x_d-1, x_d) that satisfy x_d = 0 and x_i = k_i · r for all integers k_i∈[0, 1/]. For C ≠ℋ, equally space points on ℋ as we stated to create a set S_ℋ. Then define S≜{_C(s) | s ∈ S_ℋ}. The proof that S satisfies the conditions of the lemma is deferred to the appendix.
Now, we introduce the concept of the pseudo-approximation, which takes in an accuracy parameter γ and an estimate of the optimal path length L_APPROX≥ OPT and reduces each region R_i to a finite set of points S_i ⊂ R_i such that the optimal tour for touring S_i is also a tour for R_i, and has length at most OPT + γ L_APPROX.
Note that when the regions are possibly non-disjoint, it is not true that the optimal path must visit each ∂ R_i, so more care must be taken. In particular, we use the fact that the only time an optimal path does not visit the boundary of R_i is when it visited the boundary of some region ∂ R_l for some l < i and then remained on the interior of regions R_l+1, R_l+2, …, R_i, in which case the optimal path has moved 0 distance when visiting these regions. This requires more effort to bound the error from the optimal length and makes the dynamic programming transitions more complex, but both algorithms achieve the same time bound when all |R_i| ≤𝒪(1) (that is, when all regions are unions of a constant number of convex bodies).
Given an estimate of the optimal path length L_APPROX and 0 < γ≤ 1, if OPT ≤ L_APPROX, we can construct a valid solution with length at most OPT + γ L_APPROX. If all R_i are disjoint, this construction takes n/γ^2d-2∑_i=1^n-1 |R_i||R_i+1| time. When the R_i are possibly non-disjoint, the runtime increases to n/γ^2d-2max_j|R_j|∑_i=1^n |R_i|.
We construct finite sets of points S_i ⊂ R_i such that there exists a path of the desired length that tours regions S_i.
Assume OPT≤ L_APPROX and consider a hypercube ℋ centered at p_0 with side length 4 · L_APPROX. We define the construction as follows: For each of the convex bodies
C_i, 1, C_i, 2, C_i, 3, …, C_i, |R_i| that make up R_i, apply the construction given in <ref> with ϵ≜γ/16n, r ≜ 4L_APPROX, and set S_i to be the union of all |R_i| constructed sets of points. This uses 1/ϵ^d-1 = n/γ^d-1 points per convex body.
Given the sets S_i, the path of length OPT + γ L_APPROX can be computed directly using dynamic programming. When the R_i are disjoint, transitions occur from points on S_i to S_i+1. Transitions are slightly different for the possibly non-disjoint case since points in the set S_i can transition to points on S_j for j > i+1. The details of the dynamic programming and the proof that the length of the returned path is bounded above by OPT+γ L_APPROX are deferred to the appendix.
To convert our pseudo-approximation algorithm into an actual approximation, we start with an n-approximation of the optimal path length; the construction is deferred to the appendix.
There is a trivial (2n+1)-approximation for touring general regions that can be computed in n time given a closest point oracle.
Now, our goal is to construct a constant approximation starting from our trivial approximation. The idea, first presented in <cit.> for the problem of 3D shortest path with obstacles, is to run the pseudo-approximation loglog n times with γ=1. The resulting runtime is much faster than if one were to naively apply <ref> with γ = ϵ/n. The proof is deferred to the appendix.
There is an
n^2d-2loglogn· (∑_i=1^n-1 |R_i| |R_i+1|)-time algorithm that obtains a 4-approximation for touring disjoint unions of convex bodies in d dimensions. If the unions can intersect, the runtime increases to n^2d-2loglogn· (∑_i=1^n |R_i| max_j |R_j|).
Finally, we combine all of the lemmas of the section to give the main results.
There is an n^2d-2(loglogn+1/^2d-2) · (∑_i=1^n-1 |R_i| |R_i+1|)-time algorithm for touring disjoint unions of convex bodies in d dimensions. When the bodies are allowed to intersect, the runtime becomes (n^2d-2(loglogn+1/^2d-2) · (∑_i=1^n |R_i| max_j |R_j|)).
For the disjoint case, apply <ref> to get a constant approximation in (n^2d-2loglogn· (∑_i=1^n-1 |R_i| |R_i+1|)) time, then use <ref> with L_APPROX as our constant approximation and γ = ϵ/4 to obtain a (1+)-approximation in n^2d-2(1/^2d-2) · (∑_i=1^n-1 |R_i| |R_i+1|) additional time. The possibly non-disjoint case is similar.
§.§ Two dimensions
When the unions of convex bodies are constrained to lie in 2D, there are two main avenues for further improvements: first, by speeding up the dynamic programming (DP) transitions when all regions have been discretized into point sets, and second, by approximating convex bodies by convex polygons instead of sets of points. In this section, “union of convex bodies” refers to a union of 1 convex bodies per region.
§.§.§ Dynamic programming speedup
The first speedup comes as a result of observing that the DP in <ref> is similar to closest point queries, which can be computed efficiently.
Given two lists of points B=[b_1,…,b_m] and A=[a_1,a_2,…,a_n] and a real weight [w_1,…,w_n] for each point in A, we can compute min_1≤ j≤ nw_j+a_j-b_i for each i∈ [1,m] in (m+n)log n time.
This problem is equivalent to constructing and querying a Voronoi diagram for additively weighted point sets. Constructing the diagram can be done in nlog n time by a variant of Fortune's algorithm <cit.>. For each b_i we can search the Voronoi diagram for the a_j corresponding to the minimum in log n time.
The Touring Regions Problem in 2D, where all R_i are sets of finitely many points S_i, can be solved exactly in ∑_i=1^n|S_i|log|S_i| time.
Recall the dynamic programming method from <ref>, which computes the DP value for each point in S_i+1 in |S_i| time, meaning that each pair of adjacent regions contributes |S_i||S_i+1| to the runtime. Substituting <ref> in place of this step, the runtime improves to
∑_i=1^n-1(|S_i|+|S_i+1|)log |S_i|≤∑_i=1^n|S_i|log |S_i|.
For disjoint convex regions, we use a stronger guarantee than <ref>:
Given are the vertices of two disjoint convex polygons B=[b_1,…,b_m] and A=[a_1,a_2,…,a_n] in counterclockwise order and real weights [w_1,…,w_n], one for each vertex of A. Define d(i,j)≜ w_j+a_j-b_i. Then min_1≤ j≤ nd(i,j) may be computed for all i∈ [1,m] in m+n expected time.
We first discuss the case where all w_i=0. Aggarwal and Klawe <cit.> showed how to reduce the computation of min_1≤ j≤ n, a_j visible from b_id(i,j) and
min_1≤ j≤ n, a_j not visible from b_id(i,j) for all i∈ [1,m] to computing the row minima of several Monge partial matrices with dimensions m_1× n_1, m_2× n_2,…, m_k× n_k such that ∑ (m_i+n_i)≤(m+n) in (m+n) time. Here, a_j is said to be visible from b_i if the segment a_jb_i intersects neither the interiors of polygons A nor B. The definition of Monge partial matrix can be found in <cit.>.
Chan <cit.> recently introduced an m+n expected time randomized algorithm for computing the row minima of an m× n Monge partial matrix.[The Monge partial matrix does not have to be given explicitly; it suffices to provide an oracle that returns the value of any entry of the matrix in 𝒪(1) time.] Thus, the case of w_i=0 can be solved in m+n expected time.
The key claim that Aggarwal and Klawe <cit.> use to show that all the matrices they construct are Monge partial is as follows:
[Lemma 2.1 of <cit.>, adapted]
Assume all w_j=0. Suppose j≠ j' and i≠ i'. If a_ja_j'b_i'b_i form a convex quadrilateral in that order then d(i,j)+d(i',j')≤ d(i,j')+d(i',j).
The claim above holds by the triangle inequality, and it is easy to check that it still holds without the assumption w_j=0. Thus the algorithm from <cit.> generalizes to the case of nonzero w_j with minor modifications.
The Touring Regions Problem in 2D, where all R_i are sets of finitely many points S_i that each form a convex polygon in counterclockwise order and the convex hulls of all S_i are disjoint, can be solved exactly in ∑_i=1^n|S_i| expected time.
Using these techniques, we obtain the following speedups. <ref> follows due to similar reasoning as <ref>, as a polygon with |V| vertices can be triangulated in |V| time due to Chazelle <cit.>.
There is an n^2loglog n+1/-time algorithm for touring disjoint unions of convex bodies in 2D where each union consists of 1 convex bodies. When the bodies are possibly non-disjoint, the bound is n^3loglog n+1/+log 1//n time.
For the first bound, use <ref> with <ref> to speed up DP transitions. For the second bound, use <ref> but with an extension of <ref> to speed up DP transitions.
There is an |V|nlog |V|loglog n+|V|n/log|V|/-time algorithm for touring disjoint unions of polygons. When the polygons are allowed to intersect each other, the time complexity increases by |V|^2α(|V|).
§.§.§ Polygonal approximation algorithms
Up until now, we have approximated the perimeter of a convex region using points. We can alternatively approximate the perimeter using a convex polygon with fewer vertices, which can be computed using our closest point projection oracle. The proof is deferred to the appendix.
Given a closest point oracle for a convex region C and a unit square U, we may select ^-1/2 points in C such that every point within C∩ U is within distance of the convex hull of the selected points.
The polygonal approximation allows us to immediately obtain the following result. The proof is deferred to the appendix.
There is a n^2.5/√()-time algorithm for touring disjoint convex bodies in 2D. When the convex bodies are possibly non-disjoint, the bound is n^3.5/√() time.
Let's start with the disjoint case.
We first use <ref> with 1+ϵ = 2 to obtain a path of length L_APPROX that satisfies L_APPROX≤ 2· OPT in o(n^2.5) time.
Consider constructing a square ℋ of side length 2L_APPROX centered at p_0. Let ϵ' = ϵ/8n.
Now, we apply <ref> to select a set S_i of size |S_i| ≤ϵ'^-1/2 points on each region R_i, such that every point within R_i ∩ℋ is within distance ϵ' · L_APPROX of some point in the convex hull of S_i.
Define C_i to be the convex hull of S_i in counterclockwise order, which we can compute in linear time because the construction given in <ref> returns points that are all on the convex hull. Now, run <cit.> to solve the touring disjoint convex polygons problem for C_i exactly in |V|n = n^2 ϵ'^-1/2≤n^2.5/√(ϵ) time. Recall that |V| is the total number of vertices over all polygons.
It remains to show that the solution we find from the convex polygons problem is a 1+ϵ approximation of the answer. Consider an optimal solution p_0 ∈ R_0, p_1 ∈ R_1, …, p_n ∈ R_n, p_n+1∈ R_n+1. Now, for every i, define p_i' to be the closest point on C_i to p_i, where <ref> guarantees p_i-p_i'≤ϵ' · L_APPROX≤ 2ϵ' · OPT. Thus,
∑_i=0^np_i'-p_i+1' ≤∑_i=0^np_i-p_i+1 + p_i-p_i' + p_i+1-p_i+1'
≤ OPT + (n+1) · 4ϵ' · OPT ≤ (1+ϵ)OPT,
as desired.
For the intersecting case, we first use <ref> with 1+ϵ = 2 to obtain a constant approximation of the optimal length in o(n^3.5) time. The rest of the proof is identical, except now the C_i can intersect, which changes the runtime of the application of <cit.> to |V|n^2 = n^3 ϵ'^-1/2≤n^3.5/√(ϵ).
§ DISJOINT CONVEX FAT BODIES
In this section, we present packing and grouping techniques for touring disjoint convex fat bodies and show how they can be applied to obtain minn/,n^2/√()-time algorithms for touring disjoint convex fat bodies in 2 dimensions. Omitted proofs for this section may be found in <ref>.
§.§ Techniques
§.§.§ Packing
A packing argument shows that the length of the optimal path length is at least linear in the number of bodies and the minimum r_h (that is, the minimum radius of any inscribed ball). Intuitively, if we place n disjoint objects of radius at least 1 that are close to being disks on the plane, the length of the optimal tour that visits all of them should be at least linear in n for sufficiently large n. The details are in the appendix.
Assume a fixed upper bound on r_H/r_h. Then there exists n_0= 1 such that the optimal path length OPT for touring any n ≥ n_0 disjoint convex fat objects is Ω(n ·min r_h). For balls, n_0=3.
The packing lemma allows us to obtain a strong lower bound on the length of the optimal tour in terms of the size of the regions, which will be crucial in proving that our algorithms have low relative error.
Let r_i denote the ith largest r_h. For all i≥ n_0, r_i≤OPT/i.
Consider dropping all regions except those with the i largest inner radii and let OPT_i be the optimal length of a tour that visits the remaining disks in the original order. By <ref>, for i≥ n_0, OPT≥ OPT_i≥Ω(i· r_i) r_i≤OPT/i.
The optimal path length for touring n disjoint convex fat bodies is Ω( ∑_i≥ n_0 r_i/logn), and there exists a construction for which this bound is tight.
Using <ref>,
∑_i≥ n_0r_i/log n≤∑_i≥ n_0OPT/i/log n≤OPT/log n∑_i=n_0^n1/i≤OPT.
We display the construction in <ref>; we defer the full description to the appendix. The idea is to place disjoint disks of radii 1/1, 1/2, 1/3, … such that they are all tangent to a segment of the x-axis of length 1.
§.§.§ Grouping
We now show that we can split up the optimal path into smaller subpaths by splitting the sequence of bodies into groups of consecutive bodies, finding the minimum-sized body in each group, and considering the subpaths between these small bodies. By the packing lemma, the sum of the radii of the representatives is small compared to the total path length.
In particular, using groups of size 1/ϵ, we can compress the smallest sized region into a single point, meaning that we can consider touring regions between these points independently from each other. This allows us to turn any polynomial time approximation scheme for touring disjoint convex fat bodies into one that is linear in n.
Given an algorithm for touring disjoint convex fat bodies in d dimensions that runs in f(n, ) time, where f is a polynomial, we can construct an algorithm that runs in (n+1) · f(1/, ) time (for ≤(1)).
We describe an algorithm achieving a (1+())-approximation. To achieve a (1+)-approximation, scale down by the appropriate factor.
Define s ≜⌈1/ϵ⌉ and let n_0 be the constant defined in the statement of <ref>. We will prove the statement for all ϵ satisfying 1/ϵ≥ n_0. First, we divide the n+2 regions (including R_0 and R_n+1) into k=maxn+2/s,2≤n+1 consecutive subsequences, each with exactly s regions (except the starting and ending subsequences, which are allowed to have fewer).
Let M_i be the region with minimum inscribed radius r_h in the ith subsequence; note that M_1=R_0 and M_k=R_n+1. For each i ∈[1,k], pick an arbitrary point p_i∈ M_i. Let OPT' be the length of the shortest tour of R_0,…,R_n+1 that passes through all of the p_i. The p_1,…,p_k form k-1 subproblems, each with at most 2s regions. Therefore, we can (1+)-approximate OPT' by (1+)-approximating each subproblem in
(k-1) · f(2s,ϵ)≤ (n+1) · f(1/, ) time.
It remains to show that OPT' is a (1+O(ϵ))-approximation for OPT. Let r_i be shorthand for the radius r_h of M_i (r_1=r_k=0). By the definition of fatness, the distance between any two points in M_i is at most r_i. By following through OPT and detouring to each point p_i, we get a path through points p_i with length at most OPT+∑ r_i, and OPT' is at most this amount.
The last remaining step is to show ∑ r_i≤ϵ· OPT. We apply <ref> to each subsequence, and obtain that r_is≤OPT_i, where OPT_i is the optimal distance to tour regions in subsequence i. Note that although the starting and ending subsequences can have sizes less than s, they satisfy r_i=0, so this bound holds for all subsequences. Therefore, ∑ r_i≤ϵ·∑ OPT_i≤ϵ· OPT.
§.§ Algorithms for convex fat bodies
Using a similar grouping argument, but using constant sized instead of 1/ϵ sized groups, along with earlier methods of using estimates of the path length to place points on the boundaries of the convex fat bodies yields the following results.
There is an n/^2d-2-time algorithm for touring disjoint convex fat bodies in d dimensions.
We proceed in a similar fashion as <ref>, except we define s ≜ n_0, i.e., using constant sized groups instead of ⌈1/ϵ⌉ sized groups. Let the M_i be defined as in the proof of <ref>, and define m_i to be the outer radius of M_i.
For each pair of regions M_i,M_i+1, pick arbitrary points a∈ M_i,b∈ M_i+1, and use <ref> to
obtain a 4-approximation D_approx of the length of the shortest path from a to b in 1 time.
Suppose that the optimal path uses p∈ M_i, q∈ M_i+1 and the shortest path from a to b has distance OPT_a,b;
by the triangle inequality, we must have
1/4 D_approx≤ OPT_a,b≤ OPT_i + 2m_i + 2m_i+1.
Now, consider the path where we start at p and then travel along the line segment from p to a, the approximate path of length D_approx from a to b (visiting the regions in between M_i and M_i+1), and the line segment from b to q. This path has length at most D_approx+2m_i+2m_i+1, and upper bounds the length of the optimal path between p and q. So, the entire path between p and q lies within a ball of radius D_approx+4m_i+2m_i+1 centered at a; call this ball L. Note that L has radius l = D_approx+4m_i+2m_i+1≤OPT_i+m_i+m_i+1.
For each region R_j between M_i and M_i+1 inclusive, we apply <ref> with the region and a hypercube containing
L, which has side length 2l. Note that points are placed twice on each M_i; this is fine. <ref> guarantees
the existence of a point in R_j that is 2lϵ close to the point OPT uses by placing 1/ϵ^d-1 points on each region.
We now bound the difference between the optimal and the shortest paths using only the points we placed.
The difference is at most
∑_i=1^k(2 l_iϵ· n_0)
=ϵ·∑_i=1^k l_i
=ϵ·OPT + ∑_i=1^k m_i=ϵ· OPT,
where the last step is due to <ref> applied on each subsequence: in particular, the optimal path length visiting all the regions in subsequence i has length at least Ω(m_i), so summing this inequality over all subsequences, we have ∑_i=1^k m_i ≤OPT.
We have now reduced the problem to the case where each region has only finitely many points.
We finish with dynamic programming. Since we have 1/ϵ^d-1 points on each of the n regions, the runtime is
n/ϵ^2d-2, as desired.
There is an n/-time algorithm for touring disjoint convex fat bodies in 2 dimensions.
This is almost the same as <ref>, where 1/ϵ^d-1 = 1/ϵ points are placed on each body,
except that we use <ref> to more efficiently solve the case where each region is a finite point set.
There is an n^2/√()-time algorithm for touring disjoint convex fat bodies in 2 dimensions.
<ref> through the construction of <ref> places 1/ϵ points on an arc of length R on each convex fat body to guarantee additive error ≤ϵ R. We can achieve the same additive error using a convex polygon with ϵ^-1/2 vertices using <ref>. Then, recall that <cit.> gives an |V|n-time exact algorithm for touring convex polygons, so we can recover a solution in |V|n = (n ·ϵ^-1/2) · n time.
§ BALLS
We can improve the results in previous sections by discretizing the surfaces non-uniformly, placing fewer points on areas of each hypersphere that are farther away from the previous and next ball in the sequence. This reduces the dependence on by a square root compared to <ref> and <ref>. Omitted proofs for this section may be found in <ref>. We first state the results:
There is an n/^d-1log^21/+1/^2d-2-time algorithm for touring disjoint balls in d dimensions.
The crucial lemma we use for these results follows. We defer its proof to the appendix.
A tour of disjoint balls is globally optimal if and only if for each intermediate ball, the tour either passes straight through the ball or perfectly reflects off its border (see <Ref> for an example).
We start with the special case of unit disks and then generalize to non-unit disks (<ref>). First, we provide intuition through a simple example where n=1 and R_1 is a line.
Given start and endpoints p_0=(-1,1) and p_2=(1,1), select p_1 from the x-axis such that OPT=p_0-p_1+p_1-p_2 is minimized.
To solve this exactly, choose p_1=(0,0) such that the path perfectly reflects off the x-axis. This gives OPT=2√(2).
Now suppose that we are only interested in an approximate solution. Tile the x-axis with points at regular intervals such that every two consecutive points are separated by distance d, and round p_1 to the closest such point p_1'. Since p_1-p_1'≤ d,
OPT' ≜p_0-p_1'+p_1'-p_2
≤√(1+(1-d)^2)+√(1+(1+d)^2)≤√(2-2d+d^2)+√(2+2d+d^2)
≤√(2)(1-d/2+1+d/2+d^2)≤ 2√(2)(1+d^2).
So, to attain OPT'≤ (1+)OPT, it suffices to take d=Θ(√()) rather than d=Θ() because p_1'-p_1 is parallel to the x-axis. We can apply a similar idea to replace the middle region with a point set when R_1 is a circle rather than a line since circles are locally linear. However, this doesn't quite work when either p_0-p_1 or p_1-p_2 is small. For example, if p_0 was very close to the x-axis (say, p_0=(-d,d)) then rounding p_1 to the nearest p_1' could cause OPT' to increase by Θ(d)≫ d^2. So when we replace each circle with a point set, we need to be careful about how we handle two circles that are close to touching; the solution is to space points more densely near where they touch.
There is an n/√()log1/-time algorithm for touring disjoint unit disks.
We describe how to place a set of 1/√()log1/ points S_i on each unit circle c_i so that the length of an optimal path increases by at most n after rounding each p_i to the nearest p_i'∈ S_i.
Define (x)=x/x. Let o_i≜ p'_i-p_i for all i∈ [0,n+1] (note that o_0=o_n+1=0), where o stands for offset. Also, define vectors
d_i≜ p'_i+1-p'_i=p_i+1+o_i+1-p_i-o_i
and scalars
a_i≜ d_i·(p_i+1-p_i)=p_i+1-p_i+(o_i+1-o_i)·(p_i+1-p_i),
where a_i is the component of d_i along the direction of p_i+1-p_i. Then the total path length after rounding each p_i to p_i' is:
∑_i=0^nd_i =∑_i=0^n√([d_i·(p_i+1-p_i)]^2+[d_i·(p_i+1-p_i)^⊥]^2)
=∑_i=0^n√(a_i^2+[(o_i+1-o_i)·(p_i+1-p_i)^⊥]^2)
=∑_i=0^n[a_i+(√(a_i^2+[(o_i+1-o_i)·(p_i+1-p_i)^⊥]^2)-a_i)]
=OPT+∑_i=1^n o_i· ((p_i-p_i-1)-(p_i+1-p_i))^extra_1(i)
+∑_i=0^n(√(a_i^2+[(o_i+1-o_i)·(p_i+1-p_i)^⊥]^2)-a_i)^extra_2(i)
=OPT+∑_i=1^nextra_1(i)+∑_i=0^nextra_2(i).
We defer the construction of the sets S_i so that both extra terms are small to <ref>. Then we can finish with dynamic programming (<ref>).
It is possible to choose S_i in the proof of <Ref> such that |S_i|≤1/√()log1/, extra_1(i)≤, and extra_2(i)≤ for all i.
First, we present the construction. For every pair of adjacent disks i and i+1 we describe a procedure to generate points on their borders. Then we set S_i to be the union of the generated points on the border of disk i when running the procedure on disks (i,i+1), and the generated points on the border of disk i when running the procedure on disks (i-1,i). Finally, we show that extra_1(i) and extra_2(i) are sufficiently small for all i for our choice of S_i.
Procedure
Reorient the plane that c_i=(0,y) and c_i+1=(0,-y) for some y>1.
Let ℝ_≥ 0→ℝ_>0 be a function that is nonincreasing with respect to |ϕ| that we will define later. Given , we use the following process to add points to S_i (and symmetrically for S_i+1):
* Set ϕ=0.
* While ϕ≤π:
* Add (sinϕ, y-cosϕ) to S_i.
* ϕ+=(ϕ).
* Repeat steps 1-2 but for ϕ from 0 to -π.
This procedure has the property that for any ϕ∈ [-π,π], the point (sinϕ, y-cosϕ) is within distance (|ϕ|) of some point in S_i. In particular, if the optimal path has p_i=(sinϕ_i,y-cosϕ_i) then it is guaranteed that o_i≤(ϕ_i). To compute |S_i|, note that as long as (ϕ) is sufficiently smooth that (ϕ)/ϕ+(ϕ)=Θ(1) for all ϕ, the number of points added to S_i will be at most a constant factor larger than the value of the definite integral ∫_-π^π1/(ϕ) dϕ.
Next, we construct so that |S_i|=1/√()log1/. Intuitively, by <ref>, we should have (ϕ)=Θ() closer to circle i+1 (when ϕ≈ 0) and (ϕ)=Θ(√()) farther from circle i+1 (when ϕ=Θ(1)). Thus, we set (ϕ)=max(,√()ϕ). The total number of added points is on the order of:
∫_0^π1/(ϕ) dϕ =1/√()(∫_0^√()1/√() dϕ+∫_√()^π1/ϕ dϕ)
=1/√()(1+log(π/√()))≤1/√()log1/.
Finally, we show that both extra terms are small for our choice of S_i.
*Part 1: extra_1(i).
We note that (p_i-p_i-1)-(p_i+1-p_i) must be parallel to p_i-c_i for an optimal solution p. To verify this, it suffices to check the two possible cases from <Ref>:
* The points p_i-1,p_i,p_i+1 are collinear, in which case (p_i-p_i-1)-(p_i+1-p_i)=0.
* The path reflects perfectly off circle i, in which case (p_i-p_i-1)-(p_i+1-p_i) is parallel to p_i-c_i.
If we ensure that spacing(ϕ)≤√() for all ϕ, then |o_i·(p_i-c_i)|≤ because o_i is always nearly tangent to the circle centered at c_i at point p_i. The conclusion follows because extra_1(i)≤ 2|o_i·(p_i-c_i)|≤ 2.
*Part 2: extra_2(i).
We upper bound extra_2(i) by the sum of two summands, the first associated only with o_i and the second associated only with o_i+1.
Letting ycoord(·) denote the y-coordinate of a point,
extra_2(i)≤ 2·( min(o_i,4o_i^2/ycoord(p_i))+min(o_i+1,4o_i+1^2/-ycoord(p_i+1))).
We do casework based on which term is smaller on each of the mins.
* o_i≥ycoord(p_i)/4, o_i+1≥-ycoord(p_i+1)/4
The result, extra_2(i)≤ 2(o_i+o_i+1), follows by summing the following two inequalities:
√(a_i^2+[(o_i+1-o_i)·(p_i+1-p_i)^⊥]^2)-p_i+1-p_i
=p_i+1-p_i+o_i+1-o_i-p_i+1-p_i
≤o_i+o_i+1
and p_i+1-p_i-a_i≤o_i+o_i+1.
* o_i≤ycoord(p_i)/4, o_i+1≤-ycoord(p_i+1)/4
Then o_i, o_i+1≤p_i+1-p_i/4 so a_i≥p_i+1-p_i/2, and
extra_2(i) ≤o_i+1-o_i^2/2a_i≤2(o_i+1^2+o_i^2)/2a_i
≤ 2·o_i+1^2+o_i^2/p_i-p_i+1≤ 2·(o_i^2/ycoord(p_i)+o_i+1^2/-ycoord(p_i+1)).
* o_i≤ycoord(p_i)/4, o_i+1≥-ycoord(p_i+1)/4
Define extra'(i) to be the same as extra_2(i) with o_i+1 set to 0. Then
extra'(i) ≜p_i+1-p_i-o_i-(p_i+1-p_i-o_i·(p_i+1-p_i))
=√((p_i+1-p_i-o_i·(p_i+1-p_i))^2+[o_i·(p_i+1-p_i)^⊥]^2)
-(p_i+1-p_i-o_i·(p_i+1-p_i))
≤o_i^2/2·3/4p_i-p_i+1≤o_i^2/2·3/4·ycoord(p_i)
and by similar reasoning as case 1, extra_2(i)-extra'(i)≤ 2o_i+1.
* o_i≥ycoord(p_i)/4, o_i+1≤-ycoord(p_i+1)/4
Similar to case 3.
Now that we have a claim showing an upper bound on extra_2(i), it remains to show that min(o_i,o_i^2/ycoord(p_i))≤ for our choice of . Indeed, when ϕ≤√() we have o_i≤(ϕ)≤, while for ϕ>√() we have o_i^2/ycoord(p_i)≤(ϕ)/ϕ^2≤.
With small modifications to the proof of <Ref>, we have the following corollary:
Consider the case of non-unit disks. If the ith disk has radius r_i, then we can place 1/√()_ilog1/_i points on its border such that the additive error associated with c_i —specifically, extra_1(i) plus the components of extra_2(i-1) and extra_2(i) associated with o_i —is r_i_i. Consequently,
OPT+∑_i=1^nextra_1(i)+∑_i=0^nextra_2(i)≤ OPT+∑_i=1^nr_i_i.
Now, we finally prove <ref>.
We first present a slightly weaker result, and then show how to improve it. Recall that by <ref>, the ith largest disk has radius OPT/i for i≥ 3. So if we set _i='=/log n for each of the ith largest disks for i≥ 3, the total additive error contributed by these disks becomes
∑_i=3^nOPT/i·_i≤OPT·'·∑_i=3^n1/i≤ OPT
by <ref>. For the two largest disks, we use the previous naive discretization (placing 1/ points uniformly on the intersection of the circles with a square of side length OPT centered about the starting point). We may assume we have already computed a constant approximation to OPT in n time by applying <ref> with =1. After selecting the point sets, we can finish with <ref>. The overall time complexity is
n/√(')log1/'+1/≤n√(log n)/√()loglog n/+1/.
We can remove the factors of log n by selecting the _i to be an increasing sequence. Set _i=Θ i^2/3/n^2/3 for each i∈ [3,n] such that more points are placed on larger disks. Then the total added error remains
OPT·+∑_i=3^n_i/i =
OPT·+∑_i=3^n1/i· i^2/3/n^2/3
=OPT·1+n^-2/3·∑_i=3^ni^-1/3≤OPT,
and the factors involving log n drop out from the time complexity:
∑_i=3^n1/√()_ilog1/_i+1/ ≤∫_i=3^n1/√()n^1/3i^-1/3logn^2/3/i^2/3di +1/
≤3n^1/3/2√(ϵ)i^2/3logn^2/3/i^2/3ϵ+1|_3^n+1/ϵ
≤n/√()log1/+1/.
We note that under certain additional assumptions, the time complexity of <Ref> can be slightly improved. We summarize these in the following corollary, which we state without proof.
If any of the following conditions hold:
* the two largest disks are not adjacent in the order
* the two largest disks are separated by distance Ω(OPT)
* the second-largest disk has radius OPT
then a generalization of <Ref> may be applied to remove the 1/ term from the time complexity of <Ref>.
To extend to multiple dimensions, we generalize the construction from <Ref>.
As in <Ref>, set (ϕ)=max(,√()ϕ) for a point p_i satisfying m∠ p_ic_ic_i+1=ϕ, meaning that there must exist p_i'∈ S_i satisfying p_i-p_i'≤ r_i·(ϕ). The total number of points |S_i| placed on the surface of a d-dimensional sphere is proportional to
∫_0^πsin^d-2(ϕ)/(ϕ)^d-1 dϕ ≤1/(√())^d-1∫_0^πϕ^d-2/max(√(),ϕ)^d-1 dϕ
=1/^(d-1)/2∫_0^√()ϕ^d-2/(√())^d-1 dϕ + ∫_0^√()1/ϕ dϕ
≤1/^(d-1)/2log1/.
where the derivation of the integration factor sin^d-2(ϕ) can be found in <cit.>.
It remains to describe how to space points so that they satisfy the given spacing function. For each spacing s=, 2, 4, …, √(), we can find a d-dimensional hypercube of side length O(s/√()) that encloses all points on the hypersphere with required spacing at most 2s. Evenly space points with spacing s across the surface of this hypercube according to <Ref>, and project each of these points onto the hypersphere. There are a total of log1/ values of s, and each s results in 1/^(d-1)/2 points being projected onto the hypersphere, for a total of 1/^(d-1)/2log1/ points.
§ APPENDIX
Organization: The three subsections contain omitted proofs from sections 2, 3, and 4, respectively.
§.§ Convex bodies: omitted proofs
Define c_1≜closest_C(p_1) and c_2≜closest_C(p_2). Since C is convex, C must contain all points on the segment connecting c_1 and c_2. Thus, it must be the case that (p_1-c_1)· (c_2-c_1)≤ 0, or some point on the segment connecting c_1 and c_2 would be closer to p_1 than c_1. Similarly, it must be the case that (p_2-c_2)· (c_2-c_1)≥ 0. To finish,
(p_2-p_1)· (c_2-c_1) ≥ (p_2-c_2+c_2-c_1+c_1-p_1)· (c_2-c_1)
≥ (c_2-c_1)· (c_2-c_1)≥c_2-c_1^2,
implying p_2-p_1≥c_2-c_1.
Consider some point p ∈ (∂ C) ∩ℋ. By the convexity of C and because p lies on its boundary, there exists some unit vector v⃗ such that p ·v⃗≥ x ·v⃗ for any x ∈ C. Let the intersection of ℋ with the ray starting at p and going in the direction of v⃗ be the point s. Notice that _C(s) = p.
Now, define s' ∈ S_ℋ to be the closest such point to s. From our construction of S_ℋ, s-s'≤ r. From our construction of S, _C(s') ∈ S, and since _C(s) = p, after applying <ref>, we have p-_C(s')≤ r.
First, we show that there exists a path p' touring the S_i that is nearly as short as the shortest path touring the R_i.
If OPT≤ L_APPROX, there exists an increasing sequence 0 = z_0 < z_1 < … < z_l = n+1 and points p_z_i' such that p_z_i' ∈ S_z_i for all i and p_z_i' ∈ R_j for all i, j satisfying 0 ≤ i ≤ l-1, z_i ≤ j < z_i+1, and ∑_i=0^l-1p_z_i'-p_z_i+1'≤ OPT+γ L_APPROX. Additionally, if the regions are disjoint, there exists a sequence that satisfies the above conditions that also satisfies z_i = i for all i.
Define D(z_t, p_z_t') to be the minimum distance for touring regions R_z_t, R_z_t+1, …, R_n starting at p_z_t' and ending at p_n+1. We show by induction that for all t≤ l, there exists a sequence p_z_0,…,p_z_t satisfying the invariant
∑_i=0^t-1p_z_i'-p_z_i+1' + D(z_t, p_z_t) ≤ OPT+t/2n·γ L_APPROX.
Note that for t=l, (<ref>) implies
∑_i=0^l-1p_z_i'-p_z_i+1'≤ OPT + l/2n·γ L_APPROX≤ OPT + γ L_APPROX,
as desired.
Base Case: First, define z_0 = 0, p_z_0' = p_0. The invariant holds for t=0.
Inductive Step: Suppose we have already constructed z_0, z_1, …, z_t and p_z_0', p_z_1', …, p_z_t'. It remains to show how to construct z_t+1, p_z_t+1' from z_t, p_z_t' such that the invariant is maintained.
Let z_t+1≤ n be the smallest integer greater than z_t such that p_z_t' ∉ R_z_t+1. If all R_i are disjoint, then clearly z_t+1 = z_t+1. If no such z_t+1 exists, then we set z_t+1 = n+1. Consider an optimal path q_z_t, q_z_t+1, q_z_t+2, …, q_n+1 for touring regions R_z_t, R_z_t+1, …, R_n starting at q_z_t = p_z_t' and ending at q_n+1 = p_n+1, with total length D(z_t, p_z_t'). Because q_z_t = p_z_t' ∈ R_j for all z_t ≤ j < z_t+1, we can consider an optimal path that satisfies q_z_t = q_z_t+1 = q_z_t+2 = … = q_z_t+1-1, and q_z_t+1 lies on the boundary of R_z_t+1. In other words, the optimal path does not need to move from its starting point if it is contained within some prefix of the regions, and it can always choose q_z_t+1 to be its first point of contact with R_z_t+1. Therefore q_z_t+1∈∂ C_z_t+1, w for some 1≤ w≤ |R_z_t+1|.
Furthermore, a path exists from p_0 to p_z_t' = q_z_t to p_n+1 with length
∑_i=0^t-1p_z_i'-p_z_i+1' + D(z_t, p_z_t') ≤ OPT+t/2n·γ L_APPROX≤ OPT + L_APPROX≤ 2L_APPROX,
indicating that q_z_t+1-p_0≤ 2L_APPROX, which in turn implies q_z_t+1∈ℋ.
Thus, q_z_t+1∈ (∂ C_z_t+1, w)∩ℋ, so by <ref> there exists some point p_z_t+1' ∈ S_z_t+1 such that p_z_t+1'-q_z_t+1≤ϵ· r = γ/16n· 4 L_APPROX. Now, we can show that the invariant holds for t+1:
∑_i=0^tp_z_i'-p_z_i+1' + D(z_t+1, p_z_t+1')
≤∑_i=0^tp_z_i'-p_z_i+1' + p_z_t+1'-q_z_t+1+∑_i=z_t+1^nq_i-q_i+1
≤∑_i=0^t-1p_z_i'-p_z_i+1' +
p'_z_t-q_z_t+1 + 2p_z_t+1'-q_z_t+1+∑_i=z_t+1^nq_i-q_i+1
≤∑_i=0^t-1p_z_i'-p_z_i+1' + p'_z_t-q_z_t+1 + 2 r +∑_i=z_t+1^nq_i-q_i+1
= 2 r + ∑_i=0^t-1p_z_i'-p_z_i+1' + D(z_t, p_z_t')
≤ 2 r + OPT + t/2n·γ L_APPROX
= OPT + γ L_APPROX/2n + t/2n·γ L_APPROX = OPT + t+1/2n·γ L_APPROX.
(<ref>) follows from p_z_t+1', q_z_t+1+1, …, q_n+1 being a valid tour of regions R_z_t+1, R_z_t+1+1, …, R_n, while (<ref>) follows from the triangle inequality.
Recall that if all R_i are disjoint, then z_t+1 = z_t+1 z_i = i for all i.
It remains to show that we can recover a path touring the S_i that is at least as good as p'. For each point p ∈ S_i for some i, define successor(p) to be the minimum j > i such that p ∉ R_j. Notice that successor(p_z_i') = z_i+1. Now, define pred(S_j) for each S_j to be the set of all points p such that successor(p) = j.
We use dynamic programming: first, set dp(p_0) = 0. Then, iterate over the sets S_i in increasing i. For each point x ∈ S_i, we will set dp(x)≜min_y ∈ pred(S_j)dp(y)+x-y. By storing the optimal transition for each point, we can recover a path q_0, q_1, …, q_l_q that tours the R_i regions. Because successor(p_z_i') = z_i+1 for the path (p_i'), we must have that the path recovered from dynamic programming has length at most ∑_i=0^l-1p_z_i'-p_z_i+1'.
If the R_i are disjoint, then pred(S_j) = S_j-1 and the total number of transitions in the DP is given by
∑_i=0^n |S_i||S_i+1| = ∑_i=0^n |R_i|n/γ^d-1· |R_i+1| n/γ^d-1,
as desired. If the R_i are possibly non-disjoint, notice that the total number of transitions in the DP is given by
∑_i=0^n∑_p ∈ S_i|S_successor(p)|n/γ^d-1 ≤∑_i=0^n∑_p ∈ S_imax_j |R_j| n/γ^d-1
≤∑_i=0^n |R_i|n/γ^d-1max_j |R_j| n/γ^d-1
≤n/γ^2d-2∑_i=0^n |R_i|max_j|R_j|.
Using the oracle to project p_0 onto each of the regions R_1, R_2, …, R_n to obtain points p_1, p_2, …, p_n. Now, let OPT be the total length of the optimal solution for the problem. Clearly, we must have p_i-p_0≤ OPT. Thus,
∑_i=0^np_i+1-p_i ≤p_1-p_0 + ∑_i=1^np_i+1-p_0+p_i-p_0
≤ OPT + 2n · OPT = (2n+1)OPT.
First, apply <ref> to get a 1+2n approximation. Label the path length of this approximation L_0. Define B_0 = 1+2n, where we know L_0/B_0≤ OPT≤ L_0. Our goal is to show that given some L_t, B_t, we can generate L_t+1, B_t+1 so that L_t+1/B_t+1≤ OPT≤ L_t+1, and B_t+1≤ 2√(B_t).
We apply <ref> with γ = 1, L_APPROX = L_t/√(B_t). Let L_APPROX' be the length of the optimal tour that visits S_0, S_1, …, S_n+1. There are two possible cases.
* L'_APPROX≤ 2L_APPROX. In this case, we know that
L_t/B_t≤ OPT≤ L'_APPROX≤ 2L_APPROX=2L_t/√(B)_t, so we can set L_t+1=2L_t/√(B)_t and B_t+1=2√(B_t).
* L'_APPROX > 2L_APPROX. In this case we know that OPT>L_APPROX, because <ref> guarantees that if OPT ≤ L_APPROX, then L'_APPROX≤ OPT + γ L_APPROX≤ 2L_APPROX. Thus,
L_t/√(B)_t=L_APPROX< OPT≤ L_t,
so we can set L_t+1=L_t and B_t+1=√(B)_t.
Thus, we can generate the sequences (L_i) and (B_i) until we reach some B_l ≤ 4 for some l ≤loglogn in loglogn· n^2d-2∑_i=1^n-1|R_i||R_i+1| time. This gives us some L_l such that OPT ≤ L_l ≤ 4 · OPT, a constant approximation of OPT.
The bulk of the time for the second bound is spent computing successor(p) for every one of the n^2/ points in the discretization, which could take Θ(n) calls to the oracle, contributing the factor of n^3/. On the other hand, the actual dynamic programming updates contribute only n^2/logn^2/.
Here we describe how to modify the method of <cit.> to achieve the desired time complexity. The approach we describe in this paper is a more general method (which can be modified similarly).
As in our approach, the method of <cit.> involves a pseudo-approximation: the idea is to intersect every one of the |V| edges with a disk of radius L_APPROX centered at p_0, discretize every one of the |V| edges into n/ evenly spaced points, and then apply dynamic programming as described in the previous subsection. Naively, these DP transitions run in |V|n/^2 time, but <ref> speeds these transitions up to |V|n/log|V|/ time. The first term in the time complexity corresponds to the time required to obtain a constant approximation by setting =1, as described in <ref>.
When the regions can possibly intersect, we additionally need a data structure that will compute successor(p) for any p∈∂ R_i in log |V| time. The construction of such a data structure contributes the additional term to the time complexity.
Now, we describe how to generate a separate data structure for each edge e∈δ R_i such that each data structure can answer successor(p) for any p∈∂ e in log |V| time. This construction runs in |V|^2α(|V|) time.
First, for each edge e∈δ R_i we need to compute which parts of it belong to each other region R_j where j>i. To do so, we need to know
* For each such region, whether the endpoints of e are contained within that region.
* The intersection points of e with all such regions in sorted order along the edge (at most |V|, assuming non-degeneracy).
These quantities can be computed in |V|^2 time due to Balaban <cit.>.
The intersection points partition e into ranges such that the first j>i such that a point belongs to R_j is the same for all points within the range (see <ref>). If we have computed the first j>i for every such range, we can answer queries in log v time via binary search.
To do so, we start by iterating over all intervals of e contained within R_i+1 and setting all ranges that they cover to have successor=i+1. This determines the answer for three of the ranges in <ref>. Then do the same for R_i+2,R_i+3,… and so on. Note that there are |V| intervals in total.
Naively, such an implementation would run in |V|^2 time; however, using Tarjan's disjoint set union data structure <cit.>, we can speed up this process to |V|α(|V|) time, where α is the inverse Ackermann function. We assume an implementation of DSU that initially assumes that every range is its own representative, and supports both of the following operations in amortized α(|V|) time:
* (x): Return the representative of range x.
* (x,y): Given a range x such that (x)=x, for each range that x is a representative of, set its representative to be (y).
For an interval covering ranges [l,r] belonging to R_j, we use the following process to set the answers for every range it covers whose successor has not been set yet:
* Set l=(l).
* If l>r, break.
* Set successor(l)=j
* Call (l,l+1).
* Return to step 1.
The correctness of this procedure follows from the DSU maintaining the invariant that the representative for a range is the first range that succeeds it whose successor has not been set yet.
First, see <ref> for the case where C lies strictly within U. Next, we describe what needs to be changed when this is not the case:
If we have exact access to ∂(U)∩ C, then we can convert a closest point oracle for C into a closest point oracle for C∩ U and apply the previous lemma to select points on ∂ (C∩ U). Note that due to the convexity of C, the intersection of each side of U with C is a line segment if it is nonempty, and the endpoints of this line segment can be approximated to arbitrary precision using the oracle to binary search.
Specifically, if C intersects a side s⊆∂(U), we can approximate this intersection by binary searching on s. Say we take some p∈ s such that p∉C; then the direction of the vector from p to _C(p) tells us which side of s∩ C p lies on). After log1/ queries, we either end up with:
* A point within C∩ s, and approximations of both endpoints of C∩ s to within distance o(ϵ) each.
* A segment of length o(ϵ) containing C∩ s.
In either case, given an estimate of an endpoint of C∩ s that is within o(ϵ) of an endpoint of C∩ s, by projecting the estimate onto C we get an estimate of the endpoint that is within o(ϵ) to the true endpoint (and now is part of C).
When querying the closest point in C∩ U to a point p,
* Compute the closest point in U to p. If the point is within C, return it.
* Otherwise, query the oracle for the closest point in C to p. If the point is within U, return it.
* Otherwise, return the closest estimated endpoint (which is guaranteed to be within o(ϵ) of the true answer).
Given a closest point oracle for a convex region C that is strictly contained within a unit square U, we may select ^-1/2 points on ∂ C such that every point within C is within distance of the convex hull of the selected points.
Let S denote the set of all selected points. First, we state a sufficient pair of conditions for S to satisfy the desired property: For every pair of consecutive points s_1 and s_2 in S,
* The distance between s_1 and s_2 along the border of C is at most √().
* The difference in angle θ between the normals to C at s_1 and s_2 is at most √().
To see that this is true, consider any point p on ∂ C lying between s_1 and s_2, and define d≜dist(p,s_1s_2). See <Ref> for an illustration. Then
d/sin∠ ps_1s_2+d/sin∠ ps_2s_1=|s_1-s_2| d/sin∠ s_1ps_2< |s_1-s_2|
d/sinθ < |s_1-s_2|
d/√()<√() d<
Inequality (<ref>) follows from m∠ s_1ps_2>π-θ.
It remains to construct S satisfying both of the desired conditions. Note that we can actually construct two separate sets of points S_1 and S_2, one for each of the two conditions, and then set S=S_1∪ S_2. Let S' denote a set of 41/√() points spaced equally about the border of U.
* Form S_1 by projecting each point in S' onto C.
* Form S_2 by dilating each point in S' by a sufficiently large constant about the center of U and then projecting each of these points onto C. Essentially, we use the closest point oracle to implement a tangent line oracle. There is an alternate proof of <ref> that only involves querying the closest point oracle at points on the border of U.
Since the distance between any two consecutive points in S' is at most 1/√(), S_1 satisfies condition 1 by a stronger version of <Ref>. Furthermore, condition 1 continues to be satisfied as points from S_2 are added to S. Similarly, it's easy to verify that S_2 satisfies condition 2, and that condition 2 continues to be satisfied as points from S_1 are added to S.
There is no need to query the closest point oracle for points that can be infinitely far away from C (which is done in the original proof). Let's start with a set S' containing a single point on the border of U. While there are two consecutive points s_1' and s_2' in S' such that the clockwise distance between s_1' and s_2' along the border of U times the difference in angle between the normals to C at (s_1') and (s_2') is greater than , insert an additional point m into S such that m is the midpoint of the portion of ∂(U) that goes clockwise about U from s_1' and s_2'. Once no such pair of points exists in S', set S={(s')| s'∈ S'}.
Here is a different way to interpret this process. Start with a list of pairs initially containing only (4,2π), corresponding to the length of the border of U and the measure of a full angle, respectively. While there exists a pair (x,y) satisfying xy>, remove it from the list and add the pairs (x/2,r) and (x/2,y-r) to the list, where r∈ [0,y]. Here,
* x represents an upper bound on the distance from (s_1') to (s_2') along ∂(C), and x/2 is an upper bound on both the distances from (s_1') to (m) and the distances from (m) to (s_2') along ∂(C).
* y is the difference in angle between the normals to C at (s_1') and (s_2'). Adding m in between s_1' and s_2' splits this angle into two parts.
The correctness of the stopping condition can be proved similarly to the original proof of <Ref>. It remains to prove that the size of the list upon the termination of this process is 1/√(). Define 𝑝𝑜𝑡𝑒𝑛𝑡𝑖𝑎𝑙(x,y)=max(1,4√(xy/)). We claim that 𝑝𝑜𝑡𝑒𝑛𝑡𝑖𝑎𝑙(4,2π)≤1/√() is an upper bound on the size of the list upon termination. It suffices to show that whenever xy>, the following inequality holds for any choice of r:
𝑝𝑜𝑡𝑒𝑛𝑡𝑖𝑎𝑙(x,y)≥𝑝𝑜𝑡𝑒𝑛𝑡𝑖𝑎𝑙(x/2,r)+𝑝𝑜𝑡𝑒𝑛𝑡𝑖𝑎𝑙(x/2,y-r).
This may be rewritten as:
4√(xy/)≥max2,4√(x/2· y/)+1,4√(x/2· r/)+4√(x/2· (y-r)/)
which can easily be verified. Equality holds when r=y/2.
§.§ Disjoint convex fat bodies: omitted proofs
We first see that it suffices to find an n such that the optimal path must be Ω(min r_h).
Once we find such an n, we can use the bound on subsequences of size n to obtain the desired result.
Let m≜min r_h. Suppose that OPT<m; it suffices to show that n= 1.
Let C(P, r) be the sphere centered at P with radius r.
Pick an arbitrary point p on OPT. Observe that all of OPT lies inside C(p, m), and for each region R, there is a point q∈ R∩ C(p,m).
For all convex fat regions R with r_h≥ m, we must have
(C(q,m)∩ R)≥Ω((C(q,m))).
If the claim holds, since the regions C(q,m)∩ R are disjoint subsets of C(p,2m),
we would have n·Ω((C(q,m)))≤(C(p,2m)),
implying the desired result n= 1.
Let R_c be the center of a ball contained in R with radius r_h.
Consider the case that R_c-q> 1/2 m.
By convexity, since q∈ R and (C(R_c,r_h))⊆ R,
the image of a dilation of (C(R_c,r_h)) with center q and ratio m/2R_c-q≤ 1
is also a subset of R.
Let image of the dilation be (C(R_c',r_h')).
We have that q-R_c'=1/2 m and
r_h'=r_h·m/R_c-q≥ r_h·m/r_H≥Ω(m).
Therefore, it suffices to prove that
(C(q,m)∩ C(R_c, Ω(m)))≥Ω((C(q,m)))
for all points q-R_c≤1/2 m.
WLOG Ω(m)≤1/2 m. Then C(R_c, Ω(m)) lies entirely inside (C(q,m)), so
(C(q,m)∩ C(R_c, Ω(m)))= ( C(R_c, Ω(m))) ≥Ω((C(q,m))),
as desired.
The bound for balls is n_0=3.
First, we reduce this claim to the 2D case. More specifically, we want to show that in the case of three balls,
the optimal path must lie on the plane P containing the centers of the balls.
For any path p, the projection p' of p onto P is also a valid path
and has length at most the length of p. We note that projection never increases
the length of a segment; therefore, the distances of the points on the path to
the centers of their respective balls must have decreased. Therefore, p' still passes through all three balls, and the length of p' is at most that of p.
It remains to show the claim in the 2D case. We claim that we must have OPT≥1/100( min r_h). We proceed similarly to the general case:
Assume the contradiction, and let m≜1/10( min r_h).
Then the optimal path lies in a disk C(p, 1/10m).
For each region R, let q be any point in p∩ R. Then Cq, m is contained inside Cp, 1+1/10m.
Note that this differs from the general case as we assumed OPT<1/10m instead of
OPT<m.
Therefore, to create a contradiction, it remains to show that
(C(q, m)∩ R)> 1/3Cp, 1+1/10m=
1/31+1/10^2(C(p, m)),
where R is any disk with radius at least 10m and q∈ R.
Let r be the center of R, and a be any point inside C(q,m).
Also let x≜r-q, y≜q-a, and z≜r-a.
By the Law of Cosines,
z^2=x^2 + y^2 -2xy cos∠rqa.
Suppose that we have cos∠rqa≥1/20;
we claim that this implies z≤ 10m.
Note that from our constraints we have x≤ 10m and y≤ m≤ 10m,
so we have
(x-10m)(y-10m)=xy-10mx-10my+100m^2≥ 0.
Next, we have
z^2
≤ x^2 + y^2
-1/10xy
≤ x^2 + y^2
-1/1010mx+10my-100m^2
= x-1/2m^2 + y-1/2 m^2
+19/2m^2
≤10m-1/2m^2 + m-1/2 m^2
+19/2m^2
=100m^2.
To conclude,
(C(q, m)∩ R)≥2arccos1/20/2π(C(q, m))>
1/3Cq, 1+1/10m,
as desired.
For the construction, we'll address the case where all the bodies are disks on the 2D plane; the result can trivially be extended to higher dimensions. Let x_i be the x-coordinate of the center of the ith largest disk. We will show that it is possible to have r_i=1/i for all i such that every disk is tangent to the segment connecting (0,0) and (8,0), every disk has center above the x-axis, and no two disks intersect. As ∑ r_i=Θ(log n) and OPT≤ 8, this would give the desired bound.
We claim that regardless of how x_1,x_2,…,x_i-1 have been selected, there is always a valid choice for x_i such that the ith disk does not intersect with any of the first i-1. Observe that x_i is valid if |x_i-x_j|≥√((r_i+r_j)^2-(r_i-r_j)^2)= 2√(r_ir_j) for all j∈ [1,i-1], where r_j denotes the radius of the jth disk. The total length of the x-axis rendered invalid by any of the first i-1 disks is at most
∑_j=1^i-14√(r_ir_j)=4/√(i)∑_j=1^i-11/√(j)< 8√(i)/√(i)< 8.
Therefore, some x∈ [0,8] must exist that was not rendered invalid and is thus a valid candidate for x_i.
§.§ Balls: omitted proofs
As the problem of touring disks be formulated as a convex optimization problem by <ref> and the optimal value is lower bounded, a global optimum is guaranteed. This global optimum must be locally optimal, in the sense that it should not be able to decrease the objective by moving any single p_i. This means that
* For all p_i satisfying |p_i-c_i|<r_i, the gradient of the objective with respect to p_i must be 0.
* For all p_i satisfying |p_i-c_i|=r_i, the gradient of the objective with respect to p_i must be perpendicular to the ith circle.
The gradient of the objective with respect to p_i is precisely (p_i-p_i-1)+(p_i-p_i+1), where (x)≜x/x. Case 1 corresponds to the tour passing straight through the ith disk while case 2 corresponds to reflecting off the ith circle.
Conversely, given a locally optimal solution, we can certify its optimality by choosing z_i=(p_i+1-p_i), where z_i is defined in the proof of <ref>.
The touring balls problem can be formulated as a convex optimization problem (specifically, a second-order cone problem).
Stated in <cit.>. We restate a possible formulation here:
*Primal.
Constants: c_i ∈^d, ∀ i∈ [0,n+1]. r_i ∈^+, ∀ i∈ [0,n+1].
Decision Variables: p_i ∈^d, ∀ i∈ [0,n+1]. d_i ∈^+, ∀ i∈ [0,n].
Constraints: p_i-c_i≤ r_i, ∀ i ∈ [0, n+1]. p_i+1-p_i≤ d_i, ∀ i ∈ [0, n].
Objective: min∑_i=0^nd_i
*Dual.
Constants: Same as primal.
Decision Variables:
* Associate a variable y_i∈^d, ∀ i∈ [0,n+1] and a real w_i∈^+, ∀ i∈ [0,n+1] for each constraint of the first type (y_i· (p_i-c_i)≤ w_i· r_i).
* Associate a variable z_i∈^d, ∀ i∈ [0,n] for each constraint of the second type (z_i· (p_i+1-p_i)≤ d_i).
Constraints: z_i≤ 1, ∀ i∈ [0,n]. y_i=z_i-z_i-1, ∀ i∈ [0,n+1]. y_i≤ w_i, ∀ i∈ [0,n+1].
Objective: max-∑_i=0^n+1w_ir_i-∑_i=0^n+1y_i· c_i.
|
http://arxiv.org/abs/2303.07326v1
|
20230313174512
|
A Smoothing Algorithm for Minimum Sensing Path Plans in Gaussian Belief Space
|
[
"Ali Reza Pedram",
"Takashi Tanaka"
] |
cs.RO
|
[
"cs.RO",
"math.OC"
] |
Unsupervised HDR Image and Video Tone Mapping via Contrastive Learning
Cong Cao, Huanjing Yue, Member, IEEE, Xin Liu, Jingyu Yang, Senior Member, IEEE
This work was supported in part by the National Natural Science
Foundation of China under Grant 62072331 and Grant 62231018.
C. Cao, H. Yue (corresponding author), X. Liu, and J. Yang are with the School of Electrical and Information Engineering, Tianjin University.
March 30, 2023 at
==============================================================================================================================================================================================================================================================================================================================================================
empty
empty
This paper explores minimum sensing navigation of robots in environments cluttered with
obstacles. The general objective is to find a path plan to a goal region that requires minimal
sensing effort. In [1], the information-geometric RRT* (IG-RRT*) algorithm was proposed to
efficiently find such a path. However, like any stochastic sampling-based planner, the
computational complexity of IG-RRT* grows quickly, impeding its use with a large number of
nodes. To remedy this limitation, we suggest running IG-RRT* with a moderate number of
nodes, and then using a smoothing algorithm to adjust the path obtained. To develop a
smoothing algorithm, we explicitly formulate the minimum sensing path planning problem as
an optimization problem. For this formulation, we introduce a new safety constraint to
impose a bound on the probability of collision with obstacles in continuous-time, in contrast
to the common discrete-time approach. The problem is amenable to solution via the
convex-concave procedure (CCP). We develop a CCP algorithm for the formulated
optimization and use this algorithm for path smoothing. We demonstrate the efficacy of the
proposed approach through numerical simulations.
§ INTRODUCTION
Advancements in sensing and computer vision techniques over the last decades have facilitated the acquisition of ample amounts of information for robot navigation. However, using all the available data can result in long processing times; draining the available computational power and communication bandwidth.
One popular approach for managing the overhead of intense information processing is the strategic use of available sensory data as opposed to full deployment. For instance, in <cit.>, several feature selection algorithms are proposed and compared for efficient visual odometry/visual simultaneous localization and mapping. In <cit.> the features that contribute the most to state estimation are incorporated meanwhile others are ignored. In the same line of research, <cit.> incorporated a restriction on the sensing budget into an optimal control problem and proposed an algorithm for control and sensing co-design. In <cit.>, an attention mechanism is proposed for the optimal allocation of sensing resources.
Executing different path plans requires different amounts of sensory data.
Thus, it is crucial for an autonomous system to be able to find path plans that require minimal sensing. To achieve this capability, <cit.> and <cit.> established the minimum sensing path planning paradigm,
where a pseudo-metric is introduced for Gaussian belief space to quantify the
augmented control and information costs incurred in the transition between two arbitrary states. The work <cit.> proposed an asymptotically optimal <cit.> sampling-based motion planner, referred to as information-geometric RRT* (IG-RRT*) to find the shortest path in the introduced metric.
The success of IG-RRT* in providing optimal path plans in obstacle-cluttered environments is verified through simulation in <cit.>. However, like any RRT* algorithm, the time complexity of IG-RRT* with n nodes grows as 𝒪(nlog n) <cit.>. This complexity restricts finding a precise approximation of the optimal path plan directly by deploying IG-RRT* for a large number of steps. We thus propose a two-stage procedure to circumvent this computational limitation of IG-RRT*. In the first stage, the algorithm is run for a moderate number of iterations to find an approximation of the optimal path. The path sought in this stage is “jagged" in most cases due to the stochastic nature of IG-RRT*. In the second stage, this path is “smoothed" toward the optimal path using gradient-based solvers.
Performing the second stage requires the minimum sensing path problem to be formulated explicitly as a shortest path problem with safety constraints ensuring a small probability of collision with obstacles. The explicit formulation of the shortest path problem in the belief space with safety constraints is a well-studied problem, and a core element of chance-constrained (CC) motion planners <cit.>.
CC planners impose a set of deterministic constraints (e.g., see <cit.>) which ensure the instantaneous probability of collision with half-space obstacles is bounded at discrete time steps.
The probability of collision with polyhedral obstacles is bounded
using probabilistic bounds like Boole's inequality <cit.>. Constraints that aim to bound the collision probability in continuous time, that is, in the transition between discrete-time steps, are less explored. <cit.> and <cit.> are among a few papers that studied continuous-time safety constraints using the reflection principle and cumulative Lyapunov exponent formulation, respectively. Yet, these papers only provide constraints to bound the probability of collision with half-space obstacles.
In this work, we derive novel safety constraints that directly bound the probability of collision with polyhedral obstacles in both discrete and continuous time. Our derivation is obtained using strong duality and the theorem of alternatives <cit.>. Using the proposed safety constraints, we formulate the minimum sensing path problem explicitly. We partially convexify the resulting optimization and represent it as a difference of convex (DOC) program. By exploiting the DOC form, we devise an iterative algorithm that starts from the feasible solution obtained by IG-RRT* at stage one, and monotonically
smooths the path toward a locally optimal path using gradient-based solvers. The devised algorithm is the implementation of the convex-concave procedure (CCP) <cit.> for the formulated problem.
Notation: We write vectors in lower case x and matrices in upper case X. Let 𝕊_+^d={P∈ℝ^d × d: P=P^⊤≻ 0 } and x denote the 2-norm of x. For positive integers i<j, [i:j] denotes the set {i, i+1, …, j} and [j]=[1:j]. x∼𝒩(x,P) denotes a Gaussian random variable with mean x and covariance P. The unit interval {a ∈ℝ: 0≤ a ≤ 1} is denoted by int and the zero vector in ℝ^f by 0_f. For vectors ≥ denotes element-wise inequality, e.g. a≥ 0_f.
§ PRELIMINARIES
As in <cit.> and <cit.>, we model the minimum sensing navigation of a robot as a shortest path problem in Gaussian belief space ℝ^d×𝕊^d_+. In this setting, we search for the optimal joint control-sensing plan that drives the robot from an initial state to a target region while achieving the minimum steering cost (defined in Subsection <ref>) and a bounded probability of collision with obstacles.
§.§ Assumed Dynamics
We assume that the robot's dynamics are governed by a controlled Ito process
dx(t)=v(t) dt+ N^1/2 db(t),
where x(t) ∈ℝ^d is the state of the robot at time t with initial x(0)∼𝒩(x_0, P_0), v(t) is the velocity input command, b(t) is d-dimensional standard
Brownian motion, and N ∈𝕊^d is the process noise intensity.[ In practice, the path planning strategy we propose is applicable even if the robot's actual dynamics are different from
(<ref>). See <cit.> for further discussion.] We assume that the robot is commanded at constant periods of Δ t, and the control input is applied using a zero-order hold converter. Under these assumptions, (<ref>) can be discretized via
x_k = x_k-1+ u_k-1+w_k-1,
where x_k is a state of the robot at time t=kΔ t, u_k-1=v(t_k-1)Δ t, and w_k-1∼𝒩(0, W := N Δ t).
Let the probability distributions of the robot's state at
a given time step k-1 be parameterized by a Gaussian model x_k-1∼𝒩(x_k-1, P_k-1). After exerting the deterministic feed-forward control input u_k-1, the covariance propagates linearly to P̂_k=P_k-1+W, and the
robot's state becomes (x_k=x_k-1+u_k-1, P̂_k) prior to the measurement at t_k. After the measurement at t_k, the covariance is reduced to the posterior covariance P_k≜ (P̂_k^-1+S_k)^-1≼P̂_k, where S_k∈𝕊_+^d is the information content of the measurement.[ See <cit.>
that explains how a given S_k is realized by an appropriate choice of sensors.]
§.§ Steering Cost
The cost incurred during t_k-1→ t_k is defined as the weighted sum of control cost D_cont,k and the information acquisition cost D_info,k, as
𝒟_k≜𝒟_cont,k+ α𝒟_info,k,
where α is the weight factor. The control cost is simply the control input power 𝒟_cont,k≜u_k-1^2=x_k-x_k-1^2.
The information cost is the entropy reduction incurred at the end of transition t_k-1→ t_k, defined as
𝒟_info,k≜1/2logP̂_k - 1/2log P_k.
§.§ Collision Constraints
We assume the path planning is to be performed inside a polyhedral domain 𝒳_dom := { x∈ℝ^d: a_dom,l^⊤ x ≤ b_dom,l, l ∈ [L] }, which is filled with polyhedral obstacles
𝒳_obs^m := { x∈ℝ^d: A_obs,m x ≤ b_obs,m} for m∈ [M]. We assume the target region is also defined as
polyhedral region 𝒳_tar := { x∈ℝ^d: a_tar,n^⊤ x ≤ b_tar,n, n ∈ [N]}. Fig. <ref> shows a sample environment with L=4, M=2, and N=4.
We define the % confidence ellipse for a Gaussian distribution x∼𝒩(x_i,P_i) as ℰ_χ(x_i,P_i) := {x∈ℝ^d: (x-x_i)^⊤ P^-1(x-x_i) ≤χ^2()}, where χ^2() is the -th quantile of the Chi-squared distribution. For simplicity, we use χ^2 in the sequel. Fig. <ref> depicts a sample belief path with 6 steps using confidence ellipses, where two measurements are performed at time-steps k=3 and 6 with no measurement at all other time-steps k (which means S_k=0 for k∉{1,3}).
For a fixed confidence level χ^2>0,
we say a belief state (x_i,P_i) is collision-free if the confidence ellipse ℰ_χ(x_i,P_i) has empty overlap with obstacles 𝒳_obs^m for all m∈ [M] and is contained in 𝒳_dom. The collision-free constraint can be written as
x_obs∉ℰ_χ(x_i, P_i), ∀ x_obs∈𝒳^m_obs, m∈ M,
ℰ_χ(x_i,P_i) ⊆𝒳_dom.
At first glance, (<ref>) and (<ref>) seem to have two seperate mathematical forms. However, (<ref>) can be written as
x_out∉ℰ_χ(x_i,P_i), ∀ x_out∈𝒳_out,
where 𝒳_out := ℝ^d \𝒳_dom. We can rewrite 𝒳_out as the union of half-space (1-faced polyhedral) obstacles 𝒳_out^l={x∈ℝ^d: -a_dom,l^⊤ x ≤ -b_dom,l} for l ∈ [L]. Hence, (<ref>) and (<ref>) can be jointly written as
x_o∉ℰ_χ(x_i, P_i), ∀ x_o∈𝒳^j_O, j∈ [J:=M+L],
where 𝒳^j_O∈{𝒳^1_obs, …, 𝒳^M_obs, 𝒳^1_out, …, 𝒳^L_out}.
For a fixed confidence level χ^2>0, we say belief state (x_i,P_i) is an admissible final state if ℰ_χ(x_i,P_i) is contained in 𝒳_tar (i.e., ℰ_χ(x_i,P_i) ⊆𝒳_tar). For instance, ℰ_χ(x_6,P_6) in Fig. <ref> is an admissible final belief state.
Similar to 𝒳_out, region 𝒳_tout:= ℝ^d\𝒳_tar can be thought as the union of half-space obstacles 𝒳_tout^n={x∈ℝ^d: -a_n^⊤ x ≤ -b_n} for n∈ [N]. Thus, ℰ_χ(x_i,P_i) is an admissible final state iff x_tout∉ℰ_χ(x_i,P_i), ∀ x_tout∈𝒳^n_tout, ∀ n∈ [N].
Governed by dynamics (<ref>), it is easy to verify that the state of the robot in transition t_k-1→ t_k can be parameterized by s ∈ int as (x_k[s]= x_k-1+ s Δ x_k ,P[s] = P_k-1+ s W ), where Δ x_k:= x_k-x_k-1.
For a fixed confidence level χ^2>0, we say that the transition from x_k-1 to x_k with initial covariance P_k-1 is collision-free if for all s ∈ int, ℰ_χ(x[s],P[s]) has empty overlap with obstacles 𝒳_obs^m for all m∈[M], and 𝒳_out. Mathematically, it is equivalent to x_o∉ℰ_χ(x_k[s], P_k[s]), ∀ x_o∈𝒳^j_O, j∈ [J], ∀ s∈ int.
§ PROBLEM FORMULATION
Let's fix the number of time steps K and confidence level χ^2. Introducing information matrix Q_k:=(P_k-1+W)^-1= P_k^-1-S_k, the shortest path problem with respect to the proposed steering cost can be formulated as
min ∑_k=1^K(x_k-x_k-1^2+α/2log (Q_k+S_k)
-α/2log Q_k)
s.t. Q_k^-1 = (Q_k-1+S_k-1)^-1+W, ∀ k ∈ [K],
x_o∉ℰ_χ(x_k[s],(Q_k+S_k)^-1[s]),
∀ k∈ [K], ∀ x_o∈𝒳^j_O, ∀ j∈ [J], ∀ s ∈ int
x_tout∉ℰ_χ(x_K,(Q_K+S_K)^-1),
∀ x_tout∈𝒳^n_tout, ∀ n∈ [N],
where the minimization is performed over {x_k, Q_k, S_k}_k=1^K, and x_0 and Q_0+S_0 := P_0^-1 are given.
Constraint (<ref>) is the Kalman filter iteration, (<ref>) states all transitions t_k-1→ t_k are safe (collision-free), and (<ref>) ensures that final belief is an admissible final state.
We can define a relaxation of problem (<ref>) via
min (<ref>)
s.t. Q_k^-1≽ (Q_k-1+S_k-1)^-1+W, ∀ k ∈ [K],
(<ref>) and (<ref>).
The following lemma proves that the optimal solution of Problem (<ref>) is also an optimal solution of Problem (<ref>). Solving problem (<ref>) has computational advantage over solving problem (<ref>), as constraint (<ref>) is convex whereas (<ref>) is not. More precisely, (<ref>) can be written as a linear matrix inequality (LMI)
[ Q_k Q_k Q_kW; Q_k Q_k-1+S_k-1 0; W Q_k 0 W ]≽ 0, ∀ k ∈ [K].
The proof is based on contradiction. Assume the optimal value of Problem (<ref>) is attained by (x^*_k, Q^*_k, S^*_k) as J^*, where (<ref>) does not hold. We consider the set (x^*_k, Q^**_k, S^*_k), where
Q_k^**-1 = (Q_k-1^**+S^*_k-1)^-1+W, ∀ k∈ [K],
starting again from Q_0^**+S^*_0=P_0^-1,
and show (x^*_k, Q^**_k, S^*_k) is a feasible solution to Problem (<ref>) that attains a lower value J^**≤ J^*.
Q_k^** ≽Q_k^*.
We proceed via induction on k. For k=1, we have Q_1^**-1 = Q_1^*-1 = P_0 + W, and thus the base step
holds. We now assume (<ref>) holds for k=t and show (<ref>) holds for k=t+1. From Q_t^**≽Q_t^*, it immediately follows that
Q_t+1^**-1 = (Q_t^**+S^*_t)^-1 + W ≼ (Q_t^*+S_t^*)^-1 + W ≼Q_t+1^*-1,
which establishes the claim for k=t+1.
Claim 1 implies that ℰ_χ(x^*_k[s], (Q_k^**+S_k^*)^-1[s]) ⊆ℰ_χ(x^*_k[s], (Q_k^*+S^*_k)^-1[s]) and ℰ_χ(x^*_K,(Q̂_K^**+S^*_K)^-1) ⊆ℰ_χ(x^*_K,(Q̂_K^*+S^*_K)^-1), which proves (x^*_k, Q^**_k, S^*_k) satisfies constraints (<ref>), and (<ref>). Constraint (<ref>) is also satisfied trivially which leads to the conclusion that (x^*_k, Q^**_k, S^*_k) is a feasible solution for (<ref>). On the other hand, using the matrix determinant lemma we have
log (Q_k+S_k) - log Q_k
= log S_k+ log(Q_k^-1+S_k^-1).
It is trivial to see (<ref>) is decreasing function of Q_k, which proves J^**≤ J^*.
Both constraints (<ref>), and (<ref>) have to be held over a continuous domain (like ∀ x_o∈𝒳_O^j), which cannot be handled directly by standard gradient-based solvers. In the upcoming subsections, we derive equivalent conditions for these constraints using strong duality and the theorem of alternatives <cit.>.
§.§ Discrete-time Collision Constraint
The ellipse ℰ_χ(x_i,Q_i^-1) and the f-faced polyhedron 𝒳={ x: A x≤ b} do not overlap if and only if ∃λ≥ 0_f such that
-λ^⊤ A Q_i^-1 A^⊤λ + 2 λ^⊤ (A x_i- b) ≥χ^2.
Invoking the definition of confidence ellipse, the absence of overlap between ℰ_χ(x_i,Q_i^-1) and 𝒳 can be written as
∀ x ∈𝒳, (x-x_i)^⊤ Q_i (x-x_i) ≥χ^2,
which is equivalent to the condition that the minimum value
V^* ≜min_x:Ax≤ b (1/2)(x-x_i)^⊤ Q_i (x-x_i)
is greater than χ^2/2. It is straightforward to see that the dual of (<ref>) is
max_λ≥ 0 -(1/2) λ^⊤ A Q_i^-1 A^⊤λ+ λ ^⊤ (A x_i - b),
where λ≥ 0_f is the dual variable. The optimization problem (<ref>) is convex in x for a given pair of (x_i,P_i), and it is easy to verify that Slater's condition holds. Therefore, strong duality holds, implying that V^* ≥χ^2/2 if and only if there exists a dual feasible solution (λ≥ 0_f) satisfying (<ref>).
If the polyhedron 𝒳 is a half-space {x: a^⊤ x ≤ b},
(<ref>) simplifies to - (a^⊤ Q_i^-1 a) λ^2 + 2(a^⊤ x_i- b) λ -χ^2 ≥ 0,
which is a second order function of scalar λ. It is easy to verify that the maximum of (a^⊤ x_i-b)^2/a^⊤ Q_i^-1 a-χ^2 is obtained at λ=a^⊤ x_i-b/a^⊤ Q^-1a≥ 0. Hence, (<ref>) reduces to
a^⊤ x_i+ √(χ^2 a^⊤ Q_i^-1 a)≤ b.
Equation (<ref>) was previously derived in <cit.> and is extensively used in CC planners. Constraint (<ref>) is not convex in (x_i,Q^-1_i). In the following lemma, we derive an equivalent convex condition.
The relation (<ref>) holds if and only if there exists a C≥ 0 such that
[ b-a^⊤ x_i 1; 1 γ C ]≽ 0, and [ 1 Ca^⊤; aC Q_i ]≽ 0,
where γ= (χ^2)^-1/2.
It is easy to verify that (<ref>) holds if and only if there exists a C ≥ 0 such that a^⊤ Q_i^-1a ≤ C^-2 and a^⊤ x_i + γ^-1 C^-1< b. By applying Schur complement lemma to these inequalities, relation (<ref>) is obtained.
Using Lemma <ref>, we can rewrite (<ref>) as a set of convex constraints
[ -b_tar,n+a_tar,n^⊤ x_K 1; 1 γ C_n ]≽ 0, ∀ n ∈ [N],
[ 1 -C_na_tar,n^⊤; -a_tar,nC_n Q_K+S_K ]≽ 0, C_n≥ 0, ∀ n ∈ [N].
§.§ Continuous-time Collision Constraint
Based on Definition <ref>, we say a collision in transition t_k-1→ t_k with polyhedral obstacle 𝒳 ={x: Ax≤ b} is detected when
(x_k[s]-x)^⊤ P_k[s]^-1(x_k[s]-x) < χ^2,
for some s ∈ int and x∈𝒳. Collision detection can be formulated as the feasibility problem w.r.t s and x:
[ χ^2 x_k-1^⊤+ s Δ x^⊤_k-x^⊤; x_k-1+ s Δ x_k-x P_k-1+s W ]≻ 0,
0≤ s ≤ 1, A x ≤ b,
which is a convex program for arbitrary polyhedron 𝒳. More precisely, transition t_k-1→ t_k is not in collision with 𝒳 iff (<ref>) is infeasible.
Problem (<ref>) is infeasible for f-faced polyhedral obstacle 𝒳 ={x: A x≤ b} iff there exists a λ≥ 0_f such that
-λ^⊤ A P_k-1 A^⊤λ + 2λ^⊤(A x_k-1-b) ≥χ^2,
-λ^⊤ A (P_k-1+W) A^⊤ + 2λ^⊤(A x_k-b) ≥χ^2.
Based on the theorem of alternatives; see Appendix <ref> for details.
The conditions (<ref>) and (<ref>) are similar to (<ref>).
They imply that the neither the initial ellipse ℰ(x_k-1,P_k-1) (when s=0) nor the final ellipse ℰ(x_k,P̂_k) (when s=1) overlap with 𝒳. However,
(<ref>) is stronger than the condition implying that initial and final confidence ellipses in transition t_k-1→ t_k are separately collision-free because (<ref>) and (<ref>) should be satisfied for a common λ.
Constraint (<ref>) has a general non-convex form. Nevertheless, by writing (<ref>) in terms of information matrices and introducing a new slack variable R≥ 0, we can reformulate it as an LMI and a DOC constraint as
h_1(R,λ,Q_k)≜[ R λ ^⊤ A; A^⊤λ Q_k ]≽ 0,
h_2(R,x_k,λ)≜R+χ^2+A x_k-b^2+λ^2
-||Ax_k-b+λ||^2≤ 0.
An analogous reformulation can be performed for (<ref>).
§ ALGORITHM
Substituting (<ref>) and (<ref>), Problem (<ref>) becomes
min (<ref>)
s.t. (<ref>) and (<ref>),
[ 2 λ_1,j^⊤ (A_jx_0-b_j)-χ^2 λ_1,j^⊤ A_j; A_j^⊤λ_1,j Q_0+S_0 ]≽ 0,
h_1(R_k,j, λ_k,j,Q_k-1+S_k-1) ≽ 0, ∀ k∈[2:K],
h_1(R̂_k,j, λ_k,j,Q_k) ≽ 0, ∀ k∈[K],
h_2(R_k,j, x_k-1, λ_k,j) ≤ 0, ∀ k∈[2:K],
h_2(R̂_k,j, x_k, λ_k,j) ≤ 0,
∀ k∈[K],
with variables {x_k,Q_k≽ 0 ,S_k ≽ 0}_k=1^K, {C_n≥ 0}_n=1^N, {λ_k,j≥ 0, R̂_k,j≥ 0}_k=1, j=1^K,J, and { R_k,j≥ 0}_k=2, j=1^K,J. In (<ref>), we assumed 𝒳_O^j is defined as {x∈ℝ^d:A_j x ≤ b_j}, and constraints (<ref>)-(<ref>) are imposed for all j∈[J].
In (<ref>), all terms in the objective function except log(Q_k+S_k), and all terms in constraints except
-||A_jx_k-1-b_j+λ_k,j||^2 in (<ref>) and -||A_jx_k-b_j+λ_k,j||^2 in (<ref>) are convex. These non-convex terms are negative of convex functions, meaning that (<ref>) is a DOC problem.
A variety of sequential quadratic programming (SQP)-based
approaches <cit.> could be used to solve the nonlinear program (<ref>) to local optimality. However, it would be required to artificially assume that the sequence of convex programs in the SQP solvers stay feasible. In contrast, if we apply CCP to a DOC problem like (<ref>), the concavity of the non-convex terms guarantees that the sequence of convex programs is feasible <cit.>. Also, it is shown that CCP monotonically converges to a local optimum <cit.>.
§.§ Convex-Concave Procedure (CCP)
CCP is an iterative method that starts from a feasible solution of a DOC optimization program. It over-approximates concave terms (both in the objective function and constraints) in the program via affine functions obtained by linearization around a feasible solution. The resulting convex problem can then be solved using standard convex solvers. The linearization is then repeated around the obtained solution, and the iteration continues until the sequence of solutions converges to a locally optimal solution <cit.>.
To implement CCP for (<ref>), we can linearize the functions h_3(Q,S)≜log (Q+S)-log Q and h_2(R,x,λ) around a feasible solution (Q̃,S̃, x̃, λ̃) by h̅_3(Q,S: Q̃,S̃) = log(Q̃+S̃)-log Q+ ((Q̃+S̃)^-1 (Q+S- Q̃-S̃)), and h̅_2(R, x,λ: x̃,λ̃) = R+χ^2+A x_k-b^2+λ^2 -
Ax̃-b+λ̃^2 - 2
(Ax̃-b+λ̃)^⊤ (A(x-x̃)+λ-λ̃), respectively.
Denoting the the solution obtained via the CCP iteration i as {x_k^i, S_k^i, Q^i_k}_k=1^K and {λ_k,j^i}_k=1,j=1^K,J, at iteration i+1 we solve the convex problem
min ∑_k=1^Kx_k-x_k-1^2 +α/2h̅_3(Q_k,S_k:Q^i_k,S^i_k)
s.t. (<ref>)- (<ref>),
h̅_2(R_k,j,x_k-1,λ_k,j: x_k-1^i,λ_k,j^i) ≤ 0,
∀ k∈[2:K], ∀ j ∈[J],
h̅_2(R̂_k,j, x_k,λ_k,j: x^i_k, λ_k,j^i)≤ 0,
∀ k∈[K], ∀ j ∈[J].
§.§ Initialization
The first stage of CCP starts from an initial feasible solution {x^0_k, S_k^0, Q^0_k}_k=1^K and {λ_k,j^0}_k=1,j=1^K,J. However, the IG-RRT* algorithm does not explicitly provide a set of {λ_k,j^0}_k=1,j=1^K,J. In IG-RRT*, the collisions are checked through a numerical state-validator function (like any sampling-based method), and not directly through (<ref>).
Nevertheless, a feasible λ^0_k,j that satisfies (<ref>)
for polyhedral obstacles 𝒳_o^j={x:A_j x≤ b_j} and a feasible set {x^0_k, S^0_k, Q^0_k}_k=1^K obtained from IG-RRT* can be sought by solving the convex feasibility problem
[ 2 λ_k,j^⊤ (A_j x^0_k-1-b_j)-χ^2 λ_k,j^⊤ A_j; A_j^⊤λ_k,j Q_k-1^0+S^0_k-1 ]≥ 0,
[ 2 λ_k,j^⊤ (A_jx^0_k-b_j)-χ^2 λ^⊤_k,j A_j; A_j^⊤λ_k,j Q^0_k ]≥ 0,
λ_k,j≥ 0,
w.r.t λ_k,j.
§ SIMULATION RESULTS
Fig. <ref> shows a 1m× 1m obstacle-filled environment, and the path plans obtained by the IG-RRT* algorithm with N=500 and W=0.2× 10^-3 I_2 for two values of α=0.1 and α=1.0. Fig. <ref> depicts the smoothed versions of these paths obtained after 15 CCP iterations. A comparison between Fig. <ref> and Fig. <ref> reveals the success of the proposed algorithm in smoothing the path plans obtained from the stochastic IG-RRT algorithm.
The videos showing the evolution of the paths during the smoothing algorithm for α=0.1 and 1.0 are accessible at https://youtu.be/ieUbd1uj-aEhttps://youtu.be/ieUbd1uj-aE and https://youtu.be/nNZn4GGbbWshttps://youtu.be/nNZn4GGbbWs, respectively. Fig. <ref> demonstrates the monotonic reduction of steering costs in the sequence of path plans obtained in CCP iterations.
§ CONCLUSION AND FUTURE WORK
In this work, we studied the smoothing of minimum sensing belief paths obtained by the IG-RRT* algorithm. We derived a novel safety constraint to bound the probability of collision with polyhedral obstacles in the transition between two Gaussian belief states. We deployed the presented safety constraint to formulate minimum sensing path planning as an optimization problem. We formulated this problem as a DOC program, for which the CCP algorithm can be utilized to find local optima. We proposed to use such a CCP algorithm as an efficient smoothing algorithm.
Numerical simulations demonstrated the utility of the proposed algorithm.
This paper assumes a fixed (common) confidence level for all
transitions on the path, and it is silent about the end-to-end
probability of collision. One future direction is to develop a
smoothing mechanism that allows the allocation of (potentially) different confidence
levels to each transition subject to a constraint on the end-to-end collision probability.
§ PROOF OF THEOREM <REF>
We provide the proof for d=2; however, the proof can be generalized for arbitrary dimension.
If we denote the elements of x as x= [q_1 q_2]^⊤, feasibility problem (<ref>) becomes
min_s≥ 0, q_1, q_2 0
s.t.
R_0 +R_1 q_1+R_2 q_2+ R_3s≻ 0,
s ≤ 1, A_1 q_1 + A_2 q_2 ≤ b,
where
R_0=[ χ^2 x_k-1^⊤; x_k-1 P_k-1 ],
R_1=[ 0 -1 0; -1 0 0; 0 0 0 ],
R_2=[ 0 0 -1; 0 0 0; -1 0 0 ],
R_3=[ 0 Δ x_k^⊤; Δ x_k W ],
and A_1 and A_2 are the first and the second columns of A, respectively. The
Lagrangian of problem (<ref>), can be written as ℒ(q_1,q_2,s, M, γ, λ) = (-(R_0 +R_1 q_1+R_2 q_2+ R_3 s) M)+ γ (s-1) +λ^⊤(A_1 q_1 + A_2 q_2- b), where M≽0, γ≥0, and λ≥ 0 are dual variables. Dual function for (<ref>) can be written as
g(M, γ, λ) = -(R_0M)-λ^⊤ b-γ+ inf_q_1 (-(R_1M)+λ^⊤ A_1) q_1 + inf_q_2 (-(R_2M)+λ^⊤ A_2) q_2+ inf_s≥0(-(R_3M)+γ) s.
Hence, the dual problem of (<ref>) can be written as
max -(R_0M)-λ^⊤ b-γ
s.t. -(R_1M)+λ^⊤ A_1=0,
-(R_2M)+λ^⊤ A_2=0,
-(R_3M)+γ≥ 0.
where variables are M≽ 0, γ≥ 0, and λ≥ 0. If we denote the element at the ith row and the jth column of M by m_i,j,
constraints (<ref>) and (<ref>) yield [m_1,2 m_1,3] = -1/2λ^⊤ A. Hence, M has the form
M=1/2[ M_1 - λ^⊤ A; -A^⊤λ M_2 ]≽ 0.
Using the structure of M, Problem (<ref>) turns to
max -1/2M_1χ^2+λ^⊤(A x_k-1-b) -1/2(P_k-1 M_2)-γ
s.t. [ M_1 λ^⊤ A; A^⊤λ M_2 ]≽ 0,
1/2(WM_2)- λ^⊤ A Δ x_k ≤γ,
where the variables are M_1>0, M_2≽ 0, λ≥ 0, and γ≥ 0.
After performing the maximization w.r.t γ,
this optimization simplifies to
max_M_1≥ 0, M_2≽ 0, λ≥ 0 -1/2M_1χ^2+λ^⊤(A x_k-1-b)-1/2(P_k-1 M_2)
+min{0,-1/2(WM_2)+λ^⊤A Δ x_k}
s.t. [ M_1 λ^⊤ A; A^⊤λ M_2 ]≽ 0.
The objective function and the constraints in (<ref>) are affine in dual variables M_1, M_2, and λ. Thus, (<ref>) is unbounded iff it admits a feasible solution (M_1>0, M_2≽ 0, λ≥0,) that yields a positive value of objective function. From the theorem of alternatives, we know unboundedness of dual problem implies the infeasibility of primal problem and vice versa. Hence, (<ref>) is infeasible iff ∃λ≥0, M_2≽ 0 such that
2λ^⊤(A x_k-1-b) - (P_k-1 M_2) ≥χ^2,
2λ^⊤(A x_k-b) - ((P_k-1+W) M_2) ≥χ^2,
M_2≽λ^⊤ A A^⊤λ,
where w.l.o.g we assumed M_1=1 and (<ref>) is obtained by applying Schur complement lemma to (<ref>).
It is easy to verify that the maximum values of the LHS of both (<ref>) and (<ref>) subject to (<ref>) are obtained at M_2=λ^⊤ A A^⊤λ. Hence, condition (<ref>) can be equivalently written as ∃λ≥0 such that (<ref>) holds, which completes the proof.
-0cm
IEEEtran
|
http://arxiv.org/abs/2303.07033v1
|
20230313114724
|
SelfPromer: Self-Prompt Dehazing Transformers with Depth-Consistency
|
[
"Cong Wang",
"Jinshan Pan",
"Wanyu Lin",
"Jiangxin Dong",
"Xiao-Ming Wu"
] |
cs.CV
|
[
"cs.CV"
] |
SelfPromer: Self-Prompt Dehazing Transformers with Depth-Consistency
Cong Wang^1, Jinshan Pan^2, Wanyu Lin^1, Jiangxin Dong^2, Xiao-Ming Wu^1
^1The Hong Kong Polytechnic University, ^2Nanjing University of Science and Technology
{supercong94;sdluran;dongjxjx}@gmail.com, {wan-yu.lin;xiao-ming.wu}@polyu.edu.hk
March 30, 2023
=============================================================================================================================================================================================================================================================================
This work presents an effective depth-consistency self-prompt Transformer for image dehazing. It is motivated by an observation that the estimated depths of an image with haze residuals and its clear counterpart vary. Enforcing the depth consistency of dehazed images with clear ones, therefore, is essential for dehazing. For this purpose, we develop a prompt based on the features of depth differences between the hazy input images and corresponding clear counterparts that can guide dehazing models for better restoration. Specifically, we first apply deep features extracted from the input images to the depth difference features for generating the prompt that contains the haze residual information in the input. Then we propose a prompt embedding module that is designed to perceive the haze residuals, by linearly adding the prompt to the deep features. Further, we develop an effective prompt attention module to pay more attention to haze residuals for better removal. By incorporating the prompt, prompt embedding, and prompt attention into an encoder-decoder network based on VQGAN, we can achieve better perception quality. As the depths of clear images are not available at inference, and the dehazed images with one-time feed-forward execution may still contain a portion of haze residuals, we propose a new continuous self-prompt inference that can iteratively correct the dehazing model towards better haze-free image generation. Extensive experiments show that our method performs favorably against the state-of-the-art approaches on both synthetic and real-world datasets in terms of perception metrics including NIQE, PI, and PIQE.
§ INTRODUCTION
Recent years have witnessed advanced progress in image dehazing due to the development of deep dehazing models.
Mathematically, the haze process is usually modeled by an atmospheric light scattering model <cit.> formulated as:
I(x) = J(x)T(x) + (1-T(x))A,
where I and J denote a hazy and haze-free image, respectively, and A denotes the global atmospheric light, x denotes the pixel index, and the transmission map T is usually modeled as T(x) = e^-βd(x) with the scene depth d(x), and the scattering coefficient β reflects the haze density.
Most existing works develop various variations of deep Convolutional Neural Networks (CNNs) for image dehazing <cit.>.
They typically compute a sequence of features from the hazy input images and directly reconstruct the clear ones based on the features, which have achieved state-of-the-art results on benchmarks <cit.> in terms of PSNRs and SSIMs.
However, as dehazing is ill-posed, very small errors in the estimated features may degrade the performance.
Existing works propose to use deep CNNs as image priors and then restore the clear images iteratively. However, they cannot effectively correct the errors or remove the haze residuals in the dehazed images as these models are fixed in the iterative process <cit.>.
It is noteworthy that the human visual system generally possesses an intrinsic correction mechanism that aids in ensuring optimal results for a task. This phenomenon has been a key inspiration behind the development of a novel dehazing approach incorporating a correction mechanism that guides deep models toward better haze-free results generation.
Specifically, if a dehazed result exists haze residuals, a correction mechanism can localize these regions and guide the relevant task toward removing them.
Notably, NLP-based text prompt learning has shown promise in guiding the models by correcting the predictions <cit.>.
However, text-based prompts may not be appropriate for tasks that require solely visual inputs without accompanying text.
Recent works <cit.> attempted to address this issue by introducing text-free prompts into vision tasks.
For instance, PromptonomyViT <cit.> evaluates the adaptation of multi-task prompts such as depth, normal, and segmentation to improve the performance of the video Transformers.
Nevertheless, these prompts may not be suitable for image dehazing tasks, as they could not capture the haze-related content.
To better guide the deep model for better image dehazing, this work develops an effective self-prompt dehazing Transformer. Specifically, it explores with the depth consistency of hazy images and their corresponding clear ones as a prompt.
In particular, our study is motivated by the substantial difference between the estimated depths of hazy images and their clear counterparts, , the same scene captured in the same location should be consistent regarding depth.
Depth is typically related to the transmission map in the atmospheric light scattering model as shown in (<ref>).
Thus, if the dehazed images can be reconstructed accurately, their estimated depths should be close to those of their clear counterparts at large.
However, haze residuals often degrade the accuracy of depth estimation, resulting in significant differences between hazy and clear images, as illustrated in Fig. <ref>(e).
Yet, the difference map of estimated depths from images with haze residuals and clear images often points to the regions affected by haze residuals.
Based on the above observation, we design a prompt to guide the deep models for perceiving and paying more attention to haze residuals.
Our prompt is built upon the estimated feature-level depth differences, of which the inconsistent regions can reveal haze residual locations for deep models correction.
On top of the prompt, we introduce a prompt embedding module that linearly combines input features with the prompt to better perceive haze residuals.
Further, we propose a prompt attention module that employs self-attention guided by the prompt to pay more attention to haze residuals for better haze removal.
Our encoder-decoder architecture combines these modules using VQGAN <cit.> to enhance the perception quality of the results, as opposed to relying solely on PSNRs and SSIMs metrics for evaluation.
As the depths of clear images suffer from unavailability at inference and dehazed images obtained via one-time feed-forward execution may have haze residuals, we introduce a continuous self-prompt inference to address these challenges.
Specifically, our proposed approach feeds the hazy input image to the model and sets the depth difference as zero to generate clearer images that serve as the clear counterpart.
The clear image participates in constructing the prompt to conduct prompt dehazing.
The inference operation is continuously conducted as the depth differences can keep correcting the deep dehazing models toward better haze-free image generation.
This paper makes the following contributions:
* We make the first attempt to formulate the prompt by considering the cues of the estimated depth differences between the image with haze residuals and its clear counterpart in the image dehazing task.
* We propose a prompt embedding module and a prompt attention module to respectively perceive and pay more attention to haze residuals for better removal.
* We propose a new continuous self-prompt inference approach to iteratively correct the deep models toward better haze-free image generation.
*
Experiments demonstrate that our method performs favorably against state-of-the-art approaches on both synthetic and real-world datasets in terms of perception metrics including NIQE, PI, and PIQE.
§ RELATED WORK
In this section, we overview image dehazing, VQGAN image restoration, and prompt vision applications.
Image Dehazing.
Traditional solutions usually design various hand-crafted priors captured deterministic and statistical properties of hazy and haze-free images to remove haze, such as dark channel <cit.>, color-line <cit.>, haze-line <cit.>, .
Recently, CNN-based dehazing approaches are gradually developed <cit.>, , MSCNN <cit.> use CNN to estimate the transmission map.
One limitation of these algorithms is not flexible as they are not end-to-end.
To address this issue, end-to-end dehazing networks <cit.> are proposed.
Considering the haze physics model (<ref>), physics-based CNNs <cit.> are suggested.
Motivated the powerful generation ability of CycleGAN <cit.>, cycle-based methods <cit.> are adapted.
Although these efforts, these methods usually tend to produce unsatisfactory results as they cannot effectively perceive haze residuals.
VQGAN for Image Restoration.
Recent research <cit.> has shown that VQGAN <cit.> is an effective tool to generate more realistic results.
VQGAN-based restoration methods estimate latent clear images but often neglect deep model prior cues, which can limit their performance.
Zhou . propose CodeFormer <cit.>, which inserts regular Transformers into VQGAN for face restoration.
Different from this work, our approach incorporates the estimated depth inconsistency between the image with haze residuals and its clear version by using prompt embedding and prompt attention to iteratively correct deep models with a self-prompt inference scheme for image dehazing.
Prompt Learning for Vision.
Prompt learning is first studied in natural language processing <cit.>.
Due to its high effectiveness, prompt learning is recently used in vision-related tasks <cit.>, , domain generalization <cit.>, multi-modal learning <cit.>, action understanding <cit.>, and visual prompt tuning <cit.>.
To our knowledge, there is no effort to exploit prompts for dehazing. This paper aims to investigate this new path.
§ PROPOSED METHOD
Our method comprises two branches: the prompt branch and the self-prompt dehazing Transformer branch. The prompt branch generates a prompt by using the deep depth difference and deep feature extracted from the hazy input.
The other branch exploits the generated prompt to guide the deep model for image dehazing.
We incorporate a prompt embedding module and prompt attention module to respectively perceive and pay more attention to the haze residuals for better removal. The proposed modules are formulated into an encoder-decoder architecture based on VQGAN for better perception quality <cit.>.
§.§ Overall Framework
Fig. <ref> illustrates our method at the training stage.
Given a hazy images I, we first utilize trainable encoder Enc(·) to extract features:
𝐅_Enc = Enc(I).
Then, we compute the depth difference of the hazy image I and its corresponding clear image J in feature space:
D_1 = DE(I); D_2 = DE(J),
𝐅_D_1 = Enc_pre^frozen(D_1); 𝐅_D_2 = Enc_pre^frozen(D_2),
𝐅_D_diff = |𝐅_D_1 -𝐅_D_2|,
where DE(·) denotes the depth estimator[We chose DPT_Next_ViT_L_384 to balance accuracy, speed, and model size: https://github.com/isl-org/MiDaS.] <cit.>.
Enc_pre^frozen(·) denotes the pre-trained VQGAN encoder which is frozen when training our dehazing models.
Next, we exploit 𝐅_D_diff to build the Prompt, and develop a prompt embedding module and a prompt attention module in Transformers, , PTB (see details in Sec. <ref>) to better generate haze-aware features:
Prompt = 𝐅_D_diff·𝐅_Enc, # Prompt
𝐅_ProEmbed = Prompt + 𝐅_Enc, # Prompt Embedding
𝐅_PTB = PTB(Prompt, 𝐅_ProEmbed), # Prompt Transformer
where 𝐅_ProEmbed means the features of prompt embedding.
The generated feature 𝐅_PTB is further matched with the learned haze-free at the pre-trained VQGAN stage by the Lookup method <cit.>:
𝐅_mat = Lookup(𝐅_PTB, ).
Finally, we reconstruct the dehazing images J from the matched features 𝐅_mat by decoder of pre-trained VQGAN Dec_pre^frozen(·) with residual learning <cit.> by mutual deformable fusion module MDFM (see details in Sec. <ref>):
J = Dec_pre^frozen(𝐅_mat) + MDFM(F_Enc^s, F_PTB^s,u),
where F_Enc^s means the encoder features at s scale, while F_PTB^s,u denotes the s× upsampling features of PTB.
We conduct the residual learning with MDFM in {1, 1/2, 1/4, 1/8} scales between the encoder and decoder like FeMaSR <cit.>.
Here, F_Enc^1/8 denotes the F_Enc in (<ref>).
Loss Functions.
We use pixel reconstruction loss ℒ_rec, codebook loss ℒ_code, perception loss ℒ_per, and adversarial loss ℒ_adv to measure the error between the dehazed images J and the corresponding ground truth J:
[ ℒ =ℒ_rec+λ_codeℒ_code + λ_perℒ_per + λ_advℒ_adv, ]
where
ℒ_rec =||J-J||_1 + λ_ssim(1-SSIM(J,J)),
ℒ_code = ||z̅_𝐪-z_𝐪||_2^2,
ℒ_per = ||Φ(J)- Φ(J)||_2^2,
ℒ_adv= 𝔼_J[log 𝒟(J)] + 𝔼_J[1-log 𝒟(J)],
where SSIM(·) denotes the structural similarity <cit.> for better structure generation.
z_𝐪 is the haze-free codebook features by feeding haze-free images J to pre-trained VQGAN while z̅_𝐪 is the reconstructed codebook features.
Φ(·) denotes the feature extractor of VGG19 <cit.>.
𝒟 is the discriminator <cit.>.
λ_code, λ_per, λ_adv, and λ_ssim are weights.
For inference, we propose a new self-prompt inference approach (see details in Sec. <ref>) as our training stage involves the depth of clear images to participate in forming the prompt while clear images are not available at testing.
§.§ Self-Prompt Transformers
The proposed self-prompt Transformer contains the prompt generated by the prompt branch, a prompt embedding module, and a prompt attention module which is contained in the prompt Transformer block.
In the following, we introduce the definition of the prompt, prompt embedding module and prompt attention module, and prompt Transformer block in detail.
Prompt (Definition).
The prompt is based on the estimated depth difference between the input image and its clear counterpart.
It is defined in (<ref>) which can better contain haze residual features as 𝐅_D_diff with higher response value reveals inconsistent parts which potentially correspond to the haze residuals in the input hazy image.
Prompt Embedding.
Existing Transformers <cit.> usually use the position embedding method (Fig. <ref>(a)) to represent the positional correlation, which does not contain haze-related information so that it may not effectively perceive the haze residual information well.
Moreover, image restoration requires processing different input sizes at inference while the position embedding is defined with fixed parameters at training <cit.>.
Hence, position embedding may be not a good choice for image dehazing.
To overcome these problems, we propose prompt embedding which is defined in (<ref>).
By linearly adding the extracted features 𝐅_Enc with Prompt, the embedded feature 𝐅_ProEmbed perceives the haze residual features as Prompt extracts the haze residual features.
Note that as 𝐅_ProEmbed has the same size as 𝐅_Enc, it does not require fixed sizes like position embedding.
Prompt Attention.
Existing Transformers usually extract Query 𝐐, Key 𝐊, and Value 𝐕 from input features to estimate scaled-dot-product attention shown in Fig. <ref>(c).
Although Transformers are effective for feature representation, the standard operation may be not suitable for image dehazing.
To ensure the Transformers pay more attention to haze residuals for better removal, we propose prompt attention ProAtt(·) by linearly adding the query with Prompt:
Q = Q + Prompt,
ProAtt(Q, K, V) = Softmax(QK^T/√(d_head))V,
where d_head denotes the dimension of head.
Fig. <ref>(d) illustrates the proposed prompt attention.
Note that as Q in attention is to achieve the similarity relation for expected inputs <cit.>, our prompt attention by linearly adding the prompt Prompt with the Query Q can pay more attention to haze residuals for better removal.
Prompt Transformer Block.
According to the above attention design, our prompt Transformer block (PTB) can be sequentially computed as:
Q, K, V = LN(𝐗^l-1),
𝐗̂^l =ProAtt(Q, K, V) + 𝐗^l-1,
𝐗^l = MLP(LN(𝐗̂^l)) + 𝐗̂^l,
where 𝐗^l-1 and 𝐗^l mean the input and output of the l^th prompt Transformer block.
Specially, 𝐗^0 is the 𝐅_ProEmbed.
LN and MLP denote the layer normalization and multilayer perceptron.
The PTB is shown in the right part of Fig. <ref>.
It is worth noting that our prompt embedding and prompt attention are flexible as we can manually set 𝐅_D_diff=0, the network thus automatically degrade to the model without prompt, which will be exploited to form our continuous self-prompt inference (see Sec. <ref>).
§.§ Mutual Deformable Fusion Module
As VQGAN is less effective for preserving details <cit.>, motivated by the deformable models <cit.> that can better fuse features, we propose a mutual deformable fusion module (MDFM) by fusing features mutually to adaptively learn more suitable offsets for better feature representation:
off_1 = Conv(𝒞[F_Enc^s, F_PTB^s,u]);off_2 = Conv(𝒞[F_PTB^s,u, F_Enc^s]),
𝐘_1 = DMC(F_Enc^s, off_1);𝐘_2 = DMC(F_PTB^s,u, off_2),
𝐅_MDFM = Conv(𝒞[𝐘_1, 𝐘_2]),
where Conv(·), 𝒞[·], and DMC(·) respectively denote the 1×1 convolution, concatenation, and deformable convolution.
off_k (k=1,2.) denotes the estimated offset.
§.§ Continuous Self-Prompt Inference
Our model requires the depth of clear images during training, but these images are unavailable at inference. Additionally, dehazed images generated by a one-time feed-forward execution may still contain some haze residuals. To address these issues, we propose a continuous self-prompt inference approach that leverages prompt embedding and prompt attention through linear addition, as discussed in Sec. <ref>. By setting feature-level depth difference 𝐅_D_diff to zero, we can feed hazy images to our trained network and obtain clearer dehazed results which participate in building the prompt to conduct prompt dehazing.
The iterative inference is conducted to correct the deep models to ensure the deep models toward better haze-free image generation:
J_i^w/o prompt = 𝒩^w/o prompt(J_i-1^w/o prompt), set 𝐅_D_diff=0, # Step 1
Prompt = 𝐅_D_diff·𝐅_Enc; 𝐅_Enc = Enc(J_i-1^w/o prompt), # Step 2
J_i^prompt = 𝒩^prompt(J_i-1^w/o prompt,Prompt), # Step 3
J_i^w/o prompt = J_i^prompt, (i=1,2, ⋯), # Step 4
where 𝒩^w/o prompt denotes our trained network without prompt by setting 𝐅_D_diff as zero, while 𝒩^prompt means our trained network with prompt.
𝐅_D_diff = |Enc_pre^frozen(DE(J_i-1^w/o prompt)) -Enc_pre^frozen(DE(J_i^w/o prompt))|.
J_0^w/o prompt denotes the original hazy images, while J_i-1^w/o prompt is regarded as the image with haze residuals and J_i^w/o prompt in (<ref>) is regarded as the clear counterpart of J_i^w/o prompt.
J_i^prompt means the i^th prompt dehazing results.
According to (<ref>), the inference is a continuous self-prompt scheme, , we get the clear images from the hazy image itself by feeding it to 𝒩^w/o prompt to participate in producing the prompt and the inference is continuously conducted.
Fig. <ref> better illustrates the inference process.
Fig. <ref> shows our continuous self-prompt at 2^nd and 3^rd prompts outperforms the baseline which uses ground-truth (GT) to participate in forming the prompt like the process of the training stage.
However, GT is not available in the real world.
More detailed explanations are presented in Sec. <ref>.
§ EXPERIMENTAL RESULTS
In this section, we evaluate the effectiveness of our method against state-of-the-art ones (SOTAs) on commonly used benchmarks and illustrate the effectiveness of the key components in the proposed method.
Implementation Details.
We use 10 PTBs, , l=10, in our model.
The details about the VQGAN are presented in the supplementary materials.
We crop an image patch of 256×256 pixels. The batch size is 10.
We use ADAM <cit.> with default parameters as the optimizer.
The initial learning rate is 0.0001 and is divided by 2 at 160K, 320K, and 400K iterations. The model training terminates after 500K iterations.
The weight parameters λ_code, λ_per, λ_adv, and λ_ssim are empirically set as 1, 1, 0.1, and 0.5.
Our implementation is based on the PyTorch using one Nvidia 3090 GPU.
Synthetic Datasets.
Following the protocol of <cit.>, we use the RESIDE ITS <cit.> as our training dataset and the SOTS-indoor <cit.> and SOTS-outdoor <cit.> as the testing datasets.
Real-world Datasets.
In <cit.>, Li . also collect large-scale real-world hazy images, called UnannotatedHazyImages.
We use these images as a real-world hazy dataset.
Evaluation Metrics.
As we mainly aim to recover images with better perception quality, we use widely-used Natural Image Quality Evaluator (NIQE) <cit.>, Perceptual Indexes (PI) <cit.>, and Perception-based Image Quality Evaluator (PIQE) <cit.> to measure restoration quality.
Since the distortion metrics Peak-Signal-to-Noise-Ratio (PSNR) <cit.> and Structural SIMilarity (SSIM) <cit.> cannot model the perception quality well, we use them for reference only.
Notice that all metrics are re-computed for fairness.
We use the grayscale image to compute the PSNR and SSIM.
We compute NIQE and PI by the provided metrics at https://pypi.org/project/pyiqa/.
The PIQE is computed via https://github.com/buyizhiyou/NRVQA.
§.§ Results on Synthetic Datasets
Tab. <ref> and Tab. <ref> respectively report the comparison results with SOTAs on the SOTS-indoor and SOTS-outdoor datasets <cit.>.
Our method achieves better performance in terms of NIQE, PI, and PIQE, indicating the generated results by our method possesses higher perception quality.
Fig. <ref> and Fig. <ref> show that our method restores much clearer images while the evaluated approaches generate the results with haze residual or artifacts.
As we train the network with a one-time feed-forward process, PSNRs and SSIMs are naturally decreased (Ours_1 Ours_3 in Tabs. <ref> and <ref>) when inference is conducted iteratively.
We argue distortion metrics including PSNRs and SSIMs are not good measures for image dehazing as Figs. <ref> and <ref> have shown methods with higher PSNR and SSIMs cannot recover perceptual results, , Dehamer <cit.> and D4 <cit.>, while our method with better perception metrics is able to generate more realistic results.
§.§ Results on Real-World Datasets
Tab. <ref> summarises the comparison results on the real-world datasets <cit.>, where our method performs better than the evaluated methods.
Fig. <ref> illustrates that our method generates an image with vivid color and finer details.
§.§ Analysis and Discussion
We further analyze the effectiveness of the proposed method and understand how it works on image dehazing.
The results in this section are obtained from the SOTS-indoor dataset if not further mentioned. Our results are from the 1^st prompt inference for fair comparisons, , i=1 in (<ref>) if not further specifically mentioned.
Effectiveness of prompt.
Initially, we assess the effect of the prompt on image dehazing.
Notably, various prospective prompt candidates exist, such as image-level depth difference as the input of the VQGAN encoder or concatenation between deep features extracted from the input and depth features as the input of the Transformers.
Our proposed prompt is compared with these candidates, as illustrated in Tab. <ref>(b) and <ref>(c), demonstrating that none of these candidates outperforms our proposed prompt.
Note our method without prompt leads to a similar model with CodeFormer <cit.> which directly inserts regular Transformers into VQGAN.
Tab. <ref> shows prompt help yield superior perception quality than the model without prompt (Tab. <ref>(a)).
The efficacy of our model with the prompt is further affirmed by Fig. <ref>, indicating that the model with the prompt generates better results, while the model without prompt fails to remove haze effectively.
Effectiveness of prompt embedding.
One might ponder the relative efficacy of our prompt embedding in contrast to the prevalent technique of position embedding (Fig. <ref>(a)).
In this regard, we assess the effect of these embedding approaches in Tab. <ref>. The table reveals that our prompt embedding proves more advantageous over the position embedding, since the former is associated with haze residual information.
Effectiveness of prompt attention.
Analyzing the efficacy of prompt attention proves intriguing.
Tab. <ref> indicates that our prompt attention yields better results as compared to commonly used attention methods (Fig. <ref>(c)).
These findings signify that incorporating prompts in enhancing Query estimation accounts for the haze information, thereby culminating in more effective image dehazing results.
Effect of the number of steps in continuous self-prompt.
The inference stage involves several steps to generate the prompt for better image dehazing.
We thus examine the effect of the number of steps in the continuous self-prompt.
Fig. <ref> reveals that the optimal performance is achieved with a number of steps equal to 3 in the continuous self-prompts (, i=3 in (<ref>)), in terms of NIQE.
Notably, additional prompts do not improve the dehazing performance any further.
One real-world example in Fig. <ref> demonstrates that our continuous self-prompt method can gradually enhance dehazing quality.
Continuous self-prompt recurrent dehazing.
We use the continuous self-prompt approach to restore clear images progressively at inference.
To determine whether a recurrent method that is training our model without prompt achieves similar or better results, we compare our proposed method with it in Fig. <ref>, demonstrating that the recurrent method is not as good as our continuous self-prompt.
Continuous self-prompt GT guidance.
Fig. <ref> compares the NIQE performance of ground truth (GT) guidance with that of the continuous self-prompt algorithm.
Results show that while GT guidance performs better than the 1^st prompt, it falls short of the effectiveness of the 2^nd and 3^rd prompts.
This is likely due to GT guidance's limited ability to handle haze residuals which may still exist in the dehazed images, which are addressed by the self-prompt's ability to exploit residual haze information to progressively improve dehazing quality over time.
Moreover, as GT is not available in the real world, these findings may further support the use of self-prompt as a more practical alternative.
Depth-consistency.
Fig. <ref> shows heat maps of depth differences obtained by the continuous self-prompt inference with different prompt steps.
The results demonstrate both image-level and feature-level depth differences decrease as the number of prompt steps increases, indicating the depths obtained with the prompt, , (<ref>), become increasingly consistent with those obtained without it, , (<ref>).
Model size and running time.
Tab. <ref> compares our model sizes and running time against recent Transformer-based SOTAs: Uformer <cit.> and Dehamer <cit.>.
Our model is comparable with these leading methods on model sizes.
While the single-iteration time speed of our method remains comparable to these two feed-forward models <cit.>, it requires slightly more time for multiple iterations since our method involves estimating depths.
§ CONCLUSION
We have proposed a simple yet effective self-prompt Transformer for image dehazing by exploring the prompt built on the estimated depth difference between the image with haze residuals and its clear counterpart.
We have shown that the proposed prompt can guide the deep model for better image dehazing.
To generate better dehazing images at the inference stage, we have proposed continuous self-prompt inference, where the proposed prompt strategy can remove haze progressively.
We have shown that our method generates results with better perception quality in terms of NIQE, PI, and PIQE.
Limitations.
Our model is influenced by the estimated depth of J_i-1^w/o prompt and J_i^w/o prompt in (<ref>).
Our continuous self-prompt approach may not work well if the depth difference is not significant enough.
Slight performance degradation occurs when multiple prompts in the SOTS-outdoor in terms of NIQE and PI (Tab. <ref>).
We argue this may be because the depth generated from J_i-1^w/o prompt and J_i^w/o prompt in (<ref>) in SOTS-outdoor is not significant enough.
Yet, the 1^st prompt still outperforms existing methods.
ieee_fullname
|
http://arxiv.org/abs/2303.06820v1
|
20230313023334
|
Continuous sign language recognition based on cross-resolution knowledge distillation
|
[
"Qidan Zhu",
"Jing Li",
"Fei Yuan",
"Quan Gan"
] |
cs.CV
|
[
"cs.CV"
] |
IEEEexample:BSTcontrol
Continuous sign language recognition based on cross-resolution knowledge distillation
Qidan Zhu^1,
Jing Li^1*,
Fei Yuan^2,
Quan Gan^1
^1 College of Intelligent Systems Science and Engineering, Harbin Engineering University, Harbin, 150001, China
^2 Northwest Institute of Mechanical and Electrical Engineering, Xianyang, 712099, China
*Corresponding authorEmail addresses: [email protected] (Qidan Zhu), [email protected] (Jing Li), [email protected] (Fei Yuan), [email protected] (Quan Gan)
============================================================================================================================================================================================================================================================================================================================================================================================================================================================================
The goal of continuous sign language recognition(CSLR) research is to apply CSLR models as a communication tool in real life, and the real-time requirement of the models is important. In this paper, we address the model real-time problem through cross-resolution knowledge distillation. In our study, we found that keeping the frame-level feature scales consistent between the output of the student network and the teacher network is better than recovering the frame-level feature sizes for feature distillation. Based on this finding, we propose a new frame-level feature extractor that keeps the output frame-level features at the same scale as the output of by the teacher network. We further combined with the TSCM+2D hybrid convolution proposed in our previous study to form a new lightweight end-to-end CSLR network-Low resolution input net(LRINet). It is then used to combine cross-resolution knowledge distillation and traditional knowledge distillation methods to form a CSLR model based on cross-resolution knowledge distillation (CRKD). The CRKD uses high-resolution frames as input to the teacher network for training, locks the weights after training, and then uses low-resolution frames as input to the student network LRINet to perform knowledge distillation on frame-level features and classification features respectively. Experiments on two large-scale continuous sign language datasets have proved the effectiveness of CRKD. Compared with the model with high-resolution data as input, the calculation amount, parameter amount and inference time of the model have been significantly reduced under the same experimental conditions, while ensuring the accuracy of the model, and has achieved very competitive results in comparison with other advanced methods.
Continuous sign language recognition; frame-level feature extraction; cross-resolution knowledge distillation; model lightweight
§ INTRODUCTION
Sign language is a gestural-motor language that can convey semantic information through gestures, hand shapes, facial expressions and body movements to help special people to communicate<cit.><cit.><cit.>. In recent years, some research reports show that the number of hearing-impaired people will increase dramatically in the future, then sign language will occupy an increasingly important position, and CSLR is closer to real scene and has greater practical application value<cit.>. Among them, video-based CSLR has attracted extensive attention from researchers because of its advantages such as low cost and no contact<cit.><cit.>.
Video-based CSLR is the translation of continuous sign language videos into text or speech that can be read and understood by normal people, which can help special people to better integrate into social life<cit.><cit.>. Many studies have been carried out by researchers on this subject with good results. In <cit.>, a Chinese sign language processing method based on RNN converters was proposed by Gao et al. They explored multi-scale visual semantic features by designing a multi-level visual hierarchical transcription network with frame-level, lexical-level and phrase-level BiLstm, and obtained effective recognition results. Recently, Parelli et al.<cit.> proposed a sequence learning model based on ST-GCN, which extracts multiple visual representations of sign language actions and captures information about the gesture, shape, appearance and movement of sign language presenters. These models focus more on recognition accuracy, and the complexity and computational effort of the model is often overlooked, or researchers believe that accuracy is the first, which is also correct.
However, the ultimate goal of researchers in CSLR should be to apply CSLR models as a communication tool in real-life applications, which can provide considerable practical benefits. Therefore, the real-time requirement of a CSLR model should be considered as the same important position as the accuracy. It is well known that a continuous sign language video represents a combination of multiple sign language words with varying sentence lengths, hence the sheer volume of video data, and the need to fully consider the spatial-temporal relationship between frames when used as a recognition model, leading to a spike in model computation<cit.>. Some researchers have moved on to the issue of model real time. We investigated the computational effort of CSLR in <cit.> and found that the model computational effort was mainly focused on the pre-frame-level feature extraction. This study has led to a direction for researchers to reduce the computational effort of the model. Recent studies <cit.> have shown that low-resolution frames are not necessarily low-quality frames, and experimental validation results demonstrate that low-resolution input is not the main reason for the reduced accuracy of classical recognition model. The mismatch between the input resolution and the input scale of the model is the main reason for the significant reduction of the recognition accuracy. Inspired by <cit.><cit.>, we conduct further research with the aim of designing a lightweight CSLR model that can minimize the model computation while minimizing the model accuracy degradation, thus achieving the best compromise between real-time and accuracy of the model. We use cross-resolution knowledge distillation techniques, using low-resolution frames as input to the model, in order to significantly reduce the amount of parameters and calculation of frame-level feature extraction, and obtain the lightweight model.
There are two frame-level feature extraction methods used for cross-resolution knowledge extraction. Method 1 is to take a low-resolution frame as input, keep the frame-level feature extractor unchanged, upsample the extracted frame-level features, and then perform feature distillation with the frame-level features output by the teacher network. Method 2 is to reduce the number of downsampling according to the input resolution size, keep the final output frame-level feature size consistent with the frame level feature size output by the teacher network, and followed by feature distillation. In this paper, two methods of cross-resolution knowledge distillation are investigated and compared with the original method (without feature distillation), and the experimental results are shown in Figure 1. It can be seen that the word error rate (WER) of method 2 is 22.8%, 3.8% and 0.2% lower than that of method 1 at the three different resolutions. The lower the resolution of the input, the more obvious is the advantage of method 2. At very low resolutions, the WER results for method 1 are 4.8% higher than the original method. In summary, for low resolution inputs, method 2 outperforms method 1 in terms of frame-level feature extraction, meaning that Method 2 is more cost-effective in reducing the amount of model computation while maintaining recognition accuracy.
Based on the above study, this paper proposes a frame-level feature extraction network for low-resolution input, and designs a new end-to-end CSLR network-LRINet by combining it with the temporal superposition cross module proposed in our previous study <cit.>, and then combines LRINet with cross-resolution knowledge distillation and traditional knowledge distillation methods, and introduces stochastic gradient stopping<cit.> and the multi-level CTC loss<cit.> proposed in our previous study for training, constituting our proposed overall model CRKD. CRKD uses high-resolution frames as the input to the teacher network MSTNet(proposed in our previous study) for training, locking the weights after the network is trained, and then using low-resolution frames as input to the student network LRINet to perform knowledge distillation on frame-level features and classification features, respectively. Experiments were conducted on two large-scale continuous sign language datasets and the results demonstrated the effectiveness of CRKD, achieving highly competitive results in comparison with other state-of-the-art methods.
The main contributions of this paper are as follows:
∙ In this paper, we find that using cross-resolution knowledge distillation to keep the output frame-level feature scales consistent between the student network and the teacher network for different resolution inputs is better than recovering frame-level feature sizes for feature distillation for feature extraction.
∙ This paper proposes a new frame-level feature extraction network for low-resolution input video data, which can be combined with the cross-resolution knowledge distillation method to ensure the accuracy of the model while reducing the model computation and the number of parameters.
∙ This paper proposes a new end-to-end CSLR network LRINet, combining it with cross-resolution knowledge distillation and traditional knowledge distillation methods, and introducing random gradient stopping and multi-stage CTC loss for training, which can able to significantly reduce the computational and parametric quantities of the CSLR model, and ensure the model accuracy.
∙ The overall CSLR model CRKD proposed in this paper was experimented on two publicly available continuous sign language datasets, and both achieved highly competitive results compared with state-of-the-art methods.
§ RELATED WORK
§.§ Continuous Sign Language Recognition
Video-based CSLR has received a lot of attention from researchers due to its advantages such as non-contact and low cost, with the aim of translating continuous sign language videos into written phrases or spoken words that can be understood by normal people. In CSLR, traditional methods are usually performed by extracting manual features and then combining them with HMM<cit.> or dynamic time warping (DTW)<cit.> methods. With the development of deep learning, CNN<cit.> has replaced the extraction of manual features, and RNN<cit.> or Transform<cit.> has replaced HMM and DTW. In the process, researchers have proposed a large number of excellent deep learning models for CSLR<cit.><cit.><cit.><cit.>. These models focus more on the improvement of model accuracy and better mining of feature information, but the ultimate goal of the field is the need to apply the models in practice, that is, the lightweight of the models.
In recent years, several researchers have also focused on improving the real-time performance of recognition models. Cheng et al.<cit.> proposed a fully convolutional network without pre-training and introduced a jointly trained GFE module to enhance the representativeness of features. Min et al.<cit.> proposed visual alignment constraints to predict more alignment supervision by enforcing a feature extractor that makes CSLR networks end-to-end trainable for addressing the overfitting problem of CTC<cit.> in sign language recognition. Hu et al.<cit.> proposed a key frame extraction algorithm for continuous sign language video that adaptively computes the difference threshold and extracts the key frame from the sign language video using image difference and image blur detection techniques. We<cit.> proposed a new temporal super-resolution network to reduce the computational effort of the overall CSLR model and improve the real-time performance, and pointed out in the study that the computational effort of the CSLR model is mainly concentrated on the frame-level feature extraction in the early stage. Han et al.<cit.> used "2+1D-CNN" for feature extraction and proposed a lightweight temporal channel attention module. We<cit.> proposed a zero-parameter, zero-computation temporal superposition crossover module and combined it with 2D convolution to form a hybrid convolution that outperformed other spatial-temporal convolutions in terms of number of parameters, computation and inference time.
In order to improve the real-time performance of the model, this paper takes the low-resolution RGB image as the input, uses the lightweight model to extract the frame-level features, and finally uses the hybrid convolution of "TSCM+2D convolution" to establish the space-time relationship.
§.§ Knowledge distillation
Knowledge distillation is a classical approach for model compression, a concept first introduced by Hinton et al.<cit.>, where knowledge transfer is achieved by introducing soft targets related to the teacher's network as part of the final loss in order to induce training of the student's network. After years of development, many branches of knowledge distillation have emerged, which are no longer limited to distillation using the final classification features, including response-based knowledge distillation, feature-based knowledge distillation, and relation-based knowledge distillation. In our approach, we use features with high resolution as input to distill features that use low resolution as input, which falls under feature-based knowledge distillation. Many studies in recent years belong to this type of knowledge distillation method. A 3D-CNN network using knowledge distillation was proposed by Stroud et al. in <cit.>, which does not require optical flow branching during inference, but outperforms the dual flow method. The <cit.> is also superior to the dual-stream approach, which is a dual-stream network combined with a new spatiotemporal multi-headed self-attentive mechanism and also uses a super-resolution mechanism to enhance degraded visual information in low-resolution videos, resulting in the construction of an effective framework for extreme low-resolution video action recognition. Ma et al.<cit.> took an alternative approach by using cross-resolution knowledge distillation with high-resolution recognition teacher network together with the student network to guide them on the low-resolution framework. In this study, we compress the frame-level feature extractor and the temporal feature extractor of the model based on cross-resolution knowledge distillation and traditional knowledge distillation methods respectively to obtain a lightweight end-to-end model.
§ METHODOLOGY
The overall architecture of CRKD proposed in this paper is shown in Figure 2. The model is mainly composed of two parts: a high-resolution teacher network and a low-resolution student network. In the model training stage, the high-resolution frame is used as the input of the teacher network to train the teacher network, and the weight value is locked after the network is trained. Then, the low-resolution frame is used as the input of the student network, and the knowledge distillation is carried out on the frame-level features and classification features respectively, and finally the student network is trained with multi-level CTC loss. In the testing phase, only low-resolution frames are input into the student network for testing.
In the model CRKD, we use the MSTNet<cit.> proposed in our previous research as the teacher network, and replace the frame-level feature extraction backbone of the network with resnet-50<cit.> from resnet-34. This paper uses the proposed low-resolution input network LRINet as the student network, and the details of the proposed network will be described in detail in A.
§.§ Low-resolution input network
The low-resolution input network LRINet consists of two main components: a frame-level feature extractor and a temporal feature extractor, as shown in Figure 3. The frame-level feature extractor is a 2D-CNN frame-level feature network proposed in this paper for low-resolution inputs. The front part of the network layer reduces the number of parameters and computation by splitting the convolutional kernels, and the back part of the network layer uses a bottleneck structure to keep the number of channels consistent with the teacher network. In this case, the size of the feature map is varied in the first layer of the bottleneck structure by parameter settings of the convolution kernel and padding. The temporal feature extractor uses the "TSCM+2D convolution" hybrid convolution proposed in our previous study [13] to extract temporal features through the residual bottleneck structure.
For an input of a continuous sign language video V=(x_1,x_2,...,x_T)={x_t|_1^T∈ℝ^T× c× h× w}. containing frame T, where x_t is the t-th image in the video, h× w is the size of x_t and c is the number of channels. Let F_s be the frame-level feature extractor and obtain the feature expression as follows:
f_spatial = F_s(V)∈ℝ^T× c^'× h^'× w^'
Where f_spatial is the extracted frame-level feature, c^' is the size of the number of channels after frame-level feature extraction, and h^'× w^' is the size of the frame-level feature map.
The frame-level feature f_spatial is then fed into the temporal feature extractor F_t:
f_temppral = F_t(f_spatial)∈ℝ^T^'× c^'× h^'× w^'
Where f_temppral is the extracted temporal feature, T^' is the down-sampled temporal length of the temporal feature in the time dimension, c^' is the size of the number of channels after the temporal feature extraction, and h^'× w^' is the size of the temporal feature map. The number of channels and the size of the feature map after the temporal feature extraction are consistent with the previous frame-level features.
The final temporal feature f_temppral is classified after a global average pooling layer and a fully connected layer:
f_calssification = F_linear(F_avg(f_temppral))∈ℝ^T^'× l
Where f_calssification is the final classification result and l is the number of categories.
§.§ Hybrid loss function
MSE loss. The mean squared error loss function is a loss function often used in regression problems. In cross-resolution knowledge distillation, we use the mean-squared error loss function for feature distillation to minimize the mean-squared error value between the frame-level features obtained from the teacher model and the student model respectively for the purpose of knowledge transfer, where n is the number of data, y_i is the true value of the i-th data and y_i^' is the predicted value of the model output, so minimizing this function is the goal of optimization.
MSE(y,y^') = ∑_i=1^n(y-y^')^2/n
KLDiv loss.<cit.> KL divergence allows comparison of the closeness of two probability distributions and is often used in knowledge distillation. In this paper, we use the model with high resolution inputs as the teacher model and the model with small resolution inputs as the student model, and distill the model by KLDiv loss.
KLDiv(p,q) = -∑_i=1^lp(x_i)logq(x_i)/p(x_i)
Where l is the number of data, x_i is the i-th data, p(x_i) is the classification probability output by the student model and q(x_i) is the classification probability output by the teacher model.
Multi-level CTC loss.<cit.> CTC introduces a blank label - to mark unclassified labels during decoding. For the T frames of the input video V, the label for each frame is represented by π=(π_1,π_2,...,π_T), where π_t∈ v∪{-}, v are sign language vocabulary, the posterior probability of the label is:
p(π|V)=∏_t=1^Tp(π_t|V)=∏_t=1^TY_t,π_t
For a given sentence-level label s=(s_1,s_2,...,s_L), where L is the number of words in the sentence. Then the conditional probability of label s is the sum of the probabilities of occurrence of all corresponding paths.
p(s|V)=∑_π∈ B^-1(s)p(π|V)
Where B^-1(s)={π|B(π)=s} is the inverse mapping of B and B is a many-to-one mapping defined by CTC. The CTC loss is defined as the negative log likelihood of the conditional probability of the label s:
L_CTC=-ln p(s|V)
The multi-level CTC loss can then be expressed as follows, where m is the number of CTCs.
L_sum =-ln∏_i=1^m p(s|V_i)
=-ln (p(s|V_1)p(s|V_2)...p(s|V_m-1)p(s|V_m))
Hybrid loss. In this paper, we use a mixture of losses for training, with different losses having their different functions. MSE loss minimizes the error between the frame-level features of the teacher model and the frame-level features of the student model when frame level features are distilled. KLDiv loss uses soft labels to train the student model, transferring knowledge from the larger model to the smaller model. Multi-level CTC loss is used to train the model using real labels. The different levels of CTC loss not only allow for better decoding of temporal features, but also allow for a good update of the parameters of the shallow network. Hybrid loss combine their advantages.
L_Mix= ∑_i=1^mL_CTC_i+α L_MSE+β L_KLDiv
Where α, β are two hyperparameters, and the weight of MES loss and KLDiv loss in the hybrid loss is changed by changing the values of these two hyperparameters.
§.§ Model parameters
The low resolution input network is proposed to accommodate video with low-resolution frames as input. It keeps the frame-level feature output size consistent with the teacher model with high resolution as input, which is convenient for feature distillation. We take the video with a length of 200 frames and a resolution of 3× 72× 72 as the input. The overall architecture of the low-resolution input network is shown in Table 1, where is the number of channels in the frame-level feature output of the teacher network. This low-resolution input network consists of two main components: a frame-level feature extractor and a temporal feature extractor.
In the frame-level feature extractor, the front part of the network layer uses split convolutional kernels to reduce the number of parameters and computation, and the back part of the network layer uses a bottleneck structure to match the number of frame-level feature channels in the output of the teacher model. In the first bottleneck structure, the 2D convolution is used to match the output feature size of the teacher model by varying the size of the convolution kernel and the padding parameter according to the input resolution. The input resolution is based on 56× 56, the convolution kernel is based on 1× 1, the padding is always 0, and the resolution and convolution kernel size are increased sequentially in steps of 16 and 2 respectively. For example, when the input resolution is 56× 56, the first 2D convolution kernel size is 1 and padding is 0. When the input resolution is 72× 72, the first 2D convolution kernel size is 3 and padding is 0, and so on. The relationship between the convolution kernel parameter setting and the resolution is shown in equation (11), where k is the convolution kernel size, r is the input resolution, and the value 8 indicates that three spatial down-sampling in steps of 2 have been performed, and the relationship between the four resolutions and the convolution kernel is shown in Table 2.
k= r/8-6,r∈ [56,72,88,104...]
In the temporal feature extractor, we use the TSCM+2D hybrid convolution as the base unit, and the residual bottleneck structure as the base block, with the number of channels aligned with the number of channels in the final output of the frame-level features, using a total of 3 layers of residual bottleneck structure. In this case, we perform two maximum pooling operations, only pooling in the time dimension, and use batch normalization and ReLu activation functions after each convolution operation throughout the network.
§ EXPERIMENT
In this section, we conduct comprehensive experiments on two widely used CSLR datasets to validate the effectiveness of the proposed model in this paper. A series of ablation experiments are also conducted to demonstrate the role of each component of the proposed model.
§.§ Dataset
RWTH-PHOENIX-Weather-2014 (RWTH) dataset<cit.>: RWTH is recorded by a public weather radio and television station in Germany. All the presenters are dressed in dark clothing and perform sign language in front of a clean background. The video in this dataset is recorded by 9 different presenters, with a total of 6841 different sign language sentences (including 77321 sign language word instances and 1232 words). All videos are pre-processed to a resolution of 210× 260 and a frame rate of 25 frames per second (FP/S). The dataset is officially divided into 5672 training samples, 540 validation samples and 629 test samples.
Chinese Sign Language (CSL) dataset<cit.>: CSL contains 100 sentences of Chinese everyday language, each sentence is demonstrated 5 times by 50 presenters, and the vocabulary size is 178. The video resolution is 1280× 720 and the frame rate 30 FP/S. The dataset includes two ways to divide the training and test sets: split I and split II. This paper is an experimental study on split I.
§.§ Implementation Rules
In the implementation of the overall model experiment in this paper, the training uses the Adam optimizer<cit.>, the initial learning rate and weight factor are set to 10^-4, and the batch size used is 2. We use MSTNet as the teacher network and ResNet-50 for the frame-level feature extraction backbone. The graphics card used in this experiment is RTX3090Ti, and the size of GPU dedicated memory is 24G.
When training on the RWTH dataset, data augmentation is performed using random cropping and random flipping. For random cropping, the input data size is 256× 256, and the size after random cropping is 224× 224. For random flipping, the flipping probability is set to 0.5. The flipping and cropping processes are performed for the video sequences. In addition, a temporal enhancement process is performed to randomly increase or decrease the length of the video sequence within ± 20%. After data augmentation, the input data is uniformly scaled to a specified low resolution. The model is trained using 4-level CTC loss. In the hybrid loss, the values of α and β are 140 and 120 respectively. In the model test, only the center clipping is used for data augmentation, and the beam search algorithm is used for decoding in the final CTC decoding stage, with the beam width is 10. In the model test, only the center clipping is used for data augmentation. In the final CTC decoding stage, the beam search algorithm is used for decoding, and the beam width is 10. There are 85 epochs in the training stage, and the learning rate decreases by 80% at the 45th and 65th epochs.
When training on the CSL dataset, only random cropping is used for data augmentation and the model is trained using 2-level CTC loss. For testing, only central cropping is used for data augmentation. There are 30 epochs in the training phase, and the learning rate decreases by 90% in the 20th epoch, and the values of α and β in the hybrid loss are 280 and 140 respectively.
§.§ Judgment Criteria
WER<cit.> is widely used as a criterion in CSLR. It is the sum of the minimum number of insertion, substitution, and deletion operations required to convert a recognized sequence into a standard reference sequence. Lower WER means better recognition performance, and its definition is as follows:
WER=100%×ins+del+sub/sum
Where ins represents the number of words to be inserted, del represents the number of words to be deleted, sub represents the number of words to be replaced, and sum represents the total number of words in the label.
§.§ Experimental Results
The proposed model CRKD is experimented on two publicly available datasets, the RWTH dataset and the CSL dataset. The model recognition accuracy is shown in Table 3 and Table 4, and the curves generated from the WER in Table 3 and Table 4 are shown in Figure 4 and Figure 5.
As can be seen in Table 3, CRKD achieves highly competitive results on the RWTH dataset compared to other state-of-the-art models, with WERs of 21.4% and 20.9% on the validation and test sets, respectively. It can be seen from Table 2 that CRKD also achieves competitive results on the CSL dataset, with a WER of 2.6% on the test set. As can be seen in Figure 4 and Figure 5, WER decreases with the increase of epoch, and WER decreases significantly when the first lr changes. As can be seen in Figure 4 and Figure 5, WER decreases with the increase of epoch, and WER decreases significantly when the first lr changes. On the RWTH dataset, WER reaches the minimum value of 21.4% at the 68th epoch for the validation set, and 20.9% at the 71st epoch for the test set; On the CSL dataset, WER reaches the minimum value of 2.6% at the 27th epoch of the test set.
§.§ Real-time performance of the model
In order to further analyze the real-time performance of the proposed model CRKD in this paper, we experimentally compare the model in this paper with five other models in terms of number of parameters, computation, inference time and accuracy under the same experimental setup to demonstrate the superiority of CRKD in terms of real-time performance.
The computational effort of each model is strongly correlated with the size and quantity of the input data. In our model CRKD, the input resolution of LRINet is set to 3× 72× 72 and the video frame temporal length is 200 frames; the input data size of other models is 3× 224× 224 and the video frame temporal length is also 200 frames, and the number of parameters and computation of different models are calculated under the above conditions for experimental comparison. For each model, we perform experimental validation on the RWTH dataset and count the mean inference time as a reference, with WER as the accuracy indicator, where a smaller WER means higher accuracy. The inference time statistics are not only related to the model itself but also closely related to the device used. The graphics card used for the experiments in this paper is RTX3090Ti, and the experimental results are shown in Table 5, while the data in Table 5 are visualized in Figures 6 and 7.
It can be seen from Table 5 that: 1) CRKD is the smallest compared to other models in terms of the number of parameters and computation, but the inference time is longer than VAC, because there is a shift operation in the "TSCM+2D" hybrid convolution used, which increases the inference time of the model; 2) the inference time of CRKD is very similar to that of CNN+ BiLSTM+CTC, but the number of parameters in CRKD is 29.9% lower than that in CNN+BiLSTM+CTC, and the WER is reduced by 5.8%; 3) CRKD is only 0.2% lower in WER than ResNetT34, but the number of parameters is reduced by 52.2%, the computation is reduced by 61.7%, and the inference time is reduced by 42.7%.
It can be seen from Figure 6 that the CRKD proposed in this paper, relative to other models, is optimal in terms of model accuracy, number of parameters and computational effort. It can also be seen from Figure 7 that although the inference time of CRKD is not the smallest, it only differs from the smallest VAC model by 3.2ms. Therefore, the proposed CRKD achieves a balance of performance and accuracy with a smaller number of parameters, which can make the deployment cost of the model lower, reduce the inference time and ensure the real-time performance of the model.
§.§ Ablation Experiment
In this section, we conducted ablation experiments on the RWTH dataset to further validate the effectiveness of each component of the model CRKD. In the ablation experiment, the input resolution is set to 3× 72× 72, and WER is used as the metric. The smaller WER is, the better the performance.
Ablation of different temporal feature extractors. We use two different temporal feature extractors combined with the same frame-level feature extractor to form different models and compare their accuracy. The ablation effects of different temporal feature extractors are shown in Table 6. The two temporal feature extractors are the MSTNet temporal feature extraction part and the temporal feature extraction part composed of "TSCM+2D convolution" hybrid convolution. As can be seen from Table 6, in terms of the model accuracy of the test set, the second temporal feature extractor is 0.6% higher than the first temporal feature extractor. That is, under the current parameter setting conditions, the temporal and spatial modeling ability of the temporal feature extractor composed of hybrid convolution is better than that of the temporal feature extraction part of MSTNet.
Ablation of different loss functions. The ablation effect when using different loss functions is shown in Table 7. Different loss functions have different functions. Multi-level CTC loss is to use real labels to train the model. Different levels of CTC loss can not only better decode the temporal features, but also make the parameters of the shallow network well updated. When MSE loss distills the frame-level features, the error between the frame-level features of the teacher model and the frame-level features of the student model is minimized. KLDiv loss uses soft labels to train the student model and transfer the knowledge of the large model to the small model. It can be seen from Table 7 that the model recognition accuracy is the worst when CTC loss is used only, at which point the WERs for the validation and test sets are 25.2% and 25.1% respectively. With the increase of the loss function, the WER of the network decreases. Finally, when using the hybrid loss function, the WER of the model is 3.8% lower than that of the original CTC loss in the validation set and 4.2% lower than that of the test set.
Ablation of different input resolutions. The ablation effect when the input data are different input resolutions is shown in Table 8. The ablation experiment includes four levels: parameter quantity, calculation quantity, inference time and accuracy. It is calculated using different resolutions as the input of LRINet with a video frame length of 200 frames. In the ablation experiment, it is found that with the increase of resolution, the parameters of the model changed little, while the calculation and inference time increased linearly. At a resolution of 72× 72, the model accuracy reaches a minimum of 21.4% and 20.9% for the validation and test set respectively, while the number of parameters and inference time of the model are 10.5M and 46.9ms respectively. The amount of model parameters at this resolution is basically the same as that at resolution 56× 56. Although the inference time is 14.1ms longer than that at resolution 56× 56, WER is 1.1% lower.
§ CONCLUSION
In the research on the real-time performance of the CSLR, this paper found that using the cross-resolution knowledge distillation method to keep the frame-level feature scale of the output of the student network and the teacher network consistent under the condition of different resolution input is better than recovering the frame-level feature size for feature distillation. In view of the above findings, this paper proposes a new frame-level feature extraction network suitable for low-resolution input, and further combines it with "TSCM+2D convolution" hybrid convolution to propose a new end-to-end CSLR network LRINet. We use LRINet combine cross-resolution knowledge distillation and traditional knowledge distillation to form a CSLR model CRKD. The experiments show that CRKD has advantages over other models in terms of parameters, computation and inference time while ensuring accuracy, and achieves the balance between performance and accuracy. The reduction of parameter quantity and calculation quantity reduces the deployment cost of the model, and the reduction of inference time ensures the real-time of the model.
Our model CRKD is proposed for low-resolution input, which can greatly reduce the number of parameters and computational effort, but does not take into account the redundancy between video frames. Using sparse video data as input can significantly reduce the amount of computation and improve the inference time. Therefore, it is worth studying to use fewer video frames to obtain the same or better sign language recognition effect as the current available.
§ ACKNOWLEDGMENT
This work was supported in part by the Development Project of Ship Situational Intelligent Awareness System, China under Grant MC-201920-X01, in part by the National Natural Science Foundation of China under Grant 61673129.
Data availability The datasets used in the paper are cited properly.
§ DECLARATIONS
Conflict of interest The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
IEEEtran
|
http://arxiv.org/abs/2303.07374v1
|
20230313180011
|
Higher-Order Methods for Hamiltonian Engineering Pulse Sequence Design
|
[
"Matthew Tyler",
"Hengyun Zhou",
"Leigh S. Martin",
"Nathaniel Leitao",
"Mikhail D. Lukin"
] |
quant-ph
|
[
"quant-ph",
"cond-mat.dis-nn"
] |
Department of Physics, Harvard University, Cambridge, Massachusetts 02138, USA
These authors contributed equally to this work
These authors contributed equally to this work
[email protected]
We introduce a framework for designing Hamiltonian engineering pulse sequences that systematically accounts for the effects of higher-order contributions to the Floquet-Magnus expansion.
Our techniques result in simple, intuitive decoupling rules, despite the higher-order contributions naively involving complicated, non-local-in-time commutators.
We illustrate how these rules can be used to efficiently design improved Hamiltonian engineering pulse sequences for a wide variety of tasks, such as dynamical decoupling, quantum sensing, and quantum simulation.
Higher-Order Methods for Hamiltonian Engineering Pulse Sequence Design
Mikhail D. Lukin^1
March 30, 2023
======================================================================
§ INTRODUCTION AND MOTIVATION
The effective control of many-body quantum dynamics is an important challenge in the emerging field of quantum science and technology, with wide-ranging applications in quantum computation <cit.>, quantum sensing <cit.>, and quantum simulation <cit.>.
One of the key tools for controlling such many-body quantum dynamics is Hamiltonian engineering <cit.>, in which a train of pulses transform the original system Hamiltonian into a desired target Hamiltonian for various applications.
Indeed, from the inception of such techniques in early NMR work to the present day, Hamiltonian engineering has enabled high resolution spectroscopy <cit.>, high sensitivity metrology <cit.>, as well as the realization of exotic Floquet phases of matter <cit.>.
One of the key tools for performing Hamiltonian engineering is average Hamiltonian theory <cit.>.
Here, the engineered Hamiltonian is approximated by the time-average of interaction-picture Hamiltonians with respect to the control pulses.
This allows the effective engineering of many-body Hamiltonians, even in the case where only global manipulation of spins is accessible, as is the case in many large-scale quantum systems <cit.>.
Moreover, design rules that systematically take into account robustness against various imperfections can be derived <cit.>, enabling robust pulse sequence design as well.
Despite the success of techniques based on average Hamiltonian theory, large variations in performance still exist among the different sequences obtained, suggesting that higher-order contributions in the full Magnus expansion may play an important role.
Existing works treating higher-order contributions often rely purely on symmetrization, or treat the higher-order terms on a case-by-case basis <cit.>.
However, finding general conditions for the cancellation of higher-order Magnus terms can be non-trivial, as the expressions involve commutators that are non-local in time.
In this paper, we systematically analyze higher-order Magnus contributions to effective Hamiltonians, providing a general toolset for pulse sequence design in interacting spin systems in the form of concise decoupling rules.
Despite the non-local nature of the commutators involved in higher-order contributions, we are still able to generalize many results from average Hamiltonian theory. First, we find that the frame representation employed in Ref. <cit.> still provides a convenient way to describe the pulse sequence and contributions, resulting in analytical decoupling rules for higher-order terms.
As an example, in Fig. <ref>(c) we illustrate how first-order Magnus terms involving disorder and Heisenberg interactions have a simple geometric interpretation in analogy with dipoles, and in Fig. <ref>(d) we illustrate how first-order Magnus terms involving Ising and Heisenberg interactions have a similar interpretation as balancing the center of mass along a given axis.
Second, we find that although there exist additional cross-terms, the majority of finite pulse duration effects can still be described as a simple extension of the effective free evolution time <cit.>, making it easy to build in robustness to sequence design.
Finally, we extend the principle of pulse cycle decoupling <cit.> to more general pulse sequences and Hamiltonians, beyond those where the zeroth-order average Hamiltonian vanishes.
We use this to show how decoupling rules can be significantly simplified for pulse sequences that are composed of common motifs, such as spin echoes <cit.> or WAHUHA blocks <cit.> (Fig. <ref>(a,b)), resulting in time-local decoupling conditions even for higher-order Magnus contributions.
Together, these techniques allow us to find higher-order robust pulse sequences with substantially improved performance for a variety of dynamical decoupling, Hamiltonian engineering and quantum sensing applications, as discussed here and in the accompanying paper, Ref. <cit.>.
This paper is organized as follows: in Sec. <ref>, we review our representation of the pulse sequence and associated interaction picture Hamiltonian, as well as existing decoupling rules for the zeroth order effective Hamiltonian.
In Sec. <ref>, we utilize this representation to provide general expressions for the higher-order Magnus contributions and present systematic decoupling conditions for higher-order terms.
We then analyze the structures present in these decoupling rules in Sec. <ref>, finding significant simplifications for commonly-found pulse sequence structures in both the disorder-dominant and interaction-dominant regimes.
We also tabulate the resulting decoupling rules, and provide a pictorial depiction of them.
In Sec. <ref>, we provide further details on the efficient numerical screening of pulse sequences, resulting in high-performance pulse sequences for dynamical decoupling, quantum sensing, and quantum simulation. Finally, in Sec. <ref> we conclude with a discussion of further extensions and future directions of the formalism.
A summary of the notation adopted in this manuscript can be found in Appendix. <ref>.
§ GENERAL FRAMEWORK AND REVIEW OF EXISTING RESULTS
§.§ General Framework and Frame Representation
We begin by introducing our method to represent the pulse sequence and associated average Hamiltonian, which will greatly simplify the analysis of effective Hamiltonians and finite pulse effects compared to the conventional representation of individual pulses. We will adopt the toggling-frame sequence representation (also known as the Mansfield representation) used in Choi et al. <cit.>, which focuses on how operators are transformed under the pulses, rather than the applied pulses themselves. In addition to being a complete and concise representation of the pulse sequence, this representation also has the additional advantage that it leads to simple decoupling conditions that are amenable to fast numerical screening.
Consider a pulse sequence composed of n global spin-rotation pulses {P_1, ⋯, P_n} acting on a system with native Hamiltonian H, with a free evolution time τ_k preceding the kth pulse P_k. The interaction picture Hamiltonian with respect to the ideal control pulses can then be written as
H̃(t)=U_c^†(t)^⊗ m H U_c(t)^⊗ m,
where H̃(t) is the interaction picture Hamiltonian at time t, U_c(t) is the single spin rotation due to the control field (e.g. U_c(t)=P_kP_k-1⋯ P_1 right after the kth pulse), and m is the number of spins in the system.
Assuming ideal, infinitely fast rotation pulses, and that the combined rotation unitary is identity P_n⋯ P_1=I, we can write the total unitary evolution as
U(T)=𝒯exp(-∫_0^T iH̃(t)dt)≈exp(-iH^(0)T),
where 𝒯 indicates time-ordering and T is the Floquet period. For pulse separations much shorter than the dynamical timescale of the system, we can conveniently write the effective Hamiltonian to leading order as
H^(0)=1/T∫_0^T H̃(t_1)dt_1.
For general system Hamiltonians satisfying the secular approximation (rotating wave approximation under a strong quantizing field) <cit.>, the interaction picture Hamiltonian H̃_s(t) can be uniquely determined by transformations of the S^z operator (we will refer to these as toggling “frames")
S̃^z(t)=U_c^†(t)S^zU_c(t)=∑_μ F_μ(t)S^μ,
where S^μ is a basis for the spin system, e.g. the Pauli spin operators for qubits, and we have defined the coefficients
F_μ(t)=2Tr[S^μS̃^z(t)].
Assuming ideal, instantaneous pulses (the case of finite pulse effects and other associated imperfections are discussed in Sec. <ref>), we can express the preceding information in the form of a single 4× N matrix, where each element F_μ,k corresponds to the coefficient F_μ(t) during the kth free evolution time, and the last row contains the free evolution time duration.
As a concrete example, let us consider a spin-1/2 system, where each pulse P_k is assumed to be a π/2 pulse around ±x̂,ŷ.
Note that π pulses can be viewed as two consecutive π/2 pulses, with zero time separation in between.
With S^μ chosen to be the Pauli basis, a spin echo can be represented as
[ F; τ ]_echo
=[ 0 0; 0 0; +1 -1; τ τ; ],
while the WAHUHA decoupling sequence for dipolar interactions <cit.> can be expressed as
[ F; τ ]_WAHUHA
=[ 0 0 +1 +1 0 0; 0 +1 0 0 +1 0; +1 0 0 0 0 +1; τ τ τ τ τ τ; ].
Pictorially, we can represent the first three rows of the matrix by the blocks in Fig. <ref>(a,b), in which a yellow(green) block indicates a +1(-1) value along the given axis (row) at a given time (column).
We illustrate more advanced versions of spin echoes and WAHUHA blocks in Fig. <ref>(a,b), in both pulse notation and the frame matrix notation utilized here.
In the preceding examples, we have neglected finite pulse duration effects, but they can be easily treated by specifying an additional intermediate toggling frame with zero time duration.
This representation allows us to easily express the interaction picture Hamiltonian H̃(t). For example, for a spin-1/2 dipolar-interacting many-body spin system with on-site disorder, the system Hamiltonian can be written as
H_dip =∑_i h_iS_i^z+∑_ijJ_ij(S_i^xS_j^x+S_i^yS_j^y-2S_i^zS_j^z)
=∑_i h_iS_i^z+∑_ijJ_ij(S⃗_i·S⃗_j-3S_i^zS_j^z),
where h_i is the on-site disorder strength for spin i, and J_ij is the dipolar interaction between spins i and j.
With our representation, for sequences composed of π/2 or π pulses around ±x̂,ŷ, the interaction picture Hamiltonian during the kth free evolution time can be easily expressed as
H̃_dip,k =∑_iμ F_μ,k h_i S_i^μ+∑_ijJ_ijS⃗_i·S⃗_j-3∑_ijμF_μ,k^2 J_ijS_i^μ S_j^μ,
where we have organized the terms according to how they transform with F_μ,k. Using these expressions, it is easy to verify that the spin echo cancels disorder, since ∑_k F_μ,kτ_k=0, while the WAHUHA pulse sequence fully symmetrizes (decouples) dipolar interactions, since ∑_k F_μ,k^2τ_k is the same for all μ.
Motivated by these considerations, for any secular Hamiltonian, we will organize the interaction picture Hamiltonian in terms of how the operators transform as the toggling frame changes.
Let us write
H̃(t)=∑_α c_α(t)𝒪^α,
where c_α(t) are time-dependent coefficients encoding the frame transformations of a general operator basis set 𝒪^α (we will use greek letters to denote labels of operator sets in the remainder of the paper). For the example above in Eq. (<ref>), we can write out the individual terms in the summation as
𝒪^0 =∑_ijJ_ijS⃗_i·S⃗_j, c_0(t) =1,
𝒪^1,μ =∑_i h_i S_i^μ, c_1,μ(t) =F_μ,k,
𝒪^2,μ =3∑_ij J_ijS_i^μ S_j^μ, c_2,μ(t) =F_μ,k^2,
which clearly illustrates how the various terms in the Hamiltonian transform differently with the toggling frames.
§.§ Magnus Expansion
With this general representation framework in hand, we will now briefly review the Magnus expansion, which provides a useful tool to calculate the effective dynamics of the periodically-driven system, and extend the analysis beyond the average Hamiltonian described in Eq. (<ref>).
The total unitary over a single Floquet cycle can be expressed in terms of a time-independent effective Hamiltonian 𝒰(T)=exp(-iH_effT), where in the fast-driving limit, the effective Hamiltonian can be written via the Magnus expansion up to order l as H_eff≈∑_k=0^lH^(k), with
H^(0) =1/T∫_0^TH(t_1)dt_1,
H^(1) =-i/2T∫_0^Tdt_1∫_0^t_1dt_2[H(t_1),H(t_2)],
H^(2) =1/6T∫_0^Tdt_1∫_0^t_1dt_2∫_0^t_2dt_3
([H(t_1),[H(t_2),H(t_3)]]+[H(t_3),[H(t_2),H(t_1)]]).
Higher-order terms are more complex, involving progressively deeper nested commutators, but in the fast-driving limit they will be relatively suppressed, and we can focus on the leading order terms above.
Plugging in Eq. (<ref>) and separating the time-independent operator commutation relation information from the time integrals, we have
H^(0) =∑_α1/T^α∫_0^T dt_1c_α (t_1),
H^(1)
=∑_α,β-i/2T[^α ,^β ]∫_0^Tdt_1∫_0^t_1dt_2c_α (t_1)c_β (t_2),
H^(2) =∑_α,β,γ1/6T[^α,[^β,^γ]]∭_0≤ t_3≤ t_2≤ t_1≤ Tdt_1dt_2dt_3
(c_α(t_1)c_β(t_2)c_γ(t_3)+c_α(t_3)c_β(t_2)c_γ(t_1)).
This allows us to reduce the computation of the Magnus expansion to the evaluation of a few integrals on the c(t) coefficients, which can in turn be readily phrased as algebraic conditions on the set of frame transformations.
§.§ Review of Zeroth Order Rules
Using the preceding framework, we can readily write down conditions for the cancellation or symmetrization of various zeroth order average Hamiltonian terms, see also Ref. <cit.> for details.
For example, plugging Eqs. (<ref>-<ref>) into Eq. (<ref>), and assuming ideal, instantaneous pulses, we can easily see that on-site disorder is cancelled when ∑_k F_μ,kτ_k=0 for each axis μ=x̂,ŷ,ẑ, while interactions are symmetrized into a Heisenberg Hamiltonian or cancelled when ∑_k F_μ,k^2τ_k is equal for all different μ.
More importantly, as shown in Ref. <cit.>, these conditions can be readily generalized to the case with pulse imperfections.
The primary effect of finite pulse durations is to extend the effective free evolution times in each frame, as most of the terms generated by π/2 rotations can be written as an average of the Hamiltonian before and after the pulse.
However, there will be additional terms arising from rotation angle errors or interaction cross-terms during rotations, which give rise to additional chirality or parity conditions between neighboring frames <cit.>.
The simple, time-local nature (all rules only involve neighboring frames) of these decoupling conditions enabled efficient design and screening of pulse sequences.
Indeed, using these simple decoupling conditions, novel pulse sequences with improved decoupling performance have been found, leading to the demonstration of the first solid-state AC magnetometer that operates beyond the limits of spin-spin interactions <cit.>.
However, the further extension of such techniques to incorporate higher-order Magnus contributions and improve performance is at first sight challenging, given the time-non-local nature of higher-order Magnus terms, which involve commutators between all times of a Floquet cycle.
In the following, we demonstrate how this challenge can be systematically overcome by utilizing the structure of commonly-used pulse sequences.
§ SYSTEMATIC ANALYSIS OF HIGHER-ORDER MAGNUS TERMS
With the basic formalism in hand, we now turn to the systematic extension of these decoupling rules from zeroth-order to higher-order.
First, we will describe the pulse cycle decoupling principle <cit.> and extend it to the case of more general interactions, which serves as a useful tool to decompose non-local higher-order terms into local blocks.
We will then systematically derive expressions for first- and second-order Magnus contributions in the general case, assuming ideal pulses.
Finally, we briefly describe how the treatment can be readily generalized to the case with finite pulse durations, primarily by extending the effective duration of free evolution times, with more details given in Appendix. <ref>.
§.§ Pulse Cycle Decoupling
In order to simplify sequence analysis, it is helpful to be able to break down larger pulse sequences into smaller blocks and analyze them independently.
In this section, we show how common motifs used in sequence design—in the form of spin echoes or interaction symmetrization—allow us to decompose higher-order contributions into a sum of independent, local pieces, no longer requiring non-local correlators between arbitrary locations and thus significantly simplifying the design.
Our results are applicable even to some cases where the symmetrization results in a residual Heisenberg interaction Hamiltonian, thus extending the existing methods <cit.> of pulse cycle decoupling to new and experimentally important regimes.
Let us proceed by examining the first-order contribution when sequentially applying two sequences A and B of equal length T.
We can split the first-order Magnus contribution in Eq. (<ref>) into integrals within the first and second sequence respectively, and cross terms between the two sequences, resulting in
H^(1)=1/2H^(1)_A+(-i/4T)[TH^(0)_B,TH^(0)_A]+1/2H^(1)_B,
where H^(0,1)_A,B are the zeroth (first) order effective Hamiltonians during pulse sequences A and B.
The key observation of pulse cycle decoupling is that if the commutator [H^(0)_A, H^(0)_B] vanishes, then the first-order contribution fully decouples into the sum of that in each individual block, regardless of the details.
In prior work <cit.>, this was achieved by making one of the average Hamiltonians vanish, thus causing the commutator to automatically vanish as well.
For more general Hamiltonians, however, this no longer directly applies, since the Heisenberg interaction is invariant under global rotations and cannot be cancelled with a global drive <cit.>.
Despite this challenge, we find that we can still make use of the pulse cycle decoupling principle in many scenarios beyond the case where the Hamiltonian vanishes.
First, even if the total Hamiltonian does not vanish, pulse cycle decoupling can still apply to individual terms.
For example, if a given block fully decouples disorder (the rapid echo blocks in Fig. <ref>(a)), then any first-order terms involving disorder will not have cross terms between this block and other parts of the sequence, simplifying the design.
Second, if the interaction is transformed into the same form in two separate blocks, then although H_A,B^(0) are both nonzero, they still commute, and so the pulse cycle decoupling principle still applies (see e.g. Fig. <ref>).
Thus, even if the interaction has a Heisenberg component that cannot be cancelled, the cross-term is still zero because [∑_ijJ_ijS_i· S_j, ∑_ijJ_ijS_i· S_j]=0.
This insight generalizes the pulse cycle decoupling principle to cases in which one desires to engineer a non-zero target Hamiltonian, significantly expanding its applicability.
While we have illustrated the pulse cycle decoupling principle at first order, the same methods also apply at higher-order by generalizing the arguments in Ref. <cit.>.
For example, the second-order Magnus contribution can be expressed as a sum of commutators between zeroth and first-order terms, and thus if lower orders are fully symmetrized, then the second-order Magnus contribution will also separate into independent, local blocks.
§.§ First-Order Decoupling
We now return to analyze the structure of higher-order Magnus terms directly and derive decoupling rules for various contributions.
The expressions here will be derived in full generality, without making use of the pulse cycle decoupling principle, although we will use this to further simplify the expressions in following sections.
In order to better understand the structure of the first-order Magnus contributions and derive decoupling rules, let us rewrite the preceding expressions into a form that relates them to zeroth-order Magnus contributions and makes clear how terms can be cancelled.
Denoting the zeroth order contribution up to a given time as _α(t)≡∫_0^tc_α (t_1)dt_1, we can rewrite Eq. (<ref>) as
H^(1) =-i/T∑_α>β[^α ,^β ]
×∫_0^Tc_α (t_1)_β(t_1)dt_1-1/2_α(T)_β(T).
Focusing first on the case of instantaneous, ideal pulses (the more general case will be treated in Sec. <ref>), our toggling-frame Hamiltonian becomes piecewise-constant in time, allowing us to replace integrals with summations.
We can then define the discrete frame equivalents of the terms in the previous section, letting c_α,k=c_α (t) for t∈[t_k-τ_k/2,t_k+τ_k/2] and _α,k≡∑_l<kc_α,lτ_l, and find
H^(1) =∑_β<α[^α ,^β ]
×(∑_k=1^n c_α,kτ_k(_β, k+1/2τ_k c_β,k)-1/2_α,n+1_β,n+1),
The first term in the parenthesis can be interpreted as a product between the c_α coefficient during a given frame and the integral of zeroth order average Hamiltonians up to the center of the frame.
The last term is simply the product of two zeroth-order contributions over the entire Floquet period, which will vanish when zeroth-order decoupling rules are satisfied.
Geometrically, this expression can be understood as rewriting the triangular integration area in Eq. (<ref>) into a sum over thin column slices.
We emphasize that these results apply to all first-order contributions, illustrating the common structure found in the decoupling of many different types of terms.
By keeping track of the running sum, the evaluation of this expression now requires only linear time, as opposed to the naive quadratic complexity.
In addition, although Eq. (<ref>) still contains products of coefficients that are non-local in time, in Sec. <ref> we shall see that in many cases of interest, it can be reduced into simple, local decoupling rules.
We also generalize these results to the case with finite pulse durations in Sec. <ref>.
The primary effect, similar to the zeroth-order case <cit.>, is to lengthen the effective duration of each free evolution time by an amount proportional to the pulse duration.
There will be additional cross terms that we tabulate in the appendix, but they are generally smaller.
§.§ Second-Order Decoupling
We can now apply the same formalism to the second-order Magnus contributions.
As we show in Appendix. <ref>, by reordering the integrals, we can re-express the second-order contribution in terms of the zeroth- and first-order contributions at different times. Let us define the first-order contribution from time t_1 to t_2 of the operator [^β,^γ] as
c^(1)_β, γ(t_1,t_2)
=∬
t_1<t_b<t_a<t_2(c_β(t_a)c_γ(t_b)-c_β(t_b)c_γ(t_a)),
where we have dropped the integrand dt_a dt_b for notational simplicity here and below.
We can rewrite the expression as follows
H^(2) =1/6T∑_α<β<γ ([^α,[^β,^γ]])
× ∫_0^Tdt_1c_α(t_1)(c^(1)_β,γ(0,t_1)-c^(1)_β,γ(t_1,T) ).
Thus, we see a very similar structure as at first order, wherein the second-order term can also be expressed as a simple integral of lower-order products, enabling formulation of simple decoupling rules.
§.§ Robustness Conditions
We now extend these results to the case with finite pulse durations, and describe how to incorporate robustness to these effects into the sequence design.
We will focus our attention on the dominant contribution, which we find to be a simple extension of the effective free evolution time by an amount proportional to the pulse duration.
A full treatment of the finite pulse effects, including additional sub-leading cross terms, can be found in Appendix. <ref>.
As shown in Fig. <ref>, with a finite pulse duration, the coefficient c_α(t) of each term of the Hamiltonian will consist of a ramp up (the preceding rotation), free evolution in the frame, a ramp down (the following rotation), as well as some additional cross-terms between the frames.
The primary effect of finite pulse effects is illustrated in Fig. <ref>(b), in which the effective duration of each frame is lengthened by the integral of _α, k and _α , k over time.
This is a simple extension of the calculation for the zeroth-order case, and scales as O(ττ_p), where τ is the free evolution time and τ_p is the pulse duration.
We incorporate this into the main term in the decoupling rule table, Tab. <ref>, as described in more detail in the next section.
In addition to this dominant term, there are contributions that scale as O(τ_p^2) or higher powers.
First, we have to treat the overlap of the frames, which gives rise to the additional term:
∬_0<θ_2<θ_1<π/2_α,k(θ_1)_β,k+1(θ_2)-_α,k+1(θ_2)_β,k(θ_1).
These terms correspond to the overlap of the ramp up of one frame with the ramp down of another. We note that we get a positive effect from the ramp down of one into the ramp up of the other, and a negative effect from the ramp up of one with the ramp down of the other. These are the main finite pulse effects to each of the correction terms, and are shown in column 4 of Tab. <ref>.
The final contribution originates from first-order contributions involving interaction cross-terms q_ρ.
More specifically, during the continuous rotation from an XX Hamiltonian to a YY Hamiltonian, XY-type terms are generated; the q_ρ cross-terms come from first-order cross-terms between these XY-type terms and other terms.
Note that there will be no such cross-terms for the disorder part of our Hamiltonian.
Thus, although the magnitude of this term can in principle scale as O(τ_pτ), in practice the coefficients are small for disorder-dominated systems, and we will analyze this in detail instead in Appendix <ref>.
§ HIGHER-ORDER DECOUPLING RULES
§.§ Summary of General Rules
We now utilize the results from the preceding section to derive concrete decoupling rules for various important higher-order contributions.
Plugging in different Hamiltonian terms into the expressions derived in Sec. <ref>,<ref>, we arrive at the decoupling rules in Tab. <ref>.
As higher-order terms originate from commutators between different terms, we label the cancellation rules with all operators involved.
The table includes two types of contributions: first, there are the main terms that will appear even with ideal, infinitesimally short pulses, together with corrections to their effective duration due to finite pulse durations; second, we include terms that come purely from the finite pulse duration, in the form of the overlapping pulse term derived in Eq. (<ref>).
There is one additional type of term, as mentioned in the preceding section, that involves interaction cross terms q_ρ during continuous rotations.
We omit them from this table, since they do not appear for disorder terms that are dominant in our experiments, but we discuss them in more detail in Appendix <ref>.
Note also that since the Magnus expansion is not invariant with respect to cyclic permutations of the pulse sequence, there are modifications to terms relating to the first and last frames in the complete expression.
However, we neglect them from this table, both to simplify notation, as well as due to the fact that after many Floquet cycles we expect the contributions from these boundary terms to be diminished.
While the decoupling rules are somewhat more complicated than the zeroth-order rules derived in Ref. <cit.>, many of them nonetheless have simple geometric intuitions (Fig. <ref>), and can be further simplified for many common scenarios.
Moreover, the decoupling rules can often be satisfied with simple local motifs, further simplifying the pulse sequence design task.
For example, in many cases, by using the pulse cycle decoupling principle described in Sec. <ref>, one can apply the same rules as zeroth-order sequence design, except requiring the cancellation on a much faster timescale.
These considerations are summarized in the last column of Tab. <ref>.
We will now go through a few representative examples in more detail, and explain how to interpret and simplify the rules.
§.§ Fast Echo Cancellation for Disorder-Related Terms
Let us now focus our attention on first-order rules related to disorder-disorder and disorder-Ising terms.
To derive the first and second conditions in Tab. <ref>, which hold with full generality and no restrictions on the frame matrix, let us examine the structure of the first-order Magnus contribution shown in Eq. (<ref>).
There, we found that a generic first-order Magnus contribution can be rewritten as a product between the current frame contribution of one term and the cumulative contribution of another term, together with a factor corresponding to the total zeroth order contribution of both terms.
Plugging the disorder and Ising expressions in Eqs. (<ref>-<ref>) into Eq. (<ref>) results in the rules in the third column of Tab. <ref>.
Due to this common structure, we see in Tab. <ref> that the decoupling of first-order disorder-disorder and disorder-Ising contributions are almost identical, except replacing one term from scaling with F_μ,k to be scaling instead as F_μ,k^2=|F_μ,k| for F_μ,k=0,± 1.
We can thus decouple the primary contribution of both of these first-order effects with the same pulse sequence block, simply by arranging the frames to form fast spin echoes.
These fast spin echoes are illustrated in Fig. <ref>(a).
To see this, first note that the commutator pre-factor implies that there will be a nonzero contribution only when μ≠ν.
With a spin echo block, the contribution from F_μ,k flips and cancels, while the sum F_<k^ν or I_<k^ν is along a different axis and thus remains unchanged during this time.
Moreover, the average zeroth order disorder Hamiltonian over the entire pulse sequence will also vanish due to the spin echo blocks.
Thus, the main term rules in conditions 1 and 2 are satisfied in Tab. <ref>.
In column 4 of Tab. <ref>, we derived additional corrections to the expressions, originating from the pulse-induced overlaps in Eq. (<ref>).
Interestingly, we find again that the different terms share some common structures, where they can be related to each other simply by replacing F_ν,k by |F_ν,k|.
Moreover, we find that the finite pulse duration corrections for first-order disorder-disorder terms are proportional to that of rotation angle errors at zeroth-order <cit.>, making it automatically satisfied if the latter has been incorporated into sequence design.
We also include an example of a second-order rule involving disorder only in Tab. <ref>.
As one can see, the structure bears many similarities with the first-order contributions.
In the case where the pulse sequence is composed of fast echoes, we can further simplify the expressions.
§.§ Block Symmetrization for Ising-Ising Terms
Moving on to the first-order Ising-Ising terms (row 3 of Tab. <ref>), we see that the structure of the expression again has many similarities as above.
However, here we have grouped the terms slightly differently, since the zeroth-order sum I̅^ν=∑_k |F_k^ν|(τ_k+τ_p) will always be nonzero.
Expressed in this way, first-order Ising-Ising interactions are decoupled by ensuring that for every pair of axes μ and ν, the cumulative occurrences of ν frames before and after each μ frame are equal, i.e. the appearance of the two frames is balanced.
Based on this result, we find that a simple motif is to perform a mirror symmetrization <cit.> of the frames within each block, as illustrated in Fig. <ref>(b).
Note that since the coefficient of the Ising contribution is identical regardless of the sign of the frame, only the relative frame ordering matters and not the sign.
If within each block the frames are balanced along the x̂, ŷ and ẑ directions, and mirror symmetrization in terms of ordering is performed, then using the pulse cycle decoupling principle, the first-order Ising-Ising contribution will be cancelled.
Here, contrary to global mirror symmetrization, we find that symmetrization within local blocks can also be a useful tool to effectively cancel certain first-order contributions.
The finite pulse duration correction terms for the first-order Ising-Ising contribution are shown in the fourth column of the Tab. <ref>.
They resemble the other correction terms, but with additional absolute value signs, and can be easily incorporated as decoupling rules in a similar fashion.
§.§ Dipole Cancellation and Row Balancing for Heisenberg-Related Terms
Let us now examine terms related to the Heisenberg interaction S⃗·S⃗.
As noted in Eq. (<ref>), the Heisenberg interaction is invariant under frame transformations.
Thus, the first-order expression resulting from the Heisenberg term and a different term will be the commutator between a constant term (Heisenberg), and a term that depends on the frame transformations (other).
The inclusion of the time integrals then result in the expressions in row 4-6 of Tab. <ref>, where there are no first-order contributions between two Heisenberg Hamiltonians because they are identical and thus commute.
In this case, because the Heisenberg Hamiltonian is invariant, the frame length extension becomes exact, and we do not need to include any additional finite pulse corrections in the table.
To explore in more detail what the resulting rules mean, let us first recall the expressions for cancelling disorder at zeroth order.
Here, we found that in order for disorder to be cancelled at zeroth order, we require the average disorder along each axis to vanish, i.e.
∑_k=1^n F_μ,k(τ_k+4/πτ_p)=0.
A useful physical analogy to interpret this expression is to associate a positive(negative) charge with F_μ,a=+1(-1).
The zeroth-order decoupling condition then dictates that the average charge is 0.
Generalizing the analogy to first-order terms, the first-order term of a given Hamiltonian contribution with the invariant Heisenberg Hamiltonian will be proportional to the given Hamiltonian, weighted by its location in time in the sequence.
This is because of the integration limits in Eq. (<ref>), where the relative ordering of the time variable values of the two Hamiltonians determines the sign of the expression.
Furthering the electromagnetic analogy, this results in a distance weighting factor from the center of the pulse sequence timing.
Thus, the first-order expression resembles the expression of a dipole, with charge given by F_μ,k at each time point and distance being the distance in time to the center of the sequence.
Cancelling this contribution requires the net dipole along each axis to vanish, as illustrated in Fig. <ref>(c).
We note that this intuition was key to improving decoupling pulse sequence performance in Sec. <ref>, and led to insights regarding the dichotomy between AC field sensing and decoupling for existing pulse sequences described in Ref. <cit.>.
Similarly, we can also analyze the expression for cross-terms between Ising interactions and Heisenberg interactions, simply by replacing the general charge by a non-negative charge value (|F_μ,k|).
With only positive charges, the condition can also be alternatively viewed geometrically as balancing frame weights in each row;
as illustrated in Fig. <ref>(d), one can imagine a fulcrum placed at the middle of a sequence, and for a given axis, placing a weight whenever the frame is along this axis (regardless of it being a positive or negative frame); the rule then becomes that the row would balance.
§ DETAILED SEQUENCE DESIGN PROCEDURE
We now utilize the preceding insights to design higher-order pulse sequences for various applications, focusing on the case of interacting spin ensembles dominated by on-site disorder <cit.>.
The result is a pulse sequence that decouples all zeroth-order and first-order contributions in the Magnus expansion, and is robust against disorder to second order, which we name DROID-R2D2 (Disorder RObust Interaction Decoupling - Robust To Disorder 2nd order), and a pulse sequence that achieves similar results but also has interesting AC field sensing capabilities <cit.>.
These pulse sequences were crucial for a variety of our recent experiments in dynamical decoupling, quantum metrology <cit.>, and Hamiltonian engineering <cit.>.
We will illustrate the complete design procedure in detail, and mention a few practical tricks to improve the efficiency of sequence screening and to examine larger design spaces of pulse sequences.
1. Choose target decoupling rules
The first step is to determine the set of decoupling rules that should be satisfied by the desired sequence.
The choice of this set is usually informed by several factors: First, the target application may influence which terms need to be decoupled.
For example, if we wish to study many-body dynamics in a disordered system, we may wish to preserve the disorder term while engineering interactions.
Alternatively, if we are interested in quantum sensing, then there may be additional design rules that are imposed to maximize sensitivity.
Second, the experimental system characteristics may inform which contributions are most important to decouple.
As an example, dense electronic spin ensembles, such as nitrogen-vacancy (NV) centers and nitrogen (P1) defects in diamond, or rare earth ions, typically have much larger disorder than interactions <cit.>.
Thus, it is much more important to address disorder-related effects to higher-order than interaction-related effects.
The relative importance of different contributions can be made more quantitative by using our expressions for various terms to estimate the typical total magnitude of each of the Hamiltonian terms.
Finally, for a given pulse sequence, we can also diagnose the dominant residual term by examining a cluster of a few spins, typically two or three, and computing the exact unitary for a set of disorder and interaction values.
Taking the matrix log of the unitary yields the exact effective Hamiltonian, and performing polynomial fits of the dominant terms with respect to the disorder and interaction strengths informs us which type of contribution is the largest, as well as the order at which it contributes in the Magnus expansion.
For example, in Fig. <ref>(a), we find that the dominant error terms for the existing DROID sequence from Ref. <cit.> are the XZ and ZX components of the Hamiltonians, when decomposed in the Pauli basis.
In Fig. <ref>(a,b), we find that the dominant scaling of this term is linear in both the disorder strength and interaction strength, suggesting that it originates from a first-order cross-term between them.
This motivated us to systematically include decoupling rules that target this effect.
In practice, we search for sequences by randomly enumerating those of a fixed length that satisfy a chosen set of rules (see below for a description of how to efficiently enforce rules).
We iterate the preceding error diagnosis step several times by identifying the dominant contributions for typical pulse sequences, and adding in new rules to fully decouple them.
Each addition of a new dominant rule eliminates the most poorly performing sequences, and increases the probability of enumerating a sequence with high coherence time; see Fig. 2 of the accompanying paper <cit.>.
Following this procedure leads us to include the following decoupling rules for our disorder-dominated NV center ensemble: decoupling of all zeroth-order conditions, as described in Ref. <cit.>; decoupling of all first-order conditions involving at least one factor of disorder, including disorder-disorder cross-terms, disorder-Ising and disorder-Heisenberg cross-terms, for both free evolution times and pulses; second-order disorder-disorder-disorder cross-terms, for both free evolution times and pulses.
2. Efficiently construct candidate frame sets
With the set of target decoupling rules in hand, we now discuss how to efficiently enumerate pulse sequences satisfying a set of imposed decoupling rules.
The number of possible frame sets without any additional constraints is combinatorially large.
For example, even a sequence consisting of 12 free evolution times connected by π/2 pulses, including intermediate frames for the finite pulse durations (e.g. the frame half way through π pulses or composite π/2 pulses), admits approximately 4^23≈ 10^14 distinct pulse sequences (each frame is connected to 4 other frames by π/2 pulses, and the first frame is fixed to be +ẑ).
However the vast majority of these sequences will not satisfy our rules.
Therefore it is essential to enumerate only sequences that satisfy them.
For the disorder-dominated interacting NV ensembles we work with, we choose to impose the following structures to efficiently pre-screen pulse sequences:
we require that all frames, including both free evolution and pulse frames, come in spin echo pairs, in order to echo out disorder on the fastest possible timescale.
In addition, we require an equal number of elements along each row, so as to symmetrize interactions.
Finally, we impose the “dipole" rules for first-order disorder-Heisenberg cross-terms, by requiring there to be an equal number of +- and -+ spin echoes.
In order to directly restrict the search space to candidate frame sequences that satisfy the above rules, we separately enumerate the locations of X, Y and Z spin echo pairs, and enumerate the echo ordering signs (i.e. whether the echo frames has the ordering +- or -+) of both free evolution frames and finite pulse frames.
We then combine these pieces of information to generate candidate frame sequences, imposing the additional constraint that each frame must be distinct from the two neighboring frames, to ensure that a π/2 pulse is applied and the pulse error calculation is accurate.
3. Screen frame sets using decoupling rules
Having generated candidate frame sets that already have a number of rules enforced by construction, we now proceed to screen through them by applying the remaining decoupling rules.
In order to speed up the screening process, the key insight is to transform the original rules into a vectorized form, such that fast matrix computation can be performed, significantly reducing the run time.
This is achieved by labeling the frames as 1 to 6 for +x,+y,+z,-x,-y,-z, and noting that the rules become simple cumulative sums of index matching results when expressed in this fashion.
We then further simplify them based on known decoupling structures (e.g. the rapid spin echoes built into the sequence).
Moreover, when evaluating some of the higher-order expressions in full generality, we can keep track of the cumulative integral of lower-order terms <cit.>, which reduces the time complexity of computing many such terms to linear in the sequence length, rather than a higher polynomial scaling.
4. Verify performance and further optimization
To optimize the performance of the pulse sequences, we further symmetrize the pulse sequence to reduce higher-order error contributions.
Here, for dynamical decoupling, we employ the symmetrization used in Ref. <cit.>, where the frames are repeated twice, but the frame ordering is reversed and sign of all frames flipped in the second repetition.
For the quantum metrology pulse sequences designed here and in Ref. <cit.>, this symmetrization will affect the magnetic field sensitivity, and consequently we employ a mirror-symmetrization instead, where the frame ordering is reversed but the sign is not flipped in the second repetition.
Finally, we numerically simulate the performance of these pulse sequences to identify the ones with the longest decoupling timescales.
Effective Hamiltonian extraction using the matrix log of the unitary can identify dominant error terms for the pulse sequences employed, and the whole design procedure can be repeated with an improved rule set.
For the above final set of decoupling rules, we no longer find a single contribution that dominates over the others, instead seeing a competition between several different contributions.
§.§ Resulting Pulse Sequences
Using the decoupling rules described above, we designed pulse sequences for dynamical interaction decoupling, many-body physics, and quantum metrology.
For dynamical decoupling and Hamiltonian engineering, one of the best pulse sequences we identified, DROID-R2D2, is shown in Fig. <ref>(b).
We find that compared to the previous best pulse sequence DROID <cit.>, as shown in Fig. <ref>(a), that had significant residual first-order cross terms (Fig. <ref>(a)), primarily cross terms between disorder and first-order Heisenberg interactions, the residual errors when examining the effective Hamiltonian are much reduced (Fig. <ref>(b)).
Moreover, we can adapt this pulse sequence to perform Hamiltonian engineering by adjusting the frame durations along the x̂, ŷ and ẑ axes <cit.>, resulting in a tunable interaction Hamiltonian
H_XXZ=∑_ijJ_ij[1+λ/3(S_i^xS_j^x+S_i^yS_j^y)+1-2λ/3S_i^zS_j^z],
where λ is a coefficient that tunes the XXZ Hamiltonian.
We find that our techniques also significantly reduce the error in engineering a wide range of generic XXZ Hamiltonians.
In Fig. <ref>(c,d), we see that both two-body and single-body imperfection terms are much smaller across a wide range of different Hamiltonians, which can help improve the fidelity of Hamiltonian engineering and reduce systematic artifacts.
These techniques can be readily generalized to engineer XYZ Hamiltonians, with different coefficients in front of each term, or even more complex many-body Hamiltonians.
The same techniques can also be used to design pulse sequences for improved quantum sensing, as we explain in more detail in Ref. <cit.>.
The key insight is that current pulse sequences for quantum sensing <cit.>, which periodically flip the spin along each axis with the same frequency as the target signal, will always result in a violation of the “net dipole cancellation" rule in Fig. <ref>(c) for first-order disorder-Heisenberg terms.
This imposes a fundamental trade-off between sensitivity and decoupling quality for current pulse sequences.
With this insight from higher-order decoupling rules, we are able to design the new pulse sequence DIRAC2 (DIsorder Robust AC sensing with period 2), as shown in Fig. <ref>(c), which circumvents this issue by targeting a sensing signal half the frequency of frame flipping, thereby fully cancelling all first-order Magnus contributions while also increasing the rate of spin echo decoupling, leading to better performance.
See Ref. <cit.> for a more detailed description.
§ DISCUSSION AND CONCLUSION
We have developed a general framework for dynamical Hamiltonian engineering that includes higher-order considerations.
Contrary to the naive expectation, we found that many higher-order decoupling conditions can still have simple, intuitive interpretations, particularly when the pulse sequence is designed to have certain structures in it.
We analytically derived a number of decoupling rules for higher-order contributions, and used them to design robust pulse sequences in disorder-dominated systems for dynamical decoupling, Hamiltonian engineering, and quantum sensing, significantly improving upon state-of-the-art pulse sequences.
While we have focused on the application of our techniques to the case of electronic spin ensembles, where disorder is much larger than spin-spin interactions, we believe that our techniques can be applied to disparate systems such as NMR <cit.>, simply by changing which rules are emphasized and included at higher-order.
It may also be interesting to further extend the techniques to even higher-order than the ones that we have considered here <cit.>, or to examine alternative expansions beyond the Magnus expansion <cit.>.
In our formalism, the contributions from higher-order terms are decomposed into an operator commutation portion, and a portion that relates to the frame matrix and pre-factors.
This also makes the extension to higher-spin systems relatively straightforward, and can be combined with recent methods for robust Hamiltonian engineering with higher-spin systems <cit.>.
With these further improvements, we believe that our framework presents a key tool for advanced Hamiltonian engineering pulse sequence design, with broad applications in dynamical decoupling, quantum many-body physics, and quantum metrology.
§ ACKNOWLEDGEMENTS
We thank J. Choi, A. Douglas, H. Gao, N. Maskara, P. Peng, M. Yu for helpful discussions. This work was supported in part by CUA, HQI, NSSEFF, ARO MURI, DARPA DRINQS, Moore Foundation GBMF-4306, NSF PHY-1506284.
§ CONVENTIONS
See Tab. <ref> for a summary of the conventions employed in this manuscript.
§ DERIVATION OF FIRST-ORDER MAGNUS FORMALISM
To develop the full expression at first order, we extend the formalism developed in Ref. <cit.>. To keep the expressions fully general, we do not restrict to a specific qubit Hamiltonian here, and specialize to the dipolar Hamiltonian only in the following sections.
Following Ref. <cit.>, we can separate the evolution into free evolution periods and evolution during pulses.
We will write the coefficient of a given operator ^α during the k-th free evolution period as c_α(t)=c_α,k, and during the π/2 pulse after the k-th free evolution period as
c_α(t)=_α,k(t/r)+q_α,k,k+1(t/r)+_α,k+1(t/r).
Here, r is the rate of angular precession under the applied pulses, and the rotation angles during the π/2 pulse are given by θ=t/r.
The first term _α,k(θ) describes the finite pulse duration contribution from the k-th frame that precedes the pulse, while _α,k+1(θ) describes the contribution from the (k+1)-th frame that follows the pulse.
q_α,k,k+1(θ) is an additional cross-term between the two frames that arises for certain types of interaction terms.
Note that similar to Ref. <cit.>, in our pulse sequence composed of π/2 pulses and π pulses, we treat each π pulse as a combination of two π/2 pulses with zero free evolution time in between.
As a concrete example to illustrate these terms, let us consider a rotation that transformed the S^z operator into S^x, i.e. S̃^z(θ)=cosθ S^z+sinθ S^x.
For an Ising interaction H_I=JS_i^zS_j^z, the time-dependent operator would be
H̃_I(t) =J[cos^2θ S_i^zS_j^z+sinθcosθ(S_i^xS_j^z+S_i^zS_j^x)+sin^2θ S_i^xS_j^x].
The three terms in the parenthesis correspond to the _α,k(θ), q_α,k,k+1(θ) and _α,k+1(θ) terms, respectively.
With this representation in hand, we proceed by rewriting the integral in Eq. (<ref>) as a summation over the distinct blocks.
Let us examine the first term, which integrates all c_β terms occurring temporally before c_α:
A=∫_0^Tdt_1c_α(t_1)∫_0^t_1dt_2c_β(t_2)
To compute this, we first define the integral of the coefficient of a given frame, including its finite pulse duration effects:
C_α,k=r∫_0^π/2_α,k(θ)dθ+∫_0^τ_kc_α,kdt+r∫_0^π/2_α,k(θ)dθ.
This can be viewed as a simple extension of the effective free evolution time.
We can then decompose the inner integral in Eq. (<ref>) into three parts (ignoring additional contributions from q_α,k,k+1-terms for now): a contribution from previous, non-overlapping free evolution times, together with their surrounding pulses (A_free); a contribution from integrating both time variables within the same free evolution period, corresponding to first-order contributions within the same frame (C_α,β,k^(1)); and a further correction arising from the pulse overlaps of neighboring free evolution times (P_k,k+1,α,β).
This is illustrated in Fig. <ref>.
More concretely, the first term describes contributions where t_1 lies within the k-th frame, and t_2 originates from an earlier frame. As most of these contributions will be temporally non-overlapping, we can factorize these contributions as
A_free=∑_k=1^n C_α,k∑_j=1^k-1C_β,j.
The next term describes contributions where both t_1 and t_2 come from the k-th frame, with t_2<t_1∈[t_k-1+τ_k-1/2,t_k+1-τ_k+1/2], i.e. the first-order Magnus contribution of a frame with itself.
We can explicitly write this as
C^(1)_α,β,k=∫_t_k-1+τ_k-1/2^t_k+1-τ_k+1/2c_α(t_1)dt_1∫_t_k-1+τ_k-1/2^t_1c_β(t_2)dt_2.
Note that this term is usually zero in our case, as the commutator [^α,^β] vanishes when α=β, and otherwise c_α, c_β are both non-zero within the same free evolution period only when they originate from different types of non-commuting Hamiltonians, e.g. one coming from local S^z disorder, and the other coming from Heisenberg interactions.
Finally, we have additional corrections P_k,k+1,α,β that arise from the overlap in terms due to the pulses: for the k-th frame, we overcounted the overlap contribution with the previous (k-1)-th frame by assuming that the k-th frame came completely after the (k-1)-th frame, but undercounted the overlap contribution with the next (k+1)-th frame.
Explicit calculation shows that this results in a first order pulse correction that is related to both the preceding and subsequent frame:
P_k,k+1,α,β=∫_0^π/2_α,k(θ_1)rdθ_1∫_0^θ_1_β,k+1(θ_2)rdθ_2-∫_0^π/2_α,k+1(θ_1)rdθ_1∫_θ_1^π/2_β,k(θ_2)rdθ_2.
Thus, neglecting all terms that directly dependent on multiple pulses (see q-terms below), we can express the integral in a clean manner as
A=A_free+∑_k=1^n-1P_k,k+1,α,β+∑_k=1^nC^(1)_α,β,k.
For certain interaction terms such as the Ising Hamiltonian, there is an additional contribution we need to keep track of, the q_α,k,k+1(θ) terms described in Eq. (<ref>).
These terms come from the fact that the Ising interaction transforms as the square of the frame coefficients, introducing additional cross-terms when expanding the square.
These terms are ignored in the main text, as they are negligible for our disorder-dominated system, but we will analyze them in more detail here.
We can perform a similar decomposition of the terms as above, now adding in the contributions from the q-terms.
We can treat the q-terms as a special type of free evolution frame, and decompose the sum into the three types again, this time keeping track also of whether the other term is a q-term or a regular free evolution period.
Similar to Eq. (<ref>), we can evaluate the first-order contributions involving a single q-term and a single free evolution frame as
QA_free=∑_k=1^nC_α,k∑_j=1^k-1Q_β,j,j+1+∑_k=1^nQ_α,k,k+1∑_j=1^kC_β,j,
where
Q_α,k,k+1=∫_0^π/2q_α,k,k+1(θ)dθ
is the integral of the q-term during a given pulse.
In analogy to the corrections P_k,k+1,α,β found above, we also have similar corrections here
QP_k,k+1,α,β =∫_0^π/2q_α,k,k+1(θ_1)rdθ_1∫_0^θ_1_β,k+1(θ_2)rdθ_2-∫_0^π/2q_α,k,k+1(θ_1)rdθ_1∫_θ_1^π/2_β,k(θ_2)rdθ_2
+∫_0^π/2_α,k(θ_1)rdθ_1∫_0^θ_1q_β,k,k+1(θ_2)rdθ_2-∫_0^π/2_α,k(θ_1)rdθ_1∫_θ_1^π/2q_β,k-1,k(θ_2)rdθ_2.
Finally, we also have corrections coming from the first-order contributions between q-terms at different times and in the same pulse
Q_self=∑_k=1^nQ_α,k,k+1∑_l=1^k-1Q_β, l,l+1+∑_k=1^n∫_0^π/2q_α,k,k+1(θ_1)rdθ_1∫_θ_1^π/2q_β,k,k+1(θ_2)rdθ_2.
Putting all of this together, the final, complete expression for first-order terms is
A=A_free+∑_k=1^n-1P_k,k+1,α,β+∑_k=1^nC^(1)_α,β,k+QA_free+Q_self+∑_k=1^nQP_k,k+1,α,β
§ DERIVATION OF FIRST-ORDER CANCELLATION RULES
We will now apply the preceding general calculations to specific first-order terms, in order to derive first-order decoupling rules.
As we shall see, in many cases of interest, a lot of the terms in Eq. (<ref>) will drop out, resulting in simple expressions.
§.§ Disorder-Disorder Rules
Let us start with first-order disorder-disorder contributions, involving commutators between disorder at different times.
Since this Hamiltonian involves only single-qubit terms, there will be no q-terms.
Furthermore, there are no C^(1)_α,β,k terms, as the operator in each frame commutes with itself.
We thus have
A_dis-dis=A_free+∑_k=1^n-1P_k,k+1,α,β.
Examining the transformation of the operators for different frames, we have
c_α,k → F_μ,k,
_α,k(θ) → F_μ,ksin(θ),
_α,k(θ) → F_μ,kcos(θ),
C_α,k = F_μ,k(τ_k+4τ_p/π).
Plugging this into the preceding definitions of the individual terms, we find
A_free =∑_k=1^nF_μ,k(τ_k+4τ_p/π)∑_l=1^k-1F_ν,l(τ_l+4τ_p/π),
P_k,k+1,dis,dis = (F_μ,kF_ν,k+1-F_μ,k+1F_ν,k)(1-π/4)(2τ_p/π)^2,
Further plugging this into the full expression Eq. (<ref>) for the first-order disorder-disorder term, we arrive at the full expression for the main term
∑_k=1^nF_μ,k(τ_k+4/πτ_p)F^ν_<k-1/2F̅^μF̅^ν,
and the finite pulse correction
(1-π/4)(2τ_p/π)∑_k=1^nF_μ,kF_ν,k+1-F_ν,kF_μ,k+1,
as described in Tab. <ref>.
Based on these expressions, we can formulate relatively simple rules for their cancellation in sequence design.
The expression P_k,k+1,α,β involves a term that can be rewritten as F⃗_k×F⃗_k+1, and thus has the same conditions for cancellation as zeroth-order rotation angle errors <cit.>.
Due to the rapid spin echo structure found in many decoupling sequences for disorder-dominated systems, e.g. DROID-60 in Ref. <cit.>, the majority of terms in A_free are also cancelled in the inner sum, and the only contribution remaining is from the commutator between a spin echo pair and the intermediate pulse frame that the π pulse uses.
To give a concrete example of this remaining contribution, consider a sequence of two π pulses around X, which implements the following frame transformations +Z → +Y → -Z → -Y, with +Z and -Z being longer free evolution frames, and +Y and -Y being shorter frames with zero free evolution time and only pulse effects.
The first-order contribution from this will then be proportional to the commutator between Z and Y, and changes sign both when we flip the sign of one of the operators (e.g. +Z → -Y → -Z → +Y), as well as when we switch the order of the operators (e.g. +Y → +Z → -Y → -Z).
Thus, this term has the same transformation properties as a rotation angle error that acts only within such spin echo blocks.
§.§ Disorder-Heisenberg Rules
The next term we consider is the first-order disorder-Heisenberg contribution, which was the dominant imperfection in the previous DROID-60 sequence <cit.> and key to the design of improved sensing sequences such as DIRAC2 <cit.>.
As shown in Eq. (<ref>), we can choose an index ordering where disorder is after Heisenberg interactions, such that α is a disorder index and β is a Heisenberg interaction index.
The case where both are Heisenberg indices gives zero contribution, as the operator terms are equal to the fixed Heisenberg Hamiltonian and hence commute.
As the Heisenberg interaction is invariant under frame transformations, the coefficients can be chosen to take a particularly simple form:
c_β,k → 1,
_β,k(θ) → 1,
_β,k(θ) → 0,
C_β,k =τ_k+τ_p.
Plugging these into the preceding expressions, we find
A_free =∑_k=1^nF_μ,k(τ_k+4τ_p/π)∑_j=1^k-1(τ_j+τ_p),
P_k,k+1,α,β =F_μ,k(π/2-1)(2τ_p/π)^2,
C_α,β,k^(1) =F_μ,k[∫_0^π/2sin(θ_1)rdθ_1∫_0^θ_1rdθ_2+∫_0^τ_kdt_1(τ_p+∫_0^t_1dt_2)+∫_0^π/2cos(θ)rdθ(τ_p+τ_k)]
=F_μ,k[(2τ_p/π)^2+τ_kτ_p+τ_k^2/2+(τ_p+τ_k)(2τ_p/π)].
We can simplify the sum of the last two contributions
P_k,k+1,α,β+C^(1)_α,β,k =F_μ,k(τ_kτ_p+1/2τ_k^2+(2τ_p+τ_k)(2τ_p/π))
=F_μ,k(τ_p+1/2τ_k)(τ_k+4τ_p/π).
Adding the corrections together, we get
A=∑_k=1^nF_μ,k(τ_k+4τ_p/π)∑_j=1^k-1(τ_j+τ_p+τ_p+1/2τ_k)=∑_k=1^nF_μ,kt_k(τ_k+4τ_p/π),
where t_k is the midpoint of the kth free evolution frame.
The remaining term in Eq. (<ref>) can be evaluated to be
1/2_α(T)_β(T)=F̅^μT/2,
which combined give us the full algebraic condition for first-order disorder-Heisenberg decoupling
∑_k=1^nF_μ,k(τ_k+4/πτ_p)(t_k-T/2).
As described in the main text and in Ref. <cit.>, there is a relatively simple intuition for these contributions, which we visualize using dipole balancing.
If we associate a charge to each frame, with +1(-1) values of F_μ,k being a positive(negative) charge, then the above expression corresponds to the product of charges (F_μ,k) with their center-of-mass location (t_k-T/2), which is precisely the definition of a dipole.
Thus, geometrically, we can visualize the cancellation of first-order disorder-Heisenberg contributions as requiring that the net dipole corresponding to a frame configuration to be 0.
§.§ Disorder-Ising Rules
Next we move on to the Ising contributions, starting with first-order disorder-Ising terms.
For this, we use c_α,k from the disorder term, and we use the following for the c_β,k terms:
c_β,k → |F_ν,k|,
_β,k(θ) → |F_ν,k|sin^2(θ),
_β,k(θ) → |F_ν,k|cos^2(θ),
q_β,k,k+1(θ) → F_ν,kF_ρ,k+1sin(θ)cos(θ),
C_β,k =|F_ν,k|(τ_k+τ_p),
Q_β,k,k+1 =F_ν,kF_ρ,k+1τ_p/π.
Plugging these into the definitions for the individual terms, we find
A_free =∑_k=1^nF_μ,k(τ_k+4τ_p/π)∑_l=1^k-1|F_ν,l|(τ_l+τ_p),
P_k,k+1,dis,isi =(F_μ,k|F_ν,k+1|-F_μ,k+1|F_ν,k|)(π/4-2/3)(2τ_p/π)^2.
The term C^(1)_α,β,k will not contribute, as the disorder and Ising Hamiltonian within the same free evolution time commute with each other, [S^μ⊗ I, S^μ⊗ S^μ]=0.
The algebraic conditions in the Tab. <ref> are based on the preceding expressions, and ignore the q-terms.
Combining A_free with the rest of the terms gives the main term:
∑_k=1^nF_μ,k(τ_k+4/πτ_p)I_<k^ν-1/2F̅^μI̅^ν.
Summing over pulses in the pulse term gives the finite pulse correction
∑_k=1^n(2τ_p/π)^2(π/4-2/3)(F_μ,k|F_ν,k+1|-|F_ν,k|F_μ,k+1).
The main term will vanish with the same fast spin echo blocks as that found in the first-order disorder-disorder term, and the finite pulse correction can be viewed as a simple generalization of, e.g. the chirality condition in Ref. <cit.>.
We now further evaluate the q-terms.
As any two adjacent frames will have different operators due to the frame change, we will have no contribution when ν=ρ. Explicitly plugging into the above expressions gives
QA_free =∑_k=1^nF_α,k(τ_k+4/πτ_p)∑_j=1^k-1F_ν,jF_ρ,j+1τ_p/π,
QP_k,k+1,dis,isi =1/6(F_μ,kF_ν,kF_ρ,k+1- F_μ,kF_ν,k-1F_ρ,k)(2τ_p/π)^2,
Q_self =0.
§.§ Ising-Ising Rules
We will now compute the first-order Ising-Ising term. Using the definitions of the individual terms as in the previous calculation (taking both α and β to be Ising indices), we find
A_free =∑_k=1^n|F_μ,k|(τ_k+τ_p)∑_l=1^k-1|F_ν,l|(τ_l+τ_p)
=∑_k=1^n|F_μ,k|(τ_k+τ_p)I_<a^ν,
P_k,k+1,isi,isi =(|F_μ,k||F_ν,k+1|-|F_μ,k+1||F_ν,k|)(π^2/32-1/4)(2τ_p/π)^2
Similar to the disorder-disorder case and the disorder-Ising case, we have no contribution from the C^(1)_α,β,k terms. Next, we calculate the contribution from the q-terms. Directly plugging things in
QA_free =∑_k=1^n|F_μ,k|(τ_k+τ_p)∑_j=1^k-1F_ν,kF_ρ,k+1τ_p/π+∑_k=1^nF_μ,kF_ρ,k+1τ_p/π∑_l=1^k|F_ν,l|(τ_l+τ_p),
QP_k,k+1,isi,isi =τ_p^2/8π(F_μ,kF_λ,k+1|F_ν,k+1|-F_μ,kF_λ,k+1|F_ν,k|+|F_μ,k|F_ν,kF_ρ,k+1-|F_μ,k|F_ν,k-1F_ρ,k),
Q_self =∑_k=1^nF_μ,kF_λ,k+1τ_p/π∑_l=1^k-1F_ν,lF_ρ,l+1τ_p/π+∑_k=1^nτ_p^2/2π^2F_μ,kF_λ,k+1F_ν,kF_ρ,k+1.
§.§ Ising-Heisenberg Rules
Finally, we calculate the first-order Ising-Heisenberg terms.
Taking α to be the Ising terms, we can repeat the derivation from disorder-Heisenberg rules to find that the main terms can be written as
∑_k=1^n|F_μ,k|(τ_k+τ_p)(t_k-T/2),
which simply replaces the F_μ,k in the original disorder-Heisenberg rule by |F_μ,k|.
Although this term is no longer cancelled by imposing a zero net dipole, we can still formulate a simple condition for it to be cancelled: if we have “balanced" rows, in which the center of mass of each row is in the middle, then this term will be cancelled.
For example, a simple mirror symmetrization will cancel this first-order term.
For the q-terms, using the expressions found above, we can easily calculate
QA_free =∑_k=1^nF_μ,kF_λ,k+1τ_p/π∑_l=1^k(τ_l+τ_p),
QP_k,k+1,isi,heis =π/8(2τ_p/π)^2F_μ,kF_λ,k+1,
Q_free =0.
We note that after summing the pulse term over k, we can add the two expressions together to obtain
Q_tot=∑_k=1^nF_μ,kF_λ,k+1τ_p/π(∑_l=1^k(τ_l+τ_p)+τ_p/2).
We note that the second sum is exactly the time at the middle of the pulse, similarly to the other Heisenberg rules. This tells us that we can cancel this the same way, by balancing the center of mass for terms of the form F_μ,kF_λ,k+1.
§.§ Summary of Two Qubit Commutators
We lastly summarize the general commutators of the form 𝒪_α, 𝒪_β over a basis of two-qubit operators, { O_α}_α, to be defined shortly. To this end, it is convienent to write a generic two-qubit Hamiltonian in the form of a 4 × 4 matrix 𝒜,
H(𝒜) = ∑_μν=0^3 𝒜_μν σ_μ⊗σ_ν,
where we have defined σ_μ = ( 1, σ⃗) as a 4-vector of Pauli operators, including the 2 × 2 identity matrix 1. It follows that a native symmetric secular Hamiltonian can be specified by the matrix
𝒜 = ([ 0 0 0 h_2; 0 g_0 0 0; 0 0 g_0 0; h_1 0 0 g_0+g_1; ]),
parameterized by disorder fields h_1,h_2 and Heisenberg/Ising interactions g_0, g_1. Note that we have introduced horizontal and vertical bars to visually distinguish between interactions and disorder. As explained in the main-text, under global driving mapping S_z → F_μ S_μ the secular Hamiltonian will depend only on this column vector F. This representation of the 2-qubit interaction will thus transform as
𝒜↦𝒜'( F) =([ h_2 F^T ; ; h_1 F g_0 1 + g_1 FF^T ; ; ]),
= ∑_α c_α 𝒜_α(F),
where {𝒜_α(F) }_α are judicious choice of operator basis. A particular choice of operators that is convenient to summarize the commutators is the following
{𝒜_α(F) }_α = {𝒜_±(F) = ([ ±F^T ; ; F 0 ; ; ]), 𝒜_H =([ ; ; 1 ; ; ]), 𝒜_I(F) = ([ ; ; FF^T ; ; ]) }.
The matrix commutator between the interaction picture Hamiltonians in different frames lifts to a bracket on the basis 𝒞 matrices, yielding surprisingly simple “selection rules" for understanding the structure behind the first order Magnus calculation.
Before presenting the result, we define two more interactions
𝒜̃_I( F, G) = ([ ; ; (FG^T + GF^T )/2 ; ; ]),
𝒜_A( F) = ([ ; ; ϵ_ijk F_k ; ; ]),
where the first one contains the Ising interaction 𝒜_I( F) = 𝒜̃_I( F, F) as a special case, and the second one is an anti-symmetric exchange 𝒜_A( F).
Disorder, Disorder → Disorder
* 𝒜_σ(𝐅),𝒜_σ'(𝐆) = 2i 𝒜_σσ'(𝐅×𝐆) σ, σ' ∈±
Disorder, Interaction → Interaction
* 𝒜_+(𝐅), 𝒜_H =0
* 𝒜_+(𝐅), 𝒜_I(𝐆) = 4i 𝒜̃_I(𝐆, 𝐅×𝐆)
* 𝒜_-(𝐅), 𝒜_H = -4 i 𝒜_A(𝐅)
* 𝒜_-(𝐅), 𝒜_I(𝐆) = 2i((F· G) 𝒜_A(𝐆)-𝒜_A(𝐅))
Interaction, Interaction → Disorder
* 𝒜_H, 𝒜_H = 0
* 𝒜_H, 𝒜_I(𝐆) = 0
* 𝒜_I(𝐅), 𝒜_I(𝐆) = 2i (F · G) 𝒜_+(𝐅×𝐆)=0 for pulse sequences built from π/2,π pulses
§ DERIVATION OF SECOND-ORDER DECOUPLING RULES
From Eq. (<ref>), we have that the cancellation condition for the second-order term is given by two integrals
∭_0<t_3<t_2<t_1<Tc_α(t_1)c_β(t_2)c_γ(t_3)+∭_0<t_1<t_2<t_3<Tc_α(t_1)c_β(t_2)c_γ(t_3).
In order to see the similarities to the previous order, we write the above integrals as follows
∫_0^Tdt_1c_α(t_1)(∬_0<t_3<t_2<t_1c_β(t_2)c_γ(t_3)+∬_t_1<t_2<t_3<Tc_β(t_2)c_γ(t_3)).
Noting that the coefficient here is [^α,[^β,^γ]], we can again sum the terms which have β and γ switched, as we did with first order, and derive the following expression
H^(2) =1/6T ([^α,[^β,^γ]])∫_0^Tdt_1c_α(t_1)·
·( ∬_0<t_3<t_2<t_1 c_β(t_2)c_γ(t_3)-∬_0<t_2<t_3<t_1 c_β(t_2)c_γ(t_3).+
+.∬_t_1<t_2<t_3<Tc_β(t_2)c_γ(t_3)-∬_t_1<t_3<t_2<Tc_β(t_2)c_γ(t_3)).
The inner integrals in the above expression are the first order contribution of the β,γ first order term for all times before t_1, minus the first order contribution of the β,γ first order term for all times after t_1. Letting
c^(1)_β, γ(t_1,t_2) = ∬
t_1<t_a<t_b<t_2c_β(t_a)c_γ(t_b)-∬
t_1<t_b<t_a<t_2c_β(t_a)c_γ(t_b),
which is exactly the first order contribution between times t_1 and t_2 of the operator [^β,^γ], we can rewrite the expression as follows
H^(2) =1/6T ([^α,[^β,^γ]])∫_0^Tdt_1c_α(t_1)(c^(1)_β,γ(0,t_1)-c^(1)_β,γ(t_1,T) ).
We then write
∫_0^Tdt_1c_α(t_1) (c^(1)_β,γ(0,t_1)-c^(1)_β,γ(t_1,T) )
= ∫_0^Tdt_1c_α(t_1)c^(1)_β,γ(0,t_1)-∫_0^Tdt_1c_α(t_1)(c^(1)_β,γ(0,T)-c^(1)_β,γ(0,t_1))
= 2∫_0^Tdt_1c_α(t_1)c^(1)_β,γ(0,t_1)-c^(1)_β,γ(0,T)∫_0^Tdt_1c_α(t_1).
We note that this form is identical to the first order case, with c_β(t) replaced by c^(1)_β,γ(0,t). We will now perform the same substitution that we did for first order to convert the integral expression into a summation expression. For simplicity, we restrict our discussion to Hamiltonians involving disorder only. In this case, c^(1)_β,γ does not change over a free evolution period, i.e. looking at c^(1)_β,γ(0,t_a) and c^(1)_β,γ(0,t_b), for t_a,t_b in the same free evolution period, the contribution to the overall term is 0, as the commutator [^β,^γ] will be 0 during this time. Thus we can write the same approximation for this term as in the 1st order term
A =∫_0^Tdt_1c_α(t_1)c^(1)_β,γ(0,t_1)
=A_free+∑_k=1^n-1P_k,k+1,α,β,γ+∑_k=1^nC^(2)_α,β,γ,k,
where
C^(2)_α,β,γ,k =∫_t_k-1+τ_k-1/2^t_k+1-τ_k+1/2c_α(t_1)dt_1∫_t_k-1+τ_k-1/2^t_1c^(1)_β,γ(0,t_2)dt_2,
P_k,k+1,α,β,γ =∫_0^π/2_α,k(θ_1)rdθ_1∫_0^θ_1^(1)_β,γ,k+1(θ_2)rdθ_2-∫_0^π/2_α,k+1(θ_1)rdθ_1∫_θ_1^π/2^(1)_β,γ,k(θ_2)rdθ_2,
A_free =∑_k=1^nC_α,k∑_j=1^k-1C_β,γ,j.
Here C_β,γ,j=C_β,j∑_ℓ=1^j-1C_γ,ℓ, and the angle terms are defined as follows:
^(1)_β,γ,k(θ) = ∬_0≤θ_1≤θ_2≤θ_β(θ_1)_γ(θ_2)-∬_0≤θ_2≤θ_1≤θ_β(θ_1)_γ(θ_2),
^(1)_β,γ,k(θ) = ∬_0≤θ_1≤θ_2≤θ_β(θ_1)_γ(θ_2)-∬_0≤θ_2≤θ_1≤θ_β(θ_1)_γ(θ_2).
We note that this means if the two ramp up functions are proportional, i.e. _γ(θ)=F_γ,ksin(θ), _β(θ)=F_β,ksin(θ), these terms will always be 0. There are also no q-terms as we are restricting to a disorder Hamiltonian. Thus, the only term left is the free evolution term with the frame-lengthening correction.
We can now plug in expressions for the explicit terms in the qubit Hamiltonian to calculate the leading second-order effects. The free evolution period is much like the lower orders
A_free=∑_k=1^nF_μ,k(τ_k+4/πτ_p)F^ν,ρ_<k,
where F^ν,ρ_<k=∑_l=1^kF_ν,l(τ_l+4/πτ_p)(F^ρ_<l-F^ρ_>l) is the first-order contribution given by ν,ρ through time k. By combining A_free with the rest of the terms, we obtain the expression in Tab. <ref>
2∑_k=1^n F_μ,k(τ_k+4/πτ_p)F_<k^ν,ρ - F^μF^ν,ρ,
where F^ν,ρ=∑_k=1^nF_ν,k(τ_k+4/πτ_p)F_<k^ρ is the total first-order disorder-disorder term between axes ν and ρ.
|
http://arxiv.org/abs/2303.06993v1
|
20230313104925
|
Actor-Critic learning for mean-field control in continuous time
|
[
"Noufel Frikha",
"Maximilien Germain",
"Mathieu Laurière",
"Huyên Pham",
"Xuanye Song"
] |
stat.ML
|
[
"stat.ML",
"math.OC"
] |
equationsection
showonlyrefs
fit,matrix,chains,positioning,decorations.pathreplacing,arrows
showonlyrefs
letterpaper,
left= 30 mm,
right= 20 mm,
top= 45 mm,
bottom= 45 mm,
^⊺
▸
#1#2#1#22mu#1#2
∑
∏
∫
/
inf
sup
lim
lim inf
lim sup
max
min
Clp
1̱1
A
𝔸
𝕀
ℕ
ℝ
Ł𝕃
𝕄
ℤ
𝔼
𝔽
𝔾
ℙ
ℚ
𝔻
𝕋
𝕏
𝕊
𝕌
𝐏_
M
ϵ
π
R
p
π
R
F
f̃
d
W
V
ν
A
u
â
α
𝔞
𝔣
a
b
f
d
ḍ
U
M
f̂
f̂
D
_#1#1ess sup
_#1#1argmin
_#1#1argmax
A
B
C
D
E
F
G
H
I
K
L
P
R
Π
M
N
O
S
T
U
V
W
X
Y
Z
ε
#1∂#1∂t
#1∂#1∂s
#1∂^2 #1∂s^2
#1∂#1∂y
#1∂^2 #1∂y^2
#1∂^2 #1∂s ∂y
#1∂#1∂k
#1∂#1∂p
#1∂^2 #1∂k^2
#1∂^2 #1∂p^2
#1∂^2 #1∂k ∂y
#1∂^2 #1∂k ∂p
#1∂^2 #1∂y ∂p
#1(<ref>)
N
X
P
Q
p
x
s
c
a
f
g
q
α
π
ξ
ıI
T
NT
S
X
C
e
x
y
b
n
s
w
N
σ
g
i
p
c
r
v
f
Γ
m
D
m
𝔞
a
b
𝔟
𝔲
u
ḍ
𝔰
p
s
σ
σ
y
𝔶
z
𝔷
𝔖
S
π
π
J
𝔍
G
𝔊
V
#1
0.0 -0.055 -0.08 0.07 #1#1#1#1#1#1#1#1#1#1#1#1TheoremTheorem[section]
DefinitionDefinition[section]
PropositionProposition[section]
AssumptionAssumption[section]
LemmaLemma[section]
CorollaryCorollary[section]
RemarkRemark[section]
ExampleExample[section]
equationsectionActor-Critic learning for mean-field control in continuous time
Noufel FRIKHA[CES, UMR 8174, Université Paris 1 Panthéon Sorbonne, mailto: Noufel.Frikha at univ-paris1.fr Noufel.Frikha at univ-paris1.fr] Maximilien GERMAIN[LPSM, Université Paris Cité, mailto: maximilien.germain at gmail.commaximilien.germain at gmail.com] Mathieu LAURIERE[NYU Shanghai, mailto: mathieu(dot)lauriere at nyu.edumathieu.lauriere at nyu.edu]
Huyên PHAM[ LPSM, Université Paris Cité, mailto:pham at lpsm.parispham at lpsm.paris; This author is supported by the BNP-PAR Chair “Futures of Quantitative Finance",
and by FiME, Laboratoire de Finance des Marchés de l'Energie, and the “Finance and Sustainable Development” EDF - CACIB Chair] Xuanye SONG[LPSM, Université Paris Cité, mailto:pham at lpsm.parisxsong at lpsm.paris;]
March 30, 2023
============================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================
We study policy gradient for mean-field control in continuous time in a reinforcement learning setting. By considering randomised policies with entropy regularisation, we derive a gradient expectation representation of the value function, which is amenable to actor-critic type algorithms,
where the value functions and the policies are learnt alternately based on observation samples of the state and model-free estimation of the population state distribution, either by offline or online learning.
In the linear-quadratic mean-field framework, we obtain an exact parametrisation of the actor and critic functions defined on the Wasserstein space. Finally, we illustrate the results of our algorithms with some numerical experiments on concrete examples.
Keywords: Mean-field control, reinforcement learning, policy gradient, linear-quadratic, actor-critic algorithms.
§ INTRODUCTION
Mean-field control (MFC in short), also called McKean-Vlasov (MKV in short) control problem is concerned with the study of large population models of interacting agents who are cooperative and act for collective welfare according to a center of decision (or social planner).
It has attracted a growing interest over the last years with the emergence of mean-field game, and there is now a large literature on the theory and its various applications in economics/finance, population dynamics, social sciences and herd behavior. We refer to the seminal two-volume monograph <cit.>-<cit.> for a detailed treatment of the topic.
Mean-field control problems lead to infinite dimensional problems in the Wasserstein space of probability measures, and analytical solutions are rarely available. It is then crucial to design efficient numerical schemes for solving such problems, and in the past few years, several works have proposed numerical methods in a model-based setting based
either on forward-backward SDE characterisation of MKV from Pontryagin maximum principle, or Master Bellman equation from dynamic programming, and often relying on suitable class of neural networks, see e.g. <cit.>, <cit.>, <cit.>, <cit.>, <cit.>, <cit.>.
The question of learning solutions to MFC in a model-free setting, i.e. when the environment (model coefficients) is unknown, has recently attracted attention, see <cit.>, <cit.>, <cit.>, and this is precisely the purpose of Reinforcement learning (RL): learn optimal control by trial and error, i.e., repeatedly try
policy, observe the state, receive and evaluate the reward, and improve the policy. There are two main approaches in RL: (i) Q-learning based on dynamic programming, and (ii) Policy gradient based on parametrisation of policies, and a key feature in RL is the exploration of the unknown
environment to broaden search space, which can be achieved via randomised policies. RL is a very active branch of machine learning and we refer to the second edition of the monograph <cit.> for an overview of this field.
Most algorithms in RL are limited to discrete-time frameworks for Markov decision processes (MDP) or mean-field MDP, and the study of RL in continuous time has been recently initiated in <cit.>, <cit.>, <cit.> for controlled diffusion processes.
In line with these works, we provide in this paper a theoretical treatment of policy gradient methods for MFC in continuous time and state/action space by relying on stochastic calculus that has been recently developed for MKV equations. Our main theoretical result is to obtain a policy gradient representation for value function with
randomised parametric policies and entropy regularisers for encouraging exploration. Based on this representation, we design model-free actor critic algorithms involving either the whole trajectories of the state (off-line learning), or the current and next state (online learning). In the mean-field context, a key issue is to handle the population state distribution, which is an input of the policy (actor) and value function (critic), and instead of assuming that we have at disposal a simulator of the state distribution as in <cit.>, we estimate it in a model-free manner as in <cit.>, which is more suitable for real-world applications. We next study the linear quadratic (LQ) case for which we derive explicit solutions, and this can be used for proposing an exact parametrisation of the critic and actor functions that is incorporated in stochastic gradient when updating the policies and value functions. The explicit solutions in the LQ setting are served as benchmarks for the numerical results of our algorithms in two examples.
The rest of the paper is organized as follows. In Section <ref>, we formulate the mean-field control problem in continuous-time with randomised policies and entropy regularisers, and state the partial differential equation (PDE) characterisation of the value function in the Wasserstein space. We develop in Section <ref> policy gradient methods by establishing a policy gradient representation, and its implication for actor-critic algorithms. Section <ref> is devoted to the linear-quadratic setting, and we present in Section <ref> numerical results on two examples to illustrate the accuracy of our algorithms. Finally, proofs of the policy gradient theorem are detailed in Appendix
<ref>, while the derivation of the explicit solution in the LQ case is shown in Appendix <ref>.
Notations.
The scalar product between two vectors x and y is denoted by x · y, and | · | is the Euclidian norm.
Given two matrices M=(M_ij) and N=(N_ij), we denote by M:N=Tr(M N)=∑_i,j M_ij N_ij its inner product, and by |M| the Frobenius norm of M.
Here is the transpose matrice operator.
Let =(_i_1i_2i_3)∈^d_1× d_2× d_3 be a tensor of order 3. For p=1,2,3, the p-mode product of with a vector b=(b_i)∈^d_p, is denoted by ∙_p b, and it is a tensor of order 2, i.e. a matrix
defined elementwise as
( ∙_1 b)_i_2i_3 = ∑_i_1=1^d_1 M_i_1i_2i_3 b_i_1, ( ∙_2 b)_i_1i_3 = ∑_i_2=1^d_2 M_i_1i_2i_3 b_i_2, ( ∙_3 b)_i_1i_2 = ∑_i_3=1^d_3 M_i_1i_2i_3 b_i_3.
The p-mode product of a 3-th order tensor M∈^d_1× d_2× d_3 with a matrix B=(B_ij)∈^d_p× d, also denoted by M∙_p B, is a 3-th order
tensor
defined elementwise as
(M∙_1 B )_ℓ i_2i_3 = ∑_i_1 =1^d_1 M_i_1i_2i_3 B_i_1ℓ, (M∙_2 B )_i_1ℓ i_3 = ∑_i_2 =1^d_2 M_i_1i_2i_3 B_i_2ℓ
( ∙_3 B)_i_1i_2ℓ = ∑_i_3=1^d_3 M_i_1i_2i_3 B_i_3ℓ.
Finally, the tensor contraction (or partial trace) of a 3-th order tensor M∈^d_1× d_2× d_3 whose dimensions d_p and d_q are equal is denoted as Tr_p,qM. This tensor contraction is a tensor of order 1, i.e. a vector, defined elementwise as
(Tr_1,2M)_i_3 = ∑_ℓ=1^d_1 M_ℓℓ i_3, (Tr_1,3M)_i_2 = ∑_ℓ=1^d_1 M_ℓ i_2 ℓ, (Tr_2,3M)_i_1 = ∑_ℓ=1^d_2 M_i_1 ℓℓ.
§ EXPLORATORY FORMULATION OF MEAN-FIELD CONTROL
Let us consider a mean-field control problem where the ^d-valued controlled state process X=X^α is governed by the dynamics
X̣_s = b(X_s,_X_s,α_s) ṣ + σ(X_s,_X_s,α_s) Ẉ_s, s ≥ 0,
with W a standard p-dimensional Brownian motion on a probability space (Ω,,) equipped with the filtration =(_t)_t≥ 0 generated by W, and augmented with a σ-algebra rich enough to support a uniformly distributed random variable
independent of W. The control α=(α_t)_t is an -progressively measurable process with α_t representing the action of the agent at time t, and valued in the action space A⊂^q. Here, _X_t denotes the marginal law of X_t,
_2(^d) is the Wasserstein space of probability measures μ with a finite second order moment, i.e., M_2(μ):=(∫ |x|^2 μ(x̣))^1 2<∞,
equipped with the Wasserstein distance _2, and the coefficient b (resp. σ) is a measurable function from ^d×_2(^d)× A into ^d (resp. ^d× p).
Throughout the paper, we make the standard Lipschitz assumptions on the coefficients b and σ to ensure the existence and uniqueness of a strong solution
to the stochastic differential equation (SDE in short) (<ref>) given any initial condition ξ with law μ∈_2(^d).
The objective of a mean-field control problem on finite horizon T<∞, is
to minimize over the control α an expected total cost of the form
[ ∫_0^T e^-β s f(X_s,_X_s,α_s) ṣ + e^-β T g(X_T,_X_T) ].
Here f is a running cost function defined on ^d×_2(^d)× A, while g is a terminal cost function on ^d×_2(^d), and β∈_+ is a given discount factor. In a model-based setting, i.e., when the coefficients b, σ, and the functions f, g are known, the solution to MFC control problem can be characterised by a forward backward SDE arising from the maximum principle (see <cit.>, or by a Master Bellman equation arsing from dynamic programming principle (see <cit.>). Moreover, the optimisation over -progressively measurable process α (open-loop control),
or feedback (also called closed-loop) controls α, i.e., in the form α_t=π(t,X_t,_X_t), 0≤ t≤ T, for some deterministic policy π, i.e., a measurable function π:[0,T]×^d×_2(^d)→A, yields the same value function.
In a model-free reinforcement learning (RL) setting, when the coefficients are unknown, the agent can only rely on observation samples of state and reward in order to learn the optimal strategy. This is achieved by trial and error where the agent tries a policy, receive and evaluate the reward and then improve performance
by repeating this procedure. A critical issue in reinforcement learning when the environment is unknown, is exploration in order to broaden search space, and a key and now common idea is to use randomised (or stochastic) policies: in a mean-field setting, this is defined by a probability transition kernel from
[0,T]×^d×_2(^d) into A, i.e., a measurable function π:(t,x,μ)∈[0,T]×^d×_2(^d)↦π(.|t,x,μ)∈(A), the set of probability measures on A.
We then say that the process α=(α_t)_t is a randomised feedback control generated from a stochastic policy π, denoted by α∼π, if at each time t, the action α_t is sampled from the probability distribution π(.|t,X_t,_X_t). Note that the sampling is drawn at each time
from the σ-algebra rich enough to support a uniformly distributed random variable independent of W. More precisely, it is defined as follows: given a probability transition kernel π, one can associate a measurable function ϕ_π:[0,T]×^d×_2(^d)× [0,1]→A such that
the law of ϕ_π(t,x,μ,U) is π(.|t,x,μ) where U is an uniform random variable on [0,1]. We would then naturally define the control process by α_t=ϕ_π(t,X_t,_X_t,U_t), 0≤ t≤ T,
for a collection of -measurable i.i.d. uniform random variables (U_t)_t, but this raises some measurability issues as
(t,ω)↦U_t(ω) is not jointly measurable in the usual product space ([0,T]×Ω,_[0,T]⊗,ṭ⊗). To cope these issues, one can use the notion of Fubini extension, see <cit.>. We consider an atomless probability space ([0,T],,ρ) extending the usual Lebesgue measure interval space
([0,T],_[0,T],ṭ), and a rich Fubini extension ([0,T]×Ω,⊠,ρ⊠) of the product space ([0,T]×Ω,⊗,ρ⊗). Then, from Theorem 1 in <cit.>, there exists a ⊠-measurable map :[0,T]×Ω→[0,1] such that the random variables
U_t=(t,.) are essentially pairwise independent, and uniformly distributed on [0,1]. Denote by the filtration generated by (W,), and consider the controlled process governed by
X̣_s = b(X_s,_X_s,α_s) ṣ + σ(X_s,_X_s,α_s) Ẉ_s,
where α_t=ϕ_π(t,X_t,_X_t,U_t)∼π(.|t,X_t,_X_t), 0≤ t≤ T, is -progressively measurable. Here, to alleviate notations, we write ρ(ṭ)≡ṭ.
Moreover, in order to encourage exploration of randomised policies, we shall substract entropy regularisers to the cost term, as adopted in the recent works by <cit.>, <cit.>, by considering the Shannon differential entropy defined as
(π(.|t,x,μ)) := - ∫_A log p(t,x,μ,a) π(ạ|t,x,μ),
by assuming that π(.|t,x,μ) admits a density p(t,x,μ,.) with respect to some measure ν on A.
The goal of the social planner is now to minimise over randomised policies π the cost
J(π) = _α∼π[ ∫_0^T e^-β s[ f(X_s,_X_s,α_s) - λ( π(.|s,X_s,_X_s) ) ] ṣ + e^-β T g(X_T,_X_T) ],
where λ≥0 is a temperature parameter on exploration. Here, the notation in _α∼π[.] means that the expectation operator is taken when the randomised feedback control α is generated from the stochastic policy π, and X=X^α is driven by the dynamics (<ref>).
Let us now introduce the dynamic Markovian version of the above mean-field problem.
Given a stochastic policy π, an initial time-state-distribution triple (t,x,μ)∈[0,T]×^d×_2(^d), and ξ∈L^2(_t;^d) (the set of square-integrable _t-measurable random variables valued in ^d) with distribution law μ (ξ∼μ), we consider the decoupled state processes {X_s^t,ξ,t≤ s≤ T} and {X_s^t,x,ξ,t≤ s≤ T} given by
X_s^t,ξ = ξ + ∫_t^s b(X_r^t,ξ,_X_r^t,ξ,α_r) ṛ + ∫_t^s σ(X_r^t,ξ,_X_r^t,ξ,α_r) Ẉ_r,
X_s^t,x, μ = x + ∫_t^s b(X_r^t,x, μ,_X_r^t,ξ,α_r) ṛ + ∫_t^s σ(X_r^t,x, μ,_X_r^t,ξ,α_r) Ẉ_r, t ≤ s ≤ T,
where α is a randomised feedback control generated from π, i.e., α_s is sampled at each time s from π(.|s,X_s^t,x, μ,_X_s^t,ξ) (here, to alleviate notations, we omit the dependence of X^t,ξ and X^t,x, μ in α∼π).
We make the standard Lipschitz regularity assumptions on the coefficients b and σ to ensure the existence and uniqueness of a strong solution to (<ref>) given any initial condition t, ξ, x.
By weak uniqueness, it follows that the law of the process (X_s^t, ξ)_s∈ [t, T] given by the unique solution to the first SDE in (<ref>) only depends upon ξ through its law μ. It thus makes sense to consider (_X_s^t,ξ)_s∈ [t, T] as a function of μ without specifying the choice of the random variable ξ that has μ as distribution. In particular, for any 0≤ t≤ s≤ T, the random variable X_s^t,x,μ depends on
ξ only through its law μ. As a consequence, we can define the cost value function of the stochastic policy π as the function defined on [0,T]×^d×_2(^d) by
V^π(t,x,μ) = _α∼π[ ∫_t^T e^-β (s-t)[ f(X_s^t,x, μ, _X_s^t,ξ,α_s) - λ( π(.|s,X_s^t,x,μ,_X_s^t,ξ) ) ] ṣ
+ e^-β (T-t) g(X_T^t,x, μ,_X_T^t,ξ) ].
Since X_s^t, ξ, ξ = X_s^t, ξ a.s., the initial cost value in (<ref>) when starting from some initial random state ξ∈L^2(;^d) with law μ is equal to J(π)=_ξ∼μ[V^π(0,ξ,μ)].
We complete this section by characterizing the cost value function V^π, for a given stochastic policy π, in terms of a linear parabolic partial differential equation (PDE) of mean-field type stated in the strip [0,T] ×ℝ^d ×𝒫_2(ℝ^d). We first introduce the coefficients associated to the dynamics and the value function, given a stochastic policy π, namely
b_π(t,x,μ) = ∫_A b(x,μ, a) π(ạ|t,x,μ), Σ_π(t,x,μ) = ∫_A (σσ)(x,μ,a) π(ạ|t, x,μ),
f_π(t,x,μ) = ∫_A f(x, μ, a) π(ạ|t,x,μ), E_π(t,x,μ) = - ∫_A log p(t,x,μ,a) π(ạ|t,x,μ),
and let σ_π := Σ_π^1/2.
Before presenting the regularity assumptions, we introduce some notations regarding the Wasserstein derivative (also called L-derivative) of a real-valued smooth map U defined on _2(^d). We follow the common practice of denoting by ∂_μ U(μ)(v) ∈^d the Wasserstein derivative of U with respect μ evaluated at (μ, v) ∈_2(^d) ×^d. Its ith coordinate is denoted by ∂^i_μ U(μ)(v). We will also work with higher order derivatives. For a positive integer n, a multi-index λ of {1, ⋯, d}, a n-tuple of multi-indices γ=(γ_1, ⋯, γ_n) of {1, ⋯, d} and v = (v_1, ⋯, v_n)∈ (ℝ^d)^n, we denote by ∂_μ^λU(μ)(v) the derivative ∂^λ_n_μ[⋯ [∂^λ_1_μ U(μ)](v_1)⋯](v_n). If v↦∂_μ^λU(μ)(v) is smooth, we write ∂^γ_v∂_μ^λU(μ)(v) for the derivative ∂^γ_n_v_n⋯∂^γ_1_v_1∂_μ^λU(μ)(v).
We will often deal with maps that depend on additional time and space variables. In particular, we will work with the two spaces 𝒞^2, 2(^d ×_2(^d)) and 𝒞^1, 2, 2([0,T] ×^d ×_2(^d)) and refer the reader to <cit.> Chapter 5 for more details.
Having these notations at hand, we make the following regularity assumptions on the coefficients b_π , σ_π, the cost functions f_π, g and the Shannon differential entropy E_π. Below, π:[0,T] ×ℝ^d ×𝒫_2(ℝ^d) →𝒫(A) is a fixed stochastic policy.
(i) For any h ∈{ b^i_π, σ_π^i, j, i=1, ⋯, d, j = 1, ⋯, p}, the following derivatives
∂_x h(t, x, μ), ∂^2_x h(t, x, μ), ∂_μ h(t, x, μ)(v), ∂_v [∂_μ h(t, x, μ)](v),
exist for any (t, x, v, μ) ∈ [0,T] × (^d)^2 ×_2(^d), are bounded and locally Lipschitz continuous with respect to x, μ, v uniformly in t∈ [0,T]. Moreover, h(t, .) is at most of linear growth, uniformly in t∈ [0,T], namely, there exists C<∞ such that for all t, x, μ
|h(t, x, μ)| ≤ C (1+ |x| + M_2(μ)).
(ii) For any t∈ [0,T], f_π (t, .), E_π(t, .), g ∈𝒞^2,2(ℝ^d ×_2(ℝ^d)).
(iii) There exists some constant C< ∞, such that for any (t, x, v,μ)∈[0,T]×(^d)^2×_2(^d),
|f_π (t, x, μ)| + |E_π(t, x, μ)| + |g(x, μ)| ≤ C (1 + |x|^2 + M_2(μ)^q),
| ∂_x f_π (t, x, μ)| + |∂_x E_π(t, x, μ)| + |∂_x g(x, μ)| ≤ C (1+ |x| + M_2(μ)^q),
| ∂_μ f_π (t, x, μ)(v) | + |∂_μ E_π(t, x, μ)(v)| + |∂_μ g(x, μ)(v)| ≤ C (1+ |x| + |v| + M_2(μ)^q),
| ∂_v [∂_μ f_π (t, x, μ)](v) |+ | ∂^2_x f_π (t, x, μ)| + |∂_v [∂_μ E_π(t, x, μ)](v)| + |∂^2_x E_π(t, x, μ)|
+ |∂_v [∂_μ g(x, μ)](v)| + |∂^2_x g(x, μ)| ≤ C (1+ M_2(μ)^q),
for some q≥ 0.
It is readily seen from the integral form of b_π, Σ_π, f_π, E_π that if for any a ∈ A, the functions (x, μ) ↦ b(x, μ, a), σ(x, μ, a), f(x, μ, a) and the density (x, μ) ↦ p(t, x, μ, a) of the probability measure π(ạ|t,x,μ) are smooth with derivatives satisfying some adequate estimates then Assumption 2.1 is satisfied. In particular, this will be the case when the coefficients b, σ are linear functions and f together with g are quadratic functions of the variables of x, ∫_^d z μ(ẓ) and a and if p is a Gaussian density with a smooth mean and a time-dependent covariance-matrix as in the linear quadratic framework, see Section <ref>.
We now have the following PDE characterisation of the cost value function V^π.
Under Assumption <ref>, the function V^π defined by (<ref>) belongs to C^1,2, 2([0,T]×^d×_2(^d)) and satisfies the following linear parabolic PDE
_π[V^π](t,x,μ) + (f_π - λ E_π)(t,x,μ) = 0, (t, x, μ) ∈ [0,T)×^d×_2(^d),
with the terminal condition V^π(T,x,μ)=g(x,μ), where
_π is the operator defined by
_π[φ](t,x,μ)
= - βφ(t, x, μ) + ∂_tφ(t,x,μ)
+ b_π(t,x,μ) · D_xφ(t,x,μ) + 1/2Σ_π(t,x,μ) : D_x^2 φ(t,x,μ)
+ _ξ∼μ[ b_π(t,ξ,μ) ·∂_μφ(t,x,μ)(ξ) + 1/2Σ_π(t,ξ,μ) : ∂_υ∂_μφ(t,x,μ)(ξ) ].
In particular, the above result indicates that provided the coefficients b_π, Σ_π, the functions f_π, E_π and the terminal condition g are smooth with derivatives satisfying some appropriate estimates, the solution V^π to the Kolmogorov PDE (<ref>) is smooth. In this sense, it preserves the regularity of the terminal condition.
However, one can weaken the regularity assumption on the terminal condition (and actually of the coefficients themselves) by benefiting from the smoothness of the underlying fundamental solution (or the transition density of the associated stochastic process) under some additional non-degeneracy assumption. We refer e.g. to <cit.>, <cit.>, <cit.> in the uniformly elliptic diffusion setting and to <cit.> in the case of non-degenerate stable driven SDE.
Proof. See Appendix <ref>
§ POLICY GRADIENT METHOD
We now consider a parametric family of randomised policies π_θ, with densities p_θ, θ∈Θ, Θ being a non-empty open subset of ^D, for some positive integer D,
and denote by (θ)=J(π_θ) the associated cost function, viewed as a function of the parameters θ, recalling that J is defined by (<ref>). The principle of
policy gradient method is to minimize over θ the function (θ) by stochastic gradient descent algorithm. In our RL setting, we aim to derive a probabilistic representation of the gradient function ∇_θ(θ) that does not involve model coefficients
b,σ, but only observation samples of state X_t, state distribution _X_t, and rewards f_t:=f(X_t,_X_t,α_t), g_T:=g(X_T,_X_T) when taking decision α∼π_θ.
§.§ Policy gradient representation
We make the following assumptions on the parametric family of randomised policy and coefficients.
(i) For any h ∈{ b^i_π_θ, σ_π_θ^i, j, f_π_θ, E_π_θ, g, i=1, ⋯, d, j = 1, ⋯, p}, any multi-indices α, β, λ of {1, ⋯, d} such that 0≤ |α| ≤ 2, 0≤ |β| ≤ 1, λ being of length n, 0≤ n ≤ 2, any n-tuple of multi-indices γ=(γ_1, ⋯, γ_n) with 0≤ |γ_1| + ⋯ + |γ_n|≤ 2, denoting by h_θ(t, x, μ) the value of h at (θ, t, x, μ), the following derivatives
∂^β_θ∂_x^α∂^γ_v∂^λ_μ h_θ(t, x, μ)(v), ∂_x^α∂^β_θ∂^γ_v∂^λ_μ h_θ(t, x, μ)(v), ∂^α_x∂^γ_v∂^β_θ∂^λ_μ h_θ(t, x, μ)(v), ∂^α_x∂^γ_v∂^λ_μ∂^β_θ h_θ(t, x, μ)(v),
∂^γ_v∂^α_x∂^λ_μ∂^β_θ h_θ(t, x, μ)(v), ∂^γ_v∂^λ_μ∂^α_x∂^β_θ h_θ(t, x, μ)(v), ∂^γ_v∂^λ_μ∂^β_θ∂^α_x h_θ(t, x, μ)(v), ∂^γ_v∂^β_θ∂^λ_μ∂^α_x h_θ(t, x, μ)(v),
∂^β_θ∂^γ_v∂^λ_μ∂^α_x h_θ(t, x, μ)(v), ∂^γ_v∂^β_θ∂^α_x∂^λ_μ h_θ(t, x, μ)(v),
∂^γ_v∂^α_x∂^β_θ∂^λ_μ h_θ(t, x, μ)(v), ∂^β_θ∂^α_x∂^γ_v∂^λ_μ h_θ(t, x, μ)(v),
exist for any (t,θ, x, v, μ) ∈ [0,T] ×Θ× (ℝ^d)^n+1×_2(ℝ^d) and are locally Lipschitz continuous with respect to θ, x, μ, v uniformly in t∈ [0,T][Hence, according to Clairaut's theorem, these partial derivatives are equal.]. Moreover, if h= b^i_π_θ or σ_π_θ^i, j, the aforementioned derivatives of order greater or equal to one are bounded.
(ii) The estimates of Assumption <ref>(iii) are satisfied for the family of policies {π_θ, θ∈Θ}, locally uniformly in θ, i.e. for any θ∈𝒦, 𝒦 being any compact subset of Θ. Additionally, there exists some constant C< ∞, such that for any h∈{f_π_θ, E_π_θ}, any (t, μ, x) ∈ [0,T] ×_2(ℝ^d) ×ℝ^d, any v= (v_1, v_2) ∈ (ℝ^d)^2, any θ∈𝒦, 𝒦 being any compact subset of Θ, any multi-index λ, |λ| =2, any multi-index λ=(λ_1, λ_2) of {1, ⋯, d}, any couple of multi-indices γ=(γ_1, γ_2)
| ∂_θ h_θ (t, x, μ)| ≤ C (1 + |x|^2 + M_2(μ)^q),
| ∂_θ∂_x h_θ (t, x, μ)| + |∂_x g(x, μ)| ≤ C (1+ |x| + M_2(μ)^q),
| ∂_θ∂_μ h_θ (t, x, μ)(v_1) | + | ∂_μ∂_x h_θ (t, x, μ)(v_1) | + | ∂_μ∂_x g ( x, μ)(v_1) |≤ C (1+ |x| + |v_1| + M_2(μ)^q),
| ∂_θ∂_v_1∂_μ h_θ (t, x, μ)(v_1) |+ | ∂_θ∂^2_x h_θ (t, x, μ)| + | ∂_μ∂^2_x h_θ (t, x, μ)(v_1)| + | ∂_v^γ∂^λ_μ h_θ(t, x, μ)(v)|
+ |∂_v_1∂_μ g(x, μ)(v_1)| + |∂^2_x g(x, μ)| + | ∂_v^γ∂^λ_μ g(t, x, μ)(v)|≤ C (1+ M_2(μ)^q),
for some q≥ 0.
As shown in Appendix <ref>, Assumption <ref> guarantees that the derivatives (t, θ, x, μ, v)↦∂_θ∂_t _θ(t, x, μ),
∂_θ_θ(t, x, μ), ∂_θ∂_x_θ(t, x, μ), ∂_θ∂_μ_θ(t, x, μ)(v), ∂_θ∂^2_x_θ(t, x, μ), ∂_θ∂_v∂_μ_θ(t, x, μ)(v), where _θ(t, x, μ):=V^π_θ(t, x, μ) defined by (<ref>) with π=π_θ, exist, are continuous and satisfy suitable growth conditions.
We then let ∇_θ(θ)=[_θ(0, ξ, μ)] where _θ(t, x, μ) := ∇_θ_θ(t, x, μ). The main result of this section provides a probabilistic representation of the gradient function _θ.
Suppose that Assumption <ref> holds. Assume moreover that for any t, x, μ, a, the map Θ∋θ↦ p_θ(t, x, μ, a) is differentiable with a derivative satisfying the following estimates: for some constant C<∞ and some q≥0, for any (t,x, μ) ∈ [0,T] ×^d ×_
2(^d) and any compact subset 𝒦⊂Θ.
∫_Asup_θ∈𝒦 { | ∇_θ p_θ(t, x, μ, a)| ( |b(x, μ, a)| + |(σσ)^(x, μ, a)|
+ |f(x, μ, a)| + |log(p_θ(t, x, μ, a))|) }ν(ạ) < ∞,
and
∫_A | ∇_θlog(p_θ(t, x, μ, a))|^2 |σ(x, μ, a)|^2 p_θ(t, x, μ, a) ν(ạ) ≤ C (1+ |x|^q + M_2(μ)^q).
Then, it holds
_θ(t,x,μ) = _α∼π_θ[ ∫_t^T e^-β(s-t)∇_θlog p_θ(s,X_s^t,x,μ,_X_s^t,ξ,α_s) {_θ(s,X_s^t,x,μ,_X_s^t,ξ)
+ [ f(X_s^t,x,μ,_X_s^t,ξ,α_s) + λlog p_θ(s,X_s^t,x,μ,_X_s^t,ξ,α_s) - β_θ(s,X_s^t,x,μ,_X_s^t,ξ) ] ṣ}
+ ∫_t^T e^-β(s-t)_θ[_θ](s,X_s^t, x,μ,_X_s^t,ξ) ṣ],
for any (t,x,μ, θ)∈[0,T]×^d×_2(^d) ×Θ and ξ∼μ, where _θ is the operator defined by
_θ[φ](t,x,μ) = _ξ∼μ[ ∇_θ b_θ(t,ξ,μ) ∂_μφ(t,x,μ)(ξ)
+ 1/2 tr_1,2( ∇_θΣ_θ(t,ξ,μ) ∙_1 ∂_υ∂_μφ(t,x,μ)(ξ)) ],
and we set b_θ(t,x,μ)=∫_A b(x,μ,a) π_θ(ạ|t,x,μ), Σ_θ(t,x,μ) = ∫_A (σσ)(x,μ,a) π_θ(ạ|t,x,μ). Here ∇_θΣ_θ=(∂Σ_θ^ij/∂θ_k)_i,j,k∈^d× d× D is a tensor of order 3, and we used the product tensor notations ∙_1 recalled in the introduction.
[On the martingale property of the policy gradient]
Notice that for any function B on [0,T]×^d×_2(^d) (called baseline function), we have for all 0≤ t≤ s≤ T,
_α∼π_θ[ ∇_θlog p_θ(s,X_s^t,x,ξ,_X_s^t,ξ,α_s) B(s,X_s^t,x,ξ,_X_s^t,ξ) ] = 0.
Indeed,
_α∼π_θ[ ∇_θlog p_θ(s,X_s^t,x,ξ,_X_s^t,ξ,α_s) B(s,X_s^t,x,ξ) | X_s^t,x,ξ]
= B(s,X_s^t,x,ξ,_X_s^t,ξ) ∫_A ∇_θlog p_θ(s,X_s^t,x,ξ,_X_s^t,ξ,a) π_θ(ạ| s,X_s^t,x,ξ,_X_s^t,ξ)
= B(s,X_s^t,x,ξ,_X_s^t,ξ) ∇_θ∫_A π_θ(ạ| s,X_s^t,x,ξ,_X_s^t,ξ) = 0.
The representation in Theorem <ref> also means that the process
{ e^-β(s-t)_θ(s,X_s^t,x,μ,_X_s^t,ξ) + ∫_t^s e^-β(r-t)∇_θlog p_θ(r,X_r^t,x,μ,_X_r^t,ξ,α_r) {_θ(r,X_r^t,x,μ,_X_r^t,ξ)
+ [ f(X_r^t,x,μ,_X_r^t,ξ,α_r) + λlog p_θ(r,X_r^t,x,μ,_X_r^t,ξ,α_r) - β_θ(r,X_r^t,x,μ,_X_r^t,ξ) ] ṛ}
+ ∫_t^s e^-β(r-t)_θ[_θ](r,X_r^t,x,μ,_X_r^t,ξ) ṛ, t ≤ s ≤ T}
is a martingale, for any given α∼π_θ.
Proof. See Appendix <ref>
In the next section, we show how the probabilistic representation formula of the gradient function _θ provided by Theorem <ref> can be used to design two actor-critic algorithms for learning optimal cost function and randomised policy by relying on samples of the actions, states and state distributions.
§.§ Actor-critic Algorithms
Actor-critic (AC) methods combine policy gradient (PG) and performance evaluation (PE). Compared to most existing works on RL for mean-field problems, mainly based on Q-learning (see e.g. <cit.>, <cit.>, <cit.>)
we do not assume that the agent (the social planner) has at disposal a simulator for the state distribution, but instead will estimate the distribution of the population from the observation of the state of the representative player and by updating the distribution along repeated episodes. More precisely, for each episode i=1,2,…,N, from the observation of the state X_t_k^i of a representative player i at time t_k, we update the state distribution according to
μ_t_k^i = (1-ρ^i_S) μ_t_k^i-1 + ρ^i_S δ_X_t_k^i,
where (ρ^i_S)_i is a sequence of learning parameters in (0,1), e.g. ρ^i_S=1/i. It is expected from the propagation of chaos, that when the number of episodes N goes to infinity, μ_t_k^N converge to the limiting distribution _X_t_k of the population.
Notice that a similar estimation procedure was recently proposed in <cit.> in the context of a MFC control problem in discrete time with finite state and action spaces over an infinite horizon.
In addition to the family of randomised policies (t,x,μ)↦π_θ(ạ|t,x,μ)=p_θ(t,x,μ)ν(ạ), with parameter θ, we are given a family of functions (t,x,μ)↦^η(t,x,μ) on [0,T]×^d×_2(^d), with parameter η, aiming to approximate the optimal cost value function.
AC algorithm is then updating alternately the two parameters to find the optimal pair (θ^*,η^*), hence determining the approximate optimal randomised policy and the associated cost value function. On the one hand,
the loss function in the PE step for learning ^η, for fixed policy π_θ, is based on the martingale formulation of the process
{ e^-β t^η(t,X_t^x,μ,_X_t^ξ) + ∫_0^t e^-β r[ f(X_r^x, μ,_X_r^ξ,α_r) + λlog p_θ(r,X_r^x,μ,_X_r^ξ,α_r) ] ṛ, 0 ≤ t ≤ T},
and on the other hand, the objective (here a cost) function in the PG step for learning π_θ, for fixed ^η, is based on the martingale formulation of the process
{ e^-β t_θ(t,X_t^x,μ,_X_t^ξ) + ∫_0^t e^-β r∇_θlog p_θ(r,X_r^x,μ,_X_r^ξ,α_r) [ ^η(r,X_r^x,μ,_X_r^ξ)
+ ( f(X_r^x,μ,_X_r^ξ,α_r) + λlog p_θ(r,X_r^x,μ,_X_r^ξ,α_r) - β^η(r,X_r^x,μ,_X_r^ξ) ) ṛ]
+ _θ[^η](r,X_r^x,μ,_X_r^ξ) ṛ, 0 ≤ t ≤ T}.
Here, we denote X^x,μ=X^0,x,μ (resp. X^ξ=X^0,ξ) when the initial time of the flow is t=0.
We emphasise that these loss functions are minimised by training samples of the state trajectories X_t^x_0,ξ, actions α∼π_θ, estimation μ_t of _X_t^ξ according to (<ref>), and observation of the associated running and terminal costs.
We first develop AC algorithms in the offline setting where all state trajectories are sampled. In this case, given θ, the proposed loss function for the PE step is
L^PE(η) = _α∼π_θ[ ∫_0^T | e^-β(T-t) g(X_T,_X_T)
+ ∫_t^T e^-β(r-t)[ f(X_r,_X_r,α_r) + λlog p_θ(r,X_r^,_X_r^,α_r)] ṛ - ^η(t,X_t,_X_t) |^2 ṭ],
which leads, after time discretisation of [0,T] on the grid {t_k = k Δ t, k=0,…,n},
and by applying stochastic gradient descent (SGD) with learning rate ρ_E, to the following update rule:
η ← η + ρ_E ∑_k=0^n-1( e^-β(n-k)Δ t g_t_n + ∑_ℓ=k^n-1 e^-β(ℓ-k)Δ t[ f_t_ℓ + λlog p_θ(t_ℓ,X_t_ℓ,μ_t_ℓ,α_t_ℓ)] Δ t
- ^η(t_k,X_t_k,μ_t_k) ) ∇_η^η(t_k,X_t_k,μ_t_k) Δ t,
where we set f_t_ℓ=f(X_t_ℓ,_X_t_ℓ,α_t_ℓ), as the output running cost at time t_ℓ, for an input state X_t_l, action α_t_ℓ, ℓ=0,…,n-1,
and g_T=g(X_T,_X_T) the terminal cost for an input X_T.
Given η, the learning in the PG step relies on the gradient representation (<ref>), and (after time discretisation) leads to the update rule
θ ← θ - ρ_G Ĝ_θ,
Ĝ_θ = ∑_k=0^n-1 e^-β t_k∇_θlog p_θ(t_k,X_t_k,μ_t_k,α_t_k) [ ^η(t_k+1,X_t_k+1,μ_t_k+1) - ^η(t_k,X_t_k,μ_t_k)
+ ( f_t_k + λlog p_θ(t_k,X_t_k,μ_t_k,α_t_k) - β^η(t_k,X_t_k,μ_t_k) ) Δ t ] + _θ[^η](t_k,X_t_k,μ_t_k) Δ t.
The pseudo-code is described in Algorithm <ref>.
[H]
Input data: Number of episodes N, number of mesh time-grid n (↔ time step Δ t=T/n), learning rates ρ_S^i, ρ_E^i, ρ_G^i for the state distribution, PE and PG estimation, and function of the number of episodes i.
Parameter λ for entropy regularisation.
Functional forms ^η of cost value function, p_θ of density policies.
Initialisation: μ_t_k: state distribution on ^d, for k=0,…,N, parameters η, θ.
each episode i=1,…,NInitialise state X_0∼μ_0
k=0,…,n-1Update state distribution: μ_t_k←(1-ρ_S^i) μ_t_k + ρ_S^i δ_X_t_k
Generate action α_t_k∼π_θ(.|t_k,X_t_k,μ_t_k)
Observe (e.g. by environment simulator) state X_t_k+1 and cost f_t_k
If k=n-1, update terminal state distribution: μ_t_n←(1-ρ_S) μ_t_n + ρ_S δ_X_t_n, and observe terminal cost g_t_n
k←k+1Compute
Δ_η = ∑_k=0^n-1( e^-β(n-k)Δ t g_t_n + ∑_ℓ=k^n-1 e^-β(ℓ-k)Δ t[ f_t_ℓ + λlog p_θ(t_ℓ,X_t_ℓ,μ_t_ℓ,α_t_ℓ)] Δ t
- ^η(t_k,X_t_k,μ_t_k) ) ∇_η^η(t_k,X_t_k,μ_t_k) Δ t
Ĝ_θ = ∑_k=0^n-1 e^-β t_k∇_θlog p_θ(t_k,X_t_k,μ_t_k,α_t_k) [ ^η(t_k+1,X_t_k+1,μ_t_k+1) - ^η(t_k,X_t_k,μ_t_k)
+ ( f_t_k + λlog p_θ(t_k,X_t_k,μ_t_k,α_t_k) - β^η(t_k,X_t_k,μ_t_k) ) Δ t ] + _θ[^η](t_k,X_t_k,μ_t_k) Δ t.
Critic Update: η←η + ρ_E^i Δ _η; Actor Update: θ←θ - ρ_G^i Ĝ_θ Return: ^η, π_θOffline actor-critic mean-field algorithm
We next develop AC algorithm for online setting where only past sample trajectory is available, and so the parameters (θ,η) are updated in real-time incrementally. In this case, given a policy π_θ, we consider at each time step t_k, k=0,…,n-1, a loss function for PE
given by
L_t_k^PE(η) = _α∼π_θ[ | ^η(t_k+1,X_t_k+1,_X_t_k+1) - ^η(t_k,X_t_k,_X_t_k)
+ ( f(X_t_k,_X_t_k,α_t_k) + λlog p_θ(t_k,X_t_k,_X_t_k,α_t_k) - β^η(t_k,X_t_k,_X_t_k)) Δ t |^2 ].
Concerning PG, we note that when θ is an optimal parameter, we should have _θ=0. Therefore, from the martingale condition in (<ref>), this suggests to find θ such that at any time t_k, k=0,…,n-1_α∼π_θ{∇_θlog p_θ(t_k,X_t_k,_X_t_k,α_t_k) [ ^η(t_k+1,X_t_k+1,_X_t_k+1) - ^η(t_k,X_t_k,_X_t_k)
+ ( f(X_t_k,_X_t_k,α_t_k) + λlog p_θ(t_k,X_t_k,_X_t_k,α_t_k) - β^η(t_k,X_t_k,_X_t_k) ) Δ t ] + _θ[^η](t_k,X_t_k,μ_t_k) Δ t }
= 0.
The pseudo-code is described in Algorithm <ref>.
[H]
Input data: Number of episodes N, number of mesh time-grid n (↔ time step Δ t=T/n), learning rates ρ_S^i, ρ_E^i, ρ_G^i for the state distribution, PE and PG estimation, and function of the number of episodes i. Parameter λ for entropy regularisation.
Functional forms ^η of cost value function, p_θ of density policies.
Initialisation: μ_t_k: state distribution on ^d, for k=0,…,n, parameters η, θ.
each episode i=1,…,NInitialise state X_0∼μ_0
k=0,…,n-1Update state distribution: μ_t_k←(1-ρ_S^i) μ_t_k + ρ_S^i δ_X_t_k
Generate action α_t_k∼π_θ(.|t_k,X_t_k,μ_t_k)
Observe (e.g. by environment simulator) state X_t_k+1 and cost f_t_k
If k=n-1, update terminal state distribution: μ_t_k+1←(1-ρ_S^i) μ_t_k+1 + ρ_S^i δ_X_t_k+1, and observe terminal cost g_t_k+1
Compute
δ_η = ^η(t_k+1,X_t_k+1,μ_t_k+1) - ^η(t_k,X_t_k,μ_t_k)
+ ( f_t_k + λlog p_θ(t_k,X_t_k,μ_t_k,α_t_k) - β^η(t_k,X_t_k,μ_t_k) ) Δ t
Δ_η = δ_η∇_η^η(t_k,X_t_k,μ_t_k)
Δ_θ = δ_η∇_θlog p_θ(t_k,X_t_k,μ_t_k,α_t_k) + _θ[^η](t_k,X_t_k,μ_t_k) Δ t,
with the constraint that when k=n-1, ^η(t_k+1,X_t_k+1,μ_t_k+1)=g_t_k+1.
Critic Update: η←η + ρ_E^i Δ _η; Actor Update: θ←θ - ρ_G^i Δ_θ
k←k+1 Return: ^η, π_θOnline actor-critic mean-field algorithm [About the choice of actor and critic parametric functions]
In the Actor-critic algorithms, we have to specify a parametric family of randomised policies π_θ, and a parametric family of critic functions ^η. In general, for critic functions, one can consider cylindrical neural network functions in the form
^η(t,x,μ) = Ψ(t,x, <φ,μ>), (t,x,μ) ∈ [0,T]×^d×_2(^d),
where Ψ is a feedforward neural network from [0,T]×^d×^k into , and φ is another feedforward neural network from ^d into ^k (called latent space), and we use the notation
<ϕ,μ>:=∫ϕ(x)μ(x̣). The set of parameters η is the union of the parameter sets for the two neural networks Ψ and φ.
This choice is motivated by the density property of the set of cylindrical functions, i.e. functions in the form (<ref>) with continuous functions Ψ and φ, with respect to continuous functions on [0,T]×^d×_2(^d) as shown in <cit.>,
and the universal approximation property of feedforward neural networks on finite-dimensional space, see <cit.>.
Concerning the policies, notice that when the temperature parameter for exploration λ is zero, the optimal policy is of pure (non randomised) feedback form as a function of (t,x,μ). When
λ>0, the optimal policy is in general truly randomised, and the larger is λ, the larger is the exploration in the sense that the variance of the randomised policy increases. We can then take for the parametric family of randomised policies, for example Gaussian distributions:
π_θ(.|t,x,μ) = ( (t,x,μ); ϑ(λ) ),
where is a cylindrical neural network function on [0,T]×^d×_2(^d) valued in A⊂^m, and ϑ(.) is a given symmetric matrix-valued function, nondecreasing w.r.t. λ, with ϑ(λ) positive-definite for λ>0, and ϑ(0)=0.
In some particular mean-field models, we may know a priori the structural form of the optimal value function and optimal randomised policy, and this suggests alternately some specific form for the parametric family of actor and critic functions. This is typically the case of the linear quadratic model, as presented in the next section.
The above actor-critic algorithms involve the computation of the term _θ[^η] at each time t_k, and along the observed state X_t_k and estimated state distribution μ_t_k. This additional term, compared to the actor-critic algorithms designed in <cit.> for standard stochastic control without mean-field interaction, involves the operator _θ defined in (<ref>). In the separable form case, namely when the coefficients of the mean-field process are in the form
b(x,μ,a) = (x,μ) + C(a), (σσ)(x,μ,a) = Σ(x,μ) + F(a),
where C and F are known functions from A into ^d, resp. ^d× d, we notice that
∇_θ b_θ(t,x,μ) = ∇_θ C_θ(t,x,μ), C_θ(t,x,μ) := ∫ C(a) π_θ(ạ|t,x,μ),
∇_θΣ_θ(t,x,μ) = ∇_θ F_θ(t,x,μ), F_θ(t,x,μ) := ∫ F(a) π_θ(ạ|t,x,μ),
are known functions, and consequently also the function _θ[^η]. Another important case where the term _θ[^η] is a known computable function is given in the linear quadratic framework as presented in the next section.
§ THE LINEAR QUADRATIC CASE
We focus on the important class of MFC control problem with linear state dynamics and quadratic reward, namely
b(x,μ,a) = B x + B̅μ̅+ C a, σ(x,μ,a) = γ + D x + D̅μ̅+ Fa,
f(x,μ,a) = x Qx + μ̅Q̅μ̅+ a N a + 2a Ix + 2aI̅μ̅+ 2M.x + 2H.a,
g(x,μ) = x P x + μ̅P̅μ̅+ 2L.x,
for (x,μ,a)∈^d×_2(^d)×^m, where we denote by μ̅=∫ x μ(x̣), B, B̅, D, D̅ are constant matrices in ^d× d, C, F are constant matrices in ^d× m, γ is a constant in ^d,
N is a symmetric matrix in _+^m, I, I̅∈^m× d, Q, Q̅, P, P̅ are symmetric matrices in ^d, with Q≥0, P≥0,
M, L∈^d, H∈^m.
In this case, the optimal value function to this LQ MFC problem with entropy regularisation when minimizing over randomised controls a functional cost as in (<ref>), is given by
v(t,x,μ) = (x - μ̅) K(t) (x-μ̅) + μ̅Λ(t)μ̅+ 2 Y(t).x + R(t),
where K (valued in ^d), Λ (valued in ^d), Y valued in ^d, and R valued in , are solutions to a system of ordinary differential equations on [0,T] given in (<ref>).
Moreover, the optimal randomised control is of feedback form with Gaussian distribution:
π^*(.|t,x,μ) = ( - S(t)^-1( U(t) x + (W(t) - U(t))μ̅+ O(t) ); λ/2 S(t)^-1),
where
S(t) = N + F K(t) F, O(t) = H + C Y(t) + F K(t) γ
U(t) = I + C K(t) + F K(t) D, W(t) = I + I̅ + C Λ(t) + F K(t) (D + D̅).
This is an extension of the mean-field LQ control without entropy and control randomization, and the proof that adapts arguments in <cit.> is reported in Appendix <ref>.
K̇ + KB + B K + D K D + Q
- (I+ F KD + C K)(N + F K F)^-1(I+ F KD + C K) = 0, t ∈ [0,T],
K(T) = P,
Λ̇+ Λ(B+B̅) + (B+B̅)Λ + (D+D̅)Λ (D+D̅) + Q + Q̅
- (I+ I̅+ F K(D+D̅) + CΛ)(N + F K F)^-1 (I + I̅ + F K(D+D̅) + CΛ) = 0, t ∈ [0,T],
Λ(T) = P + P̅,
Ẏ + (B + B̅) Y + (D+D̅) K γ + M
- ( I+ I̅+ F K(D+D̅) + CΛ)(N + F KF)^-1(H + F Kγ + C Y) = 0, t ∈ [0,T],
Y(T) = L,
Ṙ + γ K γ - (H + F Kγ + C Y)(N + F KF)^-1(H + F Kγ + C Y)
- λ m/2log(2π)-λ/2log|λ/2det(N+F K(t) F)| = 0, t ∈ [0,T],
R(T) = 0.
Moreover, the optimal randomised is in feedback form: π_t^*(ạ)=π̂(ạ | t,X_t^*,_X_t^*) with Gaussian distribution
π^*(.| t,x,μ) = ( - S_t^-1(U_t x + (V_t-U_t) μ̅+ O_t) ; λ/2 S_t^-1),
where
S_t = N+F K(t) F, O_t = H+ F K(t)γ +C Y(t),
U_t = I+F K(t)D +C K(t), V_t = I+I̅+F K(t)(D+D̅) +CΛ(t).
In a RL setting, the coefficients of the LQ model (<ref>)
are unknown, thus K, Λ, Y, and R cannot be solved from the system of ODEs, and S, O, U, and W are also unknown. We shall then employ our RL algorithms to solve the LQ problem in a model-free setting.
In view of the above structure of the optimal value function and randomised policy, we parametrise the cost value function by
^η(t,x,μ) = (x - μ̅) K^η(t) (x-μ̅) + μ̅Λ^η(t)μ̅+ 2 Y^η(t).x + R^η(t),
for some parametric functions K^η, Λ^η, Y^η, R^η on [0,T], with parameters η∈^p. On the other hand, we parametrise the randomised policies by
π_θ(.|t,x,μ) = ( ϕ_1^θ(t) x + ϕ_2^θ(t)μ̅+ ϕ_3^θ(t); Σ^θ(t) ),
for some parametric functions ϕ_1^θ,ϕ_2^θ,ϕ_3^θ,Σ^θ on [0,T], with parameter θ∈^q.
The parametric functions K^η, Λ^η, Y^η, R^η, and ϕ_1^θ,ϕ_2^θ,ϕ_3^θ,Σ^θ, could be in general neural networks on [0,T], but depending on the examples, we could take more specific forms, as discussed in the next section.
For parametrisation of the cost value function and randomised policies as in (<ref>), (<ref>), we see that
∂_μ^η(t,x,μ)(x') =
-2 K^η(t)(x-μ̅) + 2 Λημ̅, ∂_x'∂_μ^η(t,x,μ)(x') = 0,
∇_θ b_θ(t,x,μ) = C ∇_θϕ_1^θ(t) ∙_2 x + C ∇_θϕ_2^θ(t) ∙_2 μ̅+ C ∇_θϕ_3^θ(t)
and then
_θ[^η](t,x,μ) = 2 [ (∇_θϕ_1^θ(t) + ∇_θϕ_2^θ(t)) ∙_2 μ̅+ ∇_θϕ_3^θ(t) ] C( - K^η(t)(x-μ̅) + Λ^ημ̅),
which only involves, up to the knowledge of C, known functions of (t,x,μ). Notice also that when ϕ_1^θ=-ϕ_2^θ, and ϕ_3^θ≡0 (see below the example of mean-field systemic risk), then _θ[^η]≡0.
§ NUMERICAL EXAMPLES
§.§ Example 1: mean-field systemic risk
We consider a mean-field model of systemic risk introduced in <cit.>. This fits into a LQ MFC with
B̅ = - B > 0, C=1, γ > 0, D = D̅ = F = 0
I = - I̅ >0, Q + Q̅ = 0, N = 1/2, M=H=L=0, P + P̅ = 0,
and Q≥2I^2. We also take X_0 ∼(0,1). In this case, the solution to the system of ODEs (<ref>) yields the analytic expression:
K(t) = - 1/2[ B̅ + 2I - √(Δ)√(Δ)sinh(√(Δ)(T-t)) + (B̅ + 2I + 2P) cosh (√(Δ)(T-t))/√(Δ)cosh(√(Δ)(T-t)) +
(B̅ + 2I + 2P) sinh (√(Δ)(T-t))],
R(t) = γ^2/2ln[ cosh (√(Δ)(T-t)) + B̅ + 2I + 2P/√(Δ)sinh (√(Δ)(T-t)) ] - γ^2/2 (B̅ + 2I)(T-t)
-λ (T-t)/2log(2πλ)
with √(Δ)=√((B̅+2I)^2 + 2Q - 4I^2), and Λ=Y=0, while the optimal randomised policy is given by
π̂(.|t,x,μ) = ( ϕ(t)(x - μ̅) ; λ), ϕ(t) = -2(K(t) + I).
In view of these expressions, we shall use critic function as
^η(t,x,μ) = K^η(t) (x - μ̅)^2 + R^η(t),
for some parametric functions K^η and R^η on [0,T] with parameters η, and actor functions as
π_θ(.|t,x,μ) = ( ϕ^θ(t) (x -μ̅); λ),
log p_θ(t,x,μ,a) = - 1/2log(2πλ) -
|a - ϕ^θ(t)(x-μ̅)|^2/2λ,
for some parametric function ϕ^θ on [0,T] with parameter θ. As shown in Section <ref>, we notice that _θ[^η]=0.
We shall test with two choices of parametric functions:
* Exact parametrisation:
K^η(t) = - 1/2[ η_3 - η_1 sinh(η_1(T-t)) + η_2 cosh (η_1(T-t))/cosh(η_1(T-t)) +
η_2 sinh (η_1(T-t))],
R^η(t) = η_4 ln[ cosh (η_1(T-t)) + η_2 sinh (η_1(T-t)) ] - η_3 η_4(T-t) -λ (T-t)/2log(2πλ)
ϕ^θ(t) = θ_3 - θ_1 sinh(θ_1(T-t)) + θ_2 cosh (θ_1(T-t))/cosh(θ_1(T-t)) +
θ_2 sinh (θ_1(T-t)),
with parameters η=(η_1,η_2,η_3,η_4)∈_+^4, and θ=(θ_1,θ_2,θ_3)∈_+^3, so that the optimal solution in the model-based case corresponds to
η_1^*=√(Δ), η_2^*=B̅ + 2I + 2P, η_3^*=B̅ + 2I, η_4^*=γ^2/2, and θ_1^*=√(Δ), θ_2^*=B̅ + 2I + 2P, θ_3^*=B̅.
* Neural networks: for K^η, R^η and ϕ^θ, with time input.
Compute for i=1,…,4,
∂ K^η/∂η_i = , ∂ R^η/∂η_i = ∂_η_1 K^η(t) = -1/2[η_1(T-t)( [sinh(η_1(T-t))+η_2cosh(η_1(T-t))/cosh(η_1(T-t))+η_2sinh(η_1(T-t))]^2-1)
- sinh(η_1(T-t))+η_2cosh(η_1(T-t))/cosh(η_1(T-t))+η_2sinh(η_1(T-t))],
∂_η_2K^η (t) = η_1/2 [ cosh(η_1(T-t))+η_2sinh(η_1(T-t)) ]^2, ∂_η_3K^η (t) = -1/2, ∂_η_4K^η (t) = 0,
∂_η_1R^η(t) = η_4 (T-t) sinh(η_1(T-t))+η_2cosh(η_1(T-t))/cosh(η_1(T-t))+η_2sinh(η_1(T-t))
∂_η_2R^η(t) = η_4sinh(η_1(T-t))/cosh(η_1(T-t))+η_2sinh(η_1(T-t)), ∂_η_3R^η(t) = -η_4(T-t),
∂_η_4R^η(t) = ln[ cosh (η_1(T-t)) + η_2 sinh (η_1(T-t)) ] -η_3(T-t),
and so ∂^η/∂η_i=∂ K^η/∂η_i(x-μ̅)^2 + ∂ R^η/∂η_i.
For the randomised policies, we use the following parametrisation
π^θ(.|t,x,μ) = ( ϕ^θ(t) (x -μ̅); λ),
log p_θ(t,x,μ,a) = - 1/2log(2πλ) -
|a - ϕ^θ(t)(x-μ̅)|^2/2λ.
with parameter θ=(θ_1,θ_2,θ_3)∈_+^3, and
ϕ^θ(t) = θ_3 - θ_1 sinh(θ_1(T-t)) + θ_2 cosh (θ_1(T-t))/cosh(θ_1(T-t)) +
θ_2 sinh (θ_1(T-t)).
Compute ∂ϕ^θ/∂θ_i, and then ∂log p_θ/∂θ_i for i=1,…,3.
∂_θ_1ϕ^θ (t) = θ_1(T-t) [ (sinh(θ_1(T-t))+θ_2cosh(θ_1(T-t))/cosh(θ_1(T-t))+θ_2sinh(θ_1(T-t)))^2-1]
- sinh(θ_1(T-t))+θ_2cosh(θ_1(T-t))/cosh(θ_1(T-t))+θ_2sinh(θ_1(T-t))∂_θ_2ϕ^θ (t) = -θ_1/(cosh(θ_1(T-t))+θ_2sinh(θ_1(T-t)))^2, ∂_θ_3ϕ^θ (t) = 1
and
∇_θlog p_θ(t,x,μ,a) = (a-ϕ^θ(t)(x-μ̅))(x-μ̅)/λ∇_θϕ^θ(t).
We implement our actor-critic algorithms with a simulator of X for coefficients equal to
T = 1, γ = 1, B̅ = - B = 0.6, I=0.4, P=Q=1,
The simulator for X is based on the real mean-field model:
X̣_t = ( B̅([X_t] - X_t) + α_t ) ṭ + γẈ_t.
Since α∼π^θ, we note that [α_t]=ϕ^θ(t)([X_t] - [μ̅_t])=0. We deduce that under such α, [X_t]=0, hence [X_t]=[X_0]. From the above mean-field dynamics of X, we deduce that
X_t_k+1 - [X_0] = e^-B̅Δ t (X_t_k - [X_0]) + α_t_k( 1 - e^-B̅Δ t/B̅) + γ∫_t_k^t_k+1 e^-B̅(t_k+1 - s)Ẉ_s
≃ e^BΔ t (X_t_k - [X_0]) + α_t_k( 1 - e^-B̅Δ t/B̅) + γ e^-B̅Δ tΔ W_t_k.
The cost is simulated according to
f_t_k = Q(X_t_k - [X_0])^2 + 1/2α_t_k^2 + 2 α_t_k I (X_t_k - [X_0]), g_T = P (X_T - [X_0])^2.
We first present the numerical results of our offline Algorithm <ref> when using the exact parametrisation (<ref>). The derivatives w.r.t. to η of K^η, R^η, hence of ^η, as well as the derivative w.r.t. θ of log p_θ have explicit analytic expressions that are implemented in
the updating rule of the actor-critic algorithm.
Here we used the following parameters: the learning rates (ρ_S, ρ_E, ρ_G) were taken as ρ_S=0.2 constant, ρ_E = (0.2,0.2,0.1,0.5) until iteration 500, then (2.0,1.0,2.0,1.0) until iteration 1500 and then (0.5,0.5,0.5,0.5), whereas ρ_G = (0.1,0.1,0.1) until iteration 1500, then (0.05,0.05,0.05);
Here we used the following parameters:
μ_t_k was initialized at 0; the number of episodes was N=2100; the time horizon was T=1 and the time step Δ t= 0.02. The values of the model parameters were as described above.
The learning rates (ρ_S, ρ_E, ρ_G) and λ were taken as ρ_S=0.2 constant, and at iteration i,
ρ_E(i) =
(0.01,0.1,0.01,0.2) if i ≤ 500
(0.1,0.1,0.1,0.1) if 500 < i ≤ 21000
ρ_G(i) =
(0.03,0.05,0.03) if i ≤ 7000
(0.01,0.01,0.01) if 7000 < i ≤ 10000
(0.005,0.01,0.005) if 10000 < i ≤ 14000
(0.002,0.002,0.002) if 17000 < i ≤ 21000
and
λ(i) =
0.1 if i ≤ 8000,
0.01 if 8000 < i ≤ 14000,
0.001 if 14000 < i ≤ 21000
Moreover, after i=14000 iterations, we also increase the size of the minibatch from 20 to 40.
In Table <ref>, we give the learnt parameters for the critic and actor functions, to be compared wih
the exact value of the parameters.
In Figure <ref>, we see that, even though the parameters η and θ (shown with full lines) are slightly different from the true optimal values (shown in dashed lines), the functions K, R and ϕ are matched almost perfectly.
We also display one realization of the control and of the cost. These are based on evaluating the control and the cumulative cost along one trajectory of the state. We first simulate 10^4 realizations of a Brownian motion. Based on this, we generate trajectories for one 10^4 population of agents using the learnt control and one population of 10^4 agents using the optimal control. For the population that uses the learnt control, the control is given by the mean of the actor, namely, ϕ^θ(t) (x -μ̅). In the dynamics, the cost and the control, the mean field term is replaced by the empirical mean of the corresponding population at the current time. We can see that the trajectories of control (resp. cost) are very similar.
Next, we present in Figure <ref> and Figure <ref> the numerical results of our online Algorithm <ref> when using neural networks. In this case, the derivatives w.r.t. to η of K^η, R^η, hence of ^η, as well as the derivative w.r.t. θ of log p_θ
are computed by automatic differentiation.
We use neural networks with 3 hidden layers, 10 neurons per layer and tanh activation functions. We take n=30, N=15000 iterations, batch size 500 (10000 for the law estimation in the simulator), constant learning rates 10^-3, except ω_S = 1.
We change λ along episodes: λ=0.1 for the first 3334 ones, then 0.01 for the next 3333 ones, then 0.001 until the end.
§.§.§ Programmation
Under the LQ MFC conditions above, we define
J(θ) =𝔼_α∼π^θ[∫_0^T(f(X_s,_X_s,α_s)+λlog (p_s^θ(α_s)))ds+g(X_T,_X_T)]
=𝔼_α∼π^θ[∫_0^T (QX_s^2+Q̅X̅_s^2+α_s^2/2+2Iα_s X_s+2I̅α_sX̅_s+λlog(p_s^θ(α_s)))ds+PX_T^2+P̅X̅_T^2]
=𝔼_α∼π^θ[∫_0^T (Q(X_s^2-X̅_s^2)+α_s^2/2+2Iα_s (X_s-X̅_s)+λlog(p_s^θ(α_s)))ds+P(X_T^2-X̅_T^2)]
where the dynamic of the controlled process {X_t}:
dX_s=(B(X_s-X̅_s)+α_s)ds+γ dW_s
then
dX̅_s=α̅_sds
and p_t^θ(a) is the density function of π^θ(·|t,X_t,_X_t)=𝒩(ϕ^θ(t)(X_t-X̅_t);λ) defined above.
Hence
J(θ)=[∫_0^T (Q+(ϕ^θ(s))^2/2+2Iϕ^θ(s))(X_s-X̅_s)^2ds+P(X_T-X̅_T)^2-λ T/2log(2πλ)]
=∫_0^T (Q+(ϕ^θ(s))^2/2+2Iϕ^θ(s))Var(X_s)ds+PVar(X_T)-λ T/2log(2πλ)
Cause
d(X_s-X̅_s)=(B(X_s-X̅_s)+(α_s-α̅_s))ds+γ dW_s
we have
Var(X_s)=[(X_s-X̅_s)^2]=γ^2 s
Therefore
J(θ)=∫_0^Tγ^2(Q+(ϕ^θ(s))^2/2+2Iϕ^θ(s))sds+Pγ^2T-λ T/2log(2πλ)
with
∂_θ_iJ(θ)=∫_0^T γ^2(ϕ^θ(s)∂_θ_iϕ^θ(s)+2I∂
_θ_iϕ^θ(s))sds
Then, we compute the gradient of {ϕ^θ}:
∂_θ_1ϕ^θ (t)=θ_1(T-t)((sinh(θ_1(T-t))+θ_2cosh(θ_1(T-t))/cosh(θ_1(T-t))+θ_2sinh(θ_1(T-t)))^2-1)-sinh(θ_1(T-t))+θ_2cosh(θ_1(T-t))/cosh(θ_1(T-t))+θ_2sinh(θ_1(T-t))
∂_θ_2ϕ^θ (t)=-θ_1/(cosh(θ_1(T-t))+θ_2sinh(θ_1(T-t)))^2
∂_θ_3ϕ^θ (t)=1
Finally, we test in Table <ref> the learnt policies
from the exact and NN parametrisation by computing the associated initial expected social costs.
We simulate 10 populations, each consisting of 10^4 agents. All the agents use the control function with the parameters learnt by the algorithm. For the dynamics, the cost and the control, the mean field term is replaced by the empirical mean of the corresponding population at the present time step. For each population, we compute the social cost. We then average over the 10 populations in order to get a Monte Carlo estimate of the social cost. We report in the table the value of this average social cost, the standard deviation over the 10 populations, and the relative error between the average social cost and the optimal cost computed by the formula K^η^*_0 Var(X_0) +R^η^*_0 with the optimal parameter η^*.
§.§ Example 2: mean-variance problem
We consider the celebrated Markowitz portfolio selection problem: minimize over the amount α invested in a stock driven by a Black-Scholes model with rate of return C, and constant volatility F>0, the
risk of the terminal wealth X_T measured by the mean-variance criterion:
P Var(X_T) - [X_T],
where P>0 is the risk aversion of the investor. This is a particular case of the LQ MFC with
B = B̅ = 0, γ = D = D̅ = 0,
Q=Q̅=N=I=I̅=M=H =0, P + P̅ = 0, L=-1/2.
In this case, the solution to the system of ODEs (<ref>) gives the analytic expression:
K(t) = P exp( - C^2/F^2(T-t) ), Y(t) = -1/2,
R(t) = 1/4P[ 1 - exp( C^2/F^2(T-t) ) ] -λ(T-t)/2log(πλ/PF^2)-λ C^2/4F^2(T-t)^2,
Λ=0, while the optimal randomised policy is given by
π̂(.|t,x,μ) = ( ϕ(t) (x - μ̅) + ϕ_3(t) ; λϑ(t) )
ϕ(t) = - C/F^2, ϕ_3^θ(t) = C/2F^2 P e^C^2/F^2(T-t), ϑ(t) = 1/2F^2 P e^C^2/F^2(T-t).
In a model-free setting, the volatility F>0 of the stock price is unknown, while the risk aversion parameter P>0 is usually known and fixed by the investor, and we assume here that the rate of return C>0 is known.
In view of the above expressions, we shall use critic function as
^η(t,x,μ) = K^η(t) (x - μ̅)^2 + R^η(t),
for some parametric functions K^η and R^η on [0,T] with parameters η, and actor functions as
π_θ(.|t,x,μ) = ( ϕ^θ(t) (x -μ̅) + ϕ_3^θ; λϑ^θ(t) ),
log p_θ(t,x,μ,a) = - 1/2log(2πλϑ^θ(t)) -
|a - ϕ^θ(t)(x-μ̅)- ϕ_3^θ(t) |^2/2λ,
for some parametric functions ϕ^θ, ϕ_3^θ, and ϑ^θ>0 on [0,T] with parameter θ. Given such family of parametric actor/critic functions, we have
_θ[^η](t,x,μ) =
- 2 C K^η(t)(x-μ̅) ∇_θϕ_3^θ(t).
We shall test with two choices of parametric functions:
* Exact parametrisation:
K^η(t) = P e^-η(T-t),
R^η(t) = 1/4P[ 1 - e^η(T-t)]-λ(T-t)/2log(πηλ/C^2P)-λη/4(T-t)^2
ϕ^θ(t) = -C θ, ϕ_3^θ(t) = Cθ/2P e^C^2θ(T-t), ϑ^θ(t) = θ/2P e^C^2θ(T-t),
with parameters η∈(0,∞), θ∈, so that the optimal solution in the model-based case corresponds to
η^*=C^2/F^2, and θ^*=1/F^2.
* Neural networks: for K^η, R^η, ϕ^θ, ϕ_3^θ and ϑ^θ with time input.
This suggests to use a parametrisation of the performance value function as
^η(t,x,μ) = K^η(t)(x- μ̅)^2 - x + R^η(t),
with
η∈(0,∞) and
K^η(t) = P e^-η(T-t), R^η(t) = 1/4P[ - e^η(T-t) + 1]-λ(T-t)/2log(πηλ/C^2P)-λη/4(T-t)^2,
and a parametrisation for the randomised policies as
π^θ(.|t,x,μ) = ( - C θ (x -μ̅- 1/2P e^C^2 θ(T-t) ); λθ/2P e^C^2θ(T-t)),
log p_θ(t,x,μ,a) = - 1/2log(2πλθ/2P) - 1/2 C^2 θ(T-t)
- | a + C θ (x -μ̅- 1/2P e^C^2 θ(T-t) ) |^2/λθ P e^- C^2 θ(T-t),
with parameter θ∈(0,∞).
This corresponds to ϕ_1^θ=-ϕ_2^θ (=-Cθ),
ϕ_3^θ(t) = Cθ/2P e^C^2θ(T-t),
Remark: When using neural networks approximation, we take
π^θ(.|t,x,μ) = ( ϕ^θ(t) (x-μ̅) + ϕ_3^θ(t); λΣ^θ(t) ),
log p_θ(t,x,μ,a) = - 1/2log(2πλΣ^θ(t) ) - | a - ϕ^θ(t) (x -μ̅) - ϕ_3^θ(t) |^2/2λΣ^θ(t).
We also have
_θ[^η](t,x,μ) =
- 2 C K_η(t)(x-μ̅) ∇_θϕ_3^θ(t).
Compare the learned NN ϕ^θ, ϕ_3^θ and Σ^θ with the true values:
ϕ^θ = - C/F^2, ϕ_3^θ(t) = C/2PF^2exp( C^2/F^2(T-t) ), Σ^θ(t) = 1/2PF^2exp( C^2/F^2(T-t) ),
Compute ∇_η K^η, ∇ R^η, then ∇_η^η, ∇_θlog p_θ, and
implement and compare to the results in <cit.>, <cit.>.
∇_η K^η(t) = -P(T-t)e^-η(T-t), ∇_η R^η(t) = - T-t/4Pe^η(T-t)-λ(T-t)/2η-λ/4(T-t)^2
and so
∇_η^η(t) = ∇_η K^η(t)(x-μ̅)^2+∇_η R^η(t)
= -P(T-t)e^-η(T-t)(x-μ̅)^2 - T-t/4Pe^η(T-t)-λ(T-t)/2η-λ/4(T-t)^2
Moreover,
∇_θlog p_θ(t,x,μ,a) = -1/2θ-1/2C^2(T-t)-2(a+CF_θ(t))Cθ∇_θ F_θ(t) -(a+CF_θ(t))^2/λθ^2Pe^-C^2θ(T-t)
+ (a+CF_θ(t))^2/λθPC^2(T-t)e^-C^2θ(T-t)
where
F_θ(t) = θ(x-μ̅-1/2Pe^C^2θ(T-t)), ∇_θ F_θ(t) = x-μ̅-1+θ C^2(T-t)/2Pe^C^2θ(T-t).
We implement our algorithms with a simulator of X for different values of (C,F). The simulator of X is based on the time discretization of the wealth process
X_t_k+1 = X_t_k + C α_t_kΔ t + F α_t_kΔ W_t_k, k=0,…,n-1,
with α∼π_θ. Since [α_t]=ϕ_3^θ(t), we have
_α∼π_θ[X_T] = X_0 + C ∑_k=0^n-1ϕ_3^θ(t_k) Δ t,
and the terminal cost is computed with
g_T = P(X_T - _α∼π_θ[X_T])^2 - X_T.
The Sharpe ratio associated to a strategy α∼π_θ is given by
S^θ = _α∼π_θ[X_T] - X_0/√( Var_α∼π_θ(X_T)) = C ∑_k=0^n-1ϕ_3^θ(t_k) Δ t/√( Var_α∼π_θ(X_T)).
The variance of the wealth can be estimated by Monte-Carlo sampling X_T when α∼π_θ, or can be explicitly computed as follows:
by setting Y_t=X_t - _α∼π_θ[X_t], we get by Itô's formula:
_α∼π_θ[Y_t^2] = ( 2 C _α∼π_θ[Y_tα_t] + F^2 [α_t^2] ) ṭ.
Since α_t∼π^θ(.|t,X_t,_α∼π_θ[X_t])=( ϕ^θ(t) Y_t + ϕ_3^θ(t); λϑ^θ(t) ), we have
[α_t^2] = λϑ^θ(t) + |ϕ_3^θ(t)|^2 + |ϕ^θ(t)|^2 [Y_t^2],
_α∼π_θ[Y_t α_t] = [Y_t ( ϕ^θ(t) Y_t + ϕ_3^θ(t) ) ] = ϕ^θ(t) [Y_t^2],
and so
_α∼π_θ[Y_t^2] = [ ϕ^θ(t)(2 C + F^2 ϕ^θ(t) ) [Y_t^2] + F^2( λϑ^θ(t) + |ϕ_3^θ(t)|^2 ) ] ṭ.
We deduce that
Var_α∼π_θ(X_T) = e^∫_0^T ϕ^θ(t)(2 C + F^2 ϕ^θ(t) ) ṭ∫_0^T e^- ∫_0^t ϕ^θ(s)(2 C + F^2 ϕ^θ(s)) ṣ F^2( λϑ^θ(t) + |ϕ_3^θ(t)|^2 ) ṭ.
We shall compare the Sharpe ratio when following the learned strategy α∼π_θ, and the optimal one which is given by
S^* = exp(C^2/F^2T) -1/√(2 λ P T + exp(C^2/F^2T) -1 ).
We first present the numerical results of our offline Algorithm <ref> when using the exact parametrisation (<ref>).
The derivatives w.r.t. to η of K^η, R^η, hence of ^η, as well as the derivative w.r.t. θ of log p_θ, and _θ[^η] have explicit analytic expressions that are implemented in
the updating rule of the actor-critic algorithm. Moreover, the Sharpe ratio when α∼π_θ is analytically expressed as
S^θ = e^C^2θ T - 1 /2P/√(F^2λ(1-e^C^2θ T(F^2θ -1))/2C^2P(1-F^2θ)+e^C^2 F^2|θ|^2 T-1/4P^2 ) .
Here we used the following parameters: the learning rates (ρ_S, ρ_E, ρ_G) were taken as (0.3,0.5,0.5) until iteration 13500, and then (ρ_E, ρ_G) were decreased to (0.1,0.1); moreover, to avoid instabilities we have truncated the norm of the updates to 0.1 and 0.5 respectively; μ_t_k was initialized at 1; the number of episodes was N=2500; the time horizon was T=0.2 and the time step Δ t= 0.01. The values of the model parameters were as described above with C=0.3, F=0.1, P=1. In Figure <ref>, we see that, even though the parameters η and θ (shown with full lines) are slightly different from the true optimal values (shown in dashed lines), the functions K, R, ϕ and ϕ_3 are matched almost perfectly.
Mathieu: TODO: present the table. Vary λ.
Next, we present in Figure <ref> and Figure <ref> the numerical results of our online Algorithm <ref> when using neural networks. In this case, the derivatives w.r.t. to η of K^η, R^η, hence of ^η, as well as the derivative w.r.t. θ of log p_θ
are computed by automatic differentiation.
We use neural networks with 3 hidden layers, with 10 neurons per layer and tanh activation functions. n=30, N=10000 iterations, batch size 300 (10000 for the law estimation in the simulator), constant learning rates 10^-3, except ω_S = 1.
We change λ along episodes: λ=0.1 for the first 3334 ones, then 0.01 for the first 3333 ones, then 0.001 until the end.
§.§ Example 2: optimal trading
We consider an optimal trading problem where the inventory is governed by
X̣_t = α_t ṭ + γẈ_t,
and we aim to minimize over randomised trading rate α∼π the cost functional
[ ∫_0^T α_t^2 + 2 H α_t - λ(π_t) ṭ + P Var(X_T) ].
where γ>0, H>0 is the transaction price per trading, P>0 is a risk aversion parameter, and λ>0 is the temperature parameter.
This model fits into the LQ framework, and the solution to the system of ODEs (<ref>) is given by
K(t) = P/1 + P(T-t), R(t) = γ^2 log (1 + P(T-t)) - (H^2 + λ/2log( πλ) ) (T-t),
Λ=Y≡0,
while the optimal randomised policy is given by
π̂(•|t,x,μ) ∼ ( - K(t) (x - μ̅) - H; λ/2).
In a RL setting, the coefficients σ, H and P are unknown, and we use critic function as
^η(t,x,μ) = K^η(t) (x - μ̅)^2 + R^η(t),
for some parametric functions K^η and R^η on [0,T] with parameters η, and actor functions as
π_θ(.|t,x,μ) = ( ϕ^θ(t) (x -μ̅) + ϕ_3^θ(t); λ/2),
log p_θ(t,x,μ,a) = - 1/2log(πλ) -
|a - ϕ^θ(t)(x-μ̅)- ϕ_3^θ(t) |^2/λ,
for some parametric functions ϕ^θ, ϕ_3^θ on [0,T] with parameter θ. Given such family of parametric actor/critic functions, we have
_θ[^η](t,x,μ) =
- 2 C K^η(t)(x-μ̅) ∇_θϕ_3^θ(t).
We shall test with two choices of parametric functions:
* Exact parametrisation:
K^η(t) = η_1/1 + η_1(T-t)
R^η(t) = η_2 log (1 + η_1(T-t)) - ( η_3 + λ/2log( πλ) ) (T-t)
ϕ^θ(t) = - θ_1/1 + θ_1(T-t), ϕ_3^θ(t) = - θ_2,
with parameters η=(η_1,η_2,η_3)∈(0,∞)^3, θ=(θ_1,θ_2)∈(0,∞)^2, so that the optimal solution in the model-based case corresponds to
(η_1^*,η_2^*,η_3^*)=(P,γ^2,H^2), and (θ_1^*,θ_2^*)=(P,H).
* Neural networks: for K^η, R^η, ϕ^θ, and ϕ_3^θ with time input. Actually, we take for ϕ_3^θ a constant function.
We first present the numerical results of our offline Algorithm <ref> when using the exact parametrisation (<ref>).
The derivatives w.r.t. to η of K^η, R^η, hence of ^η, as well as the derivative w.r.t. θ of log p_θ, and _θ[^η] have explicit analytic expressions that are implemented in
the updating rule of the actor-critic algorithm.
Here we used the following parameters: the learning rates (ρ_S, ρ_E, ρ_G) and λ were taken as ρ_S=0.2 constant,
and at iteration i,
ρ_E(i) =
(0.05,0.05,0.05) if i ≤ 8000
(0.05,0.05,0.01) if 8000 < i ≤ 20000
ρ_G(i) =
(0.005,0.005) if i ≤ 8000
(0.001,0.001) if 8000 < i ≤ 13000
(0.0005,0.0005) if 8000 < i ≤ 13000
and
λ(i) =
0.1 if i ≤ 8000,
0.01 if 8000 < i ≤ 13000
0.001 if 13000 < i ≤ 20000
μ_t_k was initialized at 0; the number of episodes was N=20000; the time horizon was T=1 and the time step Δ t= 0.02. The values of the model parameters are: P=3, H=2, γ=1, and X_0 ∼(1,1).
In Table <ref>, we give the learnt parameters for the critic and actor function to be compared with the exact values, when using the learnt policy with learnt empirical distribution from the algorithm.
In Figure <ref>, we see that the parameters and, hence, the functions K, R and ϕ are matched almost perfectly. We also display one realization of the control and of the cost. These are based on evaluating the control and the cumulative cost along one trajectory of the state. We first simulate 10^4 realizations of a Brownian motion. Based on this, we generate trajectories for one 10^4 population of agents using the learnt control and one population of 10^4 agents using the optimal control. For the population that uses the learnt control, the control is given by the mean of the actor, namely, ϕ^θ(t) (x -μ̅) + ϕ_3^θ(t). In the dynamics, the cost and the control, the mean field term is replaced by the empirical mean of the the corresponding population at the current time. We can see that the trajectories of control (resp. cost) are very similar.
Next, we present in Figure <ref> and Figure <ref> the numerical results of our online Algorithm <ref> when using neural networks. In this case, the derivatives w.r.t. to η of K^η, R^η, hence of ^η, as well as the derivative w.r.t. θ of log p_θ
are computed by automatic differentiation.
We use neural networks with 3 hidden layers, 10 neurons per layer and tanh activation functions. We take n=30, N=15000 iterations, batch size 300 (10000 for the law estimation in the simulator), constant learning rates 10^-3, except ω_S = 1.
Again, we change λ along episodes: λ=0.1 for the second 3334 ones, then 0.01 for the next 3333 ones, then 0.001 until the end.
Finally, we test in Table <ref> the learnt policies from the exact and NN parametrisation by computing the associated initial expected social costs.
We simulate 10 populations, each consisting of 10^4 agents. All the agents use the control function with the parameters learnt by the algorithm. For the dynamics, the cost and the control, the mean field term is replaced by the empirical mean of the corresponding population at the present time step. For each population, we compute the social cost. We then average over the 10 populations in order to get a Monte Carlo estimate of the social cost. We report in the table the value of this average social cost, the standard deviation over the 10 populations, and the relative error between the average social cost and the optimal cost computed by the formula K^η^*_0 Var(X_0) +R^η^*_0 with the optimal parameter η^*.
§.§ A min/max linear quadratic mean-field control problem
We consider a mean-field model in which the dynamics is linear and the running cost is quadratic in the position, the control and the expectation of the position. The terminal cost encourages to be close to one of two targets. This type of model is inspired by the min-LQG problem of <cit.>. More precisely, the controlled McKean-Vlasov dynamics on is given by
X̣_t = [ B X_t + B̅[X_t] + α_t ] ṭ + γ Ẉ_t ,
X_0 ∼μ_0,
for some constants B,B̅∈, and a control α valued in A=,
while the running and terminal costs are given by
f(x,μ,a) = 1/2( Q x^2 + Q̅ (x - μ̅)^2 + N a^2 ),
g(x) = min{ |x - ζ_1 |^2, | x - ζ_2 |^2 },
for some non-negative constants Q, Q̅, N, and two real numbers ζ_1 and ζ_2.
For this model, there is no explicit solution, and we even don't know the structural form of the optimal value function and optimal randomised policy. In a RL setting, and as suggested in Remark <ref>, we shall use critic functions in the cylindrical form
^η(t,x,μ) = Ψ_η(t,x,<φ_η,μ>), (t,x,μ) ∈ [0,T]××_2(),
with feedforward neural networks functions Ψ_η(t,x,y) from [0,T]××^k into , and φ_η(x) from into ^k,
and actor functions as
π_θ(.|t,x,μ) = ( _θ(t,x,μ) ; λ),
log p_θ(t,x,μ,a) = - 1/2log(2πλ) -
|a - _θ(t,x,μ) |^2/2λ,
with cylindrical neural network functions _θ from [0,T]××_2() into . In this case, we have
∇_θ b_θ(t,x,μ) = ∇_θ_θ(t,x,μ), ∇_θΣ_θ(t,x,μ) = 0,
∂_μ^η(t,x,μ)(.) = D_y Ψ_η(t,x,<φ_η,μ>) · D_x φ_η(.),
and so
_θ[^η](t,x,μ) = _ξ∼μ[ ∇_θ_θ(t,ξ,μ) D_y Ψ_η(t,x,<φ_η,μ>) · D_x φ_η(ξ) ].
Implement such _θ[^η](t,x,μ) in the algorithm, and simulate X with the following parameters as in our previous DeepSet paper:
B = B̅ = 0, Q = 0, Q̅ = N = 1, T = 0.5,
X_0∼(x_0,ϑ_0^2) with
* γ=0.3, x_0=1, ϑ_0=0.2
* γ=0.3, x_0=0.625, ϑ_0=√(0.2)
* γ=0.5, x_0=0.625, ϑ_0=√(0.2)Faire les même graphes que pour les deux précédents exemples
§ SOME EXTENSIONS AND VARIATIONS
§.§ Infinite horizon
Given a (stationary) randomised policy π(.|x,μ) with density a∈A↦p(x,μ,a) on A, the performance value function to the MFC on infinite horizon with entropy regularisation is formulated as
J(x,μ;π) = _α∼π[ ∫_0^∞ e^-β t( f(X_t^x,ξ,_X_t^ξ,α_t) - λ p(X_t^x,ξ,_X_t^ξ,α_t) ) ṭ],
where β>0 is a discount factor.
We are then given a family of randomised policies (x,μ)↦π_θ(ạ|x,μ)=p_θ(x,μ)ν(ạ), with parameter θ, a family of functions (x,μ)↦^η(x,μ) on ^d×_2(^d), with parameter η, aiming to approximate the optimal performance value function.
The AC algorithm is then updating alternatively the two parameters to find the optimal pair (θ^*,η^*): on the one hand, for fixed policy π_θ, we rely on the martingale formulation of the process
{ e^-β t^η(X_t^x_0,ξ,_X_t^ξ) + ∫_0^t e^-β r[ f(X_r^x_0,ξ,_X_r^ξ,α_r) - λlog p_θ(X_r^x_0,ξ,_X_r^ξ,α_r) ] ṛ, t ≥ 0 },
and on the other hand, for fixed ^η, on the martingale formulation of the process
{∫_0^t e^-β r∇_θlog p_θ(X_r^x_0,ξ,_X_r^ξ,α_r) [ ^η(X_r^x_0,ξ,_X_r^ξ) - β^η(X_r^x_0,ξ,_X_r^ξ)
+ ( f(X_r^x_0,ξ,_X_r^ξ,α_r) -λ - λlog p_θ(X_r^x_0,ξ,_X_r^ξ,α_r) ) ṛ], 0 ≤ t ≤ T},
for the parameter θ which vanishes the gradient of the performance value function.
This suggests the following pseudo-code for online AC:
[H]
Input data: Mesh time size Δ t, number of time steps n, Number of episodes N, learning rate ρ_S^i, ρ_E^i, ρ_G^i for the state distribution, PE and PG estimation, and function of the number of episodes i.
Parameter λ for entropy regularisation.
Functional forms ^η of performance value function, p_θ of density policies.
Initialisation: μ_t_k: state distribution on ^d, for k=0,…,n, parameters η, θ.
each episode i=1,…,NInitialise state X_0∼μ_0
k=0,…,n-1Update state distribution: μ_t_k←(1-ρ_S^i) μ_t_k + ρ_S^i δ_X_t_k
Generate action α_t_k∼π_θ(.|X_t_k,μ_t_k)
Observe (e.g. by environment simulator) state X_t_k+1 and reward f_t_k
Compute
δ_η = ^η(X_t_k+1,μ_t_k+1) - ^η(X_t_k,μ_t_k) - β^η(X_t_k,μ_t_k) Δ t
+ f_t_kΔ t - λlog p_θ(X_t_k,μ_t_k,α_t_k) Δ t
Δ_η = δ_η∇_η^η(X_t_k,μ_t_k)
Δ_θ = e^-β t_k∇_θlog p_θ(X_t_k,μ_t_k,α_t_k) [ δ_η - λΔ t ],
Critic Update: η←η + ρ_E^i Δ _η
Actor Update: θ←θ + ρ_G^i Δ_θ
k←k+1 Return: ^η, π_θOnline actor-critic mean-field algorithm (infinite horizon)
Linear Quadratic case. In the LQ case on infinite horizon, the optimal value function take the form
v(x,μ) = (x - μ̅) K (x-μ̅) + μ̅Λμ̅+ 2 Y.x + R,
for some constants K in ^d, Λ in ^d, Y in ^d, and R in , solution to a system of algebraic Riccati equations, namely
-β K + KB + B K + D K D + Q
- (I+ F KD + C K)(N + F K F)^-1(I+ F KD + C K) = 0,
- βΛ + Λ(B+B̅) + (B+B̅)Λ + (D+D̅)Λ (D+D̅) + Q + Q̅
- (I+ I̅+ F K(D+D̅) + CΛ)(N + F K F)^-1 (I + I̅ + F K(D+D̅) + CΛ) = 0,
- β Y + (B + B̅) Y + (D+D̅) K γ + M
- ( I+ I̅+ F K(D+D̅) + CΛ)(N + F KF)^-1(H + F Kγ + C Y) = 0,
- β R + γ K γ - (H + F Kγ + C Y)(N + F KF)^-1(H + F Kγ + C Y)
- λ m/2log(2π)-λ/2log|λ/2det(N+F K F)| = 0,
while the optimal randomised policy is a gaussian distribution given by
π̂(.| t,x,μ) = ( - S^-1(U x + (V -U) μ̅+ O ) ; λ/2 S^-1),
where
S = N+F K F, O = H+ F K γ +C Y,
U = I+F KD +C K , V = I+I̅+F K(D+D̅) +CΛ.
It is then natural to use a parametrisation of the performance value function as
^η(x,μ) = (x - μ̅)η_1 (x-μ̅) + μ̅η_2μ̅+ η_3.x + η_4,
with parameter η=(η_1,η_2,η_3,η_4)∈^d×^d×^d×, and a parametrisation of the randomised policies as
π^θ(.|x,μ) = ( θ_1x + θ_2μ̅+ θ_3; θ_4 ),
with parameter θ=(θ_1,θ_2,θ_3,θ_4)∈^m× d×^m× d×^m×_+^m.
§.§ Common noise
The controlled dynamics is driven by
X̣_s = b(X_s,^0_X_s,α_s) ṣ + σ(X_s,^0_X_s,α_s) Ẉ_s + σ_0(X_s,^0_X_s,α_s) Ẉ^0_s ,
where there is an additional q-dimensional Brownian motion W^0 called common noise, σ_0 is a measurable function from ^d×_2(^d)× A into ^d× q, and _X_t^0 denotes the conditional law of X_t given W^0.
Given a parametric randomised policy π_θ(.|t,x,μ) with density a∈A↦p_θ(t,x,μ,a) on A, the associated performance value function to the MFC with common noise on finite horizon with entropy regularisation is formulated as
J_θ(t,x,μ) = _α∼π_θ[ ∫_t^T e^-β(s-t)( f(X_s^t,x,ξ,^0_X_s^t,ξ,α_s) - λ p_θ(s,X_s^t,x,ξ,^0_X_s^t,ξ,α_s) ) ṣ
+ e^-β(T-t) g(X_T^t,x,ξ,^0_X_T^t,ξ) ].
By means of Itô's formula for conditional flow of probability measures, we show that the function J_θ is solution to the PDE on [0,T]×^d×_2(^d)
∫_A { - β J_θ(t,x,μ) + ^a[J_θ](t,x,μ) + f(x,μ,a) -λlog p_θ(t,x,μ,a) }π_θ(ạ|t,x,μ) = 0,
with terminal condition: J_θ(T,x,μ)=g(x,μ), and where ^a is the operator defined by
^a [φ](t,x,μ) = φ(t,x,μ) + b(x,μ,a).D_xφ(t,x,μ) + 1/2 tr((σσ+σ_0σ_0)(x,μ,a) D_x^2 φ(t,x,μ))
+ _ξ∼μ[ b(ξ,μ,a).∂_μφ(t,x,μ)(ξ) + 1/2 tr((σσ+σ_0σ_0)(ξ,μ,a) ∂_x∂_μφ(t,x,μ)(ξ)) ]
+ _(ξ,ξ')∼μ⊗μ[ 1/2 tr( σ_0(ξ,μ,a)σ_0(ξ',μ,a) ∂^2_μφ(t,x,μ)(ξ,ξ')) ].
By following similar arguments as in paragraph <ref>, we obtain the gradient representation of the performance value function:
∇_θ J_θ(t,x,μ) = _α∼π_θ[ ∫_t^T e^-β(s-t)∇_θlog p_θ(s,X_s^t,x,ξ,^0_X_s^t,ξ,α_s) {J̣_θ(s,X_s^t,x,ξ,^0_X_s^t,ξ)
- β J_θ(s,X_s^t,x,ξ,^0_X_s^t,ξ) + [ f(X_s^t,x,ξ,^0_X_s^t,ξ,α_s) -λ(1+ log p_θ(s,X_s^t,x,ξ,^0_X_s^t,ξ,α_s) ) ] ṣ}.
Therefore, the AC algorithms in the common noise case have the same pseudo-codes as in the no common noise case (up to the discount factor β that we have added here).
§ LINEAR QUADRATIC MEAN-FIELD CONTROL WITH ENTROPY REGULARISATION
We extend these results to the case of randomised controls, α_t∼π_t(ạ)=p_t(a) ạ, with -adapted (A)-valued process (π_t) with densities p_t, and with entropy regularisation.
J(π)=_α∼π[∫_0^T (f(X_t,ℙ_X_t,α_t)+λlog(p_t(α_t)))dt+g(X_T,ℙ_X_T)]
where the dynamics of the controlled process is given by
dX^π_t=b(X^π_t,ℙ_X^π_t,α_t)dt+σ(X^π_t,ℙ_X^π_t,α_t)dW_t
with α_t∼π_t(da)=p_t(a)da and b,σ,f,g defined above.
In order to simplify the notations, we denote X_t=X^π_t and X̅_t=𝔼[X^π_t]
We minimize over the randomised controls:
sup_πJ(π)
To specify it,
J(π)=_α∼π[∫_0^T (X_t Q X_t+X̅_tQ̅X̅_t+α_t Nα_t+2α_t I X_t+2α_tI̅X̅_t+2M X_t+2Hα_t+λlog(p(α_t)))dt
+X_T P X_T+X̅_TP̅X̅_T+2L X_T]
where
dX_t=(BX_t+B̅X̅_t+Cα_t)dt+(γ+DX_t+D̅X̅_t+Fα_t)dW_t
Let {𝒱^π_t,t∈[0,T],π∈𝒫(^m)} be a family of 𝔽-adapted processes in the form 𝒱^π_t=v(t,X^π_t,ℙ_X^π_t) for some 𝔽-adapted random field {v(t,x,μ),t∈[0,T],x∈ℝ^d,μ∈𝒫_2(ℝ^d)} satisfying
v(t,x,μ)≤ C(χ_t+| x|^2+|μ̅|^2),t∈[0,T],x∈ℝ^d,μ∈𝒫_2(ℝ^d)
for some positive constant C and nonnegative process χ with sup_t∈[0,T][|χ_t|]<+∞ and such that
(i)v(T,x,μ)=g(x,μ),x∈ℝ^d,μ∈𝒫_2(ℝ^d)
(ii)the map t∈[0,T]↦_α∼π[𝒮^π_t], with 𝒮^π_t=𝒱^π_t+∫_0^t (X_s Q X_s+X̅_sQ̅X̅_s+α_s N α_s + 2α_s I X_s + 2α_sI̅X̅_s + 2M X_s + 2Hα_s+λlog(p_s(α_s)))ds is nondecreasing for all π∈𝒫(^m) with π_t(da)=p_t(a)da
(iii)the map t∈[0,T]↦_α∼π[𝒮^π_t] is constant for some π^*∈𝒫(^m) with π^*_t(da)=p^*_t(a)da
Then, π^* is an optimal randomised control and _α∼π^*[v(0,X_0,ℙ_X_0)] is the value of the randomised LQMKV control problem:
V_0=_α∼π^*[v(0,X_0,ℙ_X_0)]=J(π^*)
Step 1 We infer a candidate for the random field {v(t,x,μ),t∈[0,T],x∈ℝ^d,μ∈𝒫_2(ℝ^d)} in the form
v(t,x,μ)=(x-μ̅) K(t)(x-μ̅)+μ̅Λ(t)μ̅+2Y(t) x+R(t)
Step 2 For π∈𝒫(^m) and t∈[0,T], with 𝒮^π_t defined above, we have
d_α∼π[𝒮^π_t]=_α∼π[𝒟^π_t]dt
for some 𝔽-adapted processes 𝒟^π with
_α∼π[𝒟^π_t]=_α∼π[ X_t Q X_t+X̅_tQ̅X̅_t+α_t N α_t + 2α_t I X_t + 2α_tI̅X̅_t + 2M X_t + 2Hα_t+λlog(p_t(α_t))]
+d/dt𝔼_α∼π[v(t,X_t,ℙ_X_t)]
Step 3 To find an optimal control π^* such that _α∼π^*[𝒟^π^*_t]=0 and this implies that [𝒟^π_t]≥ 0, ∀π∈𝒫(𝒜) and then the property (ii).
In fact, defining
w(t,x,x̅)=(x-x̅) K(t)(x-x̅)+x̅Λ(t)x̅+2Y(t) x+R(t)
we have
v(t,X_t,ℙ_X_t)=w(t,X_t,X̅_t)=(X_t-X̅_t) K(t)(X_t-X̅_t)+X̅_tΛ(t)X̅_t+2Y(t) X_t+R(t)
Using the Itô's formula, we have
dv(t,X_t,ℙ_X_t)=[(X_t-X̅_t)K̇(t)(X_t-X̅_t)+X̅_tΛ̇(t)X̅_t+2Ẏ(t) X_t+Ṙ(t)]dt+
((X_t-X̅_t) K(t)+Y(t))dX_t+(dX_t)(K(t)(X_t-X̅_t) K(t)+Y(t))
+(-(X_t-X̅_t) K(t)+X̅_tΛ(t))dX̅_t+(dX̅_t) (-K(t)(X_t-X̅_t)+Λ(t)X̅_t)+Tr(K(t)d⟨ X,X⟩_t)
=[(X_t-X̅_t)K̇(t)(X_t-X̅_t)+X̅_tΛ̇(t)X̅_t+2Ẏ(t) X_t+Ṙ(t)]dt+
((X_t-X̅_t) K(t)+Y(t))dX_t+(dX_t)(K(t)(X_t-X̅_t) K(t)+Y(t))
+(-(X_t-X̅_t) K(t)+X̅_tΛ(t))dX̅_t+(dX̅_t) (-K(t)(X_t-X̅_t)+Λ(t)X̅_t)
+(γ+DX_t+D̅X̅_t+Fα_t) K(t)(γ+DX_t+D̅X̅_t+Fα_t)dt
Since
dX_t=(BX_t+B̅X̅_t+Cα_t)dt+(γ+DX_t+D̅X̅_t+Fα_t)dW_t
and denoting α̅_t=𝔼[α_t]
we get
dX̅_t=((B+B̅)X̅_t+Cα̅_t)dt
Noticing that
𝔼_α∼π[(-(X_t-X̅_t) K(t)+X̅_tΛ(t))dX̅_t]=_α∼π[X̅_tΛ(t)((B+B̅)X̅_t+Cα̅_t)]dt
=_α∼π[X̅_tΛ(t)((B+B̅)X̅_t+Cα_t)]dt
Hence
d/dt_α∼π[v(t,X_t,ℙ_X_t)]=_α∼π[(X_t-X̅_t)K̇(t)(X_t-X̅_t)+X̅_tΛ̇(t)X̅_t+2Ẏ(t) X_t+Ṙ(t)
+((X_t-X̅_t) K(t)+Y(t))(BX_t+B̅X̅_t+Cα_t)+(BX_t+B̅X̅_t+Cα_t)(K(t)(X_t-X̅_t)+Y(t))
+X̅_tΛ(t)((B+B̅)X̅_t+Cα_t)+((B+B̅)X̅_t+Cα_t)Λ(t)X̅_t
+(γ+DX_t+D̅X̅_t+Fα_t) K(t)(γ+DX_t+D̅X̅_t+Fα_t)]
Hence
𝔼_α∼π[𝒟^π_t]=_α∼π[(X_t-X̅_t)(Q+K̇(t)+K(t)B+BK(t)+D K(t) D)(X_t-X̅_t)
+X̅_t(Q+Q̅+Λ̇(t)+Λ(t)(B+B̅)+(B+B̅)Λ(t)+(D+D̅) K(t)(D+D̅))X̅_t
+2(M+Ẏ(t)+(B+B̅) Y(t)+(D+D̅) K(t)γ) X_t+Ṙ(t)+γ K(t)γ
+α_t (N+F K(t) F) α_t+2α_t(I+C K(t)+F K(t)D)X_t+2α_t(I̅-C K(t)+CΛ(t)+F K(t)D̅)X̅_t
+2( H+C Y(t)+F K(t)γ)α_t+λlog(p_t(α_t))]
=[(X_t-X̅_t)(Q+K̇(t)+2K(t)B+D K(t) D)(X_t-X̅_t)
+X̅_t(Q+Q̅+Λ̇(t)+2Λ(t)(B+B̅)+(D+D̅) K(t)(D+D̅))X̅_t
+2(M+Ẏ(t)+(B+B̅) Y(t)+(D+D̅) K(t)γ) X_t+Ṙ(t)+γ K(t)γ
+∫_^m(a (N+F K(t) F) a+2a(I+C K(t)+F K(t)D)X_t+2a(I̅-C K(t)+CΛ(t)+F K(t)D̅)X̅_t
+2( H+C Y(t)+F K(t)γ) a+λlog(p_t(a)))p_t(a)da]
Denoting
S_t=N+F K(t) F
U_t=I+C K(t)+F K(t)D
V_t=I+I̅+CΛ(t)+F K(t)(D+D̅)
O_t=H+C Y(t)+F K(t)γ
the optimal control π^*_t(da)=p_t^*(a)da minimizes
∫_^m(a S_t a+2aU_tX_t+2a(V_t-U_t)X̅_t+2O_t a+λlog(p_t(a)))p_t(a)da
λ>0 For the minimization problem
inf_p>0,∫_^mp(a)da=1∫_^m(f(a)+λlog(p(a)))p(a)da
the solution is
p^*(a)=exp(-1/λf(a))/∫_^mexp(-1/λf(a))da
Proof
In order to solve the optimization problem with constraints, we consider the Lagrange method with a multiplier β, that is
inf_p>0,β∫_^m(f(a)+λlog(p(a)))p(a)da-β(∫_^mp(a)da-1)=inf_p>0,β∫_^m(f(a)+λlog(p(a))-β)p(a)da+β
For inf_p>0∫_^m(f(a)+λlog(p(a))-β)p(a)da we minimize it point-wisely.
Considering
F(p;β)=(f(a)+λlog p-β)p
∂/∂ pF(p;β)=f(a)+λlog p^*-β+λ
and
∂^2/∂^2 pF(p;β)=λ/p>0
Hence the solution (p^*,β^*) must satisfy for all a∈^m,
∂/∂ pF(p^*(a);β^*)=f(a)+λlog p^*(a)-β^*+λ=0
∫_^mp^*(a)da=1
Finally we obtain
p^*(a)=exp(-1/λf(a))/∫_^mexp(-1/λf(a))da
According to this lemma, the optimal control is given by
p_t^*(a)=exp(-1/λ(a S_t a+2a U_tX_t+2a(V_t-U_t)X̅_t+2O_t a))/∫_^mexp(-1/λ(a S_t a+2a U_tX_t+2a(V_t-U_t)X̅_t+2O_t a))da
it is the gaussian distrubution with
π_t^*=𝒩(·|-S_t^-1(U_tX_t+(V_t-U_t)X̅_t+O_t),λ/2S_t^-1)
Hence
∫_^m(a S_t a+2a U_tX_t+2a(V_t-U_t)X̅_t+2O_t a+λlog(p_t^*(a)))p_t^*(a)da
=-(U_tX_t+(V_t-U_t)X̅_t+O_t) S_t^-1(U_tX_t+(V_t-U_t)X̅_t+O_t)-λ m/2log(2π)-λ/2log|λ/2det(S_t)|
and
𝔼[∫_^m(a S_t a+2a U_tX_t+2a(V_t-U_t)X̅_t+2O_t a+λlog(p_t^*(a)))p_t^*(a)da]
=-𝔼[(X_t-X̅_t) U_t S_t^-1U_t(X_t-X̅_t)+X̅_t V_t S_t^-1 V_tX̅_t+2O_t S_t^-1V_t X_t+O_t S_t^-1O_t]-λ m/2log(2π)-λ/2log|λ/2det(S_t)|
then {K(t)},{Λ(t)},{Y(t)},{R(t)} satisfy the following equations:
K̇(t)+Q+K(t)B+B K(t)+D K(t) D
-(I+C K(t)+F K(t) D) (N+F K(t) F)^-1(I+C K(t)+F K(t) D)=0
K(T)=P
Λ̇(t)+Q+Q̅+Λ(t)(B+B̅)+(B+B̅)Λ(t)+(D+D̅) K(t)(D+D̅)
-(I+I̅+CΛ(t)+F K(t)(D+D̅)(N+F K(t) F)^-1(I+I̅+CΛ(t)+F K(t)(D+D̅)=0
Λ(T)=P+P̅
Ẏ(t)+M+(B+B̅) Y(t)+(D+D̅) K(t)γ
-(H+C Y(t)+F K(t)γ)(N+F K(t) F)^-1(I+I̅+CΛ(t)+F K(t)(D+D̅)=0
Y(T)=L
Ṙ(t)+γ K(t)γ-(H+C Y(t)+F K(t)γ)(N+F K(t) F)^-1(H+C Y(t)+F K(t)γ)
-λ m/2log(2π)-λ/2log|λ/2det(N+F K(t) F)|=0
R(T)=0
§ PROOFS OF SOME REPRESENTATION RESULTS
§.§ Proof of Proposition <ref>
Step 1: For a fixed policy π, we introduce the non-linear McKean-Vlasov SDE with dynamics
X̃^t, ξ_s = ξ + ∫_t^s b_π(r,X̃^t, ξ_r,_X̃^t, ξ_r) ṛ + ∫_t^s σ_π(r,X̃^t, ξ_r,_X̃^t, ξ_r) Ẉ_r,
recalling that σ_π=Σ_π^1/2, as well as its associated decoupled SDE with dynamics
X̃^t, x, μ_s = x + ∫_t^s b_π(r,X̃^t, x, μ_r,_X̃^t, ξ_r) ṛ + ∫_t^s σ_π(r,X̃^t, x, μ_r,_X̃^t, ξ_r) Ẉ_r.
Under Assumption <ref>(i), the coefficients b_π and σ_π are Lipschitz-continuous and with at most linear growth with respect to the variable x and μ locally uniformly in time. Hence, the SDEs (<ref>)-(<ref>) admit a unique strong solution.
Denoting by the probability measure on 𝒞([0, ∞), ^d) (the space of continuous functions defined on [0,∞) taking values in ^d) induced by the unique solution to the SDE (<ref>) and by (t) its marginal at time t, its infinitesimal generator is given by
ℒ̃^π_tφ(x) = ∑_i=1^d ∫_A b_i( x, (t), a) π(ạ| t, x, (t)) ∂_x_iφ(x)
+ 1/2∑_i,j=1^d ∫_A (σσ)_i, j(x, (t), a) π(ạ| t, x, (t)) ∂^2_x_i, x_jφ(x).
Now, coming back to the dynamics of the McKean-Vlasov SDE (<ref>), we importantly point out that since at each time s, the action α_s is sampled from the probability distribution π(.|s, X^t, ξ_s, _X_s^t, ξ) independently of W, the infinitesimal generator at time t of (<ref>) is exactly given by ℒ̃^π_t. Hence, it follows from the uniqueness of the martingale problem associated to ℒ̃^π that X^t, ξ and X̃^t, ξ have the same law [This was formally shown by law of large numbers in <cit.> in the standard diffusion case.].
We thus conclude that V^π can be written as
V^π(t, x,μ) = _[ ∫_t^T e^-β (s-t) (f_π-λ E_π)(s,X̃_s^t,x,μ,_X̃_s^t,ξ) ṣ
+ e^-β (T-t) g(X̃_T^t, x, μ,_X̃_T^t,ξ) ].
Step 2: We know, see e.g. <cit.> or <cit.>, that Assumption <ref>(i) guarantees the existence of a modification of X̃^t, x, μ such that:
* The map x↦X̃_s^t, x, ξ is ℙ-a.s. twice continuously differentiable,
* for any x∈ℝ^d, 0≤ t≤ s, and any p≥1, the map 𝒫_2(ℝ^d) ∋μ↦X̃_s^t, x, μ∈ L^p(ℙ) is differentiable and the map ℝ^d ∋ v ↦∂_μX̃_s^t, x, μ(v) ∈ L^p(ℙ) is differentiable,
* for any p≥1, the derivatives (t, x, μ, v) ↦∂_x X̃_s^t, x, μ, ∂_x^2 X̃_s^t, x, μ, ∂_μX̃_s^t, x, μ(v), ∂_v [∂_μX̃_s^t, x, μ](v) ∈ L^p(ℙ) are continuous.
Moreover, the following estimates hold for n=1,2 and any p≥1
sup_0≤ t ≤ s ≤ T, (x,v) ∈ (ℝ^d)^2, μ∈_2(ℝ^d){∂_x^n X̃_s^t, x, μ_L^p(ℙ) + ∂_μX̃_s^t, x, μ(v) _L^p(ℙ) + ∂_v ∂_μX̃_s^t, x, μ(v) _L^p(ℙ)} < ∞.
We thus deduce that the functions x↦ f_π(s,X̃_s^t,x,μ,_X̃_s^t,ξ), E_π(s,X̃_s^t, x,μ,_X̃_s^t,ξ), g(X̃_T^t, x, μ,_X̃_T^t,ξ) are ℙ-a.s. twice continuously differentiable with derivatives that belong to L^p(ℙ), for any p≥1, uniformly in x, μ and t∈ [0,s]. The dominated convergence theorem eventually guarantees that x↦ V^π (t, x, μ) is twice continuously differentiable with
∂_x_i V^π(t, x, μ) = _[ ∫_t^T e^-β (s-t)∑_k=1^d ∂_x_k (f_π-λ E_π)(s,X̃_s^t, x,μ,_X̃_s^t,ξ) ∂_x_i (X̃_s^t, x, μ)^k ṣ
+ e^-β (T-t)∑_k=1^d ∂_x_k g(X̃_T^t, x, μ,_X̃_T^t,ξ) ∂_x_i (X̃_T^t, x, μ)^k ],
and
∂^2_x_i, x_j V^π(t, x, μ) = _[ ∫_t^T e^-β (s-t)∑_k, ℓ=1^d ∂^2_x_k, x_ℓ (f_π-λ E_π)(s,X̃_s^t, x,μ,_X̃_s^t,ξ) ∂_x_i (X̃_s^t, x, μ)^k ∂_x_j (X̃_s^t, x, μ)^ℓṣ
+ e^-β (T-t)∑_k, ℓ=1^d ∂^2_x_k, x_ℓ g(X̃_T^t, x, μ,_X̃_T^t,ξ) ∂_x_i (X̃_T^t, x, μ)^k ∂_x_j (X̃_T^t, x, μ)^ℓ
+ ∫_t^T e^-β (s-t)∑_k=1^d ∂_x_k (f_π-λ E_π)(s,X̃_s^t, x,μ,_X̃_s^t,ξ) ∂^2_x_i, x_j (X̃_s^t, x, μ)^k ṣ
+ e^-β (T-t)∑_k=1^d ∂_x_k g(X̃_T^t, x, μ,_X̃_T^t,ξ) ∂^2_x_i, x_j (X̃_T^t, x, μ)^k ].
It follows from the above expression and again the dominated convergence theorem that (t, x, μ) ↦∂_x_i V^π(t, x, μ), ∂^2_x_i, x_j V^π(t, x, μ) are continuous.
Similarly, note that under the current assumption, the functions μ↦ h(t,X̃_s^t, x, μ,_X̃_s^t,ξ), g(X̃_T^t, x, μ,_X̃_T^t,ξ), where h ∈{ f_π, E_π}, are L-differentiable with derivatives satisfying
∂^i_μ [h(s,X̃_s^t, x,μ,_X̃_s^t,ξ)](v) = ∑_k=1^d ∂_x_k h(s,X̃_s^t, x,μ,_X̃_s^t,ξ) ∂^i_μ [(X̃_s^t, x,μ)^k](v)
+𝔼[ ∑_k=1^d ∂^k_μ h(s, X̃_s^t, x,μ, _X̃_s^t,ξ)(X_s^t, v, μ) ∂_x_i (X_s^t, v, μ)^k]
+ ∫_ℝ^d𝔼[∑_k=1^d ∂^k_μ h(s,X̃_s^t, x,μ, _X̃_s^t,ξ)(X_s^t, x', μ) ∂^i_μ [(X_s^t, x', μ)^k](v) ] μ(x̣'),
∂^i_μ [g(X̃_T^t, x, μ,_X̃_T^t,ξ)](v) = ∑_k=1^d ∂_x_k g(X̃_T^t, x,μ,_X̃_T^t,ξ) ∂^i_μ [(X̃_T^t, x,μ)^k](v)
+ 𝔼[ ∑_k=1^d ∂^k_μ g(X̃_T^t, x,μ, _X̃_T^t,ξ)(X_T^t, v, μ) ∂_x_i (X_T^t, v, μ)^k ]
+ ∫_ℝ^d𝔼[∑_k=1^d ∂^k_μ g(X̃_T^t, x,μ, _X̃_T^t,ξ)(X_T^t, x', μ) ∂^i_μ [(X_T^t, x', μ)^k] (v) ] μ(x̣'),
where (X_s^t, x, μ)_s∈ [t, T] stands for a copy of (X̃^t, x, μ_s)_s ∈ [t, T] defined on a copy (Ω, ℱ, ℙ) of the original probability space (Ω, ℱ, ℙ). Under Assumption <ref>, it follows from the above identities that (t, x, μ, v) ↦∂_μ [h(s,X̃_s^t, x,μ,_X̃_s^t,ξ)](v) , ∂_μ [g(X̃_T^t, x, μ,_X̃_T^t,ξ)](v) ∈ L^p(ℙ), p≥1, are continuous and satisfy
|∂_μ [h(s,X̃_s^t, x, μ, _X̃_s^t,ξ)](v) | ≤ K (1+ |X̃_s^t, x, μ| + |v| + M_2( _X̃_s^t,ξ)^q) (1+ |∂_μX̃^t, x, μ_s(v)| )
≤ K (1+ |X̃_s^t, x,μ| + |v| + M_2(μ)^q) (1+ |∂_μX̃^t, x, μ_s(v)| ),
and
| ∂_μ [g(X̃_T^t, x, μ,_X̃_T^t,ξ)](v) | ≤ K (1 + |X̃_T^t, x,μ| + |v| + M_2( _X̃_T^t,ξ)^q) (1+ |∂_μX̃^t, x, μ_T(v)| )
≤ K (1+ |X̃_T^t, x,μ| + |v| + M_2(μ)^q) (1+ |∂_μX̃^t, x, μ_T(v)| ),
where we used the fact that M_2( _X̃_s^t,ξ) ≤ K(1+M_2(μ)), for any s∈ [t, T], for the last inequality. Similarly, it follows from (<ref>) and the dominated convergence theorem that v↦∂_μ [h(t,X̃_s^t, x, μ,_X̃_s^t,ξ)](v), ∂_μ [g(X̃_T^t, x, μ,_X̃_T^t,ξ)](v) are continuously differentiable with derivatives being continuous with respect to their entries and satisfying
| ∂_v ∂_μ [h(s,X̃_s^t, x,μ, _X̃_s^t,ξ)](v) | ≤ K (1+ |X̃_s^t, x, μ| + |v| + M_2(μ)^q),
| ∂_v ∂_μ [g(X̃_T^t, x, μ,_X̃_T^t,ξ)](v) | ≤ K (1+ |X̃_T^t, x, μ| + |v| + M_2(μ)^q).
Coming back to (<ref>) and using the above estimates together with the dominated convergence theorem allows to conclude that μ↦ V^π(t, x, μ) is L-differentiable and that v↦∂_μ V^π(t, x, μ)(v) is differentiable. Moreover, both derivatives ∂_μ V^π(t, x, μ)(v), ∂_v ∂_μ V^π(t, x, μ)(v) are continuous with respect to their entries and satisfy
sup_t ∈ [0,T]{ | ∂_μ V^π(t, x, μ)(v)| + |∂_v ∂_μ V^π(t, x, μ)(v)| }≤ K (1+ |x| +|v| + M_2(μ)^q).
We thus conclude that V^π∈𝒞^0, 2, 2([0,T] ×ℝ^d ×_2(ℝ^d)).
Step 3: Let us now prove that (t, x, μ) ↦ V^π(t, x, μ) ∈𝒞^1, 2, 2([0,T] ×ℝ^d ×_2(ℝ^d)). From the Markov property satisfied by the SDE (<ref>), stemming from its strong well-posedness, for any 0≤ h ≤ t, the following relation is satisfied
V^π(t-h, x, μ) = e^-β h𝔼[ ∫_t-h^t e^-β (s-t) (f_π-λ E_π)(s,X̃_s^t-h, x, μ,_X̃_s^t-h, ξ) ṣ]
+ e^-β h𝔼[ V^π(t, X̃_t^t-h, x, μ, ℙ_X̃_t^t-h, ξ)].
Now, combining the fact that V^π(t, .) ∈𝒞^2, 2(ℝ^d ×_2(ℝ^d)) with (<ref>) guarantees that one may apply Itô's rule, see e.g. Proposition 5.102 <cit.>. We thus obtain
h^-1 (V^π(t-h, x, μ) -V^π(t, x, μ))
= e^-β h h^-1∫_t-h^t e^-β (s-t)𝔼[ (f_π-λ E_π)(s,X̃_s^t-h, x,μ,_X̃_s^t-h, ξ) ] ṣ
+ e^-β h h^-1𝔼[ V^π(t, X̃_t^t-h, x, μ, ℙ_X̃_t^t-h, ξ) - V^π(t, x, μ)]
+ h^-1 (e^-β h - 1) V^π(t, x, μ)
= e^-β h h^-1∫_t-h^t e^-β (s-t)𝔼[ (f_π-λ E_π)(s,X̃_s^t-h, x,μ,_X̃_s^t-h, ξ) ] ṣ
+ e^-β h h^-1∫_t-h^t𝔼[[V^π](t, X̃_s^t-h, x, μ, ℙ_X̃_s^t-h, ξ)] ṣ
+ h^-1 (e^-β h - 1) V^π(t, x, μ),
where
_π[φ](t, x,μ)
= b_π(t, x, μ) · D_xφ(t, x, μ) + 1/2Σ_π(t, x, μ) : D_x^2 φ(t, x, μ)
+ _ξ∼μ[ b_π(t,ξ,μ) ·∂_μφ(t, x, μ)(ξ) + 1/2Σ_π(t, ξ, μ) : ∂_υ∂_μφ(t, x, μ)(ξ) ].
Letting h↓ 0 in (<ref>), from the continuity and quadratic growth of f_π, E_π as well as the continuity of [V^π](t,.), we deduce that t↦ V^π(t, x, μ) is left-differentiable on (0,T). Still from the continuity of f_π, E_π and [V^π], we eventually conclude that it is differentiable on [0,T) with a derivative satisfying
∂_t V^π(t, x, μ) - β V^π(t, x, μ) + _π[V^π](t, x,μ) + (f_π-λ E_π)(t, x, μ) = 0.
The proof is now complete.
§.§ Differentiability of the parametric critic function
Under the standard assumption that the coefficients b_π_θ(t, .), σ_π_θ(t, .) are Lipschitz-continuous on ℝ^d ×_2(ℝ^d) uniformly in t∈ [0,T] and θ∈Θ, the system of SDEs (<ref>) admits a unique strong solution when α∼π_θ. We will denote by (X_s^t, ξ(θ), X_s^t, x, ξ(θ)) the solution taken at time s. We will also use the more compact notation
X_s^t,ξ(θ) = ξ + ∫_t^s ∑_j=0^p g^j_θ(r, X_r^t, ξ(θ), _X_r^t, ξ(θ)) Ẉ^j_r
X_s^t, x,μ(θ) = x + ∫_t^s ∑_j=0^p g^j_θ(r, X_r^t, x, μ(θ), _X_r^t, ξ(θ)) Ẉ^j_r, t ≤ s ≤ T,
with g^0_θ(t, x, μ) = b_π_θ(t, x, μ), g^j_θ(t, x, μ) = σ^., j_π_θ(t, x, μ), Ẉ_r = ( Ẉ_r^0, ⋯, Ẉ_r^p) with Ẉ^0_r = ṛ.
Under Assumption <ref>, the derivatives (t, θ, x, μ, v) ↦∂_θ∂_xX̃_s^t, x, μ(θ), ∂_x∂_θX̃_s^t, x, μ(θ), ∂_θ∂^2_xX̃_s^t, x, μ(θ), ∂^2_x∂_θX̃_s^t, x, μ(θ), ∂_θ [∂_μX̃_s^t, x, μ(θ)](v), ∂_μ∂_θX̃_s^t, x, μ(θ)(v), ∂_θ∂_v[∂_μX̃_s^t, x, μ(θ)](v),
∂_v [∂_μ∂_θX̃_s^t, x, μ(θ)](v)∈L^p(ℙ) exist and are locally Lipschitz continuous for all p≥1.
Proof. The proof of the existence and continuity of the derivatives of the flow X_s^t, x, ξ(θ) with respect to the parameters x, μ, v and θ is rather standard but quite mechanical and actually follows similar lines of reasonings as those employed for the proof of Theorem 3.2 in <cit.>. We thus omit it.
With the same notations as Lemma <ref>, under Assumption <ref>, taking h_θ = f_π_θ, E_π_θ or g(x, μ), we deduce from the above result that the derivatives (t, θ, x, μ, v) ↦∂_θ∂_x [h_θ(s, X̃_s^t, x, μ(θ), _X̃_s^t, ξ(θ))], ∂_x∂_θ [h_θ(s, X̃_s^t, x, μ(θ), _X̃_s^t, ξ(θ))], ∂_θ∂_μ [h_θ(s, X̃_s^t, x, μ(θ), _X̃_s^t, ξ(θ))](v), ∂_μ∂_θ [h_θ(s, X̃_s^t, x, μ(θ), _X̃_s^t, ξ(θ))](v), ∂_θ∂_v∂_μ [h_θ(s, X̃_s^t, x, μ(θ), _X̃_s^t, ξ(θ))](v), ∂_v∂_μ∂_θ [h_θ(s, X̃_s^t, x, μ(θ), _X̃_s^t, ξ(θ))](v)∈ L^p(ℙ), for any p ≥1 and any 0≤ t≤ s ≤ T, exist and are continuous. For instance, standard computations give
∂_θ_l∂_x_i [h_θ(s, X̃_s^t, x, μ(θ), _X̃_s^t, ξ(θ))]
= ∑_j=1^d ∂_θ_l∂_x_j h_θ(s, X̃_s^t, x, μ(θ), _X̃_s^t, ξ(θ)) ∂_x_i (X̃_s^t, x, μ(θ))^j
+ ∑_j,k=1^d ∂^2_x_j, x_k h_θ(s, X̃_s^t, x, μ(θ), _X̃_s^t, ξ(θ)) ∂_x_i (X̃_s^t, x, ξ(θ))^j ∂_θ_l (X̃_s^t, x, μ(θ))^k
+ ∑_j, k=1^d 𝔼[ [∂_μ∂_x_j h_θ(s, X̃_s^t, x, μ(θ), _X̃_s^t, ξ(θ))]_k(X_s^t, μ(θ)) ∂_θ_l (X_s^t, ξ(θ))^k ] ∂_x_i (X̃_s^t, x, μ(θ))^j
+ ∑_j=1^d ∂_x_j h_θ(s, X̃_s^t, x, μ(θ), _X̃_s^t, ξ(θ)) ∂_θ_l∂_x_i (X̃_s^t, x, μ(θ))^j
and
∂_θ_l∂^i_μ [h_θ(s, X̃_s^t, x, μ(θ), _X̃_s^t, ξ(θ))](v)
= ∑_j = 1^d ∂_θ_l∂_x_j h_θ(s, X̃_s^t, x, μ(θ), _X̃_s^t, ξ(θ)) ∂^i_μ (X̃_s^t, x, μ(θ))^j
+ ∑_j,k =1^d ∂^2_x_j, x_k h_θ(s, X̃_s^t, x, μ(θ), _X̃_s^t, ξ(θ)) ∂^i_μ (X̃_s^t, x, μ(θ))^j ∂_θ_l (X̃_s^t, x, μ(θ))^k
+ ∑_j,k =1^d 𝔼[ [∂_μ∂_x_j h_θ(s, X̃_s^t, x, μ(θ), _X̃_s^t, ξ(θ))]_k(X_s^t, ξ(θ)) ∂_θ_l (X_s^t, ξ(θ))^k ] ∂^i_μ (X̃_s^t, x, μ(θ))^j
+ ∑_j=1^d ∂_x_j h_θ(s, X̃_s^t, x, μ(θ), _X̃_s^t, ξ(θ)) ∂_θ_l∂^i_μ (X̃_s^t, x, μ(θ))^j
+ ∑_j=1^d 𝔼[ ∂_θ_l∂^j_μ h_θ(s, X̃_s^t, x,μ(θ), _X̃_s^t,ξ(θ))(X_s^t, v, μ(θ)) ∂_v_i (X_s^t, v, μ(θ))^j ]
+ ∑_j, k=1^d 𝔼[ ∂_x_k∂^j_μ h_θ(s, X̃_s^t, x,μ(θ), _X̃_s^t,ξ(θ))(X_s^t, v, μ(θ)) ∂_v_i (X_s^t, v, μ(θ))^j ] ∂_θ_l (X̃_s^t, x, μ)^k
+ ∑_j, k=1^d 𝔼𝔼̌[ ∂^k_μ∂^j_μ h_θ(s,X̃_s^t, x,μ(θ), _X̃_s^t,ξ(θ))(X_s^t, v, μ(θ), X̌_s^t, ξ(θ)) ∂_v_i (X_s^t, v, μ(θ))^j∂_θ_l (X̌_s^t, ξ(θ))^k ]
+ ∑_j, k =1^d 𝔼[ ∂_v_k∂^j_μ h_θ(s, X̃_s^t, x,μ(θ), _X̃_s^t,ξ(θ))(X_s^t, v, μ(θ)) ∂_v_i (X_s^t, v, μ(θ))^j∂_θ_l (X_s^t, v, μ(θ))^k ]
+ ∑_j=1^d 𝔼[ ∂^j_μ h_θ(s, X̃_s^t, x,μ(θ), _X̃_s^t,ξ(θ))(X_s^t, v, μ(θ)) ∂_θ_l∂_v_i (X_s^t, v, μ(θ))^j ]
+ ∑_j=1^d ∫_ℝ^d 𝔼[∂_θ_l∂^j_μ h_θ(s, X̃_s^t, x, μ(θ), _X̃_s^t, ξ(θ))(X_s^t, x', μ(θ)) ∂^i_μ (X_s^t, x', μ(θ))^j(v) ] μ(x̣')
+ ∑_j, k=1^d ∫_ℝ^d 𝔼[∂_x_k∂^j_μ h_θ(s, X̃_s^t, x, μ(θ), _X̃_s^t, ξ(θ))(X_s^t, x', μ(θ)) ∂_θ_l (X̃_s^t, x, μ(θ))^k∂^i_μ (X_s^t, x', μ(θ))^j(v) ] μ(x̣')
+ ∑_j, k=1^d ∫_ℝ^d 𝔼𝔼̌[ ∂^k_μ∂^j_μ h_θ(s, X̃_s^t, x, μ(θ), _X̃_s^t, ξ(θ))(X_s^t, x', μ(θ), X̌_s^t, ξ(θ)) ∂^i_μ (X_s^t, x', μ(θ))^j(v) ∂_θ_l (X̌_s^t, ξ(θ))^k] μ(x̣')
+ ∑_j, k=1^d ∫_ℝ^d 𝔼[ ∂_v_k∂^j_μ h_θ(s, X̃_s^t, x, μ(θ), _X̃_s^t, ξ(θ))(X_s^t, x', μ(θ)) ∂_θ_l (X_s^t, x', μ(θ))^k ∂^i_μ (X_s^t, x', μ(θ))^j(v) ] μ(x̣')
+ ∑_j=1^d ∫_ℝ^d 𝔼[ ∂^j_μ h_θ(s, X̃_s^t, x, μ(θ), _X̃_s^t, ξ(θ))(X_s^t, x', μ(θ)) ∂_θ_l∂^i_μ (X_s^t, x', μ(θ))^j(v)] μ(x̣').
In the above identity, X̌^t, ξ_s(θ) stands for a random variable independent of (X̃^t, x, μ_s, X_s^t, v, μ, X_s^t, x', μ) with the same law as X̃_s^t, ξ.
Then, starting from the expression of _θ in (<ref>) (with π=π_θ), the dominated convergence theorem guarantees that the derivatives (t, θ, x, μ, v) ↦∂_θ∂_x_θ(t, x, μ), ∂_x∂_θ_θ(t, x, μ), ∂_θ∂^2_x_θ(t, x, μ), ∂^2_x∂_θ_θ(t, x, μ), ∂_θ∂_μ_θ(t, x, μ)(v), ∂_μ∂_θ_θ(t, x, μ)(v), ∂_θ∂_v∂_μ_θ(t, x, μ)(v), ∂_v∂_μ∂_θ_θ(t, x, μ)(v) exist and are locally Lipschitz continuous. Hence, from Clairaut's theorem, we deduce that ∂_θ∂_x_θ(t, x, μ) = ∂_x∂_θ_θ(t, x, μ), ∂_θ∂^2_x_θ(t, x, μ) = ∂^2_x∂_θ_θ(t, x, μ), ∂_θ∂_μ_θ(t, x, μ)(v) = ∂_μ∂_θ_θ(t, x, μ)(v) and ∂_θ∂_v∂_μ_θ(t, x, μ)(v) = ∂_v∂_μ∂_θ_θ(t, x, μ)(v) for all t, x, μ, θ, v.
Moreover, from Assumption <ref> and Lemma <ref>, there exist q and C such that for any t, x, μ, v and any θ∈𝒦, 𝒦 being a compact subset of Θ
|∂_θ_θ(t, x, μ)| ≤ C(1 + |x|^2 + M_2(μ)^q),
|∂_θ∂_x_θ(t, x, μ)| + |∂_θ∂_μ_θ(t, x, μ)(v)| ≤ C ( 1+ |x| + |v|+ M_2(μ)^q),
and
|∂_θ∂^2_x_θ(t, x, μ)| + |∂_θ∂_v∂_μ_θ(t, x, μ)(v)| ≤ C ( 1+ |v| + M_2(μ)^q).
Now, differentiating with respect to θ both sides of (<ref>), we deduce that θ↦∂_t _θ(t, x, μ) is differentiable with a derivative ∂_θ∂_t _θ(t, x, μ) being continuous with respect to t, x, μ, θ. Also, taking π=π_θ and differentiating with respect to θ both sides of the identity of (<ref>) (using Lemma <ref> together with the estimates (<ref>), (<ref>), (<ref>) and the dominated convergence theorem to differentiate the right-hand side therein) and then passing to the limit as h↓ 0, we get that t↦∂_θ_θ(t, x, μ) is differentiable with a derivative ∂_t ∂_θ_θ(t, x, μ) being continuous with respect to t, x, μ, θ. We thus conclude that the two derivatives ∂_θ∂_t _θ(t, x, μ) and ∂_t ∂_θ_θ(t, x, μ) coincide for all t, x, μ, θ.
§.§ Proof of Theorem <ref>
Step 1: We start from the PDE characterisation of _θ in Proposition <ref> that we write as
∫_A {_θ^a[_θ](t,x,μ) + f(x,μ,a) + λlog p_θ(t,x,μ,a) } π_θ(ạ|t,x,μ) = 0,
where
_θ^a[φ](t,x,μ) = - βφ(t,x,μ) + ∂_tφ(t,x,μ) + b(x,μ,a) · D_xφ(t,x,μ) + 1/2σσ(x,μ,a) : D_x^2 φ(t,x,μ)
+ _ξ∼μ[ b_θ(t,ξ,μ) ·∂_μφ(t,x,μ)(ξ) + 1/2Σ_θ(t,ξ,μ) : ∂_υ∂_μφ(t,x,μ)(ξ) ],
recalling that b_θ(t,x,μ)=∫_A b(x,μ,a) π_θ(ạ|t,x,μ), Σ_θ(t,x,μ) = ∫_A (σσ)(x,μ,a) π_θ(ạ|t,x,μ).
For any fixed t, x, μ, we now differentiate w.r.t. θ∈Θ both sides of (<ref>) to get a new system of linear PDEs satisfied by _θ.
In particular, using the identity
∇_θ[_θ^a[_θ](t,x,μ)] = _θ^a[_θ](t,x,μ) + _θ[_θ](t,x,μ),
together with (<ref>) and the dominated convergence theorem, we get
∫_A {_θ^a[_θ](t,x,μ) + _θ[_θ](t,x,μ)
+ [ _θ^a[_θ](t,x,μ) + f(x,μ,a) + λlog p_θ(t,x,μ,a) ] ∇_θlog p_θ(t,x,μ,a) }π_θ(ạ|t,x,μ) = 0,
with terminal condition _θ(T,x,μ)=0.
Note that we have used the fact that
∫_A ∇_θlog p_θ(t,x,μ,a) π_θ(ạ|t,x,μ) = ∇_θ∫_A π_θ(ạ|t,x,μ) = 0,
and the above PDE is a system of D equations, where _θ^a[_θ] denotes the operator applied to each component of the ^D-valued function _θ.
Step 2: Denote by
F̃_θ(t,x,μ,a) = {_θ^a[_θ](t,x, μ) + f(x,μ,a) + λlog p_θ(t,x,μ,a) }∇_θlog p_θ(t,x,μ,a)
+ _θ[_θ](t,x,μ),
and
f̃_π_θ(t,x,μ) = ∫_AF̃_θ(t,x,μ,a) π_θ(ạ|t,x,μ),
so that the linear PDE (<ref>) satisfied by _θ now writes
_π_θ[_θ](t,x,μ) + f̃_π_θ(t,x,μ) = 0,
with terminal condition _θ(T,x,μ)=0. Observe that the above PDE is similar to (<ref>). In order to obtain the announced probabilistic representation formula, we first apply the chain rule formula on the strip [t, T] ×^d×_2(^d), see e.g. Proposition 5.102 in <cit.>, to (e^-β s_θ(s, X_s^t,x, μ,_X_s^t, ξ))_s ∈ [t, T] using the estimates (<ref>) and (<ref>). We thus obtain
d(e^-β s_θ(s, X_s^t,x, μ,_X_s^t, ξ)) = - e^-β sf̃_π_θ(s, X_s^t,x,μ,_X_s^t,ξ) ṣ
+ e^-β s∂_x _θ(s, X_s^t, x, μ,_X_s^t, ξ)σ_π_θ(X_s^t, x, μ, _X_s^t,ξ) Ẉ_s.
Observe that (<ref>) together with the fact that for any θ∈^D, |σ_π_θ(x, μ)| ≤ C(1+|x|+M_2(μ)), for some constant C, directly yields that the stochastic integral is a square integrable martingale. Hence, integrating from t to T both sides of the above and using the facts that _θ(T,x,μ)=0 and ℙ_X_s^t, ξ = ℙ_X_s^t, ξ, ℙ_X_s^t, x, μ = ℙ_X_s^t, x, μ , we eventually deduce
_θ(t,x,μ) = _α∼π_θ[ ∫_t^T e^-β(s-t)F̃_θ(s, X_s^t,x,μ,_ X_s^t,ξ, α_s) ṣ].
Step 3: On the other hand, applying again the chain rule formula to _θ(s,X_s^t,x,μ,_X_s^t,ξ), when α∼π_θ, see e.g. Proposition 5.102 in <cit.>, we have
_θ(s, X_s^t,x,μ, _ X_s^t,ξ)
=
( ^α_s_θ[_θ](s, X_s^t, x, μ, _ X^t, ξ_s) + β_θ(s, X_s^t,x,μ,_ X_s^t,ξ) ) ṣ
+
D_x _θ(s, X_s^t,x,μ,_ X_s^t,ξ)σ( X_s^t,x,μ,_ X_s^t,ξ, α_s) Ẉ_s, t ≤ s ≤ T,
and thus by definition of F̃_θ
∫_t^T e^-β(s-t)F̃_θ(s, X_s^t,x,μ,_ X_s^t,ξ, α_s) ṣ
= ∫_t^T e^-β(s-t)∇_θlog(p_θ(s, X_s^t, x, μ, _ X_s^t, ξ, α_s)) (_θ(s, X_s^t, x, μ, _X_s^t, ξ) - β_θ(s, X_s^t, x, μ, _ X_s^t, ξ)
+ _θ[_θ](s,X_s^t, x, μ, _X_s^t, ξ) ) ṣ
+ ∫_t^T e^-β(s-t)∇_θlog(p_θ(s, X_s^t, x, μ, _ X_s^t, ξ, α_s)) ( f(X_s^t,x,μ,_ X_s^t,ξ, α_s) + λlog(p_θ (s, X_s^t, x, μ, _ X_s^t, ξ, α_s) ) ) ṣ
- ∫_t^T e^-β(s-t)∇_θlog(p_θ(s, X_s^t, x, μ, _ X_s^t, ξ, α_s)) D_x _θ(s, X_s^t,x,μ,_ X_s^t,ξ)σ( X_s^t,x,μ,_ X_s^t,ξ, α_s) Ẉ_s.
Note that (<ref>) as well as the bound |D_x V_θ(s, x, μ)|≤ C(1+|x|+|μ|^q), for some q≥0, directly deduced from the identity (<ref>) and Assumption <ref>, guarantees that the stochastic integral appearing in the right-hand side of the above identity is a square integrable martingale. Hence, taking expectation in both sides of the above identity eventually yields
G_θ(t,x,μ) := _α∼π_θ[ ∫_t^T e^-β(s-t)∇_θlog p_θ(s,X_s^t,x,μ,_X_s^t,ξ,α_s) {_θ(s,X_s^t,x,μ,_X_s^t,ξ)
+ [ f(X_s^t,x,μ,_X_s^t,ξ,α_s) + λlog p_θ(s,X_s^t,x,μ,_X_s^t,ξ,α_s) - β_θ(s,X_s^t,x,μ,_X_s^t,ξ) ] ṣ}
+ ∫_t^T e^-β(s-t)_θ[_θ](s,X_s^t,x,μ,_X_s^t,ξ) ṣ].
This proves the announced probabilistic representation formula for G_θ.
§ LINEAR QUADRATIC MEAN-FIELD CONTROL WITH RANDOMISED CONTROLS AND ENTROPY REGULARISATION
A stochastic policy is a probability transition kernel from [0,T]×^d×_2(^d) into A=^m, i.e., a measurable function π:(t,x,μ)∈[0,T]×^d×_2(^d)↦π(.|t,x,μ)∈(^m). We denote by Π the set of stochastic policies
π with densities p with respect to the Lebesgue measure on ^m: π( ạ |t,x,μ)=p(t,x,μ,a)ạ.
We say that the process α=(α_t)_t is a randomised feedback control generated from a stochastic policy π∈Π, denoted by α∼π, if at each time t, the action α_t is sampled (according to the σ-algebra )
from the probability distribution π(.|t,X_t,_X_t). The dynamics X=X^α follows a linear mean-field dynamics with coefficients b(x,μ,a)=b̅(x,μ̅,a), σ(x,μ,a)=σ̅(x,μ̅,a) in the form
b̅(x,x̅,a) = B x + B̅x̅ + C a, σ̅(x,x̅,a) = γ + D x + D̅x̅ + Fa,
for (x,μ,x̅,a)∈^d×_2(^d)×^d×^m, where we denote by μ̅=∫ x μ(x̣), B, B̅, D, D̅ are constant matrices in ^d× d, C, F are constant matrices in ^d× m, γ is a constant in ^d.
Given a stochastic policy π∈Π, we consider the functional cost V^π with entropy regulariser defined in (<ref>) with quadratic functions f(x,μ,a)=f̅(x,μ̅,a) and g(x,μ)=g̅(x,μ̅):
f̅(x,x̅,a) = x Qx + x̅Q̅x̅ + a N a + 2a Ix + 2aI̅x̅ + 2M.x + 2H.a,
g̅(x,x̅) = x P x + x̅P̅x̅ + 2L.x,
where N is a symmetric matrix in _+^m, I, I̅∈^m× d, Q, Q̅, P, P̅ are symmetric matrices in ^d,
M, L∈^d, H∈^m, assumed to satisfy the conditions:
(H1) (i) There exists δ>0 s.t.
N ≥ δ I_m, P ≥ 0, Q - I N^-1I ≥ 0.
or (ii) n=m=1, I=0, F≠0, Q≥0, P>0.
(H2) (i) There exists δ>0 s.t.
N ≥ δ I_m, P + P̅ ≥ 0, (Q + Q̅) - (I + I̅) N^-1 (I + I̅) ≥ 0.
or (ii) I+I̅=0, F≠0, Q + Q̅≥0, P+P̅≥0, P>0.
The solution to the LQ mean-field control problem with entropy regulariser is then given by the following theorem:
Let Assumptions (H1)- (H2) hold. Then, the value function is equal to
v(t,x,μ) := inf_π∈Π V^π(t,x,μ) = (x-μ̅) K(t)(x-μ̅)+μ̅Λ(t)μ̅+2Y(t) x+R(t),
for (t,x,μ)∈[0,T]×^d×_2(^d), where the quadruple (K,Λ,Y,R) valued in (_+^d,_+^d,^d,) is solution on [0,T] to the system of Riccati equations:
K̇(t) - β K(t) +Q+K(t)B+B K(t)+D K(t) D
-(I+C K(t)+F K(t) D) (N+F K(t) F)^-1(I+C K(t)+F K(t) D) = 0,
Λ̇(t) -βΛ(t) + Q̂ +Λ(t)B̂ +B̂Λ(t)+D̂ K(t)D̂
- (Î +CΛ(t)+F K(t)D̂)(N+F K(t) F)^-1(Î +CΛ(t)+F K(t)D̂) = 0
Ẏ(t) -β Y(t) +M+B̂ Y(t)+ D̂ K(t)γ
-(Î +CΛ(t)+F K(t) D̂)(N+F K(t) F)^-1(H+C Y(t)+F K(t)γ) = 0
Ṙ(t) -β R(t) +γ K(t)γ + λ m/2log(2π)-λ/2log|λ/2 det(N+F K(t) F)|
-(H+C Y(t)+F K(t)γ)(N+F K(t) F)^-1(H+C Y(t)+F K(t)γ) = 0
with the terminal condition (K(T),Λ(T),Y(T),R(T))=(P,P̂,L,0), where we set Î:=I+I̅, B̂:=B+B̅, D̂:=D+D̅,
Q̂:=Q + Q̅, P̂:=P+P̅.
Moreover, the optimal stochastic policy follows a Gaussian distribution:
π^*(.|t,x,μ) = ( - S(t)^-1( U(t) x + (Û(t) - U(t))μ̅+ O(t) ); λ/2 S(t)^-1),
where we set
S(t) := N + F K(t) F, O(t) := H + C Y(t) + F K(t) γ
U(t) := I + C K(t) + F K(t) D, Û(t) := Î + C Λ(t) + F K(t) D̂.
Conditions (H1) and (H2) ensure the existence and uniqueness of a solution (K,Λ) to the matrix Riccati equation in (<ref>) satisfying K≥0, Λ≥0 (hence S(t)^-1 is well-defined). Given (K,Λ), the equations for
(Y,R) are simply linear ODEs.
Let ^r be the set of _2(^m)-valued -adapted processes π=(π_t)_t with densities p=(p_t)_t w.r.t. to the Lebesque measure: π_t(ạ)=p_t(a) ạ.
We say that an ^m-valued process α=(α_t)_t is a randomised (open-loop) control generated from π∈^r, denoted by α∼π, if at each time t, the decision α_t is sampled from the probability distribution π_t.
We then consider the problem of minimizing over randomised controls α∼π∈^r the cost functional with entropy regulariser
J(π) = _α∼π[ ∫_0^T e^-β t( f(X_t,_X_t,α_t) + λ∫_^mlog p_t(a) ạ) ṭ + e^-β T g(X_T,_X_T) ],
where the process X=X^α follows a linear mean-field dynamics, and f, g are quadratic cost functions, namely:
b(x,μ,a) = B x + B̅μ̅+ C a, σ(x,μ,a) = γ + D x + D̅μ̅+ Fa,
f(x,μ,a) = x Qx + μ̅Q̅μ̅+ a N a + 2a Ix + 2aI̅μ̅+ 2M.x + 2H.a,
g(x,μ) = x P x + μ̅P̅μ̅+ 2L.x,
for (x,μ,a)∈^d×_2(^d)×^m, where we denote by μ̅=∫ x μ(x̣), B, B̅, D, D̅ are constant matrices in ^d× d, C, F are constant matrices in ^d× m, γ is a constant in ^d,
N is a symmetric matrix in _+^m, I, I̅∈^m× d, Q, Q̅, P, P̅ are symmetric matrices in ^d, with Q≥0, P≥0,
M, L∈^d, H∈^m.
Proof of Theorem <ref>. We adapt the arguments in <cit.> to our case with randomised controls and entropy regulariser.
Step 1. Let us consider the function defined on [0,T]×^d×_2(^d) by w(t,x,μ)=w̅(t,x,μ̅), where w̅ is defined on [0,T]×^d×^d by
w̅(t,x,x̅) = (x-x̅) K(t)(x-x̅)+x̅Λ(t)x̅+2Y(t) x+R(t),
for some functions (to be determined later) K, Λ, Y and R on [0,T], and valued on _+^d, _+^d, ^d, and . Fix (t_0,x_0,μ_0)∈[0,T]×^d×_2(^d), and ξ_0∈L^2(_t_0;^d)∼μ_0. Given π∈Π with density p, and a randomised control α∼π, we consider the process
_t^α := e^-β(t-t_0)w̅(t,X_t^t_0,x_0,μ_0,X̅_t^t_0,μ_0) + ∫_t_0^t e^-β(s-t_0)[ f̅(X_s^t_0,x_0,μ_0,X̅_s^t_0,μ_0,α_s)
+ λ∫_^m(log_t(a) ) _t(a) ạ
] ṣ,
for t_0≤ t ≤ T, where we set _t(a)=p(t,X_t^t_0,x_0,μ_0,_X_t^t_0,ξ_0,a), and
X̅_t^t_0,μ_0:=_α∼π[X_t^t_0,ξ_0] which follows the dynamics:
d X̅_t = ( B̂X̅_t + C α̅_t) ṭ,
with α̅_t:=_α∼π[α_t].
Step 2. We apply Itô's formula to _t^α for α∼π, and take the expectation to get
_α∼π[_t^α] = e^-β(t-t_0)_α∼π[_t^α] ṭ,
with
_t^α = - βw̅(t,X_t,X̅_t) + /ṭ_α∼π[w̅(t,X_t,X̅_t)] + f̅(X_t,X̅_t,α_t) + λ∫_^m (log_t(a)) _t(a) ạ,
where we omit the dependence on t_0,x_0,μ_0 of X and X̅ to alleviate notations. By applying Itô's formula to w̅(t,X_t,X̅_t), recalling the quadratic forms of w̅, f̅, and using the linear dynamics of X and X̅, we obtain similarly as in <cit.> (after careful but straightforward computations):
_α∼π[_t^α] = _α∼π[
(X_t-X̅_t)(K̇(t) - β K(t) + Q +K(t)B+B K(t)+D K(t) D)(X_t-X̅_t)
+ X̅_t( Λ̇(t) - βΛ(t) + Q̂ + Λ(t) B̂ + B̂Λ(t)+ D̂ K(t)D̂)X̅_t
+ 2(Ẏ(t) - β Y(t) + M + B̂ Y(t)+D̂ K(t)γ) X_t + Ṙ(t) - β R(t) +γ K(t)γ
+ α_t S(t) α_t + 2α_t( U(t) (X_t - X̅_t) + Û(t) X̅_t + O(t) ) + λ∫_^m (log_t(a)) _t(a) ạ]
= _α∼π[
(X_t-X̅_t)(K̇(t) - β K(t) + Q +K(t)B+B K(t)+D K(t) D)(X_t-X̅_t)
+ X̅_t( Λ̇(t) - βΛ(t) + Q̂ + Λ(t) B̂ + B̂Λ(t)+ D̂ K(t)D̂)X̅_t
+ 2(Ẏ(t) - β Y(t) + M + B̂ Y(t)+D̂ K(t)γ) X_t + Ṙ(t) - β R(t) +γ K(t)γ
+ ∫_^m [ ϕ_t(a) + λlog_t(a) ] _t(a) ạ],
where we used in the last equality the fact that α∼π, and set ϕ_t(a):=a S(t) a + 2 a χ_t with
χ_t:=U(t) (X_t - X̅_t) + Û(t) X̅_t + O(t).
Step 3. Let ϕ be a quadratic function on ^m: ϕ(a)=a S a + 2 aχ for some positive-definite matrix S∈_+^m, and χ∈^m, and denote by
_2(^m) the set of square integrable density functions on ^m, i.e., the set of nonnegative measurable functions on ^m s.t. ∫_^m(a) ạ=1, and ∫_^m |a|^2 (a) ạ<∞. Let us consider the cost functional on _2(^m) defined by
C_ϕ() := ∫_^m [ ϕ(a) + λlog(a) ] (a) ạ.
Then, the minimizer of C_ϕ is achieved with ^*∈_2(^m) given by
^*(a) = exp(-1/λϕ(a) )/∫_^mexp(-1/λϕ(a) ) ạ, a ∈^m.
Indeed, by considering the Lagrangian function associated to this minimization problem
L_ϕ(,ν) = C_ϕ() - ν( ∫_^m(a)ạ - 1 ) = ∫_^m[ ϕ(a) + λlog(a) - ν] (a) ạ + ν,
for (,ν)∈_2(^m)×, we see that the minimization over is obtained pointwisely, i.e. inside the integral over a∈^m, hence leading to the first-order equations:
ϕ(a) + λlog^*(a) - ν^* + λ = 0, a ∈^m,
∫_a ∈^m^*(a) ạ = 1.
This yields the expression of ^* in (<ref>), which is actually the density of a Gaussian distribution
π^* = ( - S^-1χ; λ/2 S^-1).
The infimum of C_ϕ is then equal to
inf_∈_2(^m) C_ϕ() = C_ϕ(^*) = - χ S^-1χ - λ m/2log(2π)-λ/2log|λ/2det(S)|.
Step 4. Notice that under (H1), the matrix S(t)=N+F K(t) F is positive-definite for K≥0, and _t(.)∈_2(^m) a.s. for t∈[t_0,T].
From (<ref>) and (<ref>), we then have for all π∈Π,
_α∼π[_t^α]
= _α∼π[
(X_t-X̅_t)(K̇(t) - β K(t) + Q +K(t)B+B K(t)+D K(t) D)(X_t-X̅_t)
+ X̅_t( Λ̇(t) - βΛ(t) + Q̂ + Λ(t) B̂ + B̂Λ(t)+ D̂ K(t)D̂)X̅_t
+ 2(Ẏ(t) - β Y(t) + M + B̂ Y(t)+D̂ K(t)γ) X_t + Ṙ(t) - β R(t) +γ K(t)γ
+ C_ϕ_t(_t) ]
≥ _α∼π[
(X_t-X̅_t)(K̇(t) - β K(t) + Q +K(t)B+B K(t)+D K(t) D - U(t) S(t)^-1 U(t) )(X_t-X̅_t)
+ X̅_t( Λ̇(t) - βΛ(t) + Q̂ + Λ(t) B̂ + B̂Λ(t)+ D̂ K(t)D̂ - Û(t) S(t)^-1Û(t) )X̅_t
+ 2(Ẏ(t) - β Y(t) + M + B̂ Y(t)+D̂ K(t)γ - O(t) S(t)^-1Û(t) ) X_t
+ Ṙ(t) - β R(t) +γ K(t)γ - O(t) S(t)^-1O(t) - λ m/2log(2π)-λ/2log|λ/2det(S(t))|.
Therefore, by taking (K,Λ,Y,R) solution to (<ref>), we see that the r.h.s. of (<ref>) vanishes, which means that for all π∈Π, _α∼π[_t^α]≥0. Moreover, from (<ref>), the equality in (<ref>) holds true for the choice of π^*∈Π as defined in
(<ref>), and thus
inf_π∈Π_α∼π[_t^α] = _α∼π^*[_t^α] = 0, t ∈ [t_0,T].
From (<ref>), this means that the function t↦_α∼π[_t^α] is nondecreasing on [t_0,T] for any π∈Π, and constant on [t_0,T] for π=π^*. By definition of ^α, V^π, and noting that w̅(T,x,x̅)=g̅(x,x̅) from the terminal condition on (K,Λ,Y,R),
it follows that
w(t_0,x_0,μ_0) = w̅(t_0,x_0,μ̅_0) = _α∼π[S_t_0^α] ≤ _α∼π[S_T^α] = V^π(t_0,x_0,μ_0),
for any π∈Π, with equality in (<ref>) for π=π^*. We conclude that
inf_π∈Π V^π(t_0,x_0,μ_0) = V^π^* (t_0,x_0,μ_0) = w(t_0,x_0,μ_0)
= (x_0-μ̅_̅0̅) K(t_0)(x_0-μ̅_̅0̅)+μ̅_̅0̅Λ(t_0)μ̅_̅0̅+2Y(t_0) x_0+R(t_0).
plain
|
http://arxiv.org/abs/2303.06881v1
|
20230313055636
|
OverlapNetVLAD: A Coarse-to-Fine Framework for LiDAR-based Place Recognition
|
[
"Chencan Fu",
"Lin Li",
"Linpeng Peng",
"Yukai Ma",
"Xiangrui Zhao",
"Yong Liu"
] |
cs.CV
|
[
"cs.CV",
"cs.RO"
] |
[
[
March 30, 2023
==================
empty
empty
Place recognition is a challenging yet crucial task in robotics. Existing 3D LiDAR place recognition methods suffer from limited feature representation capability and long search times. To address these challenges, we propose a novel coarse-to-fine framework for 3D LiDAR place recognition that combines Birds' Eye View (BEV) feature extraction, coarse-grained matching, and fine-grained verification. In the coarse stage, our framework leverages the rich contextual information contained in BEV features to produce global descriptors. Then the top-K most similar candidates are identified via descriptor matching, which is fast but coarse-grained. In the fine stage, our overlap estimation network reuses the corresponding BEV features to predict the overlap region, enabling meticulous and precise matching. Experimental results on the KITTI odometry benchmark demonstrate that our framework achieves leading performance compared to state-of-the-art methods. Our code is available at: <https://github.com/fcchit/OverlapNetVLAD>.
§ INTRODUCTION
Place recognition is a crucial task in mobile robots and autonomous driving, as it enables the recognition of previously visited places and provides a basis for loop closure detection. In particular, it plays a vital role in Simultaneous Localization and Mapping (SLAM), where identifying loop closures helps to correct drift and tracking errors. Visual place recognition (VPR) has been widely studied due to the low cost and rich texture information provided by cameras. In VPR, there are two main methods to describe places: local and global feature descriptors. Local descriptors are selectively extracted from parts of an image with a detection phase, while global descriptors are extracted from the entire image regardless of its content. However, long-term robot operations have revealed that changing appearance is a significant factor in visual place recognition failure<cit.>.
Recently, LiDAR sensors have gained popularity for place recognition due to their ability to provide a wider field of view compared to cameras. Similar to visual place recognition methods, most LiDAR place recognition methods extract features from input point clouds to produce local or global descriptors<cit.>. However, local descriptors have limited representational power, and the detecting phase is time-consuming, while global descriptors may suffer from overfitting and are less robust to transformations. Inspired by Predator<cit.>, a unified BEV model<cit.>, later called BEVNet, has been proposed to jointly learn 3D local features and overlap estimation. The ability of BEVNet to predict overlap regions significantly enhances its performance on point cloud registration and loop closure. However, the overlap prediction process is time-consuming, and the exhaustive search time increases significantly with the size of the database.
To address these challenges, we propose a novel coarse-to-fine framework based on NetVLAD<cit.> and BEVNet<cit.> that efficiently uses BEV features to perform loop closure. Our framework comprises three parts: BEV feature extraction, coarse-grained matching, and fine-grained verification. Since BEV is a well-known natural and straightforward candidate view<cit.>, we first convert the input point cloud to a BEV representation, which is a voxel grid of multiple layers of BEVs. Then the backbone network extracts BEV features in 2D space, which is more efficient than using 3D convolutions due to the sparsity and irregularity of voxels in 3D space. In the coarse-grained matching stage, a global descriptor generation network produces a 1D global descriptor vector from encoded BEV features, and the query scan is matched against all other descriptors in the database to search for the top-K approximate nearest neighbors. Finally, in the fine-grained verification stage, the candidates are further validated by pairwise overlap prediction using an overlap estimation network, and the candidate with the highest overlap score is considered the final match. Our framework is efficient and maintains high place recognition ability. By utilizing the BEV representation, we extract useful information from point clouds and fully utilize it in our place recognition task. The proposed method significantly reduces the time-consuming overlap prediction process and is more effective in determining the matching place than existing methods. Fig.<ref> provides an illustration of our proposed framework.
The main contributions can be summarized as follows:
* A coarse-to-fine place recognition framework that efficiently uses BEV features to perform loop closure.
* A low-time-consuming coarse place candidate search method based on global descriptor matching.
* An efficient method for validating selected place candidates through overlap detection without prior knowledge.
* Comprehensive experiments and detailed ablation studies on the KITTI dataset<cit.> to validate the effectiveness of the proposed framework.
§ RELATED WORK
§.§ Point Cloud Description
To enable comparisons with other point clouds, descriptors are often utilized to provide a distinctive and reliable description of a point cloud feature. Descriptors can be classified into two categories: local descriptors and global descriptors. The difference between them lies in whether they describe the entire point cloud or not.
Local descriptors are usually generated by detecting keypoints. Guo et al.<cit.> design a local descriptor ISHOT by coupling the geometric and intensity information. Xia et al.<cit.> propose a self-attention and orientation encoding network called SOE-Net, which incorporates long-range context into point-wise local descriptors. Luo et al.<cit.> project 3D LiDAR scans to bird's-eye view images and design a descriptor called bird's-eye view feature transform (BVFT). However, local descriptors have limited representational power since they only capture local features and cannot capture the global context of the scene. In addition, local descriptors require the detection of feature points in the point cloud and the calculation of the correspondences, resulting in a higher computational cost.
Global descriptors have emerged as an alternative to local descriptors, as they can capture the entire scene and provide a single feature vector for the whole point cloud. Several hand-crafted global descriptors have been proposed, including M2DP <cit.> and Scan Context <cit.>, which encode the scene into a compact feature representation. Inspired by Scan Context, SSC<cit.> uses semantic information to improve the representation ability of descriptors.
In recent years, learning-based 3D global descriptors have gained popularity in the research community. PointNetVLAD<cit.>, for example, combines PointNet<cit.> and NetVLAD<cit.> to extract global descriptors in an end-to-end manner. SpoxelNet<cit.> encodes voxelized point clouds into global descriptor vectors, while Locus<cit.> leverages topological and temporal information and aggregates multi-level features via second-order pooling. Other approaches focus on aggregating semantic information of point clouds. Kong et al.<cit.> propose a semantic graph representation for place recognition, and Li et al.<cit.> design a rotation-invariant global descriptor that combines semantic and geometric features and utilize a neural network to predict the similarity of descriptor pairs. There are also methods that explore new ways of encoding the features, such as DiSCO<cit.> which exploits the magnitude of the spectrum as a place descriptor, and MinkLoc3D<cit.> which uses a 3D Feature Pyramid Network<cit.> and GeM<cit.> pooling to produce global descriptors. FusionVLAD<cit.> generates multi-view representations from LiDAR scans and uses parallel encoders to fuse top-down and spherical features into translation-insensitive and rotation-invariant global descriptors. More recent works propose novel architectures to improve the representation ability of global descriptors. OverlapTransformer<cit.> utilizes a yaw-angle-invariant architecture to produce global descriptors using a transformer network, while LoGG3d-Net<cit.> leverages SparseConv U-Net to extract local feature embeddings, which are aggregated using second-order pooling and Eigen-value Power Normalization to generate global descriptors.
Considering the requirement of the place recognition task, we leverage global descriptors in the coarse searching of our framework. Since NetVLAD exhibits powerful feature representation capabilities and can be easily plugged into any other CNN architecture, we leverage it to generate global descriptors.
§.§ Coarse-to-Fine Methods
Coarse-to-fine methods have become increasingly popular in visual place recognition, as they allow for efficient searching of large-scale environments. BoCNF<cit.> is one such method, which uses BoW in the coarse stage to search for top-K candidate images, followed by a hash-based voting scheme in the fine stage to identify the best match. Similarly, Sarlin et al.<cit.> propose a hierarchical framework that first performs global retrieval using global descriptors and then matches local features within the candidate places. Qi et al.<cit.> propose a progressive coarse-to-fine framework that employs global descriptors to discover visually similar references and local descriptors to filter irrelative patterns. They select candidates by global KNN retrieval and then re-rank them by region refinement and Spatial Deviation Index (SDI) spatial verification. Garg et al.<cit.> propose a semantic-geometric visual place recognition method that also uses the coarse-to-fine matching process for loop closure detection. They design a visual semantics-based descriptor and select the top N matching candidates by a cosine distance-based global place search, followed by keypoint correspondence and spatial layout consistency checks to select the best match. These methods demonstrate the effectiveness of coarse-to-fine strategies in visual place recognition.
In recent years, there has been a growing interest in developing more advanced coarse-to-fine methods for LiDAR-based place recognition. Cop et al.<cit.> design an intensity-based local descriptor DELIGHT and propose a two-stage framework to perform place recognition. They first search for N most similar DELIGHT descriptors and then perform the geometrical recognition on place candidates. The number N of place candidates is initialed as one and increases during validation until positioning succeeds or fails. Gong et al.<cit.> propose a two-level framework containing two phases, i.e., description and searching. The searching phase can be seen as a coarse-to-fine method. They first segment the point cloud into multiple clusters and extract the spatial relation descriptors (SRDs) between the clusters to form the spatial relation graph (SRG). They then utilize a two-level matching model to perform a coarse-to-fine matching of the SRGs. The upper-level searching model uses an incremental bag-of-works model to search for candidates. Then The lower-level matching model utilizes an improved spectral method to evaluate the similarities between SRGs.
However, most of the existing methods rely on a single type of descriptor, which may not be able to fully capture the rich geometric information present in the point clouds. This limits their descriptive capability and can lead to a loss of significant information, resulting in unsatisfactory recognition performance. To address these limitations, we propose a novel framework that utilizes a powerful backbone network to extract contextual information for generating global descriptors and predicting overlapping regions. This framework combines the fast but coarse-grained matching of global descriptors with the slow but fine-grained evaluation of overlap regions, allowing for more accurate and efficient place recognition.
§ METHODOLOGY
In this section, we describe the details of the proposed coarse-to-fine framework. We begin by introducing the BEV feature extraction process, which uses a backbone network to extract features from the voxel representation of the input point cloud in 2D space. Next, we describe the coarse-grained matching stage, where a global descriptor generation network aggregates the encoded feature map to produce a 1D global descriptor vector, and candidate scans are selected by matching the descriptors. Finally, we introduce the fine-verification stage, where corresponding pairwise BEV features are used to predict overlap regions, and the final match is obtained by calculating the overlap score. We also discuss additional design details, such as loss functions. An overview of our framework is shown in Fig. <ref>.
§.§ BEV Feature Extraction
Since the raw point cloud is irregular and unstructured, we first create a voxel grid from the input point cloud. We adopt a multi-layer occupied BEV representation<cit.>, where each voxel is considered occupied if there is any point in it. By doing this, the point cloud P is divided into a H_B× W_B× C_B grid, resulting in a BEV representation B_P∈ℝ^H_B× W_B× C_B.
Backbone. The encoder module of the BEVNet<cit.> can effectively extract contextual information, so we leverage it as our backbone network. The backbone is a 2D convolution network with a solid ability to extract complex features. We feed the BEV grid into the network to extract deep features in 2D space. Considering the sparsity of the point cloud, 2D sparse convolutions are used to speed up the feature extraction. The final output feature map (BEV features) contains rich and useful contextual information, which is then stored in the database. The BEV feature map is as follows:
E_P = ℰ(B_P),
where ℰ: Bℝ^H_E× W_E× D_E is the shared 2D BEV feature extractor, which maps the BEV grid B_P to a H_E × W_E × D_E dimensional BEV feature map E_P.
§.§ Coarse-Grained Matching
After extracting a BEV feature map from the input voxel grid, the feature E_P is passed through the global descriptor generation network. The network comprises two convolutional layers, a NetVLAD layer and a fully connected layer. The last two modules are followed by <cit.>. First, we leverage the convolutional layers to aggregate features, and the output feature E'_P is computed as follows:
E'_P = Con_3×3(ReLU(Con_3×3(E_P))),
then the feature E'_P is fed into the NetVLAD layer. The NetVLAD layer aggregates local descriptors x_i ∈ℛ^D within the (N× D)-dimension feature by summing the residuals between each descriptor and K cluster centers, which are weighted by soft-assignment of descriptors to multiple clusters. The output VLAD representation V is a D × K matrix.
V(j, k) = ∑_i=1^N a_k(x_i) (x_i(j)-c_k(j)),
where a_k denotes the soft-assignment, x_i is the i^th descriptor in E'_P, and x_i(j) is the j^th element of the i^th descriptor, c_k is the k^th cluster center.
To reduce computational costs, we utilize a fully connected layer to reduce the dimension of the VLAD descriptors, followed by <cit.>. Finally, we obtain the global descriptor vector F(P) ∈ℝ ^ 𝒪, where 𝒪≪ (D × K).
The coarse phase of our proposed framework involves searching for candidates close to the query place. Since matching 1D descriptor vectors is computationally efficient, we perform candidate selection by descriptor matching. First, we generate global descriptors for all point clouds and build up a descriptor database. We then compute the distance matrix between the descriptor of the query scan and the remaining descriptors in the database. To select the top-K approximate nearest neighbors as candidate matches, we sort the distances in ascending order based on the K closest distances. However, as the number of descriptors increases significantly with the expansion of the map in real-world autonomous driving scenarios, computation of the distance matrix may become prohibitively slow. To address this, we use a KD-tree implementation to accelerate feature matching. We compute pairwise Euclidean distances between the descriptor vectors of the point clouds P and Q.
D_PQ = ∥ F(P)-F(Q) ∥_2,
where ∥·∥_2 denotes the L_2 normalization and F(·) denotes the function that maps the input point cloud to a global descriptor vector.
§.§ Fine-Grained Verification
In the fine-grained verification stage, we use overlap estimation to identify the most similar place among the top-K candidates. A cross-attention module is utilized to detect the overlap regions. The cross-attention mechanism can effectively interact information<cit.> and aggregate the contextual information to enhance feature representation. We reuse the previously stored features to reduce the overall computation time. Pairwise BEV features are fed into a cross-attention architecture to fuse features, similar to ImLoveNet<cit.>. We estimate overlap regions between pairs using the similarity score as an evaluation metric and select the point cloud with the highest overlap score as the final match. The overlap estimation process is illustrated in Fig.<ref>.
Cross-Attention. We use a cross-attention module that is similar to the one used in ImLoveNet <cit.> but with a slight modification. Instead of fusing deep triple features from 2D images and 3D point clouds, we fuse 2D features E_P and E_Q to generate relevant feature maps M_P and M_Q.
M_P = E_P + MLP(cat(E_P, att(E_P, E_Q, E_Q)))
M_Q = E_Q + MLP(cat(E_Q, att(E_Q, E_P, E_P))),
where MLP(·) denotes a three-layer fully connected network, cat(·,·) means concatenation and att(·,·,·) is the attention model.
Classification Head. A binary classification is applied on the correlated feature maps M_P and M_Q to predict overlap region as follows:
γ_t = Sigmoid(Conv_3×3(ReLU(Conv_3×3 (M_t)))), t∈{P,Q},
The classification head consists of two 3×3 convolutional layers and a sigmoid layer with ReLU as the activation function.
Overlap Score. The overlap score is used to evaluate the similarity of pairwise point clouds by quantifying the overlapping area. The similarity metric is as follows:
τ = 1/2(∑γ_P/V_P + ∑γ_Q/V_Q),
where V_P and V_Q denote the total number of non-zeros volumes of M_P and M_Q.
§.§ Loss Function
The training of the descriptor generation network is supervised by quadruplet loss, while the overlap detection network uses classification loss and circle loss<cit.> as supervisions.
Quadruplet Loss. To train the global descriptor generation network, we use the quadruplet loss ℒ_quad. This loss helps the network learn how to accurately describe places so that the descriptors of close places are similar and the descriptors of distant places are significantly different. The quadruplet loss involves four inputs: an anchor, a positive input, and two negative inputs. So our training tuple is as 𝒯={ F(P_a), F(P_p), F(P_n), F(P_n^*) }, where P_a is an anchor point cloud, P_p is a positive point cloud close to P_a. P_n and P_n^* are two different point clouds far away from P_a, and these two point clouds are structurally dissimilar to each other as well. The quadruplet loss is as follows:
ℒ_quad= [F(P_a)-F(P_p)_2 - F(P_a)-F(P_n)_2+α_1]_+
+ [F(P_a)-F(P_p)_2-F(P_n)-F(P_n^*)_2+α_2]_+,
where [·]_+ is the hinge loss, α_1 and α_2 are the constant margins.
Classification Loss. The classification loss adopts a binary cross entropy as
ℒ_bce=BCE(γ_P,l_P)+BCE(γ_Q,l_Q),
where BCE(·, ·) represents the binary cross entropy and l_P, l_Q are the ground truth of the overlap.
Circle Loss. In <cit.>, it is found that circle loss can strengthen the network's ability to perform overlap region classification, so we use circle loss as supervision as well. To balance the distribution of positive and negative samples, random sampling is performed on BEV feature maps. Positive and negative sets of correspondences are then formed for each element E_P_i of the BEV feature map E_P. Specifically, the positive set Ω_p(E_P_i) is defined as points in E_Q that lie within a radius r_p around E_P_i, while the negative set Ω_n(E_P_i) consists of points outside a radius r_n. The circle loss of E_P is formulated as follows:
ℒ_cir^P = 1/n_P∑^n_P_i=1 log[ 1 + ∑_j∈Ω_pe^β_p^j(d_i^j-Δ_p)·∑_k∈Ω_ne^β_n^k(Δ_n - d_i^k)],
where d_i^j = ‖ f'_E_P_i - f'_E_Q_j‖_2 denotes distance in the feature space, and Δ_n, Δ_p are negative and positive margins, the weights β_p^j and β_n^k are determined individually for each positive and negative example. The reverse loss ℒ_cir^Q is computed in the same way, and the total circle loss ℒ_cir = 1/2 (ℒ_cir^P + ℒ_cir^Q).
§ EXPERIMENTS
To demonstrate the effectiveness and practicality of our proposed OverlapNetVLAD framework for LiDAR-based place recognition, we designed a series of experiments. Specifically, we evaluate our method on the widely-used KITTI odometry benchmark and compare its performance with other state-of-the-art place recognition methods. Furthermore, we conduct ablation studies to investigate the impact of each module on the final results.
§.§ Datasets and Implementation Details
KITTI Odometry Benchmark. The KITTI odometry benchmark contains point clouds from various urban environments. The point clouds are collected using a Velodyne HDL-64E 3D laser scanner, which captures highly accurate 3D information. Moreover, the recording platform has a GPS/IMU location unit and RTK correction signals, providing ground truth poses<cit.>. The dataset includes 22 sequences, and we train our networks on the last 11 sequences with the ground truth trajectories provided by SemanticKITTI<cit.>. We evaluate the performance of our proposed method specifically on sequences 00, 02, 05, 06, 07, and 08, which contain revisited fragments, to detect loop closures.
Implementation Details. In the preprocessing stage, we transform the input point cloud into a BEV representation with a shape of 256×256×32. The backbone network then extracts a sparse 2D feature map with a shape of 32×32×512 using the SpConv<cit.> for improved speed. These feature maps are saved in a database for subsequent use by the global descriptor generator and overlap estimator.
For global descriptor generation, we use a NetVLAD layer with an intermediate feature dimension of 512, a maximum number of pooled samples of 1024, and 32 clusters. The output feature dimension is 1024, resulting in a final global descriptor vector length of 1024. The overlap estimator predicts the pairwise overlap region using a 1×32×32 tensor and calculates the overlap score.
To train the descriptor generation network, we use point clouds less than 10m away from the query scan as positive examples and those more than 50m away as negative examples. We use a pre-trained model from <cit.> to extract BEV features and perform overlap estimation. During the evaluation, we exclude the previous 50 scans of the query scan, as they are too close. For candidate selection in the coarse search, we use K=1% (of the sequence length) as the number of candidates. We denote our method with only global descriptor matching as ours-NV and the complete coarse-to-fine method as ours-ONV.
§.§ Loop Closure Detection
In this section, we present the evaluation of the loop closure detection performance of our proposed framework and compare it with several state-of-the-art methods, including OverlapTransformer<cit.>, DiSCO<cit.>, Locus<cit.>, RINet<cit.> and BEVNet<cit.>. We use recall@1 and recall@1% as the evaluation metric. The inference is considered correct if the distance between the matched scan and the query scan is less than 10m, otherwise incorrect. As shown in Tab. <ref>, our method (ours-ONV) achieves the highest recall@1, with a score 0.1% higher than BEVNet and significantly higher than the other methods. Although the recall@1 of BEVNet and our method is similar, our approach has the advantage of being much less time-consuming. This is because our method significantly reduces the number of candidates when searching for matches, which leads to using fewer pairwise overlap estimates. Interestingly, the recall@1 of BEVNet on sequences 06 and 07 is lower than ours, which we believe is due to the increased probability of misestimation when increasing the number of candidates. Notably, our method can effectively and robustly detect reverse loop closures in sequence 08, which has only reverse loop closures. As a result, our method can achieve comparable loop closure performance to BEVNet, while requiring fewer computational resources.
In terms of recall@1%, RINet, BEVNet, Ours-NV, and Ours-ONV achieve a score close to 100%, while other methods achieve around 96%. The recall@1% of ours-NV indicates that our candidate selection process provides valid and accurate candidates, which is the foundation of our coarse-to-fine approach.
Furthermore, we evaluate the performance of the proposed method using recall@N on the KITTI dataset. As shown in Fig. <ref>, our method outperforms most baseline methods. And the average recall on KITTI dataset is shown in Fig. <ref>. The experimental results demonstrate the strong robustness and good generalization ability of our method for place recognition under challenging conditions.
§.§ Ablation Study
In this section, we present our ablation studies on the proposed framework. We aim to evaluate the effectiveness of the coarse and fine stages of our approach independently. First, we investigate the impact of the global descriptor matching in the coarse stage. We choose the number of top references as N=1, 10, 15, 20, 25, 1% to test recall@N for place recognition using only global descriptor matching, which we refer to as ours-NV. As shown in Tab. <ref>, we observe that recall@1 alone is not sufficient to achieve outstanding performance, and the actual match places are not well recognized in sequence 08. However, as the number of candidates increases, the recall also increases significantly. When we use 1% of the total place as reference candidates, recall@1% achieves 99.9%. Therefore we choose K=1% as the candidate number for a coarse search.
Next, we evaluate the effect of candidate number K in the fine stage where the overlap estimation is applied. As shown in Tab. <ref>, the recall@1 of only using global descriptor to detect loop closure (VLAD) is much lower than ours ONV-1%, which selects 1% of all scans as candidates by descriptor matching. Overall the recall@1 of our methods grows with the number of candidates, as we expected. Meanwhile, the recall of our framework is almost the same as BEVNet<cit.> (Overlap in Tab. <ref>), while the latter is much more time-consuming. Comparing the results in Tab. <ref>, we observe that the overlap estimation works well to detect loop closure using the proposed candidate selection approach.
In conclusion, the ablation studies validate that combining global descriptor matching and overlap estimation creates an effective and robust coarse-to-fine framework.
§.§ Runtime
In this section, we conduct experiments to evaluate the efficiency of our method and compare it with other methods. The experiments are performed on a system equipped with an Intel Core i7-7700 CPU with 3.60GHz and an Nvidia GeForce GTX 1080 Ti with 11GB memory, using sequence 00 which contains 4541 scans. Tab. <ref> shows that the candidate selection only takes 12.50ms, while the pairwise overlap estimation takes 7.13ms. We mainly compare the time consumption of ours-ONV with BEVNet. Since both methods use the same BEV feature maps, and they can be saved in the database without needing to be extracted each time, we mainly compare the time after feature extraction. For a query scan on sequence 00, ours-ONV costs 0.46×4541+12.50+7.13×4540×1%=2425.06 ms, while BEVNet that performs overlap estimation for all references costs 7.13×4540=32370.20 ms. Notably, descriptors can also be saved in a database, eliminating the need to generate them for each search. Overall, Our method saves much time and has similar place recognition performance.
We also evaluate the runtime of other methods to compare the efficiency of descriptor generation. As shown in Tab. <ref>, the global descriptor generation in our framework is very efficient compared to the other methods.
In summary, the matching of global descriptors provides a coarse but fast candidate selection, which is the foundation of the proposed coarse-to-fine framework. The runtime evaluation validates the effectiveness of our framework for selecting multiple candidates to improve loop closure detection speed.
§ CONCLUSION
In this paper, we propose a novel coarse-to-fine framework that provides a robust and efficient solution for LiDAR-based place recognition. The combination of global descriptor matching and overlap estimation allows for fast candidate selection and accurate loop closure detection. Moreover, our method achieves leading performance on the KITTI odometry benchmark compared to the state-of-the-art methods. While the framework has some limitations, such as the bulky and memory-intensive BEV features, future work will address these challenges and explore the integration of multi-modal data for improved place recognition.
ieeetr
|
http://arxiv.org/abs/2303.06689v1
|
20230312153603
|
Self-planning Code Generation with Large Language Model
|
[
"Xue Jiang",
"Yihong Dong",
"Lecheng Wang",
"Qiwei Shang",
"Ge Li"
] |
cs.SE
|
[
"cs.SE"
] |
Projectability
disentanglement for accurate and automated electronic-structure Hamiltonians
Nicola Marzari
March 30, 2023
=============================================================================================
Although large language models have demonstrated impressive ability in code generation, they are still struggling to address the complicated intent provided by humans.
It is widely acknowledged that humans typically employ planning to decompose complex problems and schedule the solution steps prior to implementation.
Thus we introduce planning into code generation to help the model understand complex intent and reduce the difficulty of problem solving.
This paper proposes a self-planning code generation method with large language model, which consists of two phases, namely planning phase and implementation phase. Specifically, in the planning phase, the language model plans out the solution steps from the intent combined with in-context learning. Then it enters the implementation phase, where the model generates code step by step, guided by the solution steps.
The effectiveness of self-planning code generation has been rigorously evaluated on multiple code generation datasets and the results have demonstrated a marked superiority over naive direct generation approaches with language model. The improvement in performance is substantial, highlighting the significance of self-planning in code generation tasks.
“The art of programming is the art of organizing complexity."Edsger W.Dijkstra
§ INTRODUCTION
Programming is a pervasive and powerful tool for problem-solving. As one of the most central problems in programming theory, code generation allows machine to automatically programming to satisfy human intent expressed in the form of some specification.
In recent years, code generation has achieved great progress in both academia and industry <cit.>. In particular, large language models (LLMs) <cit.> demonstrates impressive code generation abilities, attracting attention from various fields such as artificial intelligence, natural language processing (NLP), and software engineering.
In code generation, the human-provided intent is usually a natural language description of "what to do" problem, while the model solves the problem by generating "how to do" code. When the intent is straightforward, it is easy to map to the solution, which can be well handled by state-of-the-art code generation models. However, as the problem becomes complicated and scaled, directly generating complex code satisfying intent is a challenge for both people and models, even LLMs. The human experience is that outlining a plan in advance and then completing the entire code step by step following the plan will make things easier. Inspired by this, we desire to incorporate planning into code generation. Plan-aided code generation has the following two benefits. 1) It can abstract the problem and provide instructions for solving it, which helps the model understand how to generate code. 2) It breaks down the complex problem into several easy-to-solve subproblems, which reduces the difficulty of problem solving. Therefore, the earlier plan can guide the generation of the correct code for complex problems.
However, plan-aided code generation presupposes the existence of an approach for converting intent into plan. If we build such an approach from scratch, it requires a large amount of resources to label intent-plan pairs for training. In-context learning provides an important way of using LLMs without training. Through in-context learning, we can achieve planning for code generation by simply prompting the LLMs with a few examples demonstrating the task, rather than fine-tuning individual model checkpoints.
Code generation can be viewed as a complex reasoning task. In NLP landscape, Chain of thought (CoT) prompting <cit.> achieves a significant improvement that transcends the scaling laws by simulating human thought processes to address language reasoning tasks, such as mathematical <cit.>, commonsense <cit.>, and symbolic reasoning <cit.>.
Nevertheless, CoT is quite different from the plan and the example is attached in Appendix <ref>.
The chain of thought in CoT is defined as concrete reasoning steps toward the goal, which is almost at the same level as code that is considered as an abstraction of human thought,
so using CoT cannot reduce the difficulty of generating code. Moreover, CoT usually fails to handle complex problems, since complex problems will lead to a surge of reasoning steps. In contrast, planning is consistent with the methodology of dealing with problem complexity in requirements engineering, i.e. abstraction and decomposition <cit.>.
In this paper, we propose a self-planning code generation method with LLMs that exploits the planning capabilities of LLMs themselves to facilitate code generation. Self-planning code generation consists of two phases:
1) Planning phase, LLMs generate plans for problems at test time by providing only a few intent-to-plan demonstrations as examples in prompting;
2) Implementation phase, LLMs generate code that satisfies the intent step by step, guided by the plan.
Self-planning code generation leverages in-context learning to generate plans autonomously without annotating plan corpus and extra training. Empirical evaluations have provided evidence that the self-planning approach yields accurate sub-problem decomposition and well-considered steps that enable the model to solve complex problems.
§ SELF-PLANNING
In self-planning code generation, we propose to perform self-planning before models generate code, and the process can be divided into two phases.
* Planning phase We take advantage of the ability of LLMs to perform self-planning by in-context learning.
Given a prompt C that consists of k tuples concatenated together ⟨ x_1 · y_1⟩∥⟨ x_1 · y_1⟩∥...∥⟨ x_k · y_k⟩, where x denotes the human intent, y denotes the plan, · indicate the concatenation of both. Plan is a scheduling of subproblems that abstract and decompose from intent, which is set to y = {q_1,q_2,...,q_n}. During inference, the test-time intent will be concatenated after the prompt, and C∥ x_test will be fed into the LLMs ℳ, which will attempt to do planning for the new intent. Thus we can obtain the test-time plan y_test.
Note that k is a fairly low number, which means that we can achieve self-planning by annotating only a few examples demonstrating planning.
* Implementation phase In this phase, we append the plan y_test to the intent x_test as input for the model ℳ to obtain the final code z_test.
The above two phases can be formalized as the following equation.
𝒫(z|x,C) = ∑_y 𝒫(z|y,x,C)·𝒫(y|x,C),
∝𝒫(z|y,x,C)·𝒫(y|x,C),
We further simplify 𝒫(z|y,x,C) = 𝒫(z|y,x) via conditional independence assumptions, thus:
𝒫(z|x,C) ≜𝒫(z|y,x)_Implementation phase· 𝒫(y|x,C)_Planning phase,
Example An example of self-planning code generation is shown in Fig.<ref>.
In the planning phase, human provides an intent to find the n-th number that is a Fibonacci number and it's also prime. LLM abstracts two subproblems from the intent, i.e., generating a Fibonacci sequence and determining if a number is prime, and plans four steps to solve the subproblems combinatorially.
Then entering the implementation phase, we append the plan to the intent and feed it to LLM. LLM generates code under the navigation of the steps, and surprisingly, it wraps "determine if a number is prime" into a subfunction and calls it.
In direct code generation, in contrast, LLM cannot understand that the intent is a combination of multiple problems; it knows to write something about "prime" and "Fibonacci", but actually,
it generates a confusing code, i.e. it enumerates the first five correct samples [This is related to the fact that we provided five public test cases at test time and the model copied them.] and then calculating the Fibonacci numbers, completely losing the requirement to determine whether it is a prime number.
Crafting prompts for self-planning
In our approach, the design of prompts follows specific principles to facilitate the efficient and rapid development of the user-defined plan for code generation. To aid in this process, we present a guideline for crafting prompts.
* Only essential steps are necessary for prompt. Detailed explanations in the prompt can obstruct the model's ability to decompose the task and should be avoided. The model can independently perform the necessary details to fulfill the intent.
* Clearly specify a set of rules. Ensure that all examples in the prompt exhibit a consistent pattern, such as beginning with a verb or using consistent language constructs, such as "if," "check," "return," "create," etc.
* Select examples that represent the majority of cases. It is important not to include examples that are atypical or marginal as this may negatively impact the performance of the model. The selected examples should be of average length and representative of typical tasks and solutions.
* Incorporate code features. The desired functionality, such as the definition of helper functions and the importation of libraries, can be introduced into the prompt through the use of directive statements.
§ EXPERIMENT SETUP
§.§ Benchmarks
We conduct a broad evaluation on code generation benchmarks to demonstrate the effectiveness of self-planning.
MBPP <cit.> This benchmark, referred to as "Mostly Basic Programming Problems", contains nearly 1000 crowd-sourced python programming problems, covering programming fundamentals, standard library functionality, and more. Each problem in the benchmark consists of a NL description, a code solution, and 3 automated test cases. A portion of the manually verified data is extracted as "MBPP-sanitized". For MBPP, which does not include function signatures, only the NL description is provided as input.
HumanEval <cit.> This benchmark is a set of 164 handwritten programming problems, proposed by OpenAI. Each problem includes a function signature, NL description, function body, and several unit tests, with an average of 7.7 tests per problem. For HumanEval, function signature, NL description, and public test cases are provided as input.
Furthermore, we utilize an expanded version of MBPP and HumanEval
, which includes over 100 additional test cases per task, to reinforce the validity of code evaluation <cit.>. This extended version is referred to as MBPP-ET and HumanEval-ET.
§.§ Prompting
Our approach and prompt-based baselines adopt 8-shot prompting as the default setting. The examples selected from the dataset for prompting will be excluded from the evaluation. Further details of all prompts can be found in Appendix.
In this paper, we adopt code-davinci-002 as our base model.
Three baselines were compared: Direct, CoT, and Ground-truth Planning.
The direct means generating code directly using LLMs, without prompting or fine-tuning. For comparison with CoT approach, we manually create detailed chain steps for CoT on the code generation tasks. To investigate the advantages of the planning approach, we constructed pseudo ground-truth plan by prompting LLMs to produce plan based on ground-truth code.
§.§ Metrics
To assess the accuracy of the generated code, we employ two metrics: an execution-based metric, namely Pass@k, and a match-based metric, namely CodeBLEU.
Pass@k Pass@k measures the functional correctness of the generated code through executing test cases. We use the unbiased version <cit.> of Pass@k, where n>=k samples are generated for each problem, count the number of correct samples c<=n which pass test cases and calculate the following estimator,
Pass@k = 𝔼_Problems[ 1-[ n-c; k ]/[ n; k ] ].
CodeBLEU CodeBLEU <cit.> is a variant of BLEU that injects code features for code evaluation. CodeBLEU considers abstract syntax tree and dataflow matching in addition to n-gram co-currence (BLEU),
CodeBLEU = α·BLEU + β·BLEU_w e i g h t
+ δ·Match_ast + ζ·Match_df.
§ EXPERIMENTAL RESULTS
§.§ Main Results
The main results are summarized in Table <ref>, which demonstrate a significant effect of self-planning code generation. The experimental results suggest that obtaining the plan or CoT from the intent can provide a noteworthy advantage in code generation compared to the direct generation of code from the intent. As anticipated, our proposed self-planning method demonstrates state-of-the-art performance, showing a significant improvement in Pass@1 over the CoT method across all datasets.
We find that the improvement of the CoT approach over direct code generation is marginal, as the challenge of generating an accurate and sufficiently detailed CoT is comparable to that of direct code generation.
Moreover, we evaluated the impact of utilizing the ground truth code to plan (i.e., ground truth planning) in facilitating code generation.
This approach simulates to some extent the ground truth planning provided by developers and provides an understanding of the approximate upper bound (which is actually low) of the self-planning approach.
The results in Table <ref> indicate a substantial improvement in the use of ground truth planning, as evidenced by a relative improvement of over 30% on the MBPP-sanitized dataset. The results of our study provide strong evidence of the effectiveness of the proposed method in achieving superior performance.
§.§ Variants of Self-planning
In table <ref>, we present an in-depth analysis of the effects of several variations in self-planning strategies. First, we investigate the utilization of multi-turn as opposed to single-turn self-planning. The multi-turn approach involves the iterative use of solution steps of plan to generate the corresponding code, while the single-turn approach involves the employment of all steps (i.e., plan) to generate the entire code in a single iteration. We find that the multi-turn usually fails to generate correct codes. This can be ascribed to two possible causes: 1) there is a lack of one-to-one correspondence between the code snippets and steps, with the implementation of a solution step possibly interspersed with multiple code snippets; 2) LLM faces challenges in determining the termination point for code generation with a sub-plan. Since the final goal or intent is specified at the outset, this often results in the model persistently generating the entire code without considering the indicated end of a step, making it difficult to determine where to truncate the code. Second, the self-planning approach, when implemented as a one-phase process, has been shown to yield improved performance compared to the two-phase way. However, this improvement is achieved at the cost of increased complexity in the prompt requirements. Specifically, the two-phase way only requires the provision of intent and plan examples in the prompt, whereas the one-phase way necessitates the additional specification of correct code examples. As such, it can be argued that the one-phase self-planning approach constitutes a trade-off between improved performance and heightened complexity in construction, relative to the two-phase way.
§.§ Robustness of Self-planning
In this section, we present an analysis of the robustness of self-planning by examining its effect under different quantitative and stylistic configurations of prompts.
In Table <ref>, we can observe that the performance of self-planning with n-shot improves as the value of n increases. However, it is crucial to consider the input length limit of LLMs (typically 2048 or 4096). As a result, it is not feasible to indefinitely increase the value of n without exceeding the input length limit. Based on this consideration, we generally recommend using either 8-shot or 4-shot for self-planning in LLMs. Furthermore, we explore the effect of self-planning with extremely concise plan. Although its effect is improved compared to directly generating code, it still has a noticeable gap in comparison to the standard plan. This discrepancy may stem from the challenges faced by LLMs in understanding extremely concise plan, which usually deviates from common human cognitive patterns (composed of only a few phrases or verbs). Therefore, we argue that a proper plan should conform to the expected output of LLMs and align with human writing conventions.
Our findings provide evidence of the stability and dependability of the self-planning method.
§.§ Case Study
To validate the effectiveness of our approach, we conducted case studies with qualitative evaluations. As depicted in Fig.<ref>, we demonstrate the performance of both self-planning and direct code generation through three case studies. In these cases, the direct code generation approach only addresses a limited aspect of the intent, which often results in the generation of incorrect code. In contrast, the self-planning code generation method first converts the intent into plan, and then systematically resolves each solution step of plan, which is relatively straightforward to resolve. This methodology reduces the complexity of code generation and effectively minimizes the risk of overlooking critical elements.
In case 1, the task of LLMs is “Given an array of integers nums, find the minimum sum of any non-empty sub-array of nums”. The code generated directly by LLM only considers a subset of the sub-arrays, whereas our approach ensures that none of them are overlooked.
In case 2, the task of LLMs is “Receive an integer as input and return the special factorial of this integer.” The direct code generation simply implements the standard factorial in a recursive manner, neglecting the definition of the special factorial. In contrast, our method implements the standard factorial through the use of sub-functions and subsequently utilizes these sub-functions to construct the special factorial.
In case 3, the task of LLMs is “Given the lengths of the three sides of a triangle, returns whether the triangle is a right triangle.” Our approach is more comprehensive as it calculates the different sides as hypotenuses by applying the Pythagorean theorem, whereas direct code generation only considers a single case. Additionally, our method also evaluates whether the input sides form a triangle.
Overall, our approach offers a more thorough and nuanced approach to solving the tasks assigned to LLMs, whereas direct code generation provides a more straightforward and limited solution.
§ RELATED WORK
§.§ Code Generation
Traditional code generation approaches are based on supervised learning, which initially treats code as equivalent to natural language and then gradually incorporates more code-specific features.
<cit.> first propose to employ sequence-to-sequence models for transformation between natural language to code snippets. <cit.> propose TranX, which maps natural language descriptions to an abstract syntax tree of code based on a series of tree construction actions. <cit.> presents a generative modeling approach for source code that uses a static-analysis tool. <cit.> devise a PDA-based methodology to guarantee grammatical correctness for code generation.
Developing a planning-based code generation approach be challenging due to the requirement of a large amount of training data to enable the model to learn planning, and obtaining plans is a difficult task.
With the advent of CodeBERT <cit.>, the boom in pre-training with code corpus using large language models began. Codex <cit.>, InCoder <cit.>, Codegen <cit.>, and AlphaCode <cit.> have successively emerged, the number of parameters of the models has rapidly increased, and the performance of code generation has improved tremendously. The advent of large models has brought us a new way of tackling planning for code generation.
§.§ Prompting Techniques
Few-shot prompting is a technique that emerged as the number of model parameters exploded. Instead of fine-tuning a separate language model checkpoint for each new task, few-shot prompting can be utilized by simply providing the model with a limited number of input-output examples that illustrate the task.
Prompting techniques like chain-of-thought prompting (COT) <cit.> have further boosted the performance of LLMs and inspired some further improvements.
To address natural language reasoning tasks, <cit.> propose least-to-most prompting which reduces a complex problem into a list of sub-problems and then solves these sub-problems in order. <cit.> propose to accompany generating code alongside the intermediate reasoning steps and subproblems in the original CoT and least-to-most prompting, delegating solving to the compiler, thus improving solution accuracy.
However, the tasks faced by those approaches are simple and have fixed solving patterns, making them unusable for code generation.
Our self-planning approach is designed for code generation that can abstract sub-problems from complex human intent and then plan solving steps that may not be sequential but intertwined.
§ DISCUSSION AND FUTURE WORK
During the practice of self-planning, we discovered some problems that need to be further addressed. Our plan-based approach is still bound by the lack of information in the provided intent. Adding more information, such as usage examples, or detailed descriptions, can improve the performance of our approach. Allowing the model to determine where are missing or ambiguous in intent, and interactively asking users for additional information, can make complex requirements easier to solve.
Another problem is the unstable performance of self-planning, as sensitivity to examples has a significant impact on the prompting approach, making it difficult to control what the model learns from the prompt. A common situation is that the model tends to replicate irrelevant steps in the prompt if it does not have enough confidence to generate a plan. How to make the model induct the patterns which need to be inherited from the prompt and placed in the right place, avoiding blind copying, is a worthy problem to investigate.
Finally, in our work, code generation is used to address the intent proposed by humans. Taken further, lots of real-world problems can be solved by building solutions through programs. Programs have many desirable features over natural languages, such as logic, non-ambiguity, long-distance dependencies, symbolic mapping, and arithmetic ability. Recently, some studies
point out that language models trained based on programs have stronger language reasoning abilities than those trained based on purely natural language. An intuitive way is to solve real-world problems through a method similar to our paper, such as planning the NL steps based on code, so that the users can get more logical and well-thought-out solutions. Solving real-world problems with programs should be a promising direction to explore.
This paper attempts to reduce the difficulty of code generation by analyzing and processing human intent, which is consistent with the thought of requirement engineering. The current LLMs are capable of generating code that address simple human requirements, however, it is still a long way from producing a fully functional piece of software. The requirements of software development are significantly more complex and intricate. It may be worthwhile to explore beyond code writing to the realm of requirements analysis, incorporating the methodology of requirements engineering with LLMs.
§ CONCLUSION
We explore plan-based code generation methods and propose a simple method to perform self-planning and generate code with LLMs. Self-planning code generation outperforms naïve direct generation on multiple code generation datasets by a large margin. Beyond that, we discuss several promising future works that we hope will move code generation, and even software engineering one step forward.
unsrtnat
§ APPENDIX
§.§ Self-planning Prompt for HumanEval
def encrypt(s):
”'
Create a function encrypt that takes a string as an argument and returns a string encrypted with the alphabet being rotated. The alphabet should be rotated in a manner such that the letters shift down by two multiplied to two places.
For example:
encrypt('hi') returns 'lm'
encrypt('asdfghjkl') returns 'ewhjklnop'
encrypt('gf') returns 'kj'
encrypt('et') returns 'ix'
Let's think step by step.
1. Create a alphabet, bias two places multiplied by two.
2. Loop the input, find the latter bias letter in alphabet.
3. Return result.
”'
def check_if_last_char_is_a_letter(txt):
”'
Create a function that returns True if the last character of a given string is an alphabetical character and is not a part of a word, and False otherwise. Note: "word" is a group of characters separated by space.
Examples:
check_if_last_char_is_a_letter("apple pie") → False
check_if_last_char_is_a_letter("apple pi e") → True
check_if_last_char_is_a_letter("apple pi e ") → False
check_if_last_char_is_a_letter("") → False
Let's think step by step.
1. If the string is empty, return False.
2. If the string does not end with a alphabetical character, return False.
3. Split the given string into a list of words.
4. Check if the length of the last word is equal to 1.
”'
def file_name_check(file_name):
”'
Create a function which takes a string representing a file's name, and returns 'Yes' if the the file's name is valid, and returns 'No' otherwise. A file's name is considered to be valid if and only if all the following conditions are met: - There should not be more than three digits ('0'-'9') in the file's name. - The file's name contains exactly one dot '.' - The substring before the dot should not be empty, and it starts with a letter from the latin alphapet ('a'-'z' and 'A'-'Z'). - The substring after the dot should be one of these: ['txt', 'exe', 'dll']
Examples:
file_name_check("example.txt") => 'Yes'
file_name_check("1example.dll") => 'No' (the name should start with a latin alphapet letter)
Let's think step by step.
1. Check if the file name is valid according to the conditions.
2. Return "Yes" if valid, otherwise return "NO".
”'
def fruit_distribution(s,n):
”'
In this task, you will be given a string that represents a number of apples and oranges that are distributed in a basket of fruit this basket contains apples, oranges, and mango fruits. Given the string that represents the total number of the oranges and apples and an integer that represent the total number of the fruits in the basket return the number of the mango fruits in the basket.
for examble:
fruit_distribution("5 apples and 6 oranges", 19) ->19 - 5 - 6 = 8
fruit_distribution("0 apples and 1 oranges",3) -> 3 - 0 - 1 = 2
fruit_distribution("2 apples and 3 oranges", 100) -> 100 - 2 - 3 = 95
fruit_distribution("100 apples and 1 oranges",120) -> 120 - 100 - 1 = 19
Let's think step by step.
1. Extract the numbers of oranges and apples from given string.
2. Calculate the sum of oranges and apples.
3. Deduct the sum from the total number of fruits.
4. Return the number of mangoes.
”'
def prime_fib(n: int):
”'
prime_fib returns n-th number that is a Fibonacci number and it's also prime.
Examples:
>>> prime_fib(1) 2
>>> prime_fib(2) 3
>>> prime_fib(3) 5
>>> prime_fib(4) 13
>>> prime_fib(5) 89
Let's think step by step.
1. Create a function to check if a number is prime.
2. Generate a Fibonacci sequence.
3. Check if each number in the Fibonacci sequence is prime, decrement the counter.
4. If the counter is 0, return the Fibonacci number.
”'
def compare_one(a, b):
”
Create a function that takes integers, floats, or strings representing real numbers, and returns the larger variable in its given variable type. Return None if the values are equal. Note: If a real number is represented as a string, the floating point might be . or ,
Examples:
compare_one(1, 2.5) → 2.5
compare_one(1, "2,3") → "2,3"
compare_one("5,1", "6") → "6"
compare_one("1", 1) → None
Let's think step by step.
1. Store the original inputs.
2. Check if inputs are strings and convert to floats.
3. Compare the two inputs and return the larger one in its original data type.
”'
def sort_even(l: list):
”'
This function takes a list l and returns a list l' such that l' is identical to l in the odd indicies, while its values at the even indicies are equal to the values of the even indicies of l, but sorted.
Examples:
>>> sort_even([1, 2, 3])
[1, 2, 3]
>>> sort_even([5, 6, 3, 4])
[3, 6, 5, 4]
Let's think step by step.
1. Create a list of all the even indices of the given list.
2. Sort the list of even indices.
3. Return a new list that is identical to the original list in the odd indicies, and equal to the sorted even indices in the even indicies.
”'
def search(lst):
”'
You are given a non-empty list of positive integers. Return the greatest integer that is greater than zero, and has a frequency greater than or equal to the value of the integer itself. The frequency of an integer is the number of times it appears in the list. If no such a value exist, return -1.
Examples:
search([4, 1, 2, 2, 3, 1]) == 2
search([1, 2, 2, 3, 3, 3, 4, 4, 4]) == 3
search([5, 5, 4, 4, 4]) == -1
Let's think step by step.
1. Create a frequency dict.
2. Sort the input list.
3. Loop the input list, if frequency no lesser than the integer, set result.
4. Return the result.
”'
§.§ Self-planning Prompt for MBPP-sanitied
Write a function to sum the length of the names of a given list of names after removing the names that start with a lowercase letter.
Let's think step by step.
1. Loop the input list.
2. If the name not start with lowercase letter, add the length of the name to result.
3. Return the result.
Write a function to increment the numeric values in the given strings by k.
Let's think step by step.
1. Loop the input list.
2. If a string is a number, increment it.
3. Return modified list.
Write a python function to find sum of all prime divisors of a given number.
Let's think step by step.
1. Create a inner function to check if a number is prime.
2. Loop all number less than the input that is prime.
3. Check if the input is divisible by that.
4. Return the result.
Write a function to find the lateral surface area of a cone.
Let's think step by step.
1. Calculate the generatrix of the cone.
2. Return the result.
3. Please import inside the function.
Write a function to remove all tuples with all none values in the given tuple list.
Let's think step by step.
1. Loop the given tuple list.
2. Check if all elements in the tuple are None.
3. If not, append the tuple to the result list.
4. Return the result.
Write a python function to find the last two digits in factorial of a given number.
Let's think step by step.
1. Calculate the factorial of the input number.
2. Return the last two digits of it.
Write a python function to replace multiple occurence of character by single.
Let's think step by step.
1. Create a pattern that the input character repeats mulitiple times.
2. Replace the pattern in input string with input character.
3. Please import inside the function.
Write a python function to move all zeroes to the end of the given list.
Let's think step by step.
1. Count the number of zeros.
2. Remove the zeros from the list.
3. Append the zeros to the end of the list.
4. Return the list.
§.§ Prompt Example of Baseline
Example of Chain-of-Thought Prompting
def encrypt(s):
”'
Create a function encrypt that takes a string as an argument and returns a string encrypted with the alphabet being rotated. The alphabet should be rotated in a manner such that the letters shift down by two multiplied to two places.
For example:
encrypt('hi') returns 'lm'
encrypt('asdfghjkl') returns 'ewhjklnop'
encrypt('gf') returns 'kj'
encrypt('et') returns 'ix'
Let's think step by step.
1. Create a string "alphabet" with all letters of the alphabet.
2. Assign the number of places to shift the letters to a variable "bias".
3. Initialize a string "result" with an empty string.
4. Iterate over the characters of the string "s".
5. Find the index of the character in the string "alphabet".
6. Add the number of places to shift the letters to the index.
7. If the index is larger than 25, subtract 26 from the index.
8. Add the character at the index to the string "result".
9. Return the string "result".
”'
Example of Extremely Concise Style Self-planning Prompt
def encrypt(s):
”'
Create a function encrypt that takes a string as an argument and returns a string encrypted with the alphabet being rotated. The alphabet should be rotated in a manner such that the letters shift down by two multiplied to two places.
For example:
encrypt('hi') returns 'lm'
encrypt('asdfghjkl') returns 'ewhjklnop'
encrypt('gf') returns 'kj'
encrypt('et') returns 'ix'
Let's think step by step.
1. Alphabet, bias 4.
2. Latter bias, append.
”'
Example of Ground-truth Planning Prompt
def encrypt(s):
”'
Create a function encrypt that takes a string as an argument and returns a string encrypted with the alphabet being rotated. The alphabet should be rotated in a manner such that the letters shift down by two multiplied to two places.
”'
alphabet = 'abcdefghijklmnopqrstuvwxyz'
bias = 2 * 2
result = ”
for char in s:
index = alphabet.find(char) + bias
if index > 25:
index = index - 26
result += alphabet[index]
return result
Write steps according to the code.
1. Create a alphabet, bias two places multiplied by two.
2. Loop the input, find the latter bias letter in alphabet.
3. Return result.
Example of Self-planning Prompt (One-phase)
def encrypt(s):
”'
Create a function encrypt that takes a string as an argument and returns a string encrypted with the alphabet being rotated. The alphabet should be rotated in a manner such that the letters shift down by two multiplied to two places.
For example:
encrypt('hi') returns 'lm'
encrypt('asdfghjkl') returns 'ewhjklnop'
encrypt('gf') returns 'kj'
encrypt('et') returns 'ix'
Let's think step by step.
1. Create a alphabet, bias two places multiplied by two.
2. Loop the input, find the latter bias letter in alphabet.
3. Return result.
”'
# Write your code here.
alphabet = 'abcdefghijklmnopqrstuvwxyz'
bias = 2 * 2
result = ”
for char in s:
index = alphabet.find(char) + bias
if index > 25:
index = index - 26
result += alphabet[index]
return result
|
http://arxiv.org/abs/2303.06970v1
|
20230313101236
|
First results from the JWST Early Release Science Program Q3D: Ionization cone, clumpy star formation and shocks in a $z=3$ extremely red quasar host
|
[
"Andrey Vayner",
"Nadia L. Zakamska",
"Yuzo Ishikawa",
"Swetha Sankar",
"Dominika Wylezalek",
"David S. N. Rupke",
"Sylvain Veilleux",
"Caroline Bertemes",
"Jorge K. Barrera-Ballesteros",
"Hsiao-Wen Chen",
"Nadiia Diachenko",
"Andy D. Goulding",
"Jenny E. Greene",
"Kevin N. Hainline",
"Fred Hamann",
"Timothy Heckman",
"Sean D. Johnson",
"Grey Murphree",
"Hui Xian Grace Lim",
"Weizhe Liu",
"Dieter Lutz",
"Nora Lützgendorf",
"Ryan McCrory",
"Vincenzo Mainieri",
"Nicole P. H. Nesvadba",
"Patrick Ogle",
"Eckhard Sturm",
"Lillian Whitesell"
] |
astro-ph.GA
|
[
"astro-ph.GA"
] |
Andrey Vayner
[email protected]
0000-0002-0710-3729]Andrey Vayner
Department of Physics and Astronomy, Bloomberg Center, Johns Hopkins University, 3400 N. Charles St., Baltimore, MD 21218, USA
0000-0001-6100-6869]Nadia L. Zakamska
Department of Physics and Astronomy, Bloomberg Center, Johns Hopkins University, 3400 N. Charles St., Baltimore, MD 21218, USA
0000-0001-7572-5231]Yuzo Ishikawa
Department of Physics and Astronomy, Bloomberg Center, Johns Hopkins University, 3400 N. Charles St., Baltimore, MD 21218, USA
0000-0002-4419-8325]Swetha Sankar
Department of Physics and Astronomy, Bloomberg Center, Johns Hopkins University, 3400 N. Charles St., Baltimore, MD 21218, USA
0000-0003-2212-6045]Dominika Wylezalek
Zentrum für Astronomie der Universität Heidelberg, Astronomisches Rechen-Institut, Mönchhofstr 12-14, D-69120 Heidelberg, Germany
0000-0002-1608-7564]David S. N. Rupke
Department of Physics, Rhodes College, Memphis, TN 38112, USA
0000-0002-3158-6820]Sylvain Veilleux
Department of Astronomy and Joint Space-Science Institute, University of Maryland, College Park, MD 20742, USA
0000-0002-6948-1485]Caroline Bertemes
Zentrum für Astronomie der Universität Heidelberg, Astronomisches Rechen-Institut, Mönchhofstr 12-14, D-69120 Heidelberg, Germany
0000-0003-2405-7258]Jorge K. Barrera-Ballesteros
Instituto de Astronomía, Universidad Nacional Autónoma de México, AP 70-264, CDMX 04510, Mexico
0000-0001-8813-4182]Hsiao-Wen Chen
Department of Astronomy & Astrophysics, The University of Chicago, 5640 South Ellis Avenue, Chicago, IL 60637, USA
Department of Physics and Astronomy, Bloomberg Center, Johns Hopkins University, 3400 N. Charles St., Baltimore, MD 21218, USA
0000-0003-4700-663X]Andy D. Goulding
Department of Astrophysical Sciences, Princeton University, 4 Ivy Lane, Princeton, NJ 08544, USA
0000-0002-5612-3427]Jenny E. Greene
Department of Astrophysical Sciences, Princeton University, 4 Ivy Lane, Princeton, NJ 08544, USA
0000-0003-4565-8239]Kevin N. Hainline
Steward Observatory, University of Arizona, 933 North Cherry Avenue, Tucson, AZ 85721, USA
Department of Physics & Astronomy, University of California, Riverside, CA 92521, USA
0000-0001-8813-4182]Timothy Heckman
Department of Physics and Astronomy, Bloomberg Center, Johns Hopkins University, Baltimore, MD 21218, USA
0000-0001-9487-8583]Sean D. Johnson
Department of Astronomy, University of Michigan, Ann Arbor, MI 48109, USA
Institute for Astronomy, University of Hawai'i, 2680 Woodlawn Dr., Honolulu, HI, 96822, USA
Rhodes College, 2000 N. Parkway, Memphis, TN, 38112, USA
0000-0003-3762-7344]Weizhe Liu
Department of Astronomy, Steward Observatory, University of Arizona, Tucson, AZ 85719, USA
0000-0003-0291-9582]Dieter Lutz
Max-Planck-Institut für Extraterrestrische Physik, Giessenbachstrasse 1, D-85748 Garching, Germany
0000-0001-6126-5238]Nora Lützgendorf
European Space Agency, Space Telescope Science Institute, Baltimore, Maryland, USA
Rhodes College, 2000 N. Parkway, Memphis, TN, 38112, USA
0000-0002-1047-9583]Vincenzo Mainieri
European Southern Observatory, Karl-Schwarzschild-Straße 2, D-85748 Garching bei München, Germany
0000-0001-5783-6544]Nicole P. H. Nesvadba
Université de la Côte d'Azur, Observatoire de la Côte d'Azur, CNRS, Laboratoire Lagrange, Bd de l'Observatoire, CS 34229, Nice cedex 4 F-06304, France
0000-0002-3471-981X]Patrick Ogle
Space Telescope Science Institute, 3700, San Martin Drive, Baltimore, MD 21218, USA
0000-0002-0018-3666]Eckhard Sturm
Max-Planck-Institut für Extraterrestrische Physik, Giessenbachstrasse 1, D-85748 Garching, Germany
Rhodes College, 2000 N. Parkway, Memphis, TN, 38112, USA
Massive galaxies formed most actively at redshifts z=1-3 during the period known as `cosmic noon.' Here we present an emission-line study of an extremely red quasar SDSSJ165202.64+172852.3 host galaxy at z=2.94, based on observations with the Near Infrared Spectrograph (NIRSpec) integral field unit (IFU) on board JWST. We use standard emission-line diagnostic ratios to map the sources of gas ionization across the host and a swarm of companion galaxies. The quasar dominates the photoionization, but we also discover shock-excited regions orthogonal to the ionization cone and the quasar-driven outflow. These shocks could be merger-induced or – more likely, given the presence of a powerful galactic-scale quasar outflow – these are signatures of wide-angle outflows that can reach parts of the galaxy that are not directly illuminated by the quasar. Finally, the kinematically narrow emission associated with the host galaxy presents as a collection of 1 kpc-scale clumps forming stars at a rate of at least 200 M_⊙ yr^-1. The ISM within these clumps shows high electron densities, reaching up to 3,000 cm^-3 with metallicities ranging from half to a third solar with a positive metallicity gradient and V band extinctions up to 3 magnitudes. The star formation conditions are far more extreme in these regions than in local star-forming galaxies but consistent with that of massive galaxies at cosmic noon. JWST observations reveal an archetypical rapidly forming massive galaxy undergoing a merger, a clumpy starburst, an episode of obscured near-Eddington quasar activity, and an extremely powerful quasar outflow simultaneously.
§ INTRODUCTION
The most massive galaxies in the present-day universe are passively evolving elliptical galaxies devoid of a significant amount of molecular gas and showing little star formation in the last 10 Gyr, with all present-day star formation concentrated in lower-mass disks. In contrast, at cosmic noon when the universe was 2.2-4.3 Gyr old, or at z=1.5-3 – the epoch known as `cosmic noon' – the most star-forming galaxies were also the most massive <cit.>. This epoch also corresponds to the peak star formation rate density and the black hole accretion density <cit.>, with ∼ 50% of all stars observed today formed at z=1.5-3. Massive gas-rich galaxies at high redshifts undergo the most rapid galactic evolution and display the highest measured star formation rates, triggered by secular processes <cit.> and mergers <cit.>. Morphologically, this starburst activity proceeds in turbulent, thickened disks <cit.> or in multiple clumps <cit.>. Exactly how these extremely active and morphologically disturbed galaxies become quenched and settle on the passively evolving sequence of smooth elliptical galaxies remains a major open question in galaxy formation, with secular processes and feedback from star formation and quasars potentially playing a role <cit.>.
Dust-reddened quasars may be a particularly interesting population as they are expected to be transitional sources, where quasar-driven winds may be in the act of clearing out the host galaxy and quenching star formation <cit.>. Objects with such properties have been long sought, and a particularly promising population is that of extremely red quasars (ERQs; ). These objects are selected from WISE <cit.> and SDSS <cit.> based on their extremely red color, i-W3 > 4.6 AB mag, and highly unusual rest-frame ultraviolet emission-line profiles. Follow-up studies of this population have established that these quasars are uniquely associated with the highest velocity widths and blueshifts of the λ4959, 5007Å emission lines, indicative of powerful outflows <cit.> which have now been demonstrated to extend on galaxy-wide scales <cit.>. With bolometric luminosities exceeding 10^47 , these quasars are likely accreting at or beyond the Eddington limit. They may be associated with the long-sought `blow-out' phase of the quasar evolution, marking them ideal test subjects to understand a critical phase of early galaxy evolution associated with black hole growth and feedback.
SDSS J165202.64+172852.3 (J1652 hereafter) is one such ERQ at z = 2.94 with i - W3=5.4 AB mag. X-ray observations directly confirm intervening obscuration with near Compton-thick column densities <cit.>. A bolometric luminosity of 5 × 10^47 is estimated from the directly observed infrared WISE flux <cit.>. <cit.> and <cit.> classify the system as a radio-intermediate source, but there is no evidence for extended radio emission suggesting the presence of powerful jets. Hubble Space Telescope (HST) observations with Wide Field Camera 3 (WFC3), corresponding to the rest-frame B-band, suggest that the quasar is hosted by a massive galaxy with M_*/M_⊙∼11.4 - 12.4 which is undergoing a major merger and exhibits a tidal feature in the western direction <cit.>. Despite the long-standing paradigm in which the red quasar phase is strongly associated with major mergers <cit.>, J1652 is unusual in demonstrating these signatures within the ERQ population <cit.>.
JWST <cit.> observed J1652 with the Near-Infrared Spectrograph (NIRSpec; ) using the integral field unit (IFU) mode on 2022-07-15 as part of the Early Release Science Program “Imaging Spectroscopy of Quasar Hosts with JWST” <cit.>; this was one of the first NIRSpec-IFU observations obtained by the observatory. NIRSpec reveals extended ionized gas emission across the entire field as traced by the ionized with at least three interacting companion galaxies <cit.>. The companion galaxies are estimated to have M_*>10^9.8M_⊙ with individual velocities ranging between [-450,+820] . Extended associated with the HST tidal tail has also been detected at velocities of up to v∼800 . The density of companions and their extreme kinematics suggest that the dark-matter halo of the massive host of J1652 may itself be undergoing a major merger, and therefore the quasar may be tracing one of the densest and most actively forming cosmic knots at z∼3.
J1652 was already known to exhibit ∼ 3000 km s^-1 velocities based on both the spatially integrated <cit.> and spatially resolved <cit.> ground-based near-IR IFU observations. Gemini Near-Infrared Integral Field Spectrometer (NIFS) adaptive-optics observations show that the region of extremely high-velocity dispersion of extends out to at least 4 kpc from the nucleus in the Southern direction <cit.>. In a companion paper (Vayner et al. 2023b - in prep.), we present the in-depth study of the quasar-driven outflow, its geometry, and its energetics from the JWST NIRSpec data. The high spatial and spectral resolution of the JWST NIRSpec observations allows us to disentangle the emission associated with the outflow from that of the host galaxy and the companion galaxies based on the gas kinematics. We confirm the presence of the highly blue-shifted outflow with outflow velocities up to 1000 on kpc scales (Vayner et al. 2023b - in prep.) and additionally reveal the red-shifted component of the outflow towards the North-East (v = 450 and σ_v = 500 ; ). The distribution of the velocity width of components in J1652 is bimodal, with a minimum at σ_v=300 . The gas with smaller velocity dispersion is likely in dynamical equilibrium with the host galaxy of J1652 or with companion galaxies, whereas the gas with higher velocity dispersions is likely not confined by the gravitational potential of the galaxy and is in an outflow.
Here we present an in-depth look at the emission-line ratio maps in J1652. These measurements will inform us about the sources of ionization, the geometry of ionization and outflows, the morphology of the host and the companions, the distribution of the star formation in the host galaxy, and about the physical origin of any shocked emission. We summarize observations, data reduction, and point-spread function subtraction in Section <ref>. We present the measurements of emission lines and line ratios in Section <ref>. We discuss the origin of the features we see in the ionization maps in Section <ref>, and we conclude in Section <ref>. We use a three-dimensional flat geometry of ΛCDM cosmological model with H_o = 69.6 km s^-1 Mpc^-1, Ω_M = 0.286, and Ω_Λ = 0.714 to measure all distances <cit.>. While we use vacuum emission line wavelengths for fitting as appropriate for space-based data, we use air wavelengths in line identification following a long-standing convention.
§ DATA
§.§ Observational design and data reductions
NIRSpec observations were set up with the G235H grating in combination with the F170LP filter, resulting in wavelength coverage 1.65-3.15 and spectral resolution 85-150 . There were no dedicated acquisition or verification exposures; the source was acquired and observed using the absolute pointing accuracy of the observatory. We used the “NRSIRS2" readout mode for an effective exposure time per integration of 1823.6s, and a total on-source exposure time of 16412.5 s. We used the 9-point dither pattern (which allows offsets by half-integer number of pixels) to improve the spatial sampling of the point-spread function (PSF). The field of view of NIRSpec is 3×3, corresponding to the physical scale of ∼ 25× 25 kpc^2 at the redshift of our source (z=2.94). However, due to our selected dithering pattern, we are able to detect extended emission in a slightly larger field of view; however, the edge spaxels have higher noise values due to a smaller number of exposures. Our final field of view is approximately 4×4. At the first science dither position, we took a single exposure with all the micro-shutter assembly (MSA) closed to inspect and remove any light leakage from bright objects in the NIRSpec instrument field of view and to inspect and remove any background light from failed open shutters.
We reduced the data using Space Telescope's JWST pipeline version 1.8.2 [<https://github.com/spacetelescope/jwst>]. The first stage performs standard infrared detector reduction on uncalibrated files (i.e, dark current subtraction, data quality flagging, bias subtraction, and a first iteration of cosmic ray removal) to produce rate files. These files are then fed to the second stage of the pipeline, which assigns a world coordinate system per frame, background subtracts, flat-fields, flux calibrates, and converts the 2D spectra into a 3D data cube via the “cube build" routine. We use the “emsm" routine instead of the standard “drizzle" method when extracting the data from 2D to 3D [<https://jwst-pipeline.readthedocs.io/en/latest/jwst/cube_build/main.html##algorithm>]. The “emsm" improved the oscillating spectral pattern in the point source spectrum compared to the “drizzle" method at the cost of minor degradation in the spatial resolution. An additional procedure is implemented in this step to flag and subtract imprints produced by the open NIRSpec micro-shutters and clip bad pixels; however, we had to skip the imprint subtraction step as that increased the noise level in the final produced data cubes, likely because the “leakcal" exposure was only taken at a single dither position. At the time of data reduction, the flat-field calibration files contained placeholder values; hence no proper flat fielding was done on the data. We skipped the third stage of the pipeline that combines the different exposures taken at different dither positions due to issues with the outlier detection step that kept a significant amount of bad pixels in the final data cube and masked a large portion of the quasar emission. Instead, we opted to use an in-house script based on the Python “Reproject" [<https://pypi.org/project/reproject/>] package, and the flux-conserving “reproject interp" routine together with the astropy sigma clip routine to align the different dither positions produced by “spec2pipeline" and remove significant flux outliers. Our custom pipeline projects the data cubes onto a 0.05spatial grid and a spectral sampling of 0.0396 . The final data cube has a wavelength range of 1.65 – 3.176 . We apply the same procedure to the variance cubes produced by the second stage of the pipeline and similarly combine them to produce a final combined variance cube for the data. We applied the same reduction analysis to the commissioning standard star observations with NIRSpec of TYC 4433-1800-1 (PID 1128) to flux calibrate our data. We achieve a final 2σ flux sensitivity of 2.87×10^-19 and AB magnitude/arcsec^2 of 22.45 at 1.995 , near redshifted 5007 Å and 2.45×10^-19 and AB magnitude/arcsec^2 of 22.09 at 2.549 , near redshifted .
There are still some challenges associated with the NIRSpec integral field unit data reduction. The full width at half maximum (FWHM) of the simulated point-spread function (PSF) for the Near-infrared Camera (NIRCam) of JWST is about 0.065 at 2 [<https://jwst-docs.stsci.edu/jwst-near-infrared-camera/nircam-performance/nircam-point-spread-functions>], and this size is primarily determined by the diffraction limit of the telescope. The 0.1 native size of the NIRSpec spaxel is about 3 times larger than would be required to Nyquist-sample this PSF. Our observations employ a 9-point half-integer dither pattern which is used to improve the PSF sampling, with the final cube projected onto an 0.05 grid. But the data are still undersampled, both spatially and spectrally, which results in “wiggle" artifacts in the final spectrum. The “wiggles" are somewhat reduced as we take spectra in wider apertures and use the “emsm" method to extract the spectra from 2D to 3D, but of course that comes at the cost of degrading the effective spatial resolution. We achieve a final spatial resolution of approximately 200 mas.
§.§ PSF subtraction
A major challenge in studying the extended emission around quasars is the bright central quasar that outshines the faint host galaxy, sometimes by several orders of magnitude. Subtracting the quasar from imaging data to reveal the host galaxy requires exquisite knowledge of the PSF, either from simulations (e.g., as was done by ) or from observations of stars (e.g., ). Subtracting the PSF from an integral-field unit data cube using theoretical models or samples of standard stars is more challenging because such data sets are rarely available. Some PSF subtraction procedures <cit.> take advantage of the difference in the spectra between the quasar and the host. They construct a data-driven PSF using a wavelength region where the quasar dominates (e.g., the broad-line region of a permitted emission line) and then generate a cube by scaling the flux of the PSF in accordance with the quasar spectrum.
In the NIRSpec data, the situation is further compounded by the PSF whose shape and size vary as a function of wavelength since it is primarily diffraction-limited. In ground-based data, for low-Strehl adaptive optics (AO) or seeing-limited PSF, its size variation over the wavelength range is, at most, a minor concern, whereas, for our data, the size of the PSF varies with wavelength.
We use [<https://q3dfit.readthedocs.io/en/latest/index.html>] to model and remove the quasar PSF to reveal the faint extended emission. is a -based software, adapted from <cit.>, for scientific analysis of JWST integral field spectroscopy of quasars and their host galaxies (Rupke et al. in prep). works in three steps. First, it removes the central quasar PSF to produce a PSF-subtracted datacube containing the faint host galaxy emission. Next, the decomposed host galaxy emission is carefully fit with a combination of continuum, emission lines, and absorption lines. Finally, takes the best-fit emission line, and continuum outputs to produce maps and other science products.
performs maximal-contrast subtraction of the quasar PSF by taking advantage of the spectral differences between quasars and their host galaxies. extracts the quasar spectrum using the brightest spaxel; specifically for J1652, we use a 2-pixel radius (0.1) centered on the brightest spaxel to extract a quasar-dominated spectrum. This quasar spectrum is then fit by scaling the spectrum using a combination of multiplicative and additive polynomials and exponential functions across the NIRSpec FOV, which is then subtracted to reveal the faint extended emission corresponding to the host galaxy. The multiplicative and additive polynomials are selected to fit and account for the variation in the shape of the NIRSpec PSF as a function of wavelength (Rupke et al. in-prep.).
§ EMISSION LINE ANALYSIS AND MAPS
§.§ Multi-Gaussian fitting
After PSF subtraction, we use to iterate over the spaxels in the entire NIRSpec field of view and fit each spectrum with a model consisting of a low-order polynomial continuum and emission lines. is initialized using the updated redshift of z = 2.9489 taken from <cit.>. The fitting wavelength range corresponds to rest-frame wavelengths of 0.42-0.8 , excluding the wavelength range of 0.598 - 0.627 due to the NIRSpec detector gap.
We fit the entire cube with n=1, n=2, or n=3 Gaussian components for each emission line. The centroids and the velocity dispersions of each component are allowed to vary, but we assume that each Gaussian component has the same kinematic properties across all emission lines (i.e., they are `kinematically tied'; ), and we fit for intensities. The fitting uncertainties are those from , which is what performs χ^2 minimization in , and therefore the errors reflect the shape of the χ^2 surfaces. We define a successful detection if the emission line peak is >3σ and the line width is greater than the instrumental width of the line-spread function. We detect Hα, Hβ, HeII λ4686, λ4959, 5007, [OI] λ6300, λ6548, 6583, and [SII] λ6716, 6731.
We find a minimum change in the χ^2 value when increasing or decreasing the number of fitted Gaussian components that does not correspond to a worse or better fit. Hence we inspect each fit visually and decide to keep the fit with the least number of components that best fits the observed emission line profile.
§.§ Component sorting and kinematics
In many cases, it is undesirable and, in fact, incorrect to ascribe physical significance to individual Gaussian components in a multi-Gaussian fit. <cit.> demonstrated that in the spatially integrated spectra of powerful quasars, the lines were well-represented by a sum of multiple Gaussian components, but none of those components was in dynamical equilibrium with the host galaxy. In such cases, the rotation of the host galaxy and the blending of multiple velocities present within the outflow add up together in one integrated spectrum, and a sum of Gaussians is merely a way to quantify the profile in a noiseless manner rather than a physically motivated model of the galaxy and quasar outflow kinematics.
The situation is different in IFU spectroscopy. When observations are obtained at high spatial resolution, and when the same kinematic component can be traced across the field of view with minor variations in the velocity centroid and velocity dispersion, it becomes possible to ascribe the components to distinct dynamical and ionization mechanisms.
Nonetheless, component sorting and identification with particular dynamical components of the system is non-trivial. After examining the velocity distribution, velocity dispersion distribution, and the morphology of all components in the multi-Gaussian component fits, we decided to categorize the components into three different classes. One is a narrow component with varying centroid velocity and velocity centroid near the systemic velocity of the quasar, so we define the `narrow systemic' emission arising in the gas with centroid velocity in the [-500,500] range with σ_v<300 . One is a broad component associated with the outflow (Vayner et al. 2023b - in prep.) with a characteristic velocity dispersion σ_v>300 . And the last component is associated with narrow-line emission (σ_v<300 ) at very high-velocity offset (|v|>500 ) from the central galaxy and morphologically concentrated in clumps, so it is natural to interpret these features as companion galaxies, likely at a few tens of kpc and projected onto the NIRSpec field of view <cit.>. For three of these companions, we also detect stellar emission <cit.>, confirming their nature as companion galaxies. Our velocity dispersion cut between the broad and narrow extended emission sufficiently and clearly divides the two kinematic components. The majority of the narrow emission shows velocity dispersion σ_v<250, and the majority of the broad emission shows a velocity dispersion σ_v>350, making clear bimodal distribution in the velocity dispersion in the SDSSJ1652 system. The broad emission on kpc scale is distinctly different from the spatially unresolved broad emission both in terms of velocity offset and dispersion. We find similarly extended emission using two different PSF subtraction methods <cit.>, and the shape and velocity are consistent with ground-based AO observations <cit.>.
In Figure <ref>, we show intensities, radial velocity offset, and dispersion of the emission line for the three kinematic components identified above, we mark the component associated with the systemic quasar host galaxy velocity as component (“c1"), gas associated with the outflow as “c2" and emission associated with the tidal tail feature, and the neighboring galaxies as “c3". In Figure <ref>, we show a multi-color composite consisting of the brightest detected lines (,,,) across the entire NIRSpec field of view. In Figure <ref>, we show the emission lines along with the multi-Gaussian fits and PSF subtraction in the distinct kinematic regions (marked a-d) across the NIRSpec FOV with their spatial location marked in Figure <ref>. To summarize, thanks to the high spatial resolution of the data, we can separate the emission into three distinct kinematic components based on their velocity offsets and dispersions. Physically, one is associated with narrow emission in the quasar host galaxy, one with broad extended emission due to the quasar-driven outflow, and the last one with the narrow extended emission associated with the tidal tail and neighboring companion galaxies. In this paper, we focus on emission line ratios associated with these three distinct kinematic components.
In <cit.>, we analyzed the F160W broad-band HST data for J1652 and concluded that the best-fitting two-dimensional Sersic profile had a Sersic index n_s≃ 3.4, intermediate between disks (n_s=1) and ellipticals (n_s>4), although the quality of the fit was not very good due to strong residuals in modeling of the quasar PSF. The position angle of the long axis of the fit was ≃26 East of North, and ellipticity of the fit was ϵ≃ 0.3, which is qualitatively similar to the orientation and shape of the stellar component seen in the JWST data (Ishikawa et al. in prep.). If the galaxy was a rotating disk, with its apparent ellipticity entirely due to projection effects, we would expect to see a velocity gradient perpendicular to the minor axis whose position angle at 116 East of North. We do not see a well-organized velocity field, and we, therefore, do not detect the host galaxy rotation and cannot identify its kinematic axis.
§ DISCUSSION
Integral-field spectroscopy is a powerful tool to both spatially and spectrally map the extended emission around quasars and their host galaxies. NIRSpec on JWST enables unprecedented near-infrared integral-field capabilities in space for the first time, allowing detailed spectroscopic mapping of the rest-frame optical continuum and emission lines of high-redshift objects such as J1652 <cit.>. In this Section, we use optical line diagnostics <cit.> to investigate the ionization mechanisms producing line emission (Section <ref>), physical conditions in different parts of the host galaxy and its environments (Section <ref>), and morphology of the different components (Section <ref>).
§.§ Ionization mechanisms
We measure /, /, /, and / line ratios for each kinematic component. These measurements are shown in Figure <ref> for both integrated line ratios and for each component independently, together with the theoretical lines delineating photoionization by star formation, photoionization by a quasar, and shock ionization. In Figure <ref> we show the 2D maps associated with each of the emission line ratios for each kinematic component with color scaling to match Figure <ref>.
Gas in the kinematic component associated with the quasar host galaxy (Component 1 in Figures <ref>,<ref>) shows a bimodal distribution in all line ratio diagrams. We see elevated line ratios towards the southwest, the same direction in which the photons must propagate from the nucleus and scatter off the material in the interstellar medium to explain the available spectropolarimetric observations <cit.> and the extended UV continuum resolved in HST observations (Vayner et al. 2023b - in prep.). We classify this region as the ionization cone due to the quasar emission.
Within this region, we also see several spatially clumpy regions that are associated with low line ratios, likely indicating that star formation within these kpc-scale clumps might be partially contributing to the photoionization of the gas. Towards the northeast, we detect three distinct kpc-scale clumps that show low (<-0.5) and relatively low (<0.5) emission line ratios. On the classic z=0 line ratio diagram, these clumps fall above the star-forming sequence and are close to the transition zone between star formation and AGN photoionization.
However, at higher redshifts, a lot of star-forming galaxies are above the z=0 star-forming sequence <cit.> due to harder ionization spectra, lower gas and stellar [Fe/H] metallicities <cit.> and overall denser interstellar medium (ISM; ). The red curve in Figure <ref> shows the delineation between star formation and AGN photoionization from <cit.>, which takes into account these redshift-dependent changes in typical physical conditions. Using these criteria, the J1652 clumps in the northeast fall within the maximum allowed line ratios produced by star formation. Hence, star formation is likely the primary source of ionization in these three clumps. Furthermore, this photoionization model best explains the delineation of the bimodal distribution in the line ratios that we see in this kinematic component. However, using the and ratios alone, we found a few spaxels left over that contain relatively high and emission line ratios, inconsistent with star formation. Hence, in addition to the and line ratios, we require that the line ratios fall within the star-forming portion of the vs. diagram. The reason for selecting the line ratios over is due to a larger coverage of the in the NIRSpec FOV.
The spatially-extended, kinematically-broad emission associated with the quasar-driven outflow (`Fc2') discussed by Vayner et al. (2022b - in prep.) and also detected in the ground-based data <cit.> – more prominent toward the southwestern direction from the nucleus – is primarily photoionized by the quasar. Spatially, the entirety of this component lies within the quasar photoionization cone identified via the line ratios of the narrow quasar host galaxy component (`Fc1').
Component 3 (`Fc3') associated with the tidal tail emission and nearby satellite galaxies, shows a wide range of emission-line ratios. A large portion of the region in the southwestern direction of the quasar photoionization cone shows clear evidence for elevated emission line ratios, consistent with quasar photoionization. Galaxies towards the southwest have their ISM partially photoionized by the quasar, indicating evidence for the impact of gas heating by the quasar on the immediate satellite galaxy population. The galaxy towards the northeast, which falls outside the quasar photoionization cone, shows evidence for star formation ionization with emission line ratios similar to the clumpy regions seen in the quasar host galaxy.
In the quasar host galaxy kinematic component, the / map and (to a lesser degree) the / map show enhanced values in the East-West direction, roughly orthogonal to the direction of the photoionized cones. Enhanced / values appear to be specifically anti-correlated with / values that systematically show lower (< 0.5) values. We further see a general trend where on average, there are higher and line ratios at higher velocity dispersion within the narrow kinematic component associated with the quasar host galaxy (Figure <ref>), suggesting shock ionization that extends perpendicular to the quasar outflow, and quasar ionization cone <cit.>. Furthermore, compared to the emission line ratios predicted by radiative shock models, we find that the points at σ>150 and orthogonal to the outflow region are consistent with these models <cit.>. We find a radiative shock model with an ISM electron density of 100 , solar metallicity, and magnetic field strength of 10 μG cm^3/2 best fits the observed line ratios orthogonal to the outflow (Figure <ref>). We find that higher electron density models under-predict the observed line ratios at all velocities. The large scatter that we see in Figure <ref> likely indicates that there are still other photoionization mechanisms at play. The line ratios in the shock-ionization part of the diagnostic diagrams can have many different origins. In some objects, these lines originate in shocks produced either by jets <cit.>, galactic winds <cit.> or by galactic collisions <cit.>, or sometimes unusual ionization sources masquerade as shock ionization <cit.>.
In our case, we know that there is a powerful quasar-driven outflow. The propagation of galactic outflows is strongly affected by the distribution and clumping of the interstellar medium. Winds can hydrodynamically curve around obstacles <cit.> and reach the parts of the galaxy that are not directly illuminated by the quasar within the photo-ionization cone, which is shaped by circumnuclear obscuration. The direct signatures of quasar winds impacting the host galaxy by driving turbulent shocks have been long sought, with the majority of the evidence in lower luminosity AGN in very nearby galaxies <cit.> and in nearby quasars through the enhancement of certain shock diagnostics as a function of wind kinematics seen in integrated quasar spectra <cit.>. More recently, with the advent of integral field spectroscopy, direct evidence for shocks visible just outside of the quasar illumination cone has started to accumulate. <cit.> found direct evidence for shock ionization in Mrk79 and Mrk348 that is orthogonal to the ionization axis, in which shocks can be more easily observed in regions that are shielded from the quasar's radiation field by the dusty nuclear torus. Similarly, <cit.> found a region of low-ionization, high-dispersion gas in Mrk273, which is neatly orthogonal to the photo-ionization cone. The implication is that the wind opening angle may be significantly larger than the opening angle of the ionization cone, where the gas is most visible. Here we present the first direct evidence for this phenomenon outside of the local universe, in a high-redshift quasar.
J1652 has shocks extended on the galactic scales, yet, it is difficult to confidently determine whether the shocks are driven by the quasar outflow or by the merger-induced inflows. J1652 is likely experiencing a major merger, with an extended tidal tail seen in the HST data <cit.> and multiple companions within several tens of kpc from the host <cit.>. Unfortunately, the small field of view of NIRSpec prevents us from conclusively determining whether there is any shocked emission specifically associated with the tidal tail. Both the merger and the outflow could be contributing to the shocked emission. However, there is a hint of increased and line ratios where there are lower emission line ratios towards the edge of the outflow as seen in the third panel of Figure <ref> in the and line ratio maps, indicating that the gas in the outflow transitions from being predominantly photoionized by the quasar to shocks ionization due to interactions of the outflow with the ISM of the host galaxy. This suggests that the outflow may be the dominant source of shock heating in both the narrow emission and the outflow region, providing hints for quasar feedback through the shock heating of the ISM.
§.§ Physical conditions
The unprecedented sensitivity of JWST allows us for the first time to measure the 6717 Å & 6731 Å emission-line ratios, commonly used as electron density diagnostics, in distinct regions of distant galaxies. The lines are sensitive to ionized gas density for temperatures ∼10^4-5K and densities between 100-10,000 . We can measure the emission-line ratio at high significance (>3σ) in the northeast star-forming clump region in the quasar host galaxy and in the merging galaxy towards the northeast. Over the outflow region, measuring the emission line ratio is more challenging due to the larger kinematic widths and, therefore, more significant blending. However, we find a decrease in the velocity dispersion with radius and can adequately fit both of the emission lines. We use the routine from the <cit.> package to derive the electron density using a gas temperature of 10,000 K. In the star-forming clumps of the quasar host, we measure an average electron density of 630 with a few regions getting to densities as high as 3,000-4,000 (Figure <ref>). In the outflow region, we measure a median value of 870 , and in the neighboring galaxy towards the northeast, a median value of 630 . On average higher electron densities in the outflow are consistent with recent results of AGN-driven outflows in star-forming galaxies at z=0.6-2.7 <cit.>.
In addition to measuring the electron density, we can measure the metallicity of the gas in the star-forming clumps. For both the quasar host galaxy and for the neighboring galaxies and tidal tail, we isolate star-forming regions based on the diagnostic line ratios as discussed in Section <ref>. We use the emission line ratio and the oxygen to hydrogen abundance calibration from <cit.>. We find values of 8.29-8.5 in the quasar host galaxy and 8.3-8.5 in the neighboring galaxies and tidal tail feature. We notice a minor positive gradient in the metallicity as a function of distance from the star-forming clump centers in the quasar host galaxy, most noticeably centered on the brightest northeast clump in Figure <ref>, likely indicating a recent accretion of new lower metallicity gas that triggered the star formation in the northeast clumps <cit.>. Positive metallicity gradients are commonly found in star-forming galaxies that have recently undergone a merger. The ongoing merger in the J1652 system may be a partial cause of the observed gradient in the star-forming region <cit.>. Outflows driven by stellar feedback may be expelling the higher metallicity gas towards larger radii away from the clumps, additionally helping cause the observed positive gradient <cit.>. Indeed we find evidence for outflows in these clumps due to blueshifted nebular emission lines (Figure <ref>), similar to what has been found in clumps of star-forming galaxies at z∼2 <cit.>. We find elevated ionized gas densities, lower metallicities, and emission line ratios consistent with what is found in star-forming galaxies at z∼2.3 <cit.>, further supporting our use of theoretical models that involve lower metallicity gas, harsher ionization and denser ISM <cit.> than those in local galaxies at the same stellar mass <cit.>. Photoionization from the quasar of low metallicity gas is unlikely to cause ionization of the clumps towards the northeast since their values are lower than what is expected from quasar photoionization of low-metallicity (<8.3) gas <cit.>.
We find elevated / emission line ratios (>2.8) in the star-forming clumps of the quasar host galaxy, the outflow region, and in the companion galaxy towards the northeast. These ratios are above what is expected for typical gas-phase conditions in the ISM of galaxies and radiation produced by recombination <cit.>. This likely indicates the presence of dust within these regions that is causing reddening. Using the <cit.> extinction law and assuming Case B recombination for the intrinsic / emission line ratio, we find V-band extinction of 0.5-3 mag in the star-forming clumps towards the northeast in the quasar host galaxy, in the outflow, and in the companion galaxy towards the northeast. For the northeast star-forming clumps, we see an increase in the level of extinction away from the brightest parts of the clumps. This increase disfavors the scenario that there is less shielding from quasar photoionization in the more flux diffuse regions, and the entirety of our selected region is consistent with star-formation photoionization. We find that the spaxels most consistent with star formation have the highest extinction values. V-band extinction magnitudes of 1-3 in the northeast star-forming region likely indicate sufficient self-shielding from the quasar UV ionization given that the UV optical depth due to dust absorption (τ_UV) is > 6-20 assuming the <cit.> extinction law. The expected hydrogen column densities in the regions with measured dust extinction, assuming a Milky-Way dust extinction, are 2-6 ×10^21 cm^-2 <cit.>.
§.§ Morphology of the ionized gas in the host
In this section, we describe the morphology and extent of the kinematically-narrow emission associated with the quasar host galaxy – within 500 from the systemic velocity. A portion of this kinematic component is consistent with being photo-ionized by star formation, and the integrated flux distribution is shown in Figure <ref>, second row. We see an overall orientation and ellipticity of the emission, which is consistent with those of the broad-band emission likely due to stellar light seen in the HST images <cit.>.
The high-resolution JWST observations reveal that the line emission is very clumpy, with clumps of sizes 2-3 kpc and Hα luminosities of 1-10×10^41 . We find at least nine individual clumps. We then isolate the spaxels in these clumps that fall within the star formation region of the line-ratio diagram as outlined by the red line in Figure <ref>, neglecting emission due to quasar photoionization. We find a total flux associated with star formation of 1×10^-16 , which translates to a star formation rate of 69 using the <cit.> empirically derived conversion from luminosity to a star formation rate. After correcting for extinction, these values increase to 3×10^-16 and 200 .
In Figure <ref>, we show the star-formation rate map based on the extinction corrected emission. We can see that the region ionized exclusively by star formation, with no contribution from the quasar, is concentrated toward the northeast of the central quasar. This star formation rate is likely a lower limit as we are missing the obscured star-forming regions, as well as star-forming regions within quasar ionization cones where gas is `fried' by quasar radiation and excluded from our calculations by the line-ratio diagrams.
The primary quasar photoionization cone and kinematically broad outflow are both directed to the south-west of the nucleus <cit.>, but a faint north-eastern counter-cone with a much smaller physical extent is also detected via its kinematics <cit.>. J1652 is an extremely powerful quasar, with quasar photoionization being the dominant ionization process across most of the observed emission. In order for the ionized gas to display star-formation-like line ratios in the northeastern quadrant, it must either be protected from quasar emission or star formation needs to dominate the overall ionization in the surrounding gas clouds. We hypothesize that the star-forming region identified in Figure <ref>, left, is physically in front of the quasar counter-cone and outside of the quasar photo-ionization region. As the extinction within the star-forming region reaches A_V=3 magnitudes, This is suggested both by the faintness of the counter-cone, which in this scenario may be obscured by the foreground parts of the J1652 host galaxy hosting star-forming clumps (this region reaches A_V=3 mag), and by the kinematics of the counter-cone – redshifted, i.e., directed away from the observer <cit.>.
Although all star formation is ultimately regulated by inflows and outflows of gas, high-redshift star formation is dominated by somewhat different processes and is somewhat morphologically distinct from star formation in the local universe <cit.>. Most importantly, in the phenomenon known as `cosmic downsizing' <cit.>, star formation at high redshift predominantly occurs in the most massive halos through high-rate accretion by gas streams and gas-rich mergers, whereas in the local universe, the most massive halos are inhabited by passively evolving, gas-poor galaxies. J1652, which is hosted by a massive galaxy <cit.> within a likely protocluster <cit.>, is a prime example of this phenomenon.
Morphologically, high-redshift star formation is significantly clumpier <cit.> and more dynamically hot than that at low redshifts – specifically, star formation rarely proceeds in well-organized star-forming disks, and in rare disk examples, the typical velocity dispersion of the gas is much higher than that in the local ones <cit.>. This is also in line with our observations of J1652, where multiple gas clumps are seen with a wide range of velocities, where the morphology of the stellar component – disk vs. spheroid – remains ambiguous, and where, despite the high galaxy mass, we have not been able to detect a systematic rotation signature.
The giant star-forming clumps do not necessarily require mergers and, in simulations, can be produced as a result of secular processes such as cold stream accretion <cit.> with subsequent clump mergers <cit.>. All of these processes can be in play in J1652, but in addition, its tidal tail indicates a possibility of a recent major merger. Statistically, major mergers have been linked to brighter and larger clumps in high-redshift star-forming galaxies <cit.>.
§ CONCLUSIONS
In this paper, we present JWST NIRSpec integral-field unit observations of J1652, a powerful red quasar at redshift at z∼3. J1652 belongs to the population of extremely red quasars, which are selected from optical and infrared surveys based on their colors and rest-frame ultraviolet emission line properties <cit.>. Amongst quasars of all types and all luminosities, they are unique in exhibiting extremely fast winds seen in forbidden lines of warm ionized gas <cit.>. We analyze the observations using , which subtracts the PSF from the data cube and fits continuum and emission-line models to the residual host galaxy data. In our previous papers based on this dataset we demonstrated that J1652 is in a very active environment, with multiple companion galaxies within the small field of view of NIRSpec moving with high velocities <cit.>, and we confirmed the presence of an extremely powerful galactic-scale quasar-driven wind whose energetics and physical conditions can be measured with JWST for the first time (Vayner et al. 2023b - in prep.).
In this paper, we present the analysis of the ionization physics of the gas based on the emission-line diagnostic diagrams for different kinematic components. We separate the Gaussian components from the multi-Gaussian emission-line fits into broad and likely due to the quasar-driven outflow and narrow, which may be due to companion galaxies or to clumps of star formation in the galaxy itself. We confirm at least nine clumps within 500 of the systemic velocity characterized by a narrow velocity dispersion. The morphology is too disturbed and broken into clumps for us to see any evidence of an organized velocity field due to galaxy rotation. This, combined with a Sersic index of n_s=3.4 measured from the HST data <cit.>, which is intermediate between disks and ellipticals, prevents us from conclusively determining the dynamical state of the host galaxy.
Standard emission-line diagnostics <cit.>, which can be measured for integrated lines or for individual kinematic components, reveal a complex superposition of regions dominated by photoionization by the quasar, by star formation and by shocks. Photoionization by the quasar is primarily in the southwest direction, along the same axis as the one expected from the ground-based spectropolarimetric observations <cit.>, which probe circumnuclear geometry of obscuration. The brighter southwestern ionization cone, blue-shifted and likely pointing somewhat toward the observer, coincides with the location of the rest-frame UV extended emission likely due to scattered light <cit.>. We also detect the much weaker redshifted counter-cone on the opposite northeastern side of the nucleus. Therefore, the standard geometric unification model developed for nearby low-power active nuclei <cit.> applies to our high-redshift, extremely powerful obscured quasar as well.
We clearly detect shock-ionized emission in the regions perpendicular to the main quasar ionization cone. This component is seen in both /Hα and /Hα maps. The shocks may be due to collisions with companion galaxies – or, more likely, to the quasar-driven wind. It has long been suggested by numerical simulations that quasar-driven winds can hydrodynamically go around obstacles and shock-excite the gas outside of the ionization cone of the quasar <cit.>. If the moving wind is also illuminated by the quasar, then in the clouds affected by both shocks and photo-ionization, the latter dominates, and the shock signatures are very hard to detect. However, the gas outside of the ionization cone is protected from quasar emission, and the weaker shock signatures become visible. Our detection of the off-axis shocked emission strongly suggests that the opening angle of the quasar wind is significantly larger than that of the ionization cones, making the coupling of the wind to the gas in the host galaxy more effective and indicating the widespread impact of quasar wind onto its host galaxy.
Finally, the quasar is powerful enough to contribute to photoionization over most of the host galaxy, but there is one region in the northeast that may be closer to the observer than the redshifted counter-cone, which displays line ratios consistent with star formation. The minimal star formation rate derived from the extinction-corrected emission of this region alone is 200 , but it is likely significantly under-estimated since this estimate does not include any obscured star formation nor any star-forming clumps which may be within the ionization cones of the quasar. The northeast star-forming clumps show on average oxygen abundance values () about half to third solar with a positive metallicity gradient from the center of the brightest star-forming clump towards the outskirts of the star-forming region. Overall the electron density in the northeast clumps is much higher than what is observed in low redshift star-forming galaxies at similar stellar masses, reaching up to 3,000 , with V band extinction up to 3 magnitudes. The overall star-forming conditions are quite different from the local universe but consistent with massive star-forming galaxies at cosmic noon. It is quite possible that the nine clumps we detect across the face of the galaxy are all star-forming, but because of the extra quasar illumination of these clouds, they show up as regions photo-ionized by the quasar on our line-ratio diagrams, and they would be therefore excluded from our star formation rate calculation. Figure <ref> summarizes all of our results on J1652 presented in this paper.
We are catching the SDSSJ1652 system at a unique time, with ongoing merger activity and quasar-driven outflows that drive shocks and turbulence in the ISM with ongoing vigorous star formation in clumpy star-forming regions across the host galaxy. The unprecedented surface brightness sensitivity of JWST NIRSpec observations in the near-IR allowed for a unique set of discoveries that allowed us to address key questions about the photoionization mechanisms in the quasar host galaxy and in the immediate environment. Evidence for photoionization of the ISM of neighboring galaxies and the surrounding tidal tail on tens of kpc scales strongly supports the scenario that quasar photoionization is a significant contributor to powering the powerful extended Lyα nebula around this source (Gillette et al. in-prep.) and other quasars with similar bolometric luminosities <cit.>. This indicates that powerful quasars can affect the properties of the ISM of nearby galaxies falling in the ionization cone of the quasar. Direct evidence for the impact of quasar-driven outflows on the ISM in quasar-host galaxies has been a several-decade endeavor. Particularly searching for evidence of shock heating of the ISM that prolongs the lifetime for gas to cool and form stars. The difficulty in detecting this direct impact is largely due to the low surface brightness emission of shock-heated gas at close angular separations to an extremely bright object. Owing to the sensitivity of JWST and the contrast enabled by the NIRSpec IFU and we were able to see the impact of the quasar outflow by detecting clear evidence for shock heating on kpc scales directly in the path of the quasar outflow for the first time at the peak epoch of galaxy and SMBH growth.
A.V., N.L.Z., Y.I. and N.D. are supported in part by NASA through STScI grant JWST-ERS-01335. N.L.Z further acknowledges support by the Institute for Advanced Study through J. Robbert Oppenheimer Visiting Professorship and the Bershadsky Fund.
JWST(NIRSpec), HST(WFC3)
astropy <cit.>, reproject
aasjournal
|
http://arxiv.org/abs/2303.06872v1
|
20230313054621
|
FusionLoc: Camera-2D LiDAR Fusion Using Multi-Head Self-Attention for End-to-End Serving Robot Relocalization
|
[
"Jieun Lee",
"Hakjun Lee",
"Jiyong Oh"
] |
cs.RO
|
[
"cs.RO",
"cs.CV"
] |
FusionLoc: Camera-2D LiDAR Fusion Using Multi-Head Self-Attention for End-to-End Serving Robot Relocalization
Jieun Lee, Hakjun Lee, and Jiyong Oh*
J. Lee and J. Oh are with Robot IT Convergence Research Section, Daegu-Gyeongbuk Research Center, Electronics and Telecommunications Research Institute (ETRI), Daegu, Korea (e-mail: {jieun.lee, jiyongoh}@etri.re.kr). H. Lee is with Polaris3D, Pohang, Korea (e-mail: [email protected]). J. Oh is the corresponding author.
Received: date / Accepted: date
=================================================================================================================================================================================================================================================================================================================================================================================
With the recent development of autonomous driving technology, as the pursuit of efficiency for repetitive tasks and the value of non-face-to-face services increase, mobile service robots such as delivery robots and serving robots attract attention, and their demands are increasing day by day.
However, when something goes wrong, most commercial serving robots need to return to their starting position and orientation to operate normally again.
In this paper, we focus on end-to-end relocalization of serving robots to address the problem.
It is to predict robot pose directly from only the onboard sensor data using neural networks.
In particular, we propose a deep neural network architecture for the relocalization based on camera-2D LiDAR sensor fusion.
We call the proposed method FusionLoc.
In the proposed method, the multi-head self-attention complements different types of information captured by the two sensors.
Our experiments on a dataset collected by a commercial serving robot demonstrate that FusionLoc can provide better performances than previous relocalization methods taking only a single image or a 2D LiDAR point cloud as well as a straightforward fusion method concatenating their features.
FusionLoc, serving robot, camera-2D LiDAR fusion, multi-head self-attention, end-to-end relocalization.
§ INTRODUCTION
Recently, with the development of autonomous driving technology, as the pursuit of efficiency in repetitive tasks and the increase in the value of non-face-to-face services, the interest and demand for mobile robots in particular services are increasing day by day. Accordingly, mobile robots are helping people in various places, such as guiding people at airports or museums, disinfecting schools or hospitals, following people with heavy objects, and serving food in restaurants.
It is known that workers can walk around 8 to 15 kilometers a day when serving at a restaurant. Also, walking while carrying dishes will be more laborious than walking with empty hands. As a result, it can lower the quality of essential services for customers. For these reasons, serving robots are employed in more and more sites to improve more efficient working environments while reducing physical burden primarily.
For the autonomous driving of a serving robot, localization is indispensable.
Some mobile robots use a global positioning solution based on markers attached to the ceiling for localization.
However, it has limitations due to the cost of infrastructure construction and maintenance and the damage to aesthetic elements in cafes and restaurants.
Another localization methodology first produces a map of the place where the robot operates using simultaneous localization and mapping (SLAM) methods <cit.>, <cit.>. Then, the serving robot estimates its location on the map based on information captured from its various sensors, like wheel encoders, cameras, LiDARs, or IMUs. However, it often fails to estimate its location for some reasons, e.g., many people around the robot. The failure in the localization requires the serving robot user to reboot it at a predetermined starting position and orientation. That is one of the reasons why relocalization is needed.
Deep learning studies for end-to-end relocalization have been actively conducted in the past few years. PoseNet <cit.> applied a convolutional neural network (CNN) to a single RGB image to regress 6 degrees of freedom (DoF) camera poses. It was shown that PoseNet is more robust to illumination variation and occlusion than point feature-based relocalization methods.
Various studies followed PoseNet to apply a Bayesian CNN <cit.>, long-short term memory (LSTM) <cit.>, or geometric reprojection loss function <cit.>.
Also, temporal information was utilized with an LSTM module <cit.>, and an encoder-decoder architecture was employed for camera relocalization in <cit.>. Moreover, geometric constraints of two consecutive poses were considered to improve relocalization accuracy in <cit.>, and a self-attention block was adopted in regressing the camera pose <cit.>. In recent studies, deep neural networks (DNN) took LiDAR <cit.> or IMU <cit.> data instead of using an image for relocalization in an end-to-end manner.
In this paper, we leverage two sensors equipped with a commercial serving robot to improve relocalization accuracy. From the perspective of the extension of previous studies, this paper proposes a fusion DNN taking both an RGB image and a 2D LiDAR point cloud as inputs to regress the 3-DoF pose of the serving robot. We call the proposed architecture FusionLoc.
To our best knowledge, this work is the first study to address the end-to-end relocalization of mobile robots based on the fusion of camera and LiDAR in two-dimensional planar space.
The proposed network extracts features by adopting the AtLoc <cit.> architecture and the PointLoc <cit.> architecture from RGB images and 2D LiDAR point clouds, respectively.
These features are combined through a concatenation operation. Then, the information captured from each sensor interacts together within multi-head self-attention (MHSA) layers <cit.>.
Finally, FusionLoc outputs the position and orientation of the serving robot. Furthermore, this study introduces a new dataset consisting of tuples of RGB image, 2D LiDAR point cloud, and 3-DoF pose. The data was collected using a Polaris3D serving robot named ereon.
Experiments on the dataset show that the proposed network outperforms the previous methods taking a single image or 2D LiDAR point cloud only.
The contributions of this paper are summarized as follows:
* A fusion deep neural network leveraging multi-head self-attention layers is proposed to take an image and a 2D LiDAR point cloud as input.
* A new dataset, collected using a commercial serving robot, is introduced.
This paper is organized as follows.
Section <ref> briefly introduces the previous DNN-based studies for relocalization.
Section <ref> describes the proposed DNN architecture for camera-2D LiDAR fusion in detail.
The new dataset is explained, and the experiments based on the dataset are shown in Section <ref>. Finally, Section <ref> concludes the paper and provides future work.
§ RELATED WORKS
§.§ Deep learning-based camera relocalizaton
PoseNet <cit.> was a breaking ground work that tried to directly regress 6-DoF camera pose from a single image using a CNN.
It was noted that it was robust to motion blur, darkness, and unknown camera intrinsics compared to conventional methods based on the scale-invariant feature transform (SIFT <cit.>).
Probabilistic PoseNet <cit.>, an extension of PoseNet, adopted a Bayesian CNN with Monte Carlo dropout sampling to handle uncertainty in pose estimation.
In <cit.>, LSTM was presented as a substitute for the fully-connected layer before the pose regression layer to prevent overfitting and to perform a structured dimensionality reduction.
In <cit.>, loss function was also a consideration to improve relocalization performance.
To this end, two alternatives were presented and tested in the study.
One was a learnable balancing parameter between position and orientation, and the other was the reprojection error between predicted and actual camera poses.
In <cit.>, VidLoc was proposed.
It leveraged a bidirectional LSTM to utilize temporal information in successive images.
The trial led to some reduction in the relocalization error.
In <cit.>, the authors employed an encoder-decoder CNN architecture, which was called hourglass, for fine-grained information restoration.
In the encoder, ResNet-34 <cit.> was adopted instead of GoogLeNet <cit.> used in PoseNet.
In <cit.>, MapNet was proposed using an additional loss term related to the relative poses between image pairs together with the loss term of the absolute poses of images.
It was meaningful concerning encoding geometric constraints between consecutive poses into the loss function.
Moreover, in the study, the logarithm of the unit quaternion was also proposed as the representation of the camera orientation instead of the unit quaternion.
The logarithm of the unit quaternion has been popular in most follow-up studies.
In <cit.> and <cit.>, a Siamese architecture was presented to reduce the relocalization error with the relative poses of the image pairs.
ViPNet <cit.> utilized the squeeze-and-excitation blocks and a Bayesian CNN with ResNet-50 to deal with uncertainty in predicting a camera pose like Probabilistic PoseNet <cit.>.
AtLoc <cit.> adopted a self-attention module to focus on geometrically rigid objects rather than dynamic ones.
VMLoc <cit.> encoded the features of depth images (or projection of sparse LiDARs to RGB images) and RGB images in each CNN branch.
Then, the two types of features were fused by Product-of-Experts.
§.§ Deep learning-based other sensors relocalizaton
There have been a few studies on deep learning for relocalization with other sensors.
Compared to camera relocalization, those studies have recently been published.
The 3D LiDAR point clouds have more geometric information because they can see with a wide angle of 360 degrees and vertical field of view.
In <cit.>, a point cloud odometry method was proposed, which took two consecutive 3D point clouds as input and predicted the transformation between them.
Each point cloud was first encoded to a panoramic depth image, and then the two depth images were stacked.
The DeepPCO network estimated 3D translation and 3D orientation from the stacked depth image using its two sub-networks.
Different from <cit.>, PointLoc <cit.> regressed a 6-DoF pose of a 3D LiDAR sensor directly from a point cloud.
In PointLoc, the PointNet++ <cit.> architecture was employed to extract features from unordered and unstructured 3D point clouds, and a self-attention module was also employed to remove outliers.
Unlike DeepPCO and PointLoc, StickyLocalization <cit.> relocalized current 3D point clouds within a pre-built map.
In the pillar layer where PointPillar <cit.> method was utilized, local and global key points were extracted from a current point cloud and the global point cloud corresponding to a map, respectively.
Then, self-attention and cross-attention modules in the graph neural network layer aggregate context information to improve robustness.
The final optimal transport layer outputs the pose of the current point cloud by a matching process between the outputs of the graph neural network layer.
Although its task was not to estimate the pose of a mobile robot, 2DLaserNet <cit.> processed 2D laser scan data with a neural network developed from PointNet++ <cit.> to classify the location of the mobile robot as one of room, corridor, and doorway.
In addition to camera and LiDAR, IMU has also been used for relocalization.
RoNIN <cit.> utilized the backbone networks such as ResNet, LSTM, and temporal convolutional network to estimate human 3-DoF poses from a sequence of IMU sensor data.
IDOL <cit.> regressed 5-DoF poses with a two-stage procedure consisting of an orientation module using extended Kalman filters (EKFs) and LSTMs and a position module using bidirectional LSTMs.
In NILoc <cit.>, a neural inertial navigation technique was presented to convert IMU sensor data to a sequence of velocity vectors.
The methods leveraged a Transformer-based neural network architecture to reduce high uncertainty in IMU data.
Moreover, in <cit.>, a neural network framework was proposed to handle laser scan data and IMU sensor data together for mobile robot localization.
For feature extraction in the method, a stack of two laser scans and a IMU data sequence between the two laser scans were passed through CNN and LSTM, respectively.
Then, another LSTM regressed the 3-DoF robot pose from the fused features.
§ METHOD
§.§ Self-attention
Since Transformer <cit.> made a great success in the literature on natural language process, its self-attention, one of the essential elements in Transformer, has been utilized in many studies for computer vision applications.
In particular, it was shown in <cit.> that a self-attention on CNN features was effective in camera pose regression.
We use the same self-attention, but its input consists of image features computed from an input image and point cloud features computed from an input 2D point cloud.
The input of the self-attention 𝐟_i, which is a column vector, is first projected to generate query 𝐖_q𝐟_i, key 𝐖_k𝐟_i, and value 𝐖_v𝐟_i by three learnable projections.
Then, the value is weighted based on the normalized correlations between the query and the key.
The correlations are calculated using the softmax function ϕ, and these procedures can be represented as
𝐟_Att = ϕ( 𝐟_i^T𝐖_q^T𝐖_k𝐟_i)𝐖_v𝐟_i.
Here, 𝐟_Att is the output of scaled dot-product attention in <cit.>.
The output of the self-attention 𝐟_o is computed based on a linear projection of 𝐟_Att and a residual connection as
𝐟_o = 𝐖_p𝐟_Att + 𝐟_i.
According to <cit.>, it was illustrated that this self-attention makes activation more intense in fixed objects like buildings and furniture in its input image than in dynamic ones like moving vehicles and pedestrians, which leads to robust relocalization.
It was also shown that the self-attention is effective in capturing the correlations among the elements of 𝐟_i in camera relocalization as well as in other computer vision applications <cit.>, <cit.>.
§.§ Camera-LiDAR fusion for relocalization with multi-head self-attention
The proposed network consists of two feature extraction modules, a MHSA module, and a regression module as shown in Fig. <ref>.
It receives two types of data obtained from different sensors, an image captured by a camera and a point cloud captured by a 2D LiDAR.
We assume that they are synchronized in time.
At first, in the feature extraction modules, the image and point cloud features are computed from the image and the point cloud, respectively.
The image feature 𝐟_I is computed by the feature extractor of AtLoc <cit.>, which consists of a CNN based on ResNet-34 <cit.> followed by the self-attention module described above.
On the other hand, the point cloud feature 𝐟_P is computed by the feature extractor of the PointLoc <cit.>, which consists of the set abstraction layers, the self-attention layer, and the group all layer.
Except for the self-attention layers, the other layers in the network were presented in PointNet++ <cit.>, which was proposed for 3D point cloud classification and semantic segmentation.
Since the input point cloud is two-dimensional, not three-dimensional, we modified the feature extraction module so that it receives a 2D point cloud as input.
As in a CNN where a basic block consisting of convolution, nonlinear activation, and pooling operations is consecutively performed, several successive set abstraction layers extract features from a 2D LiDAR scan to give a feature matrix.
The self-attention layer in PointLoc is slightly different from the one in AtLoc described above.
In the layer, a weight matrix is computed by passing the feature matrix through a shared multi-layer perceptron (MLP) layer, a sigmoid function, and a broadcasting operation.
Then, the output of the self-attention layer is obtained by multiplying the feature matrix and the weight matrix element-wise.
Note that the input and output of the self-attention layer in PointLoc also have the same dimension as in AtLoc.
The group all layer takes the output of the self-attention layer as its input and provides the point cloud feature 𝐟_P by conducting an MLP and max-pooling operations.
More details are referred to as <cit.>.
From the perspective of sensor fusion, it may be important to make data measured from different sensors interact with each other.
For the relocalization using both camera and 2D LiDAR, the most straightforward way to use their data in a network is to concatenate their features and to perform a pose regression using the concatenated feature, which is called the fusion features below.
However, we figured out from many experiments that those simple concatenation is not enough to effectively fuse different information obtained from the two sensors.
To overcome this limitation, we propose to apply additional MHSA as shown in Fig. <ref> to the fusion features.
Since the self-attention effectively captures the correlations between its input elements, it can allow different information contained in 𝐟_I and 𝐟_P to interact with each other.
In other words, we utilize the MHSA module for information fusion.
In <cit.>, MHSA was presented to capture different correlations among input elements by performing several scaled dot-product attentions in parallel.
To this end, the outputs of all attentions are integrated and a linear projection is performed as
𝐖_p[ 𝐟_Att_1^T, …, 𝐟_Att_j^T, …, 𝐟_Att_N_h^T]^T,
where 𝐟_Att_j is the output of the j-th scaled dot-product attention, N_h is the number of the attention heads, and [ 𝐚_1^T, …, 𝐚_n^T] is the concatenation of {𝐚_i^T}_i=1^n.
In this operation, each attention is scaled by a scaling factor N_h so that its output has the same dimension as the input.
Like the Transformer encoder in <cit.>, a normalization layer is applied before MHSA, and a residual connection is attached after MHSA.
We employ batch normalization (BN, <cit.>) instead of layer normalization (LN, <cit.>) different from <cit.>.
It was demonstrated in <cit.> that LN is more effective than BN for recurrent networks.
However, we find out from experiments that BN is more effective than LN in this work.
Also, we do not use the positional encoding, another input of the Transformer encoder, because the order of elements in the fusion features is not important in this task, unlike a sequence.
This MHSA block with identical architecture repeats N_l times as in <cit.>.
It will be demonstrated in experiments that the repetition of MHSA improves the accuracy of the relocalization based on the camera-2D LiDAR fusion.
Finally, the regression module predicts the pose, the position 𝐩 = [ x, y ]^T and the orientation 𝐪 = [ cosθ, sinθ]^T from the output of the MHSA module.
It consists of a position branch and an orientation branch as in <cit.>, <cit.>.
Each branch is composed of consecutive MLPs.
In <cit.>, a leaky ReLU activation function was used after each MLP except for the last one in its regression head, but we replace it with the ReLU activation function in our network.
Different from most of the previous studies for end-to-end relocalization, both the position and the orientation are two-dimensional under the assumption that typical serving robots move on planar space.
To take into account the continuity of the rotation angle <cit.>, we present the rotation 𝐪 as [ cosθ, sinθ]^T rather than θ.
To our best knowledge, this work is the first study addressing the end-to-end relocalization for a serving robot based on the camera-2D LiDAR fusion in two-dimensional planar space.
§ EXPERIMENTS
§.§ Dataset
In order to train and evaluate the neural networks for serving robot relocalization, we constructed a dataset using a commercial serving robot Polaris3D ereon as shown in Fig. <ref>.
The dataset contains two sets, Set-01 and Set-02.
We gathered the data samples in Set-01 by moving the robot around an area with tables and chairs in our testbed as shown in the left of Fig. <ref>.
Set-01 originally consisted of a single sequence of 3,964 lengths.
We split it into ten shorter ones as in the right of Fig. <ref>.
Seven sequences and the others among them were used for training and evaluation, respectively.
In addition, we collected the data samples for Set-02 by operating the robot in a relatively wider area with long corridors as shown in the left of Fig. <ref>.
Set-02 consists of three sequences with lengths of 4,820, 7,805, and 6,377 as in the right of Fig. <ref>.
Two sequences and the other one among them were used for training and evaluation, respectively.
Table <ref> summarizes the ereon dataset described above.
As shown in Fig. <ref>, ereon has two cameras, Intel RealSense D435 and one 2D LiDAR, SLAMTEC RPLiDAR A1M8.
The cameras are installed at the side of the upper and lower serving tray, and the LiDAR is mounted in the center of the drive unit located under the lower serving tray.
In order to capture the whole body of people around the robot, the lower and upper cameras face upwards and downwards, respectively, rather than facing straight ahead.
We gathered images and point clouds obtained from the lower camera and the LiDAR because the upper camera was affected by vibration during robot movement.
The obtained RGB images have the size of 420×240 pixels with a frequency of 1.5 Hz.
On the other hand, the LiDAR sensor captures 2D point clouds with a range radius of up to 12 meters (m) and a field of view of 360 degrees (^∘).
Although it can measure point clouds at a frequency of 8 Hz, we acquired only the point clouds synchronized with images.
Since the angular resolution of the LiDAR sensor is equal to or greater than 0.313 degrees, the number of 2D points in a point cloud is up to about 1,150.
Fig. <ref> shows the example RGB images and 2D point clouds captured by our sensors.
Together with the sensor data, the robot poses corresponding to images and point clouds are necessary to train and evaluate relocalization algorithm.
We first constructed a map of our testbed using a SLAM technique.
Then, the poses on the constructed map were measured by the localization mode of the technique.
The localization mode provides a 6-DoF pose with the quaternion representation for orientation.
However, we used the x- and y-axis values for position and the yaw angle value for orientation under the consideration that typical serving robots operate in a flat environment.
Given a quaternion [ q_x, q_y, q_z, q_w], the yaw angle θ is calculated as
θ = arctan( 2(q_xq_y + q_wq_z), 1 - 2(q_y^2 + q_z^2) ).
§.§ Training details
We implemented and trained our proposed network and other networks presented for the same task under the setting below.
The Adam method was employed as the solver or optimizer.
The learning rate was set to 0.0001, and the weight decay was determined to be the same value.
The networks were trained up to 1000 epochs using the ereon dataset with a batch size of 256 on a single GPU of NVIDIA GeForce RTX 3090.
As in AtLoc <cit.> and PointLoc <cit.>, we adopted ℒ_1 distances to measure the dissimilarity between the ground truth pose and the estimated pose in our loss function as
‖𝐩 - 𝐩‖_1 e^-β + β + ‖𝐪 - 𝐪‖_1 e^-γ + γ,
where β and γ are learnable parameters to balance the position and orientation loss terms.
Their initial values β_0 and γ_0 were set to 0.0 and -3.0, respectively, as in <cit.> and <cit.>.
In the above loss function, we employed the ℒ_1 distance between the predicted angle and the ground truth angle instead of the ℒ_1 distance between two logarithms of their unit quaternions.
This replacement came from the dimension of the space in which our robot operates.
For the purpose of comparison, AtLoc and PointLoc were selected as the image- and the point cloud-based baseline methods for end-to-end serving robot relocalization, respectively.
We also utilized their networks as backbones for image and point cloud feature extraction.
For image feature extraction, as in AtLoc, we scaled the short side of the image to have 256 pixels, then randomly cropped it to 256 × 256 pixels and normalized the cropped image when training.
The random cropping was replaced by the center cropping when testing.
For data augmentation, the color jittering method was also conducted by setting the brightness, contrast, and saturation values to 0.7 and the hue value to 0.5.
The pre-trained ResNet34 with the ImageNet dataset was chosen as the backbone for image feature extraction.
We also applied a dropout operation with a probability of 0.5 whereas no dropout was applied when using BN.
Table <ref> shows the parameter values of the set abstraction layers in the point cloud feature extractor used in our experiments.
We reduced the numbers of layers and neurons in MLP compared to the original PointLoc setting because the 2D point cloud has fewer input points than the 3D point cloud.
We also employed ReLU instead of LeakyReLU as the activation function in the fully connected layers.
After the feature extractions mentioned above, the image and the point cloud features were concatenated into the fusion features.
Then, the fusion features were fed into the several MHSA blocks described in the previous section and the final regression head to provide the pose estimate.
In these procedures, both the image and the point cloud features could be set to 256-, 512-, 1024-, and 2048-dimensional giving 16 combinations of fusion.
Also, we conducted experiments applying MHSA with 1, 2, 4, and 8 heads and 1, 2, 4, and 6 layers.
§.§ Evaluation results on Set-01
Baselines. In the original AtLoc and PointLoc, the image and point cloud features were 2048- and 1024-dimensional, respectively.
We first tried to determine the dimensions of the image and point cloud features represented as d_I and d_P, respectively.
To do this, we trained the two methods using the data in the seven training sequences in Set-01 in Table <ref>.
Then, we measured the median and mean of the position (m) and orientation errors (^∘) using the data in each evaluation sequence in the same set for each value of the d_I and d_P.
The previous studies on the end-to-end relocalization methods reported only the median errors.
However, we report the mean errors with the median errors since the latter can not reflect a few large errors.
We computed the averages of the median and mean errors, and Table <ref> shows the average median and mean errors of position and orientation.
We can see from the table that AtLoc gives lower position errors than PointLoc whereas PointLoc yields lower orientation errors than AtLoc.
Another interesting point is that the tendency between the error values and their feature dimension is opposite, i.e., the error values of AtLoc and PointLoc decrease and increase as their dimension increases, respectively.
Also, in the case of position error, AtLoc provided similar error values varying the dimension of the image features, and the difference was up to 0.04m and 3.58^∘ for position and orientation, respectively.
However, the error values of PointLoc had a large difference, the maximum of which was 0.51m and 3.24^∘.
A straightforward concatenation. We present experiments with the fusion features corresponding to the concatenation of the image and point cloud features extracted by AtLoc and PointLoc without MHSA.
Table <ref> shows the average median and mean errors of position and orientation depending on the fusion combinations, which have different dimensions of the image and point cloud features.
We can see from the table that the position and orientation errors overall tend to decrease as the dimensions of the image and point cloud features increase.
Note that the position error decreased to less than 1m by fusing the image and point cloud features in terms of the average median error.
The orientation error also maximally decreased to 2.38°, which was less than the PointLoc's one.
This result clearly shows the benefit of fusing different sensor data.
However, the fusion features still provided a large average mean error of orientation compared to the point cloud features.
We analyzed these results more by representing the error value as color.
In Fig. <ref>, the location of the points corresponds to the ground truth position, and their color means the error value.
The error values were measured using the data in seq-03, one of the evaluation sequences.
Comparing Fig. <ref> to Fig. <ref>, we can find the points at which orientation error decreased.
However, we can also see that some points, e.g., on the top right and the bottom middle of Fig. <ref>, still have somewhat large orientation errors compared to the corresponding points in Fig. <ref>.
FusionLoc. In addition to AtLoc, PointLoc, and the straightforward concatenation, we finally conducted relocalization experiments by adopting repetitive MHSAs taking the fusion features as input.
As mentioned in the previous section, we applied BN instead of LN to each MHSA block based on the fact that the range of the image feature values was different from that of the point cloud feature values.
Moreover, it was mentioned in <cit.> that LN is not as effective in CNN as in recurrent networks.
Fig. <ref> shows the trajectories of the estimated positions by FusionLoc with LN and BN using the training sequences seq-01 and seq-10, respectively.
This result indicates that BN is more effective than LN to train the proposed network for relocalization.
Table <ref> shows the results of some ablation studies on the number of attention heads N_h and the number of MHSA layers N_l in the MSHA module.
For efficiency, the position and orientation errors were measured under only the settings of (d_I, d_P)=(256, 256) and (d_I, d_P)=(2048, 2048).
When (d_I, d_P)=(2048, 2048), we set the batch size to 64 due to memory limitation.
We can find from the table that the errors generally decrease as each of N_l and N_h increases in the case of (d_I, d_P)=(256, 256).
Especially, most average mean orientation errors become smaller than those of PointLoc when the number of layers is equal to or greater than 4.
This result could not be obtained without the MHSA module as shown in Table <ref>.
We can also see that the position and orientation errors are minimized when N_h=2 and N_l=6 in terms of the average median and when N_h=8 and N_l=6 in terms of the average mean in the case of (d_I, d_P)=(256, 256).
Compared to the (d_I, d_P)=(256, 256) without the MHSA module in Table <ref>, the minimum error values get smaller by (0.23m, 6.24°) and (0.3m, 21.54°), respectively.
The improvement can also be found by comparing Fig. <ref> and Fig. <ref>.
And, they are lower than those of (d_I, d_P)=(2048, 2048) in Table <ref> though using the lower numbers of image and point cloud features.
Moreover, the minimum errors decreased more as the MHSA module was applied to the case of (d_I, d_P)=(2048, 2048).
Using the MHSA module made differences by (0.24m, 1.99°) in terms of average median error and (0.27m, 20.97°) in terms of average mean error when (d_I, d_P)=(2048, 2048).
§.§ Evaluation results on Set-02
In order to validate the proposed method in a larger place, we compared the position and orientation errors using Set-02 data.
For efficiency, we set to d_I = d_P = 256.
As in the above experiments using the data in Set-01, we trained every neural network aforementioned using the training sequences in Set-02, and we measured the median and mean errors of position and orientation using the evaluation sequence.
Fig. <ref> shows the median and mean errors of AtLoc, PointLoc, the straightforward concatenation method, FusionLoc using LN, and FusionLoc using BN, which were computed at every 100 up to 1000 epochs.
Different from the results of Set-01 in Table <ref> that AtLoc was better than PointLoc in terms of the position error whereas PointLoc was better than AtLoc in terms of the orientation error, we can see in Fig. <ref> that AtLoc provided lower position and orientation errors than PointLoc.
This inconsistency may come from the fact that i) Set-02 was collected by making the robot move similar paths multiple times unlike Set-01 as shown in Fig. <ref>, and ii) the maximum range of the used LiDAR sensor is relatively lower than the area of the place where Set-02 was gathered.
Note that using only the fusion features could decrease the position and the orientation errors if the learning progresses enough.
Actually, it yielded a more accurate result than AtLoc by 0.24m and 1.09^∘ in terms of the mean errors at 1000 epochs.
We can also see that FusionLoc using LN provided higher errors than the straightforward concatenation method.
However, FusionLoc using BN gave the minimum errors in position and orientation, which were lower than the concatenation method by 0.1m and 0.5^∘ in terms of the mean error at 1000 epochs.
It corresponds to 15% and 18% reductions in the mean position and orientation errors.
Fig. <ref> shows a visualization of the position and orientation errors represented as color using Set-02.
We also figure out from the figure that FusionLoc is more effective than the other methods in the relocalization task.
In summary, our experimental results demonstrate that MHSA can be an effective solution to fuse the features captured by different sensors, and BN is more appropriate than LN in MHSA for robot relocalization based on the camera-2D LiDAR fusion.
§ CONCLUSIONS
In this paper, we proposed FusionLoc, an end-to-end relocalization method for serving robots based on the fusion of RGB images and 2D LiDAR point clouds.
The proposed network performs the pose regression through AtLoc and PointLoc feature extractors, the MHSA module, and the regression module.
To evaluate the proposed network, we constructed a dataset by collecting images, 2D point clouds, and robot poses using a commercial serving robot.
Conducting relocalization experiments using the dataset, FusionLoc showed better performances than the previous relocalization approaches taking only an image or a 2D point cloud as their input.
We observed from the experiments that images and point clouds play a role in complementing the lack of information in each modality.
In particular, MHSA was an effective way to make the interaction between different information contained in the image and point cloud.
Our fusion method using MHSA can help the serving robot find its current pose with less error when it lost its location based on conventional methods such as adaptive Monte Carlo localization.
In the future, we will consider adopting Transformer to reduce the relocalization errors more.
We would also like to collect more datasets with different places and realistic scenarios for serving robots.
§ ACKNOWLEDGMENTS
This work was mainly supported by Electronic and Telecommunications Research Institute (ETRI) grant funded by the Korean government [23ZD1130, Development of ICT Convergence Technology for Daegu-Gyeongbuk Regional Industry]. The first author (J. Lee) was supported by the Industrial Strategic Technology Development Program (20009396) funded By the Ministry of Trade, Industry & Energy (MOTIE, Korea).
IEEEtranS
[
< g r a p h i c s >
]Jieun Lee received the B.E., M.E., and Ph.D degrees in department of electrical and computer engineering from Ajou University, Korea, in 2009, 2011, and 2019, respectively.
From September to December in 2019, she was a Researcher in Advanced Institute of Convergence Technology, Korea. Since October 2021, She has been a Post Doctoral Researcher in Electronics and Telecommunications Research Institute (ETRI), Korea. Her research interests include computer vision, machine learning, robot perception, and their applications.
[
< g r a p h i c s >
]Hakjun Lee received the B.S. degree in electrical engineering from Chungbuk National University, Cheongju, SouthKorea and the M.S. and Ph.D. degrees in electrical engineering from the Pohang University of Science and Technology (POSTECH), Pohang, South Korea, in 2014, 2016, and 2020, respectively.
He was a Post Doctoral Researcher in POSTECH from Sep. 2020 to Apr. 2021. He is currently a Senior Researcher with Polaris3D Company, Ltd., Pohang, South Korea. His research interests include service robot, robust control, and navigation system.
[
< g r a p h i c s >
]Jiyong Oh (M'08) received the B.S. degree from the School of Electronic Engineering, Ajou University, Korea in 2004 and the M.S. and Ph.D. degrees from the School of Electrical Engineering and Computer Science, Seoul National University, Korea in 2006 and 2012, respectively.
He was a Post Doctoral Researcher in Sungkyunkwan and Ajou University, Korea in 2012 and 2013, respectively.
From Sept. 2013 (March 2015) to March 2015 (May 2016), he was a Research Fellow (BK Assistant Professor) in the Graduate School of Convergence Science and Technology, Seoul National University, Korea.
Since June 2016, he has been a Senior Researcher in Electronics and Telecommunications Research Institute (ETRI), Korea.
His research interests include computer vision, machine learning, robot perception, and their applications.
|
http://arxiv.org/abs/2303.07314v1
|
20230313173535
|
Linear regularized 13-moment equations with Onsager boundary conditions for general gas molecules
|
[
"Zhenning Cai",
"Manuel Torrilhon",
"Siyao Yang"
] |
physics.flu-dyn
|
[
"physics.flu-dyn",
"76P05, 82B40, 82D05"
] |
Nearest-Neighbor Inter-Intra Contrastive Learning from Unlabeled Videos
David Fan Deyu Yang Xinyu Li Vimal Bhat Rohith MV Amazon Prime Video
{fandavi, deyu, xxnl, vimalb, kurohith}@amazon.com
March 30, 2023
===================================================================================================================================
We develop the steady-state regularized 13-moment equations in the linear regime for rarefied gas dynamics with general collision models. For small Knudsen numbers, the model is accurate up to the super-Burnett order, and the resulting system of moment equations is shown to have a symmetric structure. We also propose Onsager boundary conditions for the moment equations that guarantees the stability of the equations. The validity of our model is verified by benchmark examples for the one-dimensional channel flows.
§ INTRODUCTION
The modeling and computation of rarefied gas dynamics has been a classical research topic in the history of fluid mechanics. On one hand, significant progress has been made in the development of efficient solvers for the Boltzmann equation <cit.>; On the other hand, many researchers still try to avoid the high computational cost and find extensions of classical fluid models such as Euler equations and Navier-Stokes equations and hope that the new models are capable of describing the motion of moderately rarefied gases. The moment method introduced by Grad <cit.> is one of the important approaches in this direction. While Grad's original method suffers from a number of deficiencies such as loss of hyperbolicity and convergence <cit.>, many new ideas have been proposed in the recent years to improve its robustness and make moment methods more widely applicable <cit.>. In this work, we will study the regularized version of Grad's 13-moment equations, which are originally proposed in <cit.> for Maxwell molecules and extended to general gases in <cit.>. In the literature, this model is called R13 equations for short. The R13 equations for Maxwell molecules have been verified for a variety of problems <cit.>. Recently, attentions have been drawn to the study of Onsager boundary conditions, which guarantees the stability of simulations of boundary value problems <cit.>. Here we will consider the formulation of Onsager boundary conditions for general R13 equations with arbitrary elastic collision models. The linearized Boltzmann equation will be taken as the base model, so that rigorous theory of stabilization can be established for the moment equations.
In the linearized setting, one typical form of the moment equations is as follows:
𝐀_0 ∂/∂ t + ∑_j=1^3 𝐀_j ∂/∂ x_j = 𝐋,
where 𝐀_0 is symmetric positive semidefinite, and 𝐋 is symmetric negative semidefinite. The matrices 𝐀_j, j=1,2,3 are symmetric. Here we allow 𝐀_0 to have zero eigenvalues so that the form (<ref>) can also cover parabolic equations such as the R13 equations. For problems with unbounded domains or periodic boundary conditions, one can show that
d/dt ∫^T 𝐀_0 d= ∫^T 𝐋 d⩽0,
indicating the L^2 stability. For problems on bounded domains, additional conditions on the boundary conditions are suggested in <cit.> to preserve the L^2 stability. Assume that n = (n_1, n_2, n_3)^T is the outer unit normal vector on the boundary point. The conditions are based on the following structures of the matrices 𝐀_j:
𝐏 (n_1 𝐀_1 + n_2 𝐀_2 + n_3 𝐀_3) 𝐏^T = [ 0 𝐀_oe; 𝐀_eo 0 ],
where 𝐏 is an orthogonal matrix converting the moments to another set of moments, each of which is either odd or even in the normal direction, and we choose the permutation such that
𝐏 = [ _odd; _even ].
The moments in _odd include quantities that changes sign when the frame of reference changes by flipping the normal vector n, and the moments in _even remain unchanged under this transformation. By the symmetry of 𝐀_j, we have 𝐀_oe = 𝐀_eo^T. The structure (<ref>) comes from the fact that the normal flux of an odd moment is an even moment, and the normal flux of an even moment is an odd moment. With this structure, if 𝐀_oe has full row rank, the L^2 stable boundary conditions have the form
_odd = 𝐐𝐀_oe (_even - g_ext),
where 𝐐 is a positive semidefinite matrix, g_ext refers to the external source coming from the boundary of the domain.
Such boundary conditions are known as Onsager boundary conditions.
The particular form of boundary conditions that has odd moments on the left-hand side originates from Grad's work <cit.>, which ensures the continuity of boundary conditions with respect to the accommodation coefficient. However, for a specific moment system, choosing _odd to be all the odd moments may result in a rank-deficient 𝐀_oe, so that (<ref>) will provide too many boundary conditions. In this work, we will encounter such a situation during our derivation, requiring us to adjust the selections of _odd and _even to restore the surjective property of 𝐀_oe.
The structure of Onsager boundary conditions is useful not only for time-dependent problems.
For steady-state problems (time derivative removed in (<ref>)), Onsager boundary conditions can provide a symmetric weak form, which helps develop the theory of well-posedness and the finite element methods <cit.>.
For the regularized 13-moment equations for Maxwell molecules, the boundary conditions with this particular structure have been devised in <cit.>. However, the technique to derive the Onsager boundary conditions cannot be directly generalized to the R13 equations for more general molecules. In this work, we will reconsider the derivation of the linearized steady-state R13 equations for general collision models, from which we will show clearly how the structure (<ref>) is built into the derivation of moment equations, and thus the boundary conditions in the form (<ref>) can be naturally obtained.
In the following section, we will review the moment method for the linear Boltzmann equation and the asymptotic expansions of the moments when the Knudsen number is small. Our main results are presented in Section <ref>, where the explicit forms of the linear R13 equations and the Onsager boundary conditions are provided. The derivation of the R13 equations and boundary conditions are respectively given in Section <ref> and <ref>. In Section <ref>, we verify the accuracy of our model by one-dimensional channel problems. A brief conclusion is given in Section <ref>.
§ REVIEW OF THE MOMENT EQUATIONS AND ASYMPTOTIC PROPERTIES OF MOMENTS
We consider the steady-state linear Boltzmann equation
ξ_j ∂ f/∂ x_j = 1/ℒ [f]
where f(,) is the distribution function, = (x_1,x_2,x_3) denotes the position and = (ξ_1,ξ_2,ξ_3) stands for the velocity of the gas molecules. We apply Einstein's summation convention throughout this work, meaning that when an index appears twice in the same term, the expression represents the sum of this term with this index running from 1 to 3. For example, in (<ref>),
ξ_j ∂ f/∂ x_j =ξ_1 ∂ f/∂ x_1 + ξ_2 ∂ f/∂ x_2 + ξ_3 ∂ f/∂ x_3.
For indices whose ranges are not from 1 to 3, the summation symbol will be written explicitly. On the right-hand side of (<ref>), the constant is the Knudsen number characterizing how rarefied the gas is, and ℒ [f] is the linearized Boltzmann collision operator. Below we will introduce the general moment equations for the linearized Boltzmann equation and the asymptotic expansion of the moments in the case of a small Knudsen number.
§.§ Series expansion and moment equations
Following <cit.>, we expand the distribution function into an infinite series:
f(,)= ∑_l=0^+∞∑_m=0^+∞(2l+1)!!/l!w_i_1⋯ i_l^m() ψ^m_i_1 ⋯ i_l().
Here, the basis functions ψ_i_1⋯ i_l^m are defined by
ψ^m_i_1,⋯,i_l()=1/(2π)^3/2L̅_m^(l+1/2)( ||^2/2)ξ_⟨ i_1⋯ξ_i_l ⟩exp( -||^2/2),
where ξ_⟨ i_1⋯ξ_i_l ⟩ is the trace-free part of the tensor ξ_ i_1⋯ξ_i_l (see <cit.>), and L̅_n^(l+1/2) is the normalized Laguerre polynomial
L̅_n^(l+1/2)(x) = √(√(π)/2^l+1 n! Γ(n+l+3/2)) x^-(l+1/2)( d/dx - 1 )^n x^n+l+1/2.
In literature, people usually define the Maxwellian
f_M() = 1/(2π)^3/2 exp( -||^2/2 ),
so that ψ^m_i_1,⋯,i_l()=L̅_m^(l+1/2)(||^2/2) ξ_⟨ i_1⋯ξ_i_l ⟩ f_M(). Compared with the classical series expansion by Grad <cit.>, the Maxwellian f_M is a global equilibrium state due to our linearized setting. This expansion requires us to assume that the distribution function is defined in the following Hilbert space:
L^2(ℝ^3, [f_M()]^-1 d) := { f |∫_ℝ^3 [f()]^2/f_M() d< +∞},
so that all the moments of the distribution function can be properly defined. The inner product of this Hilbert space is
⟨g_1,g_2⟩:= ∫_ℝ^3 g_1()g_2()/f_M() ,
so that we can express the coefficients w_i_1⋯ i_l^m as the moments of the distribution function:
w_i_1⋯ i_l^n() = ⟨ f, ψ^m_i_1⋯ i_l⟩.
In particular, we would like to highlight the relationship between these coefficients and the quantities in Grad's 13-moment equations:
ρ = w^0, v_i = √(3) w_i^0, θ = -√(2/3) w^1, σ_ij = √(15) w_ij^0, q_i = -√(15/2) w_i^1,
where ρ, v_i, θ, σ_ij and q_i denote the density, velocity, temperature, stress tensor and heat flux, respectively.
Due to the rotational invariance of the collision, the linear operator ℒ satisfies
ℒ[ ψ^n_i_1,⋯,i_l] = ∑_m=0^+∞ a_lmnψ^m_i_1,⋯,i_l,
where the coefficient a_lmn satisfies a_lmn = a_lnm for all nonnegative integers l,m and n, and
a_lmn = ⟨ψ_i_1⋯ i_l^m, ℒψ_i_1⋯ i_l^n ⟩/⟨ψ_i_1⋯ i_l^m, ψ_i_1⋯ i_l^m ⟩.
Note that we have chosen the basis functions such that ⟨ψ_i_1⋯ i_l^n, ψ_i_1⋯ i_l^n ⟩ depends only on i_1, ⋯, i_l, leading to the symmetry of a_lmn.
Due to the conservation of mass, momentum and energy, it holds that
a_00n = a_0n0 = a_01n = a_0n1 = a_10n = a_1n0 = 0.
For inverse-power-law models, these coefficients have been calculated in <cit.>, where it has also been pointed out that the collision operator ℒ is usually an unbounded operator acting on a subset of L^2(ℝ^3, [f_M()]^-1 d).
The equations of the moments w_i_1⋯ i_l^n can be obtained by taking the inner product of ψ_i_1⋯ i_l^n and both sides of the Boltzmann equation (<ref>). The resulting moment equations are
T_i_1 ⋯ i_l^n =
1/∑_n'=0^+∞ a_lnn' w_i_1⋯ i_l^n'
where
T_i_1⋯ i_l^n:= ( √(2(n+l)+3)∂ w_i_1⋯ i_l j^n/∂ x_j - √(2n)∂ w_i_1⋯ i_l j^n-1/∂ x_j)
+ l/2l+1( √(2(n+l)+1)∂ w_⟨ i_1⋯ i_l-1^n/∂ x_i_l ⟩ - √(2(n+1))∂ w_⟨ i_1⋯ i_l-1^n+1/∂ x_i_l⟩).
The derivation of these equations will be briefly introduced in Section <ref> of the supplementary material.
§.§ Asymptotic expansion of moments
Assuming that is a small parameter, we consider the asymptotic expansions of w_i_1⋯ i_l^n:
w_i_1⋯ i_l^n = w_i_1⋯ i_l^n|0 + w_i_1⋯ i_l^n|1 + ^2 w_i_1⋯ i_l^n|2 + ^3 w_i_1⋯ i_l^n|3 + ⋯.
The classical Chapman-Enskog expansion can be applied to express each term using the density, momentum, energy and their derivatives. Here, instead of performing the Chapman-Enskog expansion, we would like to find the orders of magnitude of each moment and the relationship between the terms in each order.
To this aim, we introduce the coefficients b_lnn'^(n_0) to denote the inverses of a_lmn, which satisfy
∑_n'=n_0^+∞ a_lnn' b_ln_1 n'^(n_0) = δ_nn_1.
Note that the coefficients b_0nn'^(0), b_0nn'^(1) and b_1nn'^(0) do not exist due to (<ref>).
By asymptotic analysis, we are able to identify the magnitude of each moment w_i_1⋯ i_l^n and find the linear dependency between w_i_1⋯ i_l^n|k for different n's. This method is known as the order of magnitude approach <cit.>.
Below we list the moments by order up to O(^3) and some results of the linear relationship to be used later in this work. The derivation can be found in Section <ref> in the supplementary material.
(O0) O(1) moments: w^0, w^1, w^0_i.
(O1) O() moments: {w^n_i}_n=1^∞, {w^n_ij}_n=0^∞. The leading order terms of these moments satisfy
w_i^n|1 = b_11n^(1)/b_111^(1) w_i^1|1 for n ⩾ 1,
w_ij^n|1 = b_20n^(0)/b_200^(0) w_ij^0|1 for n ⩾ 0,
and the second order terms satisfy
w_i^n|2 = γ^(1),n_1/γ^(1),2_1 w_i^2|2 for n ⩾ 2 with γ^(1),n_1 = ∑_n'=2^∞b_1nn'^(2) (√(2n'+5) b_20n'^(0) - √(2n') b_20,n'-1^(0))/b_200^(0),
w_ij^n|2 = γ^(1),n_2/γ^(1),1_2 w_ij^1|2 for n ⩾ 1 with γ^(1),n_2 = 2/5∑_n'=1^∞b_2nn'^(1) (√(2n'+5) b_11n'^(1) - √(2(n'+1)) b_11,n'+1^(1))/b_111^(1).
(O2) O(^2) moments: {w^n}_n=2^∞, {w^n_ijk}_n=0^∞. Their leading order terms satisfy
w^n|2 = γ^(2),n_0/γ^(2),2_0w^2|2 with γ^(2),n_0 = ∑_n'=2^+∞b_0nn'^(2) (√(2n'+3) b_11n'^(1) - √(2n') b_11,n'-1^(1))/b_111^(1),
w_ijk^n|2 = γ^(2),n_3/γ^(2),0_3 w_ijk^0|2 with γ^(2),n_3 = 3/7∑_n'=0^+∞b_3nn'^(0)/b_200^(0)(√(2n'+7) b_20n'^(0) - √(2(n'+1)) b_20,n'+1^(0)) .
(O3) O(^3) moments: {w^n_ijkl}_n=0^∞.
(O4) o(^3) moments: all other w_i_1⋯ i_l^n which are not listed above.
These results show that only the conserved moments are zeroth-order moments, which agrees with the results from the Chapman-Enskog expansion. Although there are infinite first-order moments, the leading-order terms depend only on the stress tensor (w_ij^0) and the heat flux (w_i^1). The purpose of R13 equations is to formulate equations using only these representative moments up to the first order, and “regularization terms” are added to increase its order of accuracy to cover super-Burnett equations. This requires us to express all second-order terms w_i_1⋯ i_l^n|2 using the thirteen moments appearing in the equations, and such a procedure has been done in the literature <cit.>. However, the approach therein does not clearly show how the stable boundary conditions should be derived. Although attempts have been made to study boundary value problems in <cit.>, the boundary conditions do not have the structure (<ref>) as required in <cit.>. In this paper, we will re-derive the regularized 13-moment equations from another point of view, and equip the model with reasonable boundary conditions with the desired structure. Before that, we will first present our final models in the next section for the readers who are not interested in the derivation.
§ LINEAR R13 EQUATIONS AND ONSAGER BOUNDARY CONDITIONS
In this section, we present the steady-state linear regularized 13-moment equations for general gas molecules, and provide the Onsager boundary conditions satisfying the conditions in <cit.>. The equations and boundary conditions will be presented using the physical variables ρ, v_i, θ, σ_ij, q_i, which are equivalent to the coefficients w^0, w^1, w^0_i, w^1_i, w^0_ij according to (<ref>).
§.§ Linearized R13 moment equations
In Section <ref>, We have derived the following equation system of the 13 moments including ρ, v_i, θ, σ_ij, q_i:
* Equations of mass conservation, energy conservation and momentum conservation:
∂ v_j/∂ x_j = 0,
∂ v_j/∂ x_j + ∂ q_j/∂ x_j = 0,
∂ρ/∂ x_i +∂θ/∂ x_i +∂σ_ij/∂ x_j = 0 .
* Equations of heat flux and stress tensor:
∂θ/∂ x_i+ β_4 ∂σ_ij/∂ x_j + 2/15c^(1),1_1∂/∂ x_j(β_0 ∂ q_j/∂ x_i + β_2 ∂ q_⟨ i/∂ x_ j⟩) =2/15(c^(1),1_1)^21/ℒ^(11)_1 q_i,
∂ v_⟨ i/∂ x_j ⟩ + β_4 ∂ q_⟨ i/∂ x_j ⟩ +1/15c^(1),0_2∂/∂ x_k( β_1 ∂σ_k⟨ i/∂ x_j⟩ + β_3 ∂σ_⟨ ij/∂ x_k ⟩) = 1/15(c^(1),0_2)^21/ℒ^(11)_2 σ_ij
where
β_0 = (A_46)^2/c^(1),1_1 ℒ^(22)_0, β_1 = (c^(1),1_1 A_57 - c^(2),1_1A_45)^2/c^(1),1_1 c^(1),0_2(c^(1),1_1ℒ^(22)_1 - c^(2),1_1ℒ^(12)_1) ,
β_2 = (c^(1),0_2A_48 - c^(2),0_2A_45)^2/c^(1),1_1 c^(1),0_2(c^(1),0_2ℒ^(22)_2 - c^(2),0_2 ℒ^(12)_2) , β_3 = (A_59)^2/c^(1),0_2 ℒ^(22)_3, β_4 = - √(2) A_45/15c^(1),1_1c^(1),0_2.
The expression of the coefficients c^(p),n_l and A_ij are given in Section <ref> of the supplementary material and ℒ^(mn)_l is formulated as (<ref>). We remark that for Maxwell molecules, β_1 above takes the form 0/0 and is thus not well-defined. In this case, β_1 is set to be 0. One can easily observe the symmetric structure of the system above, where the complicated second-order derivatives in the last two equations are on the diagonal. We have shown that such moment system has the super-Burnett order.
§.§ Onsager boundary conditions
The R13 equations are equipped with an Onsager-type boundary conditions which read
v_n = 0,
q_n = 2χ/2-χ[λ_11(θ - θ^W) + λ_12σ_nn + λ_13∂ q_j/∂ x_j + λ_14∂ q_⟨ n/∂ x_n ⟩],
σ_t_i n = 2χ/2-χ[ λ_21 (v_t_i - v_t_i^W) + λ_22q_t_i + λ_23∂σ_t_i j/∂ x_j + λ_24∂σ_⟨ nn/∂ x_t_i ⟩], i =1,2,
∂ q_⟨ t_i/∂ x_n ⟩ = 2χ/2-χ[ λ_31 (v_t_i - v_t_i^W) + λ_32q_t_i + λ_33∂σ_t_i j/∂ x_j + λ_34∂σ_⟨ nn/∂ x_t_i ⟩], i =1,2,
( ∂σ_⟨ nn/∂ x_n ⟩ + λ_45∂σ_ n t_j/∂ x_t_j)
= 2χ/2-χ[ λ_41(θ - θ^W) + λ_42σ_nn + λ_43∂ q_j/∂ x_j + λ_44∂ q_⟨ n/∂ x_n ⟩],
(∂σ_⟨ t_it_i/∂ x_n ⟩ + 1/2∂σ_⟨ nn/∂ x_n ⟩) = 2χ/2-χ(λ_51σ_t_it_i + λ_52σ_nn), i =1,2,
∂σ_⟨ t_1t_2/∂ x_n ⟩ = 2χ/2-χλ_61σ_t_1t_2.
The expressions of coefficient λ_ij can be found in Section <ref> of the supplementary material.
§ DERIVATION OF R13 EQUATIONS
We will now present the derivation of the R13 equations given in Section <ref>. Our derivation will use a method different from previous papers <cit.>, so that it is clear why the structure (<ref>) exist in the final system.
Since the derivation of moment equations often involves complicated notations and calculations, in order to better explain the main idea of our derivation, we will first write the equations using operators on function spaces instead of the moments (Section <ref>), and then explain how to convert the abstract form to the explicit moment equations (Section <ref>).
§.§ Reformulation of the distribution function
In Section <ref>, we have seen that when using ψ_i_1 ⋯ i_l^m f_M as basis functions, there are infinite O(^d) coefficients for any d ≥ 1, which is inconvenient for the derivation of moment equations. In this section, we will look for new basis functions such that in the expansions, only finite coefficients have the order O(^k) for any k. In other words, we seek the following orthogonal decomposition of the function space:
L^2(ℝ^3, [f_M()]^-1 d) = 𝕍^(0) ⊕𝕍^(1) ⊕𝕍^(2) ⊕⋯
such that each 𝕍^(k) is a finite dimensional space, and it holds that
𝒫^(k) f ∼ O(^k), ∀ k ∈ℕ,
where 𝒫^(k) is the projection operator from L^2(ℝ^3, [f_M()]^-1 d) onto 𝕍^(k). Such a decomposition allows us to consider the projection of f onto a finite dimensional space when we want to achieve a reduced model up to a given order of accuracy.
For the purpose of deriving R13 equations, we just need to use the function spaces from 𝕍^(0) to 𝕍^(3). They will be discussed in the following subsections.
§.§.§ The zeroth-order function space
The function space 𝕍^(0) can be easily observed from the Chapman-Enskog expansion. It should be spanned by the basis functions corresponding to the conserved moments, which means
𝕍^(0) = span{ψ^0, ψ^1, ψ_i^0 | i = 1,2,3}.
It is clear that
𝕍^(0) = 5.
§.§.§ The first-order function space
Our idea to find the first-order function space is to first construct the orthogonal complement of 𝕍^(0)⊕𝕍^(1), and then find 𝕍^(1) by orthogonality. This orthogonal complement will include the part of f that has order higher than or equal to O(^2). According to (O2)-(O4) in Section <ref>, we know that all the following functions should be members of (𝕍^(0)⊕𝕍^(1))^⊥:
ψ^n for n ≥ 2, ψ_i_1 ⋯ i_l^n for all l ≥ 3 and n ≥ 0.
In addition, the relation (<ref>) yields
w_i^n - b_11n^(1)/b_111^(1) w_i^1 = ⟨ f, ψ_i^n - b_11n^(1)/b_111^(1)ψ_i^1⟩∼ O(^2) for n ≥ 2,
meaning that
ψ_i^n - b_11n^(1)/b_111^(1)ψ_i^1∈ (𝕍^(0)⊕𝕍^(1))^⊥, ∀ i = 1,2,3, n ≥ 2.
Similarly, we can use (<ref>) to obtain
ψ_ij^n - b_20n^(0)/b_200^(0)ψ_ij^0∈ (𝕍^(0)⊕𝕍^(1))^⊥, ∀ i = 1,2,3, n ≥ 1.
We can now conclude that (𝕍^(0)⊕𝕍^(1))^⊥ is the subspace of L^2(ℝ^3, [f_M()]^-1 d) spanned by all the functions in (<ref>)(<ref>)(<ref>). Consequently, we can find 𝕍^(1) in the form of
𝕍^(1) = span{ϕ_i^(1), ϕ_ij^(1) | i,j = 1,2,3 },
where
ϕ_i^(1) = ∑_n=1^+∞ c_1^(1),n ψ_i^n, ϕ_ij^(1) = ∑_n=0^+∞ c_2^(1),n ψ_ij^n.
The coefficients c_1^(1),n and c_2^(1),n are determined by solving
⟨ψ_i^n - b_11n^(1)/b_111^(1)ψ_i^1,ϕ_i^(1)⟩ =0 and ⟨ψ_ij^n - b_20n^(0)/b_200^(0)ψ_ij^0 ,ϕ_ij^(1)⟩ =0
respectively, and are then scaled such that
∑_n=1^+∞|c_1^(1),n|^2 = ∑_n=0^+∞|c_2^(1),n|^2 = 1.
Since ψ_ij^n is a trace-free tensor, we have
𝕍^(1) = 8.
§.§.§ The second-order function space
The second-order function spaces can be found in a similar way. Using (O2)–(O4), we notice that the following functions are members of (𝕍^(0)⊕𝕍^(1)⊕𝕍^(2))^⊥:
ψ^n - γ_n/γ_2ψ^2 for n ≥ 3, ( ψ_i^n - b^(1)_11n/b^(1)_111ψ^1_i ) - γ^(1),n_1/γ^(1),2_1( ψ_i^2 - b^(1)_112/b^(1)_111ψ^1_i ) for n ≥ 3,
( ψ_ij^n - b^(0)_20n/b^(0)_200ψ^0_ij) - γ^(1),n_2/γ^(1),1_2( ψ_ij^1 - b^(0)_201/b^(0)_200ψ^0_ij) for n ≥ 2, ψ_ijk^n - γ^(2),n_3/γ^(2),0_3ψ_ijk^0 for n ≥ 1,
ψ_i_1⋯ i_l^n for all l ≥ 4 and n ≥ 0.
Let (𝕍^(0)⊕𝕍^(1)⊕𝕍^(2))^⊥ be the linear span of all these functions. We can find 𝕍^(2) in the following form:
𝕍^(2) = span{ϕ^(2), ϕ_i^(2), ϕ_ij^(2), ϕ_ijk^(2) | i,j,k = 1,2,3
},
where
ϕ^(2) = ∑_n=2^+∞ c_0^(2),nψ^n, ϕ_i^(2) = ∑_n=2^+∞ c_1^(2),n(ψ_i^n - b^(1)_11n/b^(1)_111ψ^1_i),
ϕ_ij^(2) = ∑_n=1^+∞ c_2^(2),n(ψ_ij^n - b^(0)_20n/b^(0)_200ψ^0_ij), ϕ_ijk^(2) = ∑_n=0^+∞ c_3^(2),nψ_ijk^n.
For simplicity, we let
c_1^(2),1 = -∑_n=2^+∞ c_1^(2),n b_11n^(1)/b_111^(1), c_2^(2),0 = -∑_n=1^+∞ c_2^(2),n b_20n^(0)/b_200^(0),
so that
ϕ_i^(2) = ∑_n=1^+∞ c_1^(2),nψ_i^n, ϕ_ij^(2) = ∑_n=0^+∞ c_2^(2),nψ_ij^n.
These coefficients are again determined by the orthogonality similar to (<ref>) and then scaled similarly as (<ref>). The expressions of c^(1),n_l and c^(2),n_l can be found in Section <ref> of the supplementary material. Also, it is not difficult to find that
𝕍^(2) = 16.
§.§.§ The third-order function space
The space 𝕍^(3) can again be derived using the same strategy. The result will have the form
𝕍^(3) = span {
ϕ^(3), ϕ_i^(3), ϕ_ij^(3), ϕ_ijk^(3), ϕ_ijkl^(3) | i,j,k,l = 1,2,3
},
and
𝕍^(3) = 25.
For our purpose, the precise forms of these functions will not be used.
For Maxwell molecules, due to the special structure b_lnn'^n_0 = 0 for all n ≠ n', the function space 𝕍^(2) will be slightly different. Instead of (<ref>), we will have
𝕍^(2) = span {
ϕ^(2), ϕ_ij^(2), ϕ_ijk^(2) | i,j,k = 1,2,3
},
and thus 𝕍^(2) = 13. In fact, we also have ϕ^(2) = ψ^2, ϕ_ij^(2) = ψ_ij^1 and ϕ_ijk^(2) = ψ_ijk, which can significantly simplify the derivation. In this paper, we will mainly focus on the R13 equations for general molecules. One can find the equations for Maxwell molecules in many references such as <cit.>.
§.§ The abstract form of regularized 13-moment equations
In order to derive R13 moment equations that are accurate up to the super-Burnett order, it suffices to work only in the function space
𝕍 := 𝕍^(0) ⊕𝕍^(1) ⊕𝕍^(2) ⊕𝕍^(3).
In other words, we consider the following approximation of the Boltzmann equation (<ref>):
∂/∂x_j (𝒫_𝕍 ξ_j 𝒫_𝕍 f) = 1/ 𝒫_𝕍 ℒ𝒫_𝕍 f.
Here 𝒫_𝕍 denotes the projection operator from L^2(ℝ^3, [f_M()]^-1 d) onto 𝕍. One can easily verify that both 𝒫_𝕍ξ_j 𝒫_𝕍 and 𝒫_𝕍ℒ𝒫_𝕍 are self-adjoint operators.
To separate different orders in the distribution function f, we further write 𝒫_𝕍 f as
𝒫_𝕍 f = f^(0) + f^(1) + f^(2) + f^(3),
where f^(k) = 𝒫^(k) f (see (<ref>)). Thus, the projected Boltzmann equation can be written in the following form:
∑_j=1^3 ∂/∂ x_j(
[ 𝒜_j^(00) 𝒜_j^(01) 𝒜_j^(02) 𝒜_j^(03); 𝒜_j^(10) 𝒜_j^(11) 𝒜_j^(12) 𝒜_j^(13); 𝒜_j^(20) 𝒜_j^(21) 𝒜_j^(22) 𝒜_j^(23); 𝒜_j^(30) 𝒜_j^(31) 𝒜_j^(32) 𝒜_j^(33) ][ f^(0); f^(1); f^(2); f^(3) ]) = 1/[ 0 0 0 0; 0 ℒ^(11) ℒ^(12) ℒ^(13); 0 ℒ^(21) ℒ^(22) ℒ^(23); 0 ℒ^(31) ℒ^(32) ℒ^(33) ][ f^(0); f^(1); f^(2); f^(3) ],
where
𝒜_j^(kl) = 𝒫^(k) ξ_j 𝒫^(l), ℒ^(kl) = 𝒫^(k) ℒ 𝒫^(l).
Note that the zero operators on the right-hand side of (<ref>) comes from the conservation laws, and on the left-hand side, we have written the sum over j explicitly for clearness. The self-adjointness of 𝒫_𝕍ξ_j 𝒫_𝕍 and 𝒫_𝕍ℒ𝒫_𝕍 implies that 𝒜_j^(kl) = [𝒜_j^(lk)]^† and ℒ_j^(kl) = [ℒ_j^(lk)]^†. For simplicity, below we will use the definition
𝒜^(kl) = ∑_j=1^3 ∂/∂x_j 𝒜_j^(kl),
so that the equations (<ref>) become
𝒜f = 1/ℒf,
where
𝒜 =
[ 𝒜^(00) 𝒜^(01) 𝒜^(02) 𝒜^(03); 𝒜^(10) 𝒜^(11) 𝒜^(12) 𝒜^(13); 𝒜^(20) 𝒜^(21) 𝒜^(22) 𝒜^(23); 𝒜^(30) 𝒜^(31) 𝒜^(32) 𝒜^(33) ], ℒ =
[ 0 0 0 0; 0 ℒ^(11) ℒ^(12) ℒ^(13); 0 ℒ^(21) ℒ^(22) ℒ^(23); 0 ℒ^(31) ℒ^(32) ℒ^(33) ], f = [ f^(0); f^(1); f^(2); f^(3) ].
In the rest part of this section, we will derive a simplified version of the equations (<ref>) in the following form:
[ 𝒜^(00) 𝒜^(01) 𝒜^(02); 𝒜^(10) 𝒜^(11) 𝒜^(12); 𝒜^(20) 𝒜^(21) 𝒜̅^(22) ][ f^(0); f^(1); f^(2) ]
= 1/[ 0 0 0; 0 ℒ^(11) ℒ^(12); 0 ℒ^(21) ℒ^(22); ][ f^(0); f^(1); f^(2) ].
We require that the super-Burnett equations can also be derived from these equations. The abstract system (<ref>) will be further formulated as R13 equations in Section <ref>. To specify the operator 𝒜̅^(22) and clarify why the final equations hold the form (<ref>), we need three steps given in the three subsections below.
§.§.§ Step 1: Diagonalization of the right-hand side
The first step of our derivation is to reformulate (<ref>) into an equivalent form where the right-hand side contains only a diagonal matrix of operators. Such a form will make it easier for us to spot high-order terms that can be dropped in the final form of R13 equations. To this end, we define
𝒬 =
[ ℐ 0 0 0; 0 ℐ 0 0; 0 0 ℐ 0; 0 0 -ℬ^(32) ℐ ][ ℐ 0 0 0; 0 ℐ 0 0; 0 -ℬ^(21) ℐ 0; 0 -ℬ^(31) 0 ℐ ],
where
ℬ^(21) = ℒ^(21) [ℒ^(11)]^-1, ℬ^(31) = ℒ^(31) [ℒ^(11)]^-1,
ℬ^(32) =[ℒ^(32) - ℬ^(31)ℒ^(12)][ℒ^(22) - ℬ^(21)ℒ^(12)]^-1.
This procedure is similar to Gaussian elimination of ℒ, and the invertibility of the operators in the definitions of ℬ^(kl) can be guaranteed by the fact that the linearized Boltzmann collision operator ℒ is negative semidefinite with its nullspace being 𝕍^(0). Let 𝒬^† be the adjoint transpose of the operator matrix 𝒬. It can be seen that the matrix 𝒬ℒ𝒬^† is diagonal.
We now apply this transformation to the projected Boltzmann equation (<ref>). By introducing f̃ = 𝒬^-†f, we can multiply both sides of (<ref>) by 𝒬 and write the result as
𝒬𝒜𝒬^†f̃ = 1/𝒬ℒ𝒬^†f̃.
We claim that the operator matrices 𝒬𝒜𝒬^† and 𝒬ℒ𝒬^† have the following structures:
𝒬𝒜𝒬^† =[ 𝒜^(00) 𝒜^(01) 0 0; 𝒜^(10) 𝒜^(11) 𝒜̃^(12) 0; 0 𝒜̃^(21) 𝒜̃^(22) 𝒜̃^(23); 0 0 𝒜̃^(32) 𝒜̃^(33) ], 𝒬ℒ𝒬^† =[ 0 0 0 0; 0 ℒ^(11) 0 0; 0 0 ℒ̃^(22) 0; 0 0 0 ℒ̃^(33) ].
The diagonal structure of 𝒬ℒ𝒬^† has been clarified in the construction of the matrix 𝒬. To explain why 𝒬𝒜𝒬^† is tridiagonal, we need the following facts:
* By straightforward calculation, we have
f̃ := [ f̃^(0); f̃^(1); f̃^(2); f̃^(3) ]
= [ f^(0); f^(1) + [ℬ^(21)]^† f^(2) + [ℬ^(31) + ℬ^(32) ℬ^(21)]^† f^(3); f^(2) + [ℬ^(32)]^† f^(3); f^(3) ],
which shows that the last two components of 𝒬ℒ𝒬^†f̃ have magnitudes O(^2) and O(^3), respectively.
* By (<ref>), the last two components of 𝒬𝒜𝒬^†f̃ should have magnitudes O() and O(^2), respectively. Therefore, the three operators below the subdiagonal of 𝒬𝒜𝒬^† can only be zero operators.
* Due to the symmetric structure of 𝒬𝒜𝒬^†, the three operators above its superdiagonal must also be zero operators.
§.§.§ Step 2: Dropping high-order terms
In this step, our purpose is to drop as many terms in (<ref>) as possible while retaining the super-Burnett order of these equations. One possible approach to obtain super-Burnett equations is to perform the following Maxwell iteration based on (<ref>):
f̃_k+1^(1) = [ℒ^(11)]^-1( 𝒜^(10) f^(0) + 𝒜^(11)f̃_k^(1) + 𝒜̃^(12)f̃_k^(2)), f̃^(1)_0 = 0,
f̃_k+1^(2) = [ℒ̃^(22)]^-1( 𝒜̃^(21) f_k^(1) + 𝒜̃^(22)f̃_k^(2) + 𝒜̃^(23)f̃_k^(3)), f̃^(2)_0 = 0,
f̃_k+1^(3) = [ℒ̃^(33)]^-1( 𝒜̃^(32)f̃_k^(2) + 𝒜̃^(33)f̃_k^(3)), f̃^(3)_0 = 0.
Note that the local equilibrium f^(0) does not attend the iteration. The super-Burnett equations can be written as
𝒜^(00) f^(0) + 𝒜^(01) f̃^(1)_3 = 0,
where f̃^(1)_3 is from the result of three Maxwell iterations. Straightforward calculation yields
f̃^(1)_3
=[ℒ^(11)]^-1 𝒜^(10) f^(0) + ^2 [ℒ^(11)]^-1 𝒜^(11) [ℒ^(11)]^-1 𝒜^(10) f^(0)
+ ^3 ([ℒ^(11)]^-1 𝒜^(11))^2 [ℒ^(11)]^-1 𝒜^(10) f^(0)
+ ^3 [ℒ^(11)]^-1 𝒜̃^(12) [ℒ^(22)]^-1 𝒜̃^(21)
[ℒ^(11)]^-1 𝒜^(10) f^(0).
which has nothing to do with the operators 𝒜̃^(22), 𝒜̃^(23), 𝒜̃^(32) and 𝒜̃^(33). Therefore, we can set these four operators in (<ref>) to be zero and claim that the resulting equations
[ 𝒜^(00) 𝒜^(01) 0 0; 𝒜^(10) 𝒜^(11) 𝒜̃^(12) 0; 0 𝒜̃^(21) 0 0; 0 0 0 0 ][ f^(0); f̃^(1); f̃^(2); f^(3) ] = 1/[ 0 0 0 0; 0 ℒ^(11) 0 0; 0 0 ℒ̃^(22) 0; 0 0 0 ℒ̃^(33) ][ f^(0); f̃^(1); f̃^(2); f^(3) ]
still have the super-Burnett order.
§.§.§ Step 3: Applying the inverse transformation
The equations (<ref>) already give us the abstract form of the R13 equations. However, due to the transformation introduced by 𝒬, the left-hand sides of these equations no longer represent the approximation of ξ_j ∂_x_jf, and the right-hand sides no longer represent the approximation of ℒf. Recovering such straightforward correspondence requires applying the inverse transformation 𝒬^-1. By multiplying both sides of (<ref>) by 𝒬^-1 and using f̃ = 𝒬^-†f, we obtain
[ 𝒜^(00) 𝒜^(01) 𝒜^(02) 𝒜^(03); 𝒜^(10) 𝒜^(11) 𝒜^(12) 𝒜^(13); 𝒜^(20) 𝒜^(21) 𝒜̅^(22) 𝒜̅^(23); 𝒜^(30) 𝒜^(31) 𝒜̅^(32) 𝒜̅^(33) ]
[ f^(0); f^(1); f^(2); f^(3) ]
= 1/ [ 0 0 0 0; 0 ℒ^(11) ℒ^(12) ℒ^(13); 0 ℒ^(21) ℒ^(22) ℒ^(23); 0 ℒ^(31) ℒ^(32) ℒ^(33) ]
[ f^(0); f^(1); f^(2); f^(3) ],
where
𝒜̅^(22) = ℬ^(21)𝒜^(12) + 𝒜^(21) [ℬ^(21)]^† - ℬ^(21)𝒜^(11)[ℬ^(21)]^†,
and the operators 𝒜̅^(23), 𝒜̅^(32) and 𝒜̅^(33) are unimportant since (<ref>) already shows f^(3) = 0. We can actually remove f^(3) completely from the system to get the final form (<ref>).
Since f^(3) is no longer present in the final equations, they can be reformulated using a smaller function space
𝕍 := 𝕍^(0)⊕𝕍^(1)⊕𝕍^(2).
Let 𝒫_𝕍 be the projection operator onto 𝕍. The equations can then be written as
∂/∂x_j (𝒜̅_j f̅) = 1/ 𝒫_𝕍 ℒ f̅,
where f̅ is the unknown function in 𝕍, and
𝒜̅_j = 𝒫_𝕍ξ_j - (𝒜_j^(22) - ℬ^(21)𝒜_j^(12) - 𝒜_j^(21) [ℬ^(21)]^† + ℬ^(21)𝒜_j^(11)[ℬ^(21)]^†) 𝒫^(2),
which is an operator on 𝕍 approximating the multiplication of a function by the velocity component ξ_j.
It is straightforward to verify that 𝒜̅_j is a self-adjoint operator on 𝕍.
So far, we have obtained a linear system with desired symmetric structure, allowing us to further derive stable boundary conditions. This will be discussed in Section <ref>. In what follows, we will first provide the explicit forms of these equations.
§.§ Derivation of R13 moment equations
We will now derive the R13 equations presented in Section <ref>.
According to definitions of the function spaces 𝕍^(0), 𝕍^(1) and 𝕍^(2) (see (<ref>)(<ref>)(<ref>)), we can express the projection f̅ := 𝒫_𝕍 f explicitly as
f̅ = w^0 ψ^0 + w^1 ψ^1 + 3w_i^0 ψ_i^0_zeroth order + 3u_i^(1)ϕ_i^(1) + 15/2 u_ij^(1)ϕ_ij^(1)_first order + u^(2)ϕ^(2) + 3u_i^(2)ϕ_i^(2) + 15/2u_ij^(2)ϕ_ij^(2) + 35/2u_ijk^(2)ϕ_ijk^(2)_second order.
For any f̅∈𝕍 with the above expression, we have
w^0 = ⟨f̅ , ψ^(0)⟩, w^1 = ⟨f̅,ψ^(1)⟩, w_i^0 = ⟨f̅ , ψ_i^(0)⟩,
u_i^(1) = ⟨f̅ , ϕ^(1)_i⟩ , u_ij^(1) = ⟨f̅ , ϕ^(1)_ij⟩ ,
u^(2) = ⟨f̅ , ϕ^(2)⟩ , u^(2)_i = ⟨f̅ , ϕ^(2)_i⟩, u^(2)_ij = ⟨f̅ , ϕ^(2)_ij⟩ , u^(2)_ijk = ⟨f̅ , ϕ^(2)_ijk⟩.
Our purpose is to find the expressions of ∂_x_j (𝒜̅_j f̅) and 𝒫_𝕍ℒf̅ under such representation.
We begin with the collision term 𝒫_𝕍ℒf̅. Due to the conservation laws, the zeroth-order part of f̅ vanishes after applying ℒ. Using the rotational invariance of ℒ, we get
𝒫_𝕍ℒf̅ = ℒ_0^(22) u^(2)ϕ^(2) + ∑_m=1^2 ∑_n=1^2 ℒ_1^(mn) u_i^(n)ϕ_i^(m) + ∑_m=1^2 ∑_n=1^2 ℒ_2^(mn) u_ij^(n)ϕ_ij^(m) + ℒ_3^(22) u_ijk^(2)ϕ_ijk^(2),
where
ℒ_l^(mn) = (2l+1)!!/l!⟨ϕ_i_1⋯ i_l^(m), ℒϕ_i_1⋯ i_l^(n)⟩/⟨ϕ_i_1⋯ i_l^(m), ϕ_i_1⋯ i_l^(m)⟩
=(2l+1)!!/l!∑_m',n' c^(m),m'_l c^(n),n'_l a_ln'm'
This value is independent of the choice of i_1, ⋯, i_l due to the rotational invariance, and is symmetric with respect to the superscript (mn). The expansion (<ref>) can be formally expressed by
ϕ^T
[ [ 0 0 0 0 0 0 0 0 0; 0 0 0 0 0 0 0 0 0; 0 0 0 0 0 0 0 0 0; 0pt15pt
0 0 0 ℒ_1^(11) 0 0 ℒ_1^(12) 0 0; 0 0 0 0 ℒ_2^(11) 0 0 ℒ_2^(12) 0; 0pt15pt
0 0 0 0 0 ℒ_0^(22) 0 0 0; 0 0 0 ℒ_1^(21) 0 0 ℒ_1^(22) 0 0; 0 0 0 0 ℒ_2^(21) 0 0 ℒ_2^(22) 0; 0 0 0 0 0 0 0 0 ℒ_3^(22) ]]
u
where
ϕ^T =
( ψ^0 ψ^1 ψ^0_i ϕ^(1)_i ϕ^(1)_ij ϕ^(2) ϕ^(2)_i ϕ^(2)_ij ϕ^(2)_ijk ),
u^T =
( w^0 w^1 w^0_i u^(1)_i u^(1)_ij u^(2) u^(2)_i u^(2)_ij u^(2)_ijk ),
The left-hand side ∂_x_j (𝒜̅_j f̅) should be calculated according to (<ref>). We can first find ∂_x_j(𝒫_𝕍ξ_j f̅) by straightforward calculation using (<ref>). We will again denote the result formally using the form (<ref>)
ϕ^T.8![ [ 0 0 √(3)∂/∂ x_i 0 0 0 0 0 0; 0 0 -√(2)∂/∂ x_i √(5)c_1^(1),1∂/∂ x_i 0 0 √(5)c^(2),1_1∂/∂ x_i 0 0; √(3)∂/∂ x_i -√(2)∂/∂ x_i 0 0 3√(5)c_2^(1),0∂/∂ x_j 0 0 3√(5)c^(2),0_2 ∂/∂ x_j 0; 0pt15pt
0 √(5) c_1^(1),1∂/∂ x_i 0 0 A_45∂/∂ x_j A_46∂/∂ x_i 0 A_48∂/∂ x_j 0; 0 0 3√(5) c_2^(1),0∂_⟨/∂ x_j⟩ A_45∂_⟨/∂ x_j⟩ 0 0 A_57∂_⟨/∂ x_j⟩ 0 A_59∂/∂ x_k; 0pt15pt
0 0 0 A_46∂/∂ x_i 0 0 A_67∂/∂ x_i 0 0; 0 √(5)c^(2),1_1∂/∂ x_i 0 0 A_57∂/∂ x_j A_67∂/∂ x_i 0 A_78∂/∂ x_j 0; 0 0 3√(5)c^(2),0_2 ∂_⟨/∂ x_j⟩ A_48∂_⟨/∂ x_j⟩ 0 0 A_78∂_⟨/∂ x_j⟩ 0 A_89∂/∂ x_k; 0 0 0 0 A_59∂_⟨/∂ x_k⟩ 0 0 A_89∂_⟨/∂ x_k⟩ 0; ]]u
for conciseness, where the expressions of A_ij can be found in Section <ref>. The derivative operator ∂_⟨/∂ x_j ⟩ in the above matrix is defined such that ∂_⟨/∂ x_j ⟩ u^(d)_i_1⋯ i_l = ∂ u^(d)_⟨ i_1⋯ i_l/∂ x_j⟩ where Einstein's summation should be applied when any of i_1,⋯,i_l is j.
To get the final form of the R13 equations, we replace the lower-right block of the matrix on the left-hand side by an operator corresponding to 𝒜̅^(22) defined in (<ref>). According to (<ref>), the operator ℬ^(21) = ℒ^(21) [ℒ^(11)]^-1 can be represented by the matrix
ℬ^(21) := [ 0 0; ℒ_1^(21) 0; 0 ℒ_2^(21); 0 0 ]
[ ℒ_1^(11) 0; 0 ℒ_2^(11) ]^-1 =
[ 0 0; ℒ_1^(21) / ℒ_1^(11) 0; 0 ℒ_2^(21) / ℒ_2^(11); 0 0 ].
Note that we actually have
ℒ_1^(21) / ℒ_1^(11) = c_1^(2),1 / c_1^(1),1, and ℒ_2^(21) / ℒ_2^(11) = c_2^(2),0 / c_2^(1),0
since 𝒜^(20) - ℬ^(21)𝒜^(10) = 0 (see (<ref>)).
Thus, following (<ref>), the operator 𝒜̅^(22) can be represented by
ℬ^(21)
[[ A_46∂/∂x_i 0 A_48∂/∂x_j 0; 0 A_57∂_⟨/∂x_j⟩ 0 A_59∂/∂x_k ] ] +
[ [ A_46∂/∂x_i 0; 0 A_57∂/∂x_j; A_48∂_⟨/∂x_j⟩ 0; 0 A_59∂_⟨/∂x_k⟩ ] ] [ℬ^(21)]^T
- ℬ^(21)
[[ 0 A_45 ∂/∂x_j; A_45 ∂_⟨/∂x_j⟩ 0 ] ]
[ℬ^(21)]^T
= [ 0 c^(2),1_1/c^(1),1_1 A_46 ∂/∂x_i 0 0; c^(2),1_1/c^(1),1_1 A_46 ∂/∂x_i 0 A̅_78∂/∂x_j 0; 0 A̅_78∂_⟨ /∂x_j ⟩ 0 c^(2),0_2/c^(1),0_2 A_59 ∂/∂x_k; 0 0 c^(2),0_2/c^(1),0_2 A_59 ∂_⟨ /∂x_k ⟩ 0 ]
where
A̅_78 = c^(2),1_1/c^(1),1_1 A_48+ c^(2),0_2/c^(1),0_2 A_57- c^(2),1_1 c^(2),0_2/c^(1),1_1 c^(1),0_2 A_45.
The final form of ∂_x_j(𝒜̅_j f̅) can be obtained by using the matrix above to replace the lower-right block of the matrix in (<ref>). The result will then be equated to (<ref>) to get the explicit expressions of the R13 equations, which are given as follows:
√(3)∂ w^0_j/∂ x_j = 0,
-√(2)∂ w^0_j/∂ x_j + √(5)c_1^(1),1∂ u^(1)_j/∂ x_j + √(5)c^(2),1_1 ∂ u^(2)_j/∂ x_j = 0 ,
√(3)∂ w^0/∂ x_i - √(2)∂ w^1/∂ x_i + 3√(5) c_2^(1),0∂ u^(1)_ij/∂ x_j + 3√(5) c^(2),0_2 ∂ u^(2)_ij/∂ x_j = 0,
√(5)c_1^(1),1∂ w^1/∂ x_i + A_45∂ u^(1)_ij/∂ x_j + A_46∂ u^(2)/∂ x_i + A_48∂ u^(2)_ij/∂ x_j = 1/(ℒ^(11)_1 u^(1)_i+ℒ^(12)_1 u^(2)_i),
3√(5) c_2^(1),0∂ w^0_⟨ i/∂ x_j ⟩ + A_45∂ u^(1)_⟨ i/∂ x_j ⟩ + A_57∂ u^(2)_⟨ i/∂ x_j ⟩ + A_59∂ u^(2)_ijk/∂ x_k = 1/(ℒ^(11)_2 u^(1)_ij+ℒ^(12)_2 u^(2)_ij),
A_46∂ u^(1)_j/∂ x_j + c^(2),1_1/c^(1),1_1 A_46∂ u^(2)_j/∂ x_j = 1/ℒ^(22)_0 u^(2),
√(5) c^(2),1_1 ∂ w^1/∂ x_i + A_57∂ u^(1)_ij/∂ x_j + c^(2),1_1/c^(1),1_1 A_46∂ u^(2)/∂ x_i + A̅_78∂ u^(2)_ij/∂ x_j = 1/(ℒ^(21)_1 u^(1)_i+ℒ^(22)_1 u^(2)_i),
3√(5) c^(2),0_2 ∂ w^0_⟨ i/∂ x_j ⟩ + A_48∂ u^(1)_⟨ i/∂ x_j ⟩ + A̅_78∂ u^(2)_⟨ i/∂ x_j ⟩ + c^(2),0_2/c^(1),0_2 A_59∂ u^(2)_ijk/∂ x_k = 1/(ℒ^(21)_2 u^(1)_ij+ℒ^(22)_2 u^(2)_ij),
A_59∂ u^(1)_⟨ ij/∂ x_k ⟩ + c^(2),0_2/c^(1),0_2 A_59∂ u^(2)_⟨ ij/∂ x_k ⟩ = 1/ℒ^(22)_3 u^(2)_ijk.
It may be more interesting to write down these equations using the variables w_ij^0 and w_i^1. For the distribution function (<ref>), the moments w_ij^0 can be related to the coefficients by
w_ij^0 = ⟨ψ_ij^0, f̅⟩ = u_i'j'^(1)⟨ψ_ij^0, ϕ_i'j'^(1)⟩ + u_i'j'^(2)⟨ψ_ij^0, ϕ_i'j'^(2)⟩ = c_2^(1),0 u_ij^(1) + c_2^(2),0 u_ij^(2) .
Similarly, we have
w_i^1 = c_1^(1),1 u_i^(1) + c_1^(2),1 u_i^(2).
Using these variables, equations (<ref>) and (<ref>) become much neater:
u^(2) = β'_0 ∂ w^1_j/∂ x_j, u^(2)_ijk = β'_3 ∂ w^0_⟨ ij/∂ x_k ⟩
where
β_0' = A_46/c^(1),1_1ℒ_0^(22), β_3' = A_59/c^(1),0_2ℒ_3^(22).
The other two second-order variables u_i^(2) and u_ij^(2) can also be represented using derivatives of w_ij^0 or w_i^1. To get u_i^(2), we need to multiply (<ref>) by c_1^(2),1/c_1^(1),1 and subtract the result by (<ref>). During the calculation, we need to use (<ref>) and (<ref>) to get
u^(2)_i = β'_1 ∂ w^0_ij/∂ x_j, β_1' = c^(1),1_1 A_57 - c^(2),1_1A_45/c^(1),0_2(c^(1),1_1ℒ_1^(22) - c^(2),1_1ℒ_1^(12)).
Similarly, we can use (<ref>) and (<ref>) to find
u^(2)_ij = β'_2 ∂ w^1_⟨ i/∂ x_j ⟩, β_2' = c^(1),0_2 A_48 - c^(2),0_2A_45/c^(1),1_1(c^(1),0_2ℒ_2^(22) - c^(2),0_2 ℒ_2^(12)).
Finally, we can plug (<ref>)–(<ref>) into (<ref>)–(<ref>) to get a linear system written completely in the variables w^0, w^1, w_i^0, w_i^1, w_ij^0. The linear system in Section <ref> can then be obtained by applying the relationship (<ref>).
For Maxwell molecules, due to the lack of three dimensions in 𝕍^(2), the variables u^(2)_i do not exist. As a result, one needs to remove (<ref>) from the system. Also, the expression of β'_1 in (<ref>) becomes 0/0 for Maxwell molecules, and we need to set β'_1 to be zero to obtain correct equations.
§ DERIVATION OF ONSAGER BOUNDARY CONDITIONS FOR R13 EQUATIONS
We are now ready to derive wall boundary conditions for the R13 equations. In this work, we will focus on Maxwell's accommodation model <cit.>, which considers the interaction between gas molecules and the solid wall as a combination of specular reflection and diffusive reflection. In the derivation of boundary conditions for R13 equations, we will again write an abstract form using operators on function spaces to avoid lengthy formulas, and then convert it to its concrete form. Before starting our derivation, we will first briefly review Maxwell's boundary conditions for the linearized Boltzmann equation.
§.§ Maxwell's boundary condition
Consider the boundary point at which the outer normal unit vector is n = (n_1, n_2, n_3)^T. For simplicity, we adopt the coordinate system with basis vectors n, t_1 and t_2 with t_1 and t_2 being two orthogonal tangent vectors. Thus, the distribution function can now be presented by f(ξ_n, ξ_t_1, ξ_t_2), where ξ_n = ·n and ξ_t_1 and ξ_t_2 are similarly defined. For all other vectors and tensors, the indices will also be changed from 1,2,3 to n,t_1,t_2 in this section. Thus, the Boltzmann equation can be written as
ξ_n ∂f/∂x_n +
ξ_t_1 ∂f/∂x_t_1 +
ξ_t_2 ∂f/∂x_t_2 = 1/ℒf.
For hyperbolic equations, boundary conditions are needed only for incoming characteristics. Maxwell <cit.> proposed the following wall boundary condition for the distribution function:
f(ξ_n, ξ_t_1, ξ_t_2) = χ f_W(ξ_n, ξ_t_1, ξ_t_2) + (1-χ) f(-ξ_n, ξ_t_1, ξ_t_2), ξ_n < 0,
and χ∈ [0,1] is the accommodation coefficient denoting the proportion of the diffusive reflection. Assume that the solid wall has temperature θ^W and only moves in the tangential direction with velocity (0, v_t_1^W, v_t_2^W). Then the “wall Maxwellian” f_W() has the expression
f_W(ξ_n, ξ_t_1, ξ_t_2) = w^0,W ψ^0 + w^1,W ψ^1 + 3w_t_1^0,W ψ^0_t_1 + 3w_t_2^0,W ψ^0_t_2.
Here w^1,W = -√(3/2)θ^W, w^0,W_t_i = √(3)/3 v^W_t_i, and w^0,W are chosen such that
∫_ℝ^3ξ_n f(ξ_n, ξ_t_1, ξ_t_2) dξ_n dξ_t_1 dξ_t_2 = 0,
meaning that the normal mass flow is zero on the solid wall.
To derive boundary conditions for moment equations, it is more convenient to rewrite the (<ref>) in the following equivalent form:
f_odd(ξ_n, ξ_t_1, ξ_t_2) = χ/2-χ [f_W(ξ_n, ξ_t_1, ξ_t_2) - f_even(ξ_n, ξ_t_1, ξ_t_2)], ξ_n < 0,
where f_odd and f_even refer to the odd and even parts of f:
f_odd(ξ_n, ξ_t_1, ξ_t_2) = f(ξ_n, ξ_t_1, ξ_t_2) - f(-ξ_n, ξ_t_1, ξ_t_2)/2,
f_even(ξ_n, ξ_t_1, ξ_t_2) = f(ξ_n, ξ_t_1, ξ_t_2) + f(-ξ_n, ξ_t_1, ξ_t_2)/2.
Alternatively, we can define f_odd and f_even by introducing the odd and even function spaces:
L_odd^2(ℝ^3, [f_M()]^-1 d) = {f ∈ L^2(ℝ^3, [f_M()]^-1 d) | f(-ξ_n, ξ_t_1, ξ_t_2) = -f(ξ_n, ξ_t_1, ξ_t_2) },
L_even^2(ℝ^3, [f_M()]^-1 d) = {f ∈ L^2(ℝ^3, [f_M()]^-1 d) | f(-ξ_n, ξ_t_1, ξ_t_2) = f(ξ_n, ξ_t_1, ξ_t_2) },
and let
f_odd = 𝒫_odd f, f_even = 𝒫_even f.
Here 𝒫_odd and 𝒫_even are projection operators onto the function spaces L_odd^2(ℝ^3, [f_M()]^-1 d) and L_even^2(ℝ^3, [f_M()]^-1 d), respectively. Thus, a more compact way to write down Maxwell's boundary condition (<ref>) is
𝒞 𝒫_odd f = χ/2-χ 𝒞(f_W - 𝒫_even f),
where 𝒞 is half-space operator defined by
𝒞g(ξ_n, ξ_t_1, ξ_t_2) =
g(ξ_n, ξ_t_1, ξ_t_2), if ξ_n < 0,
0, if ξ_n > 0.
Noting that 𝒫_odd = 2𝒫_odd𝒞𝒫_odd, we can apply 𝒫_odd to both sides of (<ref>) to get
𝒫_odd f = 2χ/2-χ𝒫_odd𝒞(f_W - 𝒫_even f).
To determine w^0,W in f_W, we need to use (<ref>), which can also be formulated as
⟨ψ_n^0, f ⟩ = 0.
The complete Maxwell's boundary condition includes both (<ref>) and (<ref>).
§.§ A first attempt to formulate boundary conditions for R13 equations
Following the formulation of Maxwell's boundary conditions (<ref>), we will also split the function space for R13 equations into an odd part and an even part:
𝕍 = 𝕍_odd⊕𝕍_even,
where
𝕍_odd = 𝕍 ∩L_odd^2(ℝ^3, [f_M()]^-1 d), 𝕍_even = 𝕍 ∩L_even^2(ℝ^3, [f_M()]^-1 d).
Grad's work <cit.> states that the boundary conditions of moment equations should be formulated by taking only odd moments of the kinetic boundary conditions. Therefore, we expect that the boundary conditions for R13 equations are written as a map from 𝕍_even to 𝕍_odd, which is analogous to (<ref>).
Furthermore, to get Onsager boundary conditions satisfying the L^2 stability, we write the operator 𝒜̅_n = n_j 𝒜̅_j in the following form:
𝒜̅_n = 𝒜̅_eo𝒫_odd|_𝕍 + 𝒜̅_oe𝒫_even|_𝕍.
Here 𝒫_odd|_𝕍 and 𝒫_even|_𝕍 are the restrictions of 𝒫_odd and 𝒫_even on 𝕍, respectively.
Such a form of 𝒜̅_n can be observed from the equations (<ref>)–(<ref>), and it corresponds to the equation (<ref>) when written in the matrix form. The Onsager boundary conditions should hold the form
𝒫_odd|_𝕍 f̅ = 𝒮𝒜̅_oe(f_W - 𝒫_even|_𝕍 f̅),
where 𝒮 is a self-adjoint and negative semidefinite operator on 𝕍_odd. Note that (<ref>) is the operator form of the boundary conditions (<ref>). The operator 𝒮 can be figured out by comparing (<ref>) with (<ref>): since 𝒜̅_oe approximates the operation that multiplies an even function by ξ_n, the operator 𝒮 should approximate the operator
2χ/2-χ 𝒫_odd 𝒞 ξ_n^-1,
so that (<ref>) can be regarded as a discretization of (<ref>). Thus, a natural choice is
𝒮 = 2χ/2-χ𝒫_𝕍𝒫_odd𝒞ξ_n^-1.
Note that 𝒫_𝕍𝒫_odd is the projection operator onto 𝕍_odd, and therefore 𝒮 is an operator on 𝕍_odd. The proposition below shows some desired properties of 𝒮:
The operator 𝒮 is self-adjoint and negative semidefinite.
For any f̅_o,g̅_o∈𝕍_odd, we have
⟨f̅_o, 𝒮g̅_̅o̅ ⟩ = 2χ/2-χ ⟨f̅_o, 𝒫_𝕍𝒫_odd 𝒞 ξ_n^-1 g̅_o⟩= ⟨𝒫_𝕍𝒫_oddf̅_o, 𝒞 ξ_n^-1 g̅_o⟩= ⟨f̅_o, 𝒞 ξ_n^-1 g̅_o⟩
= ∫_-∞^0 ∫_-∞^+∞ ∫_-∞^+∞ f̅_o(ξ_n, ξ_t_1, ξ_t_2) ξ_n^-1 g̅_o(ξ_n, ξ_t_1, ξ_t_2) d ξ_t_2 d ξ_t_1 d ξ_n
= ⟨𝒞 ξ_n^-1 f̅_o, g̅_o⟩= ⟨𝒞 ξ_n^-1 f̅_o, 𝒫_𝕍𝒫_oddg̅_o⟩= ⟨𝒫_𝕍𝒫_odd 𝒞 ξ_n^-1 f̅_o, g̅_o⟩= ⟨𝒮 f̅_o, g̅_o ⟩,
⟨f̅_o, 𝒮f̅_o ⟩ = ∫_-∞^0 ∫_-∞^+∞ ∫_-∞^+∞ ξ_n^-1 [f̅_o(ξ_n, ξ_t_1, ξ_t_2)]^2 d ξ_t_2 d ξ_t_1 d ξ_n ≤0,
which shows both properties of 𝒮.
The equation (<ref>) with 𝒮 defined by (<ref>) is still incomplete since the condition for mass conservation (<ref>) has not been considered to determine w^0,W in the definition of f_W. Therefore, we further require that ⟨ψ_n^0, f̅⟩ = 0, or equivalently,
𝒫_u f̅ = 0,
where 𝒫_u is the projection operator from 𝕍 onto the following subspace:
𝕍_u = span { ψ_n^0 }.
The proposition below shows how we can combine (<ref>) and (<ref>) into one equation:
Let 𝒮_uu be a map from 𝕍_u to 𝕍_u defined by 𝒮_uu = 𝒫_u 𝒮|_𝕍_u. Then for any f̅ satisfying
𝒫_odd|_𝕍 f̅ = 𝒮̅𝒜̅_oe(f_W - 𝒫_even|_𝕍 f̅)
with
𝒮̅ = (ℐ - 𝒫_u) (ℐ - 𝒮 𝒮_uu^-1 𝒫_u) 𝒮,
both (<ref>) and (<ref>) hold for an appropriately chosen ρ_W. Meanwhile, the operator 𝒮̅ is a self-adjoint and positive semidefinite operator on 𝕍_odd, and it satisfies
𝒮̅𝒜̅_oe = 𝒮̅𝒜̅_oe (ℐ - 𝒫_ρ),
where 𝒫_ρ: 𝕍_even→𝕍_even is a projection operator defined by 𝒫_ρf̅_e = ⟨f̅_e, ψ^0⟩ψ^0.
The rigorous proof of this proposition can be found in Section <ref> of supplementary material. This proposition shows that we can use (<ref>) as the Onsager boundary conditions for the R13 equations, and the property (<ref>) implies that ρ_W actually does not appear in (<ref>) since
(ℐ - 𝒫_ρ) f_W = w^1,W ψ^1 + 3 w_t_1^0,W ψ_t_1^0 + 3 w_t_2^0,W ψ_t_2^0,
which does not involve ρ_W. Following the abstract form (<ref>), we can write down the boundary conditions explicitly using the series expansion of the distribution functions. Since
{ ψ_n^0, ϕ_n^(1), ϕ_nt_1^(1), ϕ_nt_2^(1), ϕ_n^(2), ϕ_nt_1^(2), ϕ_nt_2^(2), ϕ_nnn^(2), ϕ_nt_1 t_2^(2), ϕ_nt_1 t_1^(2) + 1/2 ϕ_nnn^(2) }
forms an orthogonal basis of 𝕍_odd (note that ϕ_nt_2 t_2^(2) = -ϕ_nnn^(2) - ϕ_nt_1 t_1^(2)),
ten boundary conditions are to be prescribed for each boundary point. The calculation of the boundary conditions is tedious but straightforward. The results are
w_n^0 = 0,
u^(1)_n = 2χ/2-χ[ λ'_11 (w^1 -w^1,W) + λ'_12 u^(1)_nn + λ'_13 u^(2) + λ'_14 u^(2)_nn],
u^(2)_n = 2χ/2-χ[ λ'_21 (w^1 -w^1,W) + λ'_22u^(1)_nn + λ'_23 u^(2) + λ'_24 u^(2)_nn],
u^(1)_t_i n = 2χ/2-χ[λ'_31 (w^0_t_i -w^0,W_t_i) + λ'_32u^(1)_t_i + λ'_33 u^(2)_t_i + λ'_34 u^(2)_t_i nn],
u^(2)_t_in = 2χ/2-χ[ λ'_41 (w^0_t_i -w^0,W_t_i) + λ'_42u^(1)_t_i + λ'_43 u^(2)_t_i + λ'_44 u^(2)_t_i nn],
u^(2)_nnn = 2χ/2-χ[λ'_51 (w^1 -w^1,W) + λ'_52u^(1)_nn + λ'_53 u^(2) + λ'_54 u^(2)_nn],
u^(2)_t_i t_i n + 1/2 u^(2)_nnn = 2χ/2-χ[ λ'_61(u^(1)_t_i t_i + c^(2),0_2/c^(1),0_2u^(2)_t_it_i) + λ'_62(u^(1)_nn + c^(2),0_2/c^(1),0_2u^(2)_nn) ],
u^(2)_t_1 t_2 n = 2χ/2-χλ'_71(u^(1)_t_1 t_2 + c^(2),0_2/c^(1),0_2u^(2)_t_1t_2).
The detailed derivation and the expressions of the coefficient λ'_ij are given in Section <ref>.
However, these equations give too many boundary conditions for the R13 equations. The general theory of hyperbolic conditions requires that the number of boundary conditions equal the number of negative eigenvalues of 𝒜̅_n. In our case, 𝒜̅_n has only 9 negative eigenvalues. In other words, the operator 𝒜̅_oe is not surjective.
As mentioned in Section <ref>, this is because our selection of function spaces 𝕍_odd and 𝕍_even are purely based on the symmetry of functions, regardless of the structure of equations. Detailed explanations and the fix of these boundary conditions will be shown in the next subsection.
§.§ Fixing the boundary conditions
To show why 𝒜̅_oe is not surjective, we multiply the equation (<ref>) by c_1^(2),1/c_1^(1),1, subtract the result from (<ref>), and set the index i to be the normal direction n, yielding the equation
(A_57 - c_1^(2),1/c_1^(1),1 A_45) [ ∂/∂x_n (u_nn^(1) + c_2^(2),0/c_2^(1),0 u_nn^(2) ) + ∂/∂x_t_1 (u_nt_1^(1) + c_2^(2),0/c_2^(1),0 u_nt_1^(2) )
+ ∂/∂x_t_2 (u_nt_2^(1) + c_2^(2),0/c_2^(1),0 u_nt_2^(2) ) ]
= 1/ (ℒ_1^(22) - c_1^(2),1/c_1^(1),1 ℒ_1^(12)) u_n^(2).
Then we set i,j,k to be n in (<ref>):
3/5 A_59 ∂/∂x_n (u_nn^(1) + c_2^(2),0/c_2^(1),0 u_nn^(2) ) - 2/5 A_59 ∂/∂x_t_1 (u_nt_1^(1) + c_2^(2),0/c_2^(1),0 u_nt_1^(2) ) - 2/5 A_59 ∂/∂x_t_2 (u_nt_2^(1) + c_2^(2),0/c_2^(1),0 u_nt_2^(2) )
= 1/ ℒ_3^(22) u_nnn^(2).
The two equations above show that if we perform the linear combination
3/5 A_59 ×[(<ref>)|_i=n - c_1^(2),1/c_1^(1),1 ×(<ref>)|_i=n ] - (A_57 - c_1^(2),1/c_1^(1),1 A_45 ) ×(<ref>)|_i,j,k=n,
the derivatives with respect to x_n will all cancel out on the left-hand side. An equivalent statement is
⟨ϕ_0, 𝒜̅_oe f̅
⟩= 0, ∀f̅ ∈𝕍,
where
ϕ_0 = 9/5 A_59(ϕ_n^(2) - c_1^(2),1/c_1^(1),1ϕ_n^(1)) - 35/2(A_57 - c_1^(2),1/c_1^(1),1 A_45) ϕ_nnn^(2).
Let 𝕍_0 = span{ϕ_0} and 𝒫_0 be the associated projection operator. We then have
𝒫_0 𝒜̅_oe = 0.
Therefore, to fix the boundary conditions, the subspace 𝕍_0 should be removed form 𝕍_odd. This requires replacing the operator 𝒮 with (ℐ - 𝒫_0) 𝒮 (ℐ - 𝒫_0). Thus, the operator 𝒮̅ should be replaced with
(ℐ - 𝒫_u) [ℐ - (ℐ - 𝒫_0)𝒮(ℐ - 𝒫_0) 𝒮_uu^-1 𝒫_u] (ℐ - 𝒫_0)𝒮(ℐ - 𝒫_0)
= (ℐ - 𝒫_u)(ℐ - 𝒫_0) [ℐ - 𝒮(ℐ - 𝒫_0) 𝒮_uu^-1 𝒫_u(ℐ - 𝒫_0)] 𝒮(ℐ - 𝒫_0)
= (ℐ - 𝒫_0)(ℐ - 𝒫_u) (ℐ - 𝒮 𝒮_uu^-1 𝒫_u) 𝒮(ℐ - 𝒫_0) [Since 𝒫_0 𝒫_u = 𝒫_u 𝒫_0 = 0]
= (ℐ - 𝒫_0) 𝒮̅(ℐ - 𝒫_0).
According to (<ref>), the final boundary conditions should be
(𝒫_odd|_𝕍 - 𝒫_0) f̅ = (ℐ - 𝒫_0) 𝒮̅ (ℐ - 𝒫_0) 𝒜̅_oe(f_W - 𝒫_even|_𝕍 f̅),
which can be further simplified to
(𝒫_odd|_𝕍 - 𝒫_0) f̅ = (ℐ - 𝒫_0) 𝒮̅𝒜̅_oe(f_W - 𝒫_even|_𝕍 f̅)
due to (<ref>).
The equation above indicates that the explicit form of the new boundary conditions (<ref>) can be derived by linear combinations of the boundary conditions (<ref>)–(<ref>). Using the expression of ϕ_0 (<ref>), we can find the following orthogonal basis of the orthogonal complement of 𝕍_0 in 𝕍:
{ψ_n^0, ϕ_nt_1^(1), ϕ_nt_2^(1), ϕ_nt_1^(2), ϕ_nt_2^(2), ϕ_nt_1 t_2^(2), ϕ_nt_1 t_1^(2) + 1/2ϕ_nnn^(2), ϕ_n^(1) + c^(2),1_1/c^(1),1_1ϕ_n^(2),μ_1 ϕ_nnn^(2) + μ_2 ( ϕ_n^(2) - c^(2),1_1/c^(1),1_1ϕ_n^(1))},
where
μ_1 = 3 A_59[ 1 + ( c_1^(2),1/c_1^(1),1)^2 ], μ_2 = 2( A_57 - c_1^(2),1/c_1^(1),1 A_45).
Therefore, in the new boundary conditions, the equations (<ref>)(<ref>)(<ref>)(<ref>)(<ref>) are preserved, and the two boundary conditions associated with the last two basis functions in (<ref>) are
u^(1)_n + c_1^(2),1/c_1^(1),1 u^(2)_n = 2χ/2-χ[ κ_11 (w^1 -w^1,W) + κ_12 u^(1)_nn + κ_13 u^(2) + κ_14 u^(2)_nn],
μ_1 u_nnn^(2) + μ_2 u^(2)_n - c_1^(2),1/c_1^(1),1μ_2 u^(1)_n = 2χ/2-χ[κ_21 (w^1 -w^1,W) + κ_22 u^(1)_nn + κ_23 u^(2) + κ_24 u^(2)_nn],
where
κ_1j = λ'_1j + c_1^(2),1/c_1^(1),1λ'_2j, κ_2j = μ_1 λ'_5j + μ_2 ( λ'_2j - c_1^(2),1/c_1^(1),1λ'_1j), j = 1,2,3,4.
Our final boundary conditions presented in Section <ref> are obtained by rewriting these boundary conditions using the physical quantities ρ, θ, v_i, q_i and σ_ij, whose derivation needs (<ref>)–(<ref>) and (<ref>) for conversion.
For Maxwell molecules, due to the nonexistence of the variable u_n^(2), the boundary condition (<ref>) does not exist. Therefore, such a fix is unnecessary.
§ RESULTS OF ONE-DIMENSIONAL CHANNEL FLOWS
Compared with the boundary conditions of R13 equations proposed in <cit.>, our boundary conditions have a nicer structure that agrees with the form (<ref>). However, it is unclear whether the acquirement of this structure will harm the accuracy of the model. In this section, we will reuse the examples for one-dimensional channel flows in <cit.> to test our models.
§.§ Problem settings and reduced moment equations
We consider the gas flow between two infinitely large parallel plates in steady state (see Figure <ref>). The distance between the two plates is L, and both plates are perpendicular to the x_2-axis. The temperatures of the left and right plates are respectively given by θ_W^l and θ_W^r. Both plates can move inside their own plane, and we choose the reference frame and the coordinates such that both velocities are parallel to the x_1-axis. Under such settings, all the moments are functions of x_2 only. Due to mass conservation, v_2=0. In addition, we have the symmetry f(ξ_1,ξ_2,ξ_3) = f(ξ_1,ξ_2,-ξ_3) since the plates only move along x_1, and thus all the moments that are odd in ξ_3 vanish. In specific, we have
v_3 = q_3 = σ_13 = σ_23 = 0.
Furthermore, since σ_ij is trace-free, σ_33 is automatically obtained once σ_11 and σ_22 are known. Therefore, the 13 moments in our problem can be reduced to eight variables including
* Equilibrium variables including density ρ, temperature θ, and the velocity component parallel to the plates v_1;
* Components of the stress tensor including the parallel stress σ_11, normal stress σ_22 and the shear stress σ_12;
* Heat fluxes including the parallel heat flux q_1 and the normal heat flux q_2.
The 13-moment equations (<ref>)–(<ref>) for the one-dimensional channel flows can be immediately obtained by dropping all partial derivatives with respective to x_1 and x_3. As a result, the conservation laws become
σ_12/ x_2 = 0, ρ/ x_2 + θ/ x_2 + σ_22/ x_2 = 0, q_2/ x_2 = 0.
The equation of stress tensor σ_11, σ_22 and σ_12 are
1/ℒ^(11)_2σ_11 + 5 (c^(1),0_2)^2 β_4 q_2/ x_2 - c^(1),0_2/3β_3 ^2 σ_11/ x^2_2 + c^(1),0_2/3(β_1 + 2/5β_3) ^2 σ_22/ x^2_2 = 0,
1/ℒ_2^(11)σ_22 - 10 (c^(1),0_2)^2 β_4 q_2/ x_2- c^(1),0_2 (2/3β_1 + 3/5β_3) ^2 σ_22/ x^2_2 = 0,
1/ℒ^(11)_2 σ_12 - 15/2(c^(1),0_2)^2 v_1/ x_2 - 15/2 (c^(1),0_2)^2 β_4 q_1/ x_2- c^(1),0_2 (1/2β_1 + 8/15β_3) ^2 σ_12/ x^2_2 = 0.
The equations of heat flux q_1 and q_2 are
1/ℒ^(11)_1 q_1 - 15/2 (c^(1),1_1)^2 β_4 σ_12/ x_2 - c^(1),1_1/2β_2 ^2 q_1/ x^2_2 = 0,
1/ℒ^(11)_1 q_2 - 15/2 (c^(1),1_1)^2 β_4 σ_22/ x_2 - c^(1),1_1 (β_0 + 2/3β_2) ^2 q_2/ x^2_2 - 15/2(c^(1),1_1)^2 θ/ x_2 = 0.
The general solution of this linear system can be found analytically. By the conservation laws, we see that σ_12, ρ + θ + σ_22 and q_2 are all constants. Then we can solve q_1 and v_1 from (<ref>)(<ref>) and solve q_2 and θ from (<ref>)(<ref>).
Afterwards, ρ and σ_11 can be immediately obtained by solving (<ref>) once other quantities are known. The general solution will include 11 constants to be determined. One of the constants depends on the average density between the plates: upon setting the range of x_2 to be [-1/2, 1/2] (so that L = 1), we assign the average density as
∫_-1/2^1/2ρ(x_2) dx_2 = 0.
The other 10 constants will be determined by 10 boundary conditions, of which each boundary has five given by (<ref>)–(<ref>) in the one-dimensional setting. Below we provide the boundary conditions on the right wall:
q_2 = χ_r/2 - χ_r[ 2λ_11 (θ - θ^W_r) + 2λ_12σ_22 + (2λ_13 + 4/3λ_14) q_2/ x_2],
σ_12 = χ_r/2 - χ_r[ 2λ_21(v_1 - v^W_r) + 2λ_22 q_1 + (2λ_23 + 16/15λ_24 )σ_12/ x_2],
q_1/ x_2 = χ_r/2 - χ_r[ 4λ_31 (v_1 - v^W_r) + 4λ_32q_1 + (4λ_33 + 32/15λ_34 )σ_1 2 / x_2],
(λ_45+ 3/5)σ_22/ x_2 = χ_r/2 - χ_r[ 2λ_41 (θ - θ^W_r) + 2λ_42σ_22 + (2λ_43 + 4/3λ_44) q_2/ x_2],
(2 σ_ 11/ x_2 + σ_ 22/ x_2 ) = χ_r/2-χ_r(12λ_51σ_11 + 12λ_52σ_22).
For the boundary conditions on the left solid wall, one only needs to make the following replacement of parameters:
q_2 →-q_2, σ_12 →-σ_12, x_2 →-x_2, χ_r →χ_l, θ^W_r →θ^W_l, v^W_r →v^W_l.
In the next two subsections, two special cases will be considered to verify our model.
§.§ Results
In this section, we illustrate the analytic solutions of R13 equations (<ref>)–(<ref>) with the Onsager boundary conditions (<ref>)–(<ref>) using the examples of one-dimensional Couette and Fourier flows in <cit.>. The results will be compared with reference solutions by DSMC simulations which are obtained by Bird's code <cit.>.
Following the examples in <cit.>, we consider the inverse-power-law model which assumes that the force F between two molecules is proportional to an inverse power of the distance r between them as F = κ r^-η, where η and κ are positive parameters. After nondimensionalization as done in <cit.>, the parameter κ will be integrated into the Knudsen number , and we choose =0.05 and 0.1 in our tests. For the parameter η, we take three values η =5,10 and ∞. In particular, when η =5, the inverse-power-law model becomes Maxwell molecules and the corresponding moment equations are identical to those derived in <cit.>; the choice η = 10 is often used in the simulation of the argon gas; when η→∞, the model reduces to the hard-sphere model <cit.>. Different choices of η will result in different values of a_lmn in the collision operator (<ref>). Thus, the coefficients appearing in the moment equations such as ℒ^(mn)_l and β_i as well as λ_ij in the boundary conditions all rely on the choice of η. We list the numerical values of these coefficients in the supplementary material for reference. In addition, both plates are assumed to be completely diffusive, that is, the accommodation coefficients are χ_l = χ_r =1.
The results are plotted in Figure <ref> and <ref> for the Couette flow and the Fourier flow. The horizontal axis in each subfigure is x_2, and the vertical axis is the value of the variables we are interested in for the one-dimensional channel problems with Knudsen numbers =0.05 and 0.1. The R13 results are plotted as the blue, yellow and green solid lines for η =5,10 and ∞, and the corresponding reference solutions by DSMC are given by the dotted lines with the same colors. Detailed descriptions of these figures are given in the following subsections.
§.§.§ Results of the Couette flow
In the planar Couette flow, the two plates have the same temperature and move in opposite directions (see Figure <ref>). In our test, we select θ_l^W = θ_r^W = 0 and v_l^W = -v_r^W = 0.2. In Figure <ref>, we plot the results of v_1, σ_12 and q_1 for Couette flow. As can be seen, the solid curves by R13 solutions generally agree with the dotted curves by the DSMC reference solutions, and they match better for smaller , which implies the validity of our models. Note that due to the lack of nonlinearity, the other five variables (ρ, θ, σ_11, σ_22 and q_2) are all zero in the analytical solutions.
§.§.§ Results of the Fourier flow
For the Fourier flow, the two plates are stationary, i.e, v^W_r = v^W_l = 0, and the flow is driven solely by the difference of plate temperatures. In our simulations, we set θ^W_l = 0 and θ^W_r =0.2. Due to the simplicity of the structure, the Fourier flow relies less on the nonlinear contributions and we may look at some other variables that we have not shown in Figure <ref> for Couette flow. In Figure <ref>, we plot the results for θ , σ_22 and q_2. Again, the R13 solutions (solid lines) provide qualitatively correct results as expected, showing that our linear R13 model works for the Fourier flow as well. In general, despite the enforcement of a symmetric structure, our models provide almost equal qualities as the equations in <cit.>.
§ CONCLUSION
This paper performs a re-derivation of the linear steady-state regularized 13-moment equations of general gas molecules from a novel point of view. Our derivation is based on a decomposition of the function space according to the order of accuracy, which provides a clearer picture of the entire procedure and gains a symmetric structure in the final system. This also allows a straightforward approach to obtaining Onsager boundary conditions. As an ongoing work, we are trying to apply this approach to time-dependent equations. Extensions to other kinetic equations such as the radiative transfer equation will also be considered in our future work.
plain
Supplementary materials: Linear regularized 13-moment equations with Onsager boundary conditions for general gas molecules
§ DERIVATION OF MOMENT EQUATIONS (<REF>)
Given any tensors A^m_i_1⋯ i_l for all l,m = 0,1,⋯, the basis functions ψ^m_i_1,⋯,i_l satisfy the following relation <cit.>:
∑_m,l=0^+∞ A^m_i_1⋯ i_l⟨ f_M ψ^m_i_1⋯ i_l,ψ^n_j_1⋯ j_l'⟩ = l'!/(2l'+1)!! A^n_⟨ j_1⋯ j_l'⟩.
Using this property, we can derive (<ref>) by multiplying the Boltzmann equation (<ref>) by ψ_i_1⋯ i_l^n and then integrating with respect to . The calculation of the right-hand side is the as follows:
1/⟨ℒ[f], ψ_i_1,⋯,i_l^n ⟩ =
1/∑_m,k=0^+∞(2k+1)!!/k!w_j_1,⋯,j_k^m ⟨ℒ[ψ^m_j_1,⋯,j_k f_M], ψ^n_i_1,⋯,i_l⟩
= 1/∑_m,k=0^+∞∑_n'=0^+∞ a_kmn'(2k+1)!!/k!w_j_1,⋯,j_k^m ⟨ f_M ψ^n'_j_1,⋯,j_k, ψ^n_i_1,⋯,i_l⟩
= 1/∑_n'=0^+∞ a_lnn' w_i_1,⋯, i_l^n',
where we have used (<ref>) to expand ℒ[ψ^m_j_1,⋯,j_k].
For the left-hand side, we need another property from <cit.>:
ψ^n_i_1⋯ i_lξ_j = ( √(2(n+l)+3)ψ^n_i_1 ⋯ i_l j - √(2n)ψ^n-1_i_1 ⋯ i_l j)+
+ l/2l+1( √(2(n+l)+1)ψ^n_⟨ i_1 ⋯ i_l-1δ_i_l⟩ j -√(2(n+1))ψ^n+1_⟨ i_1 ⋯ i_l-1δ_i_l⟩ j),
using which we have
⟨ξ_j ∂ f/∂ x_j, ψ_i_1,⋯,i_l^n ⟩ =
⟨∂ f/∂ x_j, ψ_i_1,⋯,i_l^n ξ_j ⟩
= ∑_m,k=0^+∞(2k+1)!!/k!∂ w_j_1,⋯,j_k^m /∂ x_j⟨ f_M ψ^m_j_1,⋯,j_k, ψ^n_i_1,⋯,i_lξ_j ⟩
= ( √(2(n+l)+3)∂ w_i_1⋯ i_l j^n/∂ x_j - √(2n)∂ w_i_1⋯ i_l j^n-1/∂ x_j)
+ l/2l+1( √(2(n+l)+1)∂ w_⟨ i_1⋯ i_l-1^n/∂ x_i_l ⟩ - √(2(n+1))∂ w_⟨ i_1⋯ i_l-1^n+1/∂ x_i_l⟩).
Equating (<ref>) and (<ref>) gives the moment equations (<ref>).
§ PROOF OF (O0)-(O4)
Similar as (<ref>), T_i_1⋯ i_l^n can also be expanded as
T_i_1⋯ i_l^n = T_i_1⋯ i_l^n|0 + T_i_1⋯ i_l^n|1 + ^2 T_i_1⋯ i_l^n|2 + ^3 T_i_1 ⋯ i_l^n|3 + ⋯.
§.§ Zeroth order
To find the zeroth-order terms in the asymptotic expansion (<ref>), we insert (<ref>)(<ref>) into (<ref>) and balance the O(^-1) terms on both sides. The result is
∑_n'=0^+∞ a_lnn' w_i_1⋯ i_l^n'|0 = 0
For l ≥ 2, we can multiply both sides by b_ln_1n^(0) and take the sum over n, which gives us
w_i_1⋯i_l^n_1|0 = 0, ∀n_1 ⩾0.
When l = 0 and l = 1, due to the relations (<ref>), we can multiply both sides of (<ref>) by b_0n_1n^(2) or b_1n_1n^(1) and then take the sum over n, to obtain
w^n|0 = 0, ∀n ⩾2, and w_i^n|0 = 0, ∀n ⩾1.
The values of w^0|0, w_i^0|0 and w^1|0 are allowed to be nonzero, and thus we reach to the conclusion (O0). Following the idea of the Chapman-Enskog expansion, we assume that
w^0|k = w^1|k = w_i^0|k = 0, ∀ k ⩾ 1.
Using these results, we can find the following zeroth-order terms for T_i_1 ⋯ i_l^n:
T^n|0 = 0, n ⩾ 2,
T_i^1|0 = √(5)/3∂ w^1/∂ x_i,
T_i^n|0 = 0, n ⩾ 2,
T_ij^0|0 = 2/√(5)∂ w_⟨ i^0/∂ x_j⟩,
T_ij^n|0 = 0, n ⩾ 1,
T_i_1 ⋯ i_l^n|0 = 0, l ⩾ 3, n ⩾ 0.
These results are to be used in the derivation of first-order terms.
§.§ First order
By inserting (<ref>)(<ref>) into (<ref>) and balancing the O(1) terms on both sides, we get
T_i_1⋯ i_l^n|0 = ∑_n'=0^+∞ a_lnn' w^n'|1_i_1⋯ i_l.
Expressions of w_i_1⋯ i_l^n|1 for l = 0 and l ⩾ 3
When l = 0 and n ⩾ 2, the left-hand side of the above equation is zero, and therefore
w^n|1 = 0, n ⩾ 2.
Similarly,
w_i_1⋯ i_l^n|1 = 0, if l ⩾ 3 and n ⩾ 0.
Expressions of w_i^n|1
Using (<ref>), we have
√(5)/3 ∂w^1/∂x_i = ∑_n'=1^+∞ a_11n' w_i^n'|1 and
∑_n'=1^+∞ a_1nn' w_i^n'|1 = 0, for n ⩾2.
Hence,
w_i^n|1 = √(5)/3 b_11n^(1)∂ w^1/∂ x_i
which produces the expression (<ref>). Similar to the Chapman-Enskog expansion, here we would like to assume that
w_i^1|k = 0, for all k ⩾ 2.
Expressions of w_ij^n|1
Following the similar argument for the case l = 1 upon using (<ref>), we have
w_ij^n|1 = 2/√(5) b_20n^(0)∂ w_⟨ i^0/∂ x_j⟩,
which yields the relation (<ref>). Again, since w_ij^0 appears in the final equations, instead of (<ref>), we are going to assume
w_ij^0|k = 0, for all k ⩾ 2.
By (<ref>) and (<ref>), we conclude that {w^n_i}_n=1^∞, {w^n_ij}_n=0^∞ are only first order moments in the expansion of distribution function and thus we arrive at the statement (O1). By inserting the above results (<ref>)(<ref>)(<ref>)(<ref>) into (<ref>), we can obtain the expressions of T_i_1⋯ i_l^n|1. When l ⩾ 4, it is easy to see from (<ref>) that T_i_1⋯ i_l^n|1 = 0. For l = 0,1,2,3, these quantities are given as follows:
Expressions of T^n|1
By the relation (<ref>), it holds that
T^n|1 = √(2n+3)∂ w_j^n|1/∂ x_j - √(2n)∂ w_j^n-1|1/∂ x_j
= √(2n+3) b_11n^(1) - √(2n) b_11,n-1^(1)/b_111^(1)∂ w_j^1|1/∂ x_j
for n ⩾ 1. Note that when n = 1, the coefficient b_110^(1) should be regarded as zero since w_j^0|1 = 0 by the assumption (<ref>).
Expressions of T_i^n|1
By the relation (<ref>), we have
T_i^n|1 = √(2n+5)∂ w_ij^n|1/∂ x_j - √(2n)∂ w_ij^n-1|1/∂ x_j
= √(2n+5) b_20n^(0) - √(2n) b_20,n-1^(0)/b_200^(0)∂ w_ij^0|1/∂ x_j
for n⩾ 1.
Expressions of T_ij^n|1
By the relation (<ref>), we have
T_ij^n|1 = 2/5( √(2n+5)∂ w_⟨ i^n|1/∂ x_j⟩ - √(2(n+1))∂ w_⟨ i^n+1|1/∂ x_j⟩)
= 2/5√(2n+5) b_11n^(1) - √(2(n+1)) b_11,n+1^(1)/b_111^(1)∂ w_⟨ i^1|1/∂ x_j ⟩
for n ⩾ 0, where the coefficient b_110^(1) should be regarded as zero when n=0 again by the assumption (<ref>).
Expressions of T_ijk^n|1
Since w_ijkl^n|1 = 0, by the relation (<ref>) we have
T_ijk^n|1 = 3/7( √(2n+7)∂ w_⟨ ij^n|1/∂ x_k⟩ - √(2(n+1))∂ w_⟨ ij^n+1|1/∂ x_k⟩)
= 3/7√(2n+7) b_20n^(0) - √(2(n+1)) b_20,n+1^(0)/b_200^(0)∂ w_⟨ ij^0|1/∂ x_k ⟩
§.§ Second order
We now find the second-order moments in the expansion of distribution function based on
T_i_1⋯ i_l^n|1 = ∑_n'=0^+∞ a_lnn' w^n'|2_i_1⋯ i_l.
Expressions of w^n|2
By (<ref>), we have
w^n|2 = ∑_n'=2^+∞ b_0nn'^(2) T^n'|1
= γ^(2),n_0 ∂ w_j^1|1/∂ x_j
for n⩾ 2, where γ^(2),n_0 is defined in (<ref>). Note that the summation begins from n'=2 due to the assumption (<ref>).
Expressions of w_i^n|2
By (<ref>), we have
w_i^n|2 = ∑_n'=2^+∞ b_1nn'^(2) T_i^n'|1
=γ^(1),n_1∂ w_ij^0|1/∂ x_j
for n⩾ 2, where γ^(1),n_1 is defined in (<ref>). Note that the summation begins from n'=2 due to the assumption (<ref>).
Expressions of w_ij^n|2
By (<ref>), we have
w_ij^n|2 = ∑_n'=1^+∞ b_2nn'^(1) T_ij^n'|1
= γ^(1),n_2 ∂ w_⟨ i^1|1/∂ x_j⟩,
for n ⩾ 1, where γ^(1),n_2 is defined in (<ref>). Note that the summation begins from n'=1 due to the assumption (<ref>).
Expressions of w_ijk^n|2
By (<ref>), we have
w_ijk^n|2 = ∑_n'=0^+∞ b_3nn'^(0) T_ijk^n'|1 =
γ^(2),n_3 ∂ w_⟨ ij^0|1/∂ x_k⟩
for any non-negative n, where γ^(2),n_3 is defined in (<ref>).
Expressions of w_i_1⋯ i_l^n|2 for l ⩾ 4
When l ⩾ 4, since T_i_1⋯ i_l^n|1 = 0, we have
w_i_1⋯i_l^n|2 = 0.
At this point, we may conclude that {w^n}_n=2^∞ and {w^n_ijk}_n=0^∞ are the all second-order moments in the expansion of distribution function, and thus we arrive at (O2). Finally, the statement (O3) is the direct conclusion from
w_ijkl^n|3 = ∑_n'=0^+∞ b_4nn'^(0) T_ijkl^n'|2 ∼O(^3),
while (O4) comes from
w_i_1⋯i_l^n|3 = ∑_n'=0^+∞ b_lnn'^(0) T_i_1⋯i_l^n'|2 = 0
as T_i_1⋯ i_l^n|2 = 0 when l ⩾ 5.
§ PROOF OF PROPOSITION <REF>
We first claim that 𝒮̅ = 𝒮̅ (ℐ - 𝒫_u), or equivalently, 𝒮̅𝒫_u = 0. This can be shown by direct calculation:
𝒮̅𝒫_u = (ℐ - 𝒫_u) (ℐ - 𝒮𝒮_uu^-1𝒫_u) 𝒮𝒫_u = (ℐ - 𝒫_u) 𝒮𝒫_u - (ℐ - 𝒫_u) 𝒮𝒮_uu^-1𝒫_u 𝒮𝒫_u
= (ℐ - 𝒫_u) 𝒮𝒫_u - (ℐ - 𝒫_u) 𝒮𝒫_u = 0.
Since 𝕍_ρ⊂𝕍^(0) and 𝕍_ρ⊂𝕍_even, we can see from (<ref>) and (<ref>) that
𝒜̅_oe 𝒫_ρ = 𝒜̅_n 𝒫_ρ = 𝒫_𝕍 ξ_n 𝒫_ρ.
Thus, by ξ_n ψ^0 = ψ_n^0 ∈𝕍_u, we get 𝒜̅_oe𝒫_ρ = 𝒫_u ξ_n 𝒫_ρ. Therefore, one can derive from (<ref>) that
𝒮̅ 𝒜̅_oe 𝒫_ρ = 𝒮̅ 𝒫_u ξ_n 𝒫_ρ = 0,
which proves (<ref>).
The proof of (<ref>) is straightforward. Using 𝒫_u 𝒮̅ = 𝒫_u (ℐ - 𝒫_u) ⋯ = 0, we can find that
𝒫_u f̅ = 𝒫_u 𝒫_odd |_𝕍 f̅ = 𝒫_u 𝒮̅ 𝒜̅_oe(f_W - 𝒫_even|_𝕍 f̅) = 0.
To show (<ref>), we need to choose ρ_W such that
𝒫_u 𝒮 𝒜̅_oe (f_W - 𝒫_even|_𝕍 f̅) = 0.
When (<ref>) holds, one can use the two equalities above to obtain
𝒫_odd|_𝕍 f̅ = 𝒫_u f̅ + (ℐ - 𝒫_u) 𝒫_odd|_𝕍 f̅ = 0 + (ℐ - 𝒫_u) 𝒮̅ 𝒜̅_oe(f_W - 𝒫_even|_𝕍 f̅)
= (ℐ - 𝒫_u) (ℐ - 𝒮 𝒮_uu^-1 𝒫_u)𝒮 𝒜̅_oe(f_W - 𝒫_even|_𝕍 f̅)
= (ℐ - 𝒫_u) 𝒮 𝒜̅_oe(f_W - 𝒫_even|_𝕍 f̅) - (ℐ - 𝒫_u)𝒮 𝒮_uu^-1 𝒫_u 𝒮 𝒜̅_oe(f_W - 𝒫_even|_𝕍 f̅)
= (ℐ - 𝒫_u) 𝒮 𝒜̅_oe(f_W - 𝒫_even|_𝕍 f̅) = 𝒮 𝒜̅_oe(f_W - 𝒫_even|_𝕍 f̅).
This proves (<ref>).
It remains to show that 𝒮̅ is self-adjoint and positive semidefinite. Its self-adjointness can be seen by rewriting the expression of 𝒮̅ as
𝒮̅ = 𝒮̅ (ℐ - 𝒫_u) = (ℐ - 𝒫_u)(𝒮 - 𝒮 𝒫_u 𝒮_uu^-1 𝒫_u 𝒮) (ℐ - 𝒫_u).
For any g̅∈𝕍_odd, we can define g = (ℐ - 𝒮_uu^-1𝒫_u 𝒮)(ℐ - 𝒫_u) g̅ and verify that
⟨g̅, 𝒮̅ g̅ ⟩= ⟨g, 𝒮 g ⟩.
Therefore, the positive semidefiniteness of 𝒮̅ follows the positive semidefiniteness of 𝒮.
§ EXPRESSIONS OF COEFFICIENTS
§.§ Expressions of c^(d),n_l
* Coefficients in the first-order moments: The expressions of c^(1),n_1 and c^(1),n_2 are given by
c^(1),n_1 = b_11n^(1)/√(∑^+∞_n=1(b^(1)_11n)^2 ), for n⩾ 1
c^(1),n_2 = b_20n^(0)/ √(∑^+∞_n=0(b^(0)_20n)^2 ), for n⩾ 0,
where b^n_0_lnn' can be obtained from (<ref>).
* Coefficients in the first-order moments: The expressions of c^(2),n_0 and c^(2),n_3 are given by
c^(2),n_0 = γ^(2),n_0 / √(∑^+∞_n=2( γ^(2),n_0)^2 ), for n⩾ 2,
c^(2),n_3 = γ^(2),n_3 /√(∑^+∞_n=0(γ^(2),n_3)^2 ), for n⩾ 0
where γ^(2),n_0 and γ^(2),n_3 are respectively given by (<ref>) and (<ref>). (<ref>) and (<ref>).
For non-Maxwell molecules, the expressions of c^(2),n_1 and c^(2),n_2 are given by
c^(2),n_1 = 1/C^(2)_1 ×
- ∑_n'=2^+∞ c̅^n'_1 b^(1)_11n'/b^(1)_111, if n=1
c̅^n_1 , if n⩾2
,
c^(2),n_2 = 1/C^(2)_2 ×
- ∑_n'=1^+∞ c̅^n'_2 b^(0)_20n'/b^(0)_200, if n=0
c̅^n_2 , if n ⩾1
where C^(2)_1, C^(2)_1 are constants chosen such that the scaling
∑_n=1^+∞|c_1^(2),n|^2 = ∑_n=0^+∞|c_2^(2),n|^2 = 1
holds, and c̅^n_1, c̅^n_2 are respectively the solutions of the linear system
[ τ^2_3 τ^3_3 α_3 b^(1)_114/b^(1)_111 α_3 b^(1)_115/b^(1)_111 ⋯ α_3 b^(1)_11D/b^(1)_111 ⋯; τ^2_4 α_4 b^(1)_113/b^(1)_111 τ^4_4 α_4 b^(1)_115/b^(1)_111 ⋯ α_4 b^(1)_11D/b^(1)_111 ⋯; ⋮ ⋮ ⋮ ⋮ ⋱ ⋮ ⋱; τ^2_D α_D b^(1)_113/b^(1)_111 α_D b^(1)_114/b^(1)_111 ⋯ α_D b^(1)_11,D-1/b^(1)_111 τ^D_D ⋯; ⋮ ⋮ ⋮ ⋮ ⋱ ⋮ ⋱ ][ c̅^2_1; c̅^3_1; ⋮; c̅^D-1_1; c̅^D_1; ⋮ ] = 0
where
τ^2_D = b^(1)_112/b^(1)_111α_D - γ^(1),D_1/γ^(1),2_1, τ^D_D = b^(1)_11D/b^(1)_111α_D + 1, α_D = b^(1)_11D/b^(1)_111 - γ^(1),D_1/γ^(1),2_1 b^(1)_112/b^(1)_111 with c̅^2_1 = 1
and
[ τ̃^1_2 τ̃^2_2 α̃_2 b^(0)_203/b^(0)_200 α̃_2 b^(0)_204/b^(0)_200 ⋯ α̃_2 b^(0)_20D/b^(0)_200 ⋯; τ̃^1_3 α̃_3 b^(0)_202/b^(0)_200 τ̃^3_3 α̃_3 b^(0)_204/b^(0)_200 ⋯ α̃_3 b^(0)_20D/b^(0)_200 ⋯; ⋮ ⋮ ⋮ ⋮ ⋱ ⋮ ⋱; τ̃^1_D α̃_D b^(0)_202/b^(0)_200 α̃_D b^(0)_203/b^(0)_200 ⋯ α̃_D b^(0)_20,D-1/b^(0)_200 τ̃^D_D ⋯; ⋮ ⋮ ⋮ ⋮ ⋱ ⋮ ⋱ ][ c̅^1_2; c̅^2_2; ⋮; c̅^D-1_2; c̅^D_2; ⋮ ] = 0
where
τ̃^1_D = b^(0)_201/b^(0)_200α̃_D - γ^(1),D_2/γ^(1),1_2, τ̃^D_D = b^(0)_20D/b^(0)_200α̃_D + 1, α̃_D = b^(0)_20D/b^(0)_200 - γ^(1),D_2/γ^(1),1_2 b^(0)_201/b^(0)_200 with c̅^2_1 = 1.
For Maxwell molecules, we have
c^(2),n_1 = 0 for n⩾1 and c^(2),n_2 =
1, if n = 1
0 , if n=0 or n ⩾2
.
§.§ Expressions of A_ij
A_ij =
3 ∑_n=1^+∞c^(1),n_1 (√(2n+5)c^(1),n_2 - √(2n)c^(1),n-1_2 ), if (i,j)=(4,5)
∑_n=1^+∞ c^(1),n_1 ( √(2n+3)c^(2),n_0 - √(2(n+1))c^(2),n+1_0 ), if (i,j)=(4,6)
3 ∑_n=1^+∞c^(1),n_1 (√(2n+5)c^(2),n_2 - √(2n)c^(2),n-1_2 ), if (i,j)=(4,8)
3 ∑_n=0^+∞ c^(1),n_2 ( √(2n+5)c^(2),n_1 - √(2(n+1)) c^(2),n+1_1 ) , if (i,j)=(5,7)
15/2∑_n=0^+∞ c^(1),n_2 ( √(2n+7) c^(2),n_3 - √(2n)c^(2),n-1_3 ) , if (i,j)=(5,9)
∑_n=2^+∞ c^(2),n_0 ( √(2n+3) c^(2),n_1 - √(2n)c^(2),n-1_1 ), if (i,j)=(6,7)
3 ∑_n=1^+∞c^(2),n_1 (√(2n+5)c^(2),n_2 - √(2n)c^(2),n-1_2 ), if (i,j)=(7,8)
15/2∑_n=0^+∞ c^(2),n_2 ( √(2n+7) c^(2),n_3 - √(2n)c^(2),n-1_3 ) , if (i,j)=(8,9)
§.§ Expressions of λ'_ij
The boundary conditions (<ref>) can be written uniformly as
w_n^0 = 0,
u_i_1⋯ i_l^(p) = 2χ/2-χ∑_m c^(p),m_l [
3∑_p'=1,2∑^+∞_m'=1 c^(p'),m'_1 ( A^m'_m;i_1⋯ i_l - A^m'_0;nI^0_m;i_1 ⋯ i_l/I^0_0;n) z^(p')_n
+ 15 ∑_t=t_1,t_2∑_p'=1,2∑^+∞_m'=0 c^(p'),m'_2 B^m';t_m;i_1 ⋯ i_l z^(p')_tn + 35/2∑^+∞_m'=0 c^(2),m'_3( D^m'_m;i_1⋯ i_l - D^m'_0;nI^0_m;i_1 ⋯ i_l/I^0_0;n) z^(2)_nnn
+ 105/2∑_t',t”=t_1,t_2∑^+∞_m'=0 c^(2),m'_3 ( C^m';t't”_m;i_1⋯ i_l -C^m';t't”_0;nI^0_m;i_1 ⋯ i_l/I^0_0;n) z^(2)_t't”n],
where u_i_1⋯ i_l^(p) is taken in the set {u^(1)_n, u^(2)_n, u^(1)_t_1 n, u^(1)_t_2 n, u^(2)_t_1 n, u^(2)_t_2 n, u^(2)_nnn, u^(2)_t_1 t_1 n, u^(2)_t_2 t_2 n, u^(2)_t_1 t_2 n}, and the coefficients are given by
I_m;i_1 ⋯ i_l^m';j_1 ⋯ j_k = ∫_· < 0 f_M() L̅_m'^(k+1/2)( ||^2/2)L̅_m^(l+1/2)( ||^2/2) ξ_⟨ i_ 1⋯ξ_i_l⟩ξ_⟨ j_ 1⋯ξ_j_k⟩ ,
A^m'_m;i_1 ⋯ i_l = ∫_· < 0 f_M() L̅_m'^(3/2)( ||^2/2)L̅_m^(l+1/2)( ||^2/2) ξ_⟨ i_ 1⋯ξ_i_l⟩ ,
B^m';t_j_m;i_1 ⋯ i_l = ∫_· < 0 f_M() L̅_m'^(5/2)( ||^2/2)L̅_m^(l+1/2)( ||^2/2) ξ_⟨ i_ 1⋯ξ_i_l⟩ξ_t_j ,
C^m';t' t”_m;i_1 ⋯ i_l = ∫_· < 0 f_M() L̅_m'^(7/2)( ||^2/2)L̅_m^(l+1/2)( ||^2/2) ξ_⟨ i_ 1⋯ξ_i_l⟩·ξ_⟨ t'ξ_t”ξ_n⟩/ξ_n ,
D^m'_m;i_1 ⋯ i_l = ∫_· < 0 f_M() L̅_m'^(7/2)( ||^2/2)L̅_m^(l+1/2)( ||^2/2) ξ_⟨ i_ 1⋯ξ_i_l⟩·ξ_⟨ nξ_nξ_n⟩/ξ_n
where z_i_1⋯ i_l^(k) are the coefficients in the expansion of 𝒜̅_oe (f_W - 𝒫_even|_𝕍f̅):
z^(1)_n = 1/3(√(5)c^(1),1_1(w^1,W-w^1) -A_45u^(1)_nn-A_46u^(2)-A_48u^(2)_nn),
z^(2)_n = 1/3(√(5)c^(2),1_1 (w^1,W-w^1) - A_57u^(1)_nn-c^(2),1_1/c^(1),1_1 A_46u^(2)-A̅_78u^(2)_nn),
z^(1)_t_in = 2/15( 3√(5)/2c^(1),0_2 (w^0,W_t_i-w^0_t_i) -1/2A_45 u^(1)_t_i - 1/2 A_57u^(2)_t_i -A_59 u^(2)_t_inn), i=1,2,
z^(2)_t_in = 2/15( 3√(5)/2c^(2),0_2 (w^0,W_t_i-w^0_t_i) - 1/2A_48u^(1)_t_i-1/2A̅_78u^(2)_t_i- c^(2),0_2/c^(1),0_2A_59 u^(2)_t_inn), i=1,2,
z^(2)_t_it_jn = 2/35 A_59[ 2/15δ_ij(u^(1)_nn+c^(2),0_2/c^(1),0_2u^(2)_nn) - 1/3(u^(1)_t_it_j+c^(2),0_2/c^(1),0_2u^(2)_t_it_j)], i,j=1,2,
z^(2)_nnn = 2/175A_59[(u^(1)_t_1t_1+c^(2),0_2/c^(1),0_2u^(2)_t_1t_1) + (u^(1)_t_2t_2+c^(2),0_2/c^(1),0_2u^(2)_t_2t_2) -2(u^(1)_nn+c^(2),0_2/c^(1),0_2u^(2)_nn)].
Combining (<ref>) with (<ref>), we obtain the expressions of the coefficients λ'_ij as
λ'_ij =
-√(5)(c^(1),1_1γ'_i1 +c^(2),1_1 γ'_i2), if j = 1
-A_45γ'_i1 - A_57γ'_i2 + 3/5A_59(3 γ'_i3 - γ'_i4) , if j = 2
-A_46(γ'_i1 + c^(2),1_1/c^(1),1_1γ'_i2) , if j = 3
-A_48γ'_i1 - A̅_78 γ'_i2 + c^(2),0_2 A_59/5c^(1),0_2(4 γ'_i3 - 3 γ'_i4), if j = 4
, for i = 1,2,5;
λ'_ij =
-3√(5)(c^(1),0_2γ'_i1 +c^(2),0_2 γ'_i2), if j = 1
-(A_45γ'_i1 + A_48γ'_i2) , if j = 2
-(A_57γ'_i1 + A̅_78γ'_i2) , if j = 3
-2A_59(γ'_i1 +c^(2),0_2/c^(1),0_2 γ'_i2), if j = 4
, for i = 3,4;
λ'_ij =
-A_59(γ'_63+γ'_64), if (i,j) = (6,1)
1/5A_59(9/2γ'_53+2γ'_63+7γ'_64), if (i,j) = (6,2)
-2A_59γ'_71, if (i,j) = (7,1)
.
In the expressions above, γ'_ij are given as
γ'_ij =
∑_m=1^∞∑_m'=1^∞c^(i),m_1 c^(1),m'_1 (𝒜^m'_m;n - 𝒜^m'_0;nI^0_m;n/I^0_0;n) , if j = 1
∑_m=1^∞∑_m'=1^∞c^(i),m_1 c^(2),m'_1 (𝒜^m'_m;n - 𝒜^m'_0;nI^0_m;n/I^0_0;n) , if j = 2
3∑_m=1^∞∑_m'=0^∞c^(i),m_1 c^(2),m'_3 (𝒞^m';t_1t_1_m;n - 𝒞^m';t_1t_1_0;nI^0_m;n/I^0_0;n) , if j = 3
∑_m=1^∞∑_m'=0^∞c^(i),m_1 c^(2),m'_3 (𝒟^m'_m;n - 𝒟^m'_0;nI^0_m;n/I^0_0;n), if j = 4
, for i = 1,2;
γ'_ij =
2∑_m=0^∞∑_m'=0^∞c^(i-2),m_2 c^(1),m'_2 ℬ^m';t_1_m;t_1n , if j = 1
2∑_m=0^∞∑_m'=0^∞c^(i-2),m_2 c^(2),m'_2 ℬ^m';t_1_m;t_1n , if j = 2
, for i = 3,4;
γ'_ij =
∑_m=0^∞∑_m'=1^∞c^(2),m_3 c^(1),m'_1 (𝒜^m'_m;nnn - 𝒜^m'_0;nI^0_m;nnn/I^0_0;n) , if j = 1
∑_m=0^∞∑_m'=1^∞c^(2),m_3 c^(2),m'_1 (𝒜^m'_m;nnn - 𝒜^m'_0;nI^0_m;nnn/I^0_0;n) , if j = 2
3∑_m=0^∞∑_m'=0^∞c^(2),m_3 c^(2),m'_3 (𝒞^m';t_1t_1_m;nnn - 𝒞^m';t_1t_1_0;nI^0_m;nnn/I^0_0;n) , if j = 3
∑_m=0^∞∑_m'=0^∞c^(2),m_3 c^(2),m'_3 (𝒟^m'_m;nnn - 𝒟^m'_0;nI^0_m;nnn/I^0_0;n), if j = 4
, for i = 5;
γ'_ij =
-1/2γ'_51 , if j = 1
-1/2γ'_52 , if j = 2
3∑_m=0^∞∑_m'=0^∞c^(2),m_3 c^(2),m'_3 (𝒞^m';t_1t_1_m;t_1 t_1 n - 𝒞^m';t_1t_1_0;nI^0_m;t_1 t_1 n/I^0_0;n) , if j = 3
3∑_m=0^∞∑_m'=0^∞c^(2),m_3 c^(2),m'_3 (𝒞^m';t_2t_2_m;t_1 t_1 n - 𝒞^m';t_2t_2_0;nI^0_m;t_1 t_1 n/I^0_0;n) , if j = 4
-1/2γ'_54, if j = 5
, for i = 6.
§.§ Expressions of λ_ij
λ_11 = 3√(5)/2c^(1),1_1 κ_11, λ_12 = -√(2)/2c^(1),1_1/c^(1),0_2κ_12, λ_13 = c^(1),1_1 β'_0 κ_13, λ_14 = c^(1),1_1β'_2 ( κ_14 - c^(2),0_2/c^(1),0_2κ_12),
λ_21 = √(5)c^(1),0_2 λ'_31 + √(5) c^(2),0_2 λ'_41 , λ_22 = -√(2)c^(1),0_2/c^(1),1_1λ'_32 - √(2)c^(2),0_2/c^(1),1_1λ'_42,
λ_23 = c^(1),0_2 β'_1 ( λ'_33 - c^(2),1_1/c^(1),1_1λ'_32) + c^(2),0_2 β'_1 ( λ'_43 - c^(2),1_1/c^(1),1_1λ'_42), λ_24 = c^(1),0_2 β'_3λ'_34 + c^(2),0_2 β'_3λ'_44,
λ_31 = -√(5/2)λ'_41/β'_2, λ_32 = λ'_42/c^(1),1_1 β'_2, λ_33 = -√(2)/2β'_1/β'_2( λ'_43 - c^(2),1_1/c^(1),1_1λ'_42), λ_34 = -√(2)/2β'_3/β'_2λ'_44,
λ_41 = -3√(10)/2β'_3 μ_1( κ_21 + c^(2),1_1 μ_2/c^(1),1_1κ_11), λ_42 = 1/ c^(1),0_2 β'_3 μ_1 ( κ_22 + c^(2),1_1 μ_2/c^(1),1_1κ_12),
λ_43 = -√(2)β'_0 /β'_3 μ_1( κ_23 + c^(2),1_1 μ_2/c^(1),1_1κ_13),
λ_44 = -√(2)β'_2/β'_3 μ_1[κ_24 - c^(2),0_2 /c^(1),0_2κ_22 + c^(2),1_1 μ_2/c^(1),1_1(κ_14 - c^(2),0_2/c^(1),0_2κ_12) ],
λ_45 = [ 1 + (c^(2),1_1/c^(1),1_1)^2 ]β'_1 μ_2/β'_3 μ_1, λ_51 = 1/c^(1),0_2λ'_61/β'_3, λ_52 = 1/c^(1),0_2λ'_62/β'_3, λ_61 = 1/c^(1),0_2λ'_71/β'_3.
Here μ_i and κ_ij are respectively given in (<ref>) and (<ref>). We remark that for Maxwell molecules λ_23 = λ_33=0.
§ TABLES OF COEFFICIENTS IN THE INVERSE-POWER-LAW MODEL
In this section, we list the value of β_i, ℒ^(mn)_l and c^(1),*_* appearing in the moment equations (<ref>)(<ref>) as Table <ref>, and λ_ij in the boundary conditions (<ref>)–(<ref>) as Table <ref> for various choices of parameter η in the inverse-power-law model that we considered in Section <ref>.
|
http://arxiv.org/abs/2303.06791v1
|
20230313003904
|
Beyond Single Items: Exploring User Preferences in Item Sets with the Conversational Playlist Curation Dataset
|
[
"Arun Tejasvi Chaganty",
"Megan Leszczynski",
"Shu Zhang",
"Ravi Ganti",
"Krisztian Balog",
"Filip Radlinski"
] |
cs.IR
|
[
"cs.IR",
"cs.CL"
] |
Google Research
[email protected]
Work done while interning at Google Research.
Stanford University
[email protected]
Google Research
[email protected]
Google Research
[email protected]
Google Research
[email protected]
Google Research
[email protected]
definitionDefinition
assumptionAssumption
hypothesisHypothesis
propositionProposition
theoremTheorem
lemmaLemma
corollaryCorollary
algAlgorithm
exampleExample
Users in consumption domains, like music, are often able to more efficiently provide preferences over a set of items (e.g. a playlist or radio) than over single items (e.g. songs).
Unfortunately, this is an underexplored area of research, with most existing recommendation systems limited to understanding preferences over single items.
Curating an item set exponentiates the search space that recommender systems must consider (all subsets of items!):
this motivates conversational approaches—where users explicitly state or refine their preferences and systems elicit preferences in natural language—as an efficient way to understand user needs.
We call this task conversational item set curation and present a novel data collection methodology that efficiently collects realistic preferences about item sets in a conversational setting by observing both item-level and set-level feedback.
We apply this methodology to music recommendation to build the Conversational Playlist Curation Dataset (CPCD), where we
show that it leads raters to express preferences that would not be otherwise expressed.
Finally, we propose a wide range of conversational retrieval models as baselines for this task and evaluate them on the dataset.
Beyond Single Items: Exploring User Preferences in Item Sets with the Conversational Playlist Curation Dataset
Filip Radlinski
March 30, 2023
================================================================================================================
introIntroduction
In recent years, conversational agents have become increasingly popular for a variety of tasks, including recommendation systems <cit.>.
The conversational paradigm is especially suited for recommendation tasks, because of the convenience of using natural language to express preferences and provide feedback <cit.>.
Most existing conversational recommendation methods focus on recommending individual items <cit.>.
However, there are also scenarios where the user aims to create a set of items from a larger collection—creating a music playlist for a given context, like working out or for a long drive, is a common manifestation of this problem.
In this setting, the goal of the conversational agent is to aid the user in the selection of a set of items that the user has in mind.
The problem of recommending sets of items in a conversational setting, which we refer to as conversational item set curation, is still largely unexplored.
We use the term curation to highlight that this is a collaborative and iterative process that requires the conversational agent to elicit and understand the user's preferences in order to effectively aid them.
In this work, we propose a framing of this novel problem, create a representative dataset, and present and experimentally evaluate a set of baselines.
The problem of conversational item set curation differs from prior work on entity set retrieval <cit.> in a number of important ways.
First, what constitutes a relevant item for a set is highly subjective; different people would find different music “energetic” or “relaxing” for a given context. The conversational setting allows for natural feedback both on the item and on the set level.
Second, the curation of the item set is more iterative and interactive than entity set retrieval, as the conversational agent must engage in a back-and-forth dialogue with the user in order to fully understand their preferences. This requires the development of more sophisticated dialog management techniques, including effective strategies for balancing exploration and exploitation as well as the ability to handle uncertainty and ambiguity in the user's responses.
We break down the problem of conversational item set curation into a set of more specific tasks, in order to provide a clear and specific focus for further research in this space.
Specifically,
(1) conversational item retrieval is the task of returning relevant items from a collection based on the conversation history;
(2) conversational item set refinement identifies which and how many retrieved items to use to update the item set; and
(3) conversational elicitation/explanation generation is concerned with the generation of questions for eliciting user preferences either via direct questions or indirectly via user feedback provided on the explanations that accompany the system's recommendations.
A prerequisite first step to allow research on the above tasks is the construction of a dataset with the desired characteristics.
We present a novel human-to-human data collection methodology that efficiently acquires realistic preferences about item sets that are incrementally constructed, observing both item-level and set-level feedback.
Specifically, we perform the data collection within the domain of music recommendation, although we expect it to be applicable to most recommendation domains, where item sets are natural units of consumption (e.g., compiling reading lists or healthy dinner recipes).
We implement a high-fidelity multi-modal conversational user interface, where users can listen to songs and leave both item- and set-level feedback.
Using this methodology, we build and publicly release the Conversational Playlist Creation Dataset (CPCD), comprising of over 900 dialogues
containing with 4,800 utterances that express a wide range of preference statements and are paired with over 22,000 item ratings.
See example for an example conversation from the dataset.
Finally, we use this dataset to experimentally compare a range of conversational retrieval models that are meant to serve as representative baselines.
Specifically, we focus on the first sub-task of conversational item retrieval and propose an evaluation methodology that adapts standard retrieval metrics to the multi-turn conversational setting.
We find that, while both sparse and dense retrieval methods are useful for this task, our best performing method is a dual encoder architecture <cit.> pretrained using unsupervised contrastive learning <cit.> and fine-tuned on the CPCD development set.
There remains significant headroom for improvement.
In summary, our key contributions are:
* We introduce the task of conversational item set curation, a collaborative task where a user interacts with a system to curate a (small) set of items that meet the user's goal from a (large) collection.
* We develop a data collection methodology for conversational item set curation.
* We apply this methodology in the music domain to collect the Conversational Playlist Curation Dataset, which is made available at https://bit.ly/conversational-playlist-curationbit.ly/conversational-playlist-curation.
* We present a wide range of conversational retrieval models as baseline approaches and evaluate them on this dataset.
relatedRelated work
related-datasetsConversational Recommendation Datasets
A key contribution of this work is a new conversational recommendation dataset, the Conversational Playlist Curation Dataset ().
There are several existing conversational recommendation datasets collected by pairing a “user” and “wizard” to talk to each other:
in some settings, as with , the user has an open-ended dialog with the wizard <cit.>;
in others users are asked to follow instructions (e.g., mention a specific preference) in each turn of the dialog <cit.>.
Existing datasets all focus on recommending a single item (typically a movie) to the user;
in contrast, our work focuses on recommending a set of items (songs in particular).
To the best of our knowledge, is the first such dataset.
This distinction leads to several important differences in methodology from prior work:
first, we allow users and wizards to preview recommendations so that they can react accordingly;[
While <cit.> allow users to preview recommended movies at the end of the task prior to rating them, they can't do so during the conversation.
]
second, we allow users to share explicit item ratings with wizards in addition to their responses, leading to more open-ended feedback that often includes soft attributes <cit.>;
finally, we employ wizards with relevant domain expertise to respond with relevant recommendations.
In addition, provides a larger set of candidate and relevant items, making it suitable to evaluate the recommendation component of conversational recommendation systems.
datasets summarizes some of the key differences of with prior work.
An alternative to manually collecting data include synthetic data approaches for conversational recommendation systems (CRSs),
e.g.,
using item rating data <cit.>,
textual review data <cit.>,
or user logs (e.g., watch history) <cit.>.
<cit.> and <cit.> generate dialogs using natural language templates, while <cit.> retrieve candidate utterances and then use human annotators to rewrite them to be more conversational.
§.§ Conversational Information Seeking
Beyond recommendation,
conversational information seeking (CIS) systems help users find information through a sequence of interactions that can include search and question answering <cit.>.
Such systems also seek to enable users to provide direct feedback to improve their results without needing to rely on as much historical interaction data as collaborative filtering-based RSs <cit.>.
As a result, our work builds on existing work in modeling conversational search and conversational question answering <cit.>.
§.§ Entity Retrieval
Finally, item set recommendation is closely related to entity retrieval <cit.>, with
analogies to entity list completion or example-augmented search <cit.>.
In entity list completion, the input consists of a textual query and a small set of example entities;
in conversational item set recommendation, the input consists of the conversation history (textual query) and the current item set (example entities).
We follow recent work in dense entity retrieval, and evaluate baselines that use a dual encoder to embed queries and items <cit.>.
taskTask definition
Conversational item set curation is a collaborative task where a user interacts with a system to curate a set of items from a larger collection (cpcd-overview).
We use the term curate to emphasize the collaborative and iterative nature of the task:
the goal is to identify not just a single item that matches the user's preferences, but a collection of items that may span a range of interests, but must be ultimately cohesive with the theme or goal of the collection.
While some themes may be narrow (“collection of Elvis Preseley's greatest hits”), others may be broad (“rock music for a long drive”).
In the following, we focus on the music domain where items are songs and the item set is a playlist.
The user begins the task by stating an overall theme or goal for their item set in their first utterance X_1, e.g. “I'd like to create a playlist to listen to during Christmas with the family,”
and the system (possibly proxied by a human wizard) responds with an initial playlist Z_1 and an utterance E_1 that explains its choice and elicits more information from the user.
In following turns t, the user critiques their working playlist Z_t-1 in their response to the system X_t.
The system in turn uses the user feedback to retrieve additional songs Y_t and responds with an updated playlist Z_t and response E_t.
Note that the system must decide how many results (if any) from Y_t it should include when updating the playlist Z_t.
This process continues for T turns until the user is satisfied with their playlist.
Conversational item set curation (CIsC) can be formalized as the task of going from the user goal X_1 to an item set that meets their goal Z_n.
Given a conversation history, H_t = (X_1, Z_1, E_1, …, X_t), a conversational item set curation system must solve three sub-tasks: first, it must retrieve relevant items Y_t from the item corpus (conversational item retrieval), then it must update the item set Z_t (conversational item set refinement) and finally it must generate a response E_t (conversational elicitation / explanation generation).
In this paper, our primary focus will be on conversational item retrieval.
Next, we describe the sub-tasks in further detail:
Conversational Item Retrieval (CIRt)
In each turn, the system uses the conversation history H_t to retrieve and rank relevant items Y_t from the item collection .
To provide contextually relevant recommendations to the user, the system must understand refinements or critiques (“Got anything from old Stevie Wonder?” in cpcd-overview) and soft attributes (“playlist for a sunny day” in example).
Finally, we note that the scope of CIRt limited to preferences stated by the user thus far; eliciting further preferences is handled below.
We propose evaluating the output of CIRt, Y_t, against the target item set Z_T using standard information retrieval metrics such as MRR or Hits@k in eval.
Conversational Item Set Refinement (CIsR)
Given a list of relevant recommendations from CIRt, the task of CIsR is to identify which and how many of these items should be used when updating the item set.
As reasonable heuristic would add the top k items retrieved by CIRt, but a better method could take into account the confidence and diversity of the retrieved items.
Alternatively, users could be presented all the results from CIRt and be asked to perform item set refinement themselves.
CIsR can be evaluated against Z_t using set-inclusion metrics like precision and recall.
We leave further modeling of this component to future work.
Conversational Elicitation / Explanation Generation (CEEG)
Finally, user requests are often underspecified;
to provide better recommendations, systems can elicit preferences from users, e.g., by asking them for a genre or probing for why they liked what they like <cit.>.
In addition, providing an explanation of its recommendation makes the system more scrutable to users and allows them to better steer the system <cit.>.
While the dataset proposed in this paper includes system responses that exhibit elicitation and explanations, we leave modeling this component to future work.
methodologyMethodology
Our key contribution is a new dataset, , to benchmark conversational item set curation systems.
Similar to prior work, we use a human-to-human methodology to collect :
two human raters are recruited to play the role of a user and the system (“a wizard”).
However, to faithfully simulate conversational item set recommendation in consumption domain such as music presents additional challenges:
first, preferences are extremely personal—“pop music” for one person can be wholly different for another;
second, they are deeply contextual—“pop music” for a party may be different from “pop music” for doing household chores;
third, they are often grounded in the audio content and are hard to understand using only text;
and finally they require substantial domain expertise from wizards to provide relevant recommendations.
We address these challenges as follows: we encourage users to personalize the data collection task by asking them to begin each conversation with a specific music-listening scenario in their own lives (e.g., “walking to work”).
This allows users to relate to the task and fixes the context for the conversation and their listening preferences.
Next, we implement a high-fidelity interface wherein users and wizards can listen to songs during the task.
We found that this was particularly helpful for wizards to better understand users' tastes.
Additionally, we implement a multi-modal interface where users can provide explicit item-level feedback in the form of likes and dislikes, allowing them to focus on broader set-level feedback in their replies.
Finally, in pilot studies, we found that the task required wizards to not only be familiar with music in general, but also with the sub-genres pertinent to the user's interests: wizards with less relevant expertise took longer to perform the task, and had less engaging conversations that were driven entirely by the user.
We address this problem by asking users and wizards to each fill in a survey of their general genre-level preferences, and then matching users with wizards who were most familiar with the users' preferred genres.
§.§ Interface design
A high-fidelity multimodal interface was critical for this complex data collection task.
The user-facing interface displays the conversational history and the current playlist as recommended by the system (user-facing-interface).
Users can sample songs from their working playlist and provide explicit item-level feedback in the form of likes and dislikes.
Users end their turn by responding to the system via text,
and are allowed to submit the task after completing at least 5 rounds of conversation and having rated at least 15 songs.
Before submitting the task, users complete a short survey where they rate
the completeness of their playlist,
their satisfaction with the playlist,
the understanding capabilities of the system,
its helpfulness, and
their overall experience with the system
(end-task-ratings).
Wizards are presented a similar interface with an additional element: a music search tool that wizards use to add songs to the user's playlist (wizard-facing-interface).
The music search uses the https://developers.google.com/youtube/v3/docs/search/listYouTube Search API.
We note that the API is limited in its capabilities and tends to return results with a high lexical overlap.
To preserve user privacy, the search results were not personalized.
Wizards were encouraged to search for related artists or recommendations via Google or YouTube Music.
§.§ Rater Recruitment and Training
We recruited 10 wizards and 110 users who were fluent English speakers and regularly listened to music from a crowdsourcing vendor.
To control for cultural differences, we required both users and wizards to reside in the U.S.
The wizards were additionally required to have significant music expertise and have performed several music labeling tasks in the past.
Both users and wizards were provided training material in the form of slides.
Users were primed with the following description of the task:
In this study, you will create a personal music playlist for a purpose (e.g., “while doing chores” or “when I’m feeling down”) by having a conversation with a system.
They were then asked to come up with several scenarios for each conversation in preparation for the task.
Users were informed that another person (the wizard) was facilitating the conversation and encouraged to be descriptive in their requests by telling the system what they liked or didn't like, and why.
Users were given instructions on how to use the interface, but were provided no further guidance on what to say.
In contrast, wizards went through multiple pilot rounds of training before beginning the task.
During the pilot rounds, they were paired amongst themselves, and given feedback on how they should respond to users.
During the task, wizards also assisted users with any interface issues (e.g., how to rate items).
Users and wizards were scheduled to interact for a fixed block of time (between 1 and 3 hours), and conducted multiple conversations during this interval.
In order to pair users and wizards, they each completed a short music preferences survey asking them to list where they listen to music (context-survey) and how familiar they are with various genres (genre-survey).
For each user, we ranked wizards based on their overlap with the genres the user expressed familiarity with and tried to pick the top-ranked available wizard for every user subject to scheduling constraints.
Based on pilot feedback, we only matched wizards that were at least somewhat familiar with at least one genre that the user indicated a preference for.
To avoid priming their conversations, users and wizards were not informed of which genres they matched on.
§.§ Post-processing
After collecting the data, we took several manual and automated steps to process the data.
First, we standardized all white space in the utterances.
Often conversations would begin with the user and wizard checking for each other's presence (e.g., by saying “hi”); these turns were merged with subsequent ones so that the first turn included the goal statement (e.g., “Hi, I'd love to create a playlist for classical songs”).
After about 20 minutes, wizards would nudge users to proceed to evaluation:
these utterances were removed along with any other turns at the end of the conversation where no songs were added.
We then manually reviewed the data to identify and remove any turns where users or wizards side-channeled debugging information (e.g., “I don't see any items,” “please rate items so I know what you like”).
Finally, we scraped and included metadata (i.e., titles, artists and album names) for each song mentioned in the dataset.
analysisDataset analysis
We now take a deeper look at the dataset.
In total, after filtering and post-processing, the dataset contains 917 conversations that are randomly split into development and test sets; see dataset-stats.
examples includes a few example conversations from the dataset.
On average, each conversation includes about 5.7 turns each for the user and wizard, and ends with a final playlist of about 19 songs.
Users rate about 4.8 songs in each turn, of which about 20% are negative ratings.
In total, the dataset includes over 100k unique songs that serve as the item corpus for retrieval tasks.
Next, we analyze the distribution of preferences expressed by users and elicited by wizards.
To do so, we manually annotated 220 turns from 41 conversations.
After exploratory analysis, we identified 6 key categories of preferences for users and and 4 for wizards; preference-examples lists these categories with typical examples.
While artist and genre based preferences make up a majority of the dataset, over 30% of preferences include soft attributes such as activities, sounds, moods, and more.
Additionally, many artist preferences use artists as a point of reference (e.g., “Maybe something from 2pac and Ice Cube?”).
Users express preferences in 80% of turns, while wizards elicit preferences 29% of the time.
We also observed that only about 5% of preferences in the dataset are negative preferences, e.g. “Those might be too similar, though I do prefer them to not have any lyrics.”
preferences-by-turn shows how the relative frequency of different preferences change across turns.[
We only show the first 5 turns in preferences-by-turn as the number of data points sharply drops after 5 turns.
]
Activity and genre preferences are often expressed early in the conversation, and maintained as part of the conversation context in later turns.
Wizards often begin by eliciting the user for their preferences, and thus add fewer songs to the playlist in the first turn (per-turn-ratings).
We note that wizards often elicited users for artists and genres, which were the attributes that worked most reliably with the search tool; we believe this played a role in the wizards' choices.
Finally, end-task-ratings summarizes the distribution of post-task user ratings.
Users were overall satisfied by the experience and
expressed that the system understood their preferences well and was very helpful in assisting them on the task.
They also expressed that they thought their playlist was mostly complete, and that they would listen to it again.
The post-task ratings were weakly correlated with the match scores, with Spearman rank correlation ranging from 0.11 for playlist satisfaction to 0.19 for system helpfulness (p < 0.05 in all cases), suggesting marginal benefit beyond ensuring wizards were at least somewhat familiar with genres the user was familiar with.
baselinesModeling Conversational Item Retrieval
We focus on modeling conversational item retrieval, and leave conversational item set refinement and conversational elicitation and explanation generation to future work.
In particular, we consider three canonical retrieval modeling approaches: sparse retrieval, dense retrieval, and query rewriting.
sparse-modelSparse Retrieval: BM25
BM25 is a commonly used sparse, bag-of-words ranking function that measures the relevance of a document or x to a query q.
We use BM25 in a sparse retrieval system by treating each item in the retrieval corpus as a candidate document represented in text as “,” and returning the top ranked items for each query.[
We used the hyperparameters k_1 = 1.5 and b=0.75 in our implementation.
]
We include conversation history in queries by concatenating user queries from previous turns (omitting conversation history led to worse performance).
For consistency with the dense retrieval methods below, we use SentencePiece <cit.> to tokenize both queries and documents.
model-inputsDense Retrieval Methods
We consider a popular and efficient dense retrieval method: a dual encoder <cit.>.
Dual encoders independently embed queries q and items x into normalized dense vectors using a neural network,
and retrieve the most similar items for a query using cosine similarity:
ρ(x; q) = f(q)^⊤ g(x),
where f: →^d and g: →^d are embedding functions for queries and items, respectively.
At turn t, we represent the using the conversation history H_t = (X_1, Z_1, E_1, …, X_t) in text by concatenating user utterances with text representations of the top-k (k=3) songs added to the item set in each turn in reverse chronological order.
For example, the query at turn t is:
X_t d(δ Z_t-1) X_t-1… d(δ Z_1) X_1,
where d(δ Z_t) is a textual representation of the items (same as in BM25) added to the item set in turn t, and represents a separator token.
We do not include the previous system response (E_t) in the query.
§.§.§ Training and Inference
For training, we use a standard contrastive loss with in-batch negatives:
given an example i with query q_i and target item set Z_i,
we randomly sample an item from x_i ∈ Z_i to be a positive target,
and take items from other item sets in the batch, x_j where j ≠ i, to be negative targets.
Additionally, we augment the training data to improve robustness as follows:
(1) we generate conversations of varying lengths by randomly truncating conversations to its first t turns, and
(2) we generate historical item sets of varying lengths by randomly truncating them to their first k items.
§.§.§ Model implementation.
We use a shared encoder for f and g initialized either from a pre-trained T5 1.1-Base checkpoint <cit.> or a T5 1.1-Base checkpoint that has been further pre-trained on retrieval tasks using the Contriever objective <cit.>.
We then fine-tune the encoder on for 1,000 steps using Adafactor <cit.> with a batch size of 512 and a constant learning rate of 1e-3 (further fine-tuning led to overfitting).
We denote these methods as DE and Contriever respectively.
Additionally, to explore other relevant training data, we also fine-tuned a T5 1.1-Base checkpoint on a proprietary collection of 15,276 expertly curated playlists, , by using its playlist descriptions as queries and the playlists themselves as the target item sets.
We denote this system as .
For inference, we build an index of pre-computed item embeddings using each method's respective encoder.
We embed queries as in training, and use nearest neighbor search to return the top-k items for q_t.
query-rewritingQuery rewriting methods
Query rewriting or de-contextualization rewrites a query to incorporate conversation history, and has been widely used in state-of-the-art conversational search systems <cit.>.
Following prior work <cit.>, we fine-tune a T5-based query rewriter on the CANARD dataset <cit.> and use it to rewrite the queries in CPCD.
We adapt two of the above methods, BM25 and , to use a query rewriter by replacing the conversation history with rewritten queries; the resulting methods are named BM25+QR and +QR respectively.
evalEvaluating Recommendation Performance
We now use to evaluate the conversational item retrieval methods described in baselines.
exp-setupExperimental Setup
§.§.§ Baselines.
We evaluate the following baseline methods: BM25, BM25+QR, , +QR, DE, and Contriever.
Additionally, we include a popularity baseline that returns the top 100 songs from the development set for every query in the test set.
§.§.§ Evaluation metrics.
Evaluating recommendation systems is challenging because
there are often missing ratings <cit.>:
we do not know whether an unrated song would be liked or disliked by a user.
Standard ranking-based metrics treat items without ratings as not relevant—even though they may actually be relevant—and thus provide a lower bound on the recommendation performance.
Following prior work <cit.>, we compare systems using a standard ranking metric, Hits@k,
which is 1 if and only if any of the top-k retrieved songs are in the target item set.
Unless otherwise stated, we report a macro-averaged Hits@k, by averaging Hits@k across turns within a conversation and then across conversations.
We report Hits@k for multiple values of k (10, 20, 100):
while smaller values are more representative of realistic scenarios where users only consider a small set of items, <cit.> found that larger values of k have more discriminative power in offline experiments and can help mitigate the missing rating problem.
Evaluating conversational recommendation systems poses an additional challenge: how to support evaluation across multiple turns.
Different systems may recommend different items in previous turns, leading to divergent histories.
To fairly compare across models within a turn, we assume a shared “gold” history and target item set across all models.
Additionally, we remove any items in the target item set that also appear in the gold history.
When there are additional songs liked in a turn, but not added to the history (e.g., when there is a limit to the number of songs in the history), we keep them in the target item set as leftovers <cit.>, resulting in a larger target item set.
§.§ Main Results
benchmark_results compares models on the CPCD test set.
As expected, the popularity baseline is among the worst evaluated, and its performance reflects the degree of overlap between the development and test sets: about 26% of songs liked in the development set were also liked in the test set and 38% of the top 100 songs in the development set also appear in top 100 songs of the test set.
Next, the sparse retrieval baseline, BM25, does significantly better than the popularity baseline and is the second best method overall.
In particular, we find that BM25 scores highly on artist-based queries which are well-suited to sparse bag-of-words based methods.
Furthermore, the search tool used by wizards appears to rely on lexical overlap, which may bias the results in favor of sparse methods.
We found that using query rewriting either did not improve or hurt performance: we attribute this to the rewriter not generalizing well to the music-seeking queries in CPCD; better query rewriting methods are a promising avenue for future work.
Finally, the performance of the dense retrieval methods depended on both the fine-tuning dataset as well as the pretraining strategy:
while training on playlist descriptions (DE) outperforms the popularity baseline, it still lags far behind BM25,
and training solely on the (DE) does even worse due to insufficient training data.
In contrast, training on from a model pretrained for the retrieval task (Contriever) is the best method we evaluated and significantly outperforms BM25 (p < 0.05).
conclusionConclusion
We introduced the task of conversational item set curation to capture recommendation scenarios, such as music consumption, where users are looking for a set of items instead of individual ones.
In these settings, we imagine users to collaborate with a system to iterative curate an item set through conversation.
Given a conversation history, we subdivided the task into conversational item retrieval (CIRt), conversational item set refinement (CISR) and conversational elicitation and explanation generation (CEEG).
To facilitate research in conversational item set curation and its subtasks, we developed an efficient data collection methodology and used it to create the Conversational Playlist Curation Dataset (CPCD).
The dataset contains rich preference statements from both users and wizards that are unique to the item set recommendation setting.
Finally, we used the data to evaluate a wide range of conversational item retrieval methods.
Specifically, our evaluation focused on the CIRt subtask, where we showed that both sparse and dense retrieval methods are useful.
Further modeling—e.g., pretraining paradigms that target conversational music recommendation or explicitly modeling audio content—is necessary to improve performance on this task.
In future work, we plan to explore using CPCD how to model and evaluate the remaining subtasks, CISR and CEEG, by utilizing the search actions and responses collected from wizards.
ACM-Reference-Format
|
http://arxiv.org/abs/2303.07050v1
|
20230313121457
|
Evaluation of wait time saving effectiveness of triage algorithms
|
[
"Yee Lam Elim Thompson",
"Gary M Levine",
"Weijie Chen",
"Berkman Sahiner",
"Qin Li",
"Nicholas Petrick",
"Jana G Delfino",
"Miguel A Lago",
"Qian Cao",
"Qin Li",
"Frank W Samuelson"
] |
stat.AP
|
[
"stat.AP"
] |
firstpagehf
Classification of blazar candidates of unknown type in Fermi 4LAC by unanimous voting from multiple Machine Learning Algorithms
[
Accepted xxxx xxxxxx xx. Received xxxx xxxxxx xx; in original form xxxx xxx xx
===============================================================================================================================
In the past decade, Artificial Intelligence (AI) algorithms have made promising impacts to transform healthcare in all aspects. One application is to triage patients’ radiological medical images based on the algorithm's binary outputs. Such AI-based prioritization software is known as computer-aided triage and notification (CADt). Their main benefit is to speed up radiological review of images with time-sensitive findings. However, as CADt devices become more common in clinical workflows, there is still a lack of quantitative methods to evaluate a device’s effectiveness in saving patients' waiting times. In this paper, we present a mathematical framework based on queueing theory to calculate the average waiting time per patient image before and after a CADt device is used. We study four workflow models with multiple radiologists (servers) and priority classes for a range of AI diagnostic performance, radiologist's reading rates, and patient image (customer) arrival rates. Due to model complexity, an approximation method known as the Recursive Dimensionality Reduction technique is applied. We define a performance metric to measure the device’s time-saving effectiveness. A software tool is developed to simulate clinical workflow of image review/interpretation, to verify theoretical results, and to provide confidence intervals of the performance metric we defined. It is shown quantitatively that a triage device is more effective in a busy, short-staffed setting, which is consistent with our clinical intuition and simulation results. Although this work is motivated by the need for evaluating CADt devices, the framework we present in this paper can be applied to any algorithm that prioritizes customers based on its binary outputs.
§ INTRODUCTION
The fast-growing development of artificial intelligence (AI) and machine learning (ML) technologies bring a potential to transform healthcare in many ways.
One emerging area is the use of AI/ML as Software as a Medical Device (SaMD) in radiological imaging to triage patient images with time-sensitive findings for image interpretation <cit.>.
These devices are known as computer-aided triage and notification (CADt) devices, by which medical images labeled as positive by an AI algorithm are prioritized in the radiologist's reading queue.
The major benefit of a CADt device is to increase the likelihood of timely diagnosis and treatment of severe and time-critical diseases such as large vessel occlusion (LVO), intracranial hemorrhage (ICH), pneumothorax, etc.
In 2018, the U.S. Food and Drug Administration (FDA) granted marketing authorization to the first CADt device for potential LVO stroke patients via the de novo pathway <cit.>.
Since then, multiple studies have shown improvements in patient treatment and clinical outcomes due to the use of CADt devices <cit.>.
Most of these analyses focus on the diagnostic performance when evaluating these CADt devices, but a quantitative estimate of time savings for truly diseased (signal-present) patient images in a clinical environment remain unclear.
Therefore, the goal of this work is to fill this gap by developing a queueing-theory based tool to characterize the time-saving effectiveness of a CADt device in a given clinical setting.
Figure <ref> illustrates the radiologist workflows without and with a CADt device being used.
In the standard of care without a CADt device, patient images are reviewed by a radiologist on a first-in, first-out (FIFO) basis.
In the context of queuing theory, our servers are radiologists, and our customers are patient images.
Occasionally, the radiologist may be interrupted by an emergent case, for example, when a physician requests an immediate review of a specific patient image.
To distinguish these emergent cases from those in the reading queue, we call the images in the reading list “non-emergent."
If a CADt device is included in the workflow, the device only analyzes non-emergent patient images.
Cases labeled as AI-positive are either flagged or moved up in a radiologist's reading list, giving them higher priority, and the radiologist will review those cases before all AI-negative patient images.
Just like the without-CADt scenario, the radiologist may be interrupted by emergent cases, which always have the highest priority over other images.
Overall, without a CADt, we have a queue with two priority classes, and we have a queue with three priority classes in a with-CADt scenario.
It is noted that, though applied to radiology clinics, the mathematical frameworks presented here could be used to evaluate discrimination algorithms in other queueing contexts.
For example, algorithms may attempt to identify customers or jobs who may require less service time and place them into a higher priority class, thereby reducing overall wait time for customers on average.
§ PARAMETERS
Before applying queueing theory, a few parameters are defined to describe the clinical setting.
* f_em is the fraction of emergent patient images with respect to all patient images.
* λ is the Poisson arrival rate of all patient images.
Patient images can be divided into subgroups, and each subgroup i has a Poisson arrival rate λ_i = p_iλ, where p_i is the fraction of image subgroup i with respect to all patient images.
* The disease prevalence π is defined within the non-emergent patient population, i.e.
π = Number of diseased, non-emergent cases/Number of non-emergent cases.
* CADt diagnostic performance is defined by its sensitivity (Se) and specificity (Sp), which are also defined within the non-emergent patient images i.e.
Se = 0.85Number of AI-positive, diseased, non-emergent cases/Number of diseased, non-emergent cases,
and
0.85Sp = Number of AI-negative, non-diseased, non-emergent cases/Number of non-diseased, non-emergent cases.
* N_rad is the number of radiologists on-site.
Typically, a clinic has at least one radiologist at all times.
For a larger hospital, multiple radiologists may be available during the day.
* The radiologist's reading rates are denoted by μ's.
For emergent (highest-priority) cases, the reading time T_em is assumed to be exponentially distributed with an average reading rate μ_em=1/T_em.
For a non-emergent image, the average reading rate depends on the radiologist's diagnosis i.e. μ_D if diseased image or μ_ND if non-diseased image.
Therefore, in the without-CADt scenario, the reading time of the non-emergent (lower-priority) cases follows a hyperexponential distribution where the mean (1/μ_nonEm) is determined by the mean reading rates of the two subgroups and the probability of disease prevalence π.
1/μ_nonEm = π/μ_D + 1-π/μ_ND.
In the with-CADt scenario, the average reading rates for AI-positive (middle-priority) and AI-negative (lowest-priority) classes are denoted by μ_+ and μ_- respectively.
The AI-positive group consists of true-positive (TP) and false-positive (FP) patients, and the probability that an AI-positive case is a TP is defined by the positive predictive value (PPV).
Hence,
1/μ_+ = PPV/μ_D + 1-PPV/μ_ND.
Similarly, the average AI-negative reading rate is given by
1/μ_- = 1-NPV/μ_D + NPV/μ_ND,
where NPV is the probability that an AI-negative case is a true-negative (TN).
* ρ is the traffic intensity defined as ρ = λ/μ_eff, where μ_eff is effective reading rate considering all priority classes and N_rad in the queueing system.
ρ ranges from 0 with no patient images arriving to 1 implying a very congested hospital.
* With regard to the queueing discipline, when no CADt device is used, patient images are read in the order of their arrival time i.e. first-in first-out (FIFO).
In the with-CADt scenario, we consider a preemptive-resume priority scheduling:
whether or not a CADt device is used, whenever a higher-priority patient image enters the system, the reading of a lower-priority patient image will be interrupted and later resumed.
Although in reality some radiologists may prefer finishing up the current lower-priority image when a CADt device flags a higher-priority case (which would be a non-preemptive-resume priority), many CADt devices are designed assuming a radiologist reads the flagged cases immediately.
Therefore, a preemptive-resume priority is assumed in this work.
To assess the time-saving effectiveness of a given CADt device in a clinical setting defined by the above parameters, we first define four radiologist workflow models in Section <ref>.
For each of the models, we provide the Markov chain matrices to compute the mean waiting time for each priority class in both with- and without-CADt scenarios.
Section <ref> discusses an in-house simulation software developed to verify theoretical results and to provide confidence intervals around the theoretical mean time savings.
Section <ref> defines a metric that quantifies the time-saving effectiveness of a CADt device, and Section <ref> discusses the results obtained from theory and simulation.
§ RADIOLOGIST WORKFLOW MODELS
We consider four radiologist workflow models:
* Model A: The baseline model (N_rad = 1, f_em = 0, and μ_D = μ_ND)
* Model B: Model A but with emergent patient images (N_rad = 1, f_em > 0, and μ_D = μ_ND)
* Model C: Model B but with two radiologists (N_rad = 2, f_em > 0, and μ_D = μ_ND)
* Model D: Model B but with different reading rates for diseased and non-diseased images (N_rad = 1, f_em > 0, and μ_D ≠μ_ND)
For each model, two calculations are performed: one assumes a without-CADt scenario, and the other assumes the use of a CADt device.
Each scenario has a set of states that keeps track of the numbers of patient images in different priority classes.
The transition rates among states form a stochastic Markov chain matrix, from which the matrix geometric method is applied to calculate the set of state probabilities <cit.> .
For models involving multiple radiologists and priority classes, we apply the Recursive Dimensionality Reduction (RDR) method proposed by <cit.> to facilitate the calculation.
Little's Law <cit.> is then applied to calculate the mean waiting time per patient image for each priority class involved.
§.§ Model A: Baseline model
We start with a simple model with the absence of emergent patient images (f_em = 0), one radiologist on-site (N_rad = 1), and identical reading rates for diseased and non-diseased subgroups (μ_D = μ_ND).
§.§.§ Model A in without-CADt scenario
First, we consider the without-CADt scenario.
Given that f_em = 0, only one priority class (the non-emergent subgroup) exists, and the arrival rate λ is the arrival rate of non-emergent patient images λ_nonEm.
When μ_D = μ_ND and with only 1 radiologist on-site, the effective reading rate for the non-emergent subgroup is μ_nonEm = μ_D = μ_ND.
Hence, Model A turns into a classic M/M/1/FIFO queueing model <cit.>.
Its transition diagram is shown in Figure <ref>, from which the state probability p_n is given by
p_n_nonEm = ρ_nonEm^n (1-ρ_nonEm),
where n_nonEm denotes the number of non-emergent patient image in the system.
From the state probability p_n_nonEm, the average waiting time per non-emergent patient image can be calculated by the following steps.
* Calculate the average number of non-emergent patient images in the system, L, from the state probability p_n_nonEm. That is, L =⟨ p_n_nonEm⟩, where ⟨⟩ is the expectation operator.
* Calculate the average response time per non-emergent patient image, W, via Little's Law i.e. W = L/λ_nonEm.
* Calculate the average waiting time in the queue per non-emergent patient, W_q_nonEm.
Because W is the sum of W_q_nonEm and the mean radiologist's reading time T=1/μ_nonEm, we have W_q_nonEm = W - 1/μ_nonEm.
In summary, the average waiting time per non-emergent patient image W_q_nonEm in a without-CADt scenario is given by
W_q_nonEm = ⟨ p_n_nonEm⟩/λ_nonEm - 1/μ_nonEm.
§.§.§ Model A in with-CADt scenario
When a CADt-device is used with no emergent patient images (f_em = 0), two priority classes exist: an AI-positive, higher-priority class and an AI-negative, lower-priority class.
The arrival rates of AI-positive and AI-negative classes depend on the CADt diagnostic performance.
λ_+ = [πSe + (1-π)(1-Sp) ]λ,
λ_- = [π(1-Se) + (1-π)Sp]λ.
The state of a two-priority class system is defined by the number of AI-positive cases n_+ and that of AI-negative n_-.
As shown in Figure <ref>, the exact transition diagram is infinite in both horizontal (n_-) and vertical (n_+) directions.
With an assumed preemptive-resume priority scheduling, this 2D-infinity problem can be resolved using the Recursive Dimensionality Reduction (RDR) method <cit.>, in which the tangled two-priority-class system is broken down into two independent calculations, one for each priority class.
First, we focus on the AI-positive, higher-priority system.
Because of the preemptive-resume queueing discipline, the AI-positive subgroup is not affected by the AI-negative images at all and is, by itself, a classic M/M/1/FIFO queueing model.
Therefore, to solve for the average waiting time per AI-positive patient image, one can reuse Figure <ref> and replace n_nonEm by n_+.
The state probability for AI-positive patient images is modified based on Equation <ref>;
p_n_+ = ρ_+^n_+ (1-ρ_+),
where ρ_+ ≡λ_+/μ_+ is the traffic intensity for the AI-positive subgroup only.
Following the steps in Equation <ref>, the average waiting time per AI-positive patient image W_q_+ is given by
W_q_+ = ⟨ p_n_+⟩/λ_+ - 1/μ_+.
For the calculation of the AI-negative, lower-priority class, we cannot ignore the presence of AI-positive cases.
However, with only one radiologist, no AI-negative patient image can exit the system when n_+ ≥ 1.
As noted by <cit.>, there is no need to keep track of every state beyond n_+ ≥ 1.
Hence, every column in Figure <ref> can be truncated such that all states beyond n_+ ≥ 1 are represented by (1^+, n_-).
The RDR-truncated transition diagram is shown in Figure <ref>.
Because of the truncation, the transition rate B from (1_+, n_-) to (0, n_-) no longer represents a simple exponential transition time distribution.
In fact, the shape of this transition time distribution is often unknown but can be approximated to an Erlang-Coxian (EC) distribution.
As shown in Figure <ref>, a general EC distribution consists of exactly two Coxian phases and N__EC-2 Erlang phases.
For a given distribution of unknown shape, <cit.> provided closed-form solutions to calculate the first three moments of the unknown distribution and the six parameters in the EC distribution that best matches the first three moments.
When applying the EC-approximation method to the RDR-truncated transition diagram in Figure <ref>, only the two-phase Coxian distribution is sufficient.
No Erlang phases are needed; hence, p__EC, N__EC, and λ_Y_EC in Figure <ref> are 1, 2, and 0 respectively.
The non-exponential transition B can then be explicitly expressed in terms of the approximated exponential transition rates t's as shown in Figure <ref>, where
t_1 = (1-p_X_EC)λ_X1_EC;
t_12 = p_X_ECλ_X1_EC;
t_2 = λ_X2_EC.
Figure <ref> is a typical Markov chain transition diagram, and its transition rate matrix M_A can be formed (see Section <ref> in Electronic Companions).
Using the matrix geometric method, an analysis method for quasi-birth–death processes where the Markov chain matrix has a repetitive block structure <cit.>, the state probability p_n_- is computed.
Hence, the average waiting time per AI-negative, low-priority patient image, W_q_-, can be calculated;
W_q_- = ⟨ p_n_-⟩/λ_- - 1/μ_-.
§.§ Model B: Model A with emergent patient images
Model B is similar to Model A but with the presence of emergent patient images (f_em > 0).
These emergent images are prioritized to the highest priority regardless of the presence of CADt devices.
Although the waiting time of the emergent subgroup can be studied, this work only focuses on the non-emergent, AI-positive, and AI-negative subgroups which are impacted by the CADt device.
§.§.§ Model B in without-CADt scenario
In the standard of care without a CADt device, the presence of emergent class results in a two-priority-class queueing system: emergent and non-emergent classes.
For the emergent subgroup, μ_em denotes its radiologist's reading rate, and its arrival rate is given by
λ_em = f_emλ.
The arrival rate for the non-emergent class is
λ_nonEm = (1-f_em)λ.
Similar to Model A, because μ_D = μ_ND and N_rad = 1, the effective reading rate for the non-emergent subgroup is μ_nonEm =μ_D = μ_ND.
With only one radiologist on-site, the analysis of non-emergent, lower-priority class is exactly the same as that of the AI-negative class in Model A in the with-CADt scenario.
Figure <ref> (and Equation <ref> in Electronic Companions) can be reused by replacing λ_+ with λ_em, λ_- with λ_nonEm, μ_+ with μ_em, and μ_- with μ_nonEm.
After solving for the state probability p_n_nonEm, the average waiting time per non-emergent patient image is given by Equation <ref>.
§.§.§ Model B in with-CADt scenario
When a CADt is included in the workflow, three priority classes exist: emergent (highest priority), AI-positive (middle priority), and AI-negative (lowest priority) classes.
With the presence of emergent patients, the arrival rates of AI-positive and AI-negative classes are now
λ_+ = [πSe + (1-π)(1-Sp) ](1-f_em)λ, and
λ_- = [π(1-Se) + (1-π)Sp](1-f_em)λ.
Their reading rates are given by Equations <ref> and <ref>.
However, because μ_D = μ_ND, the reading rates for the AI-positive and AI-negative subgroups are the same; μ_+ = μ_- = μ_D = μ_ND.
Similar to Model A in with-CADt scenario, we apply the RDR method and solve for the AI-positive and AI-negative systems separately.
For the AI-positive subgroup, it is noted that an AI-positive patient image can only be interrupted by emergent patient images and will not be impacted by any AI-negative patient images.
Therefore, the emergent and AI-positive subgroups form a two-priority-class queueing system which can be solved using the framework developed for the non-emergent subgroup in the without-CADt scenario.
Figure <ref> (and Equation <ref> in Electronic Companions) can be reused by replacing λ_+ with λ_em, λ_- with λ_+, μ_+ with μ_em, and μ_- with μ_+.
The state probability p_n_+ for the AI-positive subgroup is calculated, from which the average waiting time per AI-positive patient image is given by Equation <ref>.
The calculation for the AI-negative, lowest-priority subgroup involves states (n_em, n_+, n_-) defined by the number of emergent, AI-positive, and AI-negative patient images in the system.
An AI-negative patient image can be interrupted by either an emergent or an AI-positive patient image.
The arrival time of the interrupting case denotes the start of a busy period, which is defined as the time period during which a radiologist is too busy for AI-negative cases.
While the radiologist is reading the interrupting case, new emergent and/or AI positive images may enter the system, which further delays the review of the interrupted AI-negative case.
Once all the higher-priority images are reviewed, the radiologist then resumes the reading of the interrupted AI-negative patient image, and the busy period ends.
Due to the different arrival and reading rates between the emergent and AI-positive patient images, the dependence of AI-negative busy period on the two subgroups are different.
As <cit.> discussed, one must keep track of the state at which the busy period starts and the state at which the busy period ends.
With only one radiologist, Model B has only two distinct busy periods:
* B_1: (0, 1^+, n_-) → (0, 0, n_-)
* B_2: (1^+, 0, n_-) → (0, 0, n_-)
Here, B_1 and B_2 are the rates of the two busy periods and are explicitly shown as two non-exponential transitions in Figure <ref>.
Just like the AI-negative system in Model A, one must first calculate the first three moments for each busy period and approximate each distribution using a two-phase Coxian distribution.
With three priority classes and two busy periods, the approximation involves the inter-level passage times from the AI-positive transition diagram, from which a transition probability matrix as well as the transition rate matrix are determined (see M_B in Section <ref>).
From transition rate matrix, the state probability p_n_- can be solved via conventional matrix geometric method.
Once p_n_- is determined, the average waiting time per AI-negative patient image W_q_- can be calculated via Equation <ref>.
§.§ Model C: Model B with two radiologists
Model C extends Model B by adding one extra radiologist on-site N_rad = 2.
The arrival rates for the emergent, non-emergent, AI-positive, and AI-negative classes remain the same (Equations <ref> - <ref>).
Because μ_D = μ_ND, the reading rates for the non-emergent, AI-positive, and AI-negative subgroups are the same; μ_+ = μ_- = μ_nonEm.
Because of the extra radiologist, the traffic intensity ρ has a factor of two; ρ=λ/2μ.
It should be noted that Model C has the same settings as the example in <cit.>.
§.§.§ Model C in without-CADt scenario
With no CADt devices, the RDR-truncated transition diagram for the non-emergent, lower-priority class is given by Figure <ref>.
Given two radiologists on-site, a non-emergent image can depart the system only when n_em < 2, and hence the truncation of states starts when n_em = 2.
Moreover, when n_em = 0, both radiologists are available for non-emergent patient images.
Thus, the first row has a leaving rate 2μ_nonEm, except the transition from (0, 1) to (0, 0) when only one radiologist has work to do.
When n_em = 1 (the second row), only one of the two radiologists is available to review a non-emergent case, resulting in a leaving rate of 1μ_nonEm.
When n_em≥ 2, both radiologists are busy handling emergent cases.
Since no radiologist is available for non-emergent images, their leaving rate is 0, and no non-emergent images can leave the system.
To approximate the transition rate B in Figure <ref>, the same two-phase Coxian approximation described in Models A and B is applied.
The transition rate matrix M_C_noCADt for Figure <ref> can be found in Section <ref>.
From M_C_noCADt, the state probability p_n_nonEm is determined, and the average waiting time per non-emergent patient image is given by Equation <ref>.
§.§.§ Model C in with-CADt scenario
In the with-CADt scenario, the calculations for AI-positive (middle-priority) and AI-negative (lowest-priority) subgroups are separated.
The queueing system for the AI-positive subgroup consists of two priority classes: the emergent and AI-positive classes, and the framework developed for the non-emergent subgroup in the without-CADt scenario can be reused.
By replacing λ_nonEm with λ_+ and μ_nonEm with μ_+ in Figure <ref> and Equation <ref>, the state probability for the AI-positive subgroup p_n_+ can be computed.
And the average waiting time per AI-positive patient image W_q_+ is given by Equation <ref>.
The approach to analyze the AI-negative, lowest-priority subgroup is similar to the analysis of the AI-negative cases in Model B.
Recall that a state is defined as (n_em, n_+, n_-) and that a busy period is defined by the time duration in which all the radiologists on-site are too busy for AI-negative patient images.
With two radiologists, a busy period may start from one of the three situations: when there are two emergent cases, when there are one emergent and one AI-positive case, or when there are two AI-positive cases.
On the other hand, the busy period ends when one radiologist is handling either an emergent case or an AI-positive case such that the other radiologist is available for the AI-negative case.
Therefore, instead of two busy periods in Model B, adding one extra radiologist increases the total number of busy periods to six:
* B_1: (0, 2^+, n_-) → (0, 1^+, n_-)
* B_2: (0, 2^+, n_-) → (1^+, 0, n_-)
* B_3: (1^+, 1^+, n_-) → (0, 1^+, n_-)
* B_4: (1^+, 1^+, n_-) → (1^+, 0, n_-)
* B_5: (2^+, 0, n_-) → (0, 1^+, n_-)
* B_6: (2^+, 0, n_-) → (1^+, 0, n_-)
Figure <ref> shows the RDR-truncated transition diagram for AI-negative subgroup.
Note that states (0, 2^+, n_-), (1^+, 1^+, n_-), and (2^+, 0, n_-) are duplicated because their corresponding arrival rates also depends on the probabilities that the busy period ends at a particular state i.e. either (0, 1^+, n_-) or (1^+, 0, n_-).
For example, p_1 denotes the conditional probability that the busy period ends at (0, 1^+, n_-) given that it starts at (0, 2^+, n_-).
Before solving for Figure <ref>, one must compute the conditional probability and the first three moments of each busy period, from which the transition rates can be approximated.
The calculation is discussed in Section <ref>, where the AI-positive transition diagram for inter-level passage times is presented, and the transition probability matrix is constructed.
Each busy period is approximated using the EC distribution (Figure <ref>).
However, unlike Model B in which two-phase Coxian is sufficient for all busy periods, B_2 and B_5 in Model C require an extra Erlang phase, as shown in Figure <ref>.
With an extra phase, two extra parameters t_0 and t_01 are needed to approximate B_2 and B_5.
t_0 = (1-p__EC)λ_Y_EC;
t_01 = p__ECλ_Y_EC;
t_1 = (1-p_X_EC)λ_X1_EC;
t_12 = p_X_ECλ_X1_EC;
t_2 = λ_X2.
Once all six busy periods are approximated, the transition rate matrix for the AI-negative, lowest-priority class can be constructed from Figure <ref>. (See Section <ref>.)
Like before, the corresponding state probability p_n_- can be solved by the matrix geometric method.
And, the average waiting time per AI-negative patient image W_q_- can be calculated via Equation <ref>.
For N_rad≥ 3, the same approach can be applied.
However, as the number of busy periods increases, the transition rate matrix will grow in size drastically, especially when more Erlang phases are required for the busy period approximation.
§.§ Model D: Model B with different reading rates
Model D extends Model B by differentiating the radiologist's reading rate between the diseased and non-diseased subgroups (N_rad = 1, f_em > 0, and μ_D ≠μ_ND).
The arrival rates for the emergent, non-emergent, AI-positive, and AI-negative classes remain the same (Equations <ref> - <ref>).
However, because μ_D ≠μ_ND, the reading rates for non-emergent, AI-positive, and AI-negative subgroups depend on disease prevalence π, positive predictive value PPV, and negative predictive value NPV (Equations <ref>-<ref>).
§.§.§ Model D in without-CADt scenario
The without-CADt scenario has two priority classes: emergent and non-emergent patient images.
Within the non-emergent class, two groups of patient images (diseased and non-diseased) are reviewed in a first-in-first-out (FIFO) basis.
The corresponding transition diagram is shown in Figure <ref>.
As usual, the state keeps track of n_em and n_nonEm.
In addition, because of the different reading rates between the diseased and non-diseased subgroups, the state must also keep track of the disease status of the image that the radiologist is reviewing.
Therefore, the state is defined as (n_em, n_nonEm, i), where i is either D (i.e. the radiologist is working on a diseased image) or ND (i.e. the radiologist is working on a non-diseased image).
Furthermore, one must pay attention to how the busy period starts and ends.
For example, if the radiologist reading a diseased image is interrupted by the arrival of an emergent image i.e. (0, n, D) → (1^+, n, D), the state must go back to (0, n, D) and not to (0, n, ND) when the busy period is over.
This property is guaranteed by having two sets of truncated states: (1^+, n)_→ D that can only interact with (0, n, D) and (1^+, n)_→ ND that can only interact with (0, n, ND).
The corresponding transition rate matrix of Figure <ref> is given in Section <ref>.
Note that, although Figure <ref> has two busy periods per column (one for “→ D” and the other for “→ ND”), they both describe the same transition time when at least one emergent image is in the system.
Therefore, only one unique set of t-parameters is calculated to approximate both busy periods.
§.§.§ Model D in with-CADt scenario
The calculation for AI-positive (middle-priority) and AI-negative (lowest-priority) subgroups are separated.
Because AI-positive patient images are not impacted by AI-negative cases, the emergent and AI-positive subgroups form a two-priority-class queueing system.
The transition rate matrix M_D_noCADt from Figure <ref> can be reused to analyze the queueing of AI-positive patient images.
By replacing λ_nonEm by λ_+ (Equation <ref>), μ_nonEm by μ_+ (Equation <ref>), and π by PPV, the state probability for the AI-positive subgroup p_n_+ is calculated via standard matrix geometric method.
The average waiting time per AI-positive patient image W_q_+ is then given by Equation <ref>.
For the AI-negative, lowest-priority class, the full definition of state (n_em, n_+, i, n_-, j).
i is either D or ND, indicating whether the radiologist is working on a diseased, AI-positive case or a non-diseased, AI-positive case respectively.
The disease status of an AI-negative case that the radiologist is reading is represented by the j which is either D or ND.
Because we only have one radiologist, i and j cannot appear simultaneously; the one radiologist can only handle an AI-positive or AI-negative case but not both at the same time.
Figure <ref> shows the RDR-truncated transition diagram for the AI-negative subgroup.
There are three unique busy periods with the corresponding transition rates B_i:
* B_1: (1^+, 0, n_-) → (0, 0, n_-, j)
* B_2: (0, 1^+, D, n_-) → (0, 0, n_-, j)
* B_3: (0, 1^+, ND, n_-) → (0, 0, n_-, j)
For each busy period, the truncated state is duplicated with either “→ D" or “→ ND" such that the system can return to the state with the correct disease status j when the busy period is over.
Like before, for each unique busy period, its conditional probability and first three moments are determined from the transition probability matrix (see Section <ref>).
And, each unique busy period has a set of t-parameters (Equation <ref>) approximated from a two-phase Coxian distribution.
With the approximated busy period transitions, a transition rate matrix can be constructed for the AI-negative subgroup from Figure <ref> (see Section <ref>).
The state probability p_n_- is then solved, and the average waiting time per AI-negative patient image W_q_- can be calculated via Equation <ref>.
§ SIMULATION
To verify the analytical results from our theoretical queueing approach, a Monte Carlo software was developed using Python to simulate the flow of patient images in a clinic with and without a CADt device.
A workflow model is defined by a set of input parameters {f_em, π, ρ, μ, N_rad, Se, and Sp}.
During the simulation, a new patient image entry is randomly generated with a timestamp that follows a Poisson distribution at an overall arrival rate of λ, which is computed from the user-inputs (traffic ρ and radiologist's reading rates μ).
Each patient image is randomly assigned with an emergency status (emergent or non-emergent) based on the input emergency fraction f_em.
If the patient image is emergent, a reading time is randomly generated from an exponential distribution with a reading rate of μ_em.
If the patient image is non-emergent, a disease status (diseased or non-diseased) is randomly assigned based on the input disease prevalence π.
The reading time for this non-emergent patient image is also randomly drawn from an exponential distribution with a reading rate of either μ_D if it is diseased or μ_ND if it is non-diseased.
Each non-emergent patient image is also assigned with an AI-call status (positive or negative) based on its disease status and the input AI accuracy (Se and Sp).
The patient image is then simultaneously placed into two worlds: one with a CADt device and one without.
In a without-CADt world, the incoming patient image is either a higher-priority case (if it is emergent) or a lower-priority case (if non-emergent).
If the patient image is emergent, the case is prioritized over all non-emergent patient images in the system and is placed at the end of the emergent-only queue.
Otherwise, the patient image is non-emergent and is placed at the end of the current reading queue.
In time, when its turn comes, this patient image is read by one of the radiologists and is then removed from the queue.
Two pieces of information are recorded for this simulated patient image.
One is its waiting time defined as the difference between the time when the image enters the queue and when it leaves the queue.
In addition, the number of emergent and non-emergent patient images in the queue right before the arrival of the new patient image are also recorded to study the state probability distribution.
Alternatively, this very same patient image is placed in the with-CADt world.
This image has either a high priority (if emergent), a middle priority (if AI-positive), or a low priority (if AI-negative).
If the patient image is emergent, the case is prioritized over all AI-positive and AI-negative patient images in the system and is placed at the end of the emergent-only queue.
If the patient image is AI-positive, the case is prioritized over all AI-negative images and is placed at the end of the queue consisting of only emergent and AI-positive patient images.
Otherwise, the patient image is AI-negative and is placed at the end of the current reading queue.
The reading time for this patient image in the with-CADt world is identical to its reading time in the without-CADt world.
However, due to the re-ordering by the CADt device, its waiting time in the with-CADt world may be different from that in the without-CADt world.
For every patient image, the difference between the two waiting times in the two worlds can be calculated to determine whether the use of the CADt device results in a time-saving or time delay for this image.
In addition to its waiting time, the number of emergent, AI-positive, and AI-negative patient images right before the arrival of the new patient image are also recorded.
To simulate a big enough sample size, a full simulation includes 200 simulations, each of which contains roughly 2,000 patients.
From all simulations, the waiting times from all diseased patient images are histogrammed from which the mean value and the 95% confidence intervals are determined.
§ TIME-SAVING EFFECTIVENESS EVALUATION METRIC
We define a metric to quantitatively assess the time-saving effectiveness of a given CADt device.
Both theoretical and simulation approaches output the mean waiting time per diseased patient image W_D in both with- and without-CADt scenarios.
Without a CADt device, since the arrival process is random, the average waiting time per non-emergent patient image W^no-CADt_nonEm is the same as W^no-CADt_D i.e.
W^no-CADt_D = W^no-CADt_nonEm = W_q_nonEm.
When a CADt device is included in the workflow, the average waiting time per diseased and non-diseased patient images are no longer the same because the diseased images are more likely to be prioritized by the CADt.
To calculate W^CADt_D, we first compute the average waiting time per AI-positive (W^CADt_+ = W_q_+) and per AI-negative (W^CADt_- = W_q_-) patient image based on the mathematical frameworks discussed in Section <ref>.
By definition, the average waiting time for the diseased subgroup W^CADt_D is
W^CADt_D≡Total waiting time from all diseased patient images/Number of diseased patient images.
Note that the total waiting time from all diseased patients is the sum of the total waiting time from the true-positive (TP) subgroup and that from the false-negative (FN) subgroup.
Let N_TP, N_FN, and N_D be the number of TP patient images, that of FN patient images, and that of diseased images.
W^CADt_D can be rewritten as
W^CADt_D = W^CADt_+× N_TP + W^CADt_-× N_FN/N_D.
Because N_TP/N_D and N_FN/N_D are, by definition, Se and 1-Se, we have
W^CADt_D = W^CADt_+×Se + W^CADt_-× (1-Se).
To quantify the time-saving effectiveness of a CADt device for diseased patient images, we define a time performance metric δ W_D as the difference in mean waiting time per diseased image in the with-CADt and that in the without-CADt scenario:
δ W_D≡ W^CADt_D - W^no-CADt_D.
It should be noted that, besides the explicit dependence on AI sensitivity in Equation <ref>, δ W_D also depends on AI specificity and all the clinical factors in the calculation of W^CADt_+, W^CADt_-, and W^no-CADt_nonEm.
Based on its definition, a negative δ W_D implies that, on average, a diseased patient image is reviewed earlier when the CADt device is included in the workflow than when it is not.
The more negative δ W_D is, the more time is saved, and the more effective the CADt device is.
If δ W_D = 0, the presence of CADt device does not bring any benefit for the diseased patient images.
If δ W_D is positive, the review of a diseased patient image is delayed on average, and the CADt device brings more risks than benefits to the diseased subgroup.
It should also be noted that the amount of time savings for other subgroups can be defined similarly.
For example, for the non-diseased subgroup, the average waiting time per non-diseased patient image in the without-CADt scenario, W^no-CADt_ND, is
W^no-CADt_ND = W^no-CADt_nonEm.
When the CADt device is included in the workflow, the average waiting time per non-diseased patient image, W^CADt_ND, becomes
W^CADt_ND = W^CADt_+× (1-Sp) + W^CADt_-×Sp,
where the first and second terms correspond to the false-positive and true-negative subgroups respectively.
δ W_ND can then be defined to describe the average wait-time difference between the with-CADt and without-CADt scenarios for the non-diseased subgroup.
§ RESULTS AND DISCUSSION
Top plot in Figure <ref> shows the time saved per diseased patient images as a function of traffic intensity ρ for one and two radiologists on-site without any emergent patient images.
Assuming a disease prevalence π of 10%, an AI sensitivity of 95%, a specificity of 89%, an average image reading time of 10 minutes for both diseased and non-diseased subgroups, and one radiologist on-site, the time saving is significantly improved from about 2 minutes in a quiet, low-volume clinic (radiology traffic intensity of 0.3) to about an hour in a relatively busy clinic (radiology traffic intensity of 0.8).
At a traffic intensity ρ of 0.8, the impact due to disease prevalence is found to be small (see middle plot in Figure <ref>).
Overall, the time-saving effectiveness of the device is also found to be more evident with only one radiologist on-site compared to two.
Bottom plot in Figure <ref> shows the impact on the time-saving effectiveness due to the presence of emergent patient images with the highest priority that overrides any AI prioritization.
The amount of time saved per diseased image without any emergent patients (f_em = 0) is more-or-less the same as that with f_em = 50%.
This is likely because the amount of delay caused by emergent patient images in a without-CADt scenario is similar to that in the with-CADt scenario.
The effect of having different radiologist's reading rates for diseased and non-diseased subgroups are shown in Figure <ref>.
The overall dependence on traffic intensity, disease prevalence, and emergency fraction is similar to that in Figure <ref>.
However, more time is saved for diseased patient images when μ_D < μ_ND i.e. when a radiologist takes more time on average to read a non-diseased image than a diseased image.
For the purpose of evaluating a CADt device, we propose a summary plot as shown in Figure <ref> based on Model B, describing both the diagnostic and time-saving effectiveness of a CADt device.
This plot is built upon a traditional receiver operating characteristic (ROC) analysis <cit.>, in which the ROC curve characterizes the diagnostic performance of the CADt device.
For a given radiologist workflow defined by a set of parameters, every point of False-Positive Rate (FPR) and True-Positive Rate (TPR) in the ROC space has an expected mean time savings per diseased patient image, δ W_D, which is presented by the color map.
The device diagnostic performance is near ideal in the top left corner of the ROC space, where δ W_D is the most negative.
To show the time-saving effectiveness of a CADt device, δ W_D along the ROC curve is plotted as a function of FPR (top) and TPR (left).
At (FPR, TPR) = (0, 0), δ W_D is 0 minute because all images are classified as AI-negative i.e. no images are prioritized.
As both FPR and TPR increase along the ROC curve, the amount of time savings |δ W_D| increases since most AI-positive cases are truly diseased patient images.
As FPR and TPR continue to increase, the number of false-positive cases becomes dominant, reducing the device’s time-saving effectiveness.
When (FPR, TPR) = (1, 1), δ W_D goes back to 0 because all images are classified as AI-positive, and the system essentially has no priority classes.
The mean time-savings for diseased patient images δ W_D can be directly linked to potential patient outcome.
For example, if our disease of interest is large vessel occlusion (LVO) stroke, δ W_D color axis on the right side of Figure <ref> can be translated to three stroke patient outcome metrics.
According to Table 12 in Supplementary Content (Supplementary 2) of <cit.>, for every 15 minutes sooner that a patient is treated, 3.9% of stroke patients resulted in less disability.
This can be translated to the two other common LVO stroke patient outcome metrics - the number of patients needed to treat for benefit (NNTB) and the number of minutes faster needed to treat (MNT).
The relationships between δ W_D and LVO stroke patient outcome metrics are extrapolated linearly and shown in the three axes on the right side of Figure <ref>.
As a result, the optimal δ W_D along the ROC curve is roughly -40 minutes, which corresponds to approximately 11% increase in LVO stroke patients with less disability, more than 9 NNTB, and more than 1.4 MNT. Remember that these results depend on our assumed reading rates and traffic intensity. In the future we expect to gather clinical data to make more accurate estimates of reading rates, traffic intensity, and wait-time savings.
Based on our queueing approach, the time-saving effectiveness of a CADt device depends largely on the clinical settings.
Our model suggests that CADt devices with a typical AI diagnostic performance (95% sensitivity and 89% specificity) are most effective in a busy, short-staffed clinic.
All theoretical predictions agree with simulation results well within the 95% confidence intervals.
All software used in making the theoretical calculations and the simulations in this paper will be made available on the Github site for the FDA's Division of Imaging, Diagnostics, and Software Reliability, https://github.com/DIDSR/QuCAD.
In this work where only one disease is considered, the CADt device is trained to identify the disease, and a patient image can either be diseased or non-diseased.
Under this consideration, when evaluating the time-saving effectiveness of the CADt, δ W_D is used as the performance metric because the CADt device is intended to benefit diseased patients with time critical conditions.
In the future, when we expand our work to a reading queue that consists of patient images with two or more diseases, a new performance matric will be defined to take into account other time-critical diseases that the CADt does not look for.
§ CONCLUSION
We present a mathematical framework based on queueing theory and the Recursive Dimensionality Reduction method to quantify the time-saving effectiveness of an AI-based medical device that prioritizes patient images based on its binary classification outputs.
Several models are developed to theoretically predict the wait-time-saving effectiveness of such a device as a function of various parameters, including disease prevalence, patient arrival rate, radiologist reading rate, number of radiologists on-site, AI sensitivity and specificity, as well as the presence of emergent patient images with the highest priority that overrides any AI prioritization.
The methodology proposed in this paper helps evaluate the time-saving performance of a CADt or any prioritization device.
The models presented here could also be used to evaluate discrimination algorithms in many other queueing contexts, such as serving customers or computer job queueing.
In the near future, we plan on expanding our model to clinical scenarios of multiple disease conditions, modalities, and anatomies with several CADt devices being used simultaneously.
§ ACKNOWLEDGMENTS
The authors would like to thank Dr. Mor Harchol-Balter ([email protected]) and Dr. Takayuki Osogami ([email protected]) for helping us understand their Recursive Dimensionality Reduction (RDR) method for complex queueing systems. In addition, the authors acknowledge funding from the Critical Path Program of the Center for Devices and Radiological Health. The authors also acknowledge funding by appointments to the Research Participation Program at the Center for Devices and Radiological Health administered by the Oak Ridge Institute for Science and Education through an interagency agreement between the U.S. Department of Energy and the U.S. Food and Drug Administration (FDA).
§ MARKOV CHAIN MATRICES
This appendix section provides the matrices involved for each of the four radiologist workflow models discussed in Section <ref>.
§.§ Model A in with-CADt scenario
Markov chain transition rate matrix M_A is built upon Figure <ref>.
M_A =
[
[ B_00 B_01 ; B_10 A_1 A_2 ; A_0 A_1 A_2; A_0 A_1 ⋱; ⋱ ⋱; ]],
where
A_0 = [ μ_- 0 0; 0 0 0; 0 0 0 ],
A_1 = [ * λ_+ 0; t_1 * t_12; t_2 0 * ],
A_2 = [ λ_- 0 0; 0 λ_- 0; 0 0 λ_- ],
B_01 = [ λ_- 0 0; 0 λ_- 0; 0 0 λ_- ],
B_00 = [ * λ_+ 0; t_1 * t_12; t_2 0 * ],
B_10 = [ μ_- 0 0; 0 0 0; 0 0 0 ].
M_A had a tri-diagonal block structure defined by sub-matrices As and Bs, in which *'s are the negative of the sum of all elements in the corresponding row.
B_00, B_01, and B_10 are block matrices representing the boundary condition at the state of n_- = 0; states with n_- < 0 are forbidden because the reading queue cannot have a negative number for AI-negative patient images.
A_0, A_1, and A_2 are repetitive block structures that iterate along the diagonal axis of the matrix.
§.§ Model B in with-CADt scenario
This scenario has two busy periods (B_1 and B_2).
For each busy period, we first calculate its first three moments of the inter-level passage times using Figure <ref>.
The states at which the two AI-negative busy periods start and end are highlighted.
For instance, B_1 is the time period starting from (0, 1) in red and ending at (0, 0) in blue, regardless of any intermediate states that the system may go through.
The steps involved to calculate the first three moments are documented in Appendix A of <cit.>.
Based on Figure <ref>, the transition probability matrix P_B is given below.
P_B =
[
[ ℒ_1 ℱ_1 ; ℬ_2 ℒ_2 ℱ_2 ; ℬ_3 ℒ_3 ℱ_3 ; ℬ_4 ℒ_4 ⋱; ⋱ ⋱; ]],
where
ℬ_ℓ=2 = [ μ_+/λ_em+λ_++μ_+; t_1/λ_++t_1+t_12; t_2/λ_++t_2; ],
ℬ_ℓ≥ 3 = [ μ_+/λ_em+λ_++μ_+ 0 0; t_1/λ_++t_1+t_12 0 0; t_2/λ_++t_2 0 0; ],
ℒ_ℓ=1 = [ 0 ], ℒ_ℓ≥ 2 = [ 0 0 0; 0 0 t_12/λ_++t_1+t_12; 0 0 0; ],
ℱ_ℓ=1 = [ λ_+/λ_+ + λ_em λ_em/λ_+ + λ_em 0 ],
ℱ_ℓ≥ 2 = [ λ_+/λ_+ + λ_em+μ_+ λ_em/λ_+ + λ_em+μ_+ 0; 0 λ_+/λ_+ +t_1+t_12 0; 0 0 λ_+/λ_+ +t_2; ].
Here, the t-parameters are the approximated exponential rates from the transition B in Figure <ref>.
With ℱ, ℒ, and ℬ, <cit.> provide the framework to obtain the G matrix, which contains the probabilities of the busy periods involved, and the Z_r matrices, which have the r-th moments of the busy periods.
For the AI-negative priority class in Model B, the Z_r matrix has a dimension of 3×1, where the first and second elements are the r-th moments of B_1 and B_2 respectively.
For each of the two busy periods, a two-phase Coxian distribution can be used to approximate the distribution shape using Equation <ref>.
Let t^(1)_1, t^(1)_12, and t^(1)_2 be the approximated rates for B_1, and t^(2)_1, t^(2)_12, and t^(2)_2 be the approximated rates for B_2.
The transition rate matrix M_B for Figure <ref> is given below.
M_B =
[
[ B_00 B_01 ; B_10 A_1 A_2 ; A_0 A_1 ⋱; A_0 ⋱; ⋱; ]],
where
A_0 = [ μ_- 0 0 0 0; 0 0 0 0 0; 0 0 0 0 0; 0 0 0 0 0 ],
A_1 = [ * λ_+ 0 λ_em 0; t^(1)_1 * t^(1)_12 0 0; t^(1)_2 0 * 0 0; t^(2)_1 0 0 * t^(2)_12; t^(2)_2 0 0 0 *; ],
A_2 = [ λ_- 0 0 0 0; 0 λ_- 0 0 0; 0 0 λ_- 0 0; 0 0 0 λ_- 0; 0 0 0 0 λ_-; ],
B_00 = [ * λ_+ 0 λ_em 0; t^(1)_1 * t^(1)_12 0 0; t^(1)_2 0 * 0 0; t^(2)_1 0 0 * t^(2)_12; t^(2)_2 0 0 0 *; ],
B_01 = [ λ_- 0 0 0 0; 0 λ_- 0 0 0; 0 0 λ_- 0 0; 0 0 0 λ_- 0; 0 0 0 0 λ_-; ],
B_10 = [ μ_- 0 0 0 0; 0 0 0 0 0; 0 0 0 0 0; 0 0 0 0 0 ].
The sub-matrices in M_B are very similar to that in M_A (Equations <ref> and <ref>).
The one difference is that these sub-matrices are now 5×5 instead of 3×3 due to the extra row of truncated states in Figure <ref> compared to Figure <ref>.
§.§ Model C in without-CADt scenario
The transition rate matrix M_C_noCADt is built upon Figure <ref>.
M_C_noCADt =
[
[ B_00 B_01 ; B_10 A_1 A_2 ; A_0 A_1 A_2 ; A_0 A_1 ⋱; ⋱ ⋱; ]],
where
A_0 = [ 2μ_nonEm 0 0 0; 0 μ_nonEm 0 0; 0 0 0 0; 0 0 0 0 ],
A_1 = [ * λ_em 0 0; μ_em * λ_em 0; 0 t_1 * t_12; 0 t_2 0 * ],
A_2 = [ λ_nonEm 0 0 0; 0 λ_nonEm 0 0; 0 0 λ_nonEm 0; 0 0 0 λ_nonEm ],
B_00 = 0.7[ [cccc:cccc]
* λ_em 0 0 λ_nonEm 0 0 0; μ_+ * λ_em 0 0 λ_nonEm 0 0; 0 t_1 * t_12 0 0 λ_nonEm 0; 0 t_2 0 * 0 0 0 λ_nonEm; [2pt/2pt]
μ_nonEm 0 0 0 * λ_em 0 0; 0 μ_nonEm 0 0 μ * λ_em 0; 0 0 0 0 0 t_1 * t_12; 0 0 0 0 0 t_2 0 *; ],
B_01 = 0.8[ 0 0 0 0; 0 0 0 0; 0 0 0 0; 0 0 0 0; [2pt/2pt]
λ_nonEm 0 0 0; 0 λ_nonEm 0 0; 0 0 λ_nonEm 0; 0 0 0 λ_nonEm; ],
B_10 = 1[ [cccc:cccc]
0 0 0 0 2μ_nonEm 0 0 0; 0 0 0 0 0 μ_nonEm 0 0; 0 0 0 0 0 0 0 0; 0 0 0 0 0 0 0 0 ].
§.§ Model C in with-CADt scenario
This scenario has six busy periods (B_1 to B_6).
For each busy period, we first calculate its conditional probability and the first three moments of the inter-level passage times using Figure <ref>.
And the corresponding transition probability matrix P_C is given below.
P_C =
[
[ ℒ_1 ℱ_1 ; ℬ_2 ℒ_2 ℱ_2 ; ℬ_3 ℒ_3 ℱ_3 ; ℬ_4 ℒ_4 ⋱; ⋱ ⋱; ]],
where
ℬ_ℓ=2 = 1[ μ_+/λ_em+λ_++μ_+; μ_em/λ_em+λ_++μ_em ] ,
ℬ_ℓ=3 = 1[ 2μ_+/λ_em+λ_++2μ_+ 0; μ_em/λ_em+λ_++μ_++μ_em μ_+/λ_em+λ_++μ_++μ_em; 0 t_1/λ_++t_1+t_12; 0 t_2/λ_++t_2; ]
ℬ_ℓ≥4 = 1[ 2μ_+/λ_em+λ_++2μ_+ 0 0 0; μ_em/λ_em+λ_++μ_++μ_em μ_+/λ_em+λ_++μ_++μ_em 0 0; 0 t_1/λ_++t_1+t_12 0 0; 0 t_2/λ_++t_2 0 0; ],
ℒ_ℓ=1 = [ 0 ], ℒ_ℓ=2 = [ 0 0; 0 0 ],
ℒ_ℓ≥3 = [ 0 0 0 0; 0 0 0 0; 0 0 0 t_12/λ_++t_1+t_12; 0 0 0 0 ],
ℱ_ℓ=1 = 1[ λ_+/λ_em+λ_+ λ_em/λ_em+λ_+ ],
ℱ_ℓ=2 = 1[ λ_+/λ_em+λ_++μ_+ λ_em/λ_em+λ_++μ_+ 0 0; 0 λ_+/λ_em+λ_++μ_em λ_em/λ_em+λ_++μ_em 0 ],
ℱ_ℓ≥3 = 0.8[ λ_+/λ_em+λ_++2μ_+ λ_em/λ_em+λ_++2μ_+ 0 0; 0 λ_+/λ_em+λ_++μ_++μ_em λ_em/λ_em+λ_++μ_++μ_em 0; 0 0 λ_+/λ_++t_1+t_12 0; 0 0 0 λ_+/λ_++t_2 ].
With P_C, the conditional probabilities and first three moments of inter-level passage times for all six busy periods are computed according to Appendix A of <cit.>.
For most busy periods, three t-parameters are sufficient for the approximation.
However, for B_2 and B_5, due to the two extra Erlang phases, two additional parameters t_0 and t_01 are required.
Let t^(i)_j denote the t_j-parameter for a busy period B_i.
The transition rate matrix M_C_CADt for the AI-negative, lowest-priority class from Figure <ref> is given by
M_C_CADt =
[
[ B_00 B_01 ; B_10 A_1 A_2 ; A_0 A_1 ⋱; A_0 ⋱; ⋱; ]].
All A sub-matrices are 17×17.
Here, 0_14 denotes a 14×14 zero matrix, and 𝕀_17 is a 17×17 identity matrix.
A_0 = [ 2μ_- ; μ_- ; μ_- ; 0_14 ],
A_2 = λ_- 𝕀_17,
A_1 = 0.75[ [ccc:c:c:c:c:c:c]
* λ_+ λ_em ; μ_+ * 𝐩_1λ_+ 𝐩_2λ_+ 𝐩_3λ_em 𝐩_4λ_em ; μ_em * 𝐩_3λ_+ 𝐩_4λ_+ 𝐩_5λ_em 𝐩_6λ_em; [2pt/2pt] 𝐭^(1) 𝕋^(1)_4 ; [2pt/2pt] 𝐭^(2) 𝕋^(2)_5 ; [2pt/2pt] 𝐭^(3) 𝕋^(3)_6 ; [2pt/2pt] 𝐭^(4) 𝕋^(4)_7 ; [2pt/2pt] 𝐭^(5) 𝕋^(5)_8; [2pt/2pt] 𝐭^(6) 𝕋^(6)_9 ],
where, for i = 1, 3, 4, 6,
𝐩_𝐢 = [ p_i 0 ], 𝐭^(i) = [ t_1^(i); t_2^(i) ], 𝕋^(i)_k = [ * t_12^(i); * ].
For i = 2, 5, because of the extra Erlang phase, the sub-matrices have an extra row and/or column.
𝐩_𝐢 = [ p_i 0 0 ], 𝐭^(i) = [ t_0^(i); t_1^(i); t_2^(i) ], 𝕋^(i)_k = [ * t_01^(i) ; * t_12^(i); * ].
Similarly, the boundary B sub-matrices are given below.
B_01 = [ 0_17; [2pt/2pt]
λ_- 𝕀_17 ],
B_10 = [ [c:c]
0_17 2μ_+
μ_+
μ_+
0_14 ],
B_00 = [ [c:c]
A_1 λ_- 𝕀_17; [2pt/2pt]
μ_+
μ_+
μ_+
0_14 A_1 ].
§.§ Model D in without-CADt scenario
The transition rate matrix M_D_noCADt for Figure <ref> is given below.
M_D_noCADt =
[
[ B_00 B_01 ; B_10 A_1 A_2 ; A_0 A_1 A_2; A_0 A_1 ⋱; ⋱ ⋱; ]],
where
A_0 = [ πμ_D (1-π)μ_D 0 0 0 0; πμ_ND (1-π)μ_ND 0 0 0 0; 0 0 0 0 0 0; 0 0 0 0 0 0; 0 0 0 0 0 0; 0 0 0 0 0 0 ],
A_1 = [ * 0 λ_em 0 0 0; 0 * 0 0 λ_em 0; t_1 0 * t_12 0 0; t_2 0 0 * 0 0; 0 t_1 0 0 * t_12; 0 t_2 0 0 0 *; ],
A_2 = λ_nonEm𝕀_6,
B_00 = [ * λ_em 0; t_1 * t_12; t_2 0 * ],
B_10 = [ μ_D 0 0; μ_ND 0 0; 0 0 0; 0 0 0; 0 0 0; 0 0 0 ],
B_01 = 0.75[ πλ_nE (1-π)λ_nE 0 0 0 0; 0 0 πλ_nE 0 (1-π)λ_nE 0; 0 0 0 πλ_nE 0 (1-π)λ_nE ],
where λ_nE refers to the arrival rate of non-emergent subgroup. Note that both M_D_noCADt and M_A (Equation <ref>) describe a queueing system with two priority classes and one radiologist.
However, because μ_D ≠μ_ND, the size of A sub-matrices grow from 3×3 to 6×6 due to the extra i in the state definition and the extra set of truncated states to keep track of disease status of the interrupted case.
§.§ Model D in with-CADt scenario
This scenario has three busy periods (B_1 to B_3).
For each busy period, we calculate its conditional probability and the first three moments of the inter-level passage times using Figure <ref> and the corresponding transition probability matrix P_D.
P_E =
[
[ ℒ_1 ℱ_1 ; ℬ_2 ℒ_2 ℱ_2 ; ℬ_3 ℒ_3 ℱ_3 ; ℬ_4 ℒ_4 ⋱; ⋱ ⋱; ]],
where
ℬ_ℓ=2 = 1[ μ_D/λ_em+λ_++μ_D; μ_ND/λ_em+λ_++μ_ND; t_1/λ_++t_1+t_12; t_2/λ_++t_2 ] ,
ℬ_ℓ=3 = 1[ PPVμ_D/λ_em+λ_++μ_D (1-PPV)μ_D/λ_em+λ_++μ_D 0 0; PPVμ_ND/λ_em+λ_++μ_ND (1-PPV)μ_ND/λ_em+λ_++μ_ND 0 0; t_1/λ_++t_1+t_12 0 0 0; t_2/λ_++t_2 0 0 0; 0 t_1/λ_++t_1+t_12 0 0; 0 t_2/λ_++t_2 0 0 ]
ℬ_ℓ≥4 = 1[ PPVμ_D/λ_em+λ_++μ_D (1-PPV)μ_D/λ_em+λ_++μ_D 0 0 0 0; PPVμ_ND/λ_em+λ_++μ_ND (1-PPV)μ_ND/λ_em+λ_++μ_ND 0 0 0 0; t_1/λ_++t_1+t_12 0 0 0 0 0; t_2/λ_++t_2 0 0 0 0 0; 0 t_1/λ_++t_1+t_12 0 0 0 0; 0 t_2/λ_++t_2 0 0 0 0; ],
ℒ_ℓ=1 = 1[ 0 ], ℒ_ℓ=2 = 1[ 0 0 0 0; 0 0 0 0; 0 0 0 0; 0 0 0 0 ],
ℒ_ℓ≥3 = 1[ 0 0 0 0 0 0; 0 0 0 0 0 0; 0 0 0 t_12/λ_++t_1+t_12 0 0; 0 0 0 0 0 0; 0 0 0 0 0 t_12/λ_++t_1+t_12; 0 0 0 0 0 0; ],
ℱ_ℓ=1 = 1[ PPVλ_+/λ_em+λ_+ (1-PPV)λ_+/λ_em+λ_+ λ_em/λ_em+λ_+ 0 ],
ℱ_ℓ=2 = 1[ λ_+/λ_em+λ_++μ_D 0 λ_em/λ_em+λ_++μ_D 0 0 0; 0 λ_+/λ_em+λ_++μ_ND 0 0 λ_em/λ_em+λ_++μ_ND 0; 0 0 PPVλ_+/λ_++t_1+t_12 0 (1-PPV)λ_+/λ_++t_1+t_12 0; 0 0 0 PPVλ_+/λ_++t_2 0 (1-PPV)λ_+/λ_++t_2 ],
ℱ_ℓ≥3 = 1[ λ_+/λ_em+λ_++μ_D 0 λ_em/λ_em+λ_++μ_D 0 0 0; 0 λ_+/λ_em+λ_++μ_ND 0 0 λ_em/λ_em+λ_++μ_ND 0; 0 0 λ_+/λ_++t_1+t_12 0 0 0; 0 0 0 λ_+/λ_++t_2 0 0; 0 0 0 0 λ_+/λ_++t_1+t_12 0; 0 0 0 0 0 λ_+/λ_++t_2 ].
Each of the three busy periods has a set of t-parameters (Equation <ref>) approximated from a two-phase Coxian distribution.
Let t^(i)_j denote the t_j parameter for the busy period B_i.
The transition rate matrix M_D_CADt for the AI-negative subgroup (Figure <ref>) is given by
M_D_CADt =
[
[ B_00 B_01 ; B_10 A_1 A_2 ; A_0 A_1 ⋱; A_0 ⋱; ⋱; ]]
The 14×14 A sub-matrices are defined below, where 0_12 denotes a 12×12 zero matrix, and 𝕀_14 is a 14×14 identity matrix.
A_0 = 1[ (1-NPV)μ_D NPVμ_D ; (1-NPV)μ_ND NPVμ_ND ; 0_12 ],
A_2 = λ_- 𝕀_14,
A_1 = 0.85[ [cc:c:c:c:c:c:c]
* 𝐩λ_em 𝐩PPVλ_+ 𝐩(1-PPV)λ_+ ; * 𝐩λ_em 𝐩PPVλ_+ 𝐩(1-PPV)λ_+; [2pt/2pt]
𝐭^(1) 𝕋^(1)_3 ; [2pt/2pt] 𝐭^(1) 𝕋^(1)_4 ; [2pt/2pt]
𝐭^(2) 𝕋^(2)_5 ; [2pt/2pt] 𝐭^(2) 𝕋^(2)_6 ; [2pt/2pt]
𝐭^(3) 𝕋^(3)_7; [2pt/2pt] 𝐭^(3) 𝕋^(3)_8 ],
where, for a busy period B_i,
𝐩 = [ 1 0 ], 𝐭^(i) = [ t_1^(i); t_2^(i) ], 𝕋^(i)_k = [ * t_12^(i); 0 * ].
The boundary B matrices, on the other hand, are
B_00 = 1[ [c:c:c:c]
-σ_1 𝐩λ_em 𝐩PPVλ_+ 𝐩(1-PPV)λ_+; [2pt/2pt]
𝐭^(1) 𝕋^(1)_2 ; [2pt/2pt]
𝐭^(2) 𝕋^(2)_3 ; [2pt/2pt]
𝐭^(3) 𝕋^(3)_4; ],
B_01 = 1[ [cc:c:c:c]
(1-NPV)λ_- NPVλ_- ; [2pt/2pt] ℚ ; [2pt/2pt] ℚ ; [2pt/2pt] ℚ ],
B_10 = 1[ μ_D ; μ_ND ; 0_12×6 ],
where
ℚ = 0.9[ (1-NPV)λ_- 0 NPVλ_- 0; 0 (1-NPV)λ_- 0 NPVλ_- ].
|
http://arxiv.org/abs/2303.06824v1
|
20230313024951
|
Coupled Hénon Map, Part II: Doubly and Singly Folded Horseshoes in Four Dimensions
|
[
"Jizhou Li",
"Keisuke Fujioka",
"Akira Shudo"
] |
nlin.CD
|
[
"nlin.CD",
"math.DS"
] |
Coupled Hénon Map, Part II]Coupled Hénon Map, Part II: Doubly and Singly Folded Horseshoes in Four Dimensions
^1RIKEN iTHEMS, Wako, Saitama 351-0198, Japan
^2Department of Physics, Tokyo Metropolitan University, Tokyo 192-0397, Japan
[email protected] [email protected]
March 2023
As a continuation of a previous paper (arXiv:2303.05769 [nlin.CD]), we introduce examples of Hénon-type mappings that exhibit new horseshoe topologies in three and four dimensional spaces that are otherwise impossible in two dimensions.
§ INTRODUCTION
In a previous paper <cit.> we have derived a sufficient condition for topological horseshoe and uniform hyperbolicity of a 4-dimensional symplectic map, which is introduced by coupling the two 2-dimensional Hénon maps via linear terms. The coupled Hénon map thus constructed can be viewed as a simple map modeling the horseshoe in higher dimensions. In this paper we further explore new possibilities of horseshoe topologies in three and four dimensions by investigating several new types of coupled Hénon maps. The horseshoes introduced here can only exist beyond two or three dimensions and may serve as templates for the future investigation of horseshoes in multidimensional spaces.
Two well-known ingredients that give rise to the classical phenomenon of chaos are “stretching" and “folding" of phase-space volumes. The stretching creates divergence between nearby initial conditions, and the folding leads to mixing and thus ergodicity of the system. A generic prototype incorporating both ingredients is the Smale horseshoe <cit.> which acts on a finite region in phase space, expands it along the unstable direction, contracts it along the stable direction, then folds and re-injects it into the original region. In the due process, mixing is created by folding and re-injection, which leads to nonlinear dynamics that displays typical phenomena of chaos.
The most well-known example that realizes the Smale horseshoe would be the Hénon map, which is a 2D quadratic map with parameters <cit.>. There is an elementary proof showing that the horseshoe is realized in a certain parameter space <cit.>, and a necessary and sufficient condition has been pursued using sophisticated techniques in the theory of complex dynamical systems <cit.>. The studies of the higher dimensional extension, a class of the coupled Hénon maps, have been done in various directions
(see for example <cit.>),
not only to provide examples of hyperchaos <cit.> but also to seek the nature of dynamics absent in 2D.
In physics and chemistry, there is a growing interest in higher-dimensional
Hamiltonian dynamics. In particular, the situation in which regular and chaotic orbits coexist
in a single phase space is often realized not only in astrophysical or chemical reaction dynamics <cit.>
but also in Lagrangian descriptions of fluid dynamics <cit.>.
These studies have paid special attention to invariant structures associated with
regular motions, and related bifurcations in higher-dimensional spaces as well,
but we may expect a variety of horseshoes with different topologies in chaotic domains.
To the authors' knowledge,
although the original Smale horseshoe was proposed in the context of arbitrary dimensions,
it only considered either singly-folded horseshoes or multiply-folded horseshoes with creases
in the same direction <cit.>. Therefore, the original horseshoes, even in multidimensional settings, can always be visualized by collapsing the unstable and stable subspaces into one-dimensional unstable and stable directions, respectively, which leads us back to the picture of 2D horseshoes. In this sense, they did not make use of all possible choices of the directions of creases in multidimensional spaces. This leaves one to wonder what would happen if a generalization of the horseshoe folds a multidimensional hyper-cube twice, with creases in mutually independent directions. Although horseshoes in higher dimensions with creases in different directions
have been illustrated qualitatively <cit.> or modeled by the composition of piecewise linear maps <cit.>, an explicit and minimal form of such maps has not been provided.
In this article, we propose several mappings which give rise to doubly-folded horseshoes that can only exist beyond two or three dimensions. More specifically, we will introduce a class of Hénon maps that display five different kinds of horseshoe topology, labeled by Topology I, II, III-A, III-B and IV, respectively, which are:
a) Topology I: Singly-folded horseshoe in three dimensions (Section. <ref>).
b) Topology II: Doubly-folded horseshoe with independent creases in three dimensions (Section. <ref>).
c) Topology III-A: Doubly-folded horseshoe with independent creases and independent stacking directions in four dimensions (Section. <ref>).
d) Topology III-B: Singly-folded horseshoe in four dimensions (Section. <ref>).
e) Topology IV: Doubly-folded horseshoe with independent creases and common stacking direction in four dimensions (Section. <ref>).
We emphasize that these five types of topology are by no means comprehensive. Our main purpose here is to list up examples in a heuristic way. These examples would prepare us for the future construction of the entire library of unexplored horseshoe topologies that may give rise to new dynamical phenomena.
This article is structured as follows. Section. <ref> reviews the background theory of Smale horseshoe in its original context. Section. <ref> introduces a three-dimensional Hénon-type mapping that possesses a doubly-folded horseshoe with creases in mutually independent directions. Section. <ref> proposes a coupled Hénon map in four dimensions which, depending on the ranges of parameters, displays either a doubly-folded horseshoe with creases in mutually independent directions and independent stacking directions, or a singly-folded horseshoe. Section. <ref> demonstrates another type of doubly-folded horseshoe in four dimensions which has the same stacking directions after the two foldings. Section. <ref> concludes the paper and proposes new directions for future study.
§ BACKGROUND: SMALE HORSESHOES IN TWO AND THREE DIMENSIONS
In this section we briefly outline the background theory of Smale horseshoe with examples from the Hénon map. The map gives rise to a singly-folded horseshoe whose cross-sections reduce to the well-studied two-dimensional horseshoe, therefore topologically conjugate to a full shift on two symbols. This topology, denoted by Topology I hereafter, is the most well-known Smale horseshoe studied in many articles and textbooks. An illustration is given by Fig. <ref>.
A concrete realization of Type I is the Hénon map of the form
( [ x_n+1; y_n+1; z_n+1 ]) =
f_ I( [ x_n; y_n; z_n ]) =
( [ a_0 - x^2_n - z_n; b y_n; x_n ])
where (x_n,y_n,z_n)^𝖳 denotes the position of the nth iteration, and the parameters a_0, b satisfy
a_0 > 5+2√(5)
b > 1
where the bound on a_0 is obtained by Devaney and Nitecki in <cit.> to realize the horseshoe in the two-dimensional Hénon map, and the bound on b guarantees uniform expansion in y. It is trivial to see that the dynamics in y is a constant uniform expansion uncoupled from (x,z). Therefore, on every (x,z)-slice we have the two-dimensional Hénon map
( [ x_n+1; z_n+1 ]) =
( [ a_0 - x^2_n - z_n; x_n ]) ,
which is the one originally proposed in <cit.> and studied in detail in <cit.>. Generalizing the results established by <cit.> to the three-dimensional map f_ I, it is straightforward to see that given a_0>5+2√(5), a cube V can be identified as
V = { (x,y,z) | |x|,|y|,|z|≤ r } , where r=1+√(1+a_0)
such that f_ I(V) gives rise to a horseshoe. As depicted by Fig. <ref>, the map expands V in the unstable directions ((x,y)-plane), contracts it in the stable direction (z-axis), then folds it with a crease in the y-direction and stacks it along the z-direction. The intersection V∩ f_ I(V) consists of a pair of three-dimensional “horizontal" slabs, which, when viewed in every (x,z)-slice, reduces to a pair of two-dimensional horizontal strips. Furthermore, the resulting non-wandering set Λ = ⋂_n=-∞^∞f^n_ I(V) is uniformly hyperbolic and conjugate to a full shift on two symbols.
To avoid potential ambiguities, we now give precise definitions of two-dimensional horizontal strips and three-dimensional horizontal slabs.
Let V be a square in the (x,z)-plane centered at the origin:
V = { (x,z) | |x|,|z|≤ r } .
A set h is a horizontal strip of V if there exist two curves z=u_1(x) and z=u_2(x) for which
-r ≤ u_1(x) < u_2(x) ≤ r
such that
h = { (x,z) | -r ≤ x ≤ r, u_1(x) ≤ z ≤ u_2(x) } .
This definition is quite general as it does not impose any Lipschitz conditions on the boundary curves u_1(x) and u_2(x). This is in contrast to the definitions of “horizontal strips" in <cit.> and <cit.> (Sec. 2.3 therein), where Lipschitz conditions were imposed to guarantee that the regularity of horizontal and vertical strips so that the non-wandering set is fully conjugate to a subshift on finite symbols. Since the purpose of this article is to establish the existence of topological horseshoes, which may include the cases where the non-wandering set is only semi-conjugate to a subshift on finite symbols, to make the proceeding derivations simpler, we do not impose such Lipschitz conditions in the current study. Two essential properties of horizontal strips are that they intersect V fully in the horizontal direction, i.e., no marginal intersections are allowed, and they are subsets of V that partition V into disjoint regions. See Fig. <ref> for some examples.
Following <cit.>, the definition of horizontal strips in two dimensions can be generalized to horizontal slabs in three dimensions.
Let V be a cube in the (x,y,z)-space centered at the origin:
V = { (x,y,z) | |x|,|y|,|z|≤ r } .
A set h is a horizontal slab of V if there exists two surfaces z=u_1(x,y) and z=u_2(x,y) for which
-r ≤ u_1(x,y) < u_2(x,y) ≤ r
such that
h = { (x,y,z) | -r ≤ x ≤ r, -r ≤ y ≤ r, u_1(x,y) ≤ z ≤ u_2(x,y) } .
An example of a horizontal slab is given by Fig. <ref>.
In the next sections we will introduce horseshoes that are folded for multiple times and therefore exhibit more complicated topologies. These horseshoes are constructed by exploring various possibilities of folding and stacking in three and four dimensions.
§ TOPOLOGY II: DOUBLY-FOLDED HORSESHOE IN THREE DIMENSIONS
The first generalization that we introduce here, namely Topology II, is based on Figure 3.2.47 of <cit.>. Qualitatively, it can be considered as a Topology-I horseshoe further folded with a crease along x, as illustrated by Fig. <ref>.
A realization is also provided by the Hénon-type map
( [ x_n+1; y_n+1; z_n+1 ]) =
f_ II( [ x_n; y_n; z_n ]) =
( [ a_0 - x^2_n - z_n; a_1 - y^2_n - x_n; y_n ])
with parameters a_0,a_1 > 5+2√(5). The mapping f_ II can be written as the compound mapping of two successive Type-I horseshoes, namely f^'_ I and f^''_ I:
f_ II = f^''_ I∘ f^'_ I
where f^'_ I takes the form Eq. (<ref>) with b=1:
( [ x^'; y^'; z^' ]) =
f^'_ I( [ x; y; z ]) =
( [ a_0 - x^2 - z; y; x ])
and f^''_ I resembles f^'_ I but interchanges the roles of the x and y axis, i.e., it expands V in y, contracts V in z, folds it with a crease along x, then stacks along z. Therefore, the mapping equations of f^''_ I is obtained from that of f^'_ I by interchanging x and y:
( [ x^''; y^''; z^'' ]) =
f^''_ I( [ x^'; y^'; z^' ]) =
( [ x^'; a_1 - (y^')^2 - z^'; y^' ]) .
The inverse map f^-1_ II is slightly complicated as it involves quartic terms:
( [ x_n-1; y_n-1; z_n-1 ]) = f^-1_ II( [ x_n; y_n; z_n ])
=
( [ -y_n - z^2_n + a_1; z_n; -x_n - y^2_n -2 y_n z^2_n - z^4_n + a_0 + 2 a_1 y_n + 2 a_1 z^2_n - a^2_1 ]).
We propose the following theorem on the topological structure of f_ II:
Let a_0 = a_1 = a > 5+2√(5) and r= (1+√(1+a)). Let V be a hypercube centered at the origin with side length 2r, i.e.,
V = { (x,y,z) | |x|,|y|,|z| ≤ r } .
Then the intersection V ∩ f_ II(V) consists of four disjoint horizontal slabs of V, as shown by Fig. <ref>.
Using the identity relation f_ II^-1(f_ II(V))=V, we obtain an analytic expression for f_ II(V)
f_ II(V) =
{ (x,y,z) | [ |z| ≤ r; |-y - z^2 + a| ≤ r; |-x - y^2 -2 y z^2 - z^4 + a + 2 a (y + z^2) - a^2| ≤ r ]}
The expression for V ∩ f_ II(V) is then obtained trivially by imposing the additional bounds on x and y
V ∩ f_ II(V) =
{ (x,y,z) | [ |x|,|y|,|z| ≤ r; |-y - z^2 + a| ≤ r; |-x - y^2 -2 y z^2 - z^4 + a + 2 a (y + z^2) - a^2| ≤ r ]}
Let Σ^2(y) be the (x,z)-plane parameterized by y (the superscript indicates the dimensionality of the plane), i.e.,
Σ^2(y) = { (x',y',z') | x',z'∈ℝ, y'=y }
and similarly Σ^2(x) the (y,z)-plane parameterized by x, i.e.,
Σ^2(x) = { (x',y',z') | y',z'∈ℝ, x'=x } .
Moreover, define the line segments
S^±_y = { (y,z) | y=± r, |z| ≤ r }
i.e., S^+_y and S^-_y are the right and left boundaries of V, respectively, in each Σ^2(x) slice, as labeled in Fig. <ref>.
To prove this theorem, we need to show that V ∩ f_ II(V) consists of
(a) Four disjoint horizontal strips in every Σ^2(x) for |x| ≤ r;
(b) Four disjoint horizontal strips in every Σ^2(y) for |y| ≤ r.
We now establish conditions (a) and (b) individually.
Condition (a): the second row of Eq. (<ref>) can be rewritten in the parameterized form
y = -z^2 + a + s, where |s| ≤ r .
Let Γ_y(z,s) be the family of parabolas in Σ^2(x)
Γ_y(z,s) = -z^2 + a + s
where s is viewed as a parameter within range |s| ≤ r. It is obvious that Γ_y(z,s) is bounded by
Γ^min_y(z) ≤Γ_y(z,s) ≤Γ^max_y(z)
with lower and upper bounds
Γ^min_y(z) = Γ_y(z,s)|_s=-r = -z^2 + a -r
Γ^max_y(z) = Γ_y(z,s)|_s=r = -z^2 + a + r .
When viewed in each Σ^2(x) slice, f_ II(V) is the gap region between the two parabolas Γ^min_y(z) and Γ^max_y(z) (see Fig. <ref>). The possible location of the two parabolas can be further narrowed down by establishing the following facts:
(a.1) The vertex of Γ^min_y(z) is located on the right-hand side of S^+_y, as labeled by A in Fig. <ref>;
(a.2) Γ^max_y(z) intersects S^-_y at two points, as labeled by C and D in Fig. <ref>.
To establish (a.1), let A=(y_A,z_A). It can be solved easily that
z_A=0, y_A = Γ^min_y(z_A=0)=a-r.
Using the assumption that a>5+2√(5), it is straightforward to verify that a-2r>0, thus y_A >r, i.e., A is on the right-hand side of S^+_y.
To establish (a.2), notice that
Γ^max_y(z=± r) = -r^2 +a +r = -r ,
thus C and D are located at
C = (-r,r), D=(-r,-r) ,
i.e., C and D are the upper-left and lower-left corners of V, respectively, as labeled in Fig. <ref>. Therefore, Γ^max_y(z) intersects S^-_y at its two endpoints.
Combining (a.1) and (a.2), we know that the region bounded by Γ^max_y(z), Γ^min_y(z), and S^±_y consists of two disjoint horizontal strips, labeled by H_1 and H_2 in Fig. <ref>. Strictly speaking, both H_1 and H_2 depend on x, i.e., the position of (y,z)-slice along the x-axis, therefore should be written as H_1(x) and H_2(x). However, since the x-dependence will not be used for the rest of the proof, we simply omit it and write the horizontal strips without explicit x-dependence. When viewed in each Σ^2(x)-slice, V ∩ f_ II(V) can only exist inside H_1 and H_2:
V ∩ f_ II(V) |_Σ^2(x)⊂ H_1 ∪ H_2 .
At this point, let us notice that Eq. (<ref>) only makes use of the second row of Eq. (<ref>), thus only provides a crude bound for V ∩ f_ II(V) |_Σ^2(x). Based upon Eq. (<ref>), we now further refine the bound for V ∩ f_ II(V) |_Σ^2(x) by imposing the third row of Eq. (<ref>).
The third row of Eq. (<ref>) can be rewritten into the parameterized form
-x - y^2 -2 y z^2 - z^4 + a + 2 a (y + z^2) - a^2 = -s, where |s| ≤ r
from which we solve for y and obtain two branches of solutions:
y_±(z,x,s) = -z^2 + a ±√(s-x+a) .
Accordingly, let us define two families of parabolas in Σ^2(x), denoted by Λ^±_y(z,x,s), where
Λ^±_y(z,x,s) = -z^2 + a ±√(s-x+a)
where x and s are viewed as parameters with bounds |x|,|s| ≤ r. When viewed in each Σ^2(x) slice, Λ^+_y(z,x,s) is a family of parabolas parameterized by s, bounded by
Λ^+,1_y(z,x) ≤Λ^+_y(z,x,s) ≤Λ^+,2_y(z,x)
where the lower and upper bounds are attained at
Λ^+,1_y(z,x) = Λ^+_y(z,x,s)|_s=-r = -z^2 + a + √(a-x-r)
Λ^+,2_y(z,x) = Λ^+_y(z,x,s)|_s=r = -z^2 + a + √(a-x+r) .
Similarly, when viewed in each Σ^2(x) slice, Λ^-_y(z,x,s) is a family of parabolas parameterized by s, bounded by
Λ^-,1_y(z,x) ≤Λ^-_y(z,x,s) ≤Λ^-,2_y(z,x)
where the lower and upper bounds are attained at
Λ^-,1_y(z,x) = Λ^-_y(z,x,s)|_s=r = -z^2 + a - √(a-x+r)
Λ^-,2_y(z,x) = Λ^-_y(z,x,s)|_s=-r = -z^2 + a - √(a-x-r) .
It is desirable to get rid of the x-dependence in Eqs. (<ref>) and (<ref>). This can be done by obtaining uniform lower and upper bounds for Λ^±_y(z,x,s) with respect to change in (x,s). A simple calculation shows:
Λ^±,min_y (z) ≤Λ^±_y(z,x,s) ≤Λ^±,max_y (z)
where the bounds are attained at
Λ^+,min_y(z) = Λ^+_y(z,x,s)|_(x,s)=(r,-r) = -z^2 + a + √(a-2r)
Λ^+,max_y(z) = Λ^+_y(z,x,s)|_(x,s)=(-r,r) = -z^2 + a + √(a+2r)
Λ^-,min_y(z) = Λ^-_y(z,x,s)|_(x,s)=(-r,r) = -z^2 + a - √(a+2r)
Λ^-,max_y(z) = Λ^-_y(z,x,s)|_(x,s)=(r,-r) = -z^2 + a - √(a-2r) .
A schematic illustration of the four parabolas is given in Fig. <ref>. At this point, it is worthwhile checking that since a > 5 + 2√(5), we have
a-2r >0 ,
i.e., the square roots in Eqs. (<ref>) and (<ref>) are real-valued. Also, it is easy to check that r = √(a+2r), therefore we obtain the important relations
Λ^+,max_y(z) = Γ^max_y(z)
Λ^-,min_y(z) = Γ^min_y(z) ,
as indicated by Fig. <ref>. Therefore, conditions (a.1) and (a.2) immediately apply to Λ^-,min_y(z) and Λ^+,max_y(z), respectively. This guarantees that the four parabolas (Λ^±,max_y(z) and Λ^±,min_y(z)) cut V into four disjoint horizontal strips, as labeled by h^±_1 and h^±_2 in Fig. <ref>. Furthermore, Eqs. (<ref>) and (<ref>) also guarantee that h^±_1 ⊂ H_1 and h^±_2 ⊂ H_2. Hence when viewed in each Σ^2(x) slice (see Fig. <ref>), V ∩ f_ II(V)|_Σ^2(x) lies within the four strips
V ∩ f_ II(V) |_Σ^2(x)⊂ h^+_1∪ h^-_1 ∪ h^+_2 ∪ h^-_2 ⊂ H_1 ∪ H_2 ,
which establishes condition (a): V ∩ f_ II(V) consists of four disjoint horizontal strips in every Σ^2(x) for |x| ≤ r.
Condition (b): from Eq. (<ref>) we solve for x and obtain
x = -z^4 + 2(a-y)z^2 - (y-a)^2 + a + s, where |s| ≤ r.
Correspondingly, define the family of quartic polynomials
Γ_x(z,y,s) = -z^4 + 2(a-y)z^2 - (y-a)^2 + a + s .
When viewed in Σ^2(y), Γ_x(z,y,s) is a parameterized quartic function of z with parameters y and s. By solving for dΓ_x/ dz=0 and d^2 Γ_x/ dz^2=0 we can easily obtain the three extremals of the quartic function, namely A, B, and C, where
A = (x_A,z_A) = ( -(y-a)^2+a+s,0 ) is a local minimum
B = (x_B,z_B) = ( a+s,√(a-y)) is a global maximum
C = (x_C,z_C) = ( a+s,-√(a-y)) is a global maximum
as demonstrated schematically by Fig. <ref>. Upon changing the value of s within the range |s| ≤ r, Γ_x(z,y,s) is bounded by
Γ^min_x(z,y) ≤Γ_x(z,y,s) ≤Γ^max_x(z,y)
where
Γ^min_x(z,y) = Γ_x(z,y,s)|_s=-r = -z^4 + 2(a-y)z^2 - (y-a)^2 + a - r
Γ^max_x(z,y) = Γ_x(z,y,s)|_s=r = -z^4 + 2(a-y)z^2 - (y-a)^2 + a + r .
Therefore within each Σ^2(y), f_ II(V) is the gap region bounded from left and right by Γ^min_x(z,y) and Γ^max_x(z,y), respectively, as shown by Fig. <ref>. Let A_1, B_1, C_1 be the three extremals of Γ^min_x(z,y), and A_2, B_2, C_2 be the three extremals of Γ^max_x(z,y), as labeled in the figure. Moreover, define the line segments
S^±_x = { (x,z) | x=± r, |z| ≤ r }
i.e., S^+_x and S^-_x are the right and left boundaries of V, respectively, in Σ^2(y). The following two conditions are sufficient for condition (b):
(b.1) The global maximums of Γ^min_x(z,y), labeled by B_1 and C_1 in Fig. <ref>, are on the right-hand side of S^+_x;
(b.2) Γ^max_x(z,y) intersects S^-_x at four points, as labeled by E, F, G, and H in Fig. <ref>.
We now show that conditions (b.1) and (b.2) hold for all |y| ≤ r.
Condition (b.1): The global maximums of Γ^min_x(z,y) are located at
B_1 = (x_B_1, z_B_1), C_1 = (x_C_1,z_C_1)
where x_B_1 = x_C_1 = a-r >r. Thus (b.1) is established.
Condition (b.2): First, notice that the local minimum of Γ^max_x(z,y) is A_2 = (x_A_2,0) where
x_A_2 = -(y-a)^2 +a +r ≤ -(r-a)^2+a+r < -r^2 +a +r = -r
where the second inequality comes from the fact that a-2r>0. Therefore, A_2 is located on the left-hand side of S^-_x, as shown in Fig. <ref>. Second, it can be verified easily that
Γ^max_x(z,y)|_z=± r≤ -r.
Combining Eqs. (<ref>) and (<ref>), (b.2) is established as well. Therefore we have proved condition (b), i.e., V ∩ f_ II(V)|_Σ^2(y) consists of four disjoint horizontal strips, as labeled by h_1, h_2, h_3, and h_4 in Fig. <ref>.
§ TOPOLOGY III: HORSESHOES IN FOUR DIMENSIONS
In the preceding sections we have demonstrated two Hénon-type maps in three dimensions, namely f_ I and f_ II, where f_ I folds V once with a creasing along an expanding direction (y), and f_ II folds V twice with creases along independent expanding directions (y and x). As explained in Fig. <ref>, because there are only three dimensions, the two folding operations in f_ II share the same stacking direction (z), which results in four disjoint horizontal slabs in Fig. <ref>. A natural question is then what would happen if the dimensionality increases to four. In this section, to address this question, we consider a Hénon-type map in four dimensions and introduce a new type of doubly-folded horseshoe which can exist only in dimensions ≥ 4. Then we show that upon changing the parameters of the map, the doubly-folded horseshoe unfolds into a singly-folded horseshoe in four dimensions, which represents a reduction of topological entropy of the system.
Consider the Hénon-type map in four dimensions, namely f_ III
( [ x_n+1; y_n+1; z_n+1; w_n+1 ]) =
f_ III( [ x_n; y_n; z_n; w_n ]) =
( [ a_0 - x^2_n - z_n + c(x_n - y_n); a_1 - y^2_n - w_n - c(x_n - y_n); x_n; y_n ])
which is the coupled Hénon map studied in Part I of this article <cit.>. The parameters here are a_0, a_1, and c. a_0 and a_1 control the rate of expansion in x and y, respectively, and c controls the coupling strength between the dynamics in the (x,z)-plane and the (y,w)-plane.
The inverse of f_ III is
( [ x_n-1; y_n-1; z_n-1; w_n-1 ]) =
f^-1_ III( [ x_n; y_n; z_n; w_n ]) =
( [ z_n; w_n; a_0 - z^2_n - x_n + c(z_n - w_n); a_1 - w^2_n - y_n - c(z_n - w_n) ]) .
Notice that by replacement of variables (x,y,z,w) ↦ (z,w,x,y), f_ III is transformed into f^-1_ III.
In Section. 2.2 of Part I, we have proposed two types of Anti-Integrable (AI) limits <cit.> of Eq. (<ref>), namely Type A and Type B, where Type A is an AI limit with four symbols (Eq. (2.7) therein) and Type B is an AI limit with two symbols (Eq. (2.9) therein). Type A is obtained by taking a_0=a_1→∞ while keeping c fixed and finite. Intuitively speaking, it gives rise to infinite expansion rates within the (x,z) and (y,w) planes but only allows finite coupling between the two planes. Type B is obtained by taking a_0=a_1→∞ while keeping c/√(a)=γ constant. Intuitively, it also gives rise to infinite expansion rates within the (x,z) and (y,w) planes but imposes a coupling strength c proportional to √(a). As we show next, the topologies of the horseshoes near these two AI limits are fundamentally different: Type A is a doubly-folded horseshoe topologically equivalent to a direct product between a pair of two-dimensional singly-folded horseshoes in the (x,z) and (y,w) planes, while Type B is a singly-folded horseshoe in four dimensions. Therefore, when changing the values of parameters (a_0,a_1,c) from the neighborhood of Type A to the neighborhood of Type B, global bifurcations must happen that unfold the doubly-folded horseshoe into the singly-folded horseshoe.
§.§ Topology III-A: doubly folded horseshoe in four dimensions, with independent stacking directions
Topology III-A can only exist in dimensions ≥ 4. Using our example here, it can be realized near the Type-A AI limit of Eq. (<ref>). To better understand the Type-A AI limit, a simple case to start with is when c=0, i.e., zero coupling, for which f_ III reduces to a direct-product between the two-dimensional Hénon maps in the (x,z)-plane and the (y,w)-plane. Therefore when c=0 and a_0, a_1 values greater than the bound given by Devaney and Nitecki (a_0, a_1 > 5+2√(5)), f_ III is identical to a direct-product between the Smale horseshoe maps in the (x,z)-plane and the (y,w)-plane, as illustrated by Fig. <ref>.
Geometrically, the action of f_ III on V involves two steps: the first step expands V in x, contracts it in z, folds it with a crease along y, and stacks it along z; the second step expands it in y, contracts it in w, folds it with a crease along x, and stacks it along w. Although f_ III and f_ II both involve two folding operations, the difference between them is critical: the two folding operations in f_ II share the same stacking direction (z), while the two folding operations in f_ III have independent stacking directions (z and w). Therefore, unlike V∩ f_ II(V) which is composed by four disjoint horizontal slabs, V ∩ f_ III(V) consists of four hypercylinders, each being a direct product of a horizontal strip in the (x,z)-plane and a horizontal strip in the (y,w)-plane. Equivalently speaking, when c=0, V ∩ f_ III(V) is a direct product between two horizontal strips in the (x,z)-plane and two horizontal strips in the (y,w)-plane, as demonstrated by Fig. <ref>.
When c>0, it is reasonable to expect that if c is finite and a_0,a_1≫ c>0, i.e., when the expansion rates in the (x,z) and (y,w) planes (governed by a_0 and a_1, respectively) are much greater compared to the coupling strength c between the two planes, the coupling could be neglected and the resulting topology of V ∩ f_ III(V) should be identical to the c=0 case. Therefore when a_0,a_1≫ c>0, we expect V ∩ f_ III(V) to be topologically equivalent to a direct product of a pair of two-dimensional Smale horseshoes, as illustrated by Fig. <ref>. We now give a concrete proof of this under some analytical bounds on the parameters a_0, a_1, and c.
Let A_0 = (a_0 + a_1)/2 ≥ -1 and r= 2 √(2)(1+√(1+A_0)). Let V be a hypercube centered at the origin with side length 2r, i.e.,
V = { (x,y,z,w) | |x|,|y|,|z|,|w| ≤ r } .
Given the bounds on parameters
0 < 1/4c^2 + a_i - (c+2) r , (i=0,1)
0 ≤ r^2 - 2(c+1) r - a_i , (i=0,1)
the intersection V ∩ f_ III(V) is homeomorphic to a direct product between two disjoint horizontal strips in the (x,z)-plane and two disjoint horizontal strips in the (y,w)-plane, i.e., it retains the direct-product structure shown by Fig. <ref>.
Note that the definitions of A_0 and r are the same as in Part I of this article <cit.>, and the bounds provided by Eqs. (<ref>) and (<ref>) are identical to Eqs. (3.12) and (3.13) of Part I as well.
Let Σ^2(y,w) be the (x,z)-plane parameterized by (y,w), i.e.,
Σ^2(y,w) = { (x',y',z',w') | x',z'∈ℝ, y'=y, w'=w }
and similarly Σ^2(x,z) the (y,w)-plane parameterized by (x,z), i.e.,
Σ^2(x,z) = { (x',y',z',w') | y',w'∈ℝ, x'=x, z'=z } .
Moreover, let V ∩ f_ III(V)|_Σ^2(y,w) denote the restriction of V ∩ f_ III(V)∩Σ^2(y,w) on Σ^2(y,w), i.e., the (x,z)-slice of V ∩ f_ III(V). Similarly, let V ∩ f_ III(V)|_Σ^2(x,z) denote the restriction of V∩ f_ III(V)∩Σ^2(x,z) on Σ^2(x,z), i.e., the (y,w)-slice of V∩ f_ III(V).
Using the identity relation f_ III^-1(f_ III(V))=V we obtain an analytic expression for f_ III(V)
f_ III(V) =
{ (x,y,z,w) | [ |z| ≤ r; |w| ≤ r; |a_0 - z^2 - x + c(z-w)| ≤ r; |a_1 - w^2 - y - c(z-w)| ≤ r ]} .
The expression for V ∩ f_ III(V) is then easily obtained by imposing the additional constraints of |x|,|y| ≤ r:
V ∩ f_ III(V) =
{ (x,y,z,w) | [ |x|,|y|,|z|,|w| ≤ r; |a_0 - z^2 - x + c(z-w)| ≤ r; |a_1 - w^2 - y - c(z-w)| ≤ r ]} .
To prove this theorem, it is sufficient to establish the following two conditions:
(a) V ∩ f_ III(V)|_Σ^2(y,w) consists of two disjoint horizontal strips for all |y|,|w| ≤ r.
(b) V ∩ f_ III(V)|_Σ^2(x,z) consists of two disjoint horizontal strips for all |x|,|z| ≤ r.
We now establish these two conditions individually.
Condition (a): the second row of Eq. (<ref>) is equivalent to
-s = a_0 - z^2 - x + c(z-w), where |s|≤ r
and thus
x=-z^2 + cz + a_0 + s-cw, where |s|≤ r .
Correspondingly, define a family of parabolas
Γ_x(z,w,s)=-z^2 + cz + a_0 + s-cw ,
which is viewed as a quadratic function of z with parameters w and s bounded by |w|,|s|≤ r.
With the help of Eqs. (<ref>) and (<ref>), V ∩ f_ III(V)|_Σ^2(y,w) (for which |y|,|w| ≤ r) can be expressed as
V ∩ f_ III(V)|_Σ^2(y,w) = { (x,z) | [ |x|,|z|,|s| ≤ r; x=Γ_x(z,w,s) ]} ,
as illustrated schematically by Fig. <ref>.
Let Γ^1_x(z,w) and Γ^2_x(z,w) be parabolas in Σ^2(y,w) obtained by setting the s parameter in Eq. (<ref>) to -r and r, respectively:
Γ^1_x(z,w) =Γ_x(z,w,s)|_s=-r = -z^2 +cz + a_0 -r -cw
Γ^2_x(z,w) =Γ_x(z,w,s)|_s=r = -z^2 +cz + a_0 +r -cw .
Furthermore, let Let Γ^min_x(z) and Γ^max_x(z) be parabolas in Σ^2(y,w) obtained by setting (s,w)=(-r,r) and (s,w)=(r,-r), respectively:
Γ^min_x(z) = Γ_x(z,w,s)|_(s,w)=(-r,r) = -z^2 +cz + a_0 - (c+1)r
Γ^max_x(z) = Γ_x(z,w,s)|_(s,w)=(r,-r) = -z^2 +cz + a_0 + (c+1)r .
Notice that the w-dependence is removed in the expressions of Γ^min_x and Γ^max_x. Since |w|≤ r, Γ^min_x(z) and Γ^max_x(z) provide uniform lower and upper bounds for Γ^1_x(z,w) and Γ^2_x(z,w):
Γ^min_x(z) ≤Γ^1_x(z,w) ≤Γ_x(z,w,s) ≤Γ^2_x(z,w) ≤Γ^max_x(z) .
Geometrically, Γ^1_x(z,w) and Γ^2_x(z,w) are the left and right boundaries of f_ III(V), and they must exist in the gap between Γ^min_x(z) and Γ^max_x(z), as shown by Fig. <ref>.
Let S^+_x and S^-_x be the right and left boundaries of V, respectively
S^+_x = { (x,z) | x=r, |z| ≤ r }
S^-_x = { (x,z) | x=-r, |z| ≤ r } .
It is straightforward that condition (a) is equivalent to the following two conditions:
(a.1) The vertex of Γ^min_x(z), as labeled by A in Fig. <ref>, is located on the right-hand side of S^+_x.
(a.2) Γ^max_x(z) intersects S^-_x at two points (e.g., points C and D in Fig. <ref>) .
When both are satisfied, f_ III(V) must intersect V at two disjoint horizontal strips, therefore give rise two a topological binary horseshoe in every Σ^2(y,w) slice. We now show that conditions (a.1) and (a.2) are satisfied given the bounds of Eqs. (<ref>) and (<ref>).
Condition (a.1): the vertex A of Γ^min_x(z) is computed as
(x_A,z_A) = ( c^2/4 + a_0 - (c+1)r, c/2) .
From Eq. (<ref>) we immediately know that x_A >r, i.e., A is located on the right-hand side of S^+_x.
Condition (a.2): this is equivalent to the condition that Γ^max_x(z=± r) ≤ r, which can be easily deduced from Eq. (<ref>).
Therefore, Eqs. (<ref>) and (<ref>) are sufficient for the existence of two disjoint horizontal strips, which gives rise to a topological binary horseshoe in every Σ^2(y,w) slice. Condition (a) is established.
Condition (b): due to the symmetry of Eq. (<ref>), by interchanging (x,z) with (y,w), our proof for condition (a) immediately applies to condition (b). Consequently, V ∩ f_ III(V) is topologically equivalent to a direct product between a pair of two-dimensional Smale horseshoes, which is a doubly-folded horseshoe in four dimensions as shown by Fig. <ref>.
§.§ Topology III-B: singly folded horseshoe in four dimensions
By taking the limit a_0=a_1=a →∞ while keeping c/√(a)=γ=constant, we obtain the Type-B AI limit. Equivalently speaking, Type-B can be attained by allowing the coupling strength c in Type-A to approach infinity while keeping it in constant proportion to √(a). As we will show next, the topology of Type-B AI limit is simpler compared to Type-A as it involves only one folding.
As shown by Part I of this paper, Type-B AI limit is more conveniently studied by performing the change of coordinates
([ X; Y; Z; W ])
=1/2([ x+y; x-y; z+w; z-w; ]),
under which Eq. (<ref>) can be rewritten as
([ X_n+1; Y_n+1; Z_n+1; W_n+1 ])
=F([ X_n; Y_n; Z_n; W_n ])
=([ A_0-(X_n^2+Y_n^2)-Z_n; A_1-2X_nY_n-W_n+2cY_n; X_n; Y_n ])
where
A_0=a_0+a_1/2, A_1=a_0-a_1/2.
The inverse map F^-1 is given by
([ X_n-1; Y_n-1; Z_n-1; W_n-1 ])
=F^-1([ X_n; Y_n; Z_n; W_n ])
=([ Z_n; W_n; A_0-(Z_n^2+W_n^2)-X_n; A_1-2Z_nW_n-Y_n+2cW_n; ]) .
Let R= 1 + √(1+ A_0), and V_F be a hypercube centered at the origin with side length 2R, i.e.,
V_F = { (X,Y,Z,W) | |X|,|Y|,|Z|,|W| ≤ R } .
If the parameters satisfy the following conditions:
A_1 ≤ R<c,
R<A_0-(W^*)^2-R,
W^*≤ R
where W^*=max(|2R-A_1/2(c-R)|, |-2R-A_1/2(c-R)|), then V_F ∩ F(V_F) is homeomorphic to a direct product between two disjoint horizontal strips in the (X,Z) plane and a single horizontal strip in the (Y,W) plane.
Let Σ^2(Y,W) be the (X,Z)-plane parameterized by (Y,W):
Σ^2(Y,W) = { (X',Y',Z',W') | X',Z'∈ℝ, Y'=Y, W'=W }
and similarly Σ^2(X,Z) the (Y,W)-plane parameterized by (X,Z):
Σ^2(X,Z) = { (X',Y',Z',W') | Y',W'∈ℝ, X'=X, Z'=Z } .
Moreover, let V_F ∩ F(V_F)|_Σ^2(Y,W) denote the restriction of V_F ∩ F(V_F)∩Σ^2(Y,W) on Σ^2(Y,W), i.e., the (X,Z)-slice of V_F ∩ F(V_F). Similarly, let V_F ∩ F(V_F)|_Σ^2(X,Z) denote the restriction of V_F∩ F(V_F)∩Σ^2(X,Z) on Σ^2(X,Z), i.e., the (Y,W)-slice of V_F∩ F(V_F).
Using the identity relation F^-1(F(V_F)) = V_F, we obtain an analytic expression for F(V_F)
F(V_F) =
{ (X,Y,Z,W) | [ |Z|,|W| ≤ R; |A_0 - (Z^2+W^2) - X | ≤ R; |A_1 - 2ZW - Y + 2cW| ≤ R ]} ,
therefore the expression for V_F ∩ F(V_F) is obtained by imposing the trivial constraints on X and Y:
V_F ∩ F(V_F) =
{ (X,Y,Z,W) | [ |X|,|Y|,|Z|,|W| ≤ R; |A_0 - (Z^2+W^2) - X | ≤ R; |A_1 - 2ZW - Y + 2cW| ≤ R ]} .
To prove this theorem, it is sufficient to establish the following two conditions:
(a) V_F ∩ F(V_F)|_Σ^2(X,Z) consists of a single horizontal strip for all |X|,|Z|≤ R.
(b) V_F ∩ F(V_F)|_Σ^2(Y,W) consists of two disjoint horizontal strips for all |Y|,|W|≤ R.
We now proceed to establish conditions (a) and (b) individually.
Condition (a): by restricting Eq. (<ref>) to a particular Σ^2(X,Z) plane for which |X|,|Z| ≤ R, we obtain the expression for V_F ∩ F(V_F)|_Σ^2(X,Z):
V_F ∩ F(V_F) |_Σ^2(X,Z) =
{ (Y,W) | [ |Y|,|W| ≤ R; |A_1 - 2ZW - Y + 2cW| ≤ R ]} .
The second row of Eq. (<ref>) is equivalent to
Y = 2(c-Z)W + A_1 + s
where s is a parameter within bound |s| ≤ R. Thus Eq. (<ref>) can be rewritten as
V_F ∩ F(V_F) |_Σ^2(X,Z) =
{ (Y,W) | [ |Y|,|W|,|s| ≤ R; Y = 2(c-Z)W + A_1 + s ]} .
From Eq. (<ref>) we solve for W:
W = Γ_W(Y,Z,s) ≡Y - A_1 - s/2(c-Z) .
Within each Σ^2(X,Z) plane, Γ_W(Y,Z,s) is a function of Y with fixed parameter Z and varying parameter s. From Eq. (<ref>) we know c>R, since |Z| ≤ R, it is obvious that the denominator in Eq. (<ref>) is always positive. Therefore Γ_W is a straight-line parameterized by s with positive slope, with uniform lower and upper bounds Γ_W^1 (Y,Z) and Γ_W^2 (Y,Z), respectively, where
Γ_W^1 (Y,Z) = Γ_W(Y,Z,s)|_s=R = Y - A_1 - R/2(c-Z)
Γ_W^2 (Y,Z) = Γ_W(Y,Z,s)|_s=-R = Y - A_1 + R/2(c-Z) .
Furthermore, the maximum and minimum of W under all possible (Y,Z,s) values, denoted by W^max and W^min respectively, are
W^ max = Γ_W(Y,Z,s)|_(Y,Z,s)=(R,R,-R) = 2R-A_1/2(c-R)
W^ min = Γ_W(Y,Z,s)|_(Y,Z,s)=(-R,R,R) =-2R-A_1/2(c-R) .
W^min and W^max provide uniform upper and lower bounds for Γ_W^1 (Y,Z) and Γ_W^2 (Y,Z), respectively, in every Σ^2(X,Z) plane:
W^min≤Γ_W^1 (Y,Z) < Γ_W^2 (Y,Z) ≤ W^max,
as depicted in Fig. <ref>.
Since Eq. (<ref>) already guarantees that W^*=max( |W^min|,|W^max| ) ≤ R, Eq. (<ref>) can be further bounded by
-R ≤ -W^*≤ W^min≤Γ_W^1 (Y,Z) < Γ_W^2 (Y,Z) ≤ W^max≤ W^*≤ R .
Since V_F ∩ F(V_F)|_Σ^2(X,Z) is the gap between Γ_W^1(Y,Z) and Γ_W^2(Y,Z), Eq. (<ref>) indicates that this gap is a horizontal strip which intersects V_F fully in the Y-direction, and the width of V_F ∩ F(V_F) must be strictly smaller than 2R when measured in the W-direction, as shown by Fig. <ref>. Thus condition (a) is established.
Condition (b): by constraining Eq. (<ref>) to a particular Σ^2(Y,W) plane for which |Y|,|W| ≤ R, we obtain the expression for V_F ∩ F(V_F)|_Σ^2(Y,W):
V_F ∩ F(V_F) |_Σ^2(Y,W) =
{ (X,Z) | [ |X|,|Z| ≤ R; |A_0 -(Z^2+W^2) -X | ≤ R ]} .
The second row of Eq. (<ref>) is equivalent to
X = Γ_X(Z,W,s) ≡ -Z^2 - W^2 + A_0 + s .
Within each particular Σ^2(Y,W) plane, Γ_X(Z,W,s) is a quadratic function of Z with fixed parameter W and varying parameter s (|s| ≤ R). Eq. (<ref>) can thus be rewritten as
V_F ∩ F(V_F) |_Σ^2(Y,W) =
{ (X,Z) | [ |X|,|Z|,|s| ≤ R; X=Γ_X(Z,W,s) ]} .
Let Γ^1_X(Z,W) and Γ^2_X(Z,W) be parabolas in Σ^2(Y,W) obtained by setting the s parameter in Eq. (<ref>) to -R and R, respectively:
Γ^1_X(Z,W) = Γ_X(Z,W,s)|_s=-R = -Z^2 - W^2 + A_0 -R
Γ^2_X(Z,W) = Γ_X(Z,W,s)|_s=R = -Z^2 -W^2 + A_0 +R .
Furthermore, let Γ^min_X(Z) and Γ^max_X(Z) be parabolas obtained by setting (W,s)=(W^*,-R) and (W,s)=(0,R), respectively:
Γ^min_X(Z) = Γ_X(Z,W,s)|_(W,s)=(W^*,-R) = -Z^2 - (W^*)^2 + A_0 -R
Γ^max_X(Z) = Γ_X(Z,W,s)|_(W,s)=(0,R) = -Z^2 + A_0 + R .
Notice that the W-dependence is removed in the expressions for Γ^min_X and Γ^max_X. From Eq. (<ref>) we know |W| ≤ W^*, thus Γ^min_X(Z) and Γ^max_X(Z) provide uniform lower and upper bounds for Γ^1_X(Z,W) and Γ^2_X(Z,W):
Γ^min_X(Z) ≤Γ^1_X(Z,W) < Γ^2_X(Z,W) ≤Γ^max_X(Z) .
Geometrically, when observed within each Σ^2(Y,W) plane, Γ^1_X(Z,W) and Γ^2_X(Z,W) are the left and right boundaries of F(V_F), and they must exist in the gap region bounded by Γ^min_X(Z) and Γ^max_X(Z), as shown by Fig. <ref>.
Let S^+_X and S^-_X be the right and left boundaries of V_F|_Σ^2(Y,W), respectively
S^+_X = { (X,Z) | X=R, |Z| ≤ R }
S^-_X = { (X,Z) | X=-R, |Z| ≤ R } .
To prove condition (b), it is sufficient to prove the following two conditions:
(b.1) The vertex of Γ^min_X(Z), labeled by A in Fig. <ref>, is located on the right-hand side of S^+_X;
(b.2) Γ^max_X(Z) intersects S^-_X at two points (points C and D in Fig. <ref>) .
We now show that conditions (b.1) and (b.2) are satisfied by the parameter bounds in Eqs. (<ref>)-(<ref>).
Condition (b.1): the vertex A of Γ^min_X(Z) is computed as
(X_A,Z_A) = ( A_0 - (W^*)^2 -R, 0 ) .
From Eq. (<ref>) we immediately know that X_A > R, i.e., A is located on the right-hand side of S^+_X.
Condition (b.2): this is equivalent to the condition that Γ^max_X(Z=± R) ≤ R. Since
Γ^max_X(Z=± R) = -R^2 + A_0 +R = -R ≤ -R
where the second equality is due to the fact that R=1+√(1+A_0), condition (b.2) follows. In fact, Eq. (<ref>) indicates that the parabola Γ^max_X(Z) intersects V_F at its two corner points, as labeled by C and D in Fig. <ref>.
Therefore, Eqs. (<ref>)-(<ref>) are sufficient for the existence of two disjoint horizontal strips, which gives rise to topological binary horseshoes in every Σ^2(Y,W) slice. Condition (b) is established.
§ TOPOLOGY IV: DOUBLY-FOLDED HORSESHOE IN FOUR DIMENSIONS, WITH A COMMON STACKING DIRECTION
In Section. <ref>, we have introduced Topology II, a doubly-folded horseshoe with a common stacking direction in three dimensions, with an example realization given by f_ II. In this section, we introduce Topology IV, a four-dimensional horseshoe which is topologically equivalent to a direct product between a three-dimensional Topology II horseshoe and an one-dimensional uniform contraction.
The example realization that we use here is f_ IV, a four-dimensional generalization of f_ II:
( [ x^'; y^'; z^'; w^' ]) =
f_ IV( [ x; y; z; w ]) =
( [ a_0 - x^2 - z + c(x-w); a_1 - y^2 - x; y; bw + c(w-x) ])
where a_0, a_1, b, and c are parameters and 0≤ c<b<1. Since we only focus on the topological structure and are not interested in the metric properties, we assume a_0=a_1=a hereafter. The inverse mapping f^-1_ IV is given by
( [ x; y; z; w ]) =
f^-1_ IV( [ x^'; y^'; z^'; w^' ]) =
( [ -y^'-(z^')^2+a; z^'; z(x^',y^',z^',w^'); w(y^',z^',w^') ])
where
z(x^',y^',z^',w^')=-(z^')^4 + [ 2(a-y^')-bc/b+c](z^')^2
+ [ -(y^')^2 + ( 2a-bc/b+c)y^' +a -a^2 + abc/b+c - x^' - c/b+cw^']
and
w(y^',z^',w^')=w^'-cy^'-c(z^')^2+ca/b+c .
When c=0, f_ IV reduces to a pseudo three-dimensional map for which the dynamics in the (x,y,z)-hyperplane is decoupled from the dynamics along the w-axis. The (x,y,z)-dynamics is identical to f_ II, and w-dynamics is a uniform contraction by constant factor b. Therefore when c=0, under suitable choices of a_0, a_1, and V, we expect V ∩ f_ IV(V) to reproduce the topology of V ∩ f_ II(V) in the (x,y,z)-hyperplane, while in the w-direction, f_ IV(V) is simply a sub-segment of the line segment V. This geometry is demonstrated by Fig. <ref>.
When c>0, the c(x-w) and c(w-x) terms in Eq. (<ref>) introduce linear coupling between the (x,y,z)-subspace and the w-subspace dynamics, thus gives rise to dynamics more complicated than the previous c=0 case. However, it is reasonable to expect that when c is small enough, the coupling terms should act as a perturbation to the uncoupled dynamics, thus the topological structure of V ∩ f_ IV(V) should be preserved. The next theorem shows that this is indeed the case for certain range of parameters.
Let a_0=a_1=a>32+8√(2), 0 ≤ c < b < 1, and r= 2 √(2)(1+√(1+a)). Let V be a hypercube centered at the origin with side length 2r, i.e.,
V = { (x,y,z,w) | |x|,|y|,|z|,|w| ≤ r } .
Given the following additional bounds on parameters b and c:
c ≤(1-b)r/r^2+2r-a
bc/b+c<2(a-r)
c/b+c < 2r-2√(r^2-b^2(a-2r))/b^2
c/b+c < a(a-2r)/ab+(1-b)r
c/b+c < r^2-2r-a/(1+b)r ,
the intersection V ∩ f_ IV(V) is homeomorphic to a direct product between four disjoint horizontal slabs in the (x,y,z)-subspace and an one-dimensional line segment in the (w)-subspace, as illustrated by Fig. <ref>.
Eqs. (<ref>)-(<ref>) provide upper bounds on c such that the topology of the c=0 case (Fig. <ref>) is preserved.
Let Σ^3(w) be the (x,y,z)-hyperplane parameterized by w, i.e.,
Σ^3(w) = { (x̃,ỹ,z̃,w̃) | x̃,ỹ,z̃∈ℝ, w̃=w }
and Σ^1(x,y,z) the w-line parameterized by (x,y,z), i.e.,
Σ^1(x,y,z) = { (x̃,ỹ,z̃,w̃) | w̃∈ℝ, x̃=x, ỹ=y, z̃=z } .
From the identity relation f^-1_ IV( f_ IV(V) )=V, the analytic expression for V ∩ f_ IV(V) can be obtained:
V ∩ f_ IV(V) =
{ (x^',y^',z^',w^') | [ |x^'|,|y^'|,|z^'|,|w^'| ≤ r; |-y^'-(z^')^2+a| ≤ r; |z(x^',y^',z^',w^')| ≤ r; |w(y^',z^',w^')| ≤ r ]}
where the functions z(x^',y^',z^',w^') and w(y^',z^',w^') are defined by Eq. (<ref>) and Eq. (<ref>), respectively. To prove the theorem, it is sufficient to prove that V ∩ f_ IV(V) is topologically equivalent to:
(a) Topology-II horseshoe in every Σ^3(w) for which |w| ≤ r, as illustrated by Fig. <ref>.
(b) Line segment which is a subset of [-r,r] in every Σ^1(x,y,z) for which |x|,|y|,|z| ≤ r, as illustrated by Fig. <ref> .
We have already established in Sec. <ref> that condition (a) is equivalent to the following two conditions:
(a.1) V ∩ f_ IV(V)|_Σ^2(y,w) consists of four disjoint horizontal strips for all |y|,|w| ≤ r, as shown by Fig. <ref>.
(a.2) V ∩ f_ IV(V)|_Σ^2(x,w) consists of four disjoint horizontal strips for all |x|,|w| ≤ r, as shown by Fig. <ref>.
Next, we prove conditions (a.1), (a.2), and (b) individually.
(a.1): Combining Eq. (<ref>) and the third row of Eq. (<ref>) we obtain
-s = -(z^')^4 + [ 2(a-y^')-bc/b+c](z^')^2
+ [ -(y^')^2 + ( 2a-bc/b+c)y^' +a -a^2 + abc/b+c - x^' - c/b+cw^']
where the parameter s varies within range -r ≤ s ≤ r. Omitting the primes on the variables and expressing x in terms of (z,y,w,s) we get
x = Γ_x(z,y,w,s) = -z^4 + [ 2(a-y)-bc/b+c]z^2
-[ (y-a)^2+bc/b+c y ] + (1+bc/b+c)a +s - c/b+c w .
Γ_x(z,y,w,s) is viewed as a quartic function of z, parameterized by (y,w,s) with range |y|,|w|,|s| ≤ r.
In a particular Σ^2(y,w) slice, the values of (y,w) are fixed, the maximum and minimum of Γ_x(z,y,w,s) are attained at
Γ^max_x(z,y,w)=Γ_x(z,y,w,s)|_s=r = -z^4 + [ 2(a-y)-bc/b+c]z^2
-[ (y-a)^2+bc/b+c y ] + (1+bc/b+c)a +r - c/b+c w ,
Γ^min_x(z,y,w)=Γ_x(z,y,w,s)|_s=-r = -z^4 + [ 2(a-y)-bc/b+c]z^2
-[ (y-a)^2+bc/b+c y ] + (1+bc/b+c)a -r - c/b+c w .
Furthermore, the extremals of Γ_x(z,y,w,s) within a particular Σ^2(y,w) slice can be identified by the condition
d/dzΓ_x(z,y,w,s) = 0
which leads to
-4z^3 + 2[ 2(a-y)-bc/b+c]z = 0 .
Eq. (<ref>) has three solutions, which lead to three extremals, namely point A, B, and C, where
A = (x_A,z_A)
x_A = -[ (y-a)^2 + bc/b+cy ] + ( 1+bc/b+c)a +s - c/b+c w
z_A = 0 ,
B = (x_B,z_B)
x_B = a+s+b^2c^2-4c(b+c)w/4(b+c)^2
z_B = √((a-y)-bc/2(b+c)) ,
and
C = (x_C,z_C)
x_C = a+s+b^2c^2-4c(b+c)w/4(b+c)^2
z_C = -√((a-y)-bc/2(b+c)) .
The second derivatives of Γ_x at the three extremals can be computed as
d^2 Γ_x/dz^2|_A = 4(a-y) -2bc/b+c≥ 4(a-r) -2bc/b+c ,
d^2 Γ_x/dz^2|_B = d^2 Γ_x/dz^2|_C = -8(a-y) + 4 bc/b+c≤ -8(a-r) + 4 bc/b+c .
Using the bound imposed by Eq. (<ref>) we can easily derive that
d^2 Γ_x/dz^2|_A >0 ,
d^2 Γ_x/dz^2|_B = d^2 Γ_x/dz^2|_C < 0 .
This indicates that A is a local minimum, while B and C are two global maximums of the quartic function Γ_x, as illustrated by Fig. <ref>.
At this point, we have shown that Γ_x has the desired shape. Consequently, the following two conditions are sufficient for (a.1):
(a.1.1) The global maximums of Γ^min_x(z,y,w), as labeled by B_1 and C_1 in Fig. <ref>, are on the right-hand side of S^+_x;
(a.1.2) Γ^max_x(z,y,w) intersects S^-_x at four points, as labeled by E, F, G, H in Fig. <ref>.
To establish (a.1.1), note that the global maximums of Γ^min_x(z,y,w) are B_1=(x_B_1,z_B_1) and C_1=(x_C_1,z_C_1), where
x_B_1 = x_C_1 = a - r + b^2 c^2 - 4c(b+c)w/4(b+c)^2 .
The bound imposed by Eq. (<ref>) guarantees that
b^2 ( c/b+c)^2 -4r ( c/b+c) + 4(a-2r) > 0
which can be simplified into
cr/b+c - b^2c^2/4(b+c)^2 < a-2r .
Since |w|≤ r we have
cw/b+c - b^2c^2/4(b+c)^2 < cr/b+c - b^2c^2/4(b+c)^2 <a-2r ,
which, upon some algebraic manipulations, yields
a - r + b^2 c^2 - 4c(b+c)w/4(b+c)^2 > r ,
i.e., x_B_1=x_C_1 > r. Thus (a.1.1) is established.
To establish (a.1.2), it is sufficient to establish the following two conditions:
(a.1.2.1) The local minimum of Γ^max_x(z,y,w), labeled by A_2 in Fig. <ref>, is located on the left-hand side of S^-_x .
(a.1.2.2) Γ^max_x(z,y,w)|_z=± r≤ -r for all |y|,|w| ≤ r.
To prove (a.1.2.1), note that the horizontal position of A_2 is
x_A_2 = -[ (y-a)^2 + bc/b+cy ] + ( 1+bc/b+c)a +r - c/b+c w .
Let
g(y) ≡ (y-a)^2 + bc/b+cy = y^2 - ( 2a-bc/b+c)y + a^2 ,
then x_A_2 is re-written as
x_A_2 = -g(y) + ( 1+bc/b+c)a +r - c/b+c w .
The vertex of the parabola g(y) is
Vertex of g(y) = ( a-bc/2(b+c), 4a^2 - (2a-bc/b+c)^2/4) ,
as demonstrated by Fig. <ref>. From the bound imposed by Eq. (<ref>) we know
a-bc/2(b+c)>r ,
thus the vertex of g(y) is not attained within |y| ≤ r. Therefore, the minimum of g(y) within |y|≤ r is attained at y=r:
g(y) ≥ g(r) = (a-r)^2 + bc/b+cr, ∀ |y|≤ r ,
as illustrated by Fig. <ref>. Consequently, x_A_2 is bounded from above by
x_A_2≤ -g(r) + ( 1+bc/b+c)a + r + c/b+cr
= -(a-r)^2 - bc/b+cr + ( 1+bc/b+c)a + r + c/b+cr .
From the bound imposed by Eq. (<ref>) we obtain
c/b+c < a(a-2r)/ab+(1-b)r < (a-r)^2-a-2r/ab+(1-b)r
where the second inequality comes from the fact that r^2 - 2r -a >0. Eq. (<ref>) is equivalent to
-(a-r)^2 - bc/b+cr + ( 1+bc/b+c)a + r + c/b+cr < -r ,
which, when substituted into Eq. (<ref>), yields
x_A_2 < -r .
Condition (a.1.2.1) is thus established.
To prove (a.1.2.2), notice that upon straightforward algebraic manipulations, Γ^max_x(z,y,w)|_z=± r≤ -r can be shown to be equivalent to
h(y) ≡ y^2 + ( 14a + bc/b+c + 8√(2)r )y + 49a^2 + 8abc/b+c
- a( 1+bc/b+c) -2r + 56√(2)ar + 4√(2)rbc/b+c + 32r^2 + c/b+cw ≥ 0
where the facts that r^2 = 4√(2)r + 8a and r^4 = 32 r^2 + 64√(2)ar + 64 a^2 have been used. Treating h(y) as a quadratic function of y whose graph gives rise to a parabola, the vertex of the parabola is attained at
y_ vertex = -7a - 4√(2)r - bc/2(b+c) < -r .
Consequently, the minimum of h(y) within y ∈ [-r,r] is attained at y=-r, thus
h(y)|_y∈ [-r,r]≥ h(-r) .
Furthermore, h(-r) can be shown to be positive. This is due to the fact that
h(-r) = r^2 - ( 14a + bc/b+c + 8√(2)r )r + 49a^2 + 8abc/b+c
- a( 1+bc/b+c) -2r + 56√(2)ar + 4√(2)rbc/b+c + 32r^2 + c/b+cw
≥ r^2 - ( 14a + bc/b+c + 8√(2)r )r + 49a^2 + 8abc/b+c
- a( 1+bc/b+c) -2r + 56√(2)ar + 4√(2)rbc/b+c + 32r^2 - c/b+cr
= [ (4√(2)-1)br + 7ab - r ]c/b+c + (132√(2) - 66)r
+ (263-64√(2))a + (56√(2)-14)ar + 49a^2 >0
where the fact that r^2 = 4√(2)r + 8a is again used. Combining Eqs. (<ref>) and (<ref>) we get
h(y)|_y∈[-r,r] > 0 ,
which is equivalent to
Γ^max_x(z,y,w)|_z=± r≤ -r .
Thus (a.1.2.2) is established. Consequently, conditions (a.1.2) and (a.1) are established as well.
(a.2): from the second row in Eq. (<ref>) we know
-y-z^2+a=-s
where |s| ≤ r and the primes on the variables are omitted for simplicity. Therefore
y = -z^2+a+s
which is identical to Eq. (<ref>). Therefore, repeating the same steps in Section. <ref>, we define the parabolas Γ_y(z,s), Γ^min_y(z), and Γ^max_y(z) using Eq. (<ref>), (<ref>) and (<ref>), respectively, and the relationship in Eq. (<ref>) holds immediately.
Within each Σ^2(x,w) with |x|,|w| ≤ r, f_ IV(V) lies within the gap between the two parabolas Γ^min_y(z) and Γ^max_y(z). The locations of the two parabolas can be further narrowed down by establishing the following facts:
(a.2.1) The vertex of Γ^min_y(z) is located on the right-hand side of S^+_y, labeled by A in Fig. <ref>;
(a.2.2) Γ^max_y(z) intersects S^-_y at two points, labeled by C and D in Fig. <ref>.
To establish (a.2.1), let A=(y_A,z_A). It can be solved easily that
z_A=0, y_A = Γ^min_y(z_A=0)=a-r.
Recall that a-2r>0, thus y_A >r, i.e., A is on the right-hand side of S^+_y.
To establish (a.2.2), notice that since r = 2√(2)(1+1√(1+a))>1+1√(1+a),
Γ^max_y(z=± r) = -r^2 +a +r < -r ,
thus (a.2.2) follows. Combining conditions (a.2.1) and (a.2.2), we obtain
V ∩ f_ IV(V)|_Σ^2(x,w)⊂ H_1 ∪ H_2
where H_1 and H_2 are horizontal strips shown by Fig. <ref>.
At this point, Eq. (<ref>) provides a coarse bound for V ∩ f_ IV(V)|_Σ^2(x,w). A refined bound can be obtained in the following. Using the third row of Eq. (<ref>) along with Eq. (<ref>) we get:
-s =-(z^')^4 + [ 2(a-y^')-bc/b+c](z^')^2
+ [ -(y^')^2 + ( 2a-bc/b+c)y^' +a -a^2 + abc/b+c - x^' - c/b+cw^']
where s is a parameter within range -r ≤ s ≤ r. Omitting the primes on the variables and expressing y in terms of (z,x,w,s) lead to two branches of solutions
Λ^±_y(z,x,w,s) = y_±(z,x,w,s)
= -z^2 + a - bc/2(b+c)±√((a-x+s)-cw/b+c + b^2 c^2/4(b+c)^2) .
Notice that for the c=0 special cases, f_ IV reduces to the uncoupled direct product between f_ II in (x,y,z) and a uniform contraction in (w), correspondingly, Eq. (<ref>) reduces to Eq. (<ref>).
Upon varying the values of (x,w,s) within range |x|,|w|,|s| ≤ r while keeping z fixed, the maximum and minimum of Eq. (<ref>) are attained at
Λ^+,max_y(z) = Λ^+_y(z,x,w,s)|_x=-r, w=-r, s=r
= -z^2 + a - bc/2(b+c) + √((a+2r)+cr/b+c + b^2 c^2/4(b+c)^2)
Λ^+,min_y(z) = Λ^+_y(z,x,w,s)|_x=r, w=r, s=-r
= -z^2 + a - bc/2(b+c) + √((a-2r)-cr/b+c + b^2 c^2/4(b+c)^2)
Λ^-,max_y(z) = Λ^-_y(z,x,w,s)|_x=r, w=r, s=-r
= -z^2 + a - bc/2(b+c) - √((a-2r)-cr/b+c + b^2 c^2/4(b+c)^2)
Λ^-,min_y(z) = Λ^-_y(z,x,w,s)|_x=-r, w=-r, s=r
= -z^2 + a - bc/2(b+c) - √((a+2r)+cr/b+c + b^2 c^2/4(b+c)^2) .
It can be verified that Eq. (<ref>) guarantees
(a-2r)-cr/b+c + b^2 c^2/4(b+c)^2 > 0 ,
thus the square roots in Eqs. (<ref>) and (<ref>) are real-valued. It is quite obvious that
Λ^-,min_y(z)<Λ^-,max_y(z)<Λ^+,min_y(z)<Λ^+,max_y(z) .
Recall that we have previously obtained a coarse bound for V ∩ f_ IV(V)|_Σ^2(x,w) in Eq. (<ref>), where the horizontal strips H_1 and H_2 are bounded by parabolas Γ^min_y(z) and Γ^max_y(z) defined by Eq. (<ref>) and (<ref>), respectively. We now compare the horizontal positions of the six parabolas (Γ^max_y(z), Γ^min_y(z), Λ^±,max_y(z), and Λ^±,min_y(z)), and we would like to show that under the assumptions of the theorem,
Γ^min_y(z) < Λ^-,min_y(z)
Λ^+,max_y(z) < Γ^max_y(z) .
To prove Eq. (<ref>), notice that it is equivalent to
- bc/2(b+c) + √((a+2r)+cr/b+c + b^2 c^2/4(b+c)^2) < r ,
which can be simplified into
c/b+c < r^2-2r-a/(1-b)r .
Since Eq. (<ref>) is guaranteed by Eq. (<ref>), Eq. (<ref>) holds.
To prove Eq. (<ref>), notice that it is equivalent to
-r < - bc/2(b+c) - √((a+2r)+cr/b+c + b^2 c^2/4(b+c)^2) ,
which can be further simplified into
c/b+c < r^2-2r-a/(1+b)r ,
which is identical to Eq. (<ref>). Thus Eq. (<ref>) is established as well. Combining Eqs. (<ref>), (<ref>) and (<ref>) we obtain
Γ^min_y(z) <Λ^-,min_y(z)<Λ^-,max_y(z)<Λ^+,min_y(z)<Λ^+,max_y(z) < Γ^max_y(z)
i.e., the six parabolas are positioned from left to right as illustrated by Fig. <ref>. Therefore we obtain the final expression
V ∩ f_ IV(V)|_Σ^2(x,w) = h^+_1 ∪ h^+_2 ∪ h^-_1 ∪ h^-_2 ⊂ H_1 ∪ H_2
where the four horizontal strips h^±_1 and h^±_2 are indicated by the shaded regions in Fig. <ref>. Condition (a.2) is thus established. Consequently, condition (a) is established as well.
(b): Let V ∩ f_ IV(V)|_Σ^1(x,y,z) be the restriction of V ∩ f_ IV(V) ∩Σ^1(x,y,z) on Σ^1(x,y,z). We need to show that V ∩ f_ IV(V)|_Σ^1(x,y,z) is a line segment which is a proper subset of V|_Σ^1(x,y,z), i.e., the configuration illustrated by Fig. <ref>.
From Eq. (<ref>) we know that |w(y^',z^',w^')|≤ r. This is equivalent to setting w(y^',z^',w^')=-s with parameter |s| ≤ r. Substituting Eq. (<ref>) we get
w'(s)=cy' - ca + c(z')^2 - s(b+c)
or simply
w(s)=cy - ca + cz^2 - s(b+c)
in which the primes on the variables are omitted for simplicity. In every Σ^1(x,y,z), w(s) is interpreted as a one-dimensional family of points parameterized by s with fixed (x,y,z) values. Let l be the line segment such that
l = { w(s) | -r ≤ s ≤ r } .
Then combining Eqs. (<ref>) and (<ref>) we obtain
V ∩ f_ IV(V) |_Σ^1(x,y,z) = l .
The two endpoints of l are attained at
w^max=w(s=-r)=cy - ca + cz^2 + r(b+c)
w^min=w(s=r)=cy - ca + cz^2 - r(b+c) .
Notice that w^max is bounded from above by
w^max≤ c(r^2+2r-a)+br ≤ r ,
where the second inequality comes from Eq. (<ref>). Meanwhile, w^min is bounded from below by
w^min≥ -c(a+2r)-br > -r
where the second equality comes from Eq. (<ref>) and the fact that r^2+2r-a>a+2r. Therefore in every Σ^1(x,y,z) we have
V ∩ f_ IV(V) |_Σ^1(x,y,z)⊂ (-r,r]
which proves (b). Having established both (a) and (b), Theorem <ref> is proved.
To demonstrate that the combination of parameters (a,b,c) that satisfies the bounds imposed by Theorem <ref> indeed exists, Fig. <ref> illustrates the domain in the three-dimensional parameter space (a,b,c) that satisfies Eqs. (<ref>)-(<ref>) and b>c, within range (a,b,c) ∈ [32+8√(2),42+8√(2)] × [0,1] × [0,0.04]. When (a,b,c) lies within the colored domain, f_ IV(V) exhibits the topological structure shown by Fig. <ref>.
§ CONCLUSION
We have introduced several examples using Hénon-type mappings in three and four dimensions and demonstrated analytically that they possess horseshoe structures with nontrivial folding topologies that are otherwise impossible in two dimensions. In essence, we have designed these maps so that they give rise to different combinations of folding and stacking directions. More specifically, Topology II and IV are twice-folded horseshoes with independent creases but a common stacking direction, Topology III-A is a twice-folded horseshoe with independent creases and independent stacking directions, and Topology III-B is just a once-folded horseshoe in four dimensions. Interestingly, when the parameters of f_ III are changed from the neighborhood of the Type-A AI limit to the neighborhood of the Type-B AI limit, the twice-folded horseshoe (Topology III-A) undergoes an unfolding process to transition into the once-foled horseshoe (Topology III-B).
It is obvious that the topological structures introduced here only represent a small fraction of all possible horseshoe topologies. In higher dimensions, more combinations of folding and stacking directions can be selected to create more complicated horseshoe structures, the exploration of which may be potentially fruitful. Furthermore, it is also meaningful to ask the question of
which type of horseshoe topology is generic for certain types of multidimensional maps,
and what are the consequent implications on the symbolic dynamics of the systems.
In particular, within the symplectic setting, according to the paper of Moser <cit.>,
there is a normal form for quadratic symplectic maps with parameters on R^2.
It is therefore interesting to explore how the horseshoe with different topologies
coexist in the parameter space of the normal form, and it then automatically raises
the question what types of bifurcations occur among
different types of horseshoes found here.
Notice that all these problems do not exist in the horseshoe formed in the 2-dimensional plane.
Regarding uniform hyperbolicity, we have shown in Part I <cit.> that
the map forming Topology III-A and III-B horseshoes has parameter regions in which
not only topological horseshoe but also uniform hyperbolicity holds,
thus the conjugacy to the symbolic dynamics follows.
It is then natural to confirm that the same is true as well for the rest of cases.
The computer-assisted proof <cit.>
will be helpful to more precisely specify the region where
uniform hyperbolicity holds, and hence to clarify how different types of
topological horseshoe coexist in their parameter space.
Those are topics for our futures studies.
§ ACKNOWLEDGEMENT
J.L. gratefully acknowledges many inspiring discussions with Steven Tomsovic. J.L. and A.S. acknowledge financial support from Japan Society for the Promotion of Science (JSPS) through JSPS Postdoctoral Fellowships for Research in Japan (Standard). This work has been supported by JSPS KAKENHI Grant No. 17K05583, and also by JST, the establishment of university fellowships towards the creation of science technology innovation, Grant Number JPMJFS2139.
§ REFERENCES
iopart-num
|
http://arxiv.org/abs/2303.07347v2
|
20230313175959
|
TriDet: Temporal Action Detection with Relative Boundary Modeling
|
[
"Dingfeng Shi",
"Yujie Zhong",
"Qiong Cao",
"Lin Ma",
"Jia Li",
"Dacheng Tao"
] |
cs.CV
|
[
"cs.CV",
"cs.AI",
"cs.MM"
] |
TriDet: Temporal Action Detection with Relative Boundary Modeling
Dingfeng Shi^∗*: This work is done during an internship at JD Explore Academy.
VRLab, Beihang University, China
[email protected]
Yujie Zhong
Meituan Inc.
[email protected]
Qiong Cao^†^†: Corresponding authors.
JD Explore Academy
[email protected]
Lin Ma
Meituan Inc.
[email protected]
Jia Li^†
VRLab, Beihang University, China
[email protected]
Dacheng Tao
JD Explore Academy
[email protected]
March 30, 2023
============================================================================================================================================================================================================================================================================================================================================================================================================================================================
In this paper, we present a one-stage framework TriDet for temporal action detection.
Existing methods often suffer from imprecise boundary predictions due to the ambiguous action boundaries in videos. To alleviate this problem, we propose a novel Trident-head to model the action boundary via an estimated relative probability distribution around the boundary. In the feature pyramid of TriDet, we propose an efficient Scalable-Granularity Perception (SGP) layer to mitigate the rank loss problem of self-attention that takes place in the video features and aggregate information across different temporal granularities.
Benefiting from the Trident-head and the SGP-based feature pyramid, TriDet achieves state-of-the-art performance on three challenging benchmarks: THUMOS14, HACS and EPIC-KITCHEN 100, with lower computational costs, compared to previous methods.
For example, TriDet hits an average mAP of 69.3% on THUMOS14, outperforming the previous best by 2.5%, but with only 74.6% of its latency. The code is released to https://github.com/dingfengshi/TriDethttps://github.com/dingfengshi/TriDet.
§ INTRODUCTION
Temporal action detection (TAD) aims to detect all start and end instants and corresponding action categories from an untrimmed video, which has received widespread attention. TAD has been significantly improved with the help of the deep learning.
However, TAD remains to be a very challenging task due to some unresolved problems.
A critical problem in TAD is that action boundaries are usually not obvious.
Unlike the situation in object detection where there are usually clear boundaries between the objects and the background, the action boundaries in videos can be fuzzy. A concrete manifestation of this is that the instants ( temporal locations in the video feature sequence) around the boundary have relatively higher predicted response value from the classifier.
Some previous works attempt to locate the boundaries based on the global feature of a predicted temporal segment <cit.>,
which may ignore detailed information at each instant.
As another line of work, they directly regress the boundaries based on a single instant <cit.>, potentially with some other features <cit.>, which do not consider the relation between adjacent instants ( the relative probability) around the boundary.
How to effectively utilize boundary information remains an open question.
To facilitate localization learning, we posit that the relative response intensity of temporal features in a video can mitigate the impact of video feature complexity and increase localization accuracy.
Motivated by this, we propose a one-stage action detector with a novel detection head named Trident-head tailored for action boundary localization. Specifically, instead of directly predicting the boundary offsets based on the center point feature, the proposed Trident-head models the action boundary via an estimated relative probability distribution of the boundary (see fig:motivation). The boundary offset is then computed based on the expected values of neighboring locations ( bins).
Apart from the Trident-head, in this work, the proposed action detector consists of a backbone network and a feature pyramid.
Recent TAD methods <cit.> adopt the transformer-based feature pyramid and show promising performance.
However, the video features of the video backbone tend to exhibit high similarities between snippets,
which is further deteriorated by SA, leading to the rank loss problem <cit.> (see fig:cosine).
Additionally, SA also incurs significant computational overhead.
Fortunately, we discover that the success of the previous transformer-based layers (in TAD) primarily relies on their macro-architecture, namely, how the normalization layer and feed-forward network (FFN) are connected, rather than the self-attention mechanism.
We therefore propose an efficient convolutional-based layer, termed Scalable-Granularity Perception (SGP) layer, to alleviate the two
abovementioned problems of self-attention.
SGP comprises two primary branches, which serve to increase the discrimination of features in each instant and capture temporal information with different scales of receptive fields.
The resultant action detector is termed .
Extensive experiments demonstrate that surpasses all the previous detectors and achieves state-of-the-art performance across three challenging benchmarks: THUMOS14, HACS and EPIC-KITCHEN 100.
§ RELATED WORK
Temporal action detection.
Temporal action detection (TAD) involves localizing and classifying all actions from an untrimmed video. The existing methods can be roughly divided into two categories, namely, two-stage methods and one-stage methods.
The two-stage methods <cit.> split the detection process into two stages: proposal generation and proposal classification. Most of the previous works <cit.> put emphasis on the proposal generation phrase. Concretely, some works <cit.> predict the probability of the action boundary and densely match the start and end instants according to the prediction score. Anchor-based methods <cit.> classify actions from specific anchor windows. However, two-stage methods suffer from a high complexity problem and can not be trained in an end-to-end manner.
The one-stage methods do the localization and classification with a single network. Some previous works <cit.> build this hierarchical architecture with the convolutional network (CNN).
However, there is still a performance gap between the CNN-based and the latest TAD methods.
Object detection.
Object detection is a twin task of TAD. General Focal Loss <cit.> transforms bounding box regression from learning Dirac delta distribution to a general distribution function. Some methods <cit.> use Depth-wise Convolution to model network structure and some branched designs <cit.> show high generalization ability. They are enlightening for the architecture design of TAD.
Transformer-based methods.
Inspired by the great success of the Transformer in the field of machine translation and object detection, some recent works <cit.> adopt the attention mechanism in TAD task, which help improve the detection performance. For example, some works<cit.> detect the action with the DETR-like Transformer-based decoder <cit.>, which models action instances as a set of learnable. Other works <cit.> extract a video representation with a Transformer-based encoder. However, most of these methods are based on the local behavior. Namely, they conduct attention operation only in a local window, which introduces an inductive bias similar to CNN but with a larger computational complexity and additional limitations ( The length of the sequence needs to be pre-padded to an integer multiple of the window size.).
§ METHOD
Problem definition. We first give a formal definition for TAD task. Specifically, given a set of untrimmed videos D={V_i}_i=1^n, we have a set of RGB (and optical flow) temporal visual features X_i={x_t}_t=1^T from each video V_i, where T corresponds to the number of instants, and K_i segment labels Y_i={s_k,e_k,c_k}_k=1^K_i with the action segment start instant s_k, the end instant e_k and the corresponding action category c_k. TAD aims at detecting all segments Y_i based on the input feature X_i.
§.§ Method Overview
Our goal is to build a simple and efficient one-stage temporal action detector.
As shown in fig:framework, the overall architecture of consists of three main parts: a video feature backbone, a SGP feature pyramid, and a boundary-oriented Trident-head.
First, the video features are extracted using a pretrained action classification network ( I3D <cit.> or SlowFast <cit.>). Following that, a SGP feature pyramid is built to tackle actions with various temporal lengths, similar to some recent TAD works <cit.>.
Namely, the temporal features are iteratively downsampled and each scale level is processed with a proposed Scalable-Granularity Perception () layer (Section <ref>) to enhance the interaction between features with different temporal scopes.
Lastly, action instances are detected by a designed boundary-oriented Trident-head (Section <ref>).
We elaborate on the proposed modules in the following.
§.§ Feature Pyramid with Layer
The feature pyramid is obtained by first downsampling the output features of the video backbone network several times via max-pooling (with a stride of 2). The features at each pyramid level are then processed using transformer-like layers (e.g. ActionFormer <cit.>).
Current Transformer-based methods for TAD tasks primarily rely on the macro-architecture of the Transformer (See supplementary material for details), rather than the self-attention mechanisms. Specifically, SA mainly encounters two issues: the rank loss problem across the temporal dimension and its high computational overhead.
Limitation 1: the rank loss problem.
The rank loss problem arises because the probability matrix in self-attention ( softmax(QK^T)) is non-negative and the sum of each row is 1, indicating the outputs of SA are convex combination for the value feature V. Considering that pure Layer Normalization <cit.> projects feature onto the unit hyper-sphere in high-dimensional space, we analyze the degree of their distinguishability by studying the maximum angle between features within the instant features. We demonstrate that the maximum angle between features after the convex combination is less than or equal to that of the input features, resulting in increasing similarity between features (as outlined in the supplementary material), which can be detrimental to TAD.
Limitation 2: high computational complexity.
In addition, the dense pair-wise calculation (between instant features) in self-attention brings a high computational overhead and therefore decreases the inference speed.
The SGP layer.
Based on the above discovery, we propose a Scalable-Granularity Perception () layer to effectively capture the action information and suppress rank loss. The major difference between the Transformer layer and SGP layer is the replacement of the self-attention module with the fully-convolutional module SGP. The successive Layer Normalization<cit.> (LN) is changed to Group Normalization<cit.> (GN).
As shown in fig:module, contains two main branches: an instant-level branch and a window-level branch.
In the instant-level branch, we aim to increase the feature discriminability between action and non-action instant by enlarging their feature distance with the video-level average feature. The window-level branch is designed to introduce the semantic content from a wider receptive field with a branch ψ to help dynamically focus on the features of which scale.
Mathematically, the can be written as:
f_SGP = ϕ(x)FC(x) + ψ(x)(Conv_w(x) + Conv_kw(x))+ x,
where FC and Conv_w denotes fully-connected layer and the 1-D depth-wise convolution layer <cit.> over temporal dimension with window size w.
As a signature design of , k is a scalable factor aiming at capturing a larger granularity of temporal information.
The video-level average feature ϕ(x) and branch ψ(x) are given as
ϕ(x) = ReLU(FC(AvgPool(x))),
ψ(x) = Conv_w(x),
where AvgPool(x) is the average pooling for all features over the temporal dimension. Here, both ϕ(x) and ψ(x) perform the element-wise multiplication with the mainstream feature.
The resultant -based feature pyramid can achieve better performance than the transformer-based feature pyramid while being much more efficient.
§.§ Trident-head with Relative Boundary Modeling
Intrinsic property of action boundaries.
Regarding the detection head, some existing methods directly regress the temporal length <cit.> of the action at each instant of the feature and refine with the boundary feature<cit.>, or <cit.> simply predict an actionness score (indicating the probability of being an action). These simple strategies suffer from a problem in practice: imprecise boundary predictions, due to the intrinsic property of actions in videos. Namely, the boundaries of actions are usually not obvious, unlike the boundaries of objects in object detection. Intuitively, a more statistical boundary localization method can reduce uncertainty and facilitate more precise boundaries.
Trident-head.
In this work, we propose a boundary-oriented Trident-head to precisely locate the action boundaries based on the relative boundary modeling, considering the relation of features in a certain period and obtaining the relative probability of being a boundary for each instant in that period. The Trident-head consists of three components: a start head, an end head, and a center-offset head, which are designed to locate the start boundary, end boundary, and the temporal center of the action, respectively. The Trident-head can be trained end-to-end with the detector.
Concretely, as shown in fig:head, given a sequence of features F∈R^T × D output from the feature pyramid, we first obtain three feature sequences from the three branches (namely, F_s∈R^T, F_e∈R^T and F_c∈R^T × 2 × (B+1)), where B is the number of bins for boundary prediction, F_s and F_e characterize the response value for each instant as the starting or ending point of an action, respectively. In addition, the center-offset head aims at estimating two conditional distributions P(b_st|t) and P(b_et|t). They represent the probability that each instant (in its set of bins) serves as a boundary when the instant t is the midpoint of an action. Then, we model the boundary distance by combining the outputs of the boundary head and center-offset head:
P_st = Softmax(F_s^[(t-B):t] + F_c^t,0),
d_st = E_b∼P_st[b] ≈∑_b=0^B(bP_stb),
where F_s^[(t-B):t]∈R^B+1, F_c^t,0∈R^B+1 are the feature of the left adjacent bin set of instant t and the center offsets predicted by instant t only, respectively, and P_st is the relative probability which represents the probability of each instant as a start of the action within the bin set. Then, the distance between the instant t and the start instant of action instance d_st is given by the expectation of the adjacent bin set. Similarly, the offset distance of the end boundary d_et can be obtained by
P_et = Softmax(F_e^[t:(t+B)] + F_c^t,1),
d_et = E_b∼P_et[b] ≈∑_b=0^B(bP_etb)
All heads are simply modeled in three layers convolutional networks and share parameters at all feature pyramid levels to reduce the number of parameters.
Combination with feature pyramid.
We apply the Trident-head in a pre-defined local bin set, which can be further improved by combining it with the feature pyramid.
In this setting, features at each level of the feature pyramid simply share the same small number of bins B ( 16) and then the corresponding prediction for each level l can be scaled by 2^l-1, which can significantly help to stabilize the training process.
Formally, for an instant in the l-th feature level t^l, estimates the boundary distance d̂_st^l and d̂_et^l with the Trident-head described above, then the segments a=(ŝ_t, ê_t) can be decoded by
ŝ_t = (t-d̂_st^l)× 2^l-1,
ê_t = (t+d̂_et^l)× 2^l-1.
Comparison with existing methods that have explicit boundary modeling. Many previous methods improve boundary predictions. We divide them into two broad categories: the prediction based on sampling instants in segments <cit.> and the prediction based on a single instant. The first category predicts the boundary
according to the global feature of the predicted instance segments.
They only consider global information instead of detailed information at each instant. The second category directly predicts the distance between an instant and its corresponding boundary based on the instant-level feature <cit.>. Some of them refine the segment with boundary features <cit.>.
However, they do not take the relation ( relative probability of being a boundary) of adjacent instants into account.
The proposed Trident-head differs from these two categories and shows superior performance in precise boundary localization.
§.§ Training and Inference
Each layer l of the feature pyramid outputs a temporal feature F^l ∈R^(2^l-1T)× D, which is then fed to the classification head and the Trident-head for action instance detection. The output of each instant t in feature pyramid layer l is denoted as ô_t^l = (ĉ_t^l, d̂_st^l, d̂_et^l).
The overall loss function is then defined as follows:
L =1/N_pos∑_l,t1_{c^l_t>0}(σ_IoUL_cls + L_reg)
+ 1/N_neg∑_l,t1_{c^l_t=0}L_cls,
where σ_IoU is the temporal IoU between the predicted segment and the ground truth action instance, and L_cls, L_reg is focal loss <cit.> and IoU loss <cit.>. N_pos and N_neg denote the number of positive and negative samples.
The term σ_IoU is used to reweight the classification loss at each instant, such that instants with better regression ( of higher quality) contribute more to the training.
Following previous methods <cit.>, center sampling is adopted to determine the positive samples. Namely, the instants around the center of an action instance are labeled as positive and all the others are considered as negative.
Inference. At inference time, the instants with classification scores higher than threshold λ and their corresponding instances are kept. Lastly, Soft-NMS <cit.> is applied for the deduplication of predicted instances.
§ EXPERIMENTS
Datasets.
We conduct experiments on four challenging datasets: THUMOS14 <cit.>, ActivityNet-1.3<cit.>, HACS-Segment <cit.> and EPIC-KITCHEN 100 <cit.>. THUMOS14 consists of 20 sport action classes and it contains 200 and 213 untrimmed videos with 3,007 and 3,358 action instances on the training set and test set, respectively. ActivityNet and HACS are two large-scale datasets and they share 200 classes of action. They have 10,024 and 37,613 videos for training, as well as 4,926 and 5,981 videos for test. The EPIC-KITCHEN 100 is a large-scale dataset in first-person vision, which have two sub-tasks: noun localization ( door) and verb localization ( open the door). It contains 495 and 138 videos with 67,217 and 9,668 action instances for training and test, respectively. The number of action classes for noun and verb are 300 and 97.
Evaluation. For all these datasets, only the annotations of the training and validation sets are accessible. Following the previous practice <cit.>, we evaluate on the validation set. We report the mean average precision (mAP) at different intersection over union (IoU) thresholds. For THUMOS14 and EPIC-KITCHEN, we report the IoU thresholds at [0.3:0.7:0.1] and [0.1:0.5:0.1] respectively. For ActivityNet and HACS, we report the result at IoU threshold [0.5, 0.75, 0.95] and the avearge mAP is computed at [0.5:0.95:0.05].
§.§ Implementation Details
TriDet is trained end-to-end with AdamW <cit.>
optimizer. The initial learning rate is set to 10^-4 for THUMOS14 and EPIC-KITCHEN, and 10^-3 for ActivityNet and HACS. We detach the gradient before the start boundary head and end boundary head and initialize the CNN weights of these two heads with a Gaussian distribution N(0, 0.1) to stabilize the training process. The learning rate is updated with Cosine Annealing schedule <cit.>. We train 40, 23, 19, 15 and 13 epochs for THUMOS14, EPIC-KITCHEN verb, EPIC-KITCHEN noun, ActivityNet and HACS (containing warmup 20, 5, 5, 10, 10 epochs).
For ActivityNet and HACS, the number of bins B of the Trident-head is set to 12, 14 and the convoluntion window w is set to 15, 11 and the scale factor k is set to 1.3 and 1.0, respectively.
For THUMOS14 and EPIC-KITCHEN, the number of bins B of the Trident-head is set to 16 and the convoluntion window w is set to 1 and the scale factor k is set to 1.5. We round the scaled windows size and take it up to the nearest odd number for convenience. We conduct our experiments on a single NVIDIA A100 GPU.
§.§ Main Results
THUMOS14. We adopt the commonly used I3D<cit.> as our backbone feature and table:thumos14 presents the results. Our method achieves an average mAP of 69.3%, outperforming all previous methods including one-stage and two-stage methods. Notably, our method also achieves better performance than recent Transformer-based methods <cit.>, which demonstrates that the simple design can also have impressive results.
HACS. For the HACS-segment dataset, we conduct experiments based on two commonly used features: the official I3D<cit.> feature and the SlowFast <cit.> feature. As shown in table:hacs, our method achieves an average mAP of 36.8% with the official features. It is the state-of-the-art and outperforms the previous best model TadTR by about 4.7% in average mAP. We also show that changing the backbone to SlowFast can further boost performance, resulting in a 1.8% increase in average mAP, which indicates that our method can benefit from a much more advanced backbone network.
EPIC-KITCHEN. On this dataset, following all previous methods, SlowFast is adopted as the backbone feature. The method of our main comparison is ActionFormer<cit.>, which has demonstrated promising performance in EPIC-KITCHEN 100 dataset. We present the results in table:epic. Our method shows a significant improvement in both sub-tasks: verb and noun, and achieves 25.4% and 23.8% average mAP, respectively. Note that our method outperforms ActionFormer with the same features by a large margin (1.9% and 1.9% average mAP in verb and noun, respectively). Moreover, our method achieves state-of-the-art performance on this challenging dataset.
ActivityNet. For the ActivityNet v1.3 dataset, we adopt the TSP R(2+1)D <cit.> as our backbone feature. Following previous methods<cit.>, the video classification score predicted from the UntrimmedNet is adopted to multiply with the final detection score. table:activitynet presents the results. Our method still shows a promising result: outperform the second best model <cit.> with the same feature, only worse than TCANet <cit.> which is a two-stage method and using the SlowFast as the backbone feature which is not available now.
§.§ Ablation Study
In this section, we mainly conduct the ablation studies on the THUMOS14 dataset.
Main components analysis.
We demonstrate the effectiveness of our proposed components in : SGP layer and Trident-head. To verify the effectiveness of our SGP layer, we use a baseline feature pyramid used by <cit.> to replace our SGP layer. The baseline consists of two 1D-convolutional layers and shortcut. The window size of convolutional layers is set to 3 and the number of channels of the intermediate feature is set to the same dimension as the intermediate dimension in the FFN in our SGP layer. All other hyperparameters ( number of the pyramid layers, etc.) are set to the same as our framework.
As depicted in table:ablation, compared with the baseline model we implement (Row 1), the SGP layer brings a 6.2% absolute improvement in the average mAP. Secondly, we compare the SGP with the previous state-of-the-art method, ActionFormer, which adopts a self-attention mechanism in a sliding window behavior<cit.> with window size 7 (Row 2). We can see our SGP layer still has 1.5% improvement in average mAP, demonstrating that the convolutional network can also have excellent performance in TAD task. Besides, we compare our Trident-head with the normal instant-level regression head, which regresses the boundary distance for each instant. We can see that the Trident-head improves the average mAP by 1.0%, and the mAP improvement is more obvious in the case of high IoU threshold ( 1.6% average mAP improvement in IoU 0.7).
Computational complexity.
We compare the computational complexity and latency of with the recent ActionFormer<cit.>, which brings a large improvement to TAD by introducing the Transformer-based feature pyramid.
As shown in table:time, we divide the detector into two parts: the main architecture and the detection heads ( classification head and regression head). We report the GMACs for each part and the inference latency (average over five times) on THUMOS14 dataset using an input with the shape 2304 × 2048, following the <cit.>. We also report our results using the Trident-head and the normal regression head, respectively. First, from the first row, we see that GMACs of our main architecture with SGP layer is only 47.1% of the ActionFormer (14.5 versus 30.8), and the overall latency is only 65.2% (146ms versus 224ms), but still outperforms Actionformer by 1.5% average mAP, which shows that our main architecture is much better than the local Transformer-based method. Besides, we further evaluate our method with Trident-head. The experimental result shows that our framework can be improved by the Trident-head which further brings 1.0% average mAP improvement and the GMACs is still 1.6G smaller than ActionFormer, and the latency is still only 74.6% of it, proving the high efficiency of our method.
Ablation on the window size in SGP layer.
In this section, we study the effectiveness of the two hyper-parameters related to the window size in the SGP layer. Firstly, we fix k=1 and vary w. Secondly, we fix the value of w=1 and change k. Finally, we present the results in fig:statics on THUMOS14 datasets. We find that different choices of w and k produce stable results on both datasets. The optimal values are w=1, k=5 for THUMOS14.
The effectiveness of feature pyramid level.
To study the effectiveness of the feature pyramid and its relation with the number of Trident-head bin set, we start the ablation from the feature pyramid with 16 bins and 6 levels. We conduct two sets of experiments: a fixed number of bins or a scaled number of bins for each level in the feature pyramid.
As shown in table:fpn, we can see that the detection performance rises as the number of layers increases. With fewer levels ( level less than 3), more bins bring better performance. That is because the fewer the number of levels, the more bins are needed to predict the action with a long duration ( higher resolution at the highest level). We achieve the best result with a level number of 6.
Ablation on the number of bins.
In this section, we present the ablation results for the choice of the number of bins on the THUMOS14 and HACS datasets in table:bin. We observe the optimal value is obtained at 16 and 14 on the THUMOS14 and the HACS, respectively. We also find that a small bin value leads to significant performance degradation on HACS but not on THUMOS14. That is because the THUMOS14 dataset aims at detecting a large number of action segments from a long video and a small bin value can meet the requirements, but on HACS, there are more actions with long duration, thus a larger number of bins is needed.
§ CONCLUSION
In this paper, we aim at improving the temporal action detection task with a simple one-stage convolutional-based framework TriDet with relative boundary modeling. Experiments conducted on THUMOS14, HACS, EPIC-KITCHEN and ActivityNet demonstrate a high generalization capability of our method, which achieves state-of-the-art performance on the first three datasets and comparable results on ActivityNet. Extensive ablation studies are conducted to verify the effectiveness of each proposed component.
Acknowledgement.
This work is supported by the National Natural Science Foundation of China under Grant 62132002.
ieee_fullname
§ SUPPLEMENTARY MATERIAL
§.§ Network Architecture in Feature Pyramid
From Transformer to CNN.
To be self-contained, we analyze the impact of module design on the detector.
For comparison, we build two baseline models: a convolutional baseline and a Transformer baseline. Firstly, we build the convolution baseline where the convolutional module is adopted from the previous one-stage detector <cit.>. Secondly, the previous state-of-the-art detector <cit.> with the local window self-attention <cit.> is chosen as the Transformer baseline. Then, to analyze the importance of two common components: self-attention and normalization, in the Transformer <cit.> macrostructure, we provide three variants of the convolutional-based structure: SA-to-CNN, LN-to-GN and LN-GN-Mix, as fig:self2cnn shown, and validate their performance on THUMOS14.
Results.
From the table:self2cnn, we can see there is a large performance gap between the Transformer baseline and the CNN baseline (about 8.1% in average mAP), demonstrating that the Transformer holds a large advantage for TAD tasks.
Then, we conduct the ablation study with the three variants with normal regression head and Trident-head, respectively.
We first simply replace the local self-attention with a 1D convolutional layer which has the same receptive field with <cit.> ( kernel size is 19). This change brings a dramatic performance increase in average mAP compared with the CNN baseline (about 6.2%) but is still behind the Transformer baseline by about 1.9%. Next, we conduct experiments with different normalization layers ( Layer Normalization (LN) <cit.> and Group Normalization (GN) <cit.>) and we find that the hybrid structure of LN and GN (LN-GN-Mix) shows better performance comparing to the original form of the Transformer (65.7 versus 64.9).
By combining with the Trident-head, the LN-GN-Mix version achieves 66.0% in average mAP, which demonstrates the possibility of efficient convolutional modeling. These empirical results further motivate us to improve the feature pyramid with SGP layer (see Sec 3.2 of the main test for more details).
§.§ The rank loss problem in Transformer.
In <cit.>, the authors discuss how the pure self-attention operation causes the input feature to converge to a rank-1 matrix at a double exponential rate, while MLP and residual connections can only partially slow down this convergence. This phenomenon is disastrous for TAD tasks, as the video feature sequences extracted by pre-trained action recognition networks are often highly similar (see Section 1), which further aggravates the rank loss problem and makes the features at each instant indistinguishable, resulting in inaccurate detection of action.
We posit that the core reason for this issue lies in the softmax function used in self-attention. Namely, the probability matrix ( softmax(QK^T)) is non-negative and the sum of each row is 1, indicating the outputs of SA are convex combination for the value feature V. We will demonstrate that the largest angle between any two features in V' = SA(V) is always less than or equal to the largest angle between features in V.
Given a set of points S={x_1, x_2..., x_n}, a convex combination is a point of the form ∑_na_nx_n, where a_n≥0 and ∑_na_n=1.
The convex hull H of a given set of points S is identical to the set of all their convex combinations. A Convex hull is a convex set.
[Extreme point]
An extreme point p is a point in the set that does not lie on any open line segment between any other two points of the same set. For a point set S and its convex hull H, we have p∈ S.
Consider the case of a convex hull that does not contain the origin.
Let a, b ∈ℝ^n and let S be the convex hull formed by them. Then, the angle between any two position vectors of points in S is less than or equal to the angle between the position vectors of the extreme points a⃗ and b⃗.
Consider the objective function
f(x) = cos(x⃗,y⃗) = ⟨x⃗,y⃗⟩/‖x⃗‖_2‖y⃗‖_2,
where x⃗,y⃗ are the position vectors of two points x_1, x_2 within the convex hull S (a line segment with extreme points a and b). The angle between two vectors is invariant with respect to the magnitude of the vectors, thus, for simplicity, we define x⃗=a⃗+xb⃗, y⃗=a⃗+yb⃗, where x,y ∈[0,+∞).
Moreover, we have
f'(x) = ‖x⃗‖^-3_2 ‖y⃗‖^-1_2 ×
[⟨b,y⃗⟩||a⃗+xb⃗||_2^2-(||b⃗||^2_2x+⟨a⃗,b⃗⟩)⟨a⃗+xb⃗,y⃗⟩]
We consider
g(x)= ⟨b,y⃗⟩||a⃗+xb⃗||_2^2-(||b⃗||^2_2x+⟨a⃗,b⃗⟩)⟨a⃗+xb⃗,y⃗⟩
= ⟨b⃗,y⃗⟩(||a⃗||_2^2+2⟨a⃗,b⃗⟩ x+||b⃗||_2^2x^2)-[⟨b⃗,y⃗⟩||b||_2^2x^2
+(⟨a⃗,b⃗⟩||b||_2^2+⟨a⃗,b⃗⟩⟨b⃗,y⃗⟩)x+⟨a⃗,y⃗⟩⟨a⃗,b⃗⟩]
= (⟨a⃗,b⃗⟩⟨b⃗,y⃗⟩-⟨a⃗,y⃗⟩⟨b⃗,b⃗⟩)x + ⟨a⃗,a⃗⟩⟨b⃗,y⃗⟩-⟨a⃗,y⃗⟩⟨a⃗,b⃗⟩.
Substituting y⃗=a⃗+yb⃗ into the above equation, we have
g(x)= (⟨a⃗,b⃗⟩⟨b⃗,a⃗+yb⃗⟩-⟨a⃗,a⃗+yb⃗⟩⟨b⃗,b⃗⟩)x +
⟨a⃗,a⃗⟩⟨b⃗,a⃗+yb⃗⟩-⟨a⃗,a⃗+yb⃗⟩⟨a⃗,b⃗⟩
= [⟨a⃗,b⃗⟩(⟨a⃗,b⃗⟩+y⟨b⃗,b⃗⟩)-(⟨a⃗,a⃗⟩+y⟨a⃗,b⃗⟩)⟨b⃗,b⃗⟩]x +
[⟨a⃗,a⃗⟩(⟨a⃗,b⃗⟩+y⟨b⃗,b⃗⟩)-(⟨a⃗,a⃗⟩+y⟨a⃗,b⃗⟩)⟨a⃗,b⃗⟩]
= (||⟨a⃗,b⃗⟩||_2^2-||a⃗||_2^2||b⃗||_2^2)x+(||a⃗||_2^2||b⃗||_2^2-||⟨a⃗,b⃗⟩||_2^2)y
= (||⟨a⃗,b⃗⟩||_2^2-||a⃗||_2^2||b⃗||_2^2)(x-y).
According to the Cauchy-Schwarz inequality, we can obtain
||⟨a⃗,b⃗⟩||_2^2-||a⃗||_2^2||b⃗||_2^2≤0
Then, we have
g(x){
>0 x<y
=0 x=y
<0 x>y.
.
thus, for any position vector y⃗, when x=0 or x→∞ (x =a⃗ or x =b⃗), the angle formed between y and x⃗ is maximum.
Without loss of generality, given a specific y⃗, if its maximum vector x⃗=a⃗, we can then set y⃗ to a⃗ and find its maximum vector again, which yields
θ(x⃗,y⃗)≤θ(a⃗,y⃗)≤θ(b⃗,a⃗)
The proof is completed.
Consider the case of a convex hull that does not contain the origin. Let X = {x_1, x_2, …, x_k} be a set of points and let S be its convex hull. Then, the maximum angle between the position vectors of any two points in S is formed by the position vectors of two extreme points of S.
Assume that this case holds when k.
When k=2, based on Lemma <ref>, the maximum angle is formed by the extreme points x⃗_⃗1⃗ and x⃗_⃗2⃗.
When k≥3, we can sort the elements of X such that for a point y in S, x⃗_⃗k⃗ maximizes the angle θ(y⃗,x⃗_⃗k⃗). Besides, the points x in S are of the form:
λ_1x⃗_⃗1⃗+λ_2x⃗_⃗2⃗+...+λ_kx⃗_⃗k⃗
= (λ_1+...+λ_k-1)(λ_1 x⃗_⃗1⃗/λ_1+...+λ_k-1+...+λ_k-1x⃗_⃗k⃗-⃗1⃗/λ_1+...+λ_k-1)
+λ_kx⃗_⃗k⃗,
where (λ_1 x⃗_⃗1⃗/λ_1+...+λ_n-1+...+λ_k-1x⃗_⃗k⃗-⃗1⃗/λ_1+...+λ_k-1) is a position vector of a point located within the convex hull induced by {x_1,x_2,...,x_k-1}. Through Lemma <ref> and definition, we can obtain
θ(x⃗,y⃗)≤θ(x⃗_⃗k⃗,y⃗)
For any two points x and y in a convex hull S, by setting y⃗=x_k and using the above inequality twice, without loss of generality, we can assume that the vector x⃗_⃗1⃗ makes the largest angle with x⃗_⃗k⃗. Then, we can obtain
θ(x⃗,y⃗)≤θ(x⃗_⃗k⃗,y⃗)≤θ(x⃗_⃗1⃗,x⃗_⃗k⃗)
By definition, θ(x⃗_⃗1⃗,x⃗_⃗k⃗) is no greater than the maximum angle formed by any other two basis vectors.
The proof is completed.
When the convex hull of the input set V does not contain the origin, the largest angle between any two features after self-attention V' = SA(V) is always less than or equal to the largest angle between features in V.
In the Temporal Action Detection (TAD) task, the temporal feature sequences extracted by the pre-trained video classification backbone often exhibit high similarity and the pure Layer Normalization <cit.> projects the input features onto the hyper-sphere in the high-dimensional space. Consequently, the convex hull induced by these features often does not encompass the origin. As a result, self-attention operation causes the input features to become more similar, reducing the distinction between temporal features and hindering the performance of the TAD task.
§.§ Error Analysis
In this section, we analyse the detection results on THUMOS14 with the tool from <cit.>, which analyze the results in three main directions: the False Positive (FP), the False Negative (FN) and the sensitivity of different length. For a further explanation of the analysis, please refer to <cit.> for more details.
Sensitivity analysis.
As shown in fig:sensitivity (Left), three metrics are taken into consideration: coverage (the normalized length of the instance by the duration of the video), length (the actual length in seconds) and the number of instances (in a video). The results are divided into several length/number bins from extremely short (XS) to extremely long (XL). We can see that our method's performance is balanced over most of the action length, except for extremely long action instances which are significantly lower than the overall value (the dashed line). That's because extremely long action instances contain more complicated information, which deserves further exploration.
Analysis of the false positives.
fig:fperror shows a chart of the percentage of different types of action instances in different k-G numbers, where G is the number of the ground-truth instances for each action category and the top k × G predicted instances are kept for visualization.
From the 1G column on left, we can see in the top G prediction, the true positive instances account for about 80% (at IoU=0.5), which indicates that our method has the power to estimate the right score of each instance. Moreover, on right, we can see the impact of each type of error: the regression error ( localization error and background error, the IoU between prediction and ground truth is much lower than a threshold or equal to zero) is still the part that deserves the most attention.
Analysis of the false negatives.
In this section, we analyze the false negative (miss-detection) rate for our method. As depicted in fig:fnerror, only the extremely short and extremely long instances have a relatively higher FN rate (9.0% and 13.5%, respectively), which is consistent with intuition that they are more difficult to detect. Note that for a video with only one action instance (XS), TriDet can detect all of them without any miss-detection (0.0 in # Intances), demonstrating our advantage for single-action localization.
§.§ Qualitative Analysis
In fig:viz, we show the visualization of a detection result on the THUMOS14 test set. It can be seen that our method accurately predicts the start and end instant of the action. Besides, we also visualize the predicted probability of the boundary in the Trident-head, where only the bin around the boundary has a relatively high probability while the others are low and smooth, indicating that the Trident-head can converge to a reasonable result.
|
http://arxiv.org/abs/2303.07118v1
|
20230313135107
|
Ramsey interferometry with arbitrary coherent-population-trapping pulse sequence
|
[
"Ruihuan Fang",
"Chengyin Han",
"Bo Lu",
"Jiahao Huang",
"Chaohong Lee"
] |
physics.atom-ph
|
[
"physics.atom-ph",
"quant-ph"
] |
Guangdong Provincial Key Laboratory of Quantum Metrology and Sensing & School of Physics and Astronomy, Sun Yat-Sen University (Zhuhai Campus), Zhuhai 519082, China
State Key Laboratory of Optoelectronic Materials and Technologies, Sun Yat-Sen University (Guangzhou Campus), Guangzhou 510275, China
College of Physics and Optoelectronic Engineering, Shenzhen University, Shenzhen 518060, China
College of Physics and Optoelectronic Engineering, Shenzhen University, Shenzhen 518060, China
College of Physics and Optoelectronic Engineering, Shenzhen University, Shenzhen 518060, China
[email protected]; [email protected]
Guangdong Provincial Key Laboratory of Quantum Metrology and Sensing & School of Physics and Astronomy, Sun Yat-Sen University (Zhuhai Campus), Zhuhai 519082, China
College of Physics and Optoelectronic Engineering, Shenzhen University, Shenzhen 518060, China
[email protected]
College of Physics and Optoelectronic Engineering, Shenzhen University, Shenzhen 518060, China
Coherent population trapping (CPT) is a multi-level quantum coherence phenomenon of promising applications in atomic clocks and magnetometers.
Particularly, multi-pulse CPT-Ramsey interferometry is a powerful tool for improving the performance of CPT atomic clocks.
Most studies on multi-pulse CPT-Ramsey interferometry consider periodic pulse sequence and time-independent detuning.
However, to further improve the accuracy and precision, one may modify the spectrum symmetry which involves pulse sequence with time-dependent detuning or phase shift.
Here, we theoretically analyze the multi-pulse CPT-Ramsey interferometry under arbitrary pulse sequences of time-dependent detuning and obtain a general analytical formula.
Using our formula, we analyze the popular CPT-Ramsey interferometry schemes such as two-pulse symmetric and antisymmetric spectroscopy, and multi-pulse symmetric and antisymmetric spectroscopy.
Moreover, we quantitatively obtain the influences of pulse width, pulse period, pulse number, and Rabi frequency under periodic pulses.
Our theoretical results can guide the experimental design to improve the performance of atomic clocks via multi-pulse CPT-Ramsey interferometry.
Ramsey interferometry with arbitrary coherent-population-trapping pulse sequence
Chaohong Lee
March 30, 2023
================================================================================
§ INTRODUCTION
Coherent population trapping (CPT) is a phenomenon of atoms trapped in a coherent state that does not interact with external laser fields.
Since the first observation of CPT spectrum <cit.>, it has been extensively utilized in various applications of quantum engineering and quantum sensing, such as all-optical manipulation <cit.>, atomic cooling <cit.>, atomic clocks <cit.>, and atomic magnetometers <cit.>.
Conventionally, CPT spectroscopy has the drawback of power broadening caused by strong CPT light power.
Using two CPT pulses to perform CPT-Ramsey interferometry can narrow the spectral linewidth and improve the signal-to-noise ratio (SNR) <cit.>.
In this case, the linewidth of CPT-Ramsey spectrum can be narrower as the interval dark time between the two pulses increases <cit.>.
As the demands for higher measurement precision and accuracy grow, various techniques are developed to improve the spectrum SNR and resolution, as well as mitigate light shift.
The multi-pulse CPT-Ramsey interferometry has been developed in recent years <cit.>.
The spectrum linewidth can be narrowed and meanwhile, the central peak can be identified due to the multi-pulse interference.
Understanding the mechanism of multi-pulse CPT-Ramsey interferometry is beneficial to designing suitable CPT pulse sequences for frequency measurement.
Some typical multi-pulse CPT-Ramsey schemes can be analytically analyzed.
For example, under multiple pulses with identical periods and duration, one can explain the multi-pulse CPT-Ramsey interference using a simple model based on the Fourier analysis of the CPT pulse sequence <cit.>.
The Fourier analysis introduces a characteristic number N_s as the spectrum will reach steady-state for large pulse number N <cit.>.
The other analytical treatment is to compare the multi-pulse CPT-Ramsey interferometry to the Fabry-Pérot resonator,
which is valid from periodic CPT pulse sequence <cit.> to arbitrary time-independent CPT pulse sequence <cit.>.
However, to further improve the performances one may need to modulate the pulse detuning or phase shift with time.
For example, the auto-balance technique uses a detuning change during the dark time to modify the symmetry of the spectrum to achieve real-time clock servo.
The frequency shift and phase jump have been applied to change the vertical symmetry of the spectrum and are used as the additional variables in auto-balanced CPT <cit.>.
Moreover, for quantum lock-in amplifier <cit.>, one may even use the mixing between the alternating magnetic field and CPT pulse sequence.
The alternating magnetic field may also induce alternating detuning.
The modulation of frequency or phase has been applied in experimental CPT schemes and become a potential technique.
Thus the analytical analysis of multi-pulse CPT-Ramsey interferometry under time-dependent detuning and arbitrary pulse phase is of great importance and broad applications.
In this article, we study the multi-pulse CPT-Ramsey interferometry with arbitrary CPT pulse sequences.
In particular, when the single-photon detuning and Rabi frequencies are relatively small compared to the decay rate of the excited state,
we obtain an analytical formula to analyze various CPT-Ramsey interferometry scenarios, such as the conventional CPT-Ramsey interferometry, CPT-Ramsey interferometry with frequency shift or phase jump, multi-pulse CPT-Ramsey interferometry, and multi-pulse CPT-Ramsey interferometry with frequency shift.
For the periodic CPT pulse sequence <cit.>, we can analytically study the influences of pulse length, pulse strength, pulse interval, and pulse number on the spectrum linewidth.
The formula we derived is a general solution that is valid for most situations with arbitrary CPT pulse sequences.
§ CPT IN THREE-LEVEL Λ SYSTEM
§.§ Model
CPT can usually be achieved in a three-level Λ structure as shown in Fig. <ref>.
The bi-chromatic field with Rabi frequencies Ω_1 and Ω_2 couple the two ground states |1⟩ and |2⟩ to the excited state |3⟩.
Here, δ_1 and δ_2 are the corresponding detunings, and Γ is the decay rate of the excited state |3⟩.
Under the rotating wave approximation, the Hamiltonian in the interaction picture reads <cit.>
Ĥ_I= ħ(δ_1|1⟩⟨ 1|+δ_2|2⟩⟨ 2|)
+ħ(Ω_1/2|1⟩⟨ 3| + Ω_2/2|2⟩⟨ 3| + h.c.).
According to the Lindblad equation, the time-evolution of the density matrix ρ obeys
dρ/d t = -i/ħ[Ĥ_I, ρ] + Γ/2∑_j=1^2[L̂_jρL̂_j^†
-1/2{L̂_j^†L̂_j, ρ}].
Here, L̂_j=|j⟩⟨ 3| and their Hermite conjugate L̂_j^† are the Lindblad operators.
In most cases, the Rabi frequencies of monochromatic light are equal, i.e., |Ω_1|=|Ω_2|=Ω.
Then the Rabi frequencies can be expressed as Ω_1=Ωe^iϕ_1 and Ω_2=Ωe^iϕ_2, with ϕ_1 and ϕ_2 are the phases of monochromatic light.
In this case, Eq. (<ref>) can be written as follows,
d/dtρ_11 = Γ/2ρ_33 - i(Ωe^-iϕ_1/2ρ_13^* - Ωe^iϕ_1/2ρ_13)
d/dtρ_12 = -iΩe^-iϕ_1/2ρ_23^* + iΩe^iϕ_2/2ρ_13 - i(δ_1-δ_2)ρ_12
d/dtρ_13 = -Γ/2ρ_13 + iΩe^-iϕ_1/2ρ_11 - iΩe^-iϕ_1/2ρ_33
+ iΩe^-iϕ_2/2ρ_12 - iδ_1ρ_13
d/dtρ_12^* = iΩe^iϕ_1/2ρ_23 - iΩe^-iϕ_2/2ρ_13^* + i(δ_1-δ_2)ρ_12^*
d/dtρ_22 = Γ/2ρ_33 - i(Ωe^-iϕ_2/2ρ_23^* - Ωe^iϕ_2/2ρ_23)
d/dtρ_23 = -Γ/2ρ_23 + iΩe^-iϕ_1/2ρ_12^* + iΩe^-iϕ_2/2ρ_22
- iΩe^-iϕ_2/2ρ_33-iδ_2ρ_23
d/dtρ_13^* = -Γ/2ρ_13^* - iΩe^iϕ_1/2ρ_11+iΩe^iϕ_1/2ρ_33
-iΩe^iϕ_2/2ρ_12^* + iδ_1ρ_13^*
d/dtρ_23^* = -Γ/2ρ_23^* - iΩe^iϕ_1/2ρ_12 - iΩe^iϕ_2/2ρ_22
+ iΩe^iϕ_2/2ρ_33 + iδ_2ρ_23^*
d/dtρ_33 = -Γρ_33 + iΩe^-iϕ_1/2ρ_13^* - iΩe^iϕ_1/2ρ_13
+ iΩe^-iϕ_2/2ρ_23^* - iΩe^iϕ_2/2ρ_23,
where ρ_ij=⟨ i|ρ|j⟩. In the following, we solve these equations analytically.
§.§ Analytical formula of ground-state coherence
Under the condition of the Rabi frequency is far smaller than the decay rate Ω≪Γ, one can find d/d tρ_33≪Γρ_33, and we can get
ρ_33 = 1/Γ(iΩe^-iϕ_1/2ρ_13^* - iΩe^iϕ_1/2ρ_13 + iΩe^-iϕ_2/2ρ_23^* - iΩe^iϕ_2/2ρ_23).
Usually, the CPT works in the situation of near resonance δ_1,2≪Γ.
Due to the large decay rate of the excited state, the population in the excited state can be ignored (compared with ground state populations), i.e., ρ_33≪ρ_11 and ρ_33≪ρ_22.
Thus we can obtain
ρ_13 = 1/Γ(iΩe^-iϕ_1ρ_11 + iΩe^-iϕ_2ρ_12),
ρ_23 = 1/Γ(iΩe^-iϕ_1ρ_12^* + iΩe^-iϕ_2ρ_22),
ρ_13^* = 1/Γ(- iΩe^iϕ_1ρ_11-iΩe^iϕ_2ρ_12^*),
ρ_23^* = 1/Γ(-iΩe^iϕ_1ρ_12 - iΩe^iϕ_2ρ_22).
In a CPT process, the population is mostly in the ground states that ρ_11+ρ_22≈ 1.
Substituting Eqs. (<ref>)- (<ref>) into Eqs. (<ref>) and (<ref>), we obtain
ρ_33 = Ω^2/Γ^2(1+2(ρ_12e^iϕ(t))),
and
d/dtρ_12=-Ω^2/2Γe^-iϕ(t) - (Ω^2/Γ+ iδ)ρ_12.
Here, δ=δ_1-δ_2 is the two-photon detuning, and ϕ(t)=ϕ_1-ϕ_2 is the phase of monochromatic light.
Eq. (<ref>) can be analytically solved under a train of CPT pulses.
We can construct the response of Eq. (<ref>) to an impulse taking place at t_0, which is the Green's function <cit.>
G(t, t_0) = H(t-t_0)exp(-∫_t_0^t (Ω^2(u)/Γ+iδ(u))du),
where H(x) is Heaviside's function.
If the density matrix starts from a mixture state ρ=|1⟩⟨ 1|+|2⟩⟨ 2|.
Take the initial value ρ_12(0)=0, we have
ρ_12(t, Ω)=-∫_0^tΩ^2(t^')/2Γe^-iϕ(t^')G(t,t^')dt^'
being a function of δ(t) and Ω(t).
We analyze Eq. (<ref>) within the context of a general CPT pulse sequence, as shown in Figs. <ref>(b,c).
The orange pulses represent the CPT pulses with Rabi frequency Ω, variable pulse duration τ_i, and phase Φ_i.
The gray solid line represents the time-dependent detuning δ(t).
As a result, Eq. (<ref>) can be expressed as
ρ_12(t, Ω)= -Ω^2/2Γ∑_l=1^N(∏_k=l+1^Nexp(-Ω^2/Γτ_k))
×exp(- ∫_t_l+τ_l^tiδ(u) du )e^-iΦ_l
×∫_t_l^t_l+τ_lexp(- ∫_t^'^t_l+τ_l(Ω^2/Γ+iδ(u))du)dt^'.
This is the general formula of ground-state coherence.
Eq. (<ref>) can be used to describe most cases of pulse sequences including the two-pulse CPT-Ramsey interferometry and multi-pulse CPT-Ramsey interferometry under fixed or time-dependent frequency detuning and phase.
However, the absence of single-photon detunings δ_1 and δ_2 in the derivation of Eqs. (<ref>)-(<ref>) means that the influences of light shift induced by the excited state are not taken into account.
According to Eq. (<ref>), if the phases of each CPT pulse are identical, the phase value does not affect the observation ρ_33.
This is because a global phase of the Rabi frequencies can be gauged into the state without changing the density matrix if we select the initial mixture state without non-diagonal terms.
That means the magnitude of Rabi frequencies can be real if we select proper initial phases of |1⟩ and |2⟩.
Generally, we gauge the phase of the last CPT pulse Φ_N into zero such that the phase of Eq. (<ref>) can be eliminated, thus
ρ_33=Ω^2/Γ^2(1+2(ρ_12)).
And if the phases of CPT pulses are constant, all the phases can be gauged as zero.
If the detuning δ(t) is fixed as δ during the CPT pulses and varies with time t during the dark period, Eq. (<ref>) can be written in the form of
ρ_12 = f(δ) Q,
where
f(δ)=-Ω^2/2Γ(Ω^2/Γ+iδ),
is the slow variant envelope and Q is the multi-pulse CPT-Ramsey interference term,
Q = ∑_l=1^N (∏_k=l+1^Ne^-Ω^2/Γτ_k)exp(- ∫_t_l+τ_l^tiδ(u) du )e^-iΦ_l
×(1-exp(-(Ω^2/Γ+iδ)τ_l)).
§ APPLICATIONS IN CPT-RAMSEY SPECTROSCOPY
Our analytical formula Eq. (<ref>) can be applied in various experimental CPT-Ramsey scenarios.
In the following, we show its applications in conventional two-pulse CPT-Ramsey spectroscopy, anti-symmetric two-pulse CPT-Ramsey spectroscopy with frequency shift, and multi-pulse CPT-Ramsey spectroscopy.
§.§ Two-pulse sequence
In most cases, the CPT-Ramsey interferometry is implemented with two pulses, as shown in Fig. <ref> (a).
In this scheme, the CPT pulse sequence contains a preparation pulse with duration τ_1 and a detection pulse with duration τ_2, which are separated by a free evolution with dark time T <cit.>.
Using Eq. (<ref>) with pulse number N=2, we can easily get the corresponding analytical results, which can be used as a benchmark example.
Our analytical results can also be used for optimizing the CPT pulse sequence as we need.
§.§.§ Conventional Two-pulse CPT-Ramsey Spectroscopy
Considering the simple case, in which the detunings are time-independent and the phases equal zero. Then, Eq. (<ref>) can be simplified as
ρ_12(t, δ, Ω)= -Ω^2/2Γ(Ω^2/Γ+iδ)∑_l=1^N(∏_k=l+1^Nexp(-Ω^2/Γτ_k))
×exp(-iδ(t-t_l-τ_l))
×(1-exp(-(Ω^2/Γ+iδ)τ_l)).
For a two-pulse CPT-Ramsey interferometry, the CPT-Ramsey interference term reads
Q = Q^T_1 + Q^T_2,
where
Q_1^T = exp(-Ω^2/Γτ_2)(1-exp(-(Ω^2/Γ+iδ)τ_1))
×exp(-iδ(T+τ_2)),
and
Q_2^T = (1-exp(-(Ω^2/Γ+iδ)τ_2)).
The conventional CPT-Ramsey fringe is mainly dominated by Q^T_1 in Eq. (<ref>).
It increases with the preparation pulse duration τ_1 and decreases with the detection pulse duration τ_2.
Q^T_2 in Eq. (<ref>) increases with the detection pulse τ_2, which contributes a trend of slow variance, resulting in the vertical asymmetry <cit.>.
As a benchmark example, we examine the conventional CPT-Ramsey pulse sequence consisting of a preparation pulse of duration τ_1, a detection pulse of duration τ_2, and the pulse interval T=1000×2π/Γ, as illustrated in Fig. <ref> (a).
The Rabi frequency of the CPT pulse is Ω=0.035Γ.
For a detection pulse duration of τ_2=60×2π/Γ, if the preparation pulse duration is short, τ_1=60×2π/Γ, the CPT-Ramsey spectrum contrast is low, as shown in Fig. <ref> (b).
The black solid line is the analytical result of Eq. (<ref>) and blue dots are the numerical result of Lindblad equations.
As the preparation pulse duration τ_1 increases to τ_1=200×2π/Γ, the Q^T_1 of Eq. (<ref>) grows, improving the contrast of the CPT-Ramsey fringe, see Fig. <ref> (c).
Meanwhile, reducing the detection pulse duration to τ_2=10×2π/Γ further improves the contrast of the CPT-Ramsey fringe and the spectrum becomes vertically symmetric, as shown in Fig. <ref> (d).
When the preparation pulse duration τ_1=1000×2π/Γ is sufficient, the spectrum will reach a saturation point, see Fig. <ref> (e).
As the period in frequency space of the Q^T_1 is 2π/T+τ_2.
The linewidth of the CPT-Ramsey spectrum satisfies Δν = 1/2(T+τ_2).
Thus, the CPT-Ramsey with a long dark time T can narrow the spectrum linewidth, which is consistent with our common knowledge.
These results indicate that our analytical formula is valid for conventional two-pulse CPT-Ramsey scenarios.
§.§.§ Anti-symmetric Two-pulse CPT-Ramsey Spectroscopy with Frequency shift
Usually, we need to perform two CPT-Ramsey interferometry with different frequencies and compare their differences to obtain an antisymmetric error signal for clock locking <cit.>.
To achieve real-time antisymmetric spectra, we can directly apply a frequency shift of Δδ during the dark time T or implement a change in phase ΔΦ=Φ_2-Φ_1 for the detection pulse based on conventional CPT-Ramsey interferometry, as illustrated in Fig. <ref> (a).
Here, Φ_1 and Φ_2 are the phases of the preparation pulse and detection pulse, respectively.
According to Eq. (<ref>), the two-pulse CPT-Ramsey interference term becomes
Q = Q^T'_1 + Q^T_2,
where
Q^T'_1 =Q^T_1exp(-iΔδΔ t + iΔΦ).
As an example, we set τ_1=1000×2π/Γ, τ_2=10×2π/Γ, and T=1000×2π/Γ.
When the two phases are equal, i.e., Φ_1=Φ_2 and ΔΦ=0, then it reduces to the conventional CPT-Ramsey interferometry as shown in Fig. <ref> (b).
While the spectra will become horizontal antisymmetric if the frequency shift and phase shift satisfy ΔδΔ t-ΔΦ=π/2, as shown in Fig. <ref> (c) and (d).
Then, the real-time processing of error signals will be obtained.
In auto-balance CPT-Ramsey interferometry <cit.>, the ΔΦ or Δδ can be used as the additional parameters to compensate for the light shift.
However, if τ_1=60×2π/Γ is short and τ_2=60×2π/Γ is substantial, the error signals will not be horizontally antisymmetric as Q^T_2 is considerable compared to Q^T'_1.
It means that if the detection pulse duration is comparable with the preparation pulse duration, the spectrum will become horizontally asymmetric, as shown in Fig. <ref> (e).
The black solid lines are the analytical result of Eq. (<ref>) and the blue dots are the corresponding numerical results.
All the results match perfectly.
§.§ Multi-pulse sequence
In Sec. <ref>, we analyzed conventional and frequency-shifted two-pulse CPT-Ramsey spectra using our analytical formula.
In this section, we will analyze multi-pulse CPT-Ramsey interferometry.
With a multi-pulse sequence, the central peak becomes obvious due to constructive interference while the neighboring peaks are suppressed through destructive interference.
The multi-pulse CPT-Ramsey interferometry makes the central peak easy to be identified and makes the signal-to-noise ratio (SNR) better.
Thus, the multi-pulse sequence is useful for developing practical quantum sensors, such as atomic clocks.
However, for practical applications, the multi-pulse CPT-Ramsey interferometry involves multiple pulses which need to be sophisticatedly tuned.
Our analytical formula provides a simple way to analyze and optimize the pulse sequence as desired.
We consider that the multi-pulse CPT Ramsey interferometry starts with a preparation pulse τ_1 to prepare the dark state, followed by N pulses of duration τ with pulse interval T, as shown in Fig. <ref> (a).
By using our analytical formula, below we analyze the roles of preparation pulse and periodic pulse sequence and provide an example to achieve the anti-symmetric spectrum with frequency shift.
§.§.§ The influence of preparation pulse
We consider the phases of all CPT pulses are identical and so that we can set the phases as zero.
According to Eq. (<ref>), the interference term
Q=Q^M_1+Q^M_2,
includes two parts,
Q^M_1 = exp(-Ω^2/ΓNτ)exp(-iδ N(T+τ))
×(1-exp(-(Ω^2/Γ+iδ)τ_1)),
and
Q^M_2 = ∑_i=1^Nexp(-Ω^2/Γ(N-i)τ) exp(-iδ (N-i)(T+τ))
×(1-exp(-(Ω^2/Γ+iδ)τ)).
Q^M_1 is the fast oscillating term versus δ.
Obviously, the preparation pulse duration τ_1 only affects Q^M_1 and Q^M_1 increases with τ_1.
Therefore the amplitude of the spectrum increases with the preparation pulse duration.
As shown in Fig. <ref> (b) and (c), the spectra of multi-pulse CPT-Ramsey interferometry with longer preparation pulse duration τ_1=200×2π/Γ has a higher amplitude of the peaks than that with shorter preparation pulse τ_1=60×2π/Γ.
However, the subsequent CPT pulses also affect Q^M_1.
The more or longer subsequent CPT pulses, the smaller the Q^M_1 is.
Hence, when the number N or the duration τ of the subsequent CPT pulses is large, the duration of the preparation pulse τ_1 has little impact on the spectra.
As shown in Fig. <ref> (d) and (e), the preparation pulse has little influence on the spectra of multi-pulse CPT-Ramsey interferometry when the pulse number N is large.
§.§.§ Periodic pulse sequence
With a large amount of pulse number N, the influence of the first CPT pulse duration can be neglected.
For simplicity, many experiments use periodic multi-pulse sequences <cit.>.
Under a periodic CPT pulse sequence with interval T, pulse number N, pulse duration τ, and Rabi frequencyΩ, according to Eq. (<ref>), we have
ρ_12(δ)=f(δ)∑_l=0^N-1ℛ^lexp(-ilδ T)𝒯.
This is a temporally analog to light passing through the Fabry-Pérot resonator <cit.>, in which ℛ≡exp(-Ω^2/Γτ) takes the role the reflection coefficient and 𝒯≡ 1-exp(-(Ω^2/Γ+iδ)τ) corresponds to the transmission coefficient.
Using the series summation, Eq. (<ref>) can be simplified as
ρ_12(δ) = f(δ)𝒯S,
with
S=1-R^Nexp(-iNδ T)/1-Rexp(-iδ T).
For a multi-pulse CPT-Ramsey interferometry, f(δ) and 𝒯 are flatter than S near the resonance point.
The lineshape of ρ_12 is mainly described by S, as shown in Fig. <ref>.
If the pulse number N→∞, the full width at half maximum (FWHM) 2πΔν_∞ of ρ_12 is determined by the reflection coefficient ℛ and the pulse period T_p=T+τ, which is the Airy distribution <cit.>,
2πΔν_∞ = 4/T_parcsin(√((1-ℛ)^2/2(ℛ^2+1))).
Eq. (<ref>) is valid in the saturation region of ℛ^N ≪ 1.
For a finite pulse number, the FWHM of Eq. (<ref>) cannot be exactly given <cit.>.
However, we can calculate the Lorenztian linewidth through the Taylor expansion for the 1/Re(S),
1/Re(S) = F_0 + 1/2F_2 T_p^2 δ^2 + 𝒪(T^4δ^4),
with
F_0 = 1-ℛ/1-ℛ^N,
and
F_2 = ℛ(1+ℛ)/(1-ℛ)(1-ℛ^N) - N^2ℛ^N(1 - ℛ) + 2 N ℛ^N + 1/(1 - ℛ^N)^2.
The real part of S can be approximated as the Lorentzian form
Re(S)≈S = A(1/2W)^2/(1/2W)^2+δ^2.
Here, A=1/F_0 and W=2√(2)/T√(F_0/F_2) are the amplitude and FWHM of S.
Substituting Eq. (<ref>) and Eq. (<ref>), we get that
W = 2/T_p[2(ℛ^2+ℛ)/(1-ℛ)^2 - 2N^2ℛ^N/1-ℛ^N -4Nℛ^N+1/(1-ℛ^N)(1-ℛ)]^-1/2.
In Fig. <ref> (a) we show W versus the pulse number N, where W decreases with the pulse number N.
Intuitively, more pulses will lead to a narrower linewidth.
Since ℛ decreases with both τ and Ω, larger Ω and τ will result in a larger linewidth.
Larger values of Ω and τ mean fewer pulses needed to reach saturation and fewer pulses contributing to multi-pulse interference, therefore the linewidth becomes broader.
For illustration, Fig. <ref> (c) shows the change of FWHM with the pulse number N and the pulse duration τ when Ω=0.04Γ.
While Fig. <ref> (d) displays the change of FWHM versus the pulse number N and the Rabi frequency Ω when τ=10×2π/Γ.
§.§.§ Anti-symmetric multi-pulse CPT-Ramsey spectroscopy with frequency shift
As mentioned in Sec.<ref>, one may prefer to use an anti-symmetric spectrum for frequency locking.
In a multi-pulse CPT-Ramsey interferometry, applying a frequency shift Δδ for a duration of Δ t before the k-th subsequent pulse [as illustrated in Fig. <ref> (a)], or introducing a phase jump ΔΦ, can alter the spectrum horizontal symmetry to be anti-symmetric.
However, how to determine pulse sequence with frequency shift or phase jump is still challenging.
Here, we use our analytical formula to address this issue.
Taking the frequency shift and the phase jump before the k-th subsequent pulse, we can divide the interference term into three parts
Q=Q^M'_1+Q^M'_2+Q^M'_3,
where
Q^M'_1 = exp(-Ω^2/ΓNτ)(1-exp(-(Ω^2/Γ+iδ)τ_1))
×exp(-iδ N(T+τ))exp(-iΔδΔ t + iΔΦ),
Q^M'_2 = ∑_i=1^k-1exp(-Ω^2/Γ(N-i)τ)
×(1-exp(-(Ω^2/Γ+iδ)τ))
×exp(-iδ (N-i)(T+τ))exp(-iΔδΔ t + iΔΦ),
and
Q^M'_3 = ∑_i=k^Nexp(-Ω^2/Γ(N-i)τ)
×(1-exp(-(Ω^2/Γ+iδ)τ))
×exp(-iδ (N-i)(T+τ)).
The frequency shift Δδ affects the horizontal symmetry of Q^M'_1 and Q^M'_2, but Q^M'_3 remains horizontally symmetric.
If the frequency shift satisfies ΔδΔ t=π/2, it will adjust Q^M'_1 and Q^M'_2 from symmetric into antisymmetric in the horizontal direction.
To obtain a horizontally antisymmetric spectrum, the contribution of the horizontally symmetric term Q^M'_3 should be small.
Thus, it is a natural choice to apply frequency shift right before the last pulse to suppress Q^M'_3.
In Fig. <ref> (b)-(e), we applied the frequency shifts with ΔδΔ t=π/2 after the preparation pulse τ_1, before the last 10-th pulse, before the last third pulse, and before the last pulse, respectively.
The preparation pulse is τ_1=200×2π/Γ and the pulse interval is T=500×2π/Γ.
The duration τ=10×2π/Γ and the pulse number N=40.
Clearly, as the delay of frequency shifts, Q^M'_3 decreases and the spectrum tends to become antisymmetric.
Thus, our analytic analysis can provide a straightforward way to design the multi-pulse sequence for CPT-Ramsey interferometry, which should be beneficial for developing high-accuracy schemes such as auto-balanced Ramsey spectroscopy <cit.>.
§ DISCUSSION
In conclusion, starting from the Lindblad equation, we derive an analytical formula to describe the multi-pulse CPT-Ramsey interferometry with arbitrary pulse sequence.
The analytical formula can potentially optimize the pulse sequence and analyze the influence of time-dependent detuning.
We illustrate the validity of the analytical result with the popular CPT-Ramsey scenarios and obtain the sort of views.
For a two-pulse CPT-Ramsey interferometry, we study the influence of the preparation and the detection pulse.
We quantitatively show that the preparation pulse should as long as possible to gain a larger spectrum amplitude,
and the detection pulse should be small to avoid destroying the CPT coherence.
The frequency shift or phase jump will change the spectrum symmetry.
The analytical results show that a long preparation pulse and a small detection pulse are required to obtain the antisymmetric spectrum.
For multi-pulse cases, the role of preparation pulses becomes less significant as the number of subsequent pulses increases.
As the number of pulses increases, the side peaks are continuously destroyed by interference, and we obtain a high-contrast central peak.
By adding a frequency shift or phase jump right before the last pulse, we obtain an antisymmetric multi-pulse CPT-Ramsey spectrum.
Our theoretical results can be applied to design novel multi-pulse and frequency modulated CPT-Ramsey schemes.
Under the condition of the period pulse sequence, we find out the approximate Lorenztian line shape of the spectrum and get the relationship between FWHM and the parameters of the CPT pulse sequence.
It quantitatively grapes the role of multi-pulse interference.
For the multi-pulse and frequency regulation CPT-Ramsey interferometry, there are many potential applications such as CPT clock and CPT magnetometers.
Effective optimization methods are conducive to efficiently improving the measurement accuracy.
In this work, we eliminate the one-photon detunings and the effect of light shift is ignored.
However, the real systems always contain many states, deriving light shift from a three-level system is not meaningful.
As our analytical results can describe the situations of time-dependent detuning, we can also analyze the impact of CPT pulses on the present light shift by adding the light shift into detuning.
These are deserved for further investigations.
This work is supported by the National Key Research and Development Program of China (Grant No. 2022YFA1404104), the National Natural Science Foundation of China (Grant No. 12025509), and the Key-Area Research and Development Program of GuangDong Province (Grant No. 2019B030330001).
32
fxundefined [1]
ifx#1
fnum [1]
#1firstoftwo
secondoftwo
fx [1]
#1firstoftwo
secondoftwo
noop [0]secondoftwo
ref[1]@startlink#1@href
href[1]#1@endlink
anitize@url [0]`
12`$12`&12`#12`1̂2`_12`%12
startlink[1]
endlink[0]
rl [1]href #1
@bib@innerbibempty
[Alzetta et al.(1976)Alzetta, Gozzini, Moi, and Orriols]alzetta1976experimental
author author G. Alzetta, author A. Gozzini,
author L. Moi, and author G. Orriols, 10.1007/BF02749417 journal journal Nuov Cim B volume 36, pages 5 (year
1976)NoStop
[Rogers et al.(2014)Rogers,
Jahnke, Metsch, Sipahigil,
Binder, Teraji, Sumiya,
Isoya, Lukin, Hemmer, and Jelezko]PhysRevLett.113.263602
author author L. J. Rogers, author K. D. Jahnke,
author M. H. Metsch, author A. Sipahigil, author
J. M. Binder, author
T. Teraji, author H. Sumiya, author J. Isoya, author M. D. Lukin, author P. Hemmer, and author F. Jelezko, 10.1103/PhysRevLett.113.263602 journal journal Phys. Rev. Lett. volume 113, pages 263602 (year
2014)NoStop
[Das et al.(2018)Das,
Liu, Grémaud, and Mukherjee]PhysRevA.97.033838
author author S. Das, author P. Liu, author B. Grémaud, and author M. Mukherjee, 10.1103/PhysRevA.97.033838 journal journal Phys.
Rev. A volume 97, pages 033838
(year 2018)NoStop
[Xia et al.(2015)Xia,
Kolesov, Wang, Siyushev,
Reuter, Kornher, Kukharchyk,
Wieck, Villa, Yang, and Wrachtrup]PhysRevLett.115.093602
author author K. Xia, author R. Kolesov,
author Y. Wang, author
P. Siyushev, author
R. Reuter, author T. Kornher, author N. Kukharchyk, author A. D. Wieck, author B. Villa, author S. Yang, and author J. Wrachtrup, 10.1103/PhysRevLett.115.093602 journal journal Phys. Rev. Lett. volume 115, pages 093602 (year 2015)NoStop
[Santori et al.(2006)Santori, Tamarat, Neumann, Wrachtrup, Fattal, Beausoleil,
Rabeau, Olivero, Greentree,
Prawer, Jelezko, and Hemmer]PhysRevLett.97.247401
author author C. Santori, author P. Tamarat,
author P. Neumann, author J. Wrachtrup, author
D. Fattal, author R. G. Beausoleil, author J. Rabeau, author P. Olivero, author A. D. Greentree, author S. Prawer, author F. Jelezko, and author P. Hemmer, 10.1103/PhysRevLett.97.247401 journal journal Phys. Rev. Lett. volume 97, pages 247401 (year 2006)NoStop
[Jamonneau et al.(2016)Jamonneau, Hétet, Dréau,
Roch, and Jacques]PhysRevLett.116.043603
author author P. Jamonneau, author G. Hétet, author A. Dréau, author J.-F. Roch,
and author V. Jacques, 10.1103/PhysRevLett.116.043603 journal journal Phys. Rev. Lett. volume 116, pages 043603 (year 2016)NoStop
[Ni et al.(2008)Ni,
Ospelkaus, de Miranda, Pe'er, Neyenhuis, Zirbel, Kotochigova, Julienne, Jin, and Ye]Ni231
author author K.-K. Ni, author S. Ospelkaus,
author M. H. G. de Miranda,
author A. Pe'er, author B. Neyenhuis, author
J. J. Zirbel, author
S. Kotochigova, author
P. S. Julienne, author
D. S. Jin, and author
J. Ye, 10.1126/science.1163861 journal journal
Science volume 322, pages 231
(year 2008)NoStop
[Aspect et al.(1988)Aspect,
Arimondo, Kaiser, Vansteenkiste, and Cohen-Tannoudji]PhysRevLett.61.826
author author A. Aspect, author E. Arimondo,
author R. Kaiser, author N. Vansteenkiste, and author C. Cohen-Tannoudji, 10.1103/PhysRevLett.61.826 journal journal Phys. Rev. Lett. volume 61, pages 826 (year 1988)NoStop
[Vanier(2005)]Vanier2005
author author J. Vanier, 10.1007/s00340-005-1905-3 journal
journal Appl. Phys. B volume 81, pages 421 (year 2005)NoStop
[Merimaa et al.(2003)Merimaa, Lindvall, Tittonen, and Ikonen]Merimaa:03
author author M. Merimaa, author T. Lindvall,
author I. Tittonen, and author E. Ikonen, 10.1364/JOSAB.20.000273 journal journal
J. Opt. Soc. Am. B volume 20, pages
273 (year 2003)NoStop
[Yun et al.(2017)Yun,
Tricot, Calosso, Micalizio,
Franççois, Boudot, Guérandel, and de
Clercq]PhysRevApplied.7.014018
author author P. Yun, author F. Tricot,
author C. E. Calosso, author S. Micalizio, author
B. Franççois, author
R. Boudot, author S. Guérandel, and author E. de Clercq, 10.1103/PhysRevApplied.7.014018 journal journal
Phys. Rev. Applied volume 7, pages
014018 (year 2017)NoStop
[Liu et al.(2017)Liu,
Ivanov, Yudin, Kitching, and Donley]PhysRevApplied.8.054001
author author X. Liu, author E. Ivanov,
author V. I. Yudin, author J. Kitching, and author E. A. Donley, 10.1103/PhysRevApplied.8.054001 journal journal
Phys. Rev. Applied volume 8, pages
054001 (year 2017)NoStop
[Scully and Fleischhauer(1992)]PhysRevLett.69.1360
author author M. O. Scully and author M. Fleischhauer, 10.1103/PhysRevLett.69.1360 journal journal Phys. Rev. Lett. volume 69, pages 1360 (year
1992)NoStop
[Nagel et al.(1998)Nagel,
Graf, Naumov, Mariotti,
Biancalana, Meschede, and Wynands]Nagel_1998
author author A. Nagel, author L. Graf,
author A. Naumov, author E. Mariotti, author
V. Biancalana, author
D. Meschede, and author
R. Wynands, 10.1209/epl/i1998-00430-0 journal journal
Europhys. Lett. volume 44, pages 31
(year 1998)NoStop
[Schwindt et al.(2004)Schwindt, Knappe, Shah, Hollberg, Kitching, Liew, and Moreland]doi:10.1063/1.1839274
author author P. D. D. Schwindt, author S. Knappe, author V. Shah,
author L. Hollberg, author J. Kitching, author
L.-A. Liew, and author
J. Moreland, 10.1063/1.1839274 journal journal Appl. Phys.
Lett. volume 85, pages 6409 (year 2004)NoStop
[Tripathi and Pati(2019)]Tripathi2019
author author R. Tripathi and author G. S. Pati, 10.1109/jphot.2019.2922831 journal
journal IEEE Photonics Journal volume
11, pages 1 (year 2019)NoStop
[Zanon et al.(2005)Zanon,
Guerandel, de Clercq, Holleville, Dimarcq, and Clairon]PhysRevLett.94.193002
author author T. Zanon, author S. Guerandel,
author E. de Clercq, author D. Holleville, author
N. Dimarcq, and author
A. Clairon, 10.1103/PhysRevLett.94.193002 journal journal
Phys. Rev. Lett. volume 94, pages
193002 (year 2005)NoStop
[Vanier et al.(2003)Vanier,
Levine, Janssen, and Delaney]PhysRevA.67.065801
author author J. Vanier, author M. W. Levine,
author D. Janssen, and author M. Delaney, 10.1103/PhysRevA.67.065801 journal journal Phys. Rev. A volume 67, pages 065801 (year 2003)NoStop
[Guerandel et al.(2007)Guerandel, Zanon, Castagna, Dahes, de Clercq, Dimarcq, and Clairon]4126869
author author S. Guerandel, author T. Zanon,
author N. Castagna, author F. Dahes, author
E. de Clercq, author
N. Dimarcq, and author
A. Clairon, @noop journal journal IEEE Trans. Instrum. Meas. volume 56, pages 383 (year
2007)NoStop
[Yun et al.()Yun,
Zhang, Liu, Deng,
You, and Gu]Yun_2012
author author P. Yun, author Y. Zhang, author G. Liu, author
W. Deng, author L. You, and author S. Gu, 10.1209/0295-5075/97/63004 volume 97, pages 63004, note 16 citations (Crossref) [2023-02-27]NoStop
[Warren et al.(2018)Warren,
Shahriar, Tripathi, and Pati]Warren2018
author author Z. Warren, author M. S. Shahriar, author R. Tripathi,
and author G. S. Pati, 10.1063/1.5008402 journal journal J. Appl. Phys. volume 123, pages 053101 (year 2018)NoStop
[Nicolas et al.(2018)Nicolas, Delord, Jamonneau, Coto, Maze, Jacques, and Hétet]Nicolas2018
author author L. Nicolas, author T. Delord,
author P. Jamonneau, author R. Coto, author
J. Maze, author V. Jacques, and author G. Hétet, 10.1088/1367-2630/aab574
journal journal New J. Phys. volume 20, pages 033007 (year
2018)NoStop
[Fang et al.(2021)Fang,
Han, Jiang, Qiu,
Guo, Zhao, Huang,
Lu, and Lee]fang_temporal_2021
author author R. Fang, author C. Han, author X. Jiang, author
Y. Qiu, author Y. Guo, author M. Zhao, author J. Huang,
author B. Lu, and author C. Lee, 10.1038/s41534-021-00479-y journal journal Npj
Quantum Inf. volume 7, pages 1
(year 2021)NoStop
[Abdel Hafiz et al.(2018a)Abdel Hafiz, Coget, Petersen, Rocher, Guérandel, Zanon-Willette, de
Clercq, and Boudot]abdel_hafiz_toward_2018
author author M. Abdel Hafiz, author G. Coget,
author M. Petersen, author C. Rocher, author
S. Guérandel, author
T. Zanon-Willette, author
E. de Clercq, and author
R. Boudot, 10.1103/PhysRevApplied.9.064002 journal journal
Phys. Rev. Appl. volume 9, pages
064002 (year 2018a)NoStop
[Abdel Hafiz et al.(2018b)Abdel Hafiz, Coget, Petersen, Calosso, Guérandel, de Clercq, and Boudot]abdel_hafiz_symmetric_2018
author author M. Abdel Hafiz, author G. Coget,
author M. Petersen, author C. E. Calosso, author
S. Guérandel, author
E. de Clercq, and author
R. Boudot, 10.1063/1.5030009 journal journal Appl. Phys.
Lett. volume 112, pages 244102
(year 2018b)NoStop
[Yudin et al.(2018)Yudin,
Taichenachev, Basalaev, Zanon-Willette, Pollock, Shuker,
Donley, and Kitching]yudin_generalized_2018
author author V. I. Yudin, author A. V. Taichenachev, author M.
Yu. Basalaev, author T. Zanon-Willette, author J. W. Pollock, author M. Shuker, author E. A. Donley, and author J. Kitching, 10.1103/PhysRevApplied.9.054034 journal journal
Phys. Rev. Appl. volume 9, pages
054034 (year 2018)NoStop
[Kotler et al.(2011)Kotler,
Akerman, Glickman, Keselman, and Ozeri]kotler_single-ion_2011
author author S. Kotler, author N. Akerman,
author Y. Glickman, author A. Keselman, and author R. Ozeri, 10.1038/nature10010 journal journal Nature volume 473, pages 61 (year
2011)NoStop
[Shahriar et al.(2014)Shahriar, Wang, Krishnamurthy,
Tu, Pati, and Tseng]Shahriar2014
author author M. Shahriar, author Y. Wang,
author S. Krishnamurthy, author Y. Tu, author
G. Pati, and author
S. Tseng, 10.1080/09500340.2013.865806 journal journal J.
Mod. Opt volume 61, pages 351
(year 2014)NoStop
[Berberan-Santos(2010)]berberan-santos_greens_2010
author author M. N. Berberan-Santos, 10.1007/s10910-010-9678-2 journal journal Journal of Mathematical Chemistry volume 48, pages 175 (year
2010)NoStop
[Zanon-Willette et al.(2005)Zanon-Willette, Guérandel, de
Clercq, Holleville, Dimarcq, and Clairon]zanon-willette_high_2005
author author T. Zanon-Willette, author S. Guérandel, author E. de
Clercq, author D. Holleville,
author N. Dimarcq, and author A. Clairon, 10.1103/PhysRevLett.94.193002 journal journal Phys. Rev. Lett. volume 94, pages 193002 (year 2005)NoStop
[Ismail et al.(2016)Ismail,
Kores, Geskus, and Pollnau]ismail_fabry-perot_2016
author author N. Ismail, author C. C. Kores,
author D. Geskus, and author M. Pollnau, 10.1364/OE.24.016366 journal journal Opt.
Express volume 24, pages 16366
(year 2016)NoStop
[Pissadakis(2000)]pissadakis_bragg_2000
author author S. Pissadakis, @noop journal journal
University of Southampton (year 2000)NoStop
|
http://arxiv.org/abs/2303.06670v1
|
20230312142410
|
DINO-MC: Self-supervised Contrastive Learning for Remote Sensing Imagery with Multi-sized Local Crops
|
[
"Xinye Wanyan",
"Sachith Seneviratne",
"Shuchang Shen",
"Michael Kirley"
] |
cs.CV
|
[
"cs.CV"
] |
DINO-MC: Self-supervised Contrastive Learning for Remote Sensing Imagery with Multi-sized Local Crops
Xinye Wanyan
[email protected]
Sachith Seneviratne
[email protected]
Shuchang Shen
[email protected]
Michael Kirley
[email protected]
March 30, 2023
=============================================================================================================================================================================================================
Due to the costly nature of remote sensing image labeling and the large volume of available unlabeled imagery, self-supervised methods that can learn feature representations without manual annotation have received great attention.
While prior works have explored self-supervised learning in remote sensing tasks, pretext tasks based on local-global view alignment remain underexplored.
Inspired by DINO <cit.>, which employs an effective representation learning structure with knowledge distillation based on global-local view alignment, we formulate two pretext tasks for use in self-supervised learning on remote sensing imagery (SSLRS).
Using these tasks, we explore the effectiveness of positive temporal contrast as well as multi-sized views on SSLRS.
Moreover, we extend DINO and propose DINO-MC which uses local views of various sized crops instead of a single fixed size.
Our experiments demonstrate that even when pre-trained on only 10% of the dataset, DINO-MC performs on par or better than existing state of the art SSLRS methods on multiple remote sensing tasks, while using less computational resources.
All codes, models and results are available at
<https://github.com/WennyXY/DINO-MC>.
§ INTRODUCTION
Computer vision models have been widely used in remote sensing to solve numerous real-world challenges, including disaster prevention <cit.>, forestry <cit.>, agriculture <cit.>, land surface change <cit.>, biodiversity <cit.>.
Generally, the models with deeper and more complex structures are able to extract more useful features from images, leading to superior performance in a wide range of applications.
However, training large-scale computer vision models in a traditional supervised manner always requires large labeled datasets, which are costly and error-prone, especially in remote sensing domain <cit.>.
Therefore, reducing the reliance of the model on labeled images is crucial for resolving specific downstream tasks.
The self-supervised learning (SSL) paradigm is a common solution which is able to train a general feature extraction model on unlabeled datasets.
SSL is conducted in two phases: first, the model is pre-trained to learn general latent representations by solving complex pretext tasks. Then, the pre-trained model is fine-tuned on downstream tasks.
Since different pretext tasks make the model learn different aspects of features, designing a suitable task whose labels can be automatically obtained from the data is one of the keys to SSL.
According to the pretext tasks, SSL models can be classified into three categories.
Generative tasks allow the model learn feature representations by reconstructing or generating original images.
For example, the image inpainting <cit.> uses the original data as labels to train the model to recover several masked parts of the original image.
The discriminative task <cit.> trains the network to distinguish a set of categories.
For example, <cit.> trains the model to predict the relative position of a patch to its neighbors.
It is an eight-label classification task in which each image patch is defined to have up to eight adjacent patches.
However, the feature representations learned by generative and discriminative methods are highly dependent on the used pretext task, and an ineffective pretext task might reduce the transfer-ability of a pre-trained model <cit.>.
In stead of solving a single pretext task, contrastive approaches train models by maximising the similarity between the feature representations of two positive samples, e.g., two augmented views of the same instance.
However, simply following this approach will easily generate an identity map for each pair of positive samples, i.e., model collapse <cit.>.
DINO <cit.>, a state-of-the-art contrastive self-supervised model, utilizes knowledge distillation and centering
and sharpening of the teacher network <cit.> to handle this issue.
DINO has shown impressive performance in numerous computer vision tasks, including image retrieval, copy detection and video instance segmentation.
While some previous work has applied DINO to remote sensing domain <cit.>, a thorough evaluation and extension of the self-supervised objective for remote sensing imagery has not attempted.
In particular, the size of instances observed during pre-training on traditional natural scenes shows wider variation than seen in remote sensing imagery.
Hence, the alignment of the latent representation of the multi-sized local augmented crops against the global augmented views is of interest in remote sensing imagery as it leads to a more challening pretext task.
In SeCo <cit.>, the temporal information plays a crucial role in learning transferable features from remote sensing imagery, building primarily on the contrastive model MoCo-V2 <cit.>.
In this work, we explore whether using temporal views as positive instances can further improve the performance of DINO in remote sensing domain.
Furthermore, inspired by the inherent characteristics of the size variation of semantic content observed between traditional natural scenes and remote sensing imagery, we propose DINO-MC which uses size variation in local crops to drive better representation learning of the semantic content of remote sensing imagery.
We evaluate our representations on different backbones including two transformer networks and two convnets.
While most existing self-supervised methods for remote sensing employ ResNet and Vision Transformers (ViTs) as backbone models, the self-supervised feature extraction potential of Wide ResNets (WRN) and Swin Transformers is of particular interest in remote sensing, and we thus include them in our analysis.
In the linear probing evaluation, the findings demonstrate that DINO-MC has great transfer-ability, as it achieves 2.56% higher accuracy with a smaller pre-trained dataset than SeCo.
Besides, DINO-MC outperforms DINO and SeCo when fine-tuned on two remote sensing classification tasks as well as on change detection (a segmentation task).
In conclusion, our main contributions are summarized as follows:
∙ We apply temporal views as positive instances to recent contrastive self-supervised models (DINO-TP). We analyze different backbone networks to explore their effectiveness on different remote sensing tasks when pretrained under this setting.
∙ We combine a new multi-sized local cropping strategy with DINO and propose DINO-MC. We pre-train DINO-MC with different backbones on a satellite imagery dataset SeCo-100K to learn a general representations.
∙ DINO-MC outperforms SeCo with only 10% pre-training dataset, and achieves state-of-the-art results on BigEarthNet multi-label and EuroSAT multi-class land use classification, as well as OSCD change detection task.
§ RELATED WORK
§.§ Contrastive Self-supervised Learning.
The self-supervised pre-training aims to learn a general features which can generalise well to different downstream tasks.
As a branch of self-supervised methods, contrastive learning has recently gained attention and shown promise in performance. It learns feature representations by maximizing the similarity of two positive instances and the distance between positive and negative instances.
In generative and discriminative models, the encoder is trained to learn feature representations by optimizing the loss function calculated on the ground truth and the prediction, while the loss of contrastive model is calculated in the latent space <cit.>.
Instance discrimination <cit.> is a simple but effective pretext task.
It is widely used in contrastive learning which sets augmented views of the same input as positive samples and different instances as negative samples, and then trains the model to keep positive pairs close and negative pairs far in the representation space <cit.>.
<cit.> proposes Momentum Contrast model (MoCo-V1) with a momentum encoder to effectively maintain multiple negative samples for representation learning.
SimCLR <cit.> employs very large batch sizes instead of momentum encoders, and provides experimental results on 10 forms of data augmentation.
Inspired by SimCLR, MoCo-V1 is extended to MoCo-V2 <cit.>, and then MoCo-V3 <cit.> is proposed by applying ViT as the backbone.
Clustering method is another line of contrastive learning, which demands no precise indication from the inputs <cit.>.
<cit.> introduces a contrasting cluster assignment that learns features by Swapping Assignments between multiple Views of the same image (SwAV).
SwAV is easily applicable to different sizes of datasets since it employs clustering instead of pairwise comparisons.
Furthermore, <cit.> proposes a new data augmentation named multi-crop to increase the instances without drastically additional memory and computation.
Specifically, when doing multi-crop, images will be cropped to a collection of views with lower resolutions instead of the full-resolution views.
Multi-crop shows both efficiency and effectiveness since several self-supervised models <cit.> perform well with it.
Knowledge distillation can be used in contrastive learning for feature extraction without separating between images <cit.>.
<cit.> proposes Bootstrap Your Own Latent (BYOL) based on the online and target networks whose weights are updated with each other.
BYOL experiments with ResNet of different sizes.
Inspired by BYOL, <cit.> explores the further synergy between SSL and different backbones, especially ViTs, and proposes a simple form of self-distillation with no labels (DINO).
DINO uses the same two networks architecture as BYOL but with different loss function and backbone models.
When pre-trained on ImageNet <cit.>, DINO achieves better linear and KNN probing evaluation results than other self-supervised methods with fewer computation resources <cit.>.
§.§ Self-supervised Learning in Remote Sensing.
<cit.> experiments with self-supervised models on different pretext tasks, including image inpainting <cit.>, context prediction <cit.>, and instance discrimination <cit.> on remote sensing imagery tasks.
<cit.> proposes to learn practical representations from satellite imagery by reconstructing the visible colors (RGB) from its high-dimensionality spectral bands (Spectral).
<cit.> explores the application of contrastive representation learning to large-scale satellite image datasets.
<cit.> proposes the seasonal contrast (SeCo) method, which significantly improves the performance of MoCo-V2 on three remote sensing tasks.
Similar to <cit.>, SeCo utilizes temporal information from remote sensing images to set two kinds of experiments MoCo-V2 with TP and SeCo.
MoCo-V2 with TP is a positive temporal contrast, which regards the temporal views as the positive instances and trains models match their representations allowing the model to learn essential features that do not change over time.
While SeCo is a negative temporal contrastive model regarding temporal views as the negative instances to capture the changes or differences because of the time changing.
<cit.> uses Swin Transformer as the backbone of DINO and applies it to remote sensing imagery tasks.
DINO-MM <cit.> extends DINO by combining synthetic-aperture radar (SAR) and multispectral (optical) images and is applied to BigEarthNet land use classification task.
Existing studies have demonstrated the value and feasibility of self-supervised models for practical applications in remote sensing image tasks.
However, the potential of SSL in remote sensing has not been fully unlocked.
Our work targets to bridge this gap and extend existing self-supervised model by generating more effective contrastive instances.
§ METHOD
Our work is mainly based on a contrastive self-supervised model DINO, which has been applied to both natural and remote sensing imagery <cit.>.
We aim to learn useful, transferable features for remote sensing imagery by exploring positive temporal contrastive self-supervised model DINO-TP (<ref>) and introducing a self-supervised learning method DINO-MC (<ref>).
In addition, we also experiment with the feature extraction ability of different backbones in SSL.
§.§ DINO-TP
Architecture
<ref> shows the model structure.
The student and teacher networks in DINO are two neural networks with the same architecture g but different weights θ_t and θ_s.
Two sets of augmented views x_1 and x_2 are generated from the same image.
The student network receives both global and local crops as inputs, whereas the teacher network only receives global crops.
Specifically, the global view covers the majority of the initial image and the local view only contains a small portion of it.
In this way, the model is trained to match the individual local views to global views in the feature space.
Rather than a pre-trained and frozen teacher network used in previous study <cit.>, DINO dynamically updates the teacher weights by using EMA on student weights
θ_tθ_tλ+(1-θ_s)
, where θ_t is the current weight of the teacher network and θ_s is the current weight of the student network.
The λ values adhere to a cosine schedule between 0.996 and 1, indicating that the teacher network is less dependent on the present student and more dependent on the integration of the student network in each round; hence, the weights are updated slowly.
DINO uses centering and sharpening to prevent model collapse.
Centering is adding a bias term c to the features of the output of the teacher model, i.e.,
g_t(x) = g_t(x) + c
As <ref> shown, the bias term c is dynamically updated by the EMA, where m > 0 denotes the update rate and B is the batch size.
c mc+(1- m)1/B∑_i=1^B gθ_t(x_i)
DINO achieves sharpening by performing softmax normalization using low temperature in the teacher network to avoid consistent distribution.
The teacher network in DINO consistently performs better than the student network during pre-training, so it is used as the feature extractor in downstream tasks after pre-training <cit.>.
Temporal Contrastive
This work performs self-supervised pre-training on SeCo-100K <cit.> to exploit temporal information in representation learning.
SeCo-100K is an unlabeled remote sensing imagery dataset with 100K instances, and each instance is composed of five different temporal views of the same location.
In DINO-TP, we regard the temporal views of the same location as the positive instances, i.e., we pre-train the teacher and student networks to match temporal views in the feature space.
The exact process is as follows.
In the pre-training phase, we randomly select three temporal views and name them as t_0, t_1, t_2.
As shown in <ref>, t_1, t_2 can be regarded as the temporal augmentation views of t_0.
The temporal image t_0 is directly used as q to generate 6 local crops of various sizes, including 184^2, 164^2, 144^2, 124^2, 104^2 and 84^2.
After applying color jittering, grayscale, and Gaussian blur to each of the three temporal perspectives, we acquire k_0, k_1, k_2 views.
We scale k_0, k_1, k_2 within a specific range and resize them into 224^2 to get three global crops, which are used as the input of the teacher network.
In prior work, different techniques are paired with different crop scaling ranges.
SwAV uses (0.05, 0.14), (0.14, 1) <cit.> and DINO chooses (0.05, 0.32), (0.32, 1) <cit.>.
This study follows DINO and uses (0.05, 0.32), (0.32, 1) as the scaling range for local crops and global crops.
Following this method, DINO-TP not only learns the relationship between the whole and the pieces of the image, but also discovers the correlation between various temporal perspectives.
§.§ DINO-MC
The structure of DINO-MC is nearly identical to DINO-TP.
Intuitively, DINO-MC can be regarded as DINO with different multi-crop and color transformation augmentations, and as DINO-TP without temporal views.
In our work, we change the cropping strategy for local crops in DINO to create a more challenging pretext task.
We use multi-sized crops instead of the fixed-size local crops used in DINO.
Keeping the number of global and local crops same as DINO, DINO-MC outperforms DINO on both linear and KNN probing as well as end-to-end evaluation on multiple downstream tasks.
Color-related pretext tasks have been proven to be effective in many image tasks in the field of remote sensing <cit.>.
This is due to the strong connection between color and semantics.
Therefore, we set two strategies of color transformations for global and local crops respectively.
The global views are augmented by random color jittering and GaussianBlur.
The local views are augmented by random color jittering, random grayscale shifting, and random Gaussian blur all together.
Random color jittering can change the brightness, contrast, saturation and hue of the image with a specific probability within a certain range.
It is a commonly used color transformation method because it can simulate the effect of shooting in different lighting environments and other real-world shooting situations.
Random grayscale converts an image into a grayscale image randomly.
This enhancement method can reduce the impact of color, which is beneficial for some specific application scenarios, and can learn aspects other than color properties.
We use different cropping strategy and different settings for color transformation.
Our strategy is simple but effective, and the experiments verify that DINO-MC outperforms DINO on both linear probing and end-to-end fine-tuning on three downstream tasks (classification and change detection).
§ EXPERIMENTS
In this study, we evaluate the features learned from the self-supervised pre-training on two downstream tasks: a land use classification on EuroSAT <cit.> and a change detection task on OSCD <cit.>.
Self-supervised Pre-training
We adopt and extend DINO for doing experiments since it is not only flexible and effective but also greatly declines the computational requirements.
The models are pre-trained on SeCo-100K dataset <cit.>, which is collected from Sentinel-2 <cit.> for self-supervised representation learning.
It is an unlabeled remote sensing dataset containing 100K instances from different locations around the world, each consisting of five temporal views taken from the same location.
In the pre-training phase, two distinct sets of temporal views of the same region are supplied to the student and teacher networks, respectively, then the self-supervised model matches these views in feature space to generate representations that do not vary over time.
In DINO-MC and DINO-TP, the scaling range of multi-crop is (0.05, 0.32) for local crops and (0.32, 1) for global crops.
Our self-supervised models, pretrained on 100k images over 300 epochs, is compared against several baselines, including DINO, MoCo-V2, and SeCo, on three different remote sensing downstream tasks, while using less overall computation than the current state of the art (SeCo-1M).
§.§ DINO with Different Backbones
Being the backbone of DINO, ViT is superior to ResNet <cit.>.
In this work, there are four different networks applied as the backbone of DINO, DINO-TP, and DINO-MC, including ViT, Swin Transformer, ResNet, and WRN.
ViT preserves the Transformer structure used in NLP as much as possible and performs very well in computer vision tasks <cit.>.
The input of transformer encoder is the embedding formed by adding the patch embedding with the position encoding.
The transformer encoder of ViT consists mainly of layer normalization (LN) which is applied before each block, multi-head attention, and multi-layer perceptron block (MLP).
Inspired by ViT, Swin Transformer is proposed with a hierarchical transformer, which computes representation with both regular and shifted windows to capture features from different levels and resolutions.
A deep residual learning framework (ResNet) is proposed to overcome the degradation issue by <cit.>.
They add shortcut connections to transmit the information of shallow layers directly to the deeper layers of the neural network and require no additional computation.
With this mechanism, the residual net is deepened to 152 layers and achieves state-of-the-art results in multiple computer vision tasks.
Furthermore, with the development of self-supervised representation learning, ResNet also becomes an effective backbone widely used in multiple self-supervised architectures <cit.>.
WRN <cit.> is proposed to improve the performance of ResNet by increase the width of the residual block, i.e., widening the convolutional layers.
When the same number of parameters are utilized, wide residual block can get superior outcomes with less training time compared to the original residual block.
WRN adds a widening factor to a block denoted by k, and the initial residual block can be represented as k=1.
Although the parameters numbers and computational complexity are quadratic in k, this method is more effective than expanding the number of layers in ResNet since large tensors are able to make better use of the parallel-computing ability of GPUs <cit.>.
WRN is proved to achieve new state-of-the-art results in a supervised manner in terms of classification F1-Score and training efficiency <cit.>.
Therefore, this project intends to employ it with a self-supervised training framework.
Implementation Details
There are different sizes of ViT models, and we use ViT-small as the backbone model and implement it following DINO.
In the experiments, we load different backbones as the teacher and student network without pre-trained weights.
WRN-50-2 has similar structure to ResNet, with the exception of the bottleneck number of channels, which is twice as large in each block.
We follow the recommendation from DINO to use AdamW optimizer.
We use cross-entropy as the loss function to calculate the distance between feature representations output by two networks.
We evaluate the learned representations by applying KNN and linear probing on EuroSAT land use classification task.
Quantitative Results
In order to evaluate the representations independently, the feature extraction model is frozen and only linear and KNN classifiers are trained on EuroSAT land use classification task.
The results are shown in <ref>.
From the table, DINO-MC performs better than both DINO and DINO-TP when using ViT-samll, WRN-50-2, and ResNet-50 backbones.
DINO-MC with WRN-50-2 pre-trained on 100K data is even 2.56% higher than the linear probing accuracy of SeCo pre-trained on 1 million data.
Besides, DINO-MC with ViT-samll has 2.59% higher accuracy than DINO with ViT-samll which indicates the effectiveness of our strategy.
In comparison to the other three backbones, Swin-tiny performs less well.
One possible reason could be that the model size of Swin-tiny is much smaller than the other three models.
Another interesting observation is that the DINO-TP performs worse with two convnets than the DINO, but better with two transformer models.
Among the different self-supervised models, ViT-small and Swin-tiny performed more consistently than ResNet-50 and WRN-50-2.
Overall, DINO-MC is particularly effective.
§.§ Land Use Classification on EuroSAT
EuroSAT is a widely used benchmark dataset for remote sensing land use classification tasks.
It is used for representation evaluation in this study, allowing the results of models based on it to be easily compared to those of other models.
The dataset, which collects 27,000 remote sensing images from the Sentinel-2 satellite, is divided into 21,600 and 5,400 images for training and evaluation in the experiment, respectively.
Implementation Details
The pre-trained backbone models in self-supervised learning are evaluated as feature extractors in this land use classification downstream task.
Based on the pre-trained backbone models, we add a fully-connected layer as the classifier to output the classification results.
Both the feature extractor and the classifier are fine-tuning on this supervised classification task.
We train the models for around 200 epochs with a batch size of 32.
The learning rate is 1e-3 or 3e-3 for different models.
We use the CosineAnnealingLR scheduler to update the learning rate.
Same as SeCo <cit.>, we use SGD optimizer without weight decay to update weights.
Quantitative Results
<ref> compares our pre-trained models against three supervised baseline models on EuroSAT land use classification task.
DINO-MC with WRN-50-2 achieves similar results to the three supervised models, in particular, it was pre-trained on only 100K images, while the three supervised models were pre-trained on 1M images.
This further confirms the effectiveness of the representations learned by DINO-MC.
§.§ Land Use Classification on BigEarthNet
BigEarthNet <cit.> is a widely used benchmark dataset for land use classification task, containing a total of 590,326 images.
This paper uses BigEarthNet-S2 <cit.>, which collects remote sensing images from Sentinel-2 only, and each image is annotated by multiple land use categories.
The dataset provides 12 spectral bands for each image and a JSON file with its multi-labels and metadata information.
Following SeCo <cit.>, we employ a new nomenclature of 19 classes introduced in <cit.>, and around 12% of the patches that are totally masked by seasonal snow, clouds, or cloud shadows are eliminated in this experiment.
We used the training/validation splitting strategy suggested by <cit.> with 311,667 instances for training and 103,944 images for validation.
Implementation Details
We add a linear classification layer on top of the backbone model as the output layer and then fine-tune it on 10% and 100% BigEarthNet, respectively, to evaluate the features learned by the self-supervised models.
In this experiment, the Adam and AdamW optimizer with default hyper-parameters are used to update the weights of the models.
Identical to SeCo, we set the learning rate to 1e-5 and scale it down by ten in epochs of 60% and 80%, respectively.
We use the MultiLabelSoftMarginLoss as the loss function, which allows assigning a different number of target classes to each sample.
Quantitative Results
<ref> provides the results of each pre-trained model in the end-to-end BigEarthNet classification task.
We measure the performance of each model by mean average precision (MAP).
When fine-tuned on the 10% BigEarthNet, DINO-MC outperforms SeCo-100K with the same backbone.
Besides, DINO-MC with ViT-small achieves 1.65% higher MAP than with ResNet-50, 2.48% higher MAP than SeCo-100K, and even 1.58% higher MAP than SeCo-1M.
The performance of DINO-MC with each of the four backbone models exceeds that of SeCo-100K, and even outperforms SeCo-1M except for ResNet-50.
When fine-tuned on the whole BigEarthNet, DINO-MC achieves comparable result to SeCo-100K with the same backbone.
Interestingly, DINO-MC with Swin-tiny achieves 1.89% higher MAP than with ResNet-50, 1.63% higher MAP than SeCo-100K, and 0.94% higher than SeCo-1M.
The results demonstrate that the representations learned by DINO-MC can generalize well on the multi-label classification task on BigEarthNet.
§.§ Change Detection on OSCD
The Onera Satellite Change Detection (OSCD) is a benchmark dataset of which the images are collected from Sentinel-2 satellites.
It focuses primarily on urban growth and disregards natural changes <cit.>.
Change detection is a fundamental problem in the field of earth observation image analysis.
The input is a pair of images captured at the same location, while the label is a mask map highlighting the change parts.
It is a binary classification task in which labels are assigned to each pixel based on a series of images sampled at different times: change (positive) or no change (negative).
The results are measured by F1 Score, precision and recall.
Implementation Details
The OSCD dataset is divided into fourteen and ten pairs for training and validation separately, as recommended by prior research <cit.>.
In addition, the categories of change and unchanged in this dataset are unbalanced due to the property of the task.
We use the same U-net architecture as SeCo for the change detection task, which employ the pre-trained backbone models to extract features as the encoder in the U-net.
We apply the pre-trained WRN-50-2 and ResNet-50 backbone models as the encoder and select the first convolution layer, and Layer 1 to 4 as the copy and cropping layers.
As for the decoder module, it is constructed to rebuild an image with the same width and height as the input.
And the input and output sizes of its layers are set according to the input and output of the specific encoder layers, in order to concatenate them in the direction of the channel.
Upsampling here is achieved by interpolate function, which can be understood simply as a technology to increase the resolution of the output.
The last layer of the U-net is a 1× 1 convolutional layer, which is used to map the channel of the feature vector to the number of output classes.
During fine-tuning, in order to avoid overfitting, only the U-net weights are updated.
In this task, the pre-trained WRN are fine-tuned with a batch size of 32 and learning rate of 0.0006.
The loss function used is BCEWithLogitsLoss + SoftDiceLoss
Quantitative Results
<ref> provides the results of DINO, DINO-MC, and DINO-TC with ResNet-50 and WRN-50-2 respectively, compared against some supervised and self-supervised baselines on OSCD dataset.
The F1 score of DINO-MC with ResNet-50 is 5.52% higher than that of SeCo and almost 3% higher than that of DINO.
When using WRN-50-2 as the backbone, the F1 score of DINO-MC is 5.76% higher than that of SeCo and similar with DINO.
It is no surprise that DINO-TP does not perform as well as DINO and DINO-MC, because DINO-TP receives images of the same location taken at different times as positive instances, so it aims to learn features that do not change over time, which is not very suitable for change detection task <cit.>.
In the results of OSCD task, the backbones pre-trained in DINO-MC can capture the subtle differences of image changes over time after a simple fine-tuning on the change detection dataset, which indicates that DINO-MC is able to learn general and effective features using only very simple data augmentation methods.
Qualitative Results
<ref> gives the visualization masks of DINO-MC on OSCD task.
To do comparison to SeCo, we select two identical examples from the OSCD validation set.
The masks generated by DINO-MC outperform SeCo-1M since they cover more changed pixels without excessive false predictions.
We observe that the performance of DINO-TP on OSCD task is unstable since it achieves particularly high F1 score on the first instance, which is 4.35 higher than SeCo-1M, but much lower in the second one, which is 2.25 lower than SeCo-1M.
Although positive temporal contrast used in DINO-TP has been proved to be undesirable for change detection task <cit.>, the performance of DINO-TP is comparable to SeCo-1M when evaluated on the whole validation set.
§ CONCLUSIONS
In this work, we introduce DINO-TP and DINO-MC, which extend DINO in two ways: (1) DINO-TP employs a positive temporal contrast strategy and (2) DINO-MC utilizes a new cropping strategy and color transformations for local views.
Experimental results of KNN and linear probing evaluation on EuroSAT demonstrate the effectiveness of our cropping strategy, as well as the unstable performance of the positive temporal contrast on remote sensing imagery.
We evaluate and compare our models with some self-supervised and supervised baselines on three remote sensing tasks.
The results of three end-to-end tasks indicate the superiority and efficiency of DINO-MC over the existing state-of-the-art models.
Acknowledgement
This research was undertaken using the LIEF HPC-GPGPU Facility hosted at the University of Melbourne. This Facility was established with the assistance of LIEF Grant LE170100200.
ieee_fullname
|
http://arxiv.org/abs/2303.06998v1
|
20230313105402
|
On detecting the trivial rational $3$-tangle
|
[
"Bo-hyun Kwon"
] |
math.GT
|
[
"math.GT",
"57K10"
] |
=12pt
On detecting the trivial rational 3-tangle
Bo-hyun Kwon
Monday, March 13, 2023
==========================================
An important issue in classifying the rational 3-tangle is how to know whether or not the given tangle is the trivial rational 3-tangle called ∞-tangle. The author<cit.> provided a certain algorithm to detect the ∞-tangle. In this paper, we give a much simpler method to detect the ∞-tangle by using the bridge arc replacement. We hope that this method can help prove many application problems such as a classification of 3-bridge knots.
§ INTRODUCTION
A classification of rational 2-tangle is provided by Conway <cit.> in 1970. It is a perfect classification of them since he had shown that each rational 2-tangle is presented by the corresponding rational number. The author <cit.> gave an algorithm to classify the rational 3-tangles. Unfortunately, the algorithm is not enough to classify the rational 3-tangle completely since it is only used to distinguish given two rational 3-tangles not assigning them to a certain natural group. The main part of the algorithm is to show whether or not the modified rational 3-tangle from the given two rational 3-tangles is the trivial rational 3-tangle called the ∞-tangle. There is a basic way to detect ∞-tangle by the fundamental group argument, but the algorithm is much better than the traditional way. In this paper, we provide a new method to detect ∞-tangle.
§ THE TRIVIAL RATIONAL 3-TANGLE, Ε
Consider an ordered pair T=(B,ϵ=ϵ_1∪ϵ_2∪ϵ_3) as in Figure <ref>, where B is the unit 3-ball.
This trivial rational 3-tangle in B is called an ∞ tangle or ϵ.
Let E_1,E_2 and E_3 be the three pairwise disjoint, non-parallel compressing disks in B-ϵ as in Figure <ref>.
Then E_1,E_2 and E_3 separate B into four components. Let H_i be the component which contains ϵ_i and H=cl(B-(H_1∪ H_2∪ H_3)), where cl(*) means that the closure of *.
Let E_i' be the 2-punctured disk in Σ_0,6 so that ∂ E_i'=∂ E_i and E_i∪ E_i' bounds the ball H_i in B.
Let E=E_1∪ E_2∪ E_3, E'=E_1'∪ E_2'∪ E_3' and ∂ E=∂ E'=∂ E_1∪∂ E_2∪∂ E_3. Let Σ_0,6=∂ B-ϵ and P=cl(Σ_0,6-(E')) which is a pair of pants.
§ BRIDGE ARC REPLACEMENT
Let τ=τ_1∪τ_2∪τ_3 be a rational 3-tangle in B, where τ_i be a properly embedded arc in B. A disk D in B is called a bridge disk if D^∘∩τ=∅ and ∂ D=τ_i∪β and τ_i∩β=∂τ_i for some i∈{1,2,3}, where β is a simple arc in S^2 so that β^∘∩τ=∅. The simple arc β in Σ_0,6 is called a bridge arc if it cobounds a bridge disk with a component of τ. We note that there is a collection of disjoint three bridge arcs for a rational 3-tangle. However, we also note that the collection is not unique (up to isotopy) for the same rational 3-tangle. Actually, there are infinitely many different bridge arcs for the same string of the rational 3-tangle. We say that the simple closed curve γ is obtained from the bridge arc β if the boundary of a small regular neighborhood of β in Σ_0,6 is isotopic to γ.
Let β_1 and β_2 be two disjoint bridge arcs on Σ_0,6 of (B,τ), where τ is a rational 3-tangle in B. Let β_3 be an arc connecting the two remaining punctures on Σ_0,6 which is disjoint with β_1∪β_2. Then γ_3 is also a bridge arc on Σ_0,6 of (B,τ).
We first claim that there are two disjoint bridge disks so that each of them contains the bridge arcs β_1 and β_2 respectively. We take a bridge disk bounded by the union of β_1 and a string of τ. Then cut B along the bridge disk and open it along the two cut disks to have a rational 2-tangle. Since β_2 is disjoint with β_1, we can take a bridge disk bounded by β_2 and a string of the obtained rational 2-tangle. We glue the two cut disks back to have the original rational 3-tangle. This implies the existence of two disjoint bridge disks satisfying the condition. Moreover, from the rational 2-tangle, if we cut the tangle along the bridge disk bounded by β_2 and a string then we have a rational 1-tangle. It is clear that any arc connecting the two endpoint of the 1-tangle on Σ_0,2 without intersecting the opened two disks along the bridge disks cobounds a bridge disk in the 3-ball containing the rational 1-tangle. By gluing the two pairs of bridge disks back, we can guarantee the lemma above.
Let {β_1,β_2,β_3} be a collection of disjoint three bridge arcs on Σ_0,6 for T=(B,τ). Now, we consider the subarcs of β:=β_1∪β_2∪β_3 in P.
We assume that there is no bigon so that one of the sides is a subarc of β in P. If there is a such bigon then we can isotope the subarc to vanish the bigon. We say that β is
dense in P if none of two adjacent endpoints of the component of β in ∂ P belongs to the same β_i for i=1,2,3. We assume that there are at least two successive adjacent endpoints of the components of β in ∂ P contained in the same β_i to not satisfy the definition of dense as in Figure <ref>. We note that two of the successive endpoints connect the puncture directly without passing through the other successive endpoints. Let c_1 and c_2 be the two subarc of β_i explained above. We define the two directions (+) and (-) as in the first diagram of Figure <ref>.
If the two punctures appear when the two subarcs go to the opposite direction we take the new arc instead of β_i as in the second diagram of Figure <ref>. By Lemma <ref>, the new arc is also a bridge arc. Moreover, it also clear that the newly selected bridge arc is disjoint with β-β_i. Similarly, if the two punctures appear when they go to the same direction as in the third diagram, we take the new bridge arc which is disjoint with the remaining two bridge arcs as in the fourth diagram of Figure <ref>.
This procedure is called the bridge arc replacement, briefly 𝐁𝐑.
Let {β_1,β_2,β_3} be a collection of disjoint three bridge arcs on Σ_0,6 of T=(B,τ). Then there exist a collection of disjoint three bridge arcs {β_1',β_2',β_3'} on Σ_0,6 of T which is dense in P.
By repeating the procedure 𝐁𝐑, we would get the collection which is dense in P since 𝐁𝐑 reduces the number of endpoints if the collection is not dense and the number of endpoints are finite.
We claim that the procedure BR can detect the ∞-tangle. The following theorem would cover two of the three possible cases.
Let ℬ={β_1,β_2,β_3} be a collection of disjoint three bridge arcs on Σ_0,6 of T=(B,ϵ) which is dense in P. Then ℬ is unique up to isotopy. Especially, the three simple closed curves obtained from {β_1,β_2,β_3} respectively are ∂ E_1,∂ E_2,∂ E_3 up to isotopy.
We note that if a simple closed curve obtained from β_i is isotopic to ∂ E_j then β_i is the straight arc connecting the two punctures in E_j' up to isotopy.
We first assume that two of the simple closed curves obtained from {β_1,β_2,β_3} are isotopic to ∂ E_i and ∂ E_j for i≠ j. Then we have the first diagram in Figure <ref>. It is clear that the remaining bridge arc is also isotopic to the straight arc connecting the two punctures in E_k' if the collection is dense in P.
Secondly, we assume that one of them is isotopic to ∂ E_i for some i. Then we have the second diagram of Figure <ref>. We note that it is impossible to have a wave in terms of ∂ E if the collection is dense in P in this case. This implies that there is no wave. So, every simple closed curves obtained from {β_1,β_2,β_3} are isotopic to one of ∂ E_j for j=1,2,3.
For the last case, we assume that none of them is isotopic to ∂ E_i for some i. In order to prove the last case, we use the arguments when we made the algorithm to classify rational 3-tangles.
§.§ Dehn's parametrization of a simple closed curve in Σ_0,6
Let γ be a simple closed curve in Σ_0,6. Assume that γ meets ∂ E_i. Then we can isotope γ so that it meets with ∂ E_i in a special subarc ω_i of ∂ E_i only. We call ω_i the window in ∂ E_i.Then γ has parallel arcs which are the same type in P. Let l_ij be the arc type of them as in Figure <ref> which is called the standard arc type. (Refer to <cit.>.) Let x_ij be the number of parallel arcs of the type l_ij which is called the weight of l_ij for γ. There is a relation between x_ij and the geometric intersection number |γ∩ω_s| as follows.
[<cit.>]
Let I_s=|γ∩ω_s|, where s∈{1,2,3}. Then I_s determine x_ij.
Especially, if x_ii>0 for some i, then x_ij = I_j, x_ik = I_k
and x_ii = I_i-I_j-I_k 2. Also, if x_ii=0 for all i, then x_ij=I_i+I_j-I_k 2 for distinct i,j,k.
We note that γ can be determined by x_ij and the patterns in E_i'. So, we can parametrize γ in Σ_0,6 as follows.
[Special case of Dehn's Theorem <cit.>]
There is a parametrization of closed essential 1-manifolds in Σ_0,6 by ordered sequences of nine parameters (p_1,q_1,t_1,p_2 ,q_2,t_2,p_3,q_3,t_3).
(where p_i,q_i∈ℤ^+∪{0} and t_i∈ℤ for i=1,2,3.), where 2p_i=I_i and 2p_i=J_i.
In the diagrams in Figure <ref>, E_i” is the inner two punctured disk in E_i' to have only parallel arcs. Then q_i and t_i determine all the arc types and weights of them in E_i' by determining the connecting pattern between b_i and s_j.
We are dealing with the simple arc instead of the simple closed curve for proving the main theorem.
We note that the argument in this section is in terms of simple closed curves not a simple arc. The simple closed curves obtained from the simple arcs can be parameterized by the argument in this section. Moreover, a simple arc β_i is a bridge arc if and only if γ_i obtained from β_i bounds a compressing disk in B-ϵ. So, we can discuss the all argument in terms of simple arcs instead of simple closed curves if we consider the exceptional arc types having a puncture as one of the endpoints of them.
§ STANDARD DIAGRAM AND THE PROOF OF THE LAST CASE
Recall that {β_1,β_2,β_3} is a collection of disjoint bridge arcs on Σ_0,6 for T=(B,ϵ).
In order to analyse β_i, we set Σ_0,6 with the three disjoint non-parallel simple closed curves ∂ E_1, ∂ E_2 and ∂ E_3. Let P'=∂ B-(∪_i=1^2 E_i”).
Now, take equators e_i for each E_i” as in Figure <ref>. Then e_i divides E_i” into E_i”^+ and E_i”^- as in Figure <ref>. We note that ∂ E_i is isotopic to ∂ E_i” for i=1,2,3. Now, we introduce a lemma which helps us to realize β in a certain formed diagram called standard diagram.
[Lemma 6.1 in <cit.>]
Let N be a compressing disk in B-ϵ and h be the homeomorphism obtained from the clockwise half Dehn twist supported on N' which is the 2-punctured disk in Σ_0,6 so that ∂ N=∂ N' . Then a simple closed curve δ bounds a compressing disk in B-ϵ if and only if h(δ) bounds a compressing disk in B^3-ϵ.
We note that Lemma <ref> implies that a simple arc β_i is a bridge arc in B-ϵ if and only if h(β_i) is a bridge arc in B-ϵ.
Let γ_i be the simple closed curve obtained from β_i which can be parametrized by an ordered sequence of integers (p_1,q_1,t_1,p_2,q_2,t_2 ,p_3,q_3,t_3).
We now investigate the simple closed curve γ_i' (it may be in a different isotopy class in Σ_0,6) so that every component of γ_i'∩ P' is isotopic to one of the given real arc types in P' of one of the two diagrams as in Figure <ref> by taking a properly chosen t_i' instead of t_i by the following lemma.
[Lemma 8.2 in <cit.>]
Suppose that γ is parametrized by (p_1,q_1,t_1,p_2,q_2,t_2,p_3,q_3,t_3) and it has l_11 arc type in P.
Then there exist simple closed curves γ' which is parameterized by (p_1,q_1,t_1',p_2,q_2,t_2',p_3,q_3,t_3') for some t_i'∈ℤ
so that all components of γ'∩ P' are isotopic to one of the arcs in the diagram.
We say that a simple closed curve γ is in standard position if all componet of γ∩ P' are isotopic to one of the arcs in the diagram of Figure <ref>. The diagram in Figure <ref> is called standard diagram.
Let β_i' be the simple arc so that γ_i' is the simple closed curve obtained from β_i'. We note that the components of β_i'∩ P' are also carried by the arc types in the standard diagram. In order to see this, it is enough to investigate the component in P' which connects the puncture in E_i” directly as in Figure <ref>. We note that γ has the two components (a) and (b) and β has the component (b') which is parallel to the component (b).
The original lemma is for a simple closed curve not a multiple of simple closed curves. However, there is no difference between a simple closed curve and multiple simple closed curves when we apply the above lemma. It works for β'=β_1'∪β_2'∪β_3' as well. We note that the changes of the twisting number t_i would preserve the density since the half Dehn twist along E_i” just rotate the position of the all endpoints on ∂ E_i” by 180^∘.
We also note that the trivial rational 3-tangle ϵ in B is preserved when we apply the half Dehn twists supported on N' defined in Lemma <ref>. For additional modifications of β, we consider the following two lemmas and the theorem.
[Lemma 9.1 in <cit.>]
If A is a compressing disk in B^3-ϵ, then (δ_1δ_2^-1)^± 1(∂ A) also bounds a compressing disk in B^3-ϵ. (where δ_1 and δ_2 are the clockwise half Dehn twists supported on two punctured disks C_1 and C_2 respectively as in Figure <ref>.)
[Lemma 9.2 in <cit.>]
Suppose that A is a compressing disk in B^3-ϵ. Let δ_3 be the counter clockwise half Dehn twist supported on the 2-punctured disk E_4' as in Figure <ref>.
Then δ_3(∂ A) also bounds a compressing disk δ_3(A) in B^3-ϵ.
[Theorem 9.3 in <cit.>]
Suppose that A is a compressing disk in B^3-ϵ and ∂ A is in standard position in P'.
Then one of the half Dehn twists (δ_1δ_2^-1)^± 1 and δ_3^± 1 reduces the minimal intersection number of ∂ A with ∂ E.
The following lemma is the main idea to prove the last case of the main theorem.
Let {β_1,β_2,β_3} be the collection of disjoint simple arcs which are bridge arcs in B-ϵ. We assume that β=β_1∪β_2∪β_3 is in standard position and all of them have a wave in terms of ∂ E”. Then, there exist two adjacent endpoints of β∩ P' in ∂ E_i” for some i which belong to the same β_j for j=1,2,3.
By the assumption that all of β_i have a wave, without loss of generality, we assume that β has subarcs of type 1 or type 3 as in the first diagram of Figure <ref> and Figure <ref>. By applying the homeomorphism δ_3 in Lemma <ref> to β, we can remove the subarcs of type 2 as in the second diagram of Figure <ref> and Figure <ref> respectively. Let m_k be the weights of each type k. In the second diagram of Figure <ref>, we note that A=m_2, B=m_3-m_2 and C=m_10+m_11.
In the right diagram of Figure <ref>, we have A=m_2 and B=m_3-m_2. Also, in the bottom diagram of Figure <ref>, we have A=m_2-m_3, B=m_3 and C=m_2,D=m_1-m_2, E=m_7_2+m_3-m_2, where 7_2 is lower track of the type 7's in the standard diagram. For the detail of this weight changes in Figure <ref> and Figure <ref>, refer to Theorem 9.3 in <cit.>. We note that the homeomorphism in each step reduces the total weight of the subarcs in P' by Theorem <ref>.
We claim that the collection of the new bridge arcs is dense in P'. In order to show the claim for the case described in Figure <ref>, consider the diagrams in Figure <ref>. It is enough to investigate the pattern of endpoints in ∂ E_1” since the endpoints in ∂ E_2” and ∂ E_3” are fixed. Since β is dense in P', the depicted two adjacent arcs in the three positions (1),(2) and (3) should be a part of distinct bridge arcs. This implies that the right diagram does not violate the rule to satisfy the density as well. It is not difficult to see that the other adjacent endpoints in ∂ E_1” except the indicated adjacent endpoints by the parallel arcs also keep the rule for the density since the patterns are the same with the previous corresponding patterns.
Similarly, we note that the collections of the modified bridge arcs described in Figure <ref> are dense by Figure <ref>. Finally, we would get the four diagrams as in Figure <ref> which do not have the type 2. First, we assume that both of m_1 and m_3 are positive as in the diagram (A). Then, there is two adjacent endpoints in ∂ E_1” since the two punctures in E_1” should be the two endpoints of the same β_i for some i=1,2,3.
For the rest of the cases, we apply a multiple of the homeomorphism (δ_1^-1δ_2)^± 1 to have a simpler diagram as follows. For the diagram (B), we apply a multiple of the homeomorphism (δ_1^-1δ_2) to have the rightmost diagram in Figure <ref>. We note that the homeomorphism (δ_1^-1δ_2) preserves the density.
Now, consider the cases (C) and (D). Since the cases are symmetric, it is enough to figure out the case (D). We apply the homeomorphism (δ_1^-1δ_2) to the diagram (D) until we get the rightmost diagrams in Figure <ref>. We note that the homeomorphism (δ_1^-1δ_2) preserves the density as in Figure <ref>. If we have the diagram having the rightmost two diagrams, the diagram has the type 2. We repeat the procedure to remove the type 2. We note that the procedure preserves the density. Since the total weights of the subarcs in P' is finite and the procedures mentioned in this proof reduce the total weights, we eventually get a collection of bridge arcs so that at least one of them is isotopic to the straight arc connecting the two punctures in E_i” for some i∈{1,2,3}. So, it is enough to consider the diagrams right before the final diagram. Then we have the two diagrams (a) and (b) as in Figure <ref> if we ignore symmetric cases. We note that if we apply (δ_1^-1δ_2) to the diagram (a) then we have the bridge arc which connects the two punctures in E_3”. Also, we apply δ_3^-1 to the diagram (b) then we have the bridge arc which connects the two punctures in E_1”.
In (a), assume that β_1 is isotopic to the red arc connecting the two punctures in E_1”. Since β_2 and β_3 also have a wave, it is clear that there are two adjacent endpoints in ∂ E_2” which belong to the same β_j for some j=2,3. Similarly, in (b), there are two adjacent endpoints in ∂ E_2” which belong to the same β_j for some j=2,3. This implies that either δ_3^±1 or
(δ_1^-1δ_2)^± 1 cannot preserve the density. This violates the argument above.
Now, we can complete the proof of Theorem <ref>.
By Lemma <ref>, it is not possible to have a collection of disjoint three bridge arcs so that at least one of them has a wave. Therefore, if β is dense in P' then none of β_i has a wave. This implies that the collection of the bridge arcs should be isotopic to the collection of ∂ E_1,∂ E_2 and ∂ E_3.
§ ACKNOWLEDGEMENTS
This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the the Ministry of Education (NRF-2020R1I1A1A01052279 and NRF-2020R1A2C1A01009184)
1
0 J. Conway, An enumeration of knots and links, and some of their algebraic properties,
in Computational Problems in Abstract Algebra (Pergamon, Oxford, Press, 1970),
pp. 329–358.
1 B. Kwon, An algorithm to classify rational 3-tangles,
J. Knot Theory Ramifications 24 (2015), no. 1, 1550004 (62 pages).
4 R. C. Penner; J. L. Harer Combinatorics of Train Tracks, Annals of Mathematics Studies No. 125, Princeton University Press, Princeton, NJ, 1992. xii+216 pp.
|
http://arxiv.org/abs/2303.07356v1
|
20230313152315
|
Recovering Zipf's law in intercontinental scientific collaboration
|
[
"Malgorzata J. Krawczyk",
"Krzysztof Malarz"
] |
cs.DL
|
[
"cs.DL"
] |
,
al. Mickiewicza 30, 30-059 Kraków, Poland
Scientific collaboration on an international level has been well studied in the literature. However, much less is known about this collaboration on the intercontinental level. In this letter, we address this issue by creating a collection of approximately 30 millions publications around the papers by Alessandro Vespignani. The obtained rank-frequency distribution of the probability of sequences describing continents and number of countries—with which authors of papers are affiliated—follows the inverse power law with an exponent close to 1.5. Such a dependence is known in the literature as Zip's law and it has been originally observed in linguistics, later it turned out that it is very commonly observed in various fields.
Recovering Zipf's law in intercontinental scientific collaboration
Krzysztof Malarz
March 30, 2023
==================================================================
Introduction.
Studies of scientific collaboration between authors of scientific articles are mainly focusing on the international level <cit.>.
Much less is known about intercontinental scientific collaboration.
In the Web of Science database <cit.> we were able to identify only two articles <cit.> dealing with this topic.
In Ref. Kozma_2019 the analysis focuses on mapping, based on publication output, scientific collaboration of African researchers, and the role of the South African research community as a channel for within- and intercontinental collaborations.
say, that they `have selected ten scientific fields, namely, tropical medicine, parasitology, infectious disease, ecology, water resources, immunology, zoology, plant sciences, agricultural and food sciences, and psychology to gain a clear picture of the aforementioned scientific activity.'
The authors also state that they `created cooperation networks and visualised them on world-maps.
In addition, centrality measures of the network were calculated to see the frequency of involvement regarding different countries, with a focus on South Africa, in the collaboration process.
Furthermore, first and last authorship positions of the publications were summed to highlight the influence of the selected authors on the direction of and resources provided to the publications. Finally, the most prominent funding organisations and their focus on the selected fields were singled out. Through combining these steps of analysis, authors gained an accurate picture of the level of involvement of the South African research community in within- and intercontinental scientific collaboration.'
In Ref. Abramo_2020 the influence of geographic distance on knowledge flows, measured through citations to scientific publications was studied. showed `that the effect of geographic distance on knowledge flows is significant at the national level, not negligible at the continental level, but completely irrelevant at the intercontinental level'.
To fill the gap mentioned above in continent-based studies of scientific collaboration, in this letter, we construct a set of nearly 30 million publications and analyze it in terms of intercontinental scientific collaboration.
Based on mapping authors' to continents (via the countries where they institutions are located), we generate sequences of continents with the number of countries on these continents.
As we show below, the obtained rank-frequency distribution of sequences reveals Zipf's law <cit.> with an exponent close to 1.5.
Methodology.
To collect data on the affiliation of authors of scientific publications, we used the Scopus API <cit.>. As we are interested in analysis of scientific collaboration, we decided to build a graph around scientist who is active in more than one discipline. Our choice fell on Alessandro Vespignani <cit.> who is one of the most famous scientists in the field of complex networks and whose scientific interests cover the analysis of social <cit.> and biological networks <cit.>, or the spread of epidemics <cit.>.
Subsequently, we found all authors who published with Vespignani, then found their co-authors, and so on. However, during data aggregation, we decided to stop this recursive finding for authors whose total number of publications is less than fifty, for authors whose last publication was published before 2015 and for authors whose distance, measured as the number of edges on a shortest path connecting a given author with the starting node (Alessandro Vespignani), in the graph of authors is greater than six.
From this set, we also excluded articles if the number of affiliations of a given author at a particular publication is greater than five or if the data associated with a given publication do not allow automated country identification.
This methodology allowed us to collect data on 29 918 476 publications.
Affiliations contained in publications are processed as follows:
* for each author all his/her n_i affiliations mentioned in a given paper are identified together with a country where this affiliation is settled;
* duplicates of countries in the list created for an individual author are removed, i.e., each country may appear in this list exactly once, which results in a number n_c^a of countries per author;
* the lists of countries for all authors are merged into a single list—without repetitions—resulting in n_c countries;
* n_c countries that appear in a given publication are then mapped to continents on which these countries are located;
* for the purposes of further analysis, a number is added to each continent in the collection, specifying the number of different countries located on this continent represented by the authors of a given publication.
For a better understanding of this process, let us analyze an example publication <cit.>. In <Ref> all their authors (in alphabetical order) are presented, with indication of the countries of particular affiliation, number of affiliations n_i and number of countries n_c^a. Nine out of twelve authors of this work are affiliated with only one institution in one country. Two of the twelve authors (3rd and 11th) are affiliated with two institutions in two countries. The remaining one (4th) is affiliated with three institutions located in two countries. All these countries are in the oval (marked as `Authors') at the top of <Ref>. In the next step, we map countries to continents (removing country repetitions) and sum up the number of countries on each continent.
Results. In <Ref> the top-20 of the most frequent sequences in the form `continent (number of countries)' together with its percentage in all analyzed publications are presented.
The complete list (containing more than eight thousand types of case) is available in Ref. data-intercont-rank.
The visualization of the latter as the rank-frequency distribution is presented in <Ref>.
The obtained diagram reveals the power-law dependence
𝒫(ℛ)∝ℛ^-α,
where 𝒫 is the frequency of the sequence, ℛ is the rank of this sequence and the exponent α≈ 1.5460 with its uncertainty u(α)=0.0017.
Such an inverse relation in the rank-frequency distribution is known as Zipf's law <cit.>.
Discussion. The most frequently observed sequences obtained from mapping authors' countries to continents do not show their intercontinental nature.
The three most popular sequences (in the papers analyzed) correspond to single-country papers by authors affiliated in countries from Europe (𝒫≈ 23.5%), North America (𝒫≈ 23.14%) and Asia (𝒫≈ 15.01%). These three cases slightly deviate from the fitting to Zipf's law (<ref>) as presented in <Ref>.
The fourth place is taken by papers committed by authors affiliated with institutes in two European countries (𝒫≈ 4.85%).
The first intercontinental collaboration is ranked as the fifth, and it corresponds to papers co-authors by authors from a single European country plus authors from a single country in North America. The abundance of such a sequence is 𝒫≈ 4.65%.
Also, the next two most frequent cases [Asia (1), North America (1) with 𝒫≈ 3.45% and Asia (1), Europe (1) with 𝒫≈ 1.73%] correspond to a bilateral intercontinental collaboration established by authors from a pair of countries.
The eighth place is again taken by monocontinental collaboration between authors affiliated in countries from Australia & Oceania.
The ninth place corresponds to the situation where authors are affiliated in two European countries and authors from one country (either USA or Canada) from North America.
Finally, the top-10 list is closed by papers committed by authors affiliated with three European countries (again without revealing the intercontinental character of the scientific collaboration).
The complete ranking containing more than eight thousand sequences is available as a comma-separated-value file in Ref. data-intercont-rank.
Conclusions. In this letter, the intercontinental collaboration among the authors of nearly 30 millions articles collected from Scopus <cit.> is studied. The obtained rank-frequency-based histogram reveals power-low dependence (<ref>), which is known as Zipf's law, and occurs in many types of studied data—ranging from quantitative linguistics (where it was originally formulated <cit.>), via social sciences <cit.>, music <cit.>, seismic activity <cit.> to physics <cit.> and others <cit.>.
The further studies may include detailed look into frequencies of sequences for fixed number continents (for example, for single, double, triples, etc, involved continents) or for more sophisticated methods of sequence analysis (by applying, for example, a scalar variable—as the inverse participation ratio—to distinguish among sequences). Also, a more thorough analysis of cooperation (based on international collaboration level) may exhibit some free-scaling behavior in rank-frequency distribution of analogous sequences but for countries. Detailed results of the studies mentioned above will be given in Ref. <cit.>.
|
http://arxiv.org/abs/2303.07245v1
|
20230313161612
|
Concentration without Independence via Information Measures
|
[
"Amedeo Roberto Esposito",
"Marco Mondelli"
] |
cs.IT
|
[
"cs.IT",
"math.IT",
"math.PR"
] |
Modelling self-consistently beyond General Relativity
Luis Lehner
March 30, 2023
=====================================================
We propose a novel approach to concentration for non-independent random variables.
The main idea is to “pretend” that the random variables are independent and pay a multiplicative price measuring how far they are from actually being independent. This price is encapsulated in the Hellinger integral between the joint and the product of the marginals, which is then upper bounded leveraging tensorisation properties. Our bounds represent a natural generalisation of concentration inequalities in the presence of dependence: we recover exactly the classical bounds (McDiarmid's inequality) when the random variables are independent. Furthermore, in a “large deviations” regime, we obtain the same decay in the probability as for the independent case, even when the random variables display non-trivial dependencies.
To show this, we consider a number of applications of interest. First, we provide a bound for Markov chains with finite state space. Then, we consider the Simple Symmetric Random Walk, which is a non-contracting Markov chain, and a non-Markovian setting in which the stochastic process depends on its entire past. To conclude, we propose an application to Markov Chain Monte Carlo methods, where our approach leads to an improved lower bound on the minimum burn-in period required to reach a certain accuracy. In all of these settings, we provide a regime of parameters in which our bound fares better than what the state of the art can provide.
§ INTRODUCTION
It is well-known that, given a sequence X^n=(X_1,…, X_n) of independent, but not necessarily identically distributed, random variables with joint measure _X^n, one can prove that for every function f satisfying proper Lipschitz assumptions:
_X^n(|f-_X^n(f)|≥ t) ≤ 2exp(-t^2/k ‖ f‖_Lip^2).
Here, ‖ f‖_Lip^2 depends on the metric structure of the measure space, and k is a constant depending on the approach used to prove the inequality, e.g., transportation-cost inequalities, log-Sobolev inequalities, martingale method, see the survey <cit.>.
One notable example is McDiarmid's inequality for functions with “bounded jumps”: i.e., if for every x^n,x̂ and every 1≤ i ≤ n one has that
|f(x_1,…,x_i,…,x_n)-f(x_1,…,x̂,…,x_n)|≤
c_i ,
then the following holds <cit.>:
_X^n(|f-_X^n(f)|≥ t) ≤ 2exp(-2t^2/∑_i=1^n c^2_i).
This represents the “golden standard” of concentration. Interestingly, as underlined above, McDiarmid's inequality does not require the X_i's to be identically distributed; it does, however, require the random variables to be independent.
Most of the methods in the literature that tried to relax the latter assumption
required the development of novel techniques. However, existing results generally do not recover the rate of decay provided in the independent setting.
In this paper, we present a novel approach that
outperforms the state of the art in various settings and regimes. Specifically, we show improved bounds for
finite-state space Markov chains (<Ref>), the Simple Symmetric Random Walk (SSRW, <Ref>), a non-Markovian process (<Ref>), and Monte Carlo Markov Chain (MCMC, <Ref>).
In the case of the SSRW, our improvements are the most dramatic: in sharp contrast with existing techniques, we are able to capture the correct scaling between the distance from the average t, the number of variables n, and the decay probability in the concentration bound.
We remark that our new method – based on a change of measure argument – is rather flexible and can be employed in most settings. In fact, it only requires the absolute continuity between the joint and the product of the marginals, while existing approaches generally have more restrictive assumptions (e.g., Markovity with stationary distribution <cit.> or contractivity <cit.>). The key idea is to shift the focus
from proving concentration to bounding an information measure (i.e., the Hellinger integral, see <Ref>) between the joint distribution and the product of the marginals. Crucially, the Hellinger integral satisfies tensorisation properties that allow us to easily upper bound it, even in high-dimensional settings (see <Ref>).
We highlight that our approach provides a natural generalisation of the existing concentration of measure results to dependent random variables, in the sense that we recover exactly McDiarmid's inequality when the random variables are independent. Furthermore, for sufficiently large t, namely, in a “large deviations” regime, we approach the decay rate (<ref>) for the independent case, even when the random variables are actually dependent.
The rest of the paper is organized as follows. In <Ref>, we discuss related work in the area.
in <Ref> we cover the preliminaries, namely, information measures (<Ref>), Markov kernels (<Ref>), and strong data-processing inequalities (SDPIs, <Ref>). We then provide the main result of this work in <Ref>, which is then applied in <Ref> to four different settings: finite-state space Markov chains (<Ref>), the SSRW (<Ref>) a non-Markovian stochastic process (<Ref>), and MCMC methods (<Ref>). Concluding remarks are provided in <Ref>. Part of the proofs and additional discussions are deferred to the appendices.
§.§ Related Work
The problem of concentration for dependent random variables has been addressed in multiple ways. The first results in the area are due to Marton <cit.> who heavily relied on transportation-cost inequalities (Pinsker-like inequalities) and an elegant mixture of information-theoretic and geometric approaches. Another important contribution, building upon Marton's work, was given by Samson in <cit.> where some of Marton's results were extended to include Φ-mixing processes. More recent advances, complementing and generalising the work by Samson and Marton, were provided in <cit.>, where the Martingale method was employed to prove concentration for dependent (but defined on a countable space) processes and in <cit.>, where Marton's couplings were exploited. In particular, the results derived in <cit.> are equivalent to the ones advanced in <cit.> but obtained through couplings rather than linear programming. All of these approaches measure the degree of dependence by looking at distances between conditional distributions (organised in matrices whose norms are then computed, see <Ref>) or by constructing “minimal couplings” between conditional distributions (see <Ref>). The resulting quantities, which are necessary in order to
analyse the corresponding probabilities, can be difficult to compute, especially in non-Markovian settings.
Another approach similar in spirit to ours is given in <cit.>, where a generalisation of Hoeffding's inequality for stationary Markov chains is provided. Other related work can be found in <cit.>. These results aim to establish Hoeffding-like inequalities for Markov chains by relating it to a different Markov chain whose cumulant generating function can be bounded under different assumptions:
<cit.> are restricted to discrete and ergodic Markov chains, while <cit.> extends to general state-space but requires geometric ergodicity. All these generalisations of Hoeffding's inequality do not, however, allow for arbitrary functions of a sequence of random variables, but they are restricted to (sums of) bounded functions applied to each individual sample and they all require the existence of a stationary distribution. Given that the approach presented in <cit.> is more general than the one proposed in <cit.>, our results will be compared directly with <cit.>.
Another (less related) approach can be found in <cit.>, where the strength of the dependence is measured in a different way with respect to both this work and the related work mentioned above. Moreover, the approach in <cit.> is mostly restricted to empirical averages of bounded random variables and includes an additional additive factor that grows with the number of samples. Finally, we remark that
<cit.> exploits a technique similar to what is pursued in this work, in order to extend McDiarmid's inequality to the case where the function f depends on the random variables themselves (while the random variables remain, in fact, independent). Said result was then applied to a learning setting.
§ PRELIMINARIES
In this section, we will define the main objects utilised throughout the document and define the relevant notation.
We will
adopt a measure-theoretic framework.
Given a measurable space (,ℱ) and two measures μ,ν which render it a measure space, if ν is absolutely continuous with respect to μ (denoted with ν≪μ), then we will represent with dν/dμ the Radon-Nikodym derivative of ν with respect to μ. Given a (measurable) function f:→ℝ and a measure μ, we denote with μ(f) = ∫ f dμ the
Lebesgue integral of f with respect to the measure μ.
The Radon-Nikodym derivatives represent the main building-block of the following fundamental objects.
§.§ Hellinger integral, α-norm and Rényi's α-divergence
An important ingredient of this work are information measures. In particular, we will focus on Hellinger integrals which can be seen as a transformation of the L^α-norms and of
Rényi's α-divergences.
§.§.§ Rényi's α-divergences
Introduced by Rényi as a generalization of the KL-divergence, the α-divergence has found many applications in
statistical inference <cit.>, and it has
several
operational interpretations (e.g., hypothesis testing, and the cut-off rate in block coding <cit.>).
It can be defined as follows <cit.>.
Let (Ω,,),(Ω,,) be two probability spaces. Let α>0 be a positive real number different from 1. Consider a measure μ such that ≪μ and ≪μ (such a measure always exists, e.g., μ=(+)/2)) and denote with p,q the densities of , with respect to μ. Then, the α-divergence of from is defined as
D_α():=1/α-1log∫ p^α q^1-α dμ.
Definition <ref> is independent of the chosen measure μ.
In fact,
∫ p^αq^1-α dμ = ∫(q/p)^1-αd and, whenever ≪ or 0<α<1, we have ∫ p^αq^1-α dμ= ∫(p/q)^αd, see <cit.>. Furthermore, it can be shown that, if α>1 and ≪̸, then D_α()=∞. The behavior of the measure for α∈{0,1,∞} can be defined by continuity. In general, one has that D_1() = D() which denotes the KL-divergence between and ; furthermore, if D()=∞ or there exists β>1 such that D_β()<∞, then lim_α↓1D_α(Q)=D() <cit.>. For an extensive treatment of α-divergences and their properties, we refer the reader to <cit.>.
§.§.§ φ-divergences
Another generalization of the KL-divergence is obtained by considering a generic convex function φ:ℝ^+→ℝ
with the
constraint
φ(1)=0. The constraint can be ignored as long as φ(1)<+∞ by simply considering a new mapping φ̃(x) = φ(x) - φ(1).
Let (Ω,,),(Ω,,) be two probability spaces. Let φ:ℝ^+→ℝ be a convex function such that φ(1)=0. Consider a measure μ such that ≪μ and ≪μ. Denoting with p,q the densities of the measures with respect to μ, the φ-divergence of from is defined as
D_φ():=∫ q φ(p/q) dμ.
Despite the fact that the definition uses μ and the densities with respect to this measure,
φ-divergences are
independent from the dominating measure. In fact,
when absolute continuity between , holds, i.e., ≪,[We will make this assumption throughout the paper.]
we obtain
<cit.>
D_φ()= ∫φ(d/d)d.
The KL-divergence is retrieved by setting φ(t)=tlog(t). Other common examples are the Total Variation distance (φ(t)=1/2|t-1|), the Hellinger distance (φ(t)=(√(t)-1)^2), and Pearson χ^2-divergence (φ(t)=t^2-1). We remark that
φ-divergences do not include the family of Rényi's α-divergences.
Particularly relevant to us will be the family of parametrized divergences that stems from φ_α(x)=x^α for α>1. The function φ_α(x) is convex on the positive axis for every α>1. However, it does not satisfy the property that φ(1)=0. Said requirement
can
be lifted with the consequence of losing the property that _φ(νμ)=0 if and only if ν = μ. We will call the family of divergences stemming from such functions the Hellinger integrals of order α.
Let (Ω,,ν),(Ω,,μ) be two probability spaces, and let
φ_α:ℝ^+→ℝ be defined as
φ_α(x)=x^α. Let μ and ν be two probability measures such that ν≪μ, then the Hellinger integral of order α is given by
H_α(νμ):= D_φ_α(νμ) = ∫(dν/dμ)^α dμ.
Let us highlight that
we are not considering Hellinger divergences of order α (including the so-called χ^2-divergence) which consists of divergences stemming from
x^α-1/(α-1), but rather a transformation of said family. In fact, the Hellinger divergences are
equal to 0 if and only if the measures coincide. In contrast, the Hellinger integral is equal to 1 if the two (probability) measures coincide.
Another notable object for this work will be the 1/α power of the Hellinger integral, i.e.,
H_α^1/α(νμ)= ‖dν/dμ‖_L^α(μ),
which
represents the L^α-norm of the Radon-Nikodym derivative with the respect to the measure μ.
Moreover, the following holds
<cit.>:
H_α^1/α(νμ) = exp(α-1/αD_α(νμ)).
§.§ Markov kernels
Most of the comparisons with the state of the art will be drawn in
Markovian settings. In this section, we will define the main objects necessary in order to carry out said confrontation.
Let (Ω,ℱ) be a measurable space. A Markov kernel K is a mapping K:ℱ×Ω→ [0,1] such that:
* for every x∈Ω, the mapping E∈ℱ→ K(E|x) is a probability measure on (Ω,ℱ);
* for every E∈ℱ the mapping x ∈Ω→ K(E|x) is an ℱ-measurable real-valued function.
A Markov kernel can be seen as acting on measures “from the right”, i.e., given a measure μ on (Ω, ℱ),
μ K(E) = μ(K(E|·)) = ∫ dμ(x) K(E|x),
and on functions “from the left”, i.e., given a function f:Ω→ℝ,
K f(x) = ∫ dK(y|x) f(y).
Given a sequence of random variables (X_n)_n∈ℕ, one says that it represents a Markov chain if, given i≥ 1, there exists a Markov kernel K_i such that for every measurable event E:
ℙ(X_i ∈ E | X_1,…,X_i-1) = ℙ(X_i ∈ E | X_i-1) = K_i(E|X_i-1) almost surely.
If for every i≥ 1, K_i = K for some Markov kernel K, then the Markov chain is said to be time-homogeneous. Whenever the index is suppressed from K, we will be referring to a time-homogeneous Markov chain. The kernel K of a Markov chain describes the probability of getting from x to E in one step, i.e., for every i≥ 1,
K(E|x) = ℙ(X_i ∈ E| X_i-1=x). One can then define (inductively) the κ-step
kernel K^κ as follows:
K^κ(E|x) = ∫ K^κ-1(E|y)dK(y|x).
Note that K^κ is also a Markov kernel, and it represents the probability of getting from x to E in κ steps: K^κ(E|x)= ℙ(X_κ+1∈ E|X_1=x).
If (X_n)_n∈ℕ is the Markov chain associated to the kernel K and X_0 ∼μ, then μ K^m denotes the measure of X_m+1 at every m∈ℕ. Furthermore, a probability measure π is a stationary measure for K if π K(E) = π(E) for every measurable event E. We also note that, if the state space is discrete, then K can be represented using a stochastic matrix.
Given this dual perspective on Markov operators (acting on measures or functions), one can then study their contractive properties. In particular, let us define
‖ K‖_α→α := sup_f≠ 0‖ K f‖_α/‖ f ‖_α.
Then, Markov kernels are generally contractive <cit.>, meaning that ‖ K‖_α→α≤ 1 and, consequently, ‖ Kf ‖_α≤‖ f ‖_α for every f.
Similarly, given γ≤α, one can define the following quantity
‖ K‖_α→γ := sup_f≠ 0‖ K f‖_α/‖ f ‖_γ.
It has been proven that many Markovian operators are hyper-contractive <cit.>, meaning that ‖ K‖_α→γ≤ 1
for some γ < α. Given a kernel K and α>1, we denote by γ^⋆_K(α) the smallest γ such that K is hyper-contractive, i.e., such that ‖ K‖_α→γ≤ 1. Said coefficient has been characterised for some Markov operators <cit.>. In case the Markov kernel is not time-homogeneous, in order to simplify the notation, instead of denoting the corresponding coefficient with γ^⋆_K_i(α), we will simply denote it with γ^⋆_i(α).
Given a Markov kernel K and a measure μ, one can also define the adjoint/dual operator (or backward channel) K^← as the operator such that
⟨ g, Kf⟩ = ⟨ K^← g, f⟩ for all g and f <cit.>. While one can define dual Markovian operators more generally, here we will focus on discrete settings where they can be explicitly specified via K and μ <cit.>:
K_μ^←(y|x) = K(y|x)μ(x)/μ K (y).
§.§ Strong Data-Processing Inequalities
An important property shared by divergences is the Data-Processing Inequality (DPI): given two measures μ,ν and a Markov kernel K, one has that, for every convex φ,
D_φ(ν Kμ K) ≤ D_φ(νμ).
This property holds as well for Rényi's α-divergences, despite them not being a φ-divergence <cit.>.
DPIs represent a widely used tool and a line of work has focused on tightening them. In particular, in many settings of interest, given a reference measure μ, one can show that D_φ(ν Kμ K) is strictly smaller than D_φ(νμ) unless ν=μ. Furthermore, the characterization of the ratio D_φ(ν Kμ K)/D_φ(νμ) has lead to the study of “strong Data-Processing Inequalities” <cit.>.
Given a probability measure μ, a Markov kernel K and a convex function φ, we say that K satisfies a φ-type Strong Data-Processing Inequality (SDPI) at μ with constant c∈[0,1) if
D_φ(ν Kμ K) ≤ c· D_φ(νμ),
for all ν≪μ. The tightest such constant c is denoted by
η_φ(μ,K) = sup_ν≠μD_φ(ν Kμ K) /D_φ(νμ),
η_φ(K) = sup_μη_φ(μ,K).
[SDPI for the KL and the BSC]
Let μ=Ber(1/2), ϵ<1/2 and K=BSC(ϵ), i.e., K(y|x) =ϵ if x=y and K(y|x) =1-ϵ otherwise. Then, one has that η_xlog x(μ,K)=(1-2ϵ)^2 <cit.>, which implies that η_xlog x(μ,K) < 1 for all ϵ>0.
While η_φ can be a difficult object to compute even for simple channels, some universal upper and lower bounds are known <cit.>:
η_φ(K) ≤sup_x,x̂‖ K(·|x)-K(·|x̂)‖_TV = η_|x-1|(K)=η_TV(K),
η_φ(μ,K) ≥η_(x-1)^2(μ,K) = η_χ^2(μ,K).
We remark that these bounds hold for functions φ such that φ(1)=0 or, equivalently, when the divergence D_φ(νμ) is defined to be μ(φ(dν/dμ))-φ(1). For general convex functions φ, as well as for Rényi's divergences, the DPI holds and SDPI constants are still defined analogously, however one cannot use common techniques to bound said quantities. The following counter-example highlights the issue.
[Counter-example for Hellinger integrals and Rényi's divergences]
Let ν=(1/3,2/3) and K_1=BSC(1/3). Then, the stationary distribution π is given by (1/2,1/2) and ν K_1= (5/9,4/9). A direct calculation gives that H_2(ν K_1π K_1) = 82/81 and H_2(νπ) = 10/9. Moreover, if K=BSC(λ), one has that η_TV(K)=|1-2λ| (see <cit.> and <Ref>). Thus,
H_2(ν K_1π K_1)/H_2(νπ) = 41/45 > η_TV(K_1) = 1/3,
which means that the inequality (<ref>) is violated. This is due to the fact that φ_2(x)=x^2 is not equal to 0 at x=1. In fact,
renormalising H_2 leads to the χ^2-divergence, which satisfies
H_2(ν K_1π K_1)-1/H_2(νπ)-1=χ^2(ν K_1π K_1)/χ^2(νπ )=1/9 < η_TV(K_1) = 1/3.
Similarly, let K_2=BSC(1/5), which gives that η_TV(K_2)=3/5. Consider now D_α(K_2(·|0)π)=D_α(δ_0 K_2 π K) = 1/α-1log ( 2^1-α( 0.2^α +(0.8)^α)). Moreover, D_α(δ_0π) = log(2). Thus, by setting α=6, one has that
η_D_α(K_2) > D_α(δ_0 K_2 π K_2)/D_α(δ_0π) = 0.6138 > η_TV(K_2) = 0.6,
which violates again the inequality (<ref>).
§ MAIN RESULT
Let _X^n be the joint distribution of (X_1,…, X_n), _X_i the marginal corresponding to X_i, and _⊗_i=1^n X_i the joint measure induced by the product of the marginals.
Suppose that (X_1,…, X_n) are Markovian under _X^n, i.e., _X_i|X^i-1 = _X_i|X_i-1 almost surely. If _X^n≪_⊗_i=1^n X_i, for any function f satisfying <Ref>, any t>0 and
α>1,
one has
_X^n(| f-_⊗_i=1^n X_i(f)|≥ t ) ≤ 2^1/βexp(-2t^2/β∑_i=1^n c_i^2)H_α^1/α(_X^n_⊗_i=1^n X_i)
≤ 2^1/βexp(-2t^2/β∑_i=1^n c_i^2)(∏_i=2^nH^α_i)^1/α,
with β=α/(α-1), H_i^α = _X_i-1^1/β_i-1(H_αα_i^β_i-1/α_i(_X_i|X_i-1_X_i)), α_i>1 for i≥ 0, β_0=1, α_n=1 , and β_i = α_i/(α_i-1).
The proof of <Ref> is in <Ref>.
If the function f satisfies <Ref> with c_i=1/n, like in the case of the empirical mean, one obtains
_X^n(| f-_⊗_i=1^n X_i(f)|≥ t ) ≤ 2^1/βexp(-n(2t^2/β-1/nαlog H_α(_X^n_⊗_i=1^n X_i))).
This means that if
t > √(1/2n(α-1)log H_α(_X^n_⊗_i=1^n X_i)),
then <Ref> guarantees an exponential decay. If the sign of the inequality (<ref>) is reversed, then the bound actually becomes trivial, for n large enough. The threshold behavior just described characterises the main difference of this bound with respect to existing approaches: while there are no restrictive assumptions required (other than absolute continuity of the measures at play), the bound can be trivial if the joint distribution is “too far” from the product of the marginals. In contrast, other approaches, like the one described in <cit.>, do not generally exhibit such a “phase transition-like” behavior. Next, we will characterize the behaviour of the key quantity H_α(_X^n_⊗_i=1^n X_i) as a function of n
in the concrete examples of <Ref>. Before doing that, a
few additional remarks are in order.
The expression on the RHS of <Ref> can be complicated to compute, especially due to the presence of {α_i}_i=2^∞.
Making a specific choice, which meaningfully reduces the number of parameters (i.e., taking α_i→ 1 for every i≥ 2), <Ref> boils down to the following, simpler, expression:
_X^n(| f-_⊗_i=1^n X_i(f)|≥ t ) ≤ 2^1/βexp(-2t^2/β∑_i=1^n c_i^2)·∏_i=2^n max_x_i-1 H_α^1/α(_X_i|X_i-1=x_i-1_X_i).
Moreover, <Ref> can be re-written as follows:
_X^n(| f-_⊗_i=1^n X_i(f)|≥ t ) ≤ 2^1/βexp(1/β(-2t^2/∑_i=1^n c_i^2+∑_i=2^n max_x_i-1 D_α(_X_i|X_i-1=x_i-1_X_i))).
<Ref> allows to exploit the SDPI coefficient for D_α (see <Ref>), which in some settings improves upon leveraging <Ref> along with hypercontractivity, see <Ref>.
<Ref> can be proved in more generality. Indeed, for any measurable event E, one can say that, for every α>1,
_X^n(E) ≤^1/β_⊗_i=1^n X_i(E)· H_α(_X^n_⊗_i=1^n X_i).
Thus, our framework is not restricted to a McDiarmid-like setting, but it can be used to generalise any concentration of measure approach to dependent random variables. The idea is that concentration holds when random variables are independent, namely, _⊗_i=1^n X_i(E) decays exponentially in n under suitable assumptions. Then, <Ref> shows that a similar
exponential decay
holds also in the presence of dependence, as long as the measure of the joint is not “too far” from the product of the marginals. The “distance” between joint and product of the marginals is captured by the Hellinger integral H_α. In particular, if the joint measure corresponds to the product of the marginals, then H_α^1/α(_X^n_⊗_i=1^nX_i)=1 for every α. Thus, taking the limit of α→∞, one recovers
_⊗ X_i(E)= _X^n(E ) ≤_⊗ X_i(E).
On the RHS of both <Ref>, the probability term is raised to the power α-1/α and multiplied by the α-norm of the Radon-Nikodym derivative. On the one hand, as α grows, the α-norm grows as well, which increases the Hellinger integral; on the other hand, as α grows, α-1/α tends to 1, which reduces the probability. This introduces a trade-off between the two quantities that renders the optimisation over α non-trivial. We highlight that considering the limit of α→∞ provides the fastest exponential decay and it recovers the probability for independent random variables. This has the cost of rendering the multiplicative constant larger, and we will discuss in detail the choice of α in the various examples of <Ref>.
Note that the first inequality in <Ref> holds without the Markovity assumption. The second inequality, instead, leverages tensorisation properties of H_α which are particularly suited for Markovian settings. In the general case,
one can still
reduce
H_α(_X^n_⊗_i=1^n X_i) (a divergence between n-dimensional measures) to n one-dimensional objects, see <Ref> for details about the tensorisation of both the Hellinger integral H_α and Rényi's α-divergence D_α.
In particular, following the approach undertaken to derive <Ref>, one obtains
_X^n(| f-_⊗_i=1^n X_i(f)|≥ t ) ≤ 2^1/βexp(-2t^2/β∑_i=1^n c_i^2) ·∏_i=2^n max_x^i-1 H_α^1/α(_X_i|X^i-1=x^i-1_X_i).
Note that <Ref>
gives a natural generalisation of concentration inequalities to the case of arbitrarily dependent random variables (just like <Ref> generalises them to Markovian settings). Indeed, if _X^n=_⊗_i X_i, then taking the limit of β→ 1 in both <Ref> and <Ref>, one recovers the classical concentration bound for independent random variables (see the discussion in <Ref> recalling that β=α/(α-1)).
We will now compare our bounds with a number of related works: 1) the approach proposed in <cit.> and based on the martingale method; 2) the approach proposed in <cit.> which leverages properties of contracting Markov chains; and finally 3) the approach advanced in <cit.> showing concentration around the median via transportation-cost and isoperimetric inequalities.
§ APPLICATIONS
Let us now apply <Ref> to four settings:
* In <Ref>, we consider a discrete Markovian setting. Here, we specialise <Ref> leveraging the properties of the Markov kernel along with the discrete structure of the problem,
thus showing that
in certain parameter regimes our bound fares better than what the state of the art can provide;
* In <Ref>, we consider a non-contracting Markovian setting that does not admit a stationary distribution. Both these properties do not allow the application of most of the existing work in the literature. In contrast, not only our approach can be applied, but it provides exponentially decaying probability bounds, while <cit.> can only provide an upper bound that does not vanish as n grows;
* In <Ref>, we consider a non-Markovian setting where the entire past of the process influences each step. Here, to the best of our knowledge, we provide the first bound that exponentially decays in n and has a closed-form expression, while existing approaches either cannot be employed or require the computation of complicated quantities (e.g., <Ref>);
* Finally, in <Ref>, we apply <Ref> to provide error bounds on Markov Chain Monte Carlo methods. Similarly to the other settings, we propose a regime of parameters in which our results fare better and, consequently, provide an improved lower bound on the minimum burn-in period necessary to achieve a certain accuracy in MCMC.
We will hereafter assume, for simplicity of exposition, that c_i=1/n in <Ref> like in the case of the empirical mean. All the results hold for general c_i's, but the expressions and comparisons would become more cumbersome.
§.§ Discrete Markov chains
Consider a discrete setting and a Markov chain (X_n)_n∈ℕ determined by a sequence of transition matrices (K_n)_n∈ℕ. Assume that X_1∼ P_1 and let X_i denote the random variable whose distribution is given by P_1 K_1… K_i-1.[One can also see X_i as the outcome of X_i-1 after being passed through the channel K_i-1.]
For i≥ 1, suppose K_i is a discrete-valued Markov kernel, and let γ^⋆_i(α) be the smallest parameter making it hyper-contractive, see <Ref>.
Then, for every function f satisfying <Ref> with c_i=1/n and every α>1,
_X^n(| f-_⊗_i=1^n X_i(f)|≥ t) ≤ 2^1/βexp(-2nt^2/β+∑_i=1^n-1( log‖ K_i^←‖_α→γ^⋆_i(α) - 1/γ̅_i^⋆(α)min_j∈supp(_i)log P_i(j))).
Moreover, if the Markov kernel is time-homogeneous, i.e., K_i=K for every i≥ 1, then
_X^n (| f-_⊗_i=1^n X_i(f)|≥ t)
≤ 2^1/βexp(-2nt^2/β+(n-1) log‖ K^←‖_α→γ^⋆_K(α) - 1/γ̅^⋆_K(α)∑_i=1^n-1(min_j∈supp(_i)log P_i(j)))
≤ 2^1/βexp(-2nt^2/β+(n-1) log‖ K^←‖_α→γ^⋆_K(α) - n-1/γ̅^⋆_K(α)(min_i=1,…,(n-1)min_j∈supp(_i)log P_i(j))).
In the above equations γ̅_i^⋆(α) and γ̅_K^⋆(α) denote the Hölder conjugates of, respectively, γ_i^⋆(α) and γ_K^⋆(α).
The main object one has to bound, according to <Ref>, is the following:
max_x_i-1 H_α(_X_i|X_i-1=x_i-1_X_i), with i≥ 2.
From the properties of the Markov kernel, one has that
P_X_i = P_X_i-1 K_i-1. Furthermore, P_X_i|X_i-1=x_i-1 can be seen as δ_x_i-1 K_i-1 where δ_x_i-1 is a Dirac-delta measure centered at x_i-1. Thus, recalling the definition of
γ^⋆_i-1(α) from
<Ref>,
H^1/α_α(_X_i|X_i-1=x_i-1_X_i) = H^1/α_α(δ_x_i-1K_i-1_X_i-1K_i-1)
= ‖dδ_x_i-1K_i-1/d_X_i-1K_i-1‖_L^α(_X_i-1K_i-1)
≤‖ K_i-1^←‖_α→γ^⋆_i-1(α) H_γ^⋆_i-1(α)^1/γ^⋆_i-1(α)(δ_x_i-1_X_i-1),
where <Ref> follows from <cit.>.
Moreover, for every κ>1,
H^1/κ_κ(δ_x_i-1_X_i-1) = _X_i-1({x_i-1})^1-κ/κ = _X_i-1({x_i-1})^-1/κ̅,
where κ̅ denotes the Hölder's conjugate of κ and _X_i-1({x_i-1}) the measure that _X_i-1 assigns to the point x_i-1.
Thus, the following sequence of steps, along with <Ref>, concludes the argument:
∏_i=2^n max_x_i-1 H^1/α_α(_X_i|X_i-1=x_i-1_X_i) ≤∏_i=2^nmax_x_i-1‖ K^←_i-1‖_α→γ^⋆_i-1(α) H^1/γ^⋆_i-1(α)_γ^⋆_i-1(α)(δ_x_i-1_X_i-1)
= (∏_i=2^n‖ K^←_i-1‖_α→γ^⋆_i-1(α))(∏_i=2^n max_x_i-1(_X_i-1({x_i-1})^-1/γ̅^⋆_i-1(α)))
= (∏_i=1^n-1‖ K^←_i ‖_α→γ^⋆_i(α))(∏_i=1^n-1(min_x_i_X_i({x_i}))^-1/γ̅^⋆_i(α)).
Moreover, given the discrete setting, one can replace the measure _X_i with the corresponding pmf which is denoted by P_i.
the norm which gives the for a given
H^1/α_α(_X_i|X_i-1=x_i-1_X_i) = H^1/α_α(δ_x_i-1K_X_i-1K) ≤ c H^1/α_α(δ_x_i-1_X_i-1),
with c≤ 1. The inequality in <Ref> follows from interpreting H_α in one of two ways:
* as a φ-divergence, then the inequality follows from the Data-Processing Inequality that H_α satisfies (a consequence itself of the convexity of x^α and Jensen's inequality). In this case c can be seen as the “Strong Data-Processing Inequality Coefficient” of H_α raised to the 1/α power <cit.>;
* as the L^α-norm of the Radon-Nikodym derivative and the inequality following from contractivity of the Markov Oeprators K and K^← (along with the fact that dν K/dμ K = K^←(dν/dμ) <cit.>). In this case c can be seen as the contractive coefficient of the operators K and the induced adjoint K^← according to <Ref>.
If
the Markov kernel K_i is only contractive (and not hyper-contractive), then
γ^⋆_i(α)=α and γ̅^⋆_i(α)=β, which allows to simplify <Ref>.
In this case,
if
t^2 ≥β/2n-1/nlog‖ K^←‖_α→α - n-1/2n(min_i min_j log P_i(j))
= (1+o_n(1))(β/2log‖ K^←‖_α→α^β -1/2(min_i min_j log P_i(j)) ),
then <Ref> gives
exponential (in n) concentration even in the case of dependence.
Another perspective naturally
stems from <Ref>. Indeed, similarly to <Ref>, one has
_X^n(| f-_⊗_i=1^n X_i(f)|≥ t) ≤ 2^1/βexp(-1/β(2nt^2-∑_i=2^n max_x_i-1 D_α(_X_i|X_i-1=x_i-1_X_i)))
≤ 2^1/βexp(-1/β(2nt^2-η_α(K) ∑_i=2^nmax_x_i-1 D_α(δ_x_i-1_X_i-1)))
= 2^1/βexp(-1/β(2nt^2+η_α(K) ∑_i=2^nmin_x_i-1log P_i-1(x_i-1))).
We remark that
D_α can also be hyper-contractive with respect to some Markovian operators, meaning that in <Ref> for instance, one could consider D_γ(δ_x-1_X_i-1) with γ < α (this is equivalent to hyper-contractivity of Markov operators, <cit.>). One such example is the Ornstein–Uhlenbeck channel with noise parameter t, cf. <cit.>, for which one can prove hyper-contractivity with respect to D_α <cit.>. Moreover, in some settings, leveraging SDPIs for D_α can provide an improvement over <Ref>, see <Ref> for a detailed
comparison.
We now compare the concentration bound provided by <Ref> with existing bounds in the literature. In this section, the comparison concerns a general Markov kernel, and the explicit calculations for a binary kernel are deferred to <Ref>.
§.§.§ Comparison with <cit.>
Let us consider the same setting as in <Ref>. Then, <cit.> gives
ℙ(|f-_X^n(f)|≥ t ) ≤ 2 exp(-nt^2/2 M_n^2),
where M_n = max_1≤ i≤ n-1(1+∑_j=i^n-1∏_k=i^j η_KL(K_k) ) and we recall that η_KL(K_i)=sup_x,x̂TV(K_i(·|x),K_i(·|x̂)) is the contraction coefficient of the Markov kernel K_i. First, note that,
if the random variables are independent and thus _X^n=_⊗ X_i, then <Ref> reduces to
_X^n(E) ≤ 2 exp(-nt^2/2),
while <Ref> with γ^⋆_K(α)=α→∞ and γ̅^⋆_K(α)=β→ 1 recovers McDiarmid's inequality with the correct constant in front of n, i.e.,
_X^n(E) ≤ 2 exp(-2nt^2).
Assume now that the Markov kernel is time-homogeneous and has a contraction coefficient η_TV(K) < 1. Then, M_n = max_1≤ i≤ n-11-η_TV(K)^n+1-i/1-η_TV(K)= 1-η_TV(K)^n/1-η_TV(K). For compactness, define P_i^⋆(j^⋆):=min_imin_j P_i(j). Making a direct comparison, one has that if
t^2 > n-1/n(2M_n^2/4M_n^2-β)log‖ K^←‖_α→α^β/P_i^⋆(j^⋆)
= (1+o_n(1)) (2/4-β(1-η_TV(K))^2)log‖ K ^←‖_α→α^β/P_i^⋆(j^⋆),
then <Ref> (with γ^⋆_K(α)=α and γ̅^⋆_K(α)=β) provides a faster exponential decay than <Ref>. The explicit calculations for the special case of a binary kernel are provided in <Ref>.
Considering this setting, one has the following bound:
_X^n(E) ≤ 2^1/βexp(-1/β(2nt^2- (n-1)log(m ‖ K‖_α→α^β))).
Consequently, one can guarantee an exponential decay whenever
t^2 > (1+o_n(1))log(m ‖ K‖_α→α^β)/2.
However, in this setting one can say something more specific. In particular, one can compute the ratio
H^1/α_α(_X_i|X_i-1=x_i-1_X_i)/H^1/α_α(δ_x_i-1_X_i-1) = r_α(i)
explicitly.
K is a m× m matrix characterised by a vector λ̅ of m parameters λ_j such that ∑_j=1^m λ_j=1 and each row is a permutation of these parameters in such a way that every column also sums to 1 (Da elaborarci su, conseguenza del Birkhoff–von Neumann theorem? Non sono 100% sicuro che sia corretto o se sia da assumere. Anche la notazione non mi piace r_α(i) ma poi ci riflettiamo). Hence one can see that
r_α(i) = ‖λ̅‖_ℓ^α = (∑_j=1^m λ_j^α)^1/α.
This implies that one does not need the quantity ‖ K ‖_α→α and can provide the following, tighter bound:
_X^n(E) ≤ 2^1/βexp(-1/β(2nt^2- (n-1)log(m ‖λ̅‖^β))).
We will now compare <Ref>, with m=2 for simplicity (Controllo poi se posso ricalcolare tutto per m generale negli altri lavori e fare un confronto senza settare m=2. Un altro motivo per considerare m=2 viene dal fatto che si può calcolare esplicitamente l'ipercontrattività perche il caso della DSBS è stato ampliamente studiato)., with the current state of the art.
One can then consider the limit of α→∞ which renders β→ 1. On the one hand, this implies a larger multiplicative coefficient (as H_α grows with α, see <Ref>) and, consequently, it increases the minimum value of t one can consider in <Ref>. On the other hand, it guarantees a faster exponential decay in eq:generalResultDiscreteHomogeneousHypereq:generalResultDiscreteHomogeneous2Hyper.
In fact, as β→ 1, the RHS of (<ref>) scales as exp(-2nt^2(1+o_n(1))) for large enough t, which matches the behavior of <Ref>.
Let us highlight that, to the best of our knowledge, our approach is the first to recover the same exponential decay rate obtained in the independent case, even in the presence of correlation among the random variables.
We remark that the convergence results in <Ref> and <Ref> are with respect to different constants: <Ref> considers the concentration of f around _⊗_i=1^n X_i(f), while <Ref> around _X^n(f).
However, given the faster rate of convergence guaranteed by our framework – for this example and, even more impressively so, for the one in <Ref> – the mean of f under the product of the marginals might be regarded as a natural object to consider when proving concentration results for these processes.
This hypothesis is corroborated by the approach presented in <cit.>, where concentration for stationary Markov chains is provided around the mean with respect to the stationary measure π. Indeed, when X_1∼π, the product of the marginals reduces to the tensor product of the stationary measure π^⊗ n.
To make a direct comparison with <cit.>, one can leverage <cit.> (reproduced in <Ref>) and either reduce both results to concentration bounds around the median, or transform <Ref> in a result on concentration around the mean with respect to _X^n. This would introduce additional constants, rendering the comparison cumbersome and outside the scope of this work.
§.§.§ Comparison with <cit.>
<cit.> considers a more restricted setting in which f is the sum of n bounded functions that separately act on each of the n random variables, i.e., f=∑_i=1^n f_i(X_i) with f_i ∈ [a_i,b_i].[This choice of f in <Ref> transforms the result in a generalisation of Hoeffding's inequality to dependent settings. It is easy to see that if f_i∈ [a_i,b_i] then (<ref>) holds with c_i = (b_i-a_i) and the statement follows.] By assuming further that a_i=0 and b_i=1/n for every i (e.g., empirical mean), we are in a setting in which <Ref> holds as it is. Moreover, the setting in <cit.> requires the Markov chain to be time-homogeneous and admit a stationary distribution π (notice that none of these assumptions are necessary for Theorems <ref> and <ref> to hold). In this case <cit.> gives:
_X^n(|f - π^⊗ n(f)| ≥ t ) ≤ 2 exp(-1-λ/1+λ2nt^2),
where (1-λ) denotes the absolute spectral gap of the Markov chain, see <cit.>, which characterizes the speed of convergence to the stationary distribution. Comparing with <Ref> with γ^⋆_K(α)=α→∞ and γ̅^⋆_K(α)=β→ 1,[As mentioned earlier, this optimizes the rate of convergence, at the expense of the value of t from which we obtain an improvement.] one has that if
t^2 > (1+o_n(1))1+λ/4λlog‖ K^←‖_∞→∞/P_i^⋆(j^⋆),
then <Ref> provides a faster decay than <Ref>. A more explicit comparison in which the absolute spectral gap is computed for a binary Markov kernel can be found in <Ref>.
§.§.§ Comparison with <cit.>
Let us now derive the corresponding result of concentration around the median in order to compare with <cit.>. Leveraging <cit.> (see also <Ref>) along with <Ref> (again, with γ^⋆_K(α)=α→∞ and γ̅^⋆_K(α)=β→ 1), we have
_X^n(|f-m_f|≥ t)
≤ 2 exp(-2n(t-√(ln4+C_n/2n))^2+C_n),
where C_n=(n-1)log(‖ K^←‖_∞→∞/P_i^⋆(j^⋆)).
This also implies (see, e.g., <cit.> or <cit.>) that, if t>√(log4+C_n/2n) and given any event E such that _X^n(E)≥1/2, then
_X^n(E^c_t) ≤ 2 exp(-2n(t-√(log4+C_n/2n))^2+C_n)
= 1/2exp(-2nt^2+2t√(2n(log4+C_n))),
where E_t = {y∈^n : d(x,y)≤ t for some x∈ E} and d denotes the normalised Hamming metric.
Let us denote
a:=1-max_i max_x,x̂ TV(_X_i|X_i-1=x,_X_i|X_i-1=x̂).
Hence, assuming t>1/a√(log(1/_X^n(E))/n), <cit.> give
_X^n(E^c_t) ≤exp(-2n(at -√(log(1/_X^n(E))/2n))^2)
≤exp(-2nt^2a^2+2ta√(2nlog2)).
Ignoring multiplicative constants and comparing the exponents of (<ref>) and (<ref>), one can see that, whenever
t ≥(1+o_n(1))√(2log(‖ K^←‖_∞→∞/P_i^⋆(j^⋆)))/(1-a^2)
,
t ≥√(2ln2)(1-a)-√(2(ln4+C_n))/√(2n)(1-(1-a)^2),
then our approach improves upon <cit.>.
The Dobrushin coefficient of the kernel, captured by the quantity (1-a), measures the degree of dependence of the stochastic model. The smaller 1-a is, the less “dependent” the model is. If _X^n reduces to a product distribution then a=1. In this case, <Ref>
boils down to McDiarmid's inequality. In contrast, the larger 1-a is, the worse the behavior of <Ref>. If a=0, then the Markov chain is not contracting and violates the assumption of <cit.>. Our approach, instead, can still provide meaningful results, as we will see in <Ref>. A more explicit comparison for the case of a binary kernel can be found in <Ref>.
§.§ A non-contracting Markov chain
In order to provide concentration for Markov chains, existing work
requires either contractivity of the Markov chain
<cit.>, stationarity
<cit.> or some form of mixing <cit.>.
A well-known Markov chain that evades most of these concepts is the SSRW. Suppose to have a sequence of i.i.d. Rademacher random variables, i.e., ℙ(X_i = -1)=ℙ(X_i= +1)=1/2, for i≥ 1; the initial condition is X_0=0 w.p. 1. Then, a SSRW is the Markov chain (S_i)_i∈ℕ defined as S_i = S_i-1 + X_i.
This Markov chain does not admit a stationary distribution, it is not contracting, but it is expanding (in this case, both towards the positive and the negative axes of the real line). Let us denote with K_i the kernel at step i. Then, at each step i>2, one can always find two different realisations of S_i-1, let us call them s_1,s_2, such that supp(K_i(·|s_1))∩supp(K_i(·|s_2))=∅, i.e., the support of S_i is constantly growing.
This implies that the approaches in <cit.> cannot be employed, while <cit.> yields:
ℙ(| f-_X^n(f)|≥ t) ≤ 2exp(-t^2/2n).
A meaningful regime (given also the expanding nature of the Markov chain along the integers)[The standard deviation of S_n is √(n), hence it is expected that S_n is ± O(√(n)).]
arises when considering t ≳√(n).
Let us now compute the Hellinger integral in this specific setting. This is done in the lemma below, proved in <Ref>.
Let i≥ 1, x∈supp(S_i-1), 0≤ j≤ i, and α≥ 1. Then,
H_α^1/α(_S_i|S_i-1=x_S_n) ≤ 2^i 1/β-1+1/α,
and thus
H_α^1/α(_S^n_⊗_j=1^n S_j) ≤ 2^n(n-1)/2β.
Denoting with 1/β= α-1/α, <Ref> implies that
H_α^1/α(_S^n_⊗_j=1^n S_j) ≤∏_i=2^n max_x∈suppS_i-1 H_α^1/α(_S_i|S_i-1=x_S_i)
≤∏_i=2^n 2^1/α-1 + i/β
= 2^1/β∑_j=1^n-1 j = 2^n(n-1)/2β.
Combining <Ref> and <Ref>, one has that
ℙ(| f-_⊗_i=1^n X_i(f)|≥ t )≤ 2^1/βexp(-2nt^2/β+ n(n-1)/2βln 2).
It is easy to see that, whenever t > √((n-1)ln(2))/2, <Ref> gives an exponential decay. For instance, choosing t =√(n),
one retrieves
ℙ(| f-_⊗_i=1^n X_i(f)|≥√(n)) ≤ 2^1/βexp(-n^2/β(2 - ln2/2 +ln2/2n)).
In contrast, the same choice in <Ref> gives
ℙ(| f-_X^n(f)|≥√(n)) ≤ 2exp(-1/2).
More generally, selecting t of order √(n) suffices to achieve an exponential decay in <Ref>, while to obtain a similar speed of decay in <Ref> t needs to be at least of order n. The approach advanced in this work can, thus, not only be employed in settings where most of the other approaches fail (e.g., <cit.>), but it also brings a significant improvement over the rate of decay that one can provide.
§.§ A non-Markovian Process
Next, we consider a non-Markovian setting in which each step of the stochastic process depends on its entire past:
X_n =
+1, with probability ∑_i=0^n-1p_iX_i,
-1, with probability
1 - ∑_i=0^n-1p_iX_i,
for n≥ 1, p_i>0 and X_0=+1 with probability 1.
The choice of the parameters p_i is arbitrary (given the constraint that ∑_i=0^n-1 p_i < 1) but for concreteness we will set p_i = 2^-i-1 for every i≥ 0. Then, ℙ_X_1(1|x_0)=1/2=ℙ_X_1(-1|x_0) and for each n≥ 1,
ℙ_X_n(1|x_0^n-1)=1/2+ ∑_i=1^n-1p_ix_i= ∑_i=0^n-1x_i 2^-i-1= 1- ℙ_X_n(-1|x_0^n-1),
with x_0=1.
Consequently, following the calculations detailed in <Ref>, we have
H_α(_X_n(·|x_0^n-1) (1/2,1/2))
< 2∑_j=0^⌊α/2⌋⌊α⌋2j(2∑_i=1^n-1p_ix_i)^2j,
which, as p_i = 2^-i-1, gives
max_x_1^n-1H_α(_X_n(·|x_0^n-1) (1/2,1/2)) < 2^α.
Thus, H_α^1/α(_X^n(1/2,1/2)^⊗ n)< 2^n-1 and an application of Theorem <ref> yields:
ℙ({| f-_⊗_i=1^n X_i(f)|≥ t}) ≤inf_β>1 2^1/βexp(-2n/β(t^2-n-1/nβln2/2)),
with exponential decay whenever
t^2 > (1+o_n(1))βln2/2.
Like before, choosing a larger β slows down the exponential decay, but it reduces the multiplicative coefficient introduced via H_α. For n
and t large enough, one can pick β→ 1 and retrieve a McDiarmid-like exponential decay.
Given that this setting does not characterise a Markovian dependence (at each step the stochastic process depends on its entire past), one cannot employ the technique described in <cit.> or in <cit.>. One can, however, employ the technique described in <cit.> and <cit.>. Both these approaches require the computation of {θ̅_ij}_1≤ i < j ≤ n with
θ̅_ij:= sup_x^i-1, w,ŵ‖ℒ(X_j^n|X^i=(x^i-1, w)) - ℒ(X_j^n|X^i=(x^i-1,ŵ)) ‖_TV,
where ℒ(X_j^n|X^i=(x^i-1,w)) denotes the conditional distribution of X_j^n given X^i=(x^i-1,w). The θ̅'s are then organised in n× n upper-triangular matrices whose norms are computed in order to provide an upper bound on the probability of interest. In particular, <cit.> requires the ℓ_2-norm, while <cit.> requires the operator norm of the matrix.
ℒ(X_j^n = x_j^n|X^i=x^i-1w) = ∑_x_i+1^j-1∏_k=i+1^n (1/2 + x_k(∑_m≠ i^k-1 p_m x_m + p_iw )).
Even for the simpler case j=i+1, computing <Ref> is not easy. Indeed, one has that:
ℒ(X_i+1^n = x_i+1^n|X^i=x^i-1w) = ∏_k=i+1^n (1/2 + x_k(∑_m≠ i^k-1 p_m x_m + p_iw )).
Moreover,denoting with a_i+τ = 1/2 + x_i+τ∑_m≠ i^k-1p_mx_m, with 𝒮^i = {1,…, n-i} and with 𝒮^i_q the set of all the subsets of 𝒮^i of size q one can see that
η̅_i,i+1 = sup_(x^i-1∈ ,w,ŵ)1/2|∑_x_i+1^n∑_p=1^n-i∑_q=1^n-ip(w^|𝒮^i∖𝒮^i_q|-ŵ^|𝒮^i∖𝒮^i_q|) p_i^|𝒮^i∖𝒮^i_q|∏_τ∈𝒮^i_q a_i+τ∏_τ̃∈𝒮^i∖𝒮^i_q x_i+τ̃|
and it is not clear, a priori, how to compute such a supremum with respect to w,ŵ and x^i-1. Picking a general j>i renders the computations even more difficult.Similarly, to employ the technique provided in <cit.> one would need to compute the following quantity
C̅ = max_1≤ i ≤ nsup_x^i-1∈^i-1
w,ŵ∈inf_π∈Π(ℒ(X^n|x^i,w), ℒ(X^n|x^i,ŵ))π(d).
Here, d denotes the normalised Hamming metric and Π(ℒ(X^n|x^i,w), ℒ(X^n|x^i,ŵ)) represents the set of all the couplings defined on ^n×^n such that the corresponding marginals are ℒ(X^n|x^i,w) and ℒ(X^n|x^i,ŵ). However, computing any of these objects in practice can be complicated even in simple settings. In contrast, with the framework proposed here and thanks to the tensorisation properties of the Hellinger integral, one can easily bound the information measure and provide an exponentially decaying probability (whenever the probability of the same event under independence decays exponentially and for opportune choices of the parameters).
§.§ Markov Chain Monte Carlo
An intriguing application of the method proposed in <cit.> consists in providing error bounds for Markov Chain Monte Carlo methods. For instance, assume that one is trying to estimate the mean π(f) for some function f and some measure π which cannot be directly sampled. A common approach consists in considering a Markov chain {X_i}_i≥ 1 whose stationary distribution is π and estimating π(f) via empirical averages of samples {X_i}_n_0+1^n_0+n, where n_0 characterises the so-called “burn-in period”. This period ensures that enough time has passed and the Markov chain is sufficiently close to the stationary distribution π before sampling from it. <cit.> gives that
ℙ(1/n∑_i=1^n f(X_n_0+i)-π(f) > t ) ≤ C(ν,n_0,α)exp(-1/β·1-max{λ_r,0}/1+max{λ_r,0}·2nt^2/(b-a)^2),
where f:→ [a,b] is uniformly bounded, λ_r represents the right-spectral gap (see <cit.>), α∈(1,+∞), β denotes its Hölder's conjugate and C is a constant depending on the burn-in period n_0, the Radon-Nikodym derivative between the starting measure ν and the stationary measure π, and α.
Using the tools provided in this work, we obtain:
ℙ(1/n∑_i=1^n f(X_n_0+i)-π(f) > t ) ≤exp(-2nt^2/β(b-a)^2) H_α^1/α(ν K^n_0π) ∏_i=2^n max_x_n_0+i-1 H_α^1/α(K(·|x_n_0+i-1)π)
≤ C(ν,n_0,α)exp(-2nt^2/β(b-a)^2)max_xπ({x})^-n-1/β ,
where <Ref> follows from the fact that H^1/α_α(ν K^n_0π) represents the L^α(π)-norm of the Radon-Nikodym derivative and can thus be bounded like in <cit.>.
Using the tools provided in this work, we obtain
ℙ(1/n∑_i=1^n f(X_n_0+i)-π(f) > t ) ≤exp(-2nt^2/β (b-a)^2)H_α^1/α(_X_n_0+1… X_n_0+nπ^⊗ n).
The idea behind the result is as follows. Given that one is trying to estimate the mean of f under π using empirical averages, if one had samples taken in an i.i.d. fashion from π, the exponential convergence would be guaranteed. However, the issue is that one does not have access to samples of π. Thus, changing the measure to an n-fold tensor product of π, one can still guarantee an exponential decay at the cost of a multiplicative price depending on how far the samples are from the stationary distribution.
By making a direct comparison, assuming λ_r>0, one can see that if
t^2 ≥n-1/n(b-a)^2/21+λ_r/2λ_rlog(1/min_x π({x}))
=(1+o_n(1))(b-a)^2/21+λ_r/2λ_rlog(1/min_x π({x})),
then the RHS of <Ref> decays faster than the RHS of <Ref>. A comparison for the binary symmetric channel, with the computations of all the parameters, can be found in <Ref>.
Let K be a discrete contractive Markov kernel (as in <Ref>) and, for simplicity, take n_0=0 (no burn-in period). Pick q→ 1 in <Ref>, which gives that C= ‖dν/dπ‖_L^∞(π), i.e.,
ℙ(1/n∑_i=1^n f(X_i)-π(f) > t ) ≤exp(-1-max{λ_r,0}/1+max{λ_r,0}·2nt^2/(b-a)^2)‖dν/dπ‖_L^∞(π).
Furthermore, <Ref> can be rewritten as
ℙ(1/n∑_i=1^n f(X_i)-π(f) > t ) ≤exp(-2nt^2/β(b-a)^2) H_α^1/α(νπ) ∏_i=2^n max_x_i-1 H_α^1/α(K(·|x_n_0+i-1)π)
≤exp(-2nt^2/β(b-a)^2)H_α^1/α(νπ) max_xπ({x})^-n-1/β .
Taking then the limit of α→∞ (which allows to compare the fastest exponential decays between our approach and <cit.>), one has
ℙ(1/n∑_i=1^n f(X_i)-π(f) > t ) ≤exp(-2nt^2/(b-a)^2) ‖dν/dπ‖_L^∞(π)(1/min_xπ({x}))^n-1.
Similarly to <cit.>, one can also show that an exponential decay is guaranteed in <Ref> if n_0 = Ω(log n). Furthermore, as <Ref> improves the exponential decay for t satisfying <Ref>, in the same regime the induced lower bound over n_0 will be improved as well. Finally, we highlight that
<Ref> applies to a much larger family of functions f than what can be handled by <cit.>.
n_0 > α/2log(1/λ)log(2^2/β‖dν/dπ-1‖_L^α(π)/2nt^2/d^2β+n-1/βlogπ^⋆),
where, similarly to before, d^2=(b-a)^2 and π^⋆ denotes max_x π({x}). Moreover, in the same regime of t as the one depicted in <Ref> then <Ref> improves over the lower bound which can be achieved from <cit.>.
L'espressione mi sembra abbia senso, se lo spectral gap λ è piccolo, allora la MC converge velocemente alla stazionaria ed n_0 diminuisce. Più campioni considero (n grande) meno vincoli ho su n_0. Se ν=π allora ‖dν/dπ-1‖_L^α(π)=0 e non ho vincoli su n_0.
Da qui in poi non so bene cosa voglio ottenere, più o meno capire cosa posso ottenere con SDPI
We also know that
H^1/α_α(ν K^n_0π ) =H^1/α_α(ν K^n_0π K^n_0 )
= ((α-1)ℋ_α(ν K^n_0π K^n_0) + 1)^1/α
≤ ((α-1)η_α(K^n_0)ℋ_α(νπ) + 1)^1/α
= (η_α(K^n_0)(H_α(νπ)-1) + 1)^1/α
= (η_α(K^n_0)H_α(νπ) - η_α(K^n_0) + 1)^1/α
= H_α(νπ)^1/α(η_α(K^n_0)-η_α(K^n_0)/H_α(νπ)+1/H_α(νπ))^1/α
=(η_α(K^n_0) H_α(νπ))^1/α(1- 1/H_α(νπ)+η_α(K^n_0)/H_α(νπ))^1/α
≤ (2(1-(1-η_α(K))^n_0)H_α(νπ))^1/α
§ CONCLUSIONS
We introduced a novel approach to the concentration of measure for dependent random variables. The generality of our framework allows to consider arbitrary kernels without requiring either stationarity (as opposed to <cit.>) or contractivity (as opposed to <cit.>). Moreover, our technique applies to any family of functions which is known to concentrate when the random variables are actually independent. Said technique is employed and compared to the state of the art in four different settings: finite-state Markov chains, a non-contractive one (the SSRW), a non-Markovian process, and Monte Carlo Markov Chain methods. In each of these settings, we provide a regime of parameters in which we guarantee a McDiarmid-like decay and improve over existing results.
The improvement is the most striking in the case of the SSRW, where the only (closed-form) alternative approach gives a constant probability of deviation from the average, as opposed to the exponentially decaying probability guaranteed by our framework.
The bounds provided are usually characterised by a phase-transition-like behavior in terms of the accuracy t, i.e., one can show concentration only for values of t larger than a threshold depending on the Hellinger integral (and its scaling with respect to the number of variables n).
Consider for instance <Ref>: if t^2> β/2nln H^1/α_α≈ (1+o_n(1))(βln(2)/2), then the exponent is negative and one has exponential concentration, otherwise the exponent becomes positive and the bound trivialises to something larger than 1. We believe this to be an artifact of the analysis and not an intrinsic property of the concentration of measure phenomenon.
§ ACKNOWLEDGMENTS
The authors are partially supported by the 2019 Lopez-Loreta Prize. They would also like to thank Professor Jan Maas for providing valuable suggestions and comments on an early version of the work.
IEEEtran
sectionappendix
subsectionappendix
§ PROOF OF <REF>
Assume that E={|f-_⊗_i=1^n X_i(f)|≥ t}. Then, one has that
_X^n(E) = ∫1_E d_X^n
= ∫1_E d_X^n/d_⊗_i=1^n X_i d_⊗_i=1^n X_i
≤(∫1_E d_⊗_i=1^n X_i)^α-1/α(∫(d_X^n/d_⊗_i=1^n X_i)^α d_⊗_i=1^n X_i)^1/α
= _⊗_i=1^n X_i^1/β(E) H_α^1/α(_X^n_⊗_i=1^n X_i),
where the inequality in the third line follows from Hölder's inequality. Moreover,
H_α(_X^n_⊗_i=1^n X_i) = _X_1(_⊗_i=2^n X_i(d_X_2^n|X_1/d_⊗_i=2^n X_i)^α)
=_X_1(_X_2((d_X_2|X_1/d_X_2)^α(_⊗_i=3^n X_i(d_X_3^n|X_2/d_⊗_i=3^n X_i)^α)))
≤_X_1(_X_2((d_X_2|X_1/d_X_2)^αα_2)^1/α_2_X_2((_⊗_i=3^n X_i(d_X_3^n|X_2/d_⊗_i=3^n X_i)^α)^β_2)^1/β_2)
= H_α^2 ·_X_2((_⊗_i=3^n X_i(d_X_3^n|X_2/d_⊗_i=3^n X_i)^α)^β_2)^1/β_2,
where the inequality follows from Hölder's inequality, the fact that the expectation is taken with respect to the product measure _⊗_i X_i as well as the Markovity of _X^n. H_α^2 = _X_1^1/β_1(H_αα_2^β_1/α_2(_X_2|X_1_X_2)) with β_1=1 will now be the only term depending on X_1. Repeating the same sequence of steps (an application of the Disintegration Theorem <cit.> to a Markovian setting, like in <cit.>, followed by Hölder's inequality) (n-2) more times leads to the product of H_α^i as defined in the statement of the theorem.
The result then follows by noticing that
^1/β_⊗_i X_i(E)≤ 2^1/βexp(-2nt^2/β),
by McDiarmid's inequality.
§ CONCENTRATION AROUND MEAN AND MEDIAN
The following result is a useful tool that allows us to compare concentration around a constant, concentration around the mean and concentration around the median. It is used in order to compare our results with the ones proposed in <cit.>. A proof can be found in <cit.> and the statement is provided here for ease of reference.
Let f be a measurable function on a probability space (,Ω,μ). Assume that, for some a_f∈ℝ and a non-negative function h:ℝ_+→ℝ_+ such that lim_r→∞ h(r)=0,
μ({|f-a_f|≥ r })≤ h(r)
for all r>0, then
μ({|f-m_f|≥ r +r_0})≤ h(r),
where m_f is the median of f and r_0 is such that h(r_0)<1/2. Moreover, if h̅ = ∫_0^∞ h(x)dx < ∞, then f is μ-integrable, |a_f-μ(f)|≤h̅ and, for every r>0,
μ({|f-μ(f)|≥ r +h̅})≤ h(r).
In particular, if h(r)≤ Cexp(-cr^p) with 0<p<∞, then
μ({|f-M|≥ r })≤ C'exp(-κ_pcr^p),
where C' depends only on C and p, κ_p depends only on p, and M is either the mean or the median.
§ TENSORISATION
Many information measures satisfy tensorisation properties, meaning that, if ν and μ are measures acting on an n-dimensional space (typically an n-fold Cartesian product of one-dimensional spaces), it is possible to compute the divergence between ν and μ using “one-dimensional projections”. This is particularly useful when the second measure is a product-measure. Indeed, if and are two probability measures on the space ^n and is a product-measure, denoting with X̅^i the (n-1)-tuple (X_1,…,X_i-1,X_i+1,…,X_n), then <cit.> gives that
D() ≤∑_i=1^n ∫ d_X̅^i D(Q_X_i|X̅^iP_X_i),
where D() denotes the KL-divergence between and .
Hence, having access to a bound on D(Q_X_i|X̅^iP_X_i) for every 1≤ i≤ n implies a bound on the KL-divergence between the two n-dimensional measures and . This property is pivotal in proving concentration results in a variety of ways <cit.>. Since of independent interest, we will now state the tensorisation properties of H_α as explicit results, as well as the corresponding Rényi's D_α analogues.
In particular, whenever the second measure is a product measure while the first one is Markovian, it is possible to prove the following.
Let and be two probability measures on the space ^n such that ≪, and assume that is a product measure (i.e., =⊗_i=1^n P_i). Assume also that is a Markov measure induced by Q_1 and the kernels Q_i(·|·) with 1≤ i≤ n, i.e., (x^n) = Q_1(x_1)∏_i=2^n Q_i(x_i|x_i-1). Moreover, given a constant c, let X_0=c (almost surely) be an auxiliary random variable, then,
H_α(Q) ≤∏_i=1^n_X_i-1^1/β_i-1(H_αα_i^β_i-1/α_i(Q_i(·|X_i-1)P_X_i)),
where α_i≥ 1 for i≥ 0, β_0=1, α_n=1, and β_i = α_i/(α_i-1).
Moreover, selecting α_i→ 1^+ which implies β_i→∞ for every i≥ 1, one recovers
H_α() ≤ H_α(Q_1P_1)·∏_i=2^n max_x_i-1∈ H_α(Q_i(·|x_i-1) P_i).
The proof follows from the steps undertaken in eq:startTensoreq:endTensor along with the discussion immediately after, but replacing _X^n with 𝒬.
Let us denote with h=d/d the density of with respect to . Denote then with h_1 the marginal density h_1 = ∫_^n-1 h d
H_α() = (h^α) = ((h_1h_2^n)^α)
= P_1(h_1^α P^2… n((h_2^n)^α))
≤ P_1((h_1^α)^β)^1/β P_1((P^2… n((h_2^n)^α))^γ)^1/γ
= P_1((h_1^α)) _P_1P^2… n((h_2^n)^α),
where <Ref> follows from Fubini's theorem as well as the fact that is a product-measure and <Ref> follows from Hölder's inequality with 1/β+1/γ=1 and β,γ >1. <Ref> follows from letting β→ 1 and, consequently, γ→∞.
The argument follows from repeating the same procedure in an iterated fashion and noticing that being a Markovian product-measure, Q_2 (and the corresponding density with respect to P_2) will only depend on x_1 and x_2, Q_3 will only depend on x_2 and x_3 and so on.
(Could be more formal). <Ref>, which involves products of Hellinger integrals, can be re-written as a sum by considering Rényi's divergences, due to the relationship connecting the two quantities (see <Ref>).
Under the same assumptions as in <Ref>, one has that
D_α() ≤1/α-1∑_i=1^n 1/β_i-1log_X_i-1(exp((αα_i-1)β_i-1/α_i(D_αα_i(Q_i(·|X_i-1)P_X_i))),
where α_i≥ 1 for i≥ 0, β_0=1, α_n=1 and β_i = α_i/(α_i-1).
Moreover, selecting α_i→ 1^+ which implies β_i→∞ for every i≥ 1, one recovers
D_α() ≤ D_α(Q_1P_1) + ∑_i=2^n max_x_i-1 D_α(Q_i(·|x_i-1) P_i).
This result allows us to control from above the Hellinger integral of two n-dimensional objects using the Hellinger integral of simpler 1-dimensional objects.
For instance, if the first measure represents the distribution induced by a time-homogeneous Markov chain, then all the kernels Q_i coincide and the expression becomes even easier to compute, as one can see in <Ref>.
A similar approach can also be employed to provide a result in cases where is an arbitrary measure.
Let and be two probability measures on the space ^n such that ≪, and assume that is a product-measure (i.e., =⊗_i=1^n P_i). Then,
H_α() ≤ H_α(Q_1P_1)·∏_i=2^n max_x_1^i-1=x_1… x_i-1∈^i-1 H_α(Q_i(·|x_1^i-1) P_i).
Similarly, one has that
D_α() ≤ D_α(Q_1P_1) + ∑_i=2^n max_x_1^i-1=x_1… x_i-1∈𝒳^i-1 D_α(Q_i(·|x_1^i-1) P_i).
The proof follows from the same argument of <Ref>. The key difference is that, without making any additional assumptions on , the entire “past” of the process needs to be considered.
This is why writing an expression similar to <Ref> without Markovity would be rather cumbersome, and we restrict ourselves to the setting where the additional parameters are all considered to be such that β_j→∞.
Finally, we show some lower bounds on Hellinger integrals and Rényi's divergences.
Let and be two probability measures on the space ^n such that ≪, and assume that is a product-measure (i.e., =⊗_i=1^n P_i). Assume also that is a Markov measure induced by Q_1 and the kernels Q_i(·|·) with 1≤ i≤ n, i.e., (x^n) = Q_1(x_1)∏_i=2^n Q_i(x_i|x_i-1). Moreover, given a constant c, let X_0=c (almost surely) be an auxiliary random variable, then,
H_α(Q) ≥∏_i=1^n_X_i-1^1/β_i-1(H_αα_i^β_i-1/α_i(Q_i(·|X_i-1)P_X_i)),
and
D_α() ≥1/α-1∑_i=1^n 1/β_i-1log_X_i-1(exp((
α_i)(αα_i-1)β_i-1/α_i(D_αα_i(Q_i(·|X_i-1)P_X_i))),
where α_i≤ 1 for i≥ 1, β_0=1, α_n=1 and β_i = α_i/(α_i-1).
Moreover, selecting α_1→1^- which implies β_i→-∞ for every i≥ 1, one recovers
H_α() ≥ H_α(Q_1P_1)·∏_i=2^n min_x_i-1∈ H_α(Q_i(·|x_i-1) P_i),
which, in the case of Rényi's divergences, specialises to
D_α() ≥ D_α(Q_1P_1) + ∑_i=2^n min_x_i-1∈𝒳 D_α(Q_i(·|x_i-1) P_i).
The proof follows from similar arguments as the proof of <Ref>. The sole difference is that, instead of using Hölder's inequality at each step, one uses reverse Hölder's inequality.
§ EXPLICIT COMPARISON FOR A BINARY KERNEL
The setting is the following: let K be a time-homogeneous Markov chain characterised by a doubly-stochastic transition matrix characterised by the vector of parameters λ̅= (λ_1,…,λ_m) (i.e., the rows and columns of K are permutations of λ̅ with the constraints ∑_i K_i,j = ∑_j K_i,j = 1). In this case, the Markov chain admits a stationary distribution π which corresponds to the uniform distribution over the sample space. Hence, if one is considering an m-dimensional space, then π({x})=1/m for x∈{1,…,m}.
In this case, if P_1 ∼π, then P_i ∼π for every i≥ 1. Moreover, one can prove that K=K^← and the bound of <Ref> reduces to
_X^n({| f-_⊗_n X_n(f)|≥ t ) ≤ 2^1/βexp(-1/β(2nt^2- (n-1)log(m ‖λ̅‖_ℓ^α^β))),
Henceforth, we will consider m=2 for simplicity and, thus, ‖λ̅‖_ℓ^α:=(∑_i=1^mλ_i^α)^1/α can be expressed as (λ^α + (1-λ)^α)^1/α. Specialising <Ref> to this setting, one obtains the following result.
Let n>1, and let X_1,…,X_n be a sequence of random variables such that X_1∼π. For every α>1 and every function f such that <Ref> holds true, one has that
ℙ(| f-_⊗_i=1^n X_i(f)|≥ t )≤ 2^1/βexp(-2nt^2/β +n-1/βln(2((1-λ)^α+λ^α)^1/α-1)) .
§.§ Comparison with <cit.>
The bound obtained via the techniques of <cit.> is
ℙ(| f-_X^n(f)|≥ t) ≤
2exp(-2λ^2 nt^2/((1-2λ)^n-1)^2).
Let us denote κ_α := ((1-λ)^α+λ^α))^1/α-1 <1. Then, by direct comparison, it is possible to see that, whenever
t^2>((1-2λ)^n-1)^2(1-1/n)ln(2κ_α)/2((1-2λ)^n-1)^2-βλ^2):=t̅^2,
then the RHS of (<ref>) decays faster than the RHS of (<ref>). In particular, for a given λ<1/2 and if α>4/3, then
lim_n→+∞ ((1-2λ)^n-1)^2(1-1/n)ln(2κ_α)/2((1-2λ)^n-1)^2-βλ^2)
=ln(2 κ_α)/2(1-βλ^2)<2/4-βln2.
t̅^2= (1+o_n(1))ln(2κ_α)/2(1-βλ^2) < (1+o_n(1))2ln2/4-β.
Here, one can explicitly see the trade-off between the probability term and the Hellinger integral, described in <Ref> and mediated by the choice of α. Taking the limit α→∞ in <Ref> leads to the following upper bound
ℙ(| f-_⊗_i=1^n X_i(f)|≥ t )≤ 2exp(-2nt^2 + (n-1)ln(2(1-λ))) .
In this setting, in order to improve over <Ref>, one needs t^2>t̅^2, with
t̅^2 = (1+o_n(1))ln(2(1-λ))/2(1-λ^2)< (1+o_n(1))2ln2/3.
Clearly, 1-λ>κ_α for every α>1. Hence, on the one hand, <Ref> introduces a worse multiplicative constant (a larger α implies a larger Hellinger integral, and we are considering the limit of α→∞) and increases the minimum value of t one can consider for a given λ<1/2 (<Ref> is increasing in α). On the other hand, it provides a faster exponential decay with n. In fact, as β→ 1, the RHS of (<ref>) scales as exp(-2nt^2(1+o_n(1))) for large enough t, which matches the behavior of <Ref>.
§.§ Comparison with <cit.>
In the setting considered above, <cit.> gives
ℙ(| f-π^⊗ n(f)|≥ t ) ≤ 2exp(-2λ/1-λnt^2).
This means that, considering the decay provided by <Ref> (which optimises the speed of decay for large enough t) whenever
t^2 > 1/2(1-λ)/(1-λ-βλ)ln(2
κ_α)(1+o_n(1)),
then <Ref> decays faster than <Ref>.
In particular, given β>1 one can choose λ = 1/β+1<1/2 and render <Ref> arbitrarily large. However, with the characterisation provided in <Ref> one can see that in this case, one has that whenever
t^2 > 1-λ/2-4λln(2(1-λ))(1+o_n(1)),
then <Ref> leads to a faster decay than <Ref>.
§.§ Comparison with <cit.>
For the kernel considered in this appendix, <Ref> holds with C_n= (n-1)log(2(1-λ)). Furthermore, for every i and x, x̂, we have that
TV(_X_i|X_i-1=x,_X_i|X_i-1=x̂)=(1-2λ). Consequently, assuming t>1/(2λ)√(ln(1/_X^n(E))/n), <cit.> give
_X^n(E^c_t) ≤exp(-2n(t(2λ) -√(ln(1/_X^n(E))/2n))^2)
≤exp(-8nt^2λ^2+8tλ√(nln2/2)).
Comparing <Ref> with C_n=(n-1)log(2(1-λ)) with <Ref>, one can see that, whenever
t ≥√(2ln(2(1-λ)))/(1-4λ^2)(1+o_n(1)),
then <Ref> improves over <Ref>.
A similar comparison can be drawn with respect to the tools in <cit.> (in which the degree of dependence is measured differently), but it would lead to a worse bound than that expressed in <Ref>.
§.§ MCMC
Considering the same setting detailed in the previous subsections, one can more explicitly characterise the parameters determining <Ref>. In particular, one has that π = (1/2,1/2) and the spectral gap is equal to 1-2λ. Consequently, if n_0=0 and one considers α→∞, <Ref> becomes:
ℙ(1/n∑_i=1^n f(X_n_0+i)-π(f) > t ) ≤ 2exp(-λ/1-λ·2nt^2/(b-a)^2)·max{ν({0}),ν({1})},
while <Ref> boils down to the following:
ℙ(1/n∑_i=1^n f(X_n_0+i)-π(f) > t ) ≤ 2exp(-2nt^2/(b-a)^2)(2-2λ)^n-1·max{ν({0}),ν({1})}.
Making a direct comparison one can see that if
t^2 ≥((1-1/n)ln(2-2λ))(b-a)^2/21-λ/1-2λ,
then <Ref> provides a faster decay than <Ref>.
§.§ Comparison between SDPI for D_α
and hypercontractivity
If μ=(1/2,1/2) and K=BSC(λ), then μ K= μ and one has, following Wyner's notation <cit.>, the so-called Doubly-Symmetric Binary Source “DSBS(λ)”. In this setting, the hyper-contractivity constant is given by <cit.>
γ^⋆(α)=(1-2λ)^2(α-1)-1 .
Moreover, one can analytically see that, for every μ,
D_α(Kμ K)/D_α(δ_0μ) < (1-2λ)^(1+1/α)/(1-λ)^(α-1)/α.
As α→1^+, the LHS of <Ref> approaches a ratio between KL-divergences, while the RHS approaches (1-2λ)^2, which equals η_KL(K) <cit.>. Furthermore, taking the limit of α→∞ (which optimises the exponential rate of decay), the expression in <Ref> provides an improvement over simply using DPI, while <Ref> trivialises to γ^⋆(+∞) = +∞. Hence, denoting with E={|f-_⊗ X_i(f)|≥ t}, one has that,
for every α>1,
_X^n(E) ≤ 2^1/βexp(-2nt^2/β)·exp((1-2λ)^2(α-1)-2/(1-2λ)^2(α-1)-1(n-1)log2) via <Ref>&<Ref>,
exp(1/β(1-2λ)^(1+1/α)/(1-λ)^(α-1)/α (n-1)log2) via <Ref>&<Ref>.
One can see that, for α large enough, <Ref> improves upon <Ref> for every λ. In fact, taking α→∞ gives
_X^n(E) ≤ 2 exp(-2nt^2 )·exp((n-1)log2) via <Ref>&<Ref>,
exp((1-2λ)/(1-λ) (n-1)log2) via <Ref>&<Ref>.
§ PROOF OF <REF>
For every n≥ 0, we have
supp(S_n)=⋃_j=0^n { n-2j}.
Moreover, given 0≤ j ≤ n,
ℙ(S_n= n-2j) = nn-j2^-n.
Furthermore, given x∈supp(S_n-1) and 0≤ j≤ n,
ℙ_S_n|S_n-1=x(n-2j)= 1/21_{n-2j-x=1} + 1/21_{n-2j-x=-1}.
Therefore, the following chain of inequalities holds:
H_α (P_S_n|S_n-1=xP_S_n) = ∑_j=0^n ℙ^α_S_n|S_n-1=x(n-2j) ·ℙ_S_n^1-α(n-2j)
= 2^-α(ℙ_S_n^1-α(x+1)+ℙ_S_n^1-α(x-1))
= 2^-α((nn+x+1/2 2^-n)^1-α+(nn+x-1/2 2^-n)^1-α)
= 2^-α+n(α-1)((nn+x+1/2)^1-α+(nn+x-1/2)^1-α)
≤ 2^-α+n(α-1)((n/n+x+1/2)^n+x+1/2(1-α)+(n/n+x-1/2)^n+x-1/2(1-α))
= 2^-α+n(α-1)((n+x+1/2n)^n+x+1/2(α-1)+(n+x-1/2n)^n+x-1/2(α-1))
≤ 2^-α+n(α-1)((n+x+1/2n)^n+x+1/2(α-1)+(n+x+1/2n)^n+x-1/2(α-1))
= 2^-α+n(α-1)(n+x+1/2n)^n+x-1/2(α-1)·(1+(n+x+1/2n)^(α-1))
≤
2^-α+n(α-1)+1.
Here, the inequality (<ref>) follows from the fact that nk≥(n/k)^k along with 1-α≤ 0; the inequality (<ref>) follows from the fact that n+x+1/2n>0.
Moreover, it is easy to see that n+x+1/2= n+x-1/2+1 and thus the factorisation in <Ref> follows. To conclude, it suffice to notice that n+x+1/2n≤ 1.
Denoting with 1/β= α-1/α, the computations just above imply that
H_α^1/α(_S^n_⊗_j=1^n S_j) ≤∏_i=2^n max_x∈suppS_i-1 H_α^1/α(_S_i|S_i-1=x_S_i)
≤∏_i=2^n 2^1/α-1 + i/β = ∏_i=2^n 2^-1/β+ i/β = 2^1/β∑_i=2^n (i-1) = 2^1/β∑_j=1^n-1 j = 2^n(n-1)/2β.
§ PROOF OF THE INEQUALITIES IN (<REF>) AND (<REF>)
Given the setting, denoting with y_n = ∑_i=1^n-1p_ix_i, one has that
H_α(_X^n|X^n-1=x_1^n-1(1/2,1/2)) = (1/2)^1-α((1/2+∑_i=1^n-1p_ix_i)^α+(1/2-∑_i=1^n-1p_ix_i)^α)
≤(1/2)^1-α((1/2+∑_i=1^n-1p_ix_i)^⌊α⌋+(1/2-∑_i=1^n-1p_ix_i)^⌊α⌋)
= (1/2)^1-α(∑_k=0^⌊α⌋⌊α⌋k(1/2)^⌊α⌋-ky_n^k + ∑_k=0^⌊α⌋⌊α⌋k(1/2)^⌊α⌋-k(-y_n)^k)
= (1/2)^1-α(∑_k=0^⌊α⌋⌊α⌋k(1/2)^⌊α⌋-k(y_n^k +(-y_n)^k))
= (1/2)^1-α(∑_j=0^⌊α/2⌋⌊α⌋2j(1/2)^⌊α⌋-2j2y_n^2j)
≤ 2∑_j=0^⌊α/2⌋⌊α⌋2j (2y_n)^2j.
Moreover, setting p_i = 2^-i-1 gives
max_x_1^n-1H_α(_X^n|X^n-1=x_1^n-1(1/2,1/2)) ≤2max_x_1^n-1∑_j=0^⌊α/2⌋⌊α⌋2j(2∑_i=1^n-1p_ix_i)^2j
=2 ∑_j=0^⌊α/2⌋⌊α⌋2j(∑_i=1^n-12^-i)^2j
=2∑_j=0^⌊α/2⌋⌊α⌋2j(1-2^-n+1)^2j
≤ 2∑_j=0^⌊α/2⌋⌊α⌋2j = 2^⌊α⌋≤ 2^α.
|
http://arxiv.org/abs/2303.06715v1
|
20230312173804
|
Transversal motion planning
|
[
"Cesar A. Ipanaque Zapata",
"Fernando R. Chu Rivera"
] |
math.AT
|
[
"math.AT"
] |
Transversal motion planning]
Transversal motion planning
Departamento de Matemática, Universidade de São Paulo
Instituto de Matemática e Estatística -IME/USP, R. do Matão, 1010 - Butantã, CEP:
05508-090 - São Paulo, Brasil
[email protected]
Facultad de Ciencias Matemáticas - FCM-UNMSM,
Ciudad Universitaria - UNMSM, Av. República de Venezuela 3400, Cercado de Lima, Lima, Perú
[email protected]
[2010]Primary 55M30, 57Q65; Secondary 14F35.
The first author would like to thank grant#2022/03270-8, São Paulo Research Foundation (FAPESP) for financial support.
In this paper, we introduce the notion of transversal topological complexity (TTC) for a smooth manifold X with respect to a submanifold of codimension 1 together with basic results about this numerical invariant. In addition, we present several examples of explicit transversal algorithms.
[
Fernando R. Chu Rivera
March 30, 2023
==========================
§ INTRODUCTION
Let X be the space of all possible obstacle-free configurations or states of a given autonomous system. A motion planning algorithm on X is a function which, to any pair of configurations (C_1,C_2)∈ X× X, assigns a continuous motion μ of the system, so that μ starts at the given initial state C_1 and ends at the final desired state C_2. The fundamental problem in robotics, the motion planning problem, deals with how to provide, to any given autonomous system, with a motion planning algorithm.
For practical purposes, a motion planning algorithm should depend continuously on the pair of points (C_1,C_2). Indeed, if the autonomous system performs within a noisy environment, absence of continuity could lead to instability issues in the behavior of the motion planning algorithm. Unfortunately, a (global) continuous motion planning algorithm on a space X exists if and only if X is contractible. Yet, if X is not contractible, we could care about finding local continuous motion planning algorithms, i.e., motion planning algorithms s defined only on a certain open subset of X× X, to which we refer as the domain of definition of s. In these terms, a motion planner on X is a set of local continuous motion planning algorithms whose domains of definition cover X× X. The topological complexity of X <cit.>, TC(X), is then the minimal cardinality among motion planners on X, while a motion planner on X is said to be optimal if its cardinality is TC(X). The design of explicit motion planners that are reasonably close to optimal is one of the challenges of modern robotics (see, for example Latombe <cit.> and LaValle <cit.>).
In more detail, the components of the motion planning problem via topological complexity are as follows (see <cit.>):
Ingredients in the motion planning problem via topological complexity:
* The obstacle-free configuration space X. The topology of this space is assumed to be fully understood in advance.
* Query pairs C=(C_1,C_2)∈ X× X. The point C_1∈ X is designated as the initial configuration of the query. The point C_2∈ X is designated as the goal configuration.
In the above setting, the goal is to either describe a motion planner, i.e., describe
enumi2
* An open covering U={U_1,…,U_k} of X× X;
* For each i∈{1,…,k}, a local continuous motion planning algorithm, i.e., a continuous map s_i U_i→ X^[0,1] satisfying
s_i(C)(j)=C_j+1, j=0,1
for any C=(C_1,C_2)∈ U_i (here X^[0,1] stands for the free-path space on X joint with the compact-open topology),
or, else, report that such an planner does not exist.
Let X be a smooth manifold and Z⊂ X be a submanifold with codimension 1.
A path Γ:[0,1]→ X is semi-transversal to Z, denoted by Γ⋔_s Z, if Γ(t)∈ Z with t∈ (0,1), implies that Γ is smooth in t and ⟨Γ'(t)⟩+T_Γ(t)Z=T_Γ(t)X (equivalently, Γ'(t)∉ T_Γ(t)Z), where ⟨Γ'(t)⟩ is the subspace generated by Γ'(t). Note that, if Γ is transversal to Z (we will denote Γ⋔ Z) then Γ⋔_s Z.
The path Γ [0,1]→ℝ^2 given by
Γ(t)=
(1-2t)(-1,0)+2t(0,1), for 0≤ t≤ 1/2;
(2-2t)(0,1)+(1-2t)(1,0), for 1/2≤ t≤ 1;
is semi-transversal to Z={(x,x): x∈ℝ} but is not transversal to Z. In fact, Γ is not smooth in t=1/2.
[x=.9cm,y=.9cm]
(-2,0)–(2,0);
(0,-2)–(0,2);
(-2,-2)–(2,2);
[->](-1,0)–(0,1);
[->](0,1)–(1,0);
[below] at (-1,0) (-1,0);
[below] at (1,0) (1,0);
[above] at (0,1) (0,1);
[above] at (1,1) Z;
Investigation of the problem of transversal motion planners for a robot, with state space X, leads us to study the pair (X,Z), where Z is a submanifold of X with codimension 1. The submanifold Z may characterize some desired geometry for the motion planning algorithm. A (local) transversal motion planning algorithm in X with respect to Z assigns to any pair of configurations (C_1,C_2) in (an open set of) X× X a path of configurations
Γ(t)∈ X, t∈ [0,1],
such that Γ(i)=C_i+1 for i=0, 1 and Γ⋔_s Z.
In this work we introduce the notion of transversal topological complexity together with basic results about this numerical invariant. Proposition <ref> together with Example <ref> give the motivation to introduce the tranversal topological complexity (Definition <ref>). Examples <ref> and <ref> present transversal algorithms in euclidean spaces. We define the notion of transversal LS category (Definition <ref>) and present a lower bound for transversal complexity in terms of transversal LS category (Proposition <ref>). Proposition <ref> shows an explicit construction of transversal algorithms through diffeomorphisms. Examples <ref> and <ref> show that submanifold Z may imply some desired geometry for the motion planning algorithm.
§ TRANSVERSAL TOPOLOGICAL COMPLEXITY
In this section we present the notion of transversal topological complexity (Definition <ref>) together with basic results about this numerical invariant (Lemma <ref> and Propositions <ref> and <ref>). Several examples are presented to illustrate the result arising in this field (Examples <ref>, <ref>, <ref> and <ref>). Examples <ref> and <ref> show that submanifold Z may imply some desired geometry for the motion planning algorithm.
Let X^[0,1] stand for the free-path space of a topological space X. Recall that Farber's topological complexity TC(X) is the sectional category of the end-points evaluation fibration e_2^X X^[0,1]→ X× X, e_2^X(γ)=(γ(0),γ(1)). We use sectional category of a fibration p E→ B in the non reduced sense, i.e., it is the minimal number of open sets covering B and on each of which p admits a local continuous section.
From the Whitney approximation theorem <cit.> we obtain the following statement.
Let X and Y be smooth manifolds (without boundary), f,g:X→ Y be smooth maps such that there is a continuous homotopy H:X× [0,1]→ Y with H_0=f and H_1=g, then there exists a smooth homotopy G:X× [0,1]→ Y with G_0=f and G_1=g.
From <cit.> we have the following statement.
Let f:X→ Y be a smooth map and Z⊂ Y be a submanifold such that the boundary map ∂ f:∂ X→ Y is transversal to Z, then there exists a smooth map g:X→ Y homotopic to f such that ∂ g=∂ f and g⋔ Z.
Then, we have the following statement
Let X be a smooth manifold and Z⊂ X be a submanifold of codimension 1, then TC(X) coincides with the smallest positive integer k for which the product X× X is covered by k open subsets X× X=U_1∪⋯∪ U_k such that for any i=1,2,…,k there exists a continuous section s_i:U_i→ X^[0,1] of e_2^X
over U_i (i.e., e_2^X∘ s_i=incl_U_i) and s_i⋔ Z, where s_i U_i× [0,1]→ X is given by s_i(u)=s_i(u)(t) for any u∈ U_i and t∈ [0,1].
For U⊂ X× X and s:U→ X^[0,1] a continuous local algorithm, consider s:U× [0,1]→ X, s((x,y),t)=s(x,y)(t). Note that, s is a continuos homotopy with s_0=π_1 and s_1=π_2, where π_j is the projection to the j-th factor. By Lemma <ref>, there exists a smooth homotopy G:U× [0,1]→ X with G_0=π_1 and G_1=π_2. Note that the boundary map ∂ G=π_1⊔π_2 is transversal to Z, then by Lemma <ref>, there exists a smooth map F:U× [0,1]→ X homotopic to G such that ∂ F=∂ G (and thus, F_0=π_1 and F_1=π_2) and F⋔ Z. Then, the map σ U→ X^[0,1] given by σ(x,y)(t)=F((x,y),t) satisfies the conditions of the proposition. Thus, the proposition holds.
Note that, if F:U× [0,1]→ X is transversal to Z with U⊂ X× X does not implies that F_u [0,1]→ X, t↦ F_u(t)=F(u,t), is transversal to Z for any u∈ U. To see this, we have the following example.
Consider the pair (ℝ^2,S^1) and the smooth map Fℝ^2×ℝ^2×[0,1]→ℝ^2 given by F((C_1,C_2),t)=(1-t)C_1+tC_2. Note that, F⋔ S^1 but F_((1,1),(-1,1)) [0,1]→ℝ^2, F_((1,1),(-1,1))(t)=(1-2t,1), is not transversal to S^1.
Proposition <ref> says that Farber's topological complexity of X coincides with the complexity of designing smooth homotopies F:U× [0,1]→ X with F_0=π_1 and F_1=π_2 such that F⋔ Z. However, Example <ref> motives the following definition.
The transversal topological complexity TTC(X,Z) of a path-connected smooth manifold (without boundary) X with respect to a submanifold (without boundary) Z with codimension 1 is the smallest positive integer TTC(X,Z)=k for which the product X× X is covered by k open subsets X× X=U_1∪⋯∪ U_k such that for any i=1,2,…,k there exists a continuous section s_i:U_i→ X^[0,1] of e_2^X over U_i (i.e., e_2^X∘ s_i=incl_U_i) and s_i(x,y)⋔_s Z for any (x,y)∈ U_i. We call such a collection of local sections a transversal motion planner with k
domains of continuity. If no such k exists, we set TTC(X,Z)=∞.
Note that TC(X)≤TTC(X,Z) for any smooth manifold X and any submanifold Z⊂ X with codimension 1.
Consider the pair (ℝ^n, ℝ^n-1), with the latter understood as the submanifold ℝ^n-1×{0}⊂ℝ^n. We claim that the transversal topological complexity of this pair is 1. Indeed, consider the (global) algorithm s:ℝ^n×ℝ^n→ (ℝ^n)^[0,1] defined by
s(C_1,C_2)(t)=
(1-2t)C_1+2te_n, for 0≤ t≤ 1/2;
(2-2t)e_n+(2t-1)C_2, for 1/2≤ t≤ 1;
where e_n=(0,…,0,1)∈ℝ^n.
This map (see Figure <ref>) is continuous and satisfies the transversal condition: If s(C_1,C_2)(t)∈ℝ^n-1 with t∈ (0,1),
then
s'(C_1,C_2)(t)=
2(e_n-C_1), for 0< t<1/2;
2(C_2-e_n), for 1/2< t<1;
Hence, s'(C_1,C_2)(t)∉ℝ^n-1.
For the pair (ℝ^d+1,_i=1^nS^d_i(0)) where S^d_i(0) is the d-dimensional sphere with center 0 and radius i, i=1,…,n, then we have that the transversal topological complexity TTC(ℝ^d+1,_i=1^nS^d_i(0))=1. To check this, we have that the map s:ℝ^d+1×ℝ^d+1→(ℝ^d+1)^[0,1] given by
s(C_1,C_2)(t)=
(1-2t)C_1, for 0≤ t≤ 1/2;
(2t-1)C_2, for 1/2≤ t≤ 1;
defines a global continuous transversal algorithm in ℝ^d+1 with respect to _i=1^nS^d_i(0) (see Figure <ref>).
Let X be a smooth manifold, Z⊂ X be a 1-codimension submanifold and x_0∈ X∖ Z. We have the following statement.
There exists a continuous transversal algorithm s:X× X→ X^[0,1] with respect to Z if and only if there exists a continuous nulhomotopy H:X× [0,1]→ X with H_0=1_X, H_1=x_0 and H(x,-)⋔_s Z for any x∈ X.
Suppose that s:X× X→ X^[0,1] is a continuous transversal algorithm with respect to Z. The map H:X× [0,1]→ X given by H(x,t)=s(x,x_0)(t) defines a continuous nulhomotopy with H_0=1_X, H_1=x_0 and H(x,-)⋔_s Z for any x∈ X.
Now, suppose that H:X× [0,1]→ X is a continuous nulhomotopy with H_0=1_X, H_1=x_0 and H(x,-)⋔_s Z for any x∈ X. The map s:X× X→ X^[0,1] given by
s(x,y)(t)=
H(x,2t), for 0≤ t≤ 1/2;
H(y,2-2t), for 1/2≤ t≤ 1;
defines a continuous transversal algorithm with respect to Z (here we use that x_0∉ Z).
Lemma <ref> implies the notion of transversal LS category.
Let X be a smooth manifold and Z⊂ X be a 1-codimension submanifold. The transversal LS category of X with respect to Z, denoted by Tcat(X,Z), is the smallest positive integer k for which the space X is covered by k open subsets X=U_1∪⋯∪ U_k such that for each i=1,2,…,k there exists a continuous map H:U_i× [0,1]→ X with H_0=incl_U_i, H_1=constant and H(x,-)⋔_s Z for any x∈ U_i. If no such k exists, we set Tcat(X,Z)=∞.
Note that Tcat(X,Z)≥cat(X), where cat(X) is the LS category of X. From <cit.>, the LS category of X is the least integer k such that X can be covered by k open sets, all of which are contractible within X.
Consider the pair (ℝ^2,S^1_1⊔ S^1_2), where S^1_1 is the 1-sphere with center O_1=(-2,0) and S^1_2 is the 1-sphere with center O_2=(2,0) (see Figure <ref>). We have that Tcat(ℝ^2,S^1_1⊔ S^1_2)=2.
We will prove Tcat(ℝ^2,S^1_1⊔ S^1_2)≤2, the lower bound is a technical exercise which we leave to the reader. Consider the open sets:
U_1 =π^-1(-∞,1/2),
U_2 =π^-1(-1/2,+∞),
where π:ℝ^2→ℝ is the natural projection π(x,y)=(x,0). Note that U_1∪ U_2=ℝ^2. Moreover, for each i=1,2, we can consider the map H_i:U_i× [0,1]→ℝ^2 given by
H_i(x,t) =(1-t)x+tO_i.
Note that H_i(x,0)=x, H(x,1)=O_i and H_i(x,-)⋔_s S^1_1⊔ S^1_2 for any x∈ U_i. Thus, Tcat(ℝ^2,S^1_1⊔ S^1_2)≤ 2 and therefore Tcat(ℝ^2,S^1_1⊔ S^1_2)=2.
The following statement presents a lower bound for transversal complexity in terms of transversal LS category.
Let X be a smooth manifold and Z⊂ X be a 1-codimension submanifold. We have
Tcat(X,Z)≤TTC(X,Z).
Let x_0∈ X and consider the map i_0 X→ X× X, x↦ i_0(x)=(x,x_0). For U⊂ X× X and s U→ X^[0,1] satisfying e_2^X∘ s=incl_U and s(x,y)⋔_s Z for any (x,y)∈ U, consider V=i_0^-1(U) and the map H:V× [0,1]→ X given by H(x,t)=s(x,x_0)(t) defines a continuous map with H_0=incl_V, H_1=x_0 and H(x,-)⋔_s Z for any x∈ U. Hence, we conclude that TTC(X,Z)≥Tcat(X,Z).
Consider the pair (ℝ^2,S^1_1⊔ S^1_2), where S^1_1 is the 1-sphere with center (-2,0) and S^1_2 is the 1-sphere with center (2,0). We have that the transversal topological complexity 2≤TTC(ℝ^2,S^1_1⊔ S^1_2)≤ 4. In fact, the first inequality follows from Example <ref> together with Proposition <ref>. To check the second inequality, we can consider the open sets:
A =⋂_i=1^4π^-1(ℝ∖{a_i}),
B =_i=1^4π^-1(a_i-1/4,a_i+1/4),
where π:ℝ^2→ℝ is the natural projection π(x,y)=(x,0) and a_1=(-3,0), a_2=(-1,0), a_3=(1,0) and a_4=(2,0).
Note that A∪ B=ℝ^2 and thus (A× A)∪(A× B)∪(B× A)∪(B× B)=ℝ^2×ℝ^2. Moreover,
A× B =_j=1^4A×π^-1(a_j-1/4,a_j+1/4),
B× A =_i=1^4π^-1(a_i-1/4,a_i+1/4)× A,
B× B =_i,j=1^4π^-1(a_i-1/4,a_i+1/4)×π^-1(a_j-1/4,a_j+1/4),
The following maps
s A× A→(ℝ^2)^[0,1],
s_A,j A×π^-1(a_j-1/4,a_j+1/4)→(ℝ^2)^[0,1],
s_i,A π^-1(a_i-1/4,a_i+1/4)× A→(ℝ^2)^[0,1],
s_i,j π^-1(a_i-1/4,a_i+1/4)×π^-1(a_j-1/4,a_j+1/4)→(ℝ^2)^[0,1],
given by
s(C_1,C_2)(t) =
(1-3t)C_1+3tπ(C_1), for 0≤ t≤ 1/3;
(2-3t)π(C_1)+(3t-1)π(C_2), for 1/3≤ t≤ 2/3;
(3-3t)π(C_2)+(3t-2)C_2, for 2/3≤ t≤ 1;
s_A,j(C_1,C_2)(t) =
(1-3t)C_1+3tπ(C_1), for 0≤ t≤ 1/3;
(2-3t)π(C_1)+(3t-1)d_j, for 1/3≤ t≤ 2/3;
(3-3t)d_j+(3t-2)C_2, for 2/3≤ t≤ 1;
s_i,A(C_1,C_2)(t) =
(1-3t)C_1+3td_i, for 0≤ t≤ 1/3;
(2-3t)d_i+(3t-1)π(C_2), for 1/3≤ t≤ 2/3;
(3-3t)π(C_2)+(3t-2)C_2, for 2/3≤ t≤ 1;
s_i,j(C_1,C_2)(t) =
(1-3t)C_1+3td_i, for 0≤ t≤ 1/3;
(2-3t)d_i+(3t-1)d_j, for 1/3≤ t≤ 2/3;
(3-3t)d_j+(3t-2)C_2, for 2/3≤ t≤ 1;
where d_1=d_2=(-2,0) and d_3=d_4=(2,0), define local continuous transversal algorithms with respect to S^1_1⊔ S^1_2. We have thus constructed a transversal motion planner in ℝ^2 with respect to S^1_1⊔ S^1_2 having 4 regions of continuity A× A, A× B, B× A, B× B.
The following result is technical.
Let h:M→ N be a diffeomorphism. If W⊂ N is a submanifold with codimension 1, then Z=h^-1(W)⊂ M is also a submanifold with codimension 1.
Then, the next statement shows an explicit construction of transversal algorithms through diffeomorphisms.
Let h M→ N be a diffeomorphism. If W⊂ N is a submanifold with codimension 1, then TTC(N;W)=TTC(M;h^-1(W)).
Let Z=h^-1(W)⊂ M. For U⊂ N× N and s U→ N^[0,1] satisfying e_2^N∘ s=incl_U and s(x,y)⋔_s W whenever (x,y)∈ U, consider V=(h× h)^-1(U)⊂ M× M, the map σ V→ M^[0,1] given by σ=(h^-1)_#∘ s∘(h× h)_| V defines a local section of e_2^M, where (h^-1)_#:N^[0,1]→ M^[0,1] is the induced map of h^-1, i.e., (h^-1)_#(α)=h^-1∘α.
For any (x,y)∈ V we will show that σ(x,y)⋔_s Z. First, note that (h(x),h(y))∈ U and thus Γ = s(h(x),h(y)) is such that Γ⋔_s W. Also, note that σ(x,y)=h^-1∘Γ and σ(x,y)(t)=h^-1(Γ(t)) for any t∈ [0,1]. Suppose that σ(x,y)(t_0)∈ Z for some t_0∈ (0,1), then Γ(t_0)∈ W and so Γ(t) is smooth for t∈ (0,1), and Γ'(t_0)∉ T_Γ(t_0)W. Then σ(x,y)(t) is smooth in t_0∈ (0,1) and σ'(x,y)(t_0)=(d h^-1)_Γ(t_0)(Γ'(t_0))∉ T_σ(x,y)(t_0)Z. Therefore, TTC(N;W)≥TTC(M;h^-1(W)).
The inequality TTC(M;h^-1(W))≥TTC(N;W) follows from the first part applying to h^-1 N→ M with Z⊂ M.
Consider the diffeomorphism hℝ^2→ℝ^2, h(x,y)=(x,y-x^2), whose inverse fℝ^2→ℝ^2 is given by f(a,b)=(a,a^2+b). Set W={(a,b)∈ℝ^2: b=0}, then Z=f(W)={(x,y)∈ℝ^2: y=x^2} is the parabola. From Example <ref>, we have that the map sℝ^2×ℝ^2→(ℝ^2)^[0,1] given by
s(C_1,C_2)(t)=
(1-2t)C_1+2te_2, for 0≤ t≤ 1/2;
(2-2t)e_2+(2t-1)C_2, for 1/2≤ t≤ 1;
where e_2=(0,1), is a transversal continuous algorithm with respect to the submanifold W. Then, by Proposition <ref>, the map σℝ^2×ℝ^2→(ℝ^2)^[0,1] given by, for B_1=(x_1,y_1) and B_2=(x_2,y_2):
σ(B_1,B_2)(t) =f(s(h(B_1),h(B_2))(t))
=
f((1-2t)h(B_1)+2te_2), for 0≤ t≤ 1/2;
f((2-2t)e_2+(2t-1)h(B_2)), for 1/2≤ t≤ 1;
=
f((1-2t)(x_1,y_1-x_1^2)+2te_2), for 0≤ t≤ 1/2;
f((2-2t)e_2+(2t-1)(x_2,y_2-x_2^2)), for 1/2≤ t≤ 1;
=
f((1-2t)x_1,(1-2t)(y_1-x_1^2)+2t), for 0≤ t≤ 1/2;
f((2t-1)x_2,(2-2t)+(2t-1)(y_2-x_2^2)), for 1/2≤ t≤ 1;
=((1-2t)x_1,(1-2t)^2x_1^2+(1-2t)(y_1-x_1^2)+2t), for 0≤ t≤ 1/2;
((2t-1)x_2,(2t-1)^2x_2^2+(2-2t)+(2t-1)(y_2-x_2^2)), for 1/2≤ t≤ 1;
,
defines a transversal algorithm in ℝ^2 with respect to the parabola Z.
plain
10
cornea2003lusternik O. Cornea, G. Lupton, J. Oprea and D. Tanré, `Lusternik-Schnirelmann Category', Mathematical Surveys and Monographs, 103 (American Mathematical Society, Providence, RI, 2003).
farber2003topological M. Farber, Topological complexity of motion planning. Discrete and Computational Geometry. 29 (2003), no. 2, 211–221.
pollack2010 V. Guillemin and Al. Pollack. Differential topology. Vol. 370. American Mathematical Soc., 2010.
latombe J. C. Latombe, Robot motion planning. Springer, New York (1991).
lavalle S. M. LaValle, Planning algorithms. Cambridge University Press, Cambridge. (2006).
lee2012 J. Lee, Introduction to smooth manifolds. springer, 2012.
zapata2020 C. A. I. Zapata and J. Gonzalez, Multitasking collision-free optimal motion planning algorithms in Euclidean spaces. Discrete Mathematics, Algorithms and Applications, 12, no. 3 (2020) 2050040. doi:10.1142/S1793830920500408
|
http://arxiv.org/abs/2303.07287v1
|
20230313170319
|
Tight Non-asymptotic Inference via Sub-Gaussian Intrinsic Moment Norm
|
[
"Huiming Zhang",
"Haoyu Wei",
"Guang Cheng"
] |
stat.ML
|
[
"stat.ML",
"cs.LG",
"econ.EM"
] |
Anyon condensation in the string-net models
Fiona J. Burnell
March 30, 2023
===========================================
In non-asymptotic statistical inferences, variance-type parameters of sub-Gaussian distributions play a crucial role. However, direct estimation of these parameters based on the empirical moment generating function (MGF) is infeasible. To this end, we recommend using a sub-Gaussian intrinsic moment norm [Buldygin and Kozachenko (2000), Theorem 1.3] through maximizing a series of normalized moments. Importantly, the recommended norm can not only recover the exponential moment bounds for the corresponding MGFs, but also lead to tighter Hoeffiding's sub-Gaussian concentration inequalities. In practice, we propose an intuitive way of checking sub-Gaussian data with a finite sample size by the sub-Gaussian plot. Intrinsic moment norm can be robustly estimated via a simple plug-in approach. Our theoretical results are applied to non-asymptotic analysis, including the multi-armed bandit.
§ INTRODUCTION
With the advancement of machine learning techniques, computer scientists have become more interested in establishing rigorous error bounds for desired learning procedures, especially those with finite sample validity <cit.>. In specific settings, statisticians, econometricians, engineers and physicist have developed non-asymptotic inferences to quantify uncertainty in data; see <cit.>. Therefore, the concentration-based statistical inference has received a considerable amount of attention, especially for bounded data <cit.> and Gaussian data <cit.>. For example, Hoeffding's inequality can be applied to construct non-asymptotic confidence intervals based on bounded data[Recently, <cit.> obtained a sharper result than Hoeffding’s inequality for bounded data.].
However, in reality, it may be hard to know the support of data or its underlying distribution. In this case, misusing Hoeffding's inequality <cit.> for unbounded data will result in a notably loose confidence interval (CI); see Appendix <ref>. Hence, it is a common practice to assume that data follow sub-Gaussian distribution <cit.>.
By the Chernoff inequality[For simplicity, we consider centered random variable (r.v.) with zero mean throughout the paper for all sub-Gaussian r.v..], we have (X ≥ t) ≤inf_s > 0{exp{-st}exp{sX}}, ∀ t ≥ 0. Hence, tightness of a confidence interval relies on how we upper bound
the moment generating function (MGF) exp{ s X} for all s > 0. This can be further translated into the following optimal variance proxy of sub-Gaussian distribution.
A r.v. X is sub-Gaussian (sub-G) with a variance proxy σ^2 [denoted as X ∼subG(σ^2)] if its MGF satisfies exp(tX) ≤exp(σ^2 t^2 / 2) for all t ∈ℝ. The sub-Gaussian parameter σ_opt(X) is defined by the optimal variance proxy <cit.>:
σ^2_opt(X):= inf{σ^2 > 0 : exp(tX) ≤exp{σ^2 t^2 / 2}, ∀ t ∈ℝ}=2 sup_t ∈t^-2log [exp(t X)].
Note that
σ^2_opt(X) ≥VarX; see (<ref>) in Appendix <ref>. When σ_o p t^2(X)=VarX, it is called strict sub-Gaussianity <cit.>. Based on Theorems 1.5 in <cit.>, we have
( X ≥ t ) ≤exp{- t^2/2 σ^2_opt(X)}, (|∑_i=1^nX_i| ≥ t )≤ 2exp{-t^2/2 ∑_i=1^nσ_opt^2(X_i)}.
for independent sub-G r.v.s X and { X_i}_i = 1^n. The above inequality (<ref>) provides the tightest upper bound over the form (X > t) ≤exp (-C t^2) (or (|∑_i = 1^n X_i | > t) ≤exp (-C t^2)) for some positive constant C via Chernoff inequality.
Given {X_i}_i = 1^n i.i.d.∼subG(σ^2_opt(X)), a straightforward application of (<ref>) gives an non-asymptotic 100(1-α)% CI
X=0 ∈ [X_n±σ_opt(X)√(2n^-1log (2/α))].
A naive plug-in estimate[We point out that a conservative and inconsistent estimator 2 inf_t ∈log (n^-1∑_i = 1^n exp(t X_i))/t^2 was proposed in statistical physics literature <cit.>.] of σ_opt^2(X):=2 sup_t ∈t^-2log [exp(t X)] <cit.> is
σ_opt^2(X) := 2 sup_t ∈t^-2log [n^-1Σ_i = 1^n exp(t X_i)].
However, two weaknesses of (<ref>) substantially hinder its application: (i) the optimization result is unstable due to the possible non-convexity of the objective function; (ii) exponentially large n is required to ensure the variance term Var(n^-1∑_i = 1^n exp(t X_i)) not to explode when t is large. In Section 3, we present some simulation evidence.
On the other hand, we are aware of other forms of variance-type parameter. For instance, <cit.> introduced the Orlicz norm as X_w_2:=inf{c>0: exp{|X|^2/c^2 }≤ 2}, frequently used in empirical process theory. Additionally, <cit.> suggested a norm based on the scale of moments as X_ψ_2 := max_k ≥ 2 k^- 1/ 2 ( |X|^k )^1 / k in Page 6 of <cit.>. However, as shown in Table <ref> and Appendix <ref>, both types of norm fail to deliver sharp probability bounds even for strict sub-G distributions, such as the standard Gaussian distribution and symmetric beta distribution.
§.§ Contributions
In light of the above discussions, we advocate the use of the intrinsic moment norm in the Definition <ref> in the construction of tight non-asymptotic CIs. There are two specific reasons: (i) it approximately recovers tight inequalities (<ref>); (ii) it can be estimated friendly (with a closed form) and robustly.
The following definition <ref> is from Page 6 and Theorem 1.3 in <cit.>.
X _G :=max_k ≥ 1[ 2^kk!/(2k)!X^2k]^1/(2k) = max_k ≥ 1[ 1/(2k - 1)!!X^2k]^1/(2k).
From the sub-G characterization (see Theorem 2.6 in <cit.>), X_G < ∞ iff σ_opt(X) < ∞ for any zero-mean r.v. X. Hence, the finite intrinsic moment norm of a r.v. X ensures sub-Gaussianity (satisfying Definition <ref>).
Our contributions in this paper can be summarized as follows.
1. By X _G, we achieve a sharper Hoeffding-type inequality under asymetric distribution; see Theorem <ref>(b).
2. Compared to the normal approximation based on Berry-Esseen (B-E) bounds, our results are more applicable to data of extremely small sample size. We illustrate Bernoulli observations with the comparison of two types of CIs based on the B-E-corrected CLT and Hoeffding's inequality in Figure <ref>; see Appendix <ref> for details.
3. A novel method called sub-Gaussian plot is proposed for checking whether the unbounded data are sub-Gaussian. We introduce plug-in and robust plug-in estimators for X _G, and establish finite sample theories.
4. Finally, we employ the intrinsic moment norm estimation in the non-asymptotic inference for a bandit problem: Bootstrapped UCB-algorithm for multi-armed bandits. This algorithm is shown to achieve feasible error bounds and competitive cumulative regret on unbounded sub-Gaussian data.
§ SUB-GAUSSIAN PLOT AND TESTING
Before estimating X_G, the first step is to verify X is indeed sub-G given its i.i.d. copies {X_i}_i=1^n. Corollary 7.2 (b) in <cit.> shows for r.v.s X_i ∼subG(σ_opt^2(X)) (without independence assumption)
( max_1 ≤ i ≤ j X_i ≤σ_opt(X) √(2 (log j + t))) ≥ 1-exp{ -t},
which implies max_1 ≤ i ≤ j X_i =O_(√(log j)). Moreover, we will show the above rate is indeed sharp for a class of unbound sub-G r.v.s characterized by the lower intrinsic moment norm below.
The lower intrinsic moment norm for a sub-G X is defined as
X _G̃ := min_k ≥ 1{[(2k - 1)!!]^-1X^2k}^1/(2k).
By the method in Theorem 1 of <cit.>, we obtain the following the tight rate result with a lower bound.
(a). If X _G̃>0 for i.i.d. symmetric sub-G r.v.s { X_i}_i = 1^n ∼ X, then with probability at least 1-δ
X _G̃/ X _G/2√(2 X _G^2/ X _G̃^2-1)√(log n-log C^-2(X)-loglog(2/δ))≤max _1 ≤ i ≤ nX_i/ X _G≤√(2[log n + log(2/δ)]),
where C(X)< 1 is constant defined in Lemma <ref> below; (b) if X is bounded variable, then X _G̃=0.
The upper bound follows from the proof of (<ref>) similarly. The proof of lower bound relies on the sharp reverse Chernoff inequality from Paley–Zygmund inequality (see <cit.>).
Suppose X _G̃>0 for a symmetric sub-G r.v. X. For t>0, then
(X ≥ t) ≥ C^2(X) exp{-4[2 X _G^2/ X _G̃^4- X _G̃^-2]t^2},
where C(X):=( X _G̃^2/4 X _G^2- X _G̃^2)( 4 X _G^2-2 X _G̃^2/4 X _G^2- X _G̃^2)^2[2 X _G^2/ X _G̃^2-1]∈ (0,1).
Theorem 1 of <cit.> does not optimize the constant in Paley–Zygmund inequality. In contrast, our Lemma <ref> has an optimal constant; see Appendix <ref> for details.
Sub-Gaussian plot under unbounded assumption[Sub-G plot can only be applied to data with enough samples. When n is very small, there is not enough information to suggest unbounded trends. We roughly treat the data as bounded r.v. for a very small n, and there is no need to use a sub-G plot in this case.]. By Theorem <ref>, we propose a novel sub-Gaussian plot check whether i.i.d data { X_i}_i = 1^n follow a sub-G distribution. Suppose that for each j, { X_i^*}_i = 1^j are independently sampled from the empirical distribution 𝔽_n(x) = 1/n∑_i = 1^n 1(X_i ≤ x) of { X_i}_i = 1^n. Specifically, we plot the order statistics {max_1 ≤ i ≤ j X_i^*}_j = 1^n on the plane coordinate axis, where x axis represents √(log j + 1) and y axis the value of max_1 ≤ i ≤ j X_i^*. We check whether those points have a linear tendency at the boundary: the more they are close to the tendency of a beeline, the more we can trust the data are sub-Gaussian.
The Figure <ref> shows
sub-Gaussian plot of N(0, 1) and Exp(1). It can be seen that sub-Gaussian plot of N(0, 1) shows linear tendency at the boundary, while Exp(1) shows quadratic tendency at the boundary. For the quadratic tendency, we note that if { X_i}_i = 1^n have heavier tails such as sub-exponentiality, then max_1 ≤ i ≤ j X_i =O_( log j) instead of the order O(√(log j)); see Corollary 7.3 in <cit.>.
§ FINITE SAMPLE PROPERTIES OF INTRINSIC MOMENT NORM
In this section, we characterize two important properties of the intrinsic moment norm that are used in constructing non-asymptotic confidence intervals.
§.§ Basic Properties
Lemma <ref> below establishes that the intrinsic moment norm is estimable.
For sub-G X, we have
max_m ∈ 2 ℕ[ X^m/(m - 1)!!]^1 / m < ∞, where 2 ℕ:={2 ,4, ⋯} is the even number set.
Lemma <ref> ensure that for any sub-Gaussian variable X, its intrinsic moment norm can be computed as
X _G := max_m ∈ 2 ℕ[ X^m/(m - 1)!!]^1 / m = max_1 ≤ k ≤ k_X[ X^2k/(2k - 1)!!]^1 / (2k)
with some finite k_X < ∞.
This is an important property that other norms may not have. The X_ψ_2 := max_k ≥ 2 k^- 1/ 2 ( |X|^k )^1 / k for Gaussian X achieves its optimal point at k = ∞; see Example <ref> in Appendix <ref>. As for σ_opt^2(X):=2 sup_t ∈log [exp(t X)]/t^2, it is unclear that its value can be achieved at a finite t. Note that if k_X = 1, one has X_G^2 =Var(X).
Next, we present an example in calculating the values of k_X. Denote . Exp(1) |_[0, M] as the truncated standard exponential distribution on [0, M] with the density as f(x) = e^-x/∫_0^M e^-x dx 1_{x ∈ [ 0, M]}.
a. X ∼ U[-a, a], k_X = 1 for any a ∈ℝ; b. X ∼. Exp(1) |_[0, 2.75] - . Exp(1) |_[0, 2.75], k_X = 2; c. X ∼. Exp(1) |_[0, 3] - . Exp(1) |_[0, 3], k_X = 3. Indeed, for any fixed k_0 ∈ℕ, we can construct a truncated exponential r.v. X:=. Exp(1) |_[0, M] such that k_X = k_0 by properly adjusting the truncation level M.
The above Theorem <ref> gives an important advantage of our norm. Moreover, our norm has another important advantage: it will give exactly the simplest structure for bounded random variable.
Let X be any zero-mean bounded random variable, then
max_m ∈ 2 ℕ[ X^m/ Z^m]^1 / m = 2
Suppose that X ∈ [a, b], then
X_2k = [ X^2k]^1 / (2k)≤[ (a^2 ∨ b^2)^k ]^1 / (2k) = √((a^2 ∨ b^2)).
On the other hand,
Z_2k = [ 2^k/√(π)Γ( k + 1/2)]^1 / (2k)
is a strictly increasing function of k. This implies X_2k / Z_2k is a strictly decreasing function. Hence, it will achieve maximum at k = 1, i.e. m = 2.
Theorem <ref> gives a nice property that, for any bounded random variable X, X will be strictly sub-Gaussian, and hence its sub-G is its variance itself.
§.§ Concentration for summation
In what follows, we will show another property of X _G that it recovers nearly tight MGF bounds in Definition <ref>. More powerfully, it enables us to derive the sub-G Hoeffding's inequality (<ref>).
Suppose that {X_i}_i=1^n are independent r.v.s with max_i ∈ [n] X_i _G <∞. We have
(a). If X_i is symmetric about zero, then exp{ t X_i}≤exp{t^2 X_i _G^2/2} for any t ∈ℝ, and
P(|∑_i = 1^n X_i | ≥ s ) ≤ 2exp{-s^2/ [2∑_i = 1^n X_i _G^2 ]}, s ≥ 0.
(b). If X_i is not symmetric, then exp{tX_i}≤exp{(17/12)t^2 X_i _G^2/2} for any t ∈ℝ, and
P(|∑_i = 1^n X_i | ≥ s ) ≤ 2 exp{-(12/17)s^2/ [2∑_i = 1^n X_i _G^2 ]}, s ≥ 0.
Theorem <ref>(a) is an existing result in Theorem 2.6 of <cit.>. For Theorem <ref>(b), we obtain √(17/12)≈ 1.19, while Lemma 1.5 in <cit.> obtained exp{tX_i}≤exp{t^2/2(√(3.1) X_i_G)^2} for t ∈ℝ with √(3.1)≈ 1.32. Essentially, √(17/12)>1 appears for asymmetric variables, since ·_G is defined by comparing a Gaussian variable G that is symmetric. A technical reason for this improvement is that ·_G does not need Stirling's approximation for attaining a sharper MGF bound when expanding the exponential function by Taylor's formula. To show the tightness of Theorem <ref>(b), in Figure <ref>, we give some comparisons with σ_o p t(X), √(17/12) X _G, √(2e)X_ψ_2, X_w_2/√(2) and √(VarX) in terms of confidence length in Table <ref>, when X is Bernoulli or beta distribution.
§ ESTIMATION OF THE INTRINSIC MOMENT NORM
A first thought to estimate
X_G is by the plug-in approach. Although k_X is proven to be finite in Lemma <ref>, its (possibly large) exact value is still unknown in practice. Instead, we use a non-decreasing index sequence {κ_n} to replace k_X in the estimation. Hence, we suggest a plug-in feasible estimator
X _G = max_1 ≤ k ≤κ_n[ 1/(2k - 1)!!1/n∑_i = 1^n X_i^2k]^1/(2k).
Deriving the non-asymptotic property of the X_G is not an easy task: the maximum point k̂(κ_n):=max_1 ≤ k ≤κ_n[ 1/(2k - 1)!!1/n∑_i = 1^n X_i^2k]^1/(2k) will change with the sample size n even κ_n is fixed.
To resolve this, we first examine the oracle estimator defined as X_G = [ 1/(2k_X - 1)!!1/n∑_i = 1^n X_i^2k_X]^1/2 k_X.
Here, based on Orlicz norm Y_ψ_θ:=inf{t>0: Eexp{|Y|^θ / t^θ}≤ 2 } of sub-Weibull r.v. Y with θ >0 <cit.>, we present the non-asymptotic concentration of X_G around it ture value X _G.
Suppose {X_i}_i = 1^n i.i.d.∼ X and X satisfies X_ψ_1/k_X<∞, then for any t > 0,
( | X _G^2 k_X - X_G^2 k_X| ≤ 2 e X_ψ_1/k_X C(k_X^-1){√(t/n) +γ^2 k_X A(k_X^-1) t^k_X/n}) ≥ 1-2 e^-t,
where the constant γ≈ 1.78, and the constant functions C(·) and A(·) are defined in Appendix <ref>.
The exponential-moment condition X_ψ_1/k_X<∞ is too strong for the error bound of X _G^2 k_X - X_G^2 k_X in Proposition <ref>, although it has exponential decay probability 1- 2exp( - t).
Except for the direct plug-in estimator, here we resort to the median-of-means (MOM, Page244 in <cit.>) as the robust plug-in estimator of intrinsic moment norm. Let m and b be a positive integer such that n=m b and let B_1, …, B_b be a partition of [n] into blocks of equal cardinality m. For any s ∈[b], let _m^B_s X = m^-1∑_i ∈ B_s X_i for independent data {X_i}_i=1^n. The MOM version intrinsic moment norm estimator is defined as
X _b,G:= max_1 ≤ k ≤κ_nmed_s ∈ [b]{[[(2 k-1) ! !]^-1_m^B_s X^2k]^1/(2k)}.
As stated in Proposition <ref>, the naive plug-in estimator X _G = X _1,G is not robust. MOM estimators (<ref>) with b≫ 1 have two merits: (a) it only needs finite moment conditions, but the exponential concentration bounds are still achieved; (b) it permits some outliers in the data. Non-asymptotic inferences require to bound for X_G exactly by a feasible estimator X _b,G up to a sharp constants. Next, we establish a high-probability upper bound for the estimated norm, if the data has O ∪ I outlier assumptions as follows.
* (M.1) Suppose that the data {X_i}_i=1^n contains n-n_o inliers {X_i}_i ∈ I drawn i.i.d. according to a target distribution, and there are no distributional assumptions on n_o outliers {X_i}_i ∈ O;
* (M.2) b=b_O+b_S, where b_O is the number of blocks containing at least one outliers and b_S is the number of sane blocks containing no outliers. Let ε:=n_o/n be the fraction of the outliers and n_o/b<1/2. Assume here exists a fraction function η(ε) for sane block such that
b_S ≥η(ε) b for a function η(ε)∈ (0,1].
To serve for error bounds in the presence of outliers, (M.2) considers the specific fraction function of the polluted inputs; see <cit.>.
Define g_k,m(σ _k) and g̅_k,m(σ _k) as the sequences for any m ∈ℕ and 1 ≤ k ≤κ_n:
g_k,m(σ _k) : = 1 - [ X^2k/(2k - 1)!!]^-1/(2k)max_1 ≤ k ≤κ_n[ -2[m/η(ε)]^-1/2σ_k^k/( X^2 k)+ X^2k/(2k - 1)!!]^1/(2k) ;
and g_k,m(σ _k):=[2[m/η(ε)]^-1/2σ_k^k/( X^2 k)+1]^1 /(2 k)-1. We obtain a robust and non-asymptotic CI for X _G.
Suppose √(VarX^2k)≤σ _k^k for a sequence {σ _k}_k = 1^κ_n, we have
{ X _G≤[1 - max_1 ≤ k ≤κ_ng_k,m(σ _k)]^-1 X _b,G} > 1 - κ_n·e^ - 2bη(ε) (1-3/4η(ε))^2;
and { X _G≥ [1 +max _1 ≤ k ≤κ_ng_k,m(σ _k)]^-1 X _b,G} > 1 - κ_n·e^ - 2bη(ε) (1-3/4η(ε))^2 for κ_n≥κ_X under (M.1-M.2).
Theorem <ref> ensures the concentration of the estimator X_b,G when κ_n≥ k_X under enough sample. If η(ε)=1 with ε=0, then the data are i.i.d., which have no outlier, and outlier assumptions in M.1-M.2 can be dropped in Theorem <ref>. When the data is i.i.d. Gaussian vector, Proposition 4.1 in <cit.> also gave a high-probability estimated upper bound for ℓ_p-norm of the vector of Gaussian standard deviations, our result is for intrinsic moment norm.
In practice, the block number b can be taken by the adaptation method based on the Lepski method <cit.>. To guarantee high probability events in Theorem <ref>, it is required that the index sequence κ_n should not be very large for fixed b. The larger κ_n needs larger b in blocks B_1, …, B_b. In the simulation, we will see that an increasing index sequence κ_n with slow rate will lead a good performance.
Finally, we compare our two estimators (<ref>) and (<ref>), as well as the estimator (<ref>) in Figure <ref>. We consider the standard Gaussian and Rademacher variable distributed X, in the two case we have X_G^2 = σ_opt^2 (X) = Var(X) = 1. The following figure shows the performance of three estimators under sample n=10 to 1000 with κ_n just chosen as ⌈log n ⌉.
For the MOM method, we use five blocks in this simple setting. For a more complex case, one can use Lepski's method to choose b (see <cit.>), but some considerable computation cost may be introduced. From Figure <ref>, we know that the performance of the MOM estimator is best, while the naive estimator (<ref>) is worst. For the high-quality data of extremely small sample size, we can apply the leave-one-out Hodges-Lehmann method <cit.> for further numerical improvement; see Appendix <ref> for details.
§ APPLICATION IN MULTI-ARMED BANDIT PROBLEM
In the multi-armed bandit problem (MAB),
a player chooses between K different slot machines (an K-armed bandit), each with a different unknown random reward r.v.s {Y_k}_k=1^K ⊆ℝ, while each realization of a fixed arm k is independent and shares the same distribution. Further, we assume the rewards are sub-Gaussian, i.e.
Y_k-μ_k_G < ∞, k ∈ [K].
Our goal is to find the best arm with the largest expected reward, say Y_t*, by pulling arms.
In each round t ∈ [T], the player pulls an arm (an action) A_t∈ [K]. Conditioning on {A_t=k}, we define the observed reward {Y_k,t}_t ∈ [T]i.i.d.∼ P_k. The goal of the exploration in MAB is to minimize the cumulative regret after T steps:
Reg_T(Y,A):=∑_t=1^T(μ_t^⋆-μ_A_t),
i.e. the performance of any exploration strategy {A_t}_t ∈ [T]. The exploration performance is better, if we have smaller Reg_T(Y,A). Without loss of generality, we assume t^⋆=1. We seek to evaluate the expected bounds from the decomposition (see Lemma 4.5 in <cit.>),
Reg_T := Reg_T(Y,A) = ∑_k = 1^K Δ_k [∑_t=1^T1 {A_t=k}],
where is taken on the randomness of the player's actions {A_t}_t ∈ [T], and Δ_k=μ_1-μ_k is the sub-optimality gap for arm k∈ [K]/{1}. The upper bound of Reg_T is called problem-independent if the regret bound depends on the distribution of the data and does not rely on the gap Δ_k.
For each iteration t, let T_k(t):=card{1 ≤τ≤ t: A_τ=k} be the number of pull for arm k until time t during the bandit process. Then if we define Y_T_k(t):=1/T_k(t)∑_τ≤ t, A_τ=k Y_k,τ as the running average of the rewards of arm k at time t. Suppose we obtain a 100(1-δ)% CI [Y_T_k(t)-c_k(t), Y_T_k(t)+c_k(t)] for μ_k from a tight concentration inequality. Therefore, we confidently
reckon that the reward of arm k is Y_T_k(t)+c_k(t), and play the arm A_t=k, hoping to maximize the reward with a high probability for finite t. This is upper confidence bound (UCB, <cit.>) algorithms. And many works based on this methods appears recently, for example, <cit.> use bootstrap method with the second order correction to give a algorithm with the explicit regret bounds for sub-Gaussian rewards. However, many existent algorithms contain unknown norms for the random rewards, they are actually infeasible. And Theorem 4 is one example with explicit regret bound. For instance, the algorithm <cit.> needs to use the unknown Orlicz-norm of Y_k - μ_k in the algorithm. Thus, it is actually infeasible in practice.
Fortunately, our estimator can solve this problem. Suppose that Y_k-μ_k is symmetric around zero, by one-side version of Theorem <ref>, the (<ref>) implies that for all k and all t,
(Y_T_k(t) > μ_k+Y_k-μ_k_G√(2/T_k(t)log1/δ) )≤δ.
Let sub-sample size m_k and block size b_k be positive integer such that T_k(t) = m_k b_k for MOM estimators Y_k-μ_k_b_k,G in Section 3. Theorem <ref> (a) guarantee that true norms can be replaced by MOM-estimated norms such that
(Y_T_k(t)≤μ_k+Y_k-μ_k_b_k,G/1-o(1)√(2/T_k(t)log1/δ))≥ 1-δ- k_Y_k·exp (- b_k / 8) if η(ε)=1 with ε=0.
If the UCB algorithm is correctly applied, for a finite T_k(t), with high probability, we will pull the best arm.
In practice, we nearly do not know any knowledge about the data. As a flexible way of uncertainty qualification, the multiplier bootstrap <cit.> enables mimicking the non-asymptotic properties of the target statistic by reweighing its summands of the centralized empirical mean. The multiplier bootstrapped quantile for the i.i.d. observation _n:={ Y_i}_i = 1^n is the (1 - α)-quantile of the distribution of n^-1∑_i = 1^n w_i (Y_i - Y_n), which is defined as
q_α (_n - Y_n, 𝐰) := inf{ x ∈ℝ | _w (n^-1∑_i = 1^n w_i (Y_i - Y_n) > x) ≤α},
where 𝐰 := { w_i }_i = 1^n are bootstrap random weights independent of _n. We denote the statistics φ_G (𝐘_n) as something satisfying _𝐘_n ( |Y_n - Y_1 | ≥φ_G (𝐘_n) ) ≤α.
Motivated by <cit.>, we design Algorithm 1 based on some estimators of the UCB. It guarantees a relatively small regret by bootstrapped threshold q_α / 2 (_T_k(t) - Y_T_k(t), 𝐰) adding a concentration based second-order correction φ_G (_T_k(t) ) that is specified in Theorem <ref>.
In the following regret bounds, we assume the mean reward from the k-th arm μ_k is known. In practice, it can be replaced by a robust estimator, and we obtain the results of MOM estimator.
Consider a K-armed sub-G bandit under (<ref>) and suppose that Y_k - μ_k is symmetric around zero. For any round T, according to moment conditions in Theorem <ref>, choosing φ_G (_T_k(t)) as
φ_G (_T_k(t)) = √(2 log(4 / α))/T_k^1 / 2(t) - 1Y_k - μ_k _b_k,G
as a re-scaled version of MOM estimator Y_k - μ_k _b_k,G with block number b_k satisfying the moment assumptions <ref>[UCB1] and <ref>[UCB2] in Appendix <ref>. Fix a confidence level α = 4 / T^2, if the player pull an arm A_t∈ [K] according to Algorithm 1, then we have the problem-dependent regret of Algorithm 1 is bounded by
Reg_T≤ 16 (2 + √(2))^2 max_k ∈ [K]Y_k - μ_k _G^2 log T ∑_k = 2^K Δ_k^-1 + ( 4 T^-1 + 2 T^- 25 - 16 √(2) + 8) ∑_k = 2^K Δ_k,
where Δ_k is the sub-optimality gap. Moreover, let μ_1^* := max_k_1 ∈ [K]μ_k_1 - min_k_2 ∈ [K]μ_k_2 be the range over the rewards, the problem-independent regret
Reg_T≤ 8 (2 + √(2)) max_k ∈ [K]Y_k - μ_k _G √(T K log T) + ( 4 T^-1 + 2 T^-25 - 16 √(2) + 8 ) K μ_1^*.
From Theorem <ref>, we know that the regret of our method achieve minimax rate log T for a problem-dependent problem and √(KT) for a problem-independent case (see <cit.>), so Algorithm <ref> can be seen as an optimal algorithm. Compared with the traditional vanilla UCB, we do improve the constant. When Y_k ∼ N(μ_k, 1), the constant factor in regret bound in <cit.> is 256, which is larger than 16 (2 + √(2))^2 in our theorem.
When the UCB has unknown sub-G parameters, Theorem 4 first studies a feasible UCB algorithm with sub-G parameter plugging estimation. Many previous UCB algorithms based on non-asymptotic inference in the literature assume that the sub-G parameter is a preset constant, see the algorithm in <cit.> for instance.
Next, we give an simulation for Theorem <ref> in two sub-G cases to verify the performance of estimated norms. Similar to <cit.>, we design the three methods as follows:
1. Use our method φ(_T_k(t)) with Estimated Norm in Theorem <ref>;
2. Use Asymptotic Naive varphi φ(_T_k(t)) satisfying (|Y_T_k(t) - μ_k| ≤φ(_T_k(t)) ) →α by CLT, i.e.
φ(_T_k(t)) = σ_k Φ^-1 (1 - α / 2) /√(T_k(t))
with σ_k = √(1/T_k(t)∑_τ≤ t, A_τ=k (Y_k,τ - Y_T_k(t))^2) as the estimated standard deviation;
3. Regard all the unbounded rewards as bounded r.v. and use Hoeffding's inequality (wrongly use Hoeffding's inequality) to construct φ, i.e.
φ̌(_T_k(t)) = [max{_T_k(t)} - min{_T_k(t)}] √(log (2 / α)/2T_k(t)).
For our detailed MAB simulation, we consider as follows, in each case, the number of arms is assigned as K = 10, and the mean reward from k-th arm μ_k is independently drawn from Exp(1). We consider two types of unbounded reward distributions: EG1. Gaussian N(μ_k, 1); EG2. Mixture Gaussian p_k × N(2 μ_k, 1) + (1 - p_k) × N (1 - 2p_k/1 - p_kμ_k, 1) with p_k ∼ U(0, 1/2).
We also use Thompson Sampling <cit.> with Gaussian for both its reward and prior distribution and tuning the prior parameters on { 2^4- k}_k = 1^6 with its best performance as a strong baseline in this simulation.
As we can see, EG1 and EG2 are both sub-Gaussian rewards. In the simulation, μ_k may not be bounded, complicating this problem. The simulation results are shown in Figure <ref>. These results show that our method outperforms the other two methods under unbounded sub-Gaussian rewards and is even comparable to Thompson Sampling when sufficient correct prior knowledge is available. Furthermore, the smallest standard derivation of our method demonstrates the strong robustness of our estimated norm method.
§.§ Acknowledgments
The research of H. Zhang was supported in part by National Natural Science Foundation of China (Grant 12101630). The research of G. Cheng was supported in part by NSF – SCALE MoDL (2134209).
The authors thank Prof. Hongjun Li for the early discussions, as well as Dr. Ning Zhang for valuable suggestions. The early version of this manuscript was submitted to ICLR 2023 on September 22, 2022; see <https://openreview.net/forum?id=c9QTkDGJ_cB>.
iclr2023_conference
Here we also give an simulation for Theorem <ref> in two sub-G and two sub-E cases to verify the performance of estimated norms. Similar to <cit.>, we design the four methods as follows:
1. Use our method φ(_T_k(t)) with Estimated Norm in Theorem <ref>;
2. Use Asymptotic Naive varphi φ(_T_k(t)) satisfying (|Y_T_k(t) - μ_k| ≤φ(_T_k(t)) ) →α by CLT, i.e.
φ(_T_k(t)) = σ_k Φ^-1 (1 - α / 2) /√(T_k(t))
with σ_k = √(1/T_k(t)_T_k(t) - Y_T_k(t) 1_T_k(t)_ℓ_2^2) as the estimated standard deviation;
3. Regard all the rewards as bounded r.v. and use Hoeffding's inequality (wrongly use Hoeffding's inequality) to construct φ, i.e.
φ̌(_T_k(t)) = [max_T_k(t) - min_T_k(t)] √(log (2 / α)/2T_k(t)).
And for our detailed MAB simulation, we consider as follows, in each case, the number of arms is assigned as K = 5, and (μ_1, …, μ_5) = 0.9 · (0.1, 0.05, 0.02, 0.01, 0.01)^⊤
A1. Y_k ∼ N(μ_k, μ_k^2); B1. Y_k ∼ sym-Exp(μ_k); B2. Y_k ∼ sym-Poisson(μ_k);
where the sym-Exp represents symmetric exponential distribution that can be generated from X_1 - X_2 + μ with X_1, X_2 i.i.d.∼Exp(μ), and sym-Poisson have the similar meaning.
As we can see, A1 is a sub-G case and B1 and B2 are sub-E cases. In the simulation, μ_k is assigned sightly small is for bounded max_kΔ_k, which is a standard-setting in the MAB problem (see the condition of Corollary 1 in <cit.> for instance). The simulation results are shown in Figure <ref>. Under the smaller sample size, our method (the green lines) has good performance compared with the other methods, and the misusing Hoeffding will give a bad result for both sub-G and sub-E cases. This phenomenon is more pronounced in the sub-E case. On the other hand, the CLT-based φ renders a moderate result that performs better for a larger sample size. As for the sub-G case, even if the rewards have the exact Gaussian tails, our method can also give a satisfactory result when the number of rounds is relatively small.
In turn, for iid sample of { X_i}_i = 1^n, we have its estimated value as
X _G =max_1 ≤ k ≤ k_X[ 2^kk!/(2k)!1/n∑_i = 1^n X_i^2k]^1/(2k).
Before doing this, a direct lemma of ·_G is that it will derive the tail probability with the exact same structure as the optimal variance proxy in Definition <ref>.
For any zero-mean random variable X, X _ψ_2 < ∞ will give X_G < ∞ and X_G < ∞ will imply X _w_2 < ∞.
Suppose X _ψ_2 < ∞. From Corollary 3.1 in <cit.>, there exists σ^2 > 0 such that
exp{ sX}≤exp{σ^2 s^2}, s ∈ℝ.
Hence, from Proposition 3.1 in <cit.>, we have X_k : = [ |X|^k ]^1 / k≤σ e^1 / e√(k) for any k ≥ 2. Therefore,
X _G ≤max_k ≥ 2 X_k/ Z_k = max_k ≥ 2[ 2^k/2/√(π)Γ( k + 1/2)]^-1 / k X_k
≤ X_2/ Z _2 + max_k ≥ 3[ 2^k/2/√(π)√(2 π)( k - 1/2e)^(k - 1)/2]^-1 / k X_k
≤ X_2/ Z _2 + max_k ≥ 3 2^-1 / k( k - 1/e)^-k - 1/2 k·σ e^1 / e√(k)
= X_2/ Z _2 + σ e^1 / emax_k ≥ 3√(k)/2^1 / k( k - 1/e)^k - 1/2 k < ∞
by the fact that √(2 π x)(x/e)^x≤Γ(x+1) for any x ≥ 2 and
lim_k →∞√(k)/2^1 / k( k - 1/e)^k - 1/2 k = lim_k →∞ e^k - 1/2k = √(e).
On the other hand, if X_G < ∞, let c = C · X_G < ∞ with some positive constant C > 0, then
exp{ |X|^2 / c^2 } ≤ 1 + 2 ∫_0^∞ s exp{s^2 / c^2} (|X| / c ≥ s ) dt
≤ 1 + 4 ∫_0^∞ s exp{s^2 / c^2}exp{ - c^2 s^2 / (2 X_G^2)} ds
= 1 + 4 ∫_0^∞ s exp{ - (c^2C^2- 2)/2c^2 s^2} d s = 1 + 4c^2/(c^2C^2- 2)≤ 2
as long as we take 4c^2/(c^2C^2- 2)≤ 1, i.e. C^2 ≥ 2 + √(4 X_G^2 + 2) / X_G. Therefore, we obtain that X_w_2≤[ 2 + √(4 X_G^2 + 2) / X_G ]^1 / 2 X_G < ∞.
A direct result from Theorem <ref> is that the intrinsic moment norm we defined is compatible with the existent definition and the condition that X_G < ∞ is exactly equivalent to X is sub-Gaussian.
Appendix
§ MORE DETAILS IN THE INTRODUCTION PART
§.§ Wrong usage of Hoeffding's inequality
This part mainly discusses some results when we use Hoeffding's inequality wrongly for the unbounded data {X_i}_i = 1^n.
If the Gaussian data {X_i}_i = 1^n i.i.d.∼ N(μ,σ^2) are misspecified as bounded variable (a bound as a function of n) with high probability, and Hoeffding's inequality is wrongly adopted for the unbounded Gaussian data, it gives
( μ∈ [X̅_n± 2 σ√(n^ - 1log (4/α )) [√(log (4/α )) + √(log n) ]) ≥ 1 - α.
Lemma <ref> gives a loose CI, since it contains a √(log n) factor.
The Borell–TIS inequality <cit.> gives the probability of a deviation of the maximum of a centered Gaussian random variables (or stochastic processes) above from its expected value. WLOG, we assume {X_i}_i = 1^n i.i.d.∼ N(0,σ^2) are misspecified as bounded variable, by Borell-TIS inequality
(max_i ∈ [n]X_i - [max_i ∈ [n]X_i] > t) ≤e^ - t^2/(2σ ^2),
we have with probability at least 1 - α/4
max_i ∈ [n]X_i≤√(2σ ^2log (4/α )) + [max_i ∈ [n]X_i] ≤σ√(2) [√(log (4/α )) + √(log n) ], i=1,2,⋯,n,
where we use the maximal inequality [max_1 ≤ i ≤ nX_i] ≤σ√(2 log n) [see Corollary 7.2 (a) in <cit.>]. Then,
(max_i ∈ [n]X_i≥σ√(2) [√(log (4/α )) + √(log n) ]) ≤α/4
and (max_i ∈ [n] (-X_i) ≥σ√(2) [√(log (4/α )) + √(log n) ]) ≤α/4 by symmetric property.
Conditioning on event
max_i ∈ [n]| X_i| ≤σ _n,α: = σ√(2)[√(log (4/α )) + √(log n) ],
For i.i.d. {X_i}_i = 1^n with a≤X_i≤b, Hoeffding's inequality gives
( |X̅_n - μ | ≥b - a/√(2)√(1/nlog (2/δ)) ) ≤δ). Let δ= α /2 and a=σ _n,α,b=-σ _n,α
[ ( |X̅_n - μ | ≥√(2)σ _n,α√(n^ - 1log (4/α ))); ≤( |X̅_n - μ | ≥√(2)σ _n,α√(n^ - 1log (4/α )) ,max_i ∈ [n]| X_i| ≤σ _n,α) + ( max_i ∈ [n]| X_i| > σ _n,α) ≤α /2 + α /2= α ]
Then, ( μ∈ [X̅_n± 2 σ√(n^ - 1log (4/α )) [√(log (4/α )) + √(log n) ] ) ≥ 1 - α.
§.§ Historical notes for sub-Gaussian and its optimal parameter
The MGF-based variance proxy in Definition <ref> for sub-Gaussian distribution dates back to <cit.>, and it is not unique which cannot be view as the parameter. So it motivates <cit.> to defined the optimal variance proxy σ^2_opt(X) as the unique parameter of sub-Gaussian distribution. σ^2_opt(X) is also called the sub-Gaussian norm in <cit.> or sub-Gaussian diameter in <cit.>. The monograph <cit.> gave comprehensive studies concerning metric characterizations for various sub-Gaussian norms of certain random variables.
From Chernoff's inequality, the exponential decay of the sub-Gaussian tail is obtained
( X ≥ t )≤inf_s > 0exp{-s t}exp{s X}≤inf_s > 0exp(-s t + σ^2_opts^2/2)= exp(- t^2/2 σ^2_opt)
by minimizing the upper bound via putting s=t/σ^2. Moreover, for independent {X_i} _i = 1^n with X_i∼subG(σ_i^2), we have sub-Gaussian Hoeffding's inequality <cit.>
(|∑_i=1^nX_i| ≥ t)≤ 2exp{-t^2/2 ∑_i=1^nσ_opt^2(X_i)}≤ 2exp{-t^2/2 ∑_i=1^nσ_i^2}, t ≥ 0
for any variance proxies {σ_i^2}_i=1^n of {X_i} _i = 1^n.
The σ^2_opt(X)
not only characterizes the speed of decay in (<ref>) but also naturally bounds the variance of X as well. To appreciate this, observe that by the definition of sub-Gaussian:
s^2/2σ^2_opt(X)+o(s^2)= exp(σ^2_opt(X) s^2/2) -1 ≥exp(s X)-1=s X +s^2/2 X^2+⋯
= s^2/2·VarX+o(s^2)
(by dividing s^2 on both sides and taking s → 0)
which implies
σ^2_opt(X) ≥VarX.
Thus, σ^2_opt(X) provides a conservative lower bound for optimal proxy variance.
Interestingly, some special distributions whose variance can attain the σ^2_opt(X). For example, Bernoulli r.v. X ∈{0,1} with mean μ∈(0,1) [denote X ∼Bern(μ)] is sub-Gaussian with
1/4≥σ_o p t^2(X)=(1-2 μ)/2 log1-μ/μ≥μ(1-μ)=Var(X)
in <cit.>, while, Hoeffding's inequality shows a crude bound X-μ∼subG(1/4). The inequality holds if the Bernoulli distributions is symmetric with μ=1/2, i.e. σ_o p t^2(X)=lim_μ→ 1/2(1 - 2μ )/2log1 - μ/μ=1/4=VarX, and the inequality σ_o p t^2(X)=VarX define the strict sub-Gaussianity:
For zero-mean X∼subG(σ^2) is called strict sub-Gaussian if VarX=σ^2_opt(X) [denote X ∼ssubG(σ^2_opt(X))].
The strict sub-Gaussian r.v.s include Gaussian, symmetric Beta, symmetric Bernoulli and U[-c,c]; <cit.> showed that by a second order ODE (with a unique solution of the Cauchy problem) Beta(α, β) has
σ_opt^2(α, β)=α/(α+β) x_0(_1 F_1(α+1 ; α+β+1 ; x_0)/_1 F_1(α ; α+β ; x_0)-1) ≥Var[Beta(α, β)],
where x_0 is a unique solution of
log(_1 F_1(α ; α+β ; x_0))=α x_0/2(α+β)(1+_1 F_1(α+1 ; α+β+1 ; x_0)/_1 F_1(α ; α+β ; x_0)). Finding the explicit expression and giving the iff condition for general distributions (such as unbounded or asymmetrical distributions) are still an open questions <cit.>.
Similar to Definition <ref>, if sub-G variable is unbounded, we define the optimal lower variance proxy that renders a sharp reverse Chernoff inequality and a sharp lower tails of sub-Gaussian maxima in below.
The optimal lower variance proxy for a sub-G X is defined as
l_opt^2(X) := sup{ l^2 ≥ 0 : 𝔼exp(tX) ≥exp{l^2 t^2 / 2}, ∀ t ∈ℝ}=2 inf_t ∈t^-2log [exp(t X)].
Suppose that l^2_opt(X)>0 for a sub-G r.v. X. For t>0, then
(X ≥ t) ≥ C_σ,l^2(X) exp{-4[2σ^2_opt(X)/l^4_opt(X)-l^-2_opt(X)]t^2},
where C_σ,l(X):=( l^2_opt(X)/4σ^2_opt(X)-l^2_opt(X))( 4σ^2_opt(X)-2l^2_opt(X)/4σ^2_opt(X)-l^2_opt(X))^2[2σ^2_opt(X)/l^2_opt(X)-1]∈ (0,1).
(a). Suppose that l^2_opt(X)>0 for i.i.d. sub-G r.v. { X_i}_i = 1^n ∼ X. With probability at least 1-δ,
l_opt(X)/σ_opt(X)/2√(2σ^2_opt(X)/l^2_opt(X)-1)√(log n-log C_σ,l^-2(X)-loglog(2/δ))≤max _1 ≤ i ≤ nX_i/σ_opt(X)≤√(2[log n + log(2/δ)),
where C_σ,l(X)< 1 is constant defined in Lemma <ref> below; (b) if X is bounded variable, then l^2_opt(X)=0.
The proof of Lemma <ref> and Proposition <ref> is similar to Lemma <ref> and Theorem <ref>.
§.§.§ Remarks for Orlicz norm and other commonly used norms
In Remarks <ref> and <ref> below, we will show (|X| ≥ t)≤ 2exp{ - t^2/2/(2eX_ψ_2^2)} and ( |X| > t ) ≤ 2 exp{-t^2/[2(X_w_2/√(2))^2]} for all t ≥ 0. The variance can be upper bounded by both norms as
(√(5/2)X_w_2)^2 ≥Var X and ( √(10e)X_ψ_2)^2 ≥Var X.
If exp(|X|^2/X_w_2^2) ≤ 2 for X_w_2<∞, then Markov's inequality gives for all t ≥ 0
( |X| > t ) ≤(e^|X / X_w_2|^2≥ e^t^2 / X_w_2^2) ≤ 2 exp{-t^2/2/(X_w_2/√(2))^2}.
Using Notes 5.4.1 in <cit.>:
if (|X|>t)≤ 2 exp{-t^2/(2σ^2)} with X = 0, then exp{s X}≤exp{5 σ^2 s^2/2}
for any s≥ 0. Therefore, we have
exp{s X}≤exp{(√(5/2)X_w_2)^2s^2/2}.
By the same argument in (<ref>), one has
(√(5/2)X_w_2)^2 ≥Var X.
(i) For X ∼ N(0,σ^2), one has X_w_2=√(8/3)σ [see Example 3.4 in <cit.>], and then we have a crude tail bound from (<ref>), (|X|>t) ≤ 2exp{-t^2/2/(4/3σ^2)}; (ii) For X ∼Bern(0.5), one has X - 0.5_w_2 = 1/2√(log 2), which leads to the bound (|X - 0.5| > t) ≤ 2 exp{ - t^2/2 / 1/4 log 2}; (iii) For X ∼ [a, b], we have X - a + b/2_w_2≤b - a/2 √(log 2) by and then (|X - a + b/2| > t) ≤exp{ - t^2/2 / (b -a)^2/2 log 2}. The results in (ii) and (iii) comes from the conclusion about bounded variables in Example 1 in <cit.>, while Hoeffding's inequality gives sharper tail inequalities (|X - μ| > t) ≤ 2 exp{ - 2 t^2} and (|X - a + b/2| > t) ≤ 2exp{ - 2t^2/(b - a)^2} in (ii) and (iii).
Recall <cit.>'s definition of sub-Gaussian norm
X_ψ_2 = max_p ≥ 1 p^-1( |X|^p )^1/ p.
By p ! ≥(p / e)^p, a crude bounds also appears. Indeed, by ( |X|^p )^1 / p≤ K √(p) for all integer p ≥ 1,
e^c^ - 1X^2 = 1 + ∑_p = 1^∞c^ - pX^2p/p! ≤ 1 + ∑_p = 1^∞c^ - p(2K^2p)^p/p!≤ 1 + ∑_p = 1^∞(2eK^2/c)^p = 1 + (2eK^2/c)∑_p = 0^∞(2eK^2/c)^p
[2eK^2/c < 1] = 1+(2eK^2/c )∑_p=0^∞(2eK^2/c )^p= 1+(2eK^2/c )1/1-2eK^2/c .
Setting 2eK^2/c≤ s<1 and assign s such that exp(c^-1 X^2) ≤ 1+s/1-s=: 2, the solution is s=1/2. Let K=X_ψ_2. We thus have c ≥4eX_ψ_2^2. The e^X^2/(4eX_ψ_2^2)≤ 2 implies
(|X| ≥ t)≤ 2e^ - t^2/(2·2eX_ψ_2^2)
by using (<ref>). Therefore,
exp{t X}≤exp{( √(10e)X_ψ_2)^2t^2/2}.
Applying the same argument in (<ref>), we get
( √(10e)X_ψ_2)^2 ≥Var X.
For X ∼ N(0,1), observe that
X_φ_2 =max_p ≥ 1 p^ - 1 / 2( |X|^p )^1 / p = lim_p →∞ p^ - 1 / 2( |X|^p )^1 / p = lim_p →∞√(2/p)[ Γ( (1 + p) / 2) /Γ (1/2)]^1 / p=1 / √(2)≈ 0.7071.
For uniform distributed X∼ U[-1, 1], one has X_φ_2 = 0.4082 and (|X| ≥ t) ≤ 2e^ - t^2/(4e· 0.4082^2)=2e^ - t^2/ 1.8122
comparing to Hoeffding’s inequality with a sharper bound (|X| ≥ t )≤ 2 e^- t^2. For X ∼Bern(μ),
1/√(p)[| X - μ|^p]^1/p = 1/√(p)[(1 - μ)μ^p + μ(1 - μ)^p]^1/p. Let μ=0.3, we have X_φ_2 = 0.3240 and (|X| ≥ t) ≤ 2e^ - t^2/(4e· 0.3240^2)=2e^ - t^2/1.1417 comparing to Hoeffding’s inequality with a sharper bound (|X| ≥ t )≤ 2 e^- 2t^2.
The (<ref>) implies
(|∑_i=1^nX_i| ≥ t)≤ 2exp{-t^2/2 ∑_i=1^n (√(10e)X_i_w_2)^2}, t ≥ 0.
The 5X_w_2^2 ≥ 2Var X implies that for strictly sub-G independent variables {X_i}_i=1^n
(|∑_i=1^nX_i| ≥ t)≤ 2exp{-t^2/2 ∑_i=1^nVar(X_i)}≤ 2exp{-t^2/5∑_i=1^nX_i_ψ_2^2}<2exp{-t^2/2 ∑_i=1^n (√(10e)X_i_w_2)^2}.
Hence, 2·_w_2-norm leads to a looser concentration bound, by comparing (<ref>).
§.§ Details for Table 1
Let {X_i} _i = 1^n be i.i.d. r.v.s with X_1=0, X_1^2=σ^2>0, and |X_1|^3=ρ<∞. <cit.> gave a tighter estimate of the absolute constant in B-E bounds for X̅_n:=1/n∑_i=1^nX_i:
Δ_n:=sup _x ∈ℝ|(√(n)/σX̅_n≤ x)-Φ(x)| ≤0.3328(ρ+0.429 σ^3)/σ^3√(n), ∀ n ≥ 1,
where Φ(·) is the cumulative distribution function of N(0,1).
Consider Bernoulli samples {X_i} _i = 1^n i.i.d.∼Ber(1/2) with σ=1/2 and ρ=1/8, and <cit.> shown Δ_n ≤ 0.409954/√(n). Put δ =0.05, 0.075, 0.1. For n ≥ 1, Hoeffding's inequality gives
( |X̅_n-1/2 | ≤1/2√(n)·√(2log (2/δ))) ≥ 1-δ.
From B-E bounds (<ref>), we have
(√(n)/σ (X̅_n-1/2) ≤ - x ) - Φ (-x) ≤Δ_n and (√(n)/σ (1/2-X̅_n) ≤ - x ) - Φ (-x) ≤Δ_n
by the symmetry of Ber(1/2). Set
(√(n)/σ (X̅_n-1/2) ≤ - x ) ≤Δ_n+Φ (-x)≤0.409954/√(n)+Φ (-x) =:δ/2;
(√(n)/σ (X̅_n-1/2) ≥ x ) ≤Δ_n+Φ (-x)≤0.409954/√(n)+Φ (-x) =:δ/2,
where x = - Φ^-1 (δ/2 -0.409954/√(n)) with δ/2 -0.409954/√(n)>0.
Then, it results in a (1 - δ)100%'s non-asymptotic CI:
( |X̅_n-1/2 | ≤ - 1/2√(n)·Φ^-1(δ/2-0.409954/√(n))) ≥ 1-δ
for n ≥ (0.8199/δ)^2, which require least sample sizes n≥ 269, 120, 68 for δ =0.05, 0.075, 0.1 respectively.
For symmetric data with zero mean and finite third moment, (<ref>) gives a trivial bound if we put 0.3328(ρ+0.429 σ^3)/σ^3√(n)≥ 1, i.e. the B-E bound is useless when
n ≤[0.3328(ρ+0.429 σ^3)]^2/σ^6.
§ SMALL SAMPLE LEAVE-ONE-OUT AVERAGE IN MOMENT NORM ESTIMATIONS
For the small sample zise (n ≤ 20), one has two other methods, except the direct empirical moment method (DE). The first one is the well-known Bootstrap. The non-parametric Bootstrap can reduce the estimator's variance and make it more robust (see p512 in <cit.>). Especially, here we use (n-1)-out-of-n Bootstrap and construct n - 1 Bootstrap estimators and then take the median of these estimators. The second robust method under small sample setting is called the leave-one-out Hodges-Lehmann method (LOO-HL) proposed by <cit.>. Specially, based on sample X = (X_1, …, X_n)^⊤∈ℝ^n, define LOO-HL empirical mean estimator as
μ̂_ LOO := med{DE (X_(-i)) + DE (X_(-j))/2 : 1 ≤ i < j ≤ n },
where DE (X_(-i)):=∑_k iX_k/(n-1) is the empirical mean estimator of
X_(-i) = { X_1, …, X_i - 1, X_i + 1, …, X_n}.
It is worthy to note that the leave-one-out method is different from classic Hodges–Lehmann empirical mean estimator μ̂_ HL :=med_i ≤ jX_i+X_j/2 which uses a single sample X_i instead of leave-one-out mean DE (X_(-i)) since in practice we find that classic Hodges-Lehmann method cannot render ideal performance.
To see the performance, we use the three methods above to calculate the relative estimators' errors based on small samples corresponding to the settings in the previous section, except we use 1% independent Cauchy(0, 5) perturbation to contaminate the original distribution. The results is shown in Figure <ref>. It can be seen that the three methods can achieve relatively good performance, while the LOO-HL method gives less error overall and is obviously better than the other two methods when 2≤ n ≤ 4.
§ PROOFS OF MAIN RESULTS
Note that X_G := max_m ∈ 2 ℕ[ X^m/ Z^m]^1 / m, where Z∼ N(0,1). If the maximum take at m = ∞,
max_m = 2k ∈ 2 ℕ[ X^m/ Z^m]^1 / m = max_k ∈ℕ[ 2^k/√(π)Γ( k + 1/2)]^-1 / (2k) X_2k
is an increasing function for some sub-sequence {k_ℓ}⊆{ k} such that lim_ℓ→∞ k_ℓ = ∞ when ℓ is large enough, where we use the formula of 2k-th moment of standard normal distribution [see (18) in <cit.>].
Therefore,
[ 2^k_ℓ/√(π)Γ( k_ℓ + 1/2)]^-1 / (2k_ℓ) X_2k_ℓ≤[ 2^k_ℓ + 1/√(π)Γ( k_ℓ + 3/2)]^-1 / (2k_ℓ + 2) X_2k_ℓ + 2
i.e.
2 k_ℓ + 1/2[ √(π)/Γ(k_ℓ + 1 / 2)]^1 / k_ℓ≤ X_2 k_ℓ + 2^2 k_ℓ + 2/ X_2 k_ℓ^2 k_ℓ + 2
for any k_ℓ is large enough. Let ℓ→∞, we have
1 = lim sup_ℓ→∞ X_2 k_ℓ + 2^2 k_ℓ + 2/ X_2 k_ℓ^2 k_ℓ + 2 ≥lim_ℓ→∞2 k_ℓ + 1/2[ √(π)/Γ(k_ℓ + 1 / 2)]^1 / k_ℓ
= lim_k_ℓ→∞ (k_ℓ + 1 / 2) [ √(π)/√(2 π) (k_ℓ + 1 / 2)^k_ℓ e^- (k_ℓ + 1 / 2)]^1 / k_ℓ = lim_ℓ→∞e^1 + 1 / (2 k_ℓ)/√(2) = e/√(2) > 1,
which leads to a contradiction, where we use a fact that lim_n →∞ X_n = X_∞ = esssup |X|, and hence
lim sup_ℓ→∞ X_2 k_ℓ + 2^2 k_ℓ + 2/ X_2 k_ℓ^2 k_ℓ + 2 = 1. As a result, one must have max_m ∈ 2 ℕ[ X^m/ Z^m]^1 / m < ∞.
lim sup_ℓ→∞ X_2 k_ℓ + 2^2 k_ℓ + 2/ X_2 k_ℓ^2 k_ℓ + 2≤lim sup_k →∞ X_2 k + 2^2 k + 2/ X_2k^2 k + 2 = lim sup_k →∞lim_M →∞ X1(|X|≤ M ∧ X_∞)_2 k + 2^2 k + 2/ X1(|X|≤ M ∧ X_∞) _2k^2 k + 2
≤lim sup_M →∞lim_p →∞lim sup_k →∞[ X1(|X|≤ M ∧ X_∞)_2 k + 2/ X1(|X|≤ M ∧ X_∞) _2k]^2p+2
≤lim sup_M →∞lim_p →∞[ M ∧ X_∞/M ∧ X_∞]^2p + 2 = 1.
If X_i is symmetric around zero, then we have by X_i^2k+1=0 for k ∈ℕ_+
e^tX_i = 1 + ∑_k = 1^∞t^2kX_i^2k/(2k)! ≤ 1 + ∑_k = 1^∞t^2k/(2k)!(2k)! X_i _G^2k/2^kk! = 1 + ∑_k = 1^∞(t^2 X_i _G^2/2)^k/k! = exp{t^2 X_i _G^2/2}
for all t ∈ℝ, where the last inequality is by the definition of X_i _G<∞ such that X_i^2k≤(2k)!/2^kk! X_i_G^2k.
Then it proves X_i ∼subG( X_i _G^2), which shows case (a).
For case (b), if X_i has zero mean, then we bound the odd moment by even moments. For k=1,2,⋯ and c_k>0, Cauchy's inequality and mean value inequality imply
|tX_i|^2k + 1≤( c_k^-1 |tX_i|^2k· c_k |t X_i|^2k + 2)^1/2≤( c_k^-1t^2kX_i^2k + c_kt^2k + 2X_i^2k + 2)/2.
So, |tX_i|^3/3!≤c_1^-1t^2X_i^2 + c_1t^4X_i^4/2 · 3!, |tX_i|^5/5!≤c_2^-1t^4X_i^4 + c_2t^6X_i^6/2 · 5!, and so on, which implies
e^tX_i≤ 1 + ∑_k = 2^∞t^k|X_i|^k/k!≤ 1 + t^2X_i^2/2! +c_1^-1t^2X_i^2 + c_1t^4X_i^4/2 · 3!+ t^4X_i^4/4!
+c_2^-1t^4X_i^4 + c_2t^6X_i^6/2 · 5!+ t^6X_i^6/6!+c_3^-1t^6X_i^6 + c_3t^8X_i^8/2 · 7!+⋯
≤ 1 + ( 1+ c_1^-1/ 3!)t^2X_i^2/2!+( 1+ 4!c_1/2· 3! + 4!c_2^-1/2· 5!)t^4X_i^4/4!+ ( 1+ 6!c_2/2· 5! + 6!c_3^-1/2· 7!)t^6X_i^6/6!+⋯
≤ 1 + ( 1+ 1/6c_1)t^2X_i^2/2!+( 1+ 2c_1+ c_2^-1/10)t^4X_i^4/4!+( 1+ 3c_2+ c_3^-1/14)t^6X_i^6/6!+⋯
≤ 1 + ( 1+ 1/6c_1)t^2X_i^2/2!+( 1+ 2c_1+ c_2^-1/10)t^4X_i^4/4!+∑_k = 3^∞( 1 + kc_k-1 + c_k^-1/4k + 2)t^2kX_i^2k/(2k)!.
To bound (<ref>), we assign c_k=x^-1·m^k+1/2k+2 for k ≥ 2 and x, m>0. Consider the following system of equations:
{[ 1 + 1/6c_1 = m; 1 + 2c_1 + c_2^ - 1/10 = m^2 ].
This system with c_2 = 1/6· xm^3 gives
1 + 2c_1 + 0.6x( 1 + 1/6c_1)^ - 3 = ( 1 + 1/6c_1)^2
which could implies c_1=0.4 if we set x=0.9806308. And then m=1+ 1/6c_1= 17/12. Therefore, (<ref>) has a further upper bound
e^tX_i ≤ 1 + mt^2X_i^2/2!+m^2t^4X_i^4/4!+∑_k = 3^∞( 1 + kc_k-1 + c_k^-1/4k + 2)t^2kX_i^2k/(2k)!
≤∑_k = 0^∞(√(m) t)^2kX_i^2k/(2k)!≤ 1 + ∑_k = 1^∞(√(m) t)^2k/(2k)!(2k)! X_i _G^2k/2^kk!≤exp{t^2(√(17/12) X_i_G)^2/2},
where the first inequality stems from 1 + m^k/2x + (k + 1)x/2k + 1·m^ - k - 1≤m^k with m = 17/12,k = 3,4,⋯, and the last inequality is by the definition of X_i _G. Thus we show X_i ∼subG(17 X_i _G^2/12).
For (a), it remains to show the lower tail bound. For t≥ 0, by the independence of { X_i}_i = 1^n,
{max _1 ≤ i ≤ nX_i≤ t} =(X_1≤ t, ⋯,X_n≤ t) = ∏_i=1^n(X_i≤ t)
[Applying Lemma <ref>] ≤(1-C^2(X)e^-4[2 X _G^2/ X _G̃^2-1]t^2)^n≤exp(-nC^2(X)e^-4[2 X _G^2/ X _G̃^2-1]t^2),
where we use 1-x ≤ e^-x for all x ∈ℝ in the last inequality.
Let δ=exp (-nC^2(X)e^-4[2 X _G^2/ X _G̃^2-1]) and we get
t= X _G̃/ X _G/2√(2 X _G^2/ X _G̃^2-1)√(log n-log C^-2(X)-loglog(2/δ)).
For (b), if X≤ M<∞, it shows
0≤ X _G̃≤min_k ≥ 1[ 2^kk!/(2k)!M^2k]^1/(2k)=Mmin_k ≥ 1[ 2^kk!/(2k)!]^1/(2k)= 0,
So we immediately get X _G̃=0.
The proof is based on Paley–Zygmund inequality P(Z≥θEZ) ≥(1-θ)^2E[Z]^2/E[Z^2] for a positive r.v. Z with finite variance, where θ∈ (0,1); see Page 47 in <cit.>.
Since X is symmetric around zero, one has X^2k+1=0 for k ∈ℕ_+, which gives for all s ∈ℝ,
e^sX = 1 + ∑_k = 1^∞s^2kX^2k/(2k)!≥ 1 + ∑_k = 1^∞s^2k/(2k)!(2k)! X _G̃^2k/2^kk! = 1 + ∑_k = 1^∞(s^2 X _G̃^2/2)^k/k! = exp{s^2 X _G̃^2/2},
where the last inequality stems from the definition of X _G̃<∞ such that X^2k≥(2k)!/2^kk! X_G̃^2k.
Let Z=exp{sX}. The above Paley–Zygmund inequality and (<ref>) imply
(Z ≥ t) := (exp{sX}≥θexp{ X _G̃^2s^2 / 2}) ≥(exp{sX}≥θEexp{sX})≥ (1-θ)^2[Eexp{sX}]^2/Eexp{2sX}
≥ (1-θ)^2exp{ X _G̃^2s^2}/exp{2 X _ G^2 s^2}=(1-θ)^2exp{-[2 X _G^2- X _G̃^2] s^2}
where t:= X _G̃^2s/2+logθ/s>0, and the last inequality is from Theorem <ref>(a). Put s=t+√(t^2+2 X _G̃^2log(1/θ))/ X _G̃^2, which is solved from equation
1/2 X _G̃s^2-ts-log(1/θ)=0,
then we have
s^2= X _G̃^-4[t+√(t^2+2 X _G̃^2log(1/θ))]^2≤4t^2+4 X _G̃^2log(1/θ)/ X _G̃^4.
Substitute this upper bound into (<ref>), and it leads to
(X ≥ t) ≥ (1-θ)^2exp{-[2 X _G^2- X _G̃^2][4t^2+4 X _G̃^2log(1/θ)]/ X _G̃^4}
=(1-θ)^2exp{-[2 X _G^2/ X _G̃^4- X _G̃^-2][4t^2+4 X _G̃^2log(1/θ)]}
=(1-θ)^2θ^4[2 X _G^2/ X _G̃^4- X _G̃^-2]exp{-4[2 X _G^2/ X _G̃^4- X _G̃^-2]t^2}.
Taking sup on θ∈ (0,1) over the two sides of (<ref>), we have
(X ≥ t)≥exp{-4[2 X _G^2/ X _G̃^4- X _G̃^-2]t^2}sup_θ∈ (0,1)(1-θ)^2θ^4[2 X _G^2/ X _G̃^2-1]
=( X _G̃^2/4 X _G^2- X _G̃^2)( 4 X _G^2-2 X _G̃^2/4 X _G^2- X _G̃^2)^2[2 X _G^2/ X _G̃^2-1]exp{-4[2 X _G^2/ X _G̃^4- X _G̃^-2]t^2}
where the supremum of sup_θ∈ (0,1)(1-θ)^2θ^4[2 X _G^2/ X _G̃^2-1] is attained at θ_0=4 X _G^2-2 X _G̃^2/4 X _G^2- X _G̃^2.
As in <cit.>, the sub-Weibull condition is that X ∼subW (η) is defined as a sub-Weibull r.v. with sub-Weibull index η>0 if it has a finite sub-Weibull norm X_w_η:=inf{C∈(0, ∞): E[exp(|X|^η/C^η)]≤ 2}. It is easy to see that, for sub-G X, we have X ∼subW(2). Write
X _G^2 k_X - X_G^2 k_X = 1/(2 k_X - 1)!![ 1/n∑_i = 1^n X_i^2k_X - X^2 k_X].
Since X ∼subW(2), by Corollary 4 in <cit.>, we have X^2k_X∼subW(1 / k_X).
Then apply Theorem 1 in <cit.>, we get
( | X _G^2 k_X - X_G^2 k_X| ≤ 2 e n^- 1 / 2 X_ψ_1 / k_X C(k_X^-1){√(t) + L_n(k_X^-1, 1_n^⊤ n^-1 X_ψ_1 / k_X) t^k_X}) ≥ 1-2 e^-t,
where constants C(·) and L_n(·, ·) is defined in Theorem 1 of <cit.>, and
L_n(k_X^-1, n^-1 X_ψ_1 / k_X 1_n)
:= γ^2 k_X A(k_X^-1) n^-1 X_ψ_1 / k_X 1_n_∞/n^-1 X_ψ_1 / k_X 1_n_2 1{0<k_X^-1≤ 1}+γ^2 k_X B(k_X^-1) n^-1 X_ψ_1 / k_X 1_n_β/n^-1 X_ψ_1 / k_X 1_n_2 1{k_X^-1 >1}
= γ^2 k_X A(k_X^-1) n^-1 X_ψ_1 / k_X 1_n_∞/n^-1 X_ψ_1 / k_X 1_n_2 = γ^2 k_X A(k_X^-1) / √(n), (1 / θ + 1 / β = 1).
Let MOM_b[Y]:=med_s ∈ [b]{_m^B_s Y} be the MOM estimator for data {Y_i}_i=1^n.
Since b_S represents the number of sane block containing no outliers, and η(ε) is a possitive fraction function for sane block such that
b_S ≥η(ε) b. For ϵ >0, in fact, if
∑_k ∈ [b_S]1_{|_m^B_k Y- Y|> ϵ}≤ b_S-b/2,
then |MOM_b[Y]- Y| ≤ϵ.
The reason is that if at least b/2 sane block {B_k} s.t. |_m^B_k Y- Y|
≤ϵ, then |MOM_b[Y]- Y| ≤ϵ. We have
{|MOM_b[Y]- Y| ≤ϵ}⊃{|{k ∈ [b_S]:|_m^B_k Y- Y|≤ϵ}| ≥b/2} ={∑_k ∈ [b_S] 1_{|_m^B_k Y- Y|> ϵ}≤ b_S-b/2}.
Then,
{|MOM_b[Y]- Y| ≤ϵ}≥{∑_k ∈ [b_S] 1_{|_m^B_k Y- Y|> ϵ}≤ b_S-b/2}
= {∑_s ∈ [b_S][ 1_{|_m^B_s Y- Y|>ϵ}-{|_m^B_s Y- Y|>ϵ}]<b_S-b/2-b_S{|_m^B_s Y- Y|>ϵ}}
≥{∑_s ∈ [b_S][ 1_{|_m^B_s Y- Y|>ϵ}-{|_m^B_s Y- Y|>ϵ}]< b_S[1-1/2η(ε)-{|_m^B_s Y- Y|>ϵ}]},
where the last inequality is by (M.2): -b/2≥ -b_S/2η(ε). In (<ref>), Chebyshev's inequality implies
{|_m^B_sY - Y| ≥ 2√(η(ε)VarY/m)}≤{|_m^B_sY - Y| ≥ 2√(η(ε)VarY/ m)}≤1/4η(ε).
Let ϵ=2√(η(ε)VarY/m), and the last inequality shows
{|MOM_b[Y]- Y| ≤ϵ}≥{∑_s ∈ [b_S][ 1_{|_m^B_s Y- Y|>ϵ}-{|_m^B_s Y- Y|>ϵ}]<b_S[1-3/4η(ε)]}.
Since {1_{|_m^B_s Y- Y|>ϵ}}_s ∈ [b_S] are independent r.v. which is bounded by 1, Hoeffding's inequality shows
{∑_s ∈ [b_S][ 1_{|_m^B_s Y- Y|>ϵ}-{|_m^B_s Y- Y|>ϵ}]<b_S[1-3/4η(ε)]}≥ 1 - e^ - 2[b_S(1-3/4η(ε))]^2/∑_s = 1^b_S(1 - 0)^2 = 1 - e^ - 2b_S(1-3/4η(ε))^2.
Therefore, we have
{|MOM_b[Y]- Y | ≥2√(η(ε)VarY/m)}≤ e^ - 2b_S(1-3/4η(ε))^2≤ e^ - 2η(ε) b(1-3/4η(ε))^2,
where the last inequality is from b_S ≥η(ε) b.
Next, recall that
X _G=max_1 ≤ k ≤ k_X[ X^2k/(2k - 1)!!]^1/(2k)=max_1 ≤ k ≤κ_n[ X^2k/(2k - 1)!!]^1/(2k) for any κ_n ≥ k_X
and
X _b,G =max_1 ≤ k ≤ k_Xmed_s ∈ [b]{[1/(2 k-1) ! !·_m^B_s X^2k]^1/(2k)}. Recall that g_k,m(σ _k) and g̅_k,m(σ _k) are the sequences s.t.
[ X^2k/(2k - 1)!!]^1/(2k)(1 - g̅_k,m(σ _k))=max_1 ≤ k ≤κ_n[ -2[m/η(ε)]^-1/2σ_k^k/( X^2 k)+ X^2k/(2k - 1)!!]^1/(2k);
[2[m/η(ε)]^-1/2σ_k^k/( X^2 k)+1]^1 /(2 k)=1+g_k,m(σ _k) for any m ∈ℕ and 1 ≤ k ≤κ_n respectively.
For the first inequality, we have by (<ref>)
{ X _b,G≤ [1 - max_1 ≤ k ≤κ_ng̅_k,m(σ _k)] X _G}= { X _b,G≤max_1 ≤ k ≤κ_n [ X^2k/(2k - 1)!!]^1/(2k)(1 - max_1 ≤ k ≤κ_n g̅_k,m(σ _k)) }
≤{ X _b,G≤max_1 ≤ k ≤κ_n [ X^2k/(2k - 1)!!]^1/(2k)(1 - g̅_k,m(σ_k)) }
[By (<ref>)] = { X _b,G≤[ - σ _k^k/(2k - 1)!!·2/[m/η(ε)]^1 / 2 + X^2k/(2k - 1)!!]^1/(2k)}
≤∑_k = 1^κ_n{med_s ∈ [b]{[1/(2 k-1) ! !·_m^B_sX^2k]^1/(2k)}≤[ σ _k^k/(2 k-1) ! !·2/[m/η(ε)]^1 / 2 + X^2k/!k]^1/(2k)}
= ∑_k = 1^κ_n{med_s ∈ [b]{1/(2 k-1) ! !·_m^B_sX^2k}≤X^2k/(2 k-1) ! !- σ _k^k/(2 k-1) ! !·2/[m/η(ε)]^1 / 2}
= ∑_k = 1^κ_n{med_s ∈ [b]{1/(2 k-1) ! !· [_m^B_sX^2k - X^2k]}≤ -σ _k^k/(2 k-1) ! !·2/[m/η(ε)]^1 / 2}
< ∑_k = 1^κ_n{|med_s ∈ [b]{_m^B_s[X^2k -X^2k]} | ≥σ _k^k·2/[m/η(ε)]^1 / 2}≤κ_ne^ - 2η(ε) b(1-3/4η(ε))^2,
where the last inequality is by (<ref>) with Y_i=X_i^2k; and the assumption that √(VarX^2k)≤σ _k^k, 1 ≤ k ≤κ_n.
Let g_m(σ):=max_1 ≤ k ≤κ_n g_k,m(σ _k). For the second inequality, the definition of g_k,m(σ _k) implies
{ X _G < X _b,G/1 + g_m(σ)}={ X _b,G-max_1 ≤ k ≤κ_n [ X^2 k/(2 k-1) ! !]^1 /(2 k)>g_m(σ) max_1 ≤ k ≤κ_n [ X^2 k/(2 k-1) ! !]^1 /(2 k)}
≤{ X _b,G-max _1 ≤ k ≤κ_n [ X^2 k/(2 k-1) ! !]^1 /(2 k)>g_k, m(σ _k) max_1 ≤ k ≤κ_n[ X^2 k/(2 k-1) ! !]^1 /(2 k)}
={ X _b,G>max_1 ≤ k ≤κ_n [ X^2 k/(2 k-1) ! !]^1 /(2 k)(1+g_k, m(σ _k))}
={ X _b,G>max_1 ≤ k ≤κ_n [ X^2 k/(2 k-1) ! !]^1 /(2 k)[σ_k^k/ X^2 k·2/[m/η(ε)]^1 / 2+1]^1 /(2 k)}
={ X _b,G>max_1 ≤ k ≤κ_n [σ_k^k/(2 k-1) ! !·2/[m/η(ε)]^1 / 2+ X^2 k/(2 k-1) ! !]^1 /(2 k)}
≤{max_1 ≤ k ≤κ_n med_s ∈ [b]{[1/(2 k-1) ! !·_m^B_s X^2k]^1/(2k)}>[σ_k^k/(2 k-1) ! !·2/[m/η(ε)]^1 / 2+ X^2 k/(2 k-1) ! !]^1 /(2 k)}
≤∑_k=1^κ_n{med_s ∈ [b]{[1/(2 k-1) ! !·_m^B_s X^2 k]^1 / 2k}>[σ_k^k/(2 k-1) ! !·2/[m/η(ε)]^1 / 2+ X^2 k/(2 k-1) ! !]^1 /(2 k)}
=∑_k=1^κ_n{med_s ∈ [b]{1/(2 k-1) ! !·_m^B_s X^2 k}>σ_k^k/(2 k-1) ! !·2/[m/η(ε)]^1 / 2+ X^2 k/(2 k-1) ! !}
=∑_k=1^κ_n{med_s ∈ [b]{_m^B_s X^2 k}> 2σ_k^k/[m/η(ε)]^1 / 2+ X^2 k}=∑_k=1^κ_n {med_s ∈ [b]{_m^B_s[X^2 k- X^2 k]}>2σ_k^k/[m/η(ε)]^1 / 2}
[By (<ref>)] < ∑_k = 1^κ_n {|med_s ∈ [b]{_m^B_s[X^2k - X^2k]} | ≥σ _k^k·2/[m/η(ε)]^1 / 2}≤κ_n e^ - 2η(ε) b(1-3/4η(ε))^2,
where the last inequality stems from √(VarX^2k)≤σ _k^k, 1 ≤ k ≤κ_n for a sequence {σ _k}_k ≥ 1.
Proof of Theorem <ref>:
Denote Y_k,i represents the i-th value of reward of arm k in its history, where i ∈ [T_k(t)] for any round t.
It is needed to bound T_k(t) as one has
Reg_T ≤∑_k = 2^K Δ_k T_k(t),
from (<ref>), so we can only focus on some fixed arm. Hence, we can just drop the subscript k in { Y_k, i}_i = 1^T_k(t) as { Y_i}_i = 1^T_k(t).
We first give a lemma, which is crucial in the following proof.
Let { Y_i }_i = 1^n be independent r.v.s with μ_i = Y_i, and assume that Y_i - μ_i is symmetric around zero with Y_i - μ_i _G≤ C and {w_i }_i = 1^n are i.i.d. Rademacher r.v.s independent of { Y_i }_i = 1^n. Let w:=1/n∑_i=1^nw_i. Then,
( 1/n∑_i = 1^n (w_i - w) (Y_i - μ_i ) ≤ C √(2log (1 / α)/n)) ≥ 1 - α.
From Theorem <ref> , we know that under the conditions in the lemma,
( 1/n∑_i = 1^n a_i (Y_i - μ_i) ≤ C a _2 √(2log (1 / α))/n) ≥ 1 - α
for any vector a:=(a_1,…,a_n)^⊤∈ℝ^n.
On the other hand, we have following inequalities,
w - w_2^2 := ∑_i = 1^n (w_i - w)^2 = ∑_i = 1^n w_i^2 - n w^2 = n (1 - w^2) ≤ n, and w - w_∞≤ 2.
Therefore, one has
( 1/n∑_i = 1^n (w_i - w) (Y_i - μ_i ) ≤ C √(2log (1 / α)/n))
= _w _y ( 1/n∑_i = 1^n (w_i - w) (Y_i - μ_i ) ≤ C √(2log (1 / α)/n))
≥_w _y ( 1/n∑_i = 1^n (w_i - w) (Y_i - μ_i ) ≤ C w - w_2 √(2log (1 / α))/n) ≥ 1 - α,
where the second inequality is by (<ref>) and the last inequality applies (<ref>).
Based on Lemma <ref>, next we can prove Theorem <ref>. We first state the assumptions for Theorem <ref> in detail.
UCB.A1(UCB1) The rewards of k-the arm in round t, Y_k. And √(VarY_k^2κ)≤σ_k, κ^κ, 1 ≤κ≤ k_Y_k for a sequence {σ_k, κ}_κ≥ 1;
UCB.A2(UCB2) For any k ∈ [K]
g_κ,m(σ_k,κ) : = 1 - [ Y_k^2κ/(2κ - 1)!!]^-1/(2κ)max_1 ≤κ≤κ_Y_k[ -2m^-1/2σ_k, κ^κ/( Y_k^2 κ)+ Y_k^2κ/(2κ - 1)!!]^1/(2κ)
and
g_κ,m(σ_k, κ):=[2m^-1/2σ_k, κ^κ/( Y_k^2 κ)+1]^1 /(2 κ) - 1
are both less than m^-1/2 for sufficient large m.
Denote the population version of
φ_G (_n) = √(2 log(4 / α)/n) Y - μ_b_k,G/1 - n^- 1 / 2 for φ_G( _n ) := Y - μ_G√(2 log (4 / α)/n)
with Y = μ.
Theorem <ref> gives
( | Y - μ | ≥φ_G(_n) ) ≤ 2 exp{- n^2 φ_G^2(𝐘_n)/2 n Y - μ_G^2} = α / 2.
by the fact that Y - μ is symmetric around zero.
From Theorem <ref>, we take b ≥ 8 log (k_Y / α) and define the event ℰ_Y bellow associated with the MOM estimation of the intrinsic moment norm
ℰ_Y:={ Y - μ_b,G≥ [ 1 - max_1 ≤ k ≤ k_Y / 2g_k, m (σ_k)] Y - μ_G}
with probability at least 1 - α / 2. Note that
( | Y - μ | ≥φ_G (_n) ) ≤( | Y - μ | ≥φ_G (_n), ℰ_Y) +( ℰ_Y^c)
≤( | Y - μ | ≥√(2 log (4 / α)/n)(1 - n^- 1 / 2)^-1 Y - μ_b,G, ℰ_Y ) + α / 2
≤( | Y - μ | ≥ (1 - n^- 1 / 2)^-1 [ 1 - max_1 ≤ k ≤ k_Y / 2g_k, m (σ_k)]√(2 log (4/ α)/n) Y - μ_G) + α / 2
≤( | Y - μ | ≥φ_G (_n)) + α / 2 ≤α.
where the last inequality is by taking m big enough such that max_1 ≤ k ≤ k_Y / 2g_k, m(σ_k) ≤ 1 / √(n). Then, for s ∈ℕ_+,
( |Y_s - μ_k | ≤φ_G (_s)) ≥ 1 - α.
Now for any k ∈ [K] and fixed T_k(t) = s, we know that
( Y_s - μ_k ≥φ_G (_s) )≤( | Y_k - μ_k | ≥φ_G (_n) ) ≤α.
By the non-asymptotic second-order correction [see Theorem 2.2 in <cit.>] and the assumption that Y - μ is symmetric around zero, one has
{μ_k - Y_s ≥ q_α / 2 (_s - Y_s) + √(2 log(4 / α)/s)φ_G(_s) }≤ 2 α,
where q_α / 2 (_B_k - Y_B_k) : = q_α / 2(𝐘_s -Y_s, 1/s1_s ).
Denote the UCB index UCB_k (t) = Y_T_k(t) + h_α (_T_k(t)), and the good event
ℰ_k := {μ_1 < min_t ∈ [T]UCB_1 (t)} ∩ {Y_B_k + q_α / 2 (_s - Y_s) + √(2 log(4 / α) / s)·φ_G(_s) < μ_1 }, k ∈ [K],
where B_k ∈ [T] is a constant to be chosen later. Following from the proof in (B.16)-(B.18) of <cit.>, we can gives that T_k(t) ≤ B_k and
T_k(t) ≤ B_k + T [ 2 α T + ( Y_B_k + q_α / 2 (_B_k - Y_B_k) + √(2 log(4 / α) / B_k)·φ_G(_B_k) ≥μ_1 ) ].
On the other hand, from Lemma <ref>, then
( q_α / 2 (_B_k - Y_B_k) ≥ C √(2log (4 / α)/B_k)) ≤α / 2.
Next, by applying MOM estimator, we need to the following assumptions for block { b_k}_k ∈ [K] corresponding to Theorem <ref>. Here we include the subscript k to avoid confusion.
Under η(ε)=1 with ε=0, Theorem <ref> ensures for b_k ≥ 8 log (k_Y / α) and take m large enough such that max_1 ≤κ≤ k_Yg_κ, m (σ_κ) ≤ n^-1 / 2, then
( (1 + n^- 1 /2) C ≤Y - μ_b,G)
≤( (1 + max_1 ≤κ≤ k_Y / 2g_κ,m(σ _k, κ))Y - μ_G≤Y - μ_b_k,G) ≤ k_Ye^ - b_k/8≤α / 2
Hence, we have
( q_α / 2 (_B_k - Y_B_k) + √(2log (4 / α)/B_k)φ_G (_B_k)≥ C[1 + √(2 log (4 / α)/B_k)1 + B_k^- 1 / 2/1 - B_k^- 1 / 2] √(2 log (4 / α)/B_k))
≤ ( q_α / 2 (_B_k - Y_B_k) + 2log (4 / α)/B_k Y - μ_b_k,G/1 - B_k^- 1 / 2≥ C √(2 log (4 / α)/B_k) + 2log (4 / α)/B_k(1 + B_k^- 1 / 2)C/1 - B_k^- 1 / 2)
≤ ( q_α / 2 (_B_k - Y_B_k) ≥ C √(2log (4 / α)/B_k)) + ( Y - μ_b_k,G≥ (1 + B_k^- 1 / 2)C )
which implies with probability at least 1 - α,
q_α / 2 (_B_k - Y_B_k) + √(2 log (4 / α)/B_k)φ_G(_B_k) ≤ C[1 + √(2 log (4 / α)/B_k)1 + B_k^-1 / 2/1 - B_k^-1 / 2] √(2 log (4 / α)/B_k)
≤ 2 ( 2 + √(2)) C √(2 log (4 / α)/B_k)
where B_k ≥ 8 log ( k_Y_k/ α) ∨ 2 log (4 / α) and max_1 ≤κ≤ k_Y_k / 2g_κ, m (σ_k, κ)≤ 1 / √(B_k) for each arm k.
Now, define the event ℬ_k := {q_α / 2 (_B_k - Y_B_k) + √(2 log(4 / α) / B_k)·φ_G(_B_k) ≤Δ_k / 2 } with Δ_k := μ_1 - μ_k. Choose B_k as
B_k = 4^2 (2 + √(2))^2 C^2/Δ_k^2log (4 / α)≥ 2,
we have
( ℬ_k^c ) = ( q_α / 2 (_B_k - Y_B_k) + √(2 log(4 / α) / B_k)·φ_G(_B_k) > Δ_k / 2 )
≤( 2 (2 + √(2)) C √(log (4 / α)/B_k) > Δ_k / 2 ) + α = 0 + α = α.
Applying Theorem <ref> for concentration of Y_B_k - μ_k when B_k is chosen as in (<ref>),
( Y_B_k + q_α / 2 (_B_k - Y_B_k) + √(2 log(4 / α) / B_k)·φ_G(_B_k) ≥μ_1 ) ≤( Y_B_k - μ_k ≥Δ_k / 2) + ( ℬ_k^c)
≤ 2 exp{ - (B_k Δ_k / 2)^2/2 · B_k C^2} + α
= 2 exp{ - B_k Δ_k^2/8 C^2} + α.
Taking account these results into (<ref>), we get that
T_k(t) ≤ B_k + 2 α T^2 + α T + 2 T exp{ - B_k Δ_k^2/8 C^2}
= 4^2 (2 + √(2))^2 C^2/Δ_k^2log (4 / α) + 2 α T^2 + α T + 2 T exp{ - 2 (2 + √(2))^2 log (4 / α)}
= 16 (2 + √(2))^2 C^2/Δ_k^2log T + 4 /T + 2/T^25 + 16 √(2) + 8
by taking α = 4 / T^2. Under the problem-dependent case, the regret is bounded by
Reg_T = ∑_k = 2^K Δ_k T_k(t) ≤ 16 (2 + √(2))^2 C^2 log T ∑_k = 2^K Δ_k^-1 + ( 4/T + 2/T^25 + 16 √(2) + 8 ) ∑_k = 2^K Δ_k.
To get the problem-independent bound, we let Δ > 0 as an arbitrary threshold, then decompose Reg_T, we get
Reg_T = ∑_Δ_k : Δ_k < ΔΔ_k T_k(t) + ∑_Δ_k : Δ_k ≥ΔΔ_k T_k(t)
≤ T Δ + 16 (2 + √(2))^2 C^2 log T ∑_Δ_k : Δ_k ≥ΔΔ_k^-1 + ( 4/T + 2/T^25 + 16 √(2) + 8 ) ∑_Δ_k : Δ_k ≥ΔΔ_k
≤ T Δ + 16 (2 + √(2))^2 C^2 K log T/Δ + ( 4/T + 2/T^25 + 16 √(2) + 8 ) K μ_1^*
= 8 (√(2) + 2) C √(T K log T) + ( 4/T + 2/T^25 + 16 √(2) + 8 ) K μ_1^*,
by taking Δ = 8 (2 + √(2)) C √((K log T)/ T). And finally, we take C = max_k ∈ [K]Y_k - μ_k _G.
|
http://arxiv.org/abs/2303.07176v1
|
20230313151755
|
Reduced order model of a convection-diffusion equation using Proper Orthogonal Decomposition
|
[
"Neelakantan Padmanabhan"
] |
math.NA
|
[
"math.NA",
"cs.NA",
"math-ph",
"math.MP"
] |
Probabilistic Uncertainty-Aware Risk Spot
Detector for Naturalistic Driving
Tim Puphal, Malte Probst and Julian Eggert
The authors are with the Honda Research Institute (HRI) Europe, Carl-Legien-Str. 30, 63073 Offenbach, Germany
(e-mail: [email protected]; [email protected]; [email protected])
March 30, 2023
=========================================================================================================================================================================================================================================================
§ ABSTRACT
In this work, a numerical simulation of 1D Burgers' equation is developed using finite difference method and a reduced order model (ROM) of the simulation is developed using proper orthogonal decomposition (POD). The objective of this work is to provide an introduction of the POD method to researchers interested in computational fluid dynamics (CFD). This work discusses a physical interpretation of the POD method, its strengths and shortcomings and an implementation of the algorithm that may be extended to 2D, 3D Burgers' equation and other non-linear partial differential equations (PDE) of this class, to develop models for more complex systems.
§ INTRODUCTION
Burgers' equation is a fundamental nonlinear partial differential equation that finds applications in the areas of thermo-fluids and CFD <cit.>. It is a generalized convection-diffusion equation and falls under the same category of equations as the Navier-Stokes equations. Numerical solution and reduced order modeling of Burgers' equation, is of great interest in the CFD community. Numerical solution of Burgers' equation and other PDEs of this class can be computationally very expensive <cit.>. Thus, reduced order models are highly desirable since they can capture the essence of the phenomenon with a fraction of the computational resources. POD / PCA (principal component analysis) is a well established approach to develop reduced order models <cit.>. For a given data, POD extracts the modes that contain the most dominant characteristics of the data. In a function space, these modes form the orthonormal basis that can be used to reconstruct the data. Ideally, POD modes can be constructed from any simulation or experimental data and if the governing equations of the system are known, Galerkin projection may be applied on a subset of this basis to create a ROM, to predict the time evolution of the system. While this approach results in accurate ROM for systems with high diffusivity, the predictions for systems with low diffusivity especially for long simulation times are observed to be less accurate. A number of improvements to this method have been proposed, that help in developing more accurate models. Some of these include a large eddy simulation like approach <cit.>, where the large scale effects are modeled by POD and the small scale effects are modeled by eddy viscosity type model <cit.>, goal-oriented POD <cit.>, and discrete empirical interpolation method (DEIM) <cit.>.
§ NUMERICAL SIMULATION OF BURGERS' EQUATION
1D Burgers' equation of the form presented in Eq.<ref> is solved using finite difference approach.
∂ U/∂ t = - U ∂ U/∂ x + ν∂ ^2 U/∂ x^2 + Q,
where, U=U(x,t) represents a field variable, t represents time, x represents the spatial vector, ν represents the diffusivity, and Q a source term. The generic Burgers' equation incorporates a non-linear convection term, and a linear diffusion term. An additional source term is considered in this work. A second order central finite difference scheme is used for spatial discretization of the diffusion term, while a second order upwind scheme is employed for the nonlinear convection term. An explicit forward Euler scheme is used for time stepping.
U(x,t+Δ t) - U(x,t)/Δ t = -U(x,t) 3 U(x,t)-4 U(x-Δ x,t) + U(x-2Δ x,t)/2Δ x
+ νU(x+Δ x,t) - 2 U(x,t) + U(x-Δ x,t)/Δ x^2 + Q
The equations are solved on an equally spaced Cartesian grid. Constant diffusivity values are used in the simulations. CFL conditions for velocity and diffusivity are used to determine the minimum time step. Periodic boundary conditions are used in the domain. The following initial conditions are used for the field variable and source term,
U(x,0) = U_0 sin(x),
Q(x,0) = Q_0 sin(x),
where, u_0=0.01, Q_0=0.1. Simulations are run for various configurations of number of grid points and duration (t_final). The results from the numerical simulations are presented in Figs. <ref>-<ref>.
§ REDUCED ORDER MODELING
An overview of a few concepts of linear algebra that are central to the POD method is presented in Appendix <ref>. A brief review of this section might be useful in developing a better understanding of the method.
§.§ A physical interpretation of POD
Solutions of Burgers' equation (U(x,t)=U ∈ℝ^m × n, with m spatial points and n temporal points), can be expressed analytically in terms of the basis vectors x and t, in a physical space. While it is desirable, it is not always convenient or viable to obtain an analytical solution in this space. Alternatively, this solution can be also expressed in terms of a different set of basis vectors in a function space. This alternative basis can be determined by singular value decomposition (SVD) of the solution matrix U or by eigen decomposition of the covariance matrices of the solution matrix (Cov_1(U)=UU^* and Cov_2(U)=U^*U). The covariance matrices, represent the variance exhibited by the elements of the solution matrix U and the covariance between the pairs of dataset. It is useful in separating structured relationships in a matrix of random variables. When eigen decomposition of the covariance matrix is performed, it results in a factorization of the form Cov(U)=VΛ V^-1. Here, V represents the eigenvectors or the principle components and Λ represents the eigenvalues of the covariance matrix. Geometrically, this can be interpreted as a linear transformation represented by Cov(U) which when applied to the vectors V, only results in V scaling up or down by a factor of Λ. Since Cov(U) represent the variance in the data, the vectors V indicate the directions along which the variance in the data is the highest or the lowest and Λ represents the magnitude of significance of the given eigenvector. In other terms, the variance indicates how the energy or information of the solution is distributed and the eigenvectors indicate the directions in which the distribution is significant. A graphical illustration of this is presented in Fig.<ref>. In a function space, the vectors V form an orthonormal basis. In many cases (except the cases with very low diffusivity in the Burgers' equation), it is observed that the first few basis vectors (or modes) typically contain most of the energy of the solution. Hence, by projecting U on these first few modes, the highest energy solutions can be recovered. By Galerkin projection of a weak form of the governing equation onto a sub-space of this basis, a reduced order model can be obtained, from which the time evolution of the system can be predicted.
§.§ Formal description of POD
Snapshots of the field variable, U ∈ℝ^m × n of m spatial points and n temporal points are obtained from the numerical simulation of 1D Burgers' equation. Singular value decomposition of this matrix, decomposes the solution into,
SVD(U) = ΦΣΨ^*,
where, the matrix Φ∈ℝ^m × m represents the left singular vector and Ψ^* ∈ℝ^n × n the conjugate transpose of the right singular vector. These matrices are composed of the eigenvectors ϕ (columns of Φ), ψ (rows of Ψ^*) of the covariance matrices U^*U and U U^*. The matrix Σ∈ℝ^m × 1 represents the singular values of U. The singular values are ordered as σ_1 ≥σ_2 ≥...≥σ_m. The i^th row of the solution matrix thus can be written as,
u_i = ∑_i ^m σ_i ϕ_ijψ_ik.
σ_i represents the magnitude of significance of the modes. The relative significance of the modes can be estimated as,
r = σ_i/∑_i=1σ_i,
where, ∑ r=1. As observed in Figs. <ref>-<ref>, when the diffusivity coefficient (ν) is high, the first three to five modes contain upto 99 % of the energy. A reduced solution can then be obtained by choosing a few dominant modes (r). Once the low dimensional basis set has been determined, it can be used to reformulate the Burgers' equation to create a reduced order model. Separation of variable and basis expansion is applied to Eq.<ref>, where the field variable is expressed as
U(x,t)= A(t) Φ(x) = ∑_i=1 ^m a_ik (t) ϕ_ij(x),
where, ϕ_ij(x) represents the orthonormal basis functions obtained by SVD of the data matrix, a_ik(t) the temporal coefficients, and i index of number of modes. It is to be noted that the basis function and temporal coefficients exist in a function space, where the continuous function U(x,t) is discretized into a system of finite dimensions. By substituting Eq.<ref> into Eq.<ref>, the PDE for U(x,t) can be transformed into an ordinary differential equation (ODE) for A(t).
d/dt∑ a_ikϕ_ij = - ∑ a_ikϕ_ijd/dx∑ a_ikϕ_ij + νd ^2/dx^2∑ a_ikϕ_ij + Q,
Since the basis functions are orthogonal they hold the property,
∫ϕ_ij(x) ϕ_il(x)^* dx =
∑ϕ_ij(x) ϕ_il (x) =
1 j=l
0 j ≠ l
The final form of equation is obtained by multiplying both sides of Eq.<ref> by ϕ_ij^T(x),
d/dt∑ a_ik = - ϕ_ij^T ∑ a_ikϕ_ijd/dx∑ a_ikϕ_ij + ϕ_ij^T νd ^2/dx^2∑ a_ikϕ_ij + ϕ_ij^T Q.
To build a reduced order model, a small number of modes (i<<m) are considered in Eq.<ref> and Eq.<ref>. The spatial derivatives in Eq.<ref> are solved using finite difference approach. Periodic boundary conditions are applied and the same initial condition (as the one used in the finite difference simulation), is imposed for the temporal coefficient a_0=U(x,0) Φ. This equation is then solved for a(t) using a standard ODE solver and a ROM is created by projection of this solution on Φ. The results from the ROM are compared against the numerical simulation and presented in Figs. <ref>-<ref>. It is observed that the ROM is very accurate in predicting the field variable's evolution in space and time with a few modes (i ≤ 5). For new initial and boundary conditions, it is sufficient to assemble a snapshot matrix considering different instances of initial and boundary conditions and compute the POD at an offline stage. The ratio of computation time required to run the finite difference simulation and the POD-ROM for various cases are presented in Table <ref>. In most cases, POD-ROM requires a smaller fraction of computation time when compared to the finite difference simulation. The costs of determination of POD basis and Galerkin projection increases with increase in number of dimensions, resolution and simulation run times.
§.§ Implementation of POD
Compute the instantaneous field variable (U(x,t) ∈ℝ^m × n) from the finite difference solution of 1D Burgers' equation.
Decompose the instantaneous field variable via Singular value decomposition,
SVD(U)=U_L · S · V_ℝ^*.
U_L ∈ℝ^m × m: Spatial modes (left singular vector), S ∈ℝ^m × 1: Magnitude of the modes (singular values), V_ℝ^* ∈ℝ^n × n: Temporal coefficients (complex conjugate of the right singular vector). Note: The singular values and vectors are ordered in a descending order.
Determine the number of significant modes by computing the relative magnitude of the singular values,
r_k=S_k^2/∑_k S_k^2,k=1,2,…,m.
Choose a small number of modes (i) based on the values of r (i ≪ m).
Create new matrices with the reduced number of spatial modes and their corresponding temporal coefficients.
ϕ=U_L ∈ℝ^m × i,
ψ=V_ℝ^T ∈ℝ^i × n,
σ= S ∈ℝ^i × 1.
Specify initial condition (same initial condition as the numerical simulation). The initial temperature is projected onto the reduced basis,
a_0=ϕ· U(x,0).
Compute first derivative ϕ_x (upwind scheme) and second derivatives ϕ_xx (central finite difference) of the spatial modes.
Assemble the parameters: modes, temporal coefficients, derivatives, initial conditions, boundary conditions, source, and diffusivity coefficients
Parameters=[ϕ^T,ϕ,ϕ_x,ϕ_xx,Q,ν].
Perform Galerkin projection by applying separation of variable to the data matrix and combining it with the governing equation,
U(x,t)=A(t) Φ(x),
d/dt∑_i ϕ_i a_i = -∑_i ϕ_i a_i d/dx∑_i ϕ_i a_i + νd^2/dx^2∑_i ϕ_i a_i + Q.
Invoke the orthogonality property,
∫ϕ_i ϕ_j dx =
1, i=j
0, i ≠ j
Multiply both sides of the equation by ϕ_i ^T
d/dt∑_i a_i = -ϕ_i ^T ∑_i ϕ_i a_i d/dx∑_i ϕ_i a_i + ϕ_i ^T νd^2/dx^2∑_i ϕ_i a_i + ϕ_i ^T Q.
Compute the right hand side of the equation:
RHS = rhs_C + ν· rhs_D + rhs_S,
where,
U=ϕ· a, which is equivalent to ∑_i ϕ_i a_i,
rhs_C = -ϕ^T · U ·ϕ_x · a, which is equivalent to -ϕ_i ^T ∑_i ϕ_i a_i d/dx∑_i ϕ_i a_i,
ν· rhs_D = ϕ^T ·ν·ϕ_xx, which is equivalent to νd^2/dx^2∑_i ϕ_i a_i,
rhs_S = ϕ^T Q, which is equivalent to ϕ_i ^T Q.
Compute the temporal coefficient using a standard ODE solver,
a(t) = Standard.ODE.Solver(RHS,a_0,t,Parameters).
Compute the time evolution of the reduced order model of the system,
U_ROM (t) = a(t) ϕ.
§ RESULTS
The results presented in this section evaluate the accuracy of POD-ROM for the following cases, Case 1: simulation with high diffusivity and short simulation run time (t_final), Case 2: simulation with high diffusivity and longer simulation run time, Case 3: simulation with low diffusivity and short run time, Case 4: simulation with low diffusivity and longer run time, and Case 5: heat equation with only diffusion term (Burgers' equation without convection term). For each case, the percentage error between the simulation and the model data is computed. For the case with high diffusivity and short simulation time (Fig.<ref>), it is observed that a satisfactory ROM can be created with as few as 1-3 dominant modes. However, with 5 dominant modes, the original data can be reconstructed with negligible error. At longer simulation times as in Case 2 (Fig. <ref>), a larger number of modes are required to reconstruct the data. For Case 1, it is observed that the POD-ROM constructed with 1 dominant mode between t=0 s and t=0.5 s captures the fluctuation in the field, but the POD-ROM constructed with 1 dominant mode in Case 2 does not capture the fluctuations between t=0 s and t=0.5 s. This occurs because the POD modes are constructed from the data obtained from a specific simulation. As a result the POD modes and the distribution of energy across the modes vary for different data. At lower diffusivities and shorter simulation times as in Case 3 (Fig. <ref>), the trends similar to Case 1, where the data can be reconstructed with a few dominant modes, are observed. However, with increase in simulation time as in Case 4 (Fig. <ref>), large transient fluctuations are observed. At low diffusivity, Burger's equation is driven primarily by the convection term. If a parallel between this equation and the Navier Stokes equation is drawn, this is similar to a case at high Reynolds number. In such a scenario a large range of spatial and temporal scales exist, and the energy distribution is no longer dominated by a few modes. As a result, the POD-ROM constructed even with a large number of modes (i= 5 or i= 30) is inaccurate. The differences between the original data and ROM are observed to accentuate at simulation times t > 10. For 1D heat equation (Burgers' equation without the convection term), it is observed that POD-ROM can be constructed with only 1-3 modes even when the diffusivity is very small. Convection term is the primary source of non-linearity and fluctuations in Burgers' equation and POD is a great tool for construction of ROM for linear PDEs. An additional case (Case 6 - Fig.<ref>) is evaluated where a highly diffusive first order upwind scheme is used for discretization of the convection term. In this case, the fluctuations in the original data are observed to dissipate at longer simulation times. As a result, the energy distribution has a few dominant modes and the POD-ROM reconstructed with the limited number of modes is still accurate. This however is not an elegant solution since the original data from the simulation is highly diffusive and unreliable.
§ CONCLUSIONS
This work explores the development of ROM for 1D Burgers' equation using POD method. POD is very useful in creating fast and accurate ROM for a wide range of linear and non-linear equations. The primary idea of this work is to provide a feel for the method and present the material in an accessible format. It is the hope of the author that the reader is able to develop an appreciation for the approach and is able to apply it to more complex systems for reduction of computational times.
unsrt
§ BACKGROUND IN LINEAR ALGEBRA AND RELEVANT TERMINOLOGIES
(Excerpts of lectures on the topic of linear algebra <cit.>)
* Vector space: A non-empty set V, of objects called vectors on which two operations (linear combinations) can be performed. Vector addition (u+v ∈ V) and scalar multiplication (λ u ∈ V).
* Span: A set of all possible vectors that can be formed by a linear combination of a set of vectors and scalars.
* Space: For a given vector space, if the tails of the vectors are at the origin and the tip of the vectors point at different locations, a grid space can be created such that each grid point is located at the tip of a given vector.
* Linear dependency: When two vectors point in the same coordinate direction and their span is restricted to a line or a plane, the vectors are called linearly dependent.
* Basis: A set of linearly independent vectors that span the full space. An infinite set of basis vectors exist, however physically only three vectors are perceived. For example, in a Cartesian coordinate the coordinate directions x,y,z are defined as the basis.
* Linear transformation / Matrix-Vector multiplication: An operation, which when applied to a vector, it either rotates, scales, or performs a combination of the two to move it to a new location in space. A linear transformation is performed via matrix-vector multiplication (Ax=b), where the matrix A is the linear transformation applied to vector x to form a new vector b. For a transformation to be defined as linear, the grids formed by the vector tips must remain parallel, evenly spaced and the origin must not move.
* Matrix multiplication: A linear transformation that is defined as a combination of two linear transformations.
* Change of Basis: A linear transformation that translates a vector representation in one basis to a representation of the same vector in a new basis.
* Eigenvector and Eigenvalue: When a linear transformation A changes the basis, some of the vectors v in the space, remain on their span as an effect of the transformation. These vectors only scale in magnitude. This is defined as Av=λ v, where v is defined as the Eigenvector and λ is defined as Eigenvalue, which is a scaling factor.
* Eigen decomposition: A factorization of a matrix (A=V Λ V^-1), where the matrix A is represented a product of its Eigenvalues Λ and Eigenvectors V. Eigen decomposition can only be applied to square matrices.
* Singular value decomposition: A factorization of a real or complex matrix (A=U Σ V^T) that is a generalization of Eigen decomposition but is applicable to non-square matrices as well. These factors may be physically interpreted as U (orthogonal matrix - rotation), Σ (diagonal matrix - stretching), and V^T (orthogonal matrix - rotation)
* Function spaces : A set of all mathematical functions that have the same properties as vectors and vector spaces. For example, a function f(x) that can be expressed a sum of two other functions f(x)=u(x)+v(x) and a scalar product of another function f(x)=λ w(x). From an abstract point of view, these functions are mathematically similar to a vectors and linear combinations can be applied to them to determine distance between them or to project them on one another. The difference in the analogy appears in the physical interpretation of the number of dimensions. It can be shown that an infinite number of linearly independent functions can be built from an infinite number of vectors to span the space. Therefore, functions exist in an infinite dimensional vector space. For example, a function f(x) specified in the interval [a,b], sampled at intervals x_1,x_2,…,x_N with corresponding function values of f_1,f_2,…,f_N, can be expressed as,
f(x)=[ f_1; ⋮; f_N ] =f_1 e_1+f_2 e_2+…+f_N e_N,
where, e_i represents the basis of the function that takes the value of 1 at the corresponding sampling point and 0 elsewhere. A Dirac delta function may be used as a basis function. This product gives an approximation of the original function, and the approximation gets better as the number of samples are increased. In the limit N →∞, the basis functions become infinitely thin and infinitely many. Thus, the function over the interval is defined as,
f(x)=∫_a ^b f(λ) e_λ (x) dλ.
It must be noted that rectangular function is only one possible set of basis function. Other basis functions may also be used here to express the function, however not all basis functions exhibit the property of orthogonality. Using this definition of function space, a number of useful properties may be obtained such as projection of a function onto subspace span of another set of functions and determination of orthogonality of two functions. For an orthonormal basis e_1,e_2,…,e_N,
a = ∑_i a_i e_i.
Inner product of two vectors: ⟨ a,b ⟩=a_1 b_1^*+a_2 b_2^*+…+a_N b_N^*. Projection of a vector into a subspace of an orthonormal basis W=span[w_1,w_2,…,w_M],
w=⟨ a,w_1 ⟩ w_1+⟨ a,w_2 ⟩ w_2+…+⟨ a,w_M ⟩ w_M.
|
http://arxiv.org/abs/2303.06724v1
|
20230312183120
|
Gröbner and Graver bases for calculating Opportunity Cost Matrices
|
[
"Yuchen Ge",
"Janosch Ortmann",
"Walter Rei"
] |
math.OC
|
[
"math.OC",
"math.AC",
"90C15(Primary), 90C10, 13P25 (secondary)"
] |
Opportunity cost matrices, first introduced in <cit.>, are interesting in the context of scenario reduction. We provide new algorithms, based on ideas from algebraic geometry, to efficiently compute the opportunity cost matrix using computational algebraic geometry. We demonstrate the efficacy of our algorithms by computing opportunity cost matrices for two stochastic integer prorams.
Probing the Origin of Changing-look Quasar Transitions with Chandra
[
===================================================================
§ INTRODUCTION
In many real-world applications, decision-making under uncertainty is a challenging problem that requires the consideration of multiple possible scenarios. However, the number of scenarios can grow exponentially with the number of uncertain parameters, making the decision problem intractable. Scenario reduction methods
aim to address this issue by reducing the number of scenarios while preserving the key characteristics of the original problem.
Recently <cit.> there has been progress in developing problem-driven scenario reduction methods. All of these methods require the computation of a variant of the opportunity cost matrix introduced in <cit.>: assign a decision x^∗_j to each scenario s_j. In <cit.> this is done by choosing an optimal solution to the single-scenario problem. The opportunity cost matrix is computed by evaluating the solution associated to scenario j against scenario i. Intuitively, suppose that we hae an oracle that predicts that scenario j will occur. The (i,j) entry of the opportunity cost matrix gives the cost incurred by trusting the oracle and taking a decision under the viewpoint of scenario j if it then turns out that in fact scenario i occurs.
The opportunity cost matrix naturally leads to a decision-based distance on the scenario set: two scenarios i and j can be considered to be close if the (i,j) entry of the opportunity cost matrix is small (and hence the cost of predicting scenario j when actually scenario i occurs leads to a small cost) and far away if the (i,j) entry is large.
<cit.> propose clustering algorithms based on this distance, which has shown to lead to good approximative solutions and tight bounds on the true objective value.
In this paper, we present a novel approach to efficiently compute opportunity cost matrices using Gröbner and Graver bases. Gröbner <cit.> and Graver <cit.> bases are algebraic objects that can be used to solve systems of polynomial equations and inequalities. These have been successfully applied to optimisation <cit.>
and have seen a wide range of applications
Our approach leverages the structure of opportunity cost matrices to formulate them as polynomial systems, which can then be solved using Gröbner and Graver bases. The resulting method is fast, accurate, and scales with the number of scenarios and variables.
We demonstrate the effectiveness of our approach through numerical experiments on a well-known integer program from <cit.>. Our results show that the Gröbner basis approach is particularly efficient for a large number of scenarios, whereas the Graver basis approach stays stable with a large number of decision variables.
Our paper contributes to the literature by providing two new approaches to computing opportunity cost matrices. We also prove theoretical results about Graver bases for deterministic and stochastic integer programs.
The rest of the paper is organized as follows. In Section <ref>, we provide background on opportunity cost matrices and their usefulness. In Section <ref>, we introduce the Gröbner and Graver bases and present our mathematical results. Section <ref> describes the algorithms that we then apply to generate our numerical results in Section <ref>. Finally, Section <ref> concludes.
§.§ Notation
Throughout this paper, denotes the set of integers and the subset of non-negative integers.
§ OPPORTUNITY COST MATRICES
Consider the following two-stage stochastic optimisation problem
min_x∈ F(x,ξ) = min_x∈γ^⊤ x + Q(x,ξ)
where γ∈^d and is the intersection of the integer lattice with a convex polyhedron. The random part Q of the objective function is given by
Q(x,ξ) = min c_ξ^⊤ y T x + A y = h_ξ y∈^d
where c_ξ∈^d and b_ξ∈^k for all ξ and T and A are integer matrices of the required dimension.
Observe that we assume T and A to be deterministic matrices, i.e. they are not random.
In general, it is not obvious how to obtain an explicit solution to (<ref>). The scenario approach in stochastic programming <cit.> consists of approximating the probability measure on ξ that gives rise to the expectation operator by a discrete measure assigning probabilities[i.e. p_n≥ 0 for all n and ∑_n=1^N p_n=1] p_1,...,p_N on a finite set of outcomes ξ_1,...,ξ_N(often called scenarios) for ξ. The set =ξ_1,…,ξ_N is then referred to as the scenario set.
For example, this can be achieved by the sample average approximation <cit.>, where the ξ_i are independent samples from and are each assigned the same probability 1/N of occurring. In any case, the scenario approach yields optimisation problems of the form
minγ ^⊤ x+∑_i=1^N p_i c_i^⊤ y_i: x∈, A y_i=h_i-T x, y_i∈ℤ_+^n ∀ i.
In order to properly model the incertainty represented by , often a large number of scenarios must be generated. On the other hand solving problems of the form <ref> when N is large can be very computationally challenging. This motivates the idea of scenario reduction: can one find a small subset of the scenario set =ξ_1,…,ξ_N such that replacing by in (<ref>) only incurs a small approximation error.
Generally speaking, scenario reduction methods can be separated into distribution-based and problem-based methods. The former seek to minimise the difference (defined in some suitable sense) between the empirical measure of the subset and the original scenario set. See for example <cit.> for examples of this approach. On the other hand, problem-based methods <cit.> look to minimise the difference between the solutions associated to the larger and smaller problems, in other words scenarios are considered to be similar if they lead to similar decisions according to (<ref>). In <cit.>, the opportunity cost matrix was introduced.
Consider a set of feasible decisions x_1,...,x_N∈ such that decision x_j is associated to scenario s_j. The opportunity cost matrix is the N× N matrix whose (i,j) entry is _ij=F(x_i,ξ_j).
Clearly there are many interesting choices for the solutions x_j.
In <cit.> and <cit.>, the decisions x_n were chosen to be the single-scenario solutions of (<ref>), that is
x_j∈ F(x,ξ_j),
In this paper, we are looking for efficient methods of computing the matrix in the context of the stochastic linear two-stage problem defined in (<ref>).
Since the functions Q and F only differ by the linear term γ· x, we turn our attention to efficiently computing
Qx_i,ξ_j = minc_j^⊤ y A y = b_ij,
where c_j=c(ξ_j), b_ij=b(x_i,ξ_j). Here, we write b(x,ξ)=h_ξ-T_ξ x.
Since we had assumed A to be deterministic deterministic, the feasible region on the right-hand side of (<ref>) changes only through b_ij as i and j vary.
§ GRÖBNER AND GRAVER BASES
In this section we develop the theory of Gröbner and Graver bases that we require in order to justify and motivate the algorithms that will be described in Section <ref>.
In the previous section we saw that in order to compute the opportunity cost matrix, we are looking to solve integer optimisation problems of the form
cb: minc^⊤ z: A z=b, z ∈^d
for a given integer matrix A but with varying cost vectors c∈ and constraint vectors b∈$̱. Here,and$̱ are finite sets corresponding to the values that the c(ξ_m) and b(x,ξ_m) of (<ref>) can take. Since we consider the matrix A to be fixed throughout, we do not include it in the notation.
Note that the optimal solution to (<ref>) may not be unique, which is sometimes inconvenient. Whenever required, we can therefore replace (<ref>) by its refinement >_cb that we will define now. We begin my defining a total order[A total order on a set S is a binary relation ≺ on S such that a≺ b or b≺ a for all a,b∈ S with a b.] on ^d.
Let > be any total order on ^n and fix c∈^d. We define another order relation on ^n by saying that x>_c y and only if
* c· x>c· y or
* c· x=c· y and x>y.
Unless otherwise specified, the total order ≺ in Definition <ref> will be the lexicographical order, under which x>y if and only if the leftmost non-zero entry of x-y is positive.
A set _c⊆^d is called a test set for the family of problems cb b ∈ℝ^l if
* c· t>0 for all t ∈𝒯_c
* for every b ∈ℝ^l and for every non-optimal feasible solution z_0∈ℤ_+^d to A z=b , there exists a vector t ∈𝒯_c such that z_0-t is feasible. Such a vector is called an augmentation vector.
Given a test set 𝒯_c, the augmentation algorithm (Algorithm <ref>) provides a way to compute the optimum of >cb for any b∈$̱. Intuitively, while there ist ∈𝒯_cwithc^⊤ t>0such thatz_0-tis feasible, we repetitively iteratez_0by assigningz_0:=z_0-t.
Thus, we are looking to efficiently construct a test set_cfor eachc∈. Observe that_c⊆(A)since bothz_0andz_0-tare feasible for anyt∈_cwhich implies that
A t = A(z_0 - (z_0-t)) = Az_0 - A(z_0-t) = b-b = 0.
In the following we will exhibit two approaches to constructing such a test set. The first uses Gröbner bases and is described in Section <ref>. The second, based on Graver bases, goes one step further and constructs a universal test set, that is, a setcontaining a test set_cfor each cost vectorc∈.
§.§ The Gröbner Basis Approach
It is now well known <cit.>
that Gröbner bases <cit.> yield test sets. The Buchberger algorithm<cit.> takes as input a set of polynomialsf_1,…, f_Mand returns the reduced Gröbner basis of the ideal generated by thef_j. A geometric version of the Buchberger algorithm was given in <cit.>.
This algorithm is at its most efficient if the generating set is small. We achieve this by using the toric ideal and in particular the methodology of <cit.>. The advantage is that this can be done once for all cost vectors, which is efficient in the context of computing opportunity cost matrices.
We will require the following result, which is a direct consequence of Dickson's Lemma <cit.> and can be found as Lemma 2.1.4 of <cit.>.
Let A∈^l× d and let _c,b denote the set of non-optimal feasible solutions of cb.
Then there exist α(t),…,α(t)∈^d such that
⋃_b ∈^l_c,b=⋃_i=1^t(α(i)+N^n)
The vectorsα(1),…,α(t)allow us to compute a test set for the family of integer programscbb∈, via the the following result, which follows from the Gordon-Dickson Lemma and is stated as Corollary 2.1.10 of <cit.>. See also Lemma 2.1 in <cit.>.
Fix c∈^d, let α(1),…,α(t) as in Lemma <ref> and let β(i) be the (unique) optimum of the program >_cA α (i). Then the set
𝒢_A,c=(α(i)-β(i)),i=1,2,...,t
is a minimal test set for the family of problems cb b∈^l.
The set 𝒢_A,c is called the Gröbner basis for the matrix A.
While this result gives a formula for the desired test set, it requires computation of theα(i)from Lemma <ref> and, crucially, of theβ(i), which are given in terms of solutions of integer problems itself. A geometric construction of the test set was given in <cit.>.
As explained above, we need to compute the solutions to>_cbascvaries. If we would like to take the Gröbner basis approach, we would need to recompute the Gröbner basis for every cost vectorc∈. Therefore, we proceed in a different manner, based on ideas from the theory of polynomial rings.
LetR=xndenote the ring of polynomials innvariables. We will make frequent use of a close relation between vectors of integers and differences of monomials inR. Anyn-vector of non-negative integersα=(α_1,…,α_n)∈^ncan be identified with a monomialx^α∈Rdefined by
x^α = x_1^α_1⋯ x_n^α_n = ∏_j=1^n x_j^α_j,
and this mapping can be extended to integer-valued vectors as follows. For anyα=(α_1,…, α_n)^n, defineα^+=(α_1^+,…,α_n^+)andα^-=(α_1-,…,α_n^-), recalling that the positive part of a real numberxis defined to bex^+=max(x,0)and the negative part ofxisx^-=(-x)^+. Then bothα^+, α^-∈^nandα=α^+-α^-. We now define a mapping
ϕ^n⟶ R by ϕ(α) = x^α^+- x^α^-.
The notion of a Gröbner basis associated to a matrix from Definition <ref> is actually a special case of a more general concept, namely that of a Gröbner basis of a polynomial ideal. In the following, we give a very brief account of the definition and basic properties of Gröbner bases. For more details see for example Chapter 1 of <cit.>.
A subset I⊆ R is said to be an ideal of R if it satisfies the following two properties:
* For any x,y∈ I we have x-y∈ I (that is, I is an additive subgroup of R),
* For any x∈ I and r∈ R we have rx ∈ I.
Given polynomials f_1,…,f_n, the ideal generated byf_1,…,f_n is the set of all R-linear combinations of the f_j:
⟨ f_1,…,f_n⟩ = ∑_j=1^n r_j f_j r_1,…,r_n ∈ R .
The toric idealI_A of a matrix A∈^d× n is generated by differences of monomials x^u-x^v such that u-v lies in the kernel of A:
I_A = ⟨ x^u-x^v Au=Av ⟩.
See Section 4 of <cit.> for the theory of toric ideals. A polynomialf∈Rconsists of monomialsx^αwith degreeα∈^n. Throughout, we fix a total order (recall Definition <ref> and the discussion surrounding it)≺on^n. In principle, any total order will do, but for us,≺will always be the total order<_cdefined in Definition <ref>. Given≺, we can compare the different monomials by comparing their degrees. This allows us to define the initial monomial offto be that with the greatest degree (with respect to≺). The initial monomial offis denoted≺f. Given an idealIofR, the initial ideal ofIis the ideal generated by the initial monomials of the elements ofI:
≺ f = ⟨≺ f f∈ I ⟩.
We are now in a position to define Gröbner bases for polynomial ideals.
Let I be an ideal of R. A subset of I is said to be a Gröbner basis of I if the inital ideal of I is generated by the inital monomials of the elements of :
≺ I = ⟨≺ g g∈⟩.
A Gröbner basis of I is said to be minimal if (<ref>) no longer holds whenever any one element is removed from . Also, is said to be reduced if for any distinct g_1,g_2∈ it holds that no term of g_1 is a multiple of ≺g_2.
Given an idealIofRand a total order on^n, there is only one reduced Gröbner basissuch that the coefficients of≺gare equal to1for eachg∈. In other words, reduced Gröbner bases are unique up to multiplying the elements by constants.
Recall the vectors α(i) and β(i) from <ref>. The set of polynomials
_I_A = x^α(j)-x^β(j) j∈1,…,t
is the reduced Gröbner basis of the toric ideal I_A with respect to the ordering <_c.
We conclude that the two notions of Gröbner basis (of a matrix on the one hand and of a polynomial ideal on the other) are actually the same: they are related via the mapϕdefined in (<ref>). In fact, the original Buchberger algorithm <cit.> is formulated in this setting.
In <cit.>, an efficient algorithm to compute a small generating set of the toric idealI_A, see Algorithm <ref>. Observe that the toric ideal only depends on the matrixA, and not on the cost vectorc. This motivates our kernel algorithm, described in detail in Algorithm <ref>:
* Given the matrix A, compute a small generating set of the toric ideal I_A following <cit.>.
* For each j∈1,…,N, apply Buchberger's algorithm to compute the Gröbner base with respect to A and <_c_j.
* Use the correspondence (x^u-x^v) ⟷ u-v from (<ref>) to obtain the test set with respect to (A,c_j).
* For each i,j∈1,…,N, apply the augmentation algorithm (Algorithm <ref>) to compute Q(x_i,ξ_j), and hence the (i,j)-entry of the opportunity cost matrix.
§.§ The Graver basis approach
In the previous section, computing theN×Nopportunity cost matrix still required computingNtest sets via the Gröbner bases. This motivates the question whether it is possible to construct a single test set that not only covers all right-hand side vectorsbbut also all cost vectorsc.
A set ⊆ is an universal test set for the matrix A if it contains a test set _c for every cost vector c.
Clearly, the Gröbner basis approach alone is insufficient for computing a universal test set, as this would require computing an infinite number of Gröbner bases. Instead, the Graver basis approach will be used. We begin by stating the definition of a Graver basis.
Assume a=(a_1,a_2,...,a_n), b=(b_1,b_2,...,b_n) ∈ℤ^n. Then a ⊑ b if ∀ i: a_i b_i≥ 0 and |a_i| ≤|b_i|.
Fix a integer matrix A. The Graver Basis of A is the set of ⊑-minimal elements in Ker_ℤ(A): ={u ∈ℤ^n: A · u=0,u≠ 0}, denoted by Γ_A.
It is not immediately obvious thatΓ_Ais finite. However, finiteness ofΓ_Afollows from the following result gathered from <cit.>.
Let 𝒢_A, c be the reduced Gröbner basis of A with respect to >c. Then ⋃_c ∈ℤ^n𝒢_A, c⊆𝒢ℛ_A .
Next, we state and prove a result about the relationship between the Graver Basis of the stochastic integer program <ref> and that of the deterministic integer program obtained by choosing a single scenario and assigning probability1to it:
min{c^⊤ x+ p q^⊤ y_: A x = b, x ∈ℤ_+^m, T x+W_ y_=h_, y_∈ℤ_+^n}
Then we assert a new result, which connects the Graver Basis of the SIP problem and the Graver Basis of the IP problem:
Denote the Graver Basis of the SIP problem (5) by Γ_N, and that of the IP problem (<ref>) by Γ_1 for i=1,2,...,N. If Ker_ℝ(A)=0, we have the following relationship Γ_N={(0,0,...,v_i,...,0):(0,v_i)∈Γ_1,i=1,2,...,n}
The corresponding coefficient matrix of (<ref>) is of the form
A_N:=([ A 0 0 ⋯ 0; T W 0 ⋯ 0; T 0 W ⋯ 0; ⋮ ⋮ ⋮ ⋱ ⋮; T 0 0 ⋯ W ])
and the corresponding coefficient matrix of (6) is of the form
A_1:=([ A 0; T W; ]).
Since Ker_ℝ(A)=0, we have Ker_ℤ(A_N)=(0,v_1,v_2,...,v_n):(0,v_i)∈Ker_ℤ(A_1) }. From the definition of the Graver Basis, we can arrive at the conclusion.
§ ALGORITHMS
In this section, we describe numerical algorithms that follow from the mathematical development of the previous section. We first introduce the augmentation algorithm that computes an optimal solutions tocbfrom a test set_cand a feasible solutionz_0.
For details about Algorithm <ref> see <cit.>.
The kernel algorithm takes as input the matrixA, a sequence of cost vectorscand an array of right-hand side vectorsband computes the corresponding opportunity cost matrix, by first applying Algorithm <ref> and then repeatedly the Buchberger algorithm. In this way, a Gröbner basis forAis computed with respect to each>_c. The augmentation algorithm <ref> then gives the entries of the opportunity cost matrix for everycand everyb.
For the Graver basis approach, we apply the modified augmentation algorithm <ref> for a family of integer problems of the formminc^⊤xAx=bas bothbandcvary.
§ PRELIMINARY RESULTS
In this section we test our approach on some numerical examples. The first is a well-known purely combinatorial stochastic program introduced in <cit.>. The second is a stochastic network design problem.
§.§ The example of <cit.>
In <cit.>, the following stochastic integer program was introduced and studied.
min {35 x_1+40 x_2+1/N∑_ν=1^N 16 y_1^ν+19 y_2^ν+47 y_3^ν+54 y_4^ν}
s.t. x_1+y_1^ν+y_3^ν≥ξ_1^ν
x_2+y_2^ν+y_4^ν≥ξ_2^ν
2 y_1^ν+y_2^ν≤ξ_3^ν
y_1^ν+2 y_2^ν≤ξ_4^ν,
x_1, x_2, y_1^ν, y_2^ν, y_3^ν, y_4^ν∈ℤ_+
As in <cit.> the scenariosξ^νare chosen uniformly from the four-dimensional squares [300,12000] ×[300,12000]×[200,12000] ×[200,12000].
In order to bring the problem in the form (<ref>), we introduce slack variablesu_j^νforj∈1,2,3,4and obtain
min {1/N∑_ν=1^N 35 x_1+40 x_2+ 16 y_1^ν+19 y_2^ν+47 y_3^ν+54 y_4^ν}
s.t. x_1+y_1^ν+y_3^ν -u_1^ν = ξ_1^ν
x_2+y_2^ν+y_4^ν -u_2^ν = ξ_2^ν
2 y_1^ν+y_2^ν +u_3^ν = ξ_3^ν
y_1^ν+2 y_2^ν + u_4^ν = ξ_4^ν,
x_1, x_2, y_1^ν, y_2^ν, y_3^ν, y_4^ν, u_1^ν, u_2^ν, u_3^ν, u_4^ν∈ℤ_+.
In order to test our approach, we calculated the seconds of CPU time used by the programs on the Apple Silicon M1 chip. We observe that it is easy to read off a feasible solution to the problem (<ref>)
x_1=x_2=y_1^ν=y_2^ν=0, y_3^ν=ξ_1^ν, y_4^ν=ξ_2^ν (ν=1, … N)
The task is to compare the computational costs of the opportunity-cost matrix in the SIP problem in the last section. In other words, we compute a family of integer programming problems with three algorithms. We test the program's running time in CPU seconds on an Apple Silicon M1 chip with Python'spackage. Also, we introduce the modern MINLP solver, specially designed for mixed-integer programming problems, implemented by Python'spackage. We shall compare the computational costs of our algorithms <ref> and <ref> with the MINLP solver in two cases. One is when we fix the sub-problem, and the other is when we fix the number of scenarios.
We shall compute the computational time when the quantity of scenarios equals 1, 20, 40, 60, 80, 100, 120, 140, 160, 180, and 200. We gather the numerical results in the table below.
It is remarkable that it only took about 0.1 seconds to compute the generating set of the toric ideal ofA, essential for the Gröbner Bases computation in all scenarios. By contrast, it took approximately 130 seconds to compute the Graver Basis ofA. Also we visualize the table in a line chart below. The horizontal axis represents the increasing quantity of scenarios, and the vertical axis represents the running time. The three curves with different colors in the picture represent three different methods.
Figure <ref> shows that Algorithm <ref> took almost 130 seconds to initialize and then the curve rises slowly. The computational cost of the MINLP solver grows extremely fast and starts to overpower the Algorithm <ref> whenN=20. Generally, the curve of Algorithm <ref> shows superior performance when compared with the other two algorithms.
Next, we compare when the complexity of the sub-problems increases. Below is the graph showing the trends of computational costs when the size of scenarios is fixed to 200 but the number of scenarios is increased. In Figure <ref>, with a fixed 200 scenarios, var*xrepresentsxvariables in the particular programming problem. As can be seen, by comparing the curves, the Gröbner Basis approach (the blue curve) is overall superior to the Graver Basis approach (the grey curve) and the traditional MINLP solver (the yellow curve). Also, regarding details, the Graver Basis method begins to suffer from the curse of dimensionality, starting from the problem's complexity being 20 variables, and so is the Gröbner Basis method but more dramatically. However, the MINLP solver does not reflect the apparent complexity when it suffers from the curse. Generally, the MINLP solver applies to situations where the sub-problem is large, and the number of scenarios is small. In contrast, the Gröbner Basis applies to situations where the sub-problem has little complexity, and the number of scenarios is significant.
We have yet to reflect one thing in the experiments. By testing our algorithm hundreds of times, we have come to the empirical conclusion that the time increase of our proposed algorithm in computing Grobner Basis will be dramatic forN > 15. And there will be geometric growth for the computational time regarding Graver Basis when the complexity is between 10 and 15 variables. Also, surprisingly, we can no longer compute the Gröbner Basis after 15 variables' complexity. We refer to this phenomenon as the curse of dimensionality in computational algebraic geometry regarding SIP problems. We conjecture that the crux is that the number of ideal minimal generating elements will increase dramatically as the dimension increases, thus making Bunchberger's algorithm computationally costly.
Finally, the crux of the problem, that two algebraic methods don't function when the variables' number exceeds 15, is the computation of the Gröbner Basis of some specific ideals, specifically the toric ideal of the coefficient matrixA, unavoidable in each of the two algorithms. We have tried many applications specialized in algebraic calculations, for example, SageMath, Macaulay2, etc. Still, when the variables' number exceeds 15, usually the exponential of the generating elements of the polynomial ideal, which is required in the algorithm, is too great to be computable. For example, the computation of the Gröbner Basis of the matrixA=(B, I)whereIdenotes the identity matrix andB = [ 1 1 1 1 1 1 1 1 1 1; 1 2 3 4 5 6 7 8 9 10; 2 3 4 5 6 7 8 9 10 11; 3 4 5 6 7 8 9 10 11 12; 4 5 6 7 8 9 10 11 12 13; 5 6 7 8 9 10 11 12 13 14; 6 7 8 9 10 11 12 13 14 15; ]involves the computation of the Gröbner Basis of the toric ideal belowideal(x_8^2-x_7*x_9, x_7*x_8-x_6*x_9, x_6*x_8-x_5*x_9, x_5*x_8-x_4*x_9, x_4*x_8-x_3*x_9, x_3*x_8-x_2*x_9, x_2*x_8-x_1*x_9, x_1*x_8-x_0*x_9, x_7^2-x_5*x_9, x_6*x_7-x_4*x_9, x_5*x_7-x_3*x_9, x_4*x_7-x_2*x_9, x_3*x_7-x_1*x_9, x_2*x_7-x_0*x_9, x_1*x_7-x_0*x_8, x_6^2-x_3*x_9, x_5*x_6-x_2*x_9, x_4*x_6-x_1*x_9, x_3*x_6-x_0*x_9, x_2*x_6-x_0*x_8, x_1*x_6-x_0*x_7, x_5^2-x_1*x_9, x_4*x_5-x_0*x_9, x_3*x_5-x_0*x_8, x_2*x_5-x_0*x_7, x_1*x_5-x_0*x_6, x_4^2-x_0*x_8, x_3*x_4-x_0*x_7, x_2*x_4-x_0*x_6, x_1*x_4-x_0*x_5, x_3^2-x_0*x_6, x_2*x_3-x_0*x_5, x_1*x_3-x_0*x_4, x_2^2-x_0*x_4, x_1*x_2-x_0*x_3, x_1^2-x_0*x_2, x_8*x_11*x_12*x_13*x_14*x_15*x_16-x_9, x_7*x_11*x_12*x_13*x_14*x_15*x_16-x_8, x_6*x_11*x_12*x_13*x_14*x_15*x_16-x_7,
x_5*x_11*x_12*x_13*x_14*x_15*x_16-x_6, x_4*x_11*x_12*x_13*x_14*x_15*x_16-x_5,
x_3*x_11*x_12*x_13*x_14*x_15*x_16-x_4, x_2*x_11*x_12*x_13*x_14*x_15*x_16-x_3,
x_1*x_11*x_12*x_13*x_14*x_15*x_16-x_2, x_0*x_11*x_12*x_13*x_14*x_15*x_16-x_1,
x_9*x_10*x_14*x_15^2*x_16^3-x_0*x_6*x_11^2* x_12, x_8*x_10*x_14*x_15^2*x_16^3-x_0*x_5*x_11^2* x_12, x_7*x_10*x_14*x_15^2*x_16^3-x_0*x_4*x_11^2* x_12,
x_6*x_10*x_14*x_15^2*x_16^3-x_0*x_3*x_11^2* x_12, x_5*x_10*x_14*x_15^2*x_16^3-x_0*x_2*x_11^2* x_12, x_4*x_10*x_14*x_15^2*x_16^3-x_0*x_1*x_11^2* x_12,
x_3*x_10*x_14*x_15^2*x_16^3-x_0^2*x_11^2* x_12, x_0*x_5*x_11^3*x_12^2*x_13-x_9*x_10*x_15*x_16^2, x_0*x_4*x_11^3*x_12^2*x_13-x_8*x_10*x_15*x_16^2,
x_0*x_3*x_11^3*x_12^2*x_13-x_7*x_10*x_15*x_16^2, x_0*x_2*x_11^3*x_12^2*x_13-x_6*x_10*x_15*x_16^2, x_0*x_1*x_11^3*x_12^2*x_13-x_5*x_10*x_15*x_16^2,
x_0^2*x_11^3*x_12^2*x_13-x_4*x_10*x_15*x_16^2, x_2*x_10*x_13*x_14^2*x_15^3* x_16^4-x_0^2*x_11, x_1*x_10*x_12*x_13^2*x_14^3*x_15^4* x_16^5-x_0^2,
x_10*x_11*x_12^2*x_13^3*x_14^4*x_15^5* x_16^6-x_0),In future work, we will study how the situation can be improved by optimising the algorithm for computation of Gröbner bases, for example, the FaugèreF_4<cit.> andF_5<cit.> algorithms.
§.§ Stochastic network design
We have also tested our approach on a small stochastic network design problem, formulated as follows:
min ∑_a ∈ A c_a x_a+1/N∑_i=1^N∑_c ∈ C∑_a ∈ A q_a c y_a c^i
s.t. ∑_a ∈ A
a(0)=v y_a c^i-∑_a ∈ A
a(1)=v y_a c^i=d_v, c^i ∀(v, c, i) ∈ V × C ×{1, …, N}
∑_c ∈ C y_a c^i≤ u_a x_a ∀(a, i) ∈ A ×{1, …, N}
x_a∈{0,1}, y_a c^i∈
Following the same procedure as in Section <ref>, we compare our two algorithms with a commercial solver. Our instances concern a small problem, with three vertices and three arcs. Figure <ref> shows the time taken to compute the opportunity cost matrix for each approach.
We once more observe the superior efficiency of the kernel approach when the number of decision variables is small.
§ CONCLUSION
In this paper, we have presented new algorithms for computing the opportunity cost matrix of <cit.> using algebraic methods using Gröbner and Graver bases. We have also provided mathematical results showing the relationship of Graver bases for deterministic and stochastic integer programs. Our numerical results show that the Gröbner basis is very efficient as the number of scenarios increases if the number of variables of the underlying integer program does not grow too fast. On the other hand, the Graver basis approach is interesting when there are a large number of variables.
In future work, we propose to include more recent methods of computing Gröbner basis, such as the Faugère algorithms. We will also study how to combine the algebraic approach with approximations such as Lagrangian cuts in order to increase further the number of decision variables that our approach can handle.
|
http://arxiv.org/abs/2303.07250v2
|
20230313162408
|
The balance between contamination and predation determine species existence in prey-predator dynamics with contaminated and uncontaminated prey
|
[
"Amit Samadder",
"Arnab Chattopadhyay",
"Sabyasachi Bhattacharya"
] |
q-bio.PE
|
[
"q-bio.PE"
] |
Topological phase transitions generated by order from quantum disorder
Fadi Sun^1 and Jinwu Ye^1,2
March 30, 2023
========================================================================
In freshwater ecosystems, aquatic insects that ontogenetically shift their habitat from aquatic to terrestrial play vital roles as prey subsidies that move nutrients and energy from aquatic to terrestrial food webs. As a result, these subsidies negatively affect alternative terrestrial prey by enhancing predator density. However, these aquatic insects can also transport contamination to the terrestrial community that is primarily produced in aquatic ecosystems. Which can reduce insectivore abundance and biomass, lower insectivore reproductive success, and increase predation pressure on alternative prey with consequences for aquatic and terrestrial food webs. Motivated by this, here we consider a prey-predator model where the predator consumes contaminated and uncontaminated prey together. We find that, at a high level of contamination, the vulnerability of contaminated prey and predator is determined by predation preference. More specifically, a very low predation preference towards contaminated prey ensures predator persistence, whereas a low, high preference excludes the predator from the system. Interestingly, either contaminated prey or the predator exist at intermediate predation preference due to bi-stability.
Furthermore, when there is no contamination in one of the prey, the other prey can not coexist due to apparent competition for a specific range of predation preferences. However, when sufficient contamination exists in one prey, alternative uncontaminated prey coexists. With this, contamination also stabilizes and destabilizes the three species dynamics. Our result also indicates that if the intensity of the contamination in predator reproduction is low, then contaminated prey is more susceptible to the contamination.
§ INTRODUCTION
Across the globe is growing concern about environmental pollution in ecosystem health, as it is one of the direct drivers of ecosystem change at the global scale and a significant contributor to biodiversity loss <cit.>. Pollution can adversely affect a diverse range of organisms by impairing their neurological function, behavior, and life cycle parameters, like survival and reproduction <cit.>. Organisms exposed to the polluted environment often take up contaminants through food and water. These contaminants are then passed onto the higher trophic level through trophic interactions and consequently spread toxicity across the the food web. So, quantifying the risk of pollutants requires not only a prior knowledge of their effect on individual organisms but also an understanding of how interacting species respond to chemical stressors.
Several theoretical studies have examined the impact of environmental contamination on ecosystem stability, persistence<cit.>. The earliest mechanistic models in this area were the works based on single species dynamics<cit.>. Further, it was extended for the trophic interactions. For instance, <cit.> predicts that high concentrations of methylmercury lead to the collapse of the entire bi-trophic food chain, while at intermediate toxin concentrations, predators become more vulnerable than the contaminated prey. <cit.> also point out that the consumer population is more susceptible to less extreme copper concentrations than the contaminated prey. Apart from the trophic food chain, the impact of contamination on complex, large food webs is also done and shows that in a more polluted environment, topological properties of the food web are more vital for stability <cit.>.
Most of these theoretical studies focus on the impact of contamination on interacting species dynamics by considering all the prey of the predator is contaminated. However, in a natural ecosystem, many generalist predators can consume contaminated and uncontaminated prey together. For instance, <cit.> find that Bonelli eagles acquire most of their burden through the intake of secondary consumers as mercury levels were very low in alternative prey. Further, some consumers tend to forage over larger spatial scales even up to kilometers, naturally they can consume prey from contaminated and uncontaminated sites. Again, prey that disperses from contaminant sites can transport contaminants to a spatially separated prey-predator community<cit.>. Recent evidence demonstrates that aquatic insects export substantial mercury from the aquatic environment to terrestrial insectivore communities, like songbirds, which frequently consume terrestrial and aquatic insects<cit.>. However, we know very little about how contamination affects these communities.
Theory and experimental evidence predict that prey subsidies can support a denser predator population, consequently increase predation on the alternative prey population<cit.>. Despite the benefits of aquatic insect emergence as an alternative energy source to the predator, they can also degrade predators through the tropic transfer of aquatically derived environmental contaminants<cit.>, such as methylmercury, that primarily produced in aquatic environments <cit.>. Indeed, in the face of current environmental pollution, predators are predicted to be more susceptible than the contaminated prey<cit.>. However, it is difficult to predict the victim of contamination when a predator accumulate contaminates through the prey only and also have an alternative uncontaminated energy source, because, while contamination negatively affects both the predator and contaminated prey, the flow of contamination to the predator also depends on the predator's diet composition<cit.>. So the predators more sensitive to the contamination may not suffer from considerable extinction risk if they rarely prefer to consume contaminated prey. Conversely, predators less sensitive to contamination can carry high extinction risk if they frequently consume contaminated prey. Furthermore, a high predation pressure can also have a determental effect for the contaminated prey and predator in highly contaminated environment <cit.>.
Apart from the predator, contamination may also regulate indirect interaction between preys. In general, food web modules such as multi-prey with a common predator, prey is known to compete with each other indirectly, also known as apparent competition<cit.>. The idea of apparent competition is two prey species negatively affect each other by increasing the equilibrium density of the shared predator, and in an extreme case, one prey excludes another alternative prey from the community <cit.>. Experimental evidence also supports this phenomenon by showing that aquatic insects subsidiary suppress terrestrial herbivore insects by increasing predator density <cit.>. In apparent competition between terrestrial and aquatic emergent insects, contamination in aquatic prey can reduce top-down pressure on the uncontaminated terrestrial prey by decreasing the predator density, thereby can initiate its persistence. Conversely, predators that prefer quality over quantity can also increase predation pressure on uncontaminated prey by shifting their diet to more favorable prey <cit.>, thus can enhance its extinction risk. <cit.> find that contamination can alter the outcome of the direct competition by suppressing competitively superior species. Nevertheless, how contamination affects indirect competition between prey is yet to be known.
In light of the above-known facts, here we formulate a prey-predator model where the predator consumes contaminated and uncontaminated prey together. We mainly attempt to answer the interrelated questions: (1) Does contamination become a precursor of extinction for the predator or the contaminated prey? (2) How does contamination affect the indirect competition between prey? (3) What is the role of predation preference in rescuing or imperiling each species in contaminated environments? We use bifurcation analysis to investigate this system's possible asymptotic states and hypothesize that direct and indirect species interaction have a profound effect in driving the dynamics of contaminated systems.
The rest of the paper is organized as follows. In section<ref>, we develop a toxin-dependent prey-predator model with uncontaminated prey. In this section, we also derive dimensionless form by suitable parameter substitutions. In section<ref>, we investigate the possible asymptotic states of our system with the help of bifurcation
diagrams. We also check the robustness of the result for other parameter sets and alternative assumptions. Finlay, in section<ref>, we complete the paper with a brief discussion.
§ METHODS
§.§ Modelling framework
Our proposed model consists of three populations: X, Y, and Z. We assume that X is the contaminated prey density, Y is the uncontaminated prey density, and Z is the predator population density that consumes both prey with some preferences. We assume contamination pollutes water-based habitat, which enters into the prey X by direct absorption from water. When it comes to terrestrial habitat, terrestrial predators get contaminated by consuming that contaminated prey. We also assume that contaminated prey is the only source of contamination for the predator. We did not assume any direct competition between prey due to their dietary separation. In absence of the contamination in the prey X, the growth profile describes by the following set of differential equations:
dX/dt=r_1X(1-X/K_1)-aqXZ/ζ+qX+(1-q)Y
dY/dt=r_2Y(1-Y/K_2)-a(1-q)YZ/ζ+qX+(1-q)Y
dZ/dt=e( aqXZ+a(1-q)YZ/ζ+qX+(1-q)Y) -mZ
The above model represents an apperent competition model under non-switching framework<cit.>.
The parameters r_i (i=1,2) denotes the intrinsic growth of the preys, K_i (i=1,2) are the carrying capacities of the preys. We assume saturating functional response where a is the attack rate of the predator and q, (1-q), (0≤ q ≤ 1) are the preferences of the predator for the prey X and Y respectively. e is the conversion efficiency of the predator and m is the natural mortality rate.
§.§.§ Modelling dynamics of the internal contamination concentration
A general assumption in modeling the ecological dynamics of a system and pollution dynamics of the individuals together is that, the dynamics of the pollution in the species body operate much faster timescale than the ecological dynamics. So the internal concentration in an individual's body approaches the steady state before the population dynamics change significantly. Simultaneously, it reduces the model dimensions and facilitates analysis <cit.> . Bellow, we derive the internal concentration of the contamination in the individual body.
A simple and mechanical bio-dynamic model of internal concentration of contamination can be written by the following form<cit.>:
C_t^'=( I_W+I_F ) -k_eC_t
where C_t is the internal concentration of the contamination of an organism's body at time t. I_W and I_F are the unidirectional fluxes of the contamination coming from environment and food respectively. k_e is the constant loss rate of the contamination from body of the organism. We can write I_W, I_F as,
I_W=k_u× C_c
I_F=AE× IR× C_F
Where C_c is the concentration of the contamination in the environment, k_u denotes uptake constant in the body, AE= assimilation efficiency, IR=egnation rate, C_F=concentration in food. Combining equation (2.4), (2.5) and (2.6) we get the steady state approximation of internal concentration of contamination by equating C^'_t=0 as a ratio of total uptake divided
elimination rate constant <cit.> ,
C_ss=k_u× C_c+AE× IR× C_F/k_e
The internal concentration of the contaminant of the prey is:
C=k_u× C_c/k_e^prey
The internal contaminant in the predator can be written in terms of the prey contamination concentration(Prey internal concentration) as:
C_P=β× aqX/( ζ+qX+(1-q)Y ) k_e^predator× C
β is the assimilation efficiency of the predator.
§.§.§ Incorporating contamination in prey predator dynamics
Before incorporating contamination in to our three species model we make following assumptions:
* We let the growth of contaminated prey is r/1+kC, where C is the pollution in prey and k is the intensity of the pollution in the prey growth. We choose such type of effect of contamination in prey growth to avoid the prey extinction due to contamination only. By doing this we can access other effects that may drive contaminated prey to the extinction. We also assume that contaminated prey have no contamination related mortality(but see section <ref>).
* We consider Y as a terrestrial herbivore which did not consume contamination due to boundary separation between contaminated and uncontaminated sites.
* The reproduction of the predator Z directly affected by the consumption of the contaminated prey. We implement the reduction of the predator reproduction by rewriting the conversion efficiency in the form of max(0,1-bC_p)=max(0,1-β baqXC/( ζ+qX+(1-q)Y ) k_e^predator), b is the intensity of the pollution in the predator reproduction in other words 1/b is the internal concentration at which reproduction is zero.
* We did not incorporate the effect of the contamination in the predator mortality as songbird is our model predator and studies found that songbird did not exhibit significant difference in the mortality between contaminated and uncontaminated sites<cit.>.
Keeping above assumptions in mind we can write the contaminated prey predator system as:
dX/dt=r_1/1+kCX(1-X/K_1)- aqXZ/ζ+qX+(1-q)Y
dY/dt=r_2Y(1-Y/K_2)-a(1-q)YZ/ζ+qX+(1-q)Y
dZ/dt=e max( 0, 1-β baqXC/( ζ+qX+(1-q)Y) k_e^predator ) ( aqXZ+a(1-q)YZ/ζ+qY+(1-q)Y ) -mZ
§.§.§ Dimensionless Model
To reduce the number of model parameters we dimensionless the above model by considering following substitutions:
τ=r_1t, x=X/K_1, y=y/K_1, z=Z/K_1, l=a/r_1, c=kC, η=ζ/K_1, r=r_2/r_1 λ=βr_1b/k_e^predatork, d=m/r_1, K=K_2/K_1
The dimensionless form of our above model is:
dx/dτ=x/1+c(1-x)-lqxz/η+qx+(1-q)y
dy/dτ=ry(1-y/K)-l(1-q)yz/η+qx+(1-q)y
dz/dτ=el max( 0, 1-λ ql xc/η+qx+(1-q)y ) ( qxz+(1-q)yz/η+qx+(1-q)y ) -dz
§.§ Model calibration and analysis
Mathematical analysis of positively and boundedness of the solutions carried out in Appendix.A to ensure that our model mechanistically well define. Standard methods
of linear stability analysis provides the analytical conditions for existence and
stability of the various equilibrium of the system in appendix.B.
We perform extensive bifurcation analysis to explore possible emerge dynamics of the system (2.13-2.15). Numerical bifurcations are performed in MATLAB using numerical continuation software MATCONT <cit.>and father verified by tracing time series data trough deSolve package in R. For the lake of sufficient parameter values form existing literatures in the case of our modeled species we assume hypothetical parameter values which are biologically feasible:
l=1, η_1=0.5, η_2=0.5, r=0.5, K=1, e=0.4, λ =1.7, d=0.1, parallely we also investigate the dynamics for aditional parameter sets in section <ref>. Throughout the analysis we set parameters such a way that make the species Y as inferior indirect competitor and X as superior indirect competitor in absence of any contamination.
§ RESULTS
In this section we used few notations to describe dynamics of the following system. The stable coexistence equilibrium and oscillatory coexistence equilibrium denoted by SC, OC respectively. The contaminated and uncontaminated prey extinction equilibrium denoted by CPE, UPE while the predator extinction equilibrium referred to as PDE.
§.§ Prey predator dynamics in uncontaminated system
Before investigating the effect of contamination in this three-species food web module, we study our model without contamination to better understand the dynamical consequences when we will incorporate contamination. As predator preference is one of the key parameters of our uncontaminated model, we perform one parameter bifurcation w.r.t predator preference to quantify the qualitative outcomes. Figure <ref> depicted that when the predator performs as a specialist, that is, its preference is either very low or very high upon X(vice versa for Y) we observe unusable prey-predator dynamics, where prey and predator exhibit a stable limit cycle around the unstable fixed point. Further walking along the average preference from both sides, we find that the dynamics become stable through Hopf bifurcation(H), where three species system coexists in a stable equilibrium and oscillation dies out. When the predator performs as a generalist or its preference is around the average of the preferences, we observe another regime shift through transcritical bifurcation(TB); with this regime shift, the dynamics enter into one prey extinction equilibrium from a coexistence equilibrium(see Figure <ref>). This extinction occurs due to apparent competition between prey<cit.>. The idea of the apparent competition is that if two prey species coexist at equilibrium, the abundance of each is necessarily lower than if it were alone with the predator. Alternatively, if the predator persists and the two prey species cannot coexist, then one prey indirectly excludes the other from the community by sustaining the predator.
§.§ Prey predator dynamics in contaminated sytem
To account the effect of contamination in our model system, we perform a one-parameter bifurcation diagram with contamination in prey. We fixed the predator preference q at three values; low contaminated prey preference(q=0.15), moderate contaminated prey preference (q=0.5), and high contaminated prey preference(q=0.85). The corresponding dynamics are depicted in Figure <ref>.
At low contaminated prey preference (q=0.15), we observe stable coexistence of three species at low contamination. Moving along the contamination axis, we see the entry and the exit of the stable coexistence state in unstable equilibrium through the initiation and elimination of the hopf bifurcation (H). This phenomenon is also known as the" bubbling effect" in ecological literature due to the shape of the bubble in the
one parameter space and also appear in other ecological studies<cit.>. We also observe that the equilibrium density of the contaminated prey decreases first with the contamination and then increases, while the equilibrium density of the uncontaminated prey consistently increases. With this, we also note that the predator's equilibrium density decreases and become extinct through transcritical bifurcation(TB).
In Figure <ref>, at the moderate preference for the contaminated prey(q=0.5), moving along the contamination axes-c from zero contamination in prey, we observed equilibrium abundance of the contaminated prey increases. At the same time, the equilibrium abundance of the predator decreases and is also observed by another study <cit.>. That is, contamination affects the predator more than the prey, which releases the contaminated prey from being consumed by the predator, and prey abundance increases. In this case, we observed that uncontaminated prey is in extinction (Figure <ref>). However, after a threshold of the prey contamination, we see the rescue of the uncontaminated prey through transcritical bifurcation. Moving further, we observe that the equilibrium abundance of the contaminated prey and predator decreases while the equilibrium abundance of the uncontaminated prey increases. We also observe the bubbling effect as in the case of low preference for the contaminated prey. Followed by the disappearance of the unstable dynamics, we find bistability between two stable fixed points with one in predator extinction state(see Figure <ref>). Mathematically bistability arises due to saddle-node bifurcation, where the stability of the coexistence equilibrium is lost by colliding with another unstable coexistence equilibrium. The bistability region is from the transcritical point (c=1.103) up to the limit point (c=1.29). In this bi-stability region, the population will go to the predator extinction equilibrium(PDE) for some initial conditions, while for others, in stable predator existence equilibrium(SC). Ecologically in this region, a considerable perturbation can bring the predator to extinction from the existing state or lead to predator establishment from the extinction state. The threshold density above which the predator can establish the prey's coexistent equilibrium or the critical density below which the predator will go to extinction from the coexistence equilibrium is the allee threshold of the predator <cit.>.
Moving further, we find the disappearance of the bistable state through the limit point(LP, c=1.29) and the existence of the predator only extinction equilibrium (PDE)(see Figure <ref>) where prey contamination drives predator to the extinction due to reduction of the reproduction(see Figure <ref>). Following the extintion of the predator, both the prey reach to the carrying capacity due to the release from the predation(see Figure <ref>). We observe the region from the second limit point(c=1.84) to the second transcritical point (TB) at(c=2). In this region, two alternative fixed points exist one predator existence and another predator extinction equilibrium. That is, the predator can established to the system in the prey coexistence equilibrium. After the transcritical point, we observe two stable fixed points; in one, contaminated prey exists but the predator is in extinction. While in other, the predator exists, but the contaminant prey is in an extinction state. That is, if the predator is absent in the system and two prey exists, then the predator can established to the system if its density is above some critical density. However, it ultimately brings the contaminant prey to extinction due to apparent competition. On the other hand, if a predator and uncontaminated prey exist in the system, but contaminant prey is absent, contaminant prey can established the system if its density is above a critical density but drives the predator to extinction due to contamination.
At the high contaminated prey preference (q=0.85) we see the oscillation of three species(OS) at low contamination. Moving further, we observe that the dynamics become stable through hopf bifurcation (H). Followed by the hopf bifurcation, we see the equilibrium density of the contaminated prey and uncontaminated prey increase, and the equilibrium density of the predator decreases until the system goes to the saddle-node bifurcation where two equilibrium points exist, one is three species stable coexistence (SC) and another is predator extinction equilibrium (PDE).
§.§ Two Parameter bifurcation diagram
In order to get insights more to the interplay between predation preference and contamination concentration in prey we perform two parameter bifurcation in bi-parameter space q-c. We also interested in the joint impact of contamination intensity in predator reproduction and the contamination in prey, to investigate it we perform two parameter bifurcation analysis in λ -c plane. The dynamics of the system in different bi-parameter spaces (simultaneous variation of two parameters) would be interesting and may
reveal rich dynamical behaviors in the system.
§.§.§ Dynamical interplay between predation preference(q) and contamination in prey (c)
In Figure<ref>, the q-c parameter space is divided into seven distinct regions of different dynamical behaviours and are separated by lines which represents different types of bifurcation curves. Moving along the contamination axis with low contaminated prey preference we observe the dynamics in region 3 where three species exhibits oscillatory coexistence (OC) and at high contamination the system enter into region 2 where the dynamics become stable through hopf bifurcation. In region 1 the uncontaminated prey become extinct and with contamination the dynamics enter into region 2 through transcritical bifurcation and the uncontaminated prey came back to the system. Further increasing the contamination, the system move from region 2 to region 5 for low contaminated prey preference or in region 4 at moderate contaminated prey preference. In region 5 the contaminated predator become extinct followed by transcritical bifurcation. If the contamination in prey increases further we observe bistability between PDE and CPE in region 6. At high contaminated preference and low or no contamination in prey, we still observe the oscillatory dynamics in region 3, with increasing contamination the dynamics either enter to region 7 through transcritial curve or via region 2 it fall in region 4. In region 7 we see bistability between OC and PDE. At region 4 we observe bistability between SC and PDE.
When contamination of prey is low(c=0.5), moving along the prey preference axis from zero to one we observe the dynamical behaviour fall in region 1, 3. That is, at low contamination contaminated prey preference dose not effect predator persistence. At moderate contamination walking along the prey preference we see the shift of the dynamical behaviour from region 2 to region 4 or region 5 through the transcritical bifurcation curve. This transcritical bifurcation curve is the predator persistence line (red line). In the left hand side of this line the predator always persist but in the right hand side of this line predator dose not persist in some region and conditionally persist in other regions. In this bi-parameter space we also observe Saddle-node Trancritical interaction point (ST), which have important ecological significance. At this point allee effect despair by colliding the saddle node point (LP) with transcritical point (TB), that is system enter to a smooth extinction state from abrupt extinction state<cit.>.
§.§.§ Dynamical interplay between intensity of contamination in predator reproductionand contamination in prey (c)
To demonstrate how the intensity of the contamination in predator reproduction and contamination in prey influences prey-predator dynamics, we carried out a two-parameter bifurcation diagram in Figure<ref>. At low contamination, we observe that uncontaminated prey is in an extinction state and contaminated prey and predator stably exist in region 1. Moving along the contamination axis, we observe that the dynamics enter into region 2 through transcritical bifurcation (TB). In this region, three species coexist in stable equilibrium (SC). We also observe the region 3 surrounded by the Hopf curve of region 2, where three species exhibit unstable dynamics. When the effect of the contamination in predator reproduction is moderate, we observe that the dynamics enter from the region 2 to the region 4 through the Limit point curve. In this region, the model exhibit bi-stable dynamics between predator extinction equilibrium (PDE) and stable coexistence equilibrium (SC). If the severity of the contamination in predator reproduction further increases, the predator can not persist to the system in region 5.
At high contamination, if the intensity of the contamination in predator reproduction is low, we observe the extinction of the contaminated prey (CPE) in region 8. Where the region 8 is separated from 2 by the transcritical curve (TB), on the contrary, increasing the intensity of the contamination in predator reproduction, the dynamics can enter into the bi-stable region 6. In this region, the system's dynamics can reach the predator extinction equilibrium (PDE) for some initial conditions while for others, in the contaminated prey equilibrium (CPE).
§.§ Robustness
§.§.§ Robustness for other parameter sets
Along with the above parameter set, we consider two additional parameter sets to ensure that the dynamics we have found are not a particular case. The dynamics in new parameter sets depicted in Figure <ref> The qualitative behavior of this species interaction module is almost identical, except some new regions appear and some previous regions disappear in these new parameter combinations. For instance the three species oscillation region 3 expand in <ref>(a,c) while in <ref>(b,d) is it become more narrow or completely absent as compared to Figure <ref>,<ref>. Further region 7 where we see the bi-stability between PDE and OC is completely absent in Figure <ref>(a,b).
§.§.§ Robustness for alternative functional form of prey reproduction and incorporation of contamination induced prey mortality
Our main analysis assumes a nonlinear functional form for the reproduction of contaminated prey with contamination. We relax this assumption by replacing the function 1/1+c with the linear response of contamination max(0,1-c) in prey reproduction. Further, in the primary analysis, we did not assume any contaminated-related death in the contaminated prey. We add the term m_1cx in the equation (2.13) to incorporate contamination-related death of the prey. Where m_1 is the effect of toxin on the mortality, c is the contamination in prey and x is the contaminated prey density. Figure <ref> is the representation of the of the Figure <ref>, Figure <ref> for the parameter set given in the caption of Figure <ref>. We can observe that the qualitative dynamical behavior of the system more or less same with previous assumption.
§ DISCUSSION
Methylmercury (MeHg) was previously thought only to threaten aquatic biota and consumers of aquatic organisms, as aquatic environments provide ideal conditions for the conversion of inorganic mercury to MeHg<cit.>. However, recent studies have found elevated concentrations of MeHg in terrestrial consumers, which seeks special attention in conservation management due to the worldwide decline of insectivores<cit.>. The main reason behind the transfer of aquatic contamination to terrestrial consumers is the predation of emergent aquatic insects <cit.>. It is well known that aquatic prey can negatively affect terrestrial preys<cit.>through the increase of predator density. Furthermore, contamination can also drive insectivores and aquatic prey to the edge of extinction, which may also depend on predation. So, it is necessary to understand how contamination drives these species' dynamics to quantify the risk of contamination more preciously. In connection to this, in this work, we have examined the effect of harmful and beneficial prey associated with contamination on predator persistence. In addition, we also investigate the combined impacts of contamination and indirect competition in the prey-predator dynamics and how ecological and environmental factors shape community stability and species coexistence mechanisms. To do this, we connect the classical apparent competition model<cit.> with the contamination in one of the prey. Where contamination decreases the reproduction rate of the prey, predator and the predator intake both prey with some preferences. We assume that the predator did not uptake contamination through the environment because here we consider the situation where aquatic insects transport contamination to the terrestrial predator <cit.>. We demonstrate that this ecological model has a rich repertoire of dynamical behaviors, including different species coexistence equilibrium, alternative stable states, and stable limit cycles.
§.§ Indirect effect of contamination in uncontaminated prey
We first consider the case where there is no contamination in the system, and prey-predator dynamics depend upon the predator's preference. We observe the vulnerable region in the one-parameter space where uncontaminated prey can not persist in the system due to apparent competition(see Figure <ref>). Such species extinction due to indirect competition between prey has previously occurred in different studies <cit.>. Further, we investigate how contamination affects the system when uncontaminated prey is in extinction (see Figure <ref>). We point out that a small amount of contamination is necessary for the three species' coexistence when predation preference is relatively higher toward uncontaminated prey. It occurs because contamination reduces the positive bottom-up effect of contaminated prey on the predator and decreases the predator population. As a result, top-down control on the uncontaminated prey decreases, which initiates its persistence. Thus a small amount of contamination can rescue the alternative prey in indirect competition; in direct competition, such effect is also investigated by <cit.>. Note that, such a strictly positive effect of contamination on alternative uncontaminated prey can be observed if predation preference is high enough towards the alternative prey than the focal prey (see region 1 in Figure<ref>). For instance, <cit.> did not find any significant positive effect of aquatic contamination on terrestrial prey. One reason behind it is that the predator prefers aquatic prey over terrestrial prey. We expect a positive effect of contamination in uncontaminated terrestrial prey where the uncontaminated prey is more depressed by predation due to aquatic subsidiary <cit.>.
§.§ contamination can destabilize dynamics and effect of contamination in contaminated prey, predator
Previous studies reported that contamination stabilizes prey-predator dynamics when prey and predator are exposed simultaneously to a toxin or predator intake toxins through prey only<cit.>. In our study, we also observe that a high level of contamination can stabilize the system. However, when contamination is low on the prey, and the predator has a low or moderate preference for contaminated prey, in that case, contamination can also destabilize prey-predator dynamics(see Figure <ref>, q=0.15,0.5). We also observe that increasing level of contamination drives the predator to catastrophic extinction as reported by other studies <cit.>. Such an abrupt change involves bi-stability, a slight change in environmental condition can drive the system to an alternative attractor, but to return it to the original state, a more extensive improvement of the environmental condition requires<cit.>.
Interestingly, when predator consume both preys with equal preference (q=0.5), further increasing the level of contamination generate an alternative stable state at which the predator can persist with its two prey (right yellow region in Figure<ref>, q=0.5). Note that a higher level of contamination always leads to the predator's extinction from its coexistence state due to lower reproduction (see Figure <ref>). However, the predator can establish the two prey coexistence equilibrium if its initial density is above some critical threshold and decrease the density of the contaminated prey at such a critical level that it does not hamper the predator persistence. If the prey's contamination level increases further, predator and contaminated prey cannot coexist due to bi-stability. That is, depending upon the initial condition, either contaminated prey or the predator exists with uncontaminated prey in a stable equilibrium. Previous studies highlight that prey can benefit from contamination as it decreases the predator<cit.>. In our study, we observe that in the presence of alternative uncontaminated prey, the contaminated prey can go to extinction, but the predator can persist in an alternative equilibrium. With this prey extinction, the predator gets its potential reproduction rate with the limited resource (see Figure <ref> upper curve).
§.§ Role of predation preference and sensitivity of predator to contamination in species persistance
Predator preference for contaminated and uncontaminated prey can affect its persistence which can be understood by Figure <ref>. In a more polluted environment, more preference for uncontaminated prey is always beneficial to the predator as it prompts its persistence from any positive initial condition; the regions to the left side of the red line exhibit such behavior in our model. Although predators can exist within the system under more polluted prey preference in region 6 and 4, these are bi-stable regions that do not guarantee predator persistence. It is interesting
to note that, the region 6 is bounded below by region 5, which indicates that if predation preference for contaminated prey drops below a threshold than the contaminated prey can invade the system and drives the predator to extinction. The fact is, if a predator is initially abundant in the system, then a minimum predation pressure require to inhabit the establishment of the contaminated prey; otherwise, contaminated prey establish to the system and ultimately drives predator to the extinction through the trophic transfer of the contaminates. Note that, this predation pressure can not always inhabit contaminated prey establishment, if the initial density of the contaminated prey is relatively higher then contaminated prey ultimately establish to the system. Also note that region 6 also bounded above by region 5, that implies if predation preference for contaminated prey high enough then predator can not exist due to the higher flow of contamination. Figure <ref> unveil that if the effect of contamination in predator reproduction is low, then the existence of the contaminated prey is more hampered than the predator (region 8). As we assume that there is no contamination-related mortality of the contaminated prey, we can intuitively say this is the combined effect of two mechanisms. First, contamination limits the prey's growth by reducing their reproduction rate thus decreases the flow of toxicity in per-capita predator population. On the other hand, uncontaminated prey maintains predator density; as a result, the top-down pressure on the contaminated prey increases and becomes extinct. Alternatively, we can say this occurs due to the combined effect of contamination and apparent competition<cit.>. Further, we observe that predator can not survive at a moderate level of contamination when the intensity of the contamination in predator reproduction is high 5. However, note that increasing further contamination predator can return to the system in region 6. Intuitively, this occurs because at a moderate level of contamination prey growth does not fall much compared to a high level of contamination; thus, a sufficient amount of contamination can flow to the predator and become a cause of predator extinction. However, if the contamination increases in the prey further and predator is initially abundant to the system, then the prey suffer from extinction risk due to lower reproduction and high predation pressure, as a result the predator can persist in the system.
§.§ Modelling caveats and future direction
Our model includes a number of simplifications; for instance, our study did not incorporate any stage structure of the contaminated prey, although, in reality, aquatic insects are in stage structure. Stage structures are known to affect the prey-predator dynamics in various ways <cit.>. Incorporation of stage structure in this model requires proper knowledge about contamination's effect in different life stages, like the effect of contamination in metamorphosis and stage-specific mortality<cit.>. Further, it will enhance the complexity of the model and parallelly the dynamics. So we restrict our model without any stage structure. Future studies can incorporate it, which may create additional results that are more realistic in the present scenario. Also, our model merges all the contaminated, uncontaminated prey in single variables. However, in reality, a predator can consume more than two prey with specified preferences. In our model, we did not highlight this situation.
Moreover, contamination-induced behavioral change is another limitation of our study<cit.>. We believe that incorporating these things does not alter our main conclusion. We also assume that terrestrial herbivore prey is totally uncontaminated; a low amount of contamination may present in terrestrial herbivores, which may unlikely affect their growth and the insectivores significantly. For instance, <cit.> find that terrestrial preys of spiders contain around nineteen times less contamination as in aquatic prey and also estimated methylmercury in some terrestrial insects is zero. Further <cit.> also found a significant difference of contamination in terrestrial herbivores and emergent aquatic insects, and some terrestrial insects contain a negligible amount of methylmercury.
In summary, our focus was to combine the effect of direct and indirect species interactions, such as predation and apparent competition, and their response to contamination in species dynamics. Our model highlights the significant possibilities through which contamination can affect this type of prey-predator dynamics. For instance, our study predicts that at higher contamination, contaminated prey can alone be the victim of contamination if there is an alternative prey in the system. Our results also predict that the negative effect of aquatic prey on terrestrial prey can be diminished if the aquatic ecosystem holds a small amount of contamination. Further, a predator can sustain in response to highly contaminated prey under more uncontaminated prey preference. Overall, this study may help to understand the ecotoxicological process and its consequence in community dynamics involving direct and indirect species interactions.
§ APPENDIX A. POSITIVITY AND BOUNDEDNESS OF THE SOLUTION
§.§ Appendix A.1. Existence, uniqueness and positive invariance
The right hand side of the system (2.13-2.15) is continuously differentiable and locally Lipschitz in the first quadrant which implies the existence and uniqueness of
solutions for the system in R_+^3. For positive invariance we rewrite the system as:
dX/dτ=F(X)
Where X=[x,y,z]^T ∈ R_+^3 and F(X)=[F_1(X),F_2(X),F_3(X)]^T. The solutions of the system remain in the first quadrant for any non-negative initial condition for all τ≥ 0, since F_i(X)|_X_i=0≥ 0 for all X_i=0 where i=1,2,3
§.§ Appendix A.2. Boundedness
Let B(t)=x(t)+y(t)+z(t) and differentiating B once yields
dB/dt
=x/1+c(1-x)-lqxz/η+qx+(1-q)y+ry(1-y/K)
-l(1-q)yz/η+qx+(1-q)y
+el max( 0, 1-λ ql xc/η+qx+(1-q)y ) ( qxz+(1-q)yz/η+qx+(1-q)y ) -dz
=x/1+c(1-x)+ry(1-y/K)-l(1-e max( 0, 1-λ ql xc/η+qx+(1-q)y )) ( qxz+(1-q)yz/η+qx+(1-q)y ) -dz
Since 1/1+c≤1, 1- emax( 0, 1-λ ql xc/η+qx+(1-q)y ) ≥ 0
dB/dt≤ x(1-x)+ry(1-y/K) -dz
for any arbitary positive real number N we get,
dB/dt+NB ≤ x(1-x)+ry(1-y/K)-dz+N(x+y+z)
Taking N≤ d we get,
dB/dt+NB ≤ x(1-x+N)+y(r-yr/K+N)
The maximum values of x(1-x+N), y(r-yr/K+N) are (N+1)^2/4, K(r+N)^2/4r respectively. By letting A=(N+1)^2/4+K(r+N)^2/4r we get
dB/dt+NB ≤ A
By diffrential inequality
0< B(x,y,z)≤A(1-exp(-Nt))/N+B(x(0),y(0),z(0))exp(-Nt)
So for large values of t we have 0 ≤ B≤A/N. Hence the solution of the system are bounded in the positive quadrant.
§ APPENDIX.B. LOCAL STABILITY ANALYSIS OF THE EQUILIBRIUM POINTS
Our model exhibit seven possible equilibrium points E_0=(0,0,0), E_1=(1,0,0), E_2=(0,K,0), E_3=(1,K,0), E_4=(x_4,0,z_4), E_5=(0,y_5,z_5), E_6=(x_6,y_6,z_6). The jacobian matrix at any equilibrium point (x^*,y^*,z^*) is:
J=
[ J_11 J_12 J_13; J_21 J_22 J_23; J_31 J_32 J_33 ]
Where J_11=∂ dx/∂ x dt|_(x^*,y^*,z^*), J_12=∂ dx/∂ y dt|_(x^*,y^*,z^*), J_13=∂ dx/∂ z dt|_(x^*,y^*,z^*), J_21=∂ dy/∂ x dt|_(x^*,y^*,z^*), J_23=∂ dy/∂ y dt|_(x^*,y^*,z^*), J_23=∂ dy/∂ z dt|_(x^*,y^*,z^*), J_31=∂ dz/∂ x dt|_(x^*,y^*,z^*), J_32=∂ dz/∂ y dt|_(x^*,y^*,z^*), J_33=∂ dz/∂ z dt|_(x^*,y^*,z^*)
* The jacobian at the trivial equilibrium point (0,0,0) is:
J(E_0)=
[ 1/1+c 0 0; 0 r 0; 0 0 -d ]
and the eigenvalues of the Jacobian matrix are
1/1+c, r, -d. Since one of the eigenvalues of J(E_0) is positive, so the system at the equilibrium point E_0(0, 0, 0) is always unstable.
* The jacobian at E_1 is:
J(E_1)=
[ -1/1+c 0 0; 0 r 0; 0 0 emax(0,1-λ lqc/η+q)ql/η+q-d ]
Since r is a positive eigenvalue of the jacobian matrix J(E_1), E_1 is unstable.
* The jacobian at the equilibrium E_2 is:
J(E_2)=
[ 1/1+c 0 0; 0 -r 0; 0 0 (1-q)lK/η+(1-q)K-d ]
The equilibrium E_2 is unstable as 1/1+c is the positive real root of the jacobian.
* The jacobian at the equilibrium E_3 is:
J(E_3)=
[ -1/1+c 0 lq/η+q+(1-q)K; 0 -r 0; 0 0 emax(0,1-λ lqc/η+q+(1-q)K)ql+(1-q)lK /η+q+(1-q)K-d ]
As the lower diagonal of the jacobian matrix is zero then the roots are -1/1+c, -r, emax(0,1-λ lqc/η+q+(1-q)K)ql+(1-q)lK/η+q+(1-q)K-d. The first two roots are negative so the stability require that third root to be negative. For λ lqc/η+q+(1-q)K≥ 1 the last root is also negative and the system is stable. If λ lqc/η+q+(1-q)K< 1 then the stability require e(1-λ lqc/η+q+(1-q)K)ql+(1-q)lK/η+q+(1-q)K<d.
* The uncontaminated prey extinction equilibrium E_4=(x_4,0,z_4) can be expressed as
z_4=(1-x_4)(η+qx_4)/lq(1+c)
Where x_4 is the positive root of the quadratic equation
x_4^2(eq-eλ qc l^2-q^2 d)+x_4(eη ql-2q η d)-d η^2=0
The equation has atleast one positive real root if:
(eη q l-2qη d)^2+4d(eq-eqcl^2-q^2d)≥ 0
(eη ql-2qη d) <0
The jacobian atE_4 is,
J(E_4)=
[ P Q R; 0 S 0; T U 0 ]
The characteristic equation is
(S-E)(E^2-PE-RT)=0
Where,
P=1/1+c-2x_4/1+C-η lqz_4/η+qx_4
Q=lq(1-q)x_4/η+qx_4
R=-lqx_4/η+qx_4
S=-η l(1-q)z_4+lq(1-q)x_4z_4/(η+qx_4)^2
T=η q z_4/η+qx_4-η q x_4z_4+λη q^2 l c x_4 z_4/(η+qx_4)^3
E_4 will be stable if P<0 and T>0.
* The contaminated prey extinction equilibrium E_5=(0,y_5,z_5) can be write as:
z_5=r(K-y)(η+(1-q)y_5)/Kl(1-q)
Where y_5=dη/(1-q)(e-d), the feasibility of the equilibrium require e>d.
The jacobian at E_5 is
J(E_5)=
[ P 0 0; Q R S; T U 0 ]
The characteristic equation is
(P-E)(E^2-RE-SU)=0
Where
P=1/1+c-η lqz_5/η+(1-q)y_5
R=r-2y_5r/K-η l (1-q)z_5/(η+(1-q)y_5)^2
S=-l(1-q)y_5/η+(1-q)y_5
U=η (1-q)z_5/(η +(1-q)y_5)^2
Therefore, the equilibrium will be stable if the coefficients of the characteristic equation
satisfy P<0, R>0, SU<0
* The coexisting equilibrium E_6=(x_6,y_6,z_6) can be found by solving the non-linear equations
1/1+c(1-x_6)-lqz_6/η+qx_6+(1-q)y_6=0
r(1-y_6/K)-l(1-q)z_6/η+qx_6+(1-q)y_6=0
el( 1-λ ql x_6c/η+qx_6+(1-q)y_6 ) ( qx_6+(1-q)y_6/η+qx_6+(1-q)y_6 ) -d=0
51
natexlab#1#1
[#1],#1
[Abrams et al.(1998)Abrams, Holt and Roth]abrams1998apparent
authorAbrams, P.A., authorHolt, R.D.,
authorRoth, J.D., year1998.
titleApparent competition or apparent mutualism? shared
predation when populations cycle.
journalEcology volume79,
pages201–212.
[Alves and Hilker(2017)]alves2017hunting
authorAlves, M.T., authorHilker, F.M.,
year2017.
titleHunting cooperation and allee effects in predators.
journalJournal of theoretical biology
volume419, pages13–22.
[Bartrons et al.(2015)Bartrons, Gratton, Spiesman and
Vander Zanden]bartrons2015taking
authorBartrons, M., authorGratton, C.,
authorSpiesman, B.J., authorVander Zanden, M.J.,
year2015.
titleTaking the trophic bypass: Aquatic-terrestrial
linkage reduces methylmercury in a terrestrial food web.
journalEcological Applications volume25,
pages151–159.
[Baudrot et al.(2018)Baudrot, Fritsch, Perasso, Banerjee and
Raoul]baudrot2018effects
authorBaudrot, V., authorFritsch, C.,
authorPerasso, A., authorBanerjee, M.,
authorRaoul, F., year2018.
titleEffects of contaminants and trophic cascade
regulation on food chain stability: Application to cadmium soil pollution on
small mammals–raptor systems.
journalEcological Modelling volume382,
pages33–42.
[Baxter et al.(2005)Baxter, Fausch and
Carl Saunders]baxter2005tangled
authorBaxter, C.V., authorFausch, K.D.,
authorCarl Saunders, W., year2005.
titleTangled webs: reciprocal flows of invertebrate prey
link streams and riparian zones.
journalFreshwater biology volume50,
pages201–220.
[Beketov and Liess(2006)]beketov2006influence
authorBeketov, M.A., authorLiess, M.,
year2006.
titleThe influence of predation on the chronic response of
artemia sp. populations to a toxicant.
journalJournal of Applied Ecology volume43,
pages1069–1074.
[Chakraborty and Feudel(2014)]chakraborty2014harmful
authorChakraborty, S., authorFeudel, U.,
year2014.
titleHarmful algal blooms: combining excitability and
competition.
journalTheoretical ecology volume7,
pages221–237.
[Cristol et al.(2008)Cristol, Brasso, Condon, Fovargue, Friedman,
Hallinger, Monroe and White]cristol2008movement
authorCristol, D.A., authorBrasso, R.L.,
authorCondon, A.M., authorFovargue, R.E.,
authorFriedman, S.L., authorHallinger, K.K.,
authorMonroe, A.P., authorWhite, A.E.,
year2008.
titleThe movement of aquatic mercury through terrestrial
food webs.
journalScience volume320,
pages335–335.
[Dhooge et al.(2008)Dhooge, Govaerts, Kuznetsov, Meijer and
Sautois]dhooge2008new
authorDhooge, A., authorGovaerts, W.,
authorKuznetsov, Y.A., authorMeijer, H.G.E.,
authorSautois, B., year2008.
titleNew features of the software matcont for bifurcation
analysis of dynamical systems.
journalMathematical and Computer Modelling of Dynamical
Systems volume14, pages147–175.
[Donohue and Piiroinen(2018)]donohue2018technique
authorDonohue, J.G., authorPiiroinen, P.T.,
year2018.
titleA technique for analysis of density dependence in
population models.
journalTheoretical Ecology volume11,
pages465–477.
[Donohue and Piiroinen(2020)]donohue2020normal
authorDonohue, J.G., authorPiiroinen, P.T.,
year2020.
titleNormal-form analysis of the cusp-transcritical
interaction: applications in population dynamics.
journalNonlinear Dynamics volume100,
pages1741–1753.
[Faria and da Silveira Costa(2009)]faria2009interplay
authorFaria, L.D.B., authorda Silveira Costa, M.I.,
year2009.
titleThe interplay between predator's prey preference and
environmental heterogeneity in food web long-term stability.
journalJournal of theoretical biology
volume258, pages339–343.
[Garay-Narváez et al.(2013)Garay-Narváez, Arim, Flores and
Ramos-Jiliberto]garay2013more
authorGaray-Narváez, L., authorArim, M.,
authorFlores, J.D., authorRamos-Jiliberto, R.,
year2013.
titleThe more polluted the environment, the more important
biodiversity is for food web stability.
journalOikos volume122,
pages1247–1253.
[Garay-Narváez et al.(2014)Garay-Narváez, Flores, Arim and
Ramos-Jiliberto]garay2014food
authorGaray-Narváez, L., authorFlores, J.D.,
authorArim, M., authorRamos-Jiliberto, R.,
year2014.
titleFood web modularity and biodiversity promote species
persistence in polluted environments.
journalOikos volume123,
pages583–588.
[Hall et al.(2008)Hall, Aiken, Krabbenhoft, Marvin-DiPasquale and
Swarzenski]hall2008wetlands
authorHall, B., authorAiken, G.,
authorKrabbenhoft, D., authorMarvin-DiPasquale, M.,
authorSwarzenski, C., year2008.
titleWetlands as principal zones of methylmercury
production in southern louisiana and the gulf of mexico region.
journalEnvironmental Pollution volume154,
pages124–134.
[Hallam et al.(1983)Hallam, Clark and Lassiter]hallam1983effects
authorHallam, T., authorClark, C.,
authorLassiter, R., year1983.
titleEffects of toxicants on populations: a qualitative
approach i. equilibrium environmental exposure.
journalEcological Modelling volume18,
pages291–304.
[Hallinger et al.(2011)Hallinger, Cornell, Brasso and
Cristol]hallinger2011mercury
authorHallinger, K.K., authorCornell, K.L.,
authorBrasso, R.L., authorCristol, D.A.,
year2011.
titleMercury exposure and survival in free-living tree
swallows (tachycineta bicolor).
journalEcotoxicology volume20,
pages39–46.
[Henschel et al.(2001)Henschel, Mahsberg and
Stumpf]henschel2001allochthonous
authorHenschel, J.R., authorMahsberg, D.,
authorStumpf, H., year2001.
titleAllochthonous aquatic insects increase predation and
decrease herbivory in river shore food webs.
journalOikos volume93,
pages429–438.
[Holt(1977)]holt1977predation
authorHolt, R.D., year1977.
titlePredation, apparent competition, and the structure of
prey communities.
journalTheoretical population biology
volume12, pages197–229.
[Holt and Bonsall(2017)]holt2017apparent
authorHolt, R.D., authorBonsall, M.B.,
year2017.
titleApparent competition.
journalAnnual Review of Ecology, Evolution, and
Systematics volume48, pages447–471.
[Hooper et al.(2012)Hooper, Adair, Cardinale, Byrnes, Hungate,
Matulich, Gonzalez, Duffy, Gamfeldt and O’Connor]hooper2012global
authorHooper, D.U., authorAdair, E.C.,
authorCardinale, B.J., authorByrnes, J.E.,
authorHungate, B.A., authorMatulich, K.L.,
authorGonzalez, A., authorDuffy, J.E.,
authorGamfeldt, L., authorO’Connor, M.I.,
year2012.
titleA global synthesis reveals biodiversity loss as a
major driver of ecosystem change.
journalNature volume486,
pages105–108.
[Huang et al.(2015)Huang, Wang and Lewis]huang2015impact
authorHuang, Q., authorWang, H.,
authorLewis, M.A., year2015.
titleThe impact of environmental toxins on predator–prey
dynamics.
journalJournal of theoretical biology
volume378, pages12–30.
[Jackson et al.(2021)Jackson, Eagles-Smith and
Robinson]jackson2021differential
authorJackson, A.K., authorEagles-Smith, C.A.,
authorRobinson, W.D., year2021.
titleDifferential reliance on aquatic prey subsidies
influences mercury exposure in riparian arachnids and songbirds.
journalEcology and Evolution volume11,
pages7003–7017.
[Jackson et al.(2011)Jackson, Evers, Etterson, Condon, Folsom,
Detweiler, Schmerfeld and Cristol]jackson2011mercury
authorJackson, A.K., authorEvers, D.C.,
authorEtterson, M.A., authorCondon, A.M.,
authorFolsom, S.B., authorDetweiler, J.,
authorSchmerfeld, J., authorCristol, D.A.,
year2011.
titleMercury exposure affects the reproductive success of
a free-living terrestrial songbird, the carolina wren (thryothorus
ludovicianus).
journalThe Auk volume128,
pages759–769.
[Kooi et al.(2008)Kooi, Bontje, Van Voorn and
Kooijman]kooi2008sublethal
authorKooi, B., authorBontje, D.,
authorVan Voorn, G., authorKooijman, S.,
year2008.
titleSublethal toxic effects in a simple aquatic food
chain.
journalEcological Modelling volume212,
pages304–318.
[van Kooten et al.(2005)van Kooten, de Roos and
Persson]van2005bistability
authorvan Kooten, T., authorde Roos, A.M.,
authorPersson, L., year2005.
titleBistability and an allee effect as emergent
consequences of stage-specific predation.
journalJournal of Theoretical Biology
volume237, pages67–74.
[Kraus(2019)]kraus2019contaminants
authorKraus, J.M., year2019.
titleContaminants in linked aquatic–terrestrial
ecosystems: Predicting effects of aquatic pollution on adult aquatic insects
and terrestrial insectivores.
journalFreshwater Science volume38,
pages919–927.
[Lindmark et al.(2019)Lindmark, Ohlberger, Huss and
Gårdmark]lindmark2019size
authorLindmark, M., authorOhlberger, J.,
authorHuss, M., authorGårdmark, A.,
year2019.
titleSize-based ecological interactions drive food web
responses to climate warming.
journalEcology Letters volume22,
pages778–786.
[Liz and Ruiz-Herrera(2012)]liz2012hydra
authorLiz, E., authorRuiz-Herrera, A.,
year2012.
titleThe hydra effect, bubbles, and chaos in a simple
discrete population model with constant effort harvesting.
journalJournal of mathematical biology
volume65, pages997–1016.
[Luoma and Rainbow(2005)]luoma2005metal
authorLuoma, S.N., authorRainbow, P.S.,
year2005.
titleWhy is metal bioaccumulation so variable? biodynamics
as a unifying concept.
journalEnvironmental Science & Technology
volume39, pages1921–1931.
[Manning and Sullivan(2021)]manning2021conservation
authorManning, D.W., authorSullivan, S.M.P.,
year2021.
titleConservation across aquatic-terrestrial boundaries:
Linking continental-scale water quality to emergent aquatic insects and
declining aerial insectivorous birds.
journalFrontiers in Ecology and Evolution
volume9, pages633160.
[Marcarelli et al.(2011)Marcarelli, Baxter, Mineau and
Hall Jr]marcarelli2011quantity
authorMarcarelli, A.M., authorBaxter, C.V.,
authorMineau, M.M., authorHall Jr, R.O.,
year2011.
titleQuantity and quality: unifying food web and ecosystem
perspectives on the role of resource subsidies in freshwaters.
journalEcology volume92,
pages1215–1225.
[Murakami and Nakano(2002)]murakami2002indirect
authorMurakami, M., authorNakano, S.,
year2002.
titleIndirect effect of aquatic insect emergence on a
terrestrial insect population through by birds predation.
journalEcology Letters volume5,
pages333–337.
[Nelson(2005)]nelson2005drivers
authorNelson, G.C., year2005.
titleDrivers of ecosystem change: summary chapter.
journalEcosystems .
[Ortega-Rodriguez et al.(2019)Ortega-Rodriguez, Chumchal, Drenner,
Kennedy, Nowlin, Barst, Polk, Hall, Williams, Lauck
et al.]ortega2019relationship
authorOrtega-Rodriguez, C.L., authorChumchal, M.M.,
authorDrenner, R.W., authorKennedy, J.H.,
authorNowlin, W.H., authorBarst, B.D.,
authorPolk, D.K., authorHall, M.N.,
authorWilliams, E.B., authorLauck, K.C., et al.,
year2019.
titleRelationship between methylmercury contamination and
proportion of aquatic and terrestrial prey in diets of shoreline spiders.
journalEnvironmental Toxicology and Chemistry
volume38, pages2503–2508.
[Paetzold et al.(2011)Paetzold, Smith, Warren and
Maltby]paetzold2011environmental
authorPaetzold, A., authorSmith, M.,
authorWarren, P.H., authorMaltby, L.,
year2011.
titleEnvironmental impact propagated by cross-system
subsidy: Chronic stream pollution controls riparian spider populations.
journalEcology volume92,
pages1711–1716.
[Palma et al.(2005)Palma, Beja, Tavares and
Monteiro]palma2005spatial
authorPalma, L., authorBeja, P.,
authorTavares, P.C., authorMonteiro, L.R.,
year2005.
titleSpatial variation of mercury levels in nesting
bonelli's eagles from southwest portugal: effects of diet composition and
prey contamination.
journalEnvironmental Pollution volume134,
pages549–557.
[Polis et al.(1997)Polis, Anderson and Holt]polis1997toward
authorPolis, G.A., authorAnderson, W.B.,
authorHolt, R.D., year1997.
titleToward an integration of landscape and food web
ecology: the dynamics of spatially subsidized food webs.
journalAnnual review of ecology and systematics ,
pages289–316.
[Prosnier et al.(2015)Prosnier, Loreau and
Hulot]prosnier2015modeling
authorProsnier, L., authorLoreau, M.,
authorHulot, F.D., year2015.
titleModeling the direct and indirect effects of copper on
phytoplankton–zooplankton interactions.
journalAquatic toxicology volume162,
pages73–81.
[Saaristo et al.(2018)Saaristo, Brodin, Balshine, Bertram, Brooks,
Ehlman, McCallum, Sih, Sundin, Wong et al.]saaristo2018direct
authorSaaristo, M., authorBrodin, T.,
authorBalshine, S., authorBertram, M.G.,
authorBrooks, B.W., authorEhlman, S.M.,
authorMcCallum, E.S., authorSih, A.,
authorSundin, J., authorWong, B.B., et al.,
year2018.
titleDirect and indirect effects of chemical contaminants
on the behaviour, ecology and evolution of wildlife.
journalProceedings of the Royal Society B
volume285, pages20181297.
[Scheffer et al.(1993)Scheffer, Hosper, Meijer, Moss and
Jeppesen]scheffer1993alternative
authorScheffer, M., authorHosper, S.H.,
authorMeijer, M.L., authorMoss, B.,
authorJeppesen, E., year1993.
titleAlternative equilibria in shallow lakes.
journalTrends in ecology & evolution
volume8, pages275–279.
[Schiesari et al.(2018)Schiesari, Leibold and
Burton Jr]schiesari2018metacommunities
authorSchiesari, L., authorLeibold, M.A.,
authorBurton Jr, G.A., year2018.
titleMetacommunities, metaecosystems and the environmental
fate of chemical contaminants.
journalJournal of applied ecology volume55,
pages1553–1563.
[Selin et al.(2009)]selin2009global
authorSelin, N.E., et al., year2009.
titleGlobal biogeochemical cycling of mercury: a review.
journalAnnual review of environment and resources
volume34, pages43–63.
[Shan and Huang(2019)]shan2019direct
authorShan, C., authorHuang, Q., year2019.
titleDirect and indirect effects of toxins on competition
dynamics of species in an aquatic environment.
journalJournal of Mathematical Biology
volume78, pages739–766.
[Tweedy et al.(2013)Tweedy, Drenner, Chumchal and
Kennedy]tweedy2013effects
authorTweedy, B.N., authorDrenner, R.W.,
authorChumchal, M.M., authorKennedy, J.H.,
year2013.
titleEffects of fish on emergent insect-mediated flux of
methyl mercury across a gradient of contamination.
journalEnvironmental science & technology
volume47, pages1614–1619.
[van Veen and Hoti(2019)]van2019automatic
authorvan Veen, L., authorHoti, M.,
year2019.
titleAutomatic detection of saddle-node–transcritical
interactions.
journalInternational Journal of Bifurcation and Chaos
volume29, pages1950104.
[Veltman et al.(2008)Veltman, Huijbregts and
Hendriks]veltman2008cadmium
authorVeltman, K., authorHuijbregts, M.A.,
authorHendriks, A.J., year2008.
titleCadmium bioaccumulation factors for terrestrial
species: Application of the mechanistic bioaccumulation model omega to
explain field data.
journalScience of the total environment
volume406, pages413–418.
[Wesner et al.(2014)Wesner, Kraus, Schmidt, Walters and
Clements]wesner2014metamorphosis
authorWesner, J.S., authorKraus, J.M.,
authorSchmidt, T.S., authorWalters, D.M.,
authorClements, W.H., year2014.
titleMetamorphosis enhances the effects of metal exposure
on the mayfly, centroptilum triangulifer.
journalEnvironmental Science & Technology
volume48, pages10415–10422.
[Wolfe et al.(1998)Wolfe, Schwarzbach and Sulaiman]wolfe1998effects
authorWolfe, M.F., authorSchwarzbach, S.,
authorSulaiman, R.A., year1998.
titleEffects of mercury on wildlife: a comprehensive
review.
journalEnvironmental Toxicology and Chemistry: An
International Journal volume17, pages146–160.
[Wu et al.(2016)Wu, Cobbina, Mao, Xu, Zhang and Yang]wu2016review
authorWu, X., authorCobbina, S.J.,
authorMao, G., authorXu, H., authorZhang,
Z., authorYang, L., year2016.
titleA review of toxicity and mechanisms of individual and
mixtures of heavy metals in the environment.
journalEnvironmental Science and Pollution Research
volume23, pages8244–8259.
[Zhien et al.(1990)Zhien, Guirong and Wendi]zhien1990persistence
authorZhien, M., authorGuirong, C.,
authorWendi, W., year1990.
titlePersistence and extinction of a population in a
polluted environment.
journalMathematical Biosciences volume101,
pages75–97.
|
http://arxiv.org/abs/2303.07386v1
|
20230313180603
|
Speed limits and locality in many-body quantum dynamics
|
[
"Chi-Fang Chen",
"Andrew Lucas",
"Chao Yin"
] |
quant-ph
|
[
"quant-ph",
"cond-mat.quant-gas",
"math-ph",
"math.MP"
] |
every axis legend/.append style=at=(1.02,1),anchor=north west
calc, arrows
equationsection
theor
theorsection
theor[1][]
theor
#1
frametitle=
frametitle=
innertopmargin=0pt,linecolor=, frametitlerule=false,
linewidth=1pt, backgroundcolor=!15!white, topline=true, frametitlebackgroundcolor=!15!white
[]
exam[1][]
theor
#1
frametitle=
frametitle=
innertopmargin=0pt,linecolor=, frametitlerule=false,
linewidth=1pt, backgroundcolor=!15!white, topline=true, frametitlebackgroundcolor=!15!white
[]
corol[1][]
theor
#1
frametitle=
frametitle=
innertopmargin=0pt,linecolor=, frametitlerule=false,
linewidth=1pt, backgroundcolor=!15!white, topline=true, frametitlebackgroundcolor=!15!white
[]
prop[1][]
theor
#1
frametitle=
frametitle=
innertopmargin=0pt,linecolor=, frametitlerule=false,
linewidth=1pt, backgroundcolor=!15!white, topline=true, frametitlebackgroundcolor=!15!white
[]
lma[1][]
theor
#1
frametitle=
frametitle=
innertopmargin=0pt,linecolor=, frametitlerule=false,
linewidth=1pt, backgroundcolor=!15!white, topline=true, frametitlebackgroundcolor=!15!white
[]
defn[1][]
theor
#1
frametitle=
frametitle=
innertopmargin=0pt,linecolor=, frametitlerule=false,
linewidth=1pt, backgroundcolor=!15!white, topline=true, frametitlebackgroundcolor=!15!white
[]
theorNB[1][]
theor
#1
frametitle=
frametitle=
innertopmargin=0pt,linecolor=, frametitlerule=false,
linewidth=1pt, backgroundcolor=!15!white, topline=true, frametitlebackgroundcolor=!15!white,nobreak=true
[]
corolNB[1][]
theor
#1
frametitle=
frametitle=
innertopmargin=0pt,linecolor=, frametitlerule=false,
linewidth=1pt, backgroundcolor=!15!white, topline=true, frametitlebackgroundcolor=!15!white,nobreak=true
[]
propNB[1][]
theor
#1
frametitle=
frametitle=
innertopmargin=0pt,linecolor=, frametitlerule=false,
linewidth=1pt, backgroundcolor=!15!white, topline=true, frametitlebackgroundcolor=!15!white,nobreak=true
[]
lmaNB[1][]
theor
#1
frametitle=
frametitle=
innertopmargin=0pt,linecolor=, frametitlerule=false,
linewidth=1pt, backgroundcolor=!15!white, topline=true, frametitlebackgroundcolor=!15!white,nobreak=true
[]
fancy
[C]
(, 0) node[text width = , right] easter egg;
(0.5, -3) node[text width = ] ;
(0.5, 0.1) node[text width=] ;
(0.5, -0.5) node[text width=] ^𝖺;
(0.5, -1.0) node[text width=] ^𝖻;
(0, -13.15) node[right, text width=0.5] ;
(, -13.1) node[left] ;
[very thick, color=] (0.0, -5.75) – (0.99, -5.75);
(0.12, -6.25) node[left] ;
(0.53, -6) node[below, text width=0.8, text justified]
We review the mathematical speed limits on quantum information processing in many-body systems. After the proof of the Lieb-Robinson Theorem in 1972, the past two decades have seen substantial developments in its application to other questions, such as the simulatability of quantum systems on classical or quantum computers, the generation of entanglement, and even the properties of ground states of gapped systems. Moreover, Lieb-Robinson bounds have been extended in non-trivial ways, to demonstrate speed limits in systems with power-law interactions or interacting bosons, and even to prove notions of locality that arise in cartoon models for quantum gravity with all-to-all interactions. We overview the progress which has occurred, highlight the most promising results and techniques, and discuss some central outstanding questions which remain open. To help bring newcomers to the field up to speed, we provide self-contained proofs of the field's most essential results.
;
[very thick, color=] (0.0, -5.75) – (0.99, -5.75);
§
0pt
[remember picture]
(0.2, 0) node[right] ;
[color=] (0,0.37) rectangle (-0.7, -0.37);
(0.0, 0) node[left, fill=] ;
*
§
0pt20pt5pt
§ INTRODUCTION
We are all familiar with the idea that there are “speed limits" on physical dynamical processes. For example, in special relativity, no two parties can send information faster than the speed of light c. This simple observation allows us to reconcile our notion of causality with Einstein's observation that there is no absolute time. Consider events A and B separated (to one observer, in flat spacetime) by time Δt = t_B- t_A and distance Δr = |𝐱_B-𝐱_A|. If Δt>0 for this observer, then all observers will find (in their own frame)
Δt^'>0 if and only if Δr < cΔt.
It is no stretch to say that this speed limit on information underpins our confidence in the theory of relativity, and thus in our understanding of the universe.
Of course, for more “human scale" problems, often the speed of light is effectively infinite: c≈∞. Still, there can be important emergent speed limits on information transmission. For example, auditory signals propagate at v_sound∼ 10^-6c. Listening to an orchestra, it is not important that some information content of the music might in principle be transmitted at the speed of light c, because the medium through which information is transmitted is subject to a stricter non-relativistic speed limit.
This review article discusses how such stricter non-relativistic speed limits arise in quantum many-body systems. One way this can arise is when the system is effectively described by a model of particles interacting on a lattice, which is nearly always the appropriate description of a many-body system in condensed matter or atomic physics. On the lattice, non-interacting particles have dispersion relations with the schematic form ϵ(k) ∼ J cos (ka), where J is an energy scale and a is the lattice spacing. The velocity of information is bounded by
v_group = 1/ħsup_k | ∂ϵ/∂ k| ∼Ja/ħ.
In typical condensed matter systems, this velocity is roughly 10^-3c ≲ v_group≲ 10^-2c.
The particular focus of this review is on the remarkable fact that one can prove such speed limits in a huge number of physically realistic lattice models (and, with caveats, in some continuum settings as well!). Because the relevant literature intersects heavily with physics, mathematics, and quantum information, much of the review may be more formal and precise than a typical physics review article. However, the subject does not require intense training in modern mathematics, but rather the creative use of simple mathematics which should be familiar to any physicist who has studied quantum mechanics. We will begin gently and guide the reader through the formal proofs of central results in the field while highlighting some more technical but important extensions in recent years, which will almost always be stated without (a full) proof.
We remark in passing that sometimes the phrase “quantum speed limit" is used to refer to the Heisenberg energy-time uncertainty principle <cit.>: namely, if we look at the solution to some time-independent Schrödinger equation
|ψ(t)⟩ = ∑_α c_αe^-iE_α t/ħ|α⟩,
with |α⟩ the eigenstates of a Hamiltonian, we can show that if ΔE is the largest difference between two E_αs represented in the above sum, |ψ(t)⟩ and |ψ(0)⟩ cannot be orthogonal before a time
Δt ≳ħ/ΔE.
The purpose of our review is to explain why even in the thermodynamic limit when ΔE →∞ is extensively large, there are still meaningful notions of “speed limits" deriving from spatial locality.
For the remainder of the introduction, we tell a historical story that places work on Lieb-Robinson bounds into its broader context; starting in Section <ref>, we begin our formal but friendly tour through the mathematical physics of quantum speed limits.
§.§ The EPR paradox
Probably the first serious consideration of information propagation in quantum mechanics was in the classic paper <cit.> by Einstein, Podolsky, and Rosen. The resulting EPR paradox goes as follows: suppose Alice and Bob have two qubits prepared in a Bell pair <cit.>: the wave function of their “universe" is
|ψ⟩ = |0⟩_ A|0⟩_ B+ |1⟩_ A|1⟩_ B/√(2)
where |0⟩,|1⟩ represent the up and down states (in the z-direction) of a (two-level) spin-1/2 system (i.e. qubit), and A/ B denote the qubit held by Alice/Bob. Now suppose Alice measures her qubit to be |0⟩. No matter how far Bob is from Alice, instantly Bob's qubit is also |0⟩. EPR believed this must communicate information, and thus quantum mechanics was not compatible with relativity and locality.
Actually, no information has been communicated in this process. In particular, Bob and Alice only know their measurements agree (and confirm the state was |ψ⟩) after sending classical signals to each other announcing their measurement outcomes: these classical signals travel at most at the speed of light c.[They must also do this experiment many times to confirm that |ψ⟩ was entangled (while outcomes may differ, they always agree)!] EPR's “paradox" is fully compatible with relativity and locality.
§.§ The Lieb-Robinson Theorem
To further constrain quantum mechanics via locality, we now claim that the Bell state |ψ⟩ is not easy to prepare. As made precise in Section <ref>, suppose Alice and Bob are separated by distance L with two unentangled qubits |00⟩, then if
e^-iHt|00⟩⊗ |rest⟩ = |ψ⟩⊗ |rest^'⟩,
with “rest" denoting any additional qubits in the universe. Then, in any lattice model the evolution time t must obey
t ≥L/v_LR,
where v_LR – the Lieb-Robinson velocity – is an L,t-independent constant. This bound holds even in a non-relativistic spin chain where c=∞. Intuitively, v_LR∼ Ja/ħ as in (<ref>).
The way the Lieb-Robinson Theorem is stated, as we will do when we prove it in Section <ref>, is not in terms of such a Bell pair experiment. In 1972, Lieb and Robinson instead thought more abstractly <cit.>, in terms of the operator norms of commutators of Heisenberg-evolved operators. They proved that for any local spin model, there exists a constant μ >0 such that
‖ [A(t),B]‖≤e^μ (v_LRt-L)
where A,B denote Pauli matrices of Alice and Bob respectively, and A(t) = e^iHtAe^-iHt. In Section <ref> we will, in some detail, explain the connection between this abstract bound, and the concrete constraint on preparing a Bell pair (along with many other entangled states!). In a nutshell, only when the commutator is large O(1) can a Bell pair be formed out of |00⟩, which implies (<ref>).
§.§ Applications of the Lieb-Robinson bound
The broader physics and quantum information community only seemed to become aware of the Lieb-Robinson Theorem in the past two decades. Perhaps the most immediate reason why the Lieb-Robinson bound became better known is that in a beautiful pair of papers <cit.>, it was shown that the Lieb-Robinson bound implies the finite correlation length of any gapped ground state. This took a curious fact about the dynamics of Heisenberg-evolved operators, and connected it to a completely different kind of question, of broad and independent interest in the quantum matter community (Section <ref>)!
The story above focuses on the ground state properties of a many-body quantum system. But, over the past two decades, an increasingly large fraction of the theoretical physics community has begun to focus on the dynamics of large quantum systems. Some of this focus has arisen due to developments such as a theory of many-body localization <cit.>, quantum scars <cit.>, or prethermalization (discussed in Section <ref>), which suggest that dynamics can be more complicated than textbook hydrodynamics[Yet even this subject is undergoing a revival of interest! See, e.g., the review <cit.>.]. Just as much has arisen out of the rapid and impressive developments in experimental quantum simulation (and the baby steps toward quantum information processing and computation in the lab). In a quantum simulator, one often studies highly excited states and, in principle, desires control over much of Hilbert space – not merely the ground state! Lieb-Robinson bounds then limit how quickly interesting operations can be done (using unitary quantum mechanics alone) in such a simulator. The consequences of a Lieb-Robinson bound on information spreading and correlations have been observed in actual experiments on cold atomic gases <cit.>.
Looking forward, if someday a large-scale quantum computer is built, Lieb-Robinson bounds provide very non-trivial constraints on how efficiently such a computer could operate. When laying out physical qubits in a two-dimensional chip, one cannot perform quantum state transfer at the speed of light c – the effect is limited by the emergent Lieb-Robinson velocity! The implications of Lieb-Robinson bounds on the resources required to prepare interesting entangled states will be discussed at length in Section <ref>.
Lastly, the increase in classical computational power has been enormous since 1972, and papers now routinely use numerical simulation to model complex quantum dynamics, at least in small systems and at short times; in recent years, researchers have begun to consider potential usage of a quantum computer for the same task. In Section <ref>, we explain how the Lieb-Robinson Theorem gives guarantees for classical simulations accuracy, and, at the same, gives rise to provably efficient quantum algorithms.
The increased attention to Lieb-Robinson bounds has also led to significant developments and extensions of the original Lieb-Robinson bounds to new settings. Indeed, an unfortunate reality is that many-body quantum systems realized in the lab usually do not merely consist of spins interacting with nearest neighbors. Charged particles interact with 1/r interactions, dipolar objects have 1/r^3 interactions, and even genuinely neutral objects have 1/r^6 van der Waals interactions. For many years, there was a theoretical effort to extend the Lieb-Robinson Theorem to systems with power-law interactions; this recently-resolved question will be the focus of Section <ref>. Many other systems have interacting bosonic degrees of freedom, which introduces an additional subtlety (Section <ref>).
Lastly, there is a profound (and not fully understood) connection between the physics captured by Lieb-Robinson bounds and the holographic theory of quantum gravity. We will briefly describe this story in Section <ref>. It is likely that a full resolution of these questions will require powerful generalizations of Lieb-Robinson bounds to other “norms for operator"; we will explain this perspective in detail in Section <ref>.
§.§ Outline
Our review is organized into roughly two parts. In the first part, we introduce more basic content, focusing on minimal lattice models with nearest-neighbor interactions and finite-dimensional Hilbert spaces, to give the reader a sense of the broad scope and implications of Lieb-Robinson bounds. Section <ref> gives a lightning review of useful mathematical definitions, propositions, and conventions. Section <ref> motivates and proves a standard Lieb-Robinson bound for dynamics on a lattice. The next three sections all provide key applications of this technique to different problems: the simulatability of quantum dynamics (Section <ref>), bounds on entanglement and correlations (Section <ref>), and the proof that ground states of one-dimensional gapped systems have area law entanglement (Section <ref>).
We also include discussions of bounds on thermalization in Section <ref>, although this is a less developed area of the field.
The second part of the review focuses on more recent extensions of the Lieb-Robinson bound away from local spin models. In Section <ref>, we introduce the notion of quantum operator growth and the Frobenius light cone, which have become of recent interest in studies of chaotic many-body dynamics (but prove mathematically interesting as well). Section <ref> describes all-to-all interacting systems, with no strict spatial locality, but still a “computer science" notion of k-locality (which can be used to constrain operator growth and chaos). Section <ref> describes the extension of Lieb-Robinson bounds to systems with power-law interactions, while Section <ref> extends Lieb-Robinson bounds to systems at a finite charge or energy density, and to certain bosonic systems. Lastly, our final section describes our perspective on important open problems.
Earlier reviews that discuss locality bounds include <cit.>, including their tests in experiment <cit.>. Other recent reviews <cit.> discuss many-body chaos and operator growth. Our review is complementary: we provide a self-contained introduction to this subject (which can appear rather formidable to an outsider!), but also illustrate, with some depth, how the Lieb-Robinson bounds can be applied very broadly. We have found, working in this field, that often one mathematical technique will find surprising applications to multiple types of problems previously thought unrelated. We hope that our review, organized around a few key mathematical results and their many applications, will inspire future scientists and mathematicians to uncover new results, for many years to come.
§ MATHEMATICAL PRELIMINARIES
We begin by reviewing our conventions and important mathematical facts. The reader may skim this section and refer to it as appropriate throughout the review.
§.§ Notation
The prevailing notation is summarized by the following, admittedly scattered, collection of facts and definitions.
We denote the complex numbers by ℂ, the real numbers by ℝ, the non-negative real numbers by ℝ^+ = { t∈ℝ : t≥ 0}, and the integers by ℤ (non-negative ones by ℤ^+). Sets, subsets, and parties (Alice/Bob) will always be denoted with uppercase serif font: 𝖠,𝖡, etc. The complement of a subset A is denoted as 𝖠^c, which consists of all elements not in 𝖠. (The set of all elements that should be considered will be clear from the context.)
We use roman/upright font , , , to denote mathematical constants (such as = √(-1)). Variable names which are problem-specific will be italic (e.g. site/vertex i in a lattice/graph). States in quantum mechanics are described by vectors in a Hilbert space (denoted with ℋ); this Hilbert space will mostly be finite-dimensional. Vectors in Hilbert space are described in Dirac's bra-ket notation: |a⟩ or |ψ⟩. Note that we will always use lower-case letters for their arguments. Uppercase italic letters (A, B) are reserved for operators on a quantum Hilbert space, which one can often think of as matrices. We will reserve the letter I for the identity operator:
I|ψ⟩ = |ψ⟩,
while H is reserved for the Hamiltonian acting on a quantum system, generating time-evolution via the Schrödinger equation:
H(t)|ψ(t)⟩ = id/dt|ψ(t)⟩.
Here and henceforth, we set ħ=1. An entry of matrix A will be denoted as A_ij = ⟨ i|A|j⟩.
Sometimes, it is useful to think of the operators acting on ℋ as vectors themselves. Mathematically this can be stated as follows: the set of linear transformations, which is denoted as End(ℋ), is itself a vector space.[The “End" stands for endomorphism, which is a mathematical generalization of the notion of linear transformation to more complicated structures.] When we wish to highlight this fact (starting in Section <ref>), we will use bra-ket notation with parentheses to write down operators: for example, we write A as |A). This notation is especially useful when we wish to use the natural notion of Hilbert-Schmidt inner product on this space:
(A|B):= (A^† B)/[I].
The symbol := denotes “the left-hand side of this expression is defined by the right"; the symbol =: would mean the right is defined by the left.
In Section <ref>, we will find it useful to consider alternative inner products on this space. Lastly, in the Heisenberg picture of quantum mechanics, the Schrödinger equation (<ref>) generalizes to
d/dt|A) = ℒ|A),
with the Liouvillian ℒ defined as
[H, A ]=: |A).
Without using this bra-ket notation and assuming H is time-independent, we can integrate (<ref>) to find
A(t):= ^ H tA ^- H t = e^ℒtA.
It is almost always the case in this review that a result derived for t-independent H also holds for t-dependent H; so we will often write (<ref>) even when the result does hold for t-dependent H (where e^-iHt becomes a time-ordered path integral).[In the mathematics literature one often finds the notation A(t) = τ_t(A); we stick to the physics notation A(t).]
In general, we will denote “super-operators" (transformations on the space of operators) by curly fonts 𝒜,ℬ, etc.
We use D to denote the dimension of a finite-dimensional Hilbert space (often this will be exponentially large in the number of qubits or degrees of freedom N). The spatial dimension is denoted by d (defined below), which is never particularly large.
Expectation values in quantum mechanics may be denoted with the following shorthand notation: with states, A_ψ :=⟨ψ|A|ψ⟩, while with density matrices, A_ρ := (ρ A ). The symbol 𝔼[⋯] will denote expectation value with respect to a classical probability distribution, not a quantum state, while ℙ[⋯] will denote the classical probability of an event.
We say that f(x) = O(g(x)) if there is a constant c<∞ such that |f(x)| ≤ c |g(x)| for all x and that f(x) = Ω(g(x)) if there is a constant c >0 such that |f(x)| ≥ c |g(x)| for all x.
§.§ Qubits
We will often discuss qubits: two-level systems with states |0⟩ and |1⟩. We define the Pauli matrices
X = |0⟩⟨ 1| + |1⟩⟨ 0|,
Y = -i|0⟩⟨ 1| + i |1⟩⟨ 0|,
Z = |0⟩⟨ 0| - |1⟩⟨ 1|.
Of course, the Hilbert space is often the tensor product of N two-level systems (so the Hilbert space has dimension D=2^N). The most general operator on this system is the tensor product of the operators on each of the N two-level systems. On a single two-level system, the most general operator can be expanded in the Pauli basis: A=a_0 I + a_1 X + a_2 Y + a_3 Z, where all coefficients a_is are real if and only if A is Hermitian. Therefore we conclude that the most general operator on the 2^N-dimensional Hilbert space is a sum of 4^N different possible Pauli strings. Denoting (I,X,Y,Z) = X^a for a=0,…,3:
A = ∑_a_1⋯ a_N = 0^3 A_a_1⋯ a_N X^a_1⊗⋯⊗ X^a_N, or |A) = ∑_a_1⋯ a_N = 0^3 A_a_1⋯ a_N |a_1⋯ a_N).
The following fact will prove very useful in Section <ref>:
Using the inner product (<ref>),
(a_1^'⋯ a_N^'| a_1⋯ a_N) = 𝕀(a_1^'=a_1,…, a_N^'=a_N).
The symbol 𝕀[⋯] denotes the indicator function, which is 1 if its argument is true, and 0 if its argument is false. As is standard, we will denote with X_i^a the Pauli matrix X^a acting on qubit i, tensored with identity I on all other qubits.
§.§ Graphs and local Hamiltonians
Many-body quantum systems are interesting precisely because the Hamiltonian is usually expressible in a simple way. For most of this review, we will focus on Hamiltonians between N qubits that can be expressed as
H(t) = ∑_i=1^N ∑_a=1^3 h_i^a(t) X_i^a + ∑_i<j = 1^N ∑_a,b=1^3 h_ij^ab(t)X_i^a X_j^b.
Because H contains terms that have at most two non-identity Paulis at a time, we call H 2-local.
Each 2-local Hamiltonian can be naturally described via an undirected graph 𝖦=(𝖵,𝖤), where 𝖵 is a vertex set and 𝖤 is a collection of two element subsets of 𝖵. We place a qubit (or more generally, a degree of freedom) on each vertex v∈𝖵; we place an edge { u,v}∈𝖤 if and only if h^ab_uv(t) 0 for some a,b and t (except for in Section <ref>). In many physics problems, one actually has a graph 𝖦 which is pre-specified - only couplings between certain qubits are permitted, so it will be natural for us to describe notions of locality and Lieb-Robinson bounds in terms of graphs. A useful notation is to keep track of what edges are adjacent to each vertex: for v∈𝖵,
∂ v = { e∈𝖤 : v∈ e}⊂𝖤.
More generally, for any set 𝖠⊆𝖵,
∂𝖠 = { e∈𝖤: |e∩𝖠|=1}
contains the edges that connect vertices in 𝖠 to those outside of 𝖠.
The Manhattan distance (for us, just “distance") 𝖽(u,v) on a graph is defined as the fewest number of edges that can be traversed to get between any two vertices. This distance measure obeys the triangle inequality:
𝖽(u,v) ≥𝖽(u,w) + 𝖽(w,v), for any w∈𝖵.
The diameter of a set 𝖲⊆𝖵 is defined as
diam(𝖲) = max_u,v∈𝖲𝖽(u,v).
We say that the graph is d-dimensional (as measured by constant C>0) if
|{ u∈𝖵 : 𝖽(u,v)≤ r}| ≤ 1+Cr^d,
for any v∈𝖵; this is, of course, satisfied by the d-dimensional lattice ℤ^d with nearest-neighbor connectivity.
Naturally, one may consider k-local Hamiltonians where each of the interaction terms is k-local (e.g., X_1X_2X_3 is a 3-local term). Physically, we often take k as constant independent of the system size N. We will not focus too much on k-local Hamiltonians in this review: many of the techniques we have described for k=2 generalize somewhat straightforwardly. We think an elegant way to generalize what is described in this review to k-local problems is the factor graph construction: see <cit.> for details.
§.§ Operator norms and identities
Operator dynamics involve complicated, high-dimensional objects. Nevertheless, we may capture its sizes using prevailing choices of matrix norms. The operator norm
A := sup_|ψ⟩, |ϕ⟩⟨ϕ|A|ψ⟩/√(⟨ϕ|ϕ|⟨%s|%s⟩⟩ψ|ψ)
controls the matrix element between any possible states and is equivalent to the maximal singular value; the Frobenius norm
is the root-mean-square of singular values
A_F := √((A^†A)/(I))
which corresponds to its strength on random states (see (<ref>)).
Intuitively, the operator norm and Frobenius norm respectively capture the strength of the operator over the worst and average inputs states. Naturally, the above are special cases of the Schatten p-norms at p=∞ and p=2
A_p :=
(((A^†A)^p/2)/[I])^1/p for each 1 ≤ p ≤∞.
In the above, we have normalized all norms such that I_p = 1 as it appears natural in our discussions. Perhaps the most useful fact about these norms is the triangle inequality:
A+B_p≤A_p+B_p
and Hölder's inequality.
For any square matrices A and B, we have
AB_r ≤A_pB_q whenever 1/r = 1/p+ 1/q.
In particular, setting p=∞ yields the submultiplicativty of operator norm AB_r ≤A·B_r.
Further, since our operator is defined on a Hilbert space with a tensor product structure, it is often helpful to think about projection superoperators that isolate components of the operator according to locality.
For any set A, define the projection superoperator ℙ_𝖠 that annihilates operators acting trivially on A by
ℙ_𝖠|a_1⋯ a_N) := 𝕀(a_j 0, for some j∈𝖠) |a_1⋯ a_N).
Alternatively, let
ℙ_𝖠:= ℐ - ℙ_𝖠^c, then ℙ_𝖠 A = A if and only if A = A_𝖠⊗ I_𝖠^c
where is the identity super-operator. We will say “operator A is supported on set A” or “operator A acts non-trivially only on set A” if ℙ_𝖠 A = A.
It is worth distinguishing the functionality of the two super-projectors. The super-projector ℙ_𝖠 isolates the components of the operator that do not vanish in commutators (Section <ref>); for any operator A supported on 𝖠 and any operator B, we have
[A,B]= [A,ℙ_𝖠B].
Nicely, this superoperator cannot increase any Schatten norm by too much.
The projection ℙ_𝖠 at most increases the Schatten p-norm by
ℙ_𝖠B _p≤ 2 B_p.
In particular, it is an actual orthogonal projector in the Hilbert-Schmidt inner product such that
ℙ_𝖠B _F≤B_F.
The super-projector ℙ_𝖲 has an elegant representation in terms of Haar averages:
For any set 𝖲 and operator A, we can present the super-projector as
ℙ_𝖲A=∫ [d U]_𝖲^c U^† A U,
where [d U]_𝖲^c is the Haar measure for unitaries supported on set 𝖲^c. By the triangle inequality,
ℙ_𝖲A _p≤A_p.
The following identity will prove immensely useful for us when we prove Lieb-Robinson bounds:
For any square matrices A and B of the same dimension,
e^(A+B)t = e^At + ∫_0^t ds e^(A+B)(t-s)Be^As.
Call the right hand side C(t), and observe that dC/dt = (A+B)C. Explicitly evaluating the right-hand side, we find C(0)=I. Then, solving the differential equation leads to (<ref>).
§.§ Remark on C^*-algebras
In the mathematics literature, one often discusses Lieb-Robinson bounds using the formalism of C^*-algebras. In a nutshell, the idea is that in an unbounded graph (e.g., 𝖵=ℤ: the one-dimensional lattice!), many-body states are not precisely defined, yet local operators are. E.g. it is not possible to specify the state |⋯ 000⋯⟩ and always correctly set the boundary conditions at infinity; however, we can always discuss local operators, such as Pauli matrices X_j acting on site j∈𝖵, whether or not 𝖵 is a finite set.
C^*-algebras provide a rigorous language <cit.> for discussing the objects that do have precise definitions: bounded operators O which are supported on finite subsets of a (possibly infinite) vertex set 𝖵. The key observation is that commutators of bounded local operators are also bounded local operators: this closure, and the fact that time translation is generated by commutators with a local Hamiltonian, suggests that C^*-algebras are a rigorous way to discuss the limit of infinite system size. We feel, however, that this mathematical structure often distracts from the crucial intuition and ingredients behind making powerful Lieb-Robinson bounds relevant to concrete physics problems, and will not focus on it in this review.
§ LIEB-ROBINSON BOUNDS
We now turn to the core section of this review, where we introduce the famous Lieb-Robinson Theorem. Assuming only spatial locality, the Lieb-Robinson bounds constrain a large class of many-body quantum dynamics. Though it will take many pages to fully show it, these Lieb-Robinson bounds are remarkably versatile, especially since exact dynamics of many-body Hamiltonians are generally analytically intractable and problem-specific. In contrast, Lieb-Robinson bounds allow us to make statements about all local systems.
§.§ Warm-up: particle on a line
Before we dive into the many-body problem, it is instructive to consider a single-particle problem on a 1d lattice (r ∈ℤ) with the Hamiltonian
H = -h∑_r∈ℤ( |r⟩⟨ r+1| + |r⟩⟨ r-1| ).
This is essentially a discrete-space Schrodinger equation, or in computer science literature, the (continuous-time) quantum walk <cit.>.
We are interested in the Schrödinger picture wave function (presented in the |r⟩ basis)
ψ(r,t) := ⟨ r| e^-iHt|0⟩ for r∈ℤ^+, t∈ℝ^+.
The amplitude (squared) gives us the probability of the particle being on site r. The time evolution can be rewritten in the form of Schrödinger equation by inserting a complete basis:
d/dtψ(r,t) = ⟨r| - H ^- H t|0⟩ =∑_r'⟨r| - H |r'⟩⟨r'|^- H t|0⟩ = -∑_r' H_rr'ψ(r',t).
There are many approaches to solving this problem. One is to Taylor expand in time t:
e^-iHt|0⟩ = |0⟩ - iht [ |-1⟩ + |1⟩] - (ht)^2/2[ |-2⟩ + 2|0⟩ + |2⟩] + i(ht)^3/6[ |-3⟩ + 3|-1⟩ +3|1⟩ + |3⟩] + ⋯.
The coefficients in the above expression – at each order in t – are binomial coefficients, equivalent to those that count the number of random walks analogous to a random walk (Figure <ref>). However, if we are interested in ψ(r,t), the interference between terms at different orders can, a priori, be important:
ψ(r,t) = (-iht)^r/r! + r+21(-iht)^r+2/(r+2)!+⋯.
For this particular problem, we can find the exact solution of the oscillatory sum via exact diagonalization (<ref>). However, in the spirit of a Lieb-Robinson bound, let us only look for an inequality. Then the argument can greatly simplify. We take absolute values around the Schrödinger equation (<ref>):
d/dtψ(r,t) ≤∑_r'H_rr'ψ(r',t).
For this system of ordinary differential inequalities with initial conditions, Gronwall's Lemma solves it by exponentiation:
ψ(r,t)≤∑_r' (^A t )_rr'ψ(r',0)= ⟨r|^A t|0⟩ where A_rr' = H_rr'≥ 0.
Intuitively, this inequality amounts to ignoring the phases in the Schrödinger equation and just adding up all of the terms in (<ref>) coherently. This also explicitly reduces the bound to a combinatorial problem defined by the weighted adjacency matrix A_rr' (which is entry-wise positive). The exponential conveniently generates all paths connecting sites 0 to r:
⟨r|^A t|0⟩ = ∑_ℓ = 0^∞(h|t|)^ℓ/ℓ!·#(paths from 0 to r with length ℓ)
= ∑_m=0^∞(ht)^r+2m/(r+2m)!r+2mm≤(2ht)^r/r!·∑_m=0^∞(2ht)^2mr!/(r+2m)!≤(2ht)^r/r!^2ht/r.
The second line gives precisely the coefficients of Pascal's triangle (<ref>) without phases; the inequality uses the following convenient bound on binomial coefficients and then that (r+2m)!/r! ≥ r^2m to obtain the exponential:
For positive integers a>b ≥ 0, we have
ab≤ 2^a.
To further simplify, apply Stirling's approximation for the factorial (this will be suitably strong throughout the paper).
[Stirling's approximation]
For non-negative integers ℓ≥ 0, we have
(ℓ/e)^ℓ < ℓ!.
We deduce that
|ψ(r,t)| ≤(2eht/r)^r ^2ht/r.
In other words, we obtain an emergent speed limit: asymptotically, the particle cannot travel faster than the speed
v_LR = 2eh for r →∞.
We are calling this emergent velocity v_LR, in analogy with the Lieb-Robinson velocities we will soon introduce. From the single-particle problem to the many-body problem, we will see the Lieb-Robinson bounds have a similar combinatorial flavor: counting (weighted) paths on the lattice. Since the exact dynamics of the many-body evolution now has exponentially larger dimensions and is thus much harder to solve, the bounds that generalize our argument above can become much more important!
Before we move on, let us comment on the tightness of these naive bounds. The reader may find the triangle inequality approach “wasteful" – perhaps one can do a better counting to get a smaller v_LR? In Section <ref>, we will refine this approach by further utilizing the probabilistic interpretation (constraints) of |C(r,t)|^2, and show that this is indeed possible.
For concreteness, let us now compare with the exact diagonalization results;
the eigenvectors of the Hamiltonian H are the non-normalized plane wave states
|k⟩ := ∑_r∈ℤe^ikr|r⟩,
with eigenvalues
H|k⟩ = E_k |k⟩ where E_k = -2hcos(k).
The maximal group velocity in the problem is
∂ E_k/∂ k = 2hsin k ≤ 2h < v_LR.
How can anything travel faster than the fastest particle in the system? We will return to this issue in Section <ref>; for now, we simply remark that our estimate's r-dependence is so tight that we cannot improve on the factor e in (<ref>), although the factor of 2 can be removed using the methods of Section <ref>: see (<ref>) and nearby discussion for more.
Moreover, we can solve the problem exactly using these eigenstates. Define the Fourier transform
ψ̃(k,t) := ∑_re^ikrψ(r,t).
Using the Schrödinger equation, we find
∂_t ψ̃(k,t) = 2ihcos(k)ψ̃(k,t),
which can be solved given our initial condition
ψ̃(k,t) = e^2iht cos k.
Rewrite in terms of the n^th order Bessel function J_n
ψ(r,t) = ∫_0^2dk/2e^-ikrψ̃(k,t) = (-i)^ℓJ_r(2ht).
Using the Bessel function asymptotics, we confirm (<ref>) when t ≪ r.
§.§ Lieb-Robinson bounds
Now, let us turn to many-body quantum mechanics. Unlike above, it will now prove more natural to discuss the time evolution of operators, rather than states. The reason was described in Section <ref>: in the thermodynamic (large particle number limit), a quantum state is an extremely complicated object. Not only does this make it annoying to discuss, but it also makes it fragile: small local perturbations can completely orthogonalize a quantum state <cit.>. For example, if |θ⟩ = cosθ |0⟩ + sinθ |1⟩,
⟨ 0⋯ 0|θ⋯θ⟩ = cos^Nθ
if there are N qubits, even though |θ⋯θ⟩ is obtained from |0⋯ 0⟩ by a simple sequence of N single-qubit rotations. As this is the type of perturbation that will arise in quantum mechanics when we look at time evolution generated by unitary e^-iHt, we will need a different notion of locality.
With operator growth, we find such a notion: a local operator is robust to all but the perturbations that arise near its starting location. This follows from the trivial (but extremely important) fact that:
If a quantum many-body system is defined on set 𝖵, and 𝖠,𝖡⊂𝖵 obey 𝖠∩𝖡=∅, then operators A and B, which act non-trivially only on qudits in 𝖠 and 𝖡 respectively, commute: [A,B]=0.
Hence, Lieb-Robinson bounds will capture the dynamics of operators. In particular, we will evaluate commutators of the form [A(t),B]. By this proposition, the commutator is not zero (as an operator) only when A(t) has grown enough to act non-trivially (not as the identity) in 𝖡. Formally, we often consider the following quantity
C_𝖠𝖡(t) := sup_A, B : ‖ A‖ =‖ B‖ =1‖[A(t),B]‖ for any sets 𝖠,𝖡⊂𝖵.
§.§.§ Warm-up: one-dimensional chain
It is instructive to begin by studying a one-dimensional spin chain with nearest-neighbor interactions. In the language of Section <ref>, this is a 2-local Hamiltonian with interaction graph 𝖦 = (𝖵,𝖤), with 𝖵=ℤ and 𝖤 = {{ n,n+1}: n∈𝖵}. One could write, assuming that the interactions have bounded norms,
H = ∑_r∈𝖵 H_r,r+1 = ∑_e∈𝖤 H_e such that H_e≤ h.
We will calculate the commutator between different operators at different times:
C_0r(t) := sup_A_0, B_r : ‖ A_0‖ =‖ B_r‖ =1‖[A_0(t),B_r]‖/2 where A_0(t):= ^ H tA_0^- H t.
This commutator, albeit abstract, bounds numerous interesting tasks, as we show in Section <ref>: roughly speaking, it tells us the extent to which a perturbation at site r can modify an observable at site 0 after time t. Bounding C_0r(t) becomes more complicated than the single-particle case. Naively, let us try Talyor-expanding the Heisenberg evolution
^ H tA_0^- H t = A_0+ [H_0,1, A_0]t+ [H_-1,0, A_0]t - ∑_e_2,e_1[H_e_2, [H_e_1, A_0]]t^2/2!+⋯.
Indeed, the leading order Taylor expansion tells us that the operator only grows “one step further" (as in Figure <ref>) as a consequence of the spatial locality of the Hamiltonian. However, the high-order terms include all possible chains of non-vanishing commutators, which grows factorially fast because – unlike for a single particle – the operator acts on more sites as we commute with H more times, and any of these terms can cause a non-vanishing commutator at a later order. For example, the following fourth-order term is allowed: [H_1,2,[H_-1,0,[H_1,2,[H_0,1,A_0]]]]. Directly taking absolute values of (<ref>) will give a divergent sum[This is explicitly seen by considering imaginary time evolution, as in ^β HA_0^-β H. Here the commutator expansion is genuinely less controlled <cit.>. A very weak notion of locality is only known in 1d spin chains <cit.>.] at constant time t= O(1).
The key to obtaining the Lieb-Robinson Theorem is unitarity. Indeed, because of the factors of i in the exponential, many of the terms in (<ref>) will destructively interfere with each other. In Section <ref>, we will quantitatively use the intuition that Heisenberg operator dynamics amounts to a rotation in a high-dimensional space: in this picture, it is particularly intuitive that many of the terms in (<ref>) are just “internal rotations" of the operator, that cannot contribute to the commutator C_0r(t). Yet this picture is better suited for the Frobenius light cone, which is a slightly different object than C_0r(t) (see Section <ref>).
Therefore, a bound on identifying which terms we can prove interfere requires some care. The key insight is to use unitarity to move some of the time evolution onto the operator B_r. Defining
H_r := ∑_e∈𝖤 : e∋ rH_e = H_r,r+1 + H_r-1,r,
we find that
‖ [A_0(t+ϵ),B_r]‖ = ‖ [A_0(t),B_r(-ϵ)]‖ ≤‖ [A_0(t),B_r] -iϵ [A_0(t),[H_r,B_r]]‖ + O(ϵ^2)
≤‖ [A_0(t), B_r] + iϵ [[A_0(t),B_r ],H_r] +iϵ [[H_r,A_0(t)], B_r] ‖ + O(ϵ^2)
≤‖ [A_0(t), B_r] +iϵe^-iϵ H_r [[H_r,A_0(t)], B_r] e^iϵ H_r‖ + O(ϵ^2)
≤‖ [A_0(t), B_r]‖ + 2ϵ∑_e∈𝖤 : e∋ r‖ H_e ‖‖ [A_0(t),B'_e]‖ + O(ϵ^2).
The first inequality Taylor-expands the Heisenberg equation of motion, using that the commutator [H,B_r] can only survive if a term H_e in H overlaps with site r (r∈ e). The second inequality uses the Jacobi identity, while the third line conjugates the argument of the norm by an overall unitary to cancel the second term in the second line. This unitary rotation only causes additional errors at O(ϵ^2). The fourth line uses the triangle inequality, along with ‖ B_r‖=1 and the definition
B'_e := H_e / ‖ H_e‖ such that ‖ B'_e‖=1.
Remarkably, we see that at order O(ϵ), we have found a kind of “recursive" relation: the bound on C_0r(t) reduces to a system of differential inequalities. Upon taking ϵ→ 0 and defining sup_A_0 = B'_e = 1‖ [A_0(t),B'_e]‖ = C_0e(t) a la (<ref>), we find that
d/dt C_0r(t) ≤ 2h∑_e: r∈ e C_0e(t),
d/dt C_0e(t) ≤ 2h∑_e ∩ e' ∅, e e' C_0e'(t).
Intuitively, the growth of bound C_0r is bounded by C_0e: this nearly coincides with the single-particle recursion (<ref>) except that the intermediate bounds are in terms of commutators C_0e. In fact, for our warm-up one-dimensional model, this is not a big deal, since
d/dt C_0,{ r,r+1}≤ 2h [ C_0,{ r-1,r} + C_0,{ r+1,r+2}];
however, the manipulations of (<ref>) will hold for general graphs too, so we keep (<ref>) general.
We can explicitly integrate (<ref>), which is basically identical to (<ref>). However, due to the relation (<ref>) between C_0e and C_0r, we will multiply by an overall factor of 2 in our final bound to account for the two terms in (<ref>). Following the derivation of (<ref>), we find that
C_0r(t) ≤(4ht)^r/r!^4ht/r.
Note that there is a factor of 4h instead of 2h, which arises from the extra factor of 2 coming from the fourth line of (<ref>), which itself comes from bounding the size of a commutator.
In retrospect, it is perhaps surprising that the commutator growth of a many-body quantum system, like a single-particle system, is controlled by counting over paths (instead of branching trees)! We will make this picture even sharper in Section <ref>.
At late times, the Lieb-Robinson bounds become very weak. Indeed, in the argument above, it is always true that
‖ [A_0(t),B_r]‖≤ 2 ‖ A_0(t)‖‖ B_r‖≤ 2,
So Lieb-Robinson bounds are obviously best used outside the “light cone" (defined by where we know that C_0r(t)<1.
§.§.§ Lieb-Robinson bounds on general graphs
As we have already noted, the manipulations in (<ref>) apply to 2-local Hamiltonians on graph 𝖦=(𝖵,𝖤) with arbitrary connectivity. With a slight generalization to our derivation above, allowing the operators A and B to have support in sets 𝖠⊂𝖵 and 𝖡⊂𝖵, we obtain the following theorem:
[Lieb-Robinson bound on a general graph <cit.>]
For a 2-local Hamiltonian on graph 𝖦=(𝖵,𝖤), we have that
C_(t) ≤∑_ℓ = 0^∞(2|t|)^ℓ/ℓ!∑_paths Γ
Γ = ℓ∏_j=1^ℓ‖ H_Γ_j‖.
Each path Γ=Γ_1,⋯,Γ_ℓ of length ℓ is a sequence of edges Γ_j∈𝖤 from the set =: Γ_0 to the set =:Γ_ℓ+1, satisfying the connectivity rule
Γ_j ∩Γ_j+1≠∅, Γ_j ≠Γ_j+1, ∀ j=0,⋯,ℓ,
Further, defining a symmetric real matrix indexed on 𝖵:
h_uv := {[ H_{u,v}, u≠ v; ∑_wH_{u,w}, u=v ].,
we find that
C_𝖠𝖡(t) ≤∑_u∈𝖠,v∈𝖡^2|t|h_uv.
(<ref>) is derived identically to our calculation in Section <ref>, so we focus on deriving (<ref>) as a simplification of (<ref>). Since the sum over u,v in (<ref>) comes straightforwardly from considering all the initial and final points in 𝖠 and 𝖡, let us focus on Taylor expanding the exponentiated matrix exp[2h|t|]_uv, and confirming that it includes all terms in (<ref>) beginning and ending at fixed vertices:
^2|t|h_uv = ∑_ℓ=0^∞(2|t|)^ℓ/ℓ!∑_ u_1,⋯, u_ℓ'∈𝖵:
u≠ u_1, u_1≠ u_2, ⋯, u_ℓ'≠ v ∑_p_0,⋯,p_ℓ'∈ℤ_≥ 0:
p_0+⋯+p_ℓ'+1=ℓ-ℓ'-1 h_uu^p_0 h_uu_1h_u_1u_1^p_1 h_u_1u_2⋯ h_u_ℓ'u_ℓ'^p_ℓ' h_u_ℓ' v h_vv^p_ℓ'+1
= ∑_ℓ=0^∞(2|t|)^ℓ/ℓ!∑_ u_1,⋯, u_ℓ'∈𝖵:
u≠ u_1, u_1≠ u_2, ⋯, u_ℓ'≠ v ∑_p_0,⋯,p_ℓ'∈ℤ_≥ 0:
p_0+⋯+p_ℓ'=ℓ-ℓ'-1∏_j'=0^ℓ'+1∑_w≠ u_j' h_u_j'w^p_j' h_u_j'u_j'+1,
where u_0:=u and u_ℓ'+1:=v.
We need to verify that each term in (<ref>) is included in (<ref>). For each Γ satisfying (<ref>), assign a vertex {u'_j}=Γ_j∩Γ_j+1 to each edge Γ_j that grows the path further. For two neighboring edges, we have two possibilities: either u'_j-1=u'_j or u'_j-1≠ u'_j. Γ_j looks like a branch for the previous case, and a part of the “core" path for the latter case, as shown in Figure <ref>. The sequence (Γ_0,…, Γ_ℓ+1) then corresponds to (u,…,u, u_1,…, u_1, u_2,…, u_ℓ',… ,u_ℓ',v…,v), where u_j' appears p_j'+1 multiple times with ∑_j' p_j'=ℓ-ℓ'-1, and the subsequence (u',u'_1,⋯,u'_ℓ',v) obeys u'_j-1 u'_j. The label (u',u'_1,⋯,u'_ℓ',v) and (p_0,⋯,p_ℓ'+1) then corresponds precisely to the second and the third sum in (<ref>). Thus it remains to verify for a fixed label,
∏_j'=0^ℓ'+1∑_w≠ u_j' h_u_j'w^p_j' h_u_j'u_j'+1≥∑_paths Γ corresponding to
(u,u_1,⋯,u_ℓ') and (p_0,⋯,p_ℓ')∏_j=1^ℓ‖ H_Γ_j‖.
This holds because we can always write any Γ included in the right-hand side as
Γ = u,w_01,…, u, w_0 i_p_0, uu_1, u_1w_11, …, u_1, w_1 i_p_1, u_1u_2, …u_ℓ'v, { vw_ℓ^'+1,1} ,…,
where u_1w_11, ⋯, u_1, w_1 i_p_1 for example, are branches hanging at vertex u_1. The left-hand side of (<ref>) includes all such terms, but overcounts them because, e.g., we are allowed to include the sum h_u_j'^2 on the left-hand side of (<ref>) in a term with p_j'=2, but on the right-hand side of (<ref>) we cannot count the same edge twice in a row.
§.§.§ Examples
We will improve the bound in Theorem <ref> and thus (<ref>) in Section <ref>, such that the diagonal elements of h_uv can actually be eliminated. However, Theorem <ref> is already useful (although not tight) in many examples, as we show here. We will drop the absolute value for time t for notational simplicity.
Suppose the graph 𝖦 has bounded degree g, i.e., each vertex connects to at most g edges. If H_e≤ h for any e∈𝖤, then for two vertices u,v of distance r=𝖽(u,v) and a constant 0<K<∞,
C_uv(t) ≤ K(4(g-1)ht)^r/r!.
We relax the sum in (<ref>) by not demanding the path ends at the fixed vertex v:
C_uv(t) ≤∑_ℓ = 0^∞(2ht)^ℓ/ℓ!·#(paths Γ starting from u with length ℓ)
≤∑_ℓ = r^∞(2ht)^ℓ/ℓ! (2g-2)^ℓ = (4(g-1)ht)^r/r!∑_ℓ'=0^∞(4(g-1)ht)^ℓ' r!/(r+ℓ')!
≤(4(g-1)ht)^r/r!^4(g-1)ht/r.
The second line uses the fact that each edge connects to at most 2g-2 other edges. The last two lines use manipulations analogous to the derivation of (<ref>). Lastly, we fix the constant K by noting that if (g-1)ht ≫ r, our bound is loose anyway. Since C_uv(t) ≤ 2, we can therefore follow the argument around (<ref>) to replace ^4(g-1)ht/r by some finite constant K.
Proposition <ref> reduces to the calculation of Section <ref> by taking g=2 (which is a one-dimensional lattice with nearest-neighbor interactions), and implies that for a general graph, information propagates under a speed limit proportional to the degree. This scaling is saturated, for example, by translational-invariant free fermions in a g/2-dimensional lattice.
[Converting factorial to exponential decay]
The tail bound of form (vt)^r/r! is often relaxed to an exponential C^μ (vt-r) (with a μ-dependent prefactor C), where μ can be chosen to be arbitrarily large for sufficiently small t. This follows by considering the following chain of inequalities: for r>1
(ct)^r/r!≤e^-μ r( e^μ ct)^r/r!≤e^-μ r∑_n=1^∞( e^μ ct)^n/n! = e^-μ r(e^μ vt-1).
for constant v=μ^-1e^μ c. The exponential tail bound is both easier to work with when a Lieb-Robinson bound is an intermediate step in a calculation (see many examples in later sections), but is also useful because it allows us to consider exponentially-decaying interactions. This often arises when one calculates an effective Hamiltonian in the intermediate stages of another proof (see e.g., the discussion in Section <ref>).
Often, it is desirable to have a good Lieb-Robinson bound for Hamiltonians that have exponentially decaying interactions and are not strictly local. A strong bound of this kind is given in Theorem <ref>, as we will use more sophisticated techniques to streamline the proof. Here we show how to prove such a bound when the vertices 𝖠 and 𝖡 both consist of a single vertex:
[Lieb-Robinson bound with exponentially decaying tails]
Let a,b∈𝖵. For a spatially local Hamiltonian H=∑_𝖲⊂𝖵 H_𝖲 on a graph 𝖵 in d spatial dimensions, suppose that for any u∈𝖵,
∑_𝖲∋ uH_𝖲^μ' ( diam(𝖲)-1)≤ h <∞.
We choose to define H_𝖲 0 only for connected sets 𝖲; this means that terms in H_𝖲 may not act non-trivially on all sites within 𝖲.
Then for any 0<μ<μ', there exist constants c,v>0 such that for any disjoint ,⊂𝖵,
C_ab(t) ≤ c e^-μ𝖽(a,b)(e^μ vt -1).
Lieb-Robinson bounds for exponentially decaying interactions are discussed in <cit.>. We start with the following observation: for any μ < μ' and α>d, there exists a constant h^' such that
h^'e^-μ (𝖽(i,j)-1)/𝖽(i,j)^α≥∑_𝖲 :{ i,j}⊆𝖲‖ H_𝖲‖.
Moreover, for any two sites i,j in the vertex set 𝖵,
∑_k∈𝖵∖{ i,j}e^-μ( 𝖽(i,k)-1)/𝖽(i,k)^αe^-μ ( 𝖽(k,j)-1)/𝖽(k,j)^α≤∑_k∈𝖵∖{ i,j}e^-μ (𝖽(i,j)-2)/𝖽(i,k)^α𝖽(j,k)^α≤ K e^-μ( 𝖽(i,j)-1)/𝖽(i,j)^α
for some constant 0<K<∞. This latter fact follows from the fact that on a d-dimensional lattice, the sum over k converges rapidly at large distances as ∫dr r^d-1-2α, while at short distances only O(n^d) sites obey the product 𝖽(i,k)𝖽(k,j) ≥ n𝖽(i,j). We have also used the triangle inequality (<ref>).
Using these facts, we now follow (<ref>) to write (here a ∈𝖲_1 and b∈𝖲_ℓ is implicit):
C_ab(t) ≤∑_ℓ=1^∞t^ℓ/ℓ!∑_Γ of length ℓ∏_j=1^ℓ‖ H_Γ_j‖≤∑_ℓ=1^∞t^ℓ/ℓ!∑_𝖲_1: a∈𝖲_1∑_𝖲_2 : 𝖲_1 ∩𝖲_2 ∅⋯∑_𝖲_ℓ : 𝖲_ℓ-1∩𝖲_ℓ∅ 2 ‖ H_𝖲_1‖· 2‖ H_𝖲_2‖⋯ 2‖ H_𝖲_ℓ‖
≤∑_ℓ=1^∞(2t)^ℓ/ℓ!∑_v_1∈𝖵∑_𝖲_1: { a,v_1}⊂𝖲_1∑_v_2∈𝖵∑_𝖲_2: { v_1,v_2}⊂𝖲_2⋯∑_𝖲_ℓ-1:
{ v_ℓ-2,v_ℓ-1}⊂𝖲_ℓ-1∑_𝖲_ℓ: { v_ℓ-1,b}⊂𝖲_ℓ‖ H_𝖲_1‖·‖ H_𝖲_2‖⋯‖ H_𝖲_ℓ‖
≤∑_ℓ=1^∞(2t)^ℓ/ℓ![ ∑_v_1∈𝖵∑_𝖲_1: { a,v_1}⊂𝖲_1∑_v_2∈𝖵∑_𝖲_2: { v_1,v_2}⊂𝖲_2⋯∑_𝖲_ℓ-1:
{ v_ℓ-2,v_ℓ-1}⊂𝖲_ℓ-1‖ H_𝖲_1‖⋯‖ H_𝖲_ℓ-1‖] h^'e^-μ𝖽(b,v_ℓ-1)-1)/𝖽(b,v_ℓ-1)^α
≤∑_ℓ=1^∞(2h^' te^μ)^ℓ/ℓ!∑_v_1,…, v_ℓ-1∈𝖵e^-μ (𝖽(a,v_1)+⋯ + 𝖽(v_ℓ-1,b)/𝖽(a,v_1)^α⋯𝖽(v_ℓ-1,b)^α≤1/Ke^-μ𝖽(a,b)/𝖽(a,b)^α∑_ℓ=1^∞(2Kh^' te^μ)^ℓ/ℓ!.
In the second line above, we perform the sum over set 𝖲_ℓ by first fixing a vertex v_ℓ-1∈𝖲_ℓ-1, and then summing over all sets including that site and b; we can similarly sum over all intermediate sets by including a site v_j ∈𝖲_j∩𝖲_j+1. Note that since this choice may not be unique, this line is an overestimate in general. We do this because now we can carry out the sum over 𝖲_ℓ using (<ref>): this is shown in the third line. In the fourth line, we iterate this argument to reduce the sum to the intermediate vertices v_1,…, v_ℓ-1, which are then bounded using (<ref>). We have also used the triangle inequality on distances in the exponential. Since 𝖽(a,b)≥ 1, we obtain (<ref>).
§.§ Self-avoiding paths
In this section, we describe a simple yet powerful improvement of the proof technique of Theorem <ref>, based on the notion of self-avoiding or irreducible paths.
§.§.§ General results
In Theorem <ref>, we summed over all “paths" of couplings H_e, including those paths that grow branches or backtrack (see Figure <ref>). In fact, a sharper bound is possible by “ignoring" these “branches" in Figure <ref>. One can show that we only need to account for the self-avoiding (originally called irreducible) paths <cit.> in Figure <ref>.
[Summing over self-avoiding paths <cit.>]
Theorem <ref> can be improved to
C_𝖠𝖡(t) ≤∑_ℓ = 0^∞(2|t|)^ℓ/ℓ!∑_self-avoiding paths Γ
Γ = ℓ ∏_j=1^ℓ‖ H_Γ_j‖
where each path Γ is a sequence of Hamiltonian terms H_Γ_j from the set 𝖠 to the set 𝖡, subject to the connectivity rule
Γ_i ∩Γ_j =∅ if |i-j| > 1.
The proof of Theorem <ref> is more intricate, and we only provide a sketch of the construction <cit.>. The key idea is to artfully manipulate the exponential: resumming most terms into new exponentials, and keeping only terms that contribute to operator growth. The “irreducible path" is named as the path for which if a single “irreducible coupling" was dropped, the final commutator would vanish. This resummation is achieved via the following identity:
[B,A(t)] = _𝖡^ t|A) = _𝖡∑_self-avoiding paths Γ⋯
⋯ ∫_t<t_ℓ<⋯ <t_1
ℓ = Γdt_1⋯dt_ℓ e^ℒ(t-t_ℓ)ℒ_Γ_ℓe^ℒ_ℓ-1 (t_ℓ-t_ℓ-1)ℒ_Γ_ℓ-1⋯e^ℒ_1(t_2-t_1)ℒ_Γ_1e^ℒ_0t_1 |A)
for appropriately chosen intermediate unitaries e^ℒ_ℓ-1 (t_ℓ-t_ℓ-1) (depending on the path Γ). Remarkably, each term in the Taylor expansion of ^ t is accounted for in exactly one self-avoiding path. With this identity at hand, we immediately see that the unitaries (containing fictitious terms) do not contribute to commutator growth after employing the triangle inequality: after all, ‖e^ℒ_j (t_j+1-t_j) A'‖ = ‖ A'‖ for any operator A'.
[Irreducible path bounds for the one-dimensional line, and trees]
For the 1d nearest neighbor spin chain (<ref>), there is a unique irreducible path between any two points (since the graph has no cycles (a.k.a. loops) in it). Hence, Theorem <ref> implies
C_0r(t) ≤(2h|t|)^r/r!.
This matches exactly the leading order Taylor expansion, without the higher-order terms in time t. A similar result holds whenever the graph 𝖦 is a tree.
The following corollary follows straightforwardly from the proof of Theorem <ref>, and is useful since it bounds not only a particular commutator but also the part of the operator that can grow far away at all.
[Lieb-Robinson bound for operator to expand]
Denote
𝖢_r := { v∈𝖵 : 𝖽(v,𝖠) ≥ r}.
Then for a spatially 2-local Hamiltonian on a graph 𝖵 with O(1) maximal degree, there exist O(1) constants 0<c,u<∞ such that
C_𝖠𝖢_r(t) ≤ c (ut)^r/r!.
To prove this result, one simply sums over all irreducible paths of length ≤ r, which are required to hit any vertex in 𝖢_r. The restriction to self-avoiding paths that Theorem <ref> allows is only quantitatively important in spatially local systems but becomes qualitatively crucial in random all-to-all models (Section <ref>) and power-law interacting systems (Section <ref>). It also helps in the proof of the following result, which is of high value in the literature:
[Lieb-Robinson bound with exponentially decaying tails]
For H defined as in Theorem <ref>, for any 0<μ < μ^',
there exists constants c,v>0 such that for any disjoint ,∈𝖵,
C_(t) ≤ c ·min(|∂|,|∂|)e^-μ𝖽(,)(e^μ vt -1).
Since we have already discussed how to handle exponentially decaying interactions in Theorem <ref>, we explain here how to get the area prefactor min(|∂𝖠|,|∂𝖡|) in (<ref>). Any self-avoiding path from 𝖠 to 𝖡 must start by intersecting some site near the boundary ∂𝖠. For exponentially decaying interactions, the number of such paths can contribute a total weight proportional to |∂𝖠|. Once we pick the first term in the irreducible path of Theorem <ref>, then we can use Corollary <ref> to get the factor of e^-μ𝖽(𝖠,𝖡) in (<ref>).
§.§.§ Optimizing over equivalence classes
Sometimes in these generalizations, it proves valuable not to choose “self-avoiding paths" in the way that we have defined above: so long as one can find any exact identity of the form (<ref>), the strategy of Theorem <ref> can be applied. So far in the literature, this relies on finding an efficient notion of equivalence class on the set of all possible sequences of ℒ_e. To highlight some ways that this equivalence class construction can be used, let us give two simple examples.
[1d transverse-field Ising model]
The transverse field Ising model
H = -∑_r∈ℤ[J X_rX_r+1 + hZ_r]
is a standard integrable model with a storied history <cit.>. Naively applying the Lieb-Robinson bound of Theorem <ref> to this problem, one arrives at
v_LR≲ J.
However, one can do better <cit.>. The actual sequence of coefficients that must occur to grow an operator to the right is [hZ_2,[JX_1X_2,[hZ_1,[JX_0X_1,…,]]]], since all the J terms commute.
Our equivalence class could simply require that the irreducible coefficients in the sequence correspond to both the J and h terms above, and this leads to
v_LR≲√(Jh).
Of course, we could simply drop the J terms if J≫ h: the irreducible terms in the sequence of (<ref>) could amount to hX_1,hX_2,…. This choice leads to
v_LR≲ h.
Clearly, there is a lot of creativity in the equivalence class construction!
This example suggests it can be important to consider which operators in the Hamiltonian commute with other terms. While this point was highlighted in <cit.>, they did not use the factor graph and equivalence class-based construction of <cit.>. Marrying these two approaches would be fruitful.
[1d disordered spin chain]
Consider a Hamiltonian of the form (<ref>), but now where the magnitudes h_r = ‖ H_r,r+1‖ are strongly varying from one site to the next <cit.>. Assume for simplicity that the h_r are independent and identically distributed. In this case, we should generalize Example <ref> and look for the weakest links between any two sites we wish to send signals between. In general, the nature of v_LR on very large distances will depend on the distribution of J_rs. Suppose for example that we know the cumulative distribution function
F(h) = ℙ[|h_r| ≤ h].
Choosing our equivalence classes to only include the couplings where h_r ≤ h_* for any h_*, we can bound (in the thermodynamic limit) the Lieb-Robinson velocity by:
v_LR≤ 2e×inf_h_*h_*/F(h_*).
Notice that v_LR=0 if F(h_*) ∼ h_*^α for α<1, which happens when the probability density for small h_r diverges.
Theorem <ref> has recently been generalized to get stronger bounds on the range/size of operators; such a technical achievement is important in proving tighter Lieb-Robinson bounds in problems with decaying interactions <cit.>.
§.§ Generalization to open systems
It is straightforward to find Lieb-Robinson bounds in open quantum systems <cit.>. We present a modern version reminiscent of Theorem <ref>:
[ Lieb-Robinson bounds for open systems]
For local Lindbladian ℒ (i.e., generator of a completely positive unital map), defined on a graph analogous to Theorem <ref>,
C_𝖠𝖡(t) ≤∑_ℓ = 0^∞(|t|)^ℓ/ℓ!∑_self-avoiding paths Γ
Γ = ℓ ∏_j=1^ℓ‖ℒ_Γ_j‖_∞-∞
where the super-operator norm is defined by
‖ℒ‖_∞-∞: = sup_O [O]/O.
In an open quantum system, the intermediate terms are not unitary but still satisfy ‖e^ℒ_k t‖_∞-∞≤ 1 <cit.>: the proof of Theorem <ref> immediately generalizes to open systems! The weaker Lieb-Robinson bounds discussed in Section <ref> can then also be derived for open systems by just replacing 2‖ H_e‖ with ‖ℒ_e‖_∞-∞ as appropriate. It is also straightforward to extend these results to k-local Hamiltonians that couple more than two sites simultaneously.
§ BOUNDS ON SIMULATABILITY
A general Hamiltonian evolution requires exponentiating a large matrix. Nevertheless, exploiting locality, Lieb-Robinson bounds provide a rigorous starting point for studying the complexity of simulating many-body quantum systems on a classical computer and a quantum computer. In this section, we discuss this issue, along with many interesting extensions of Lieb-Robinson bounds that arise from this perspective.
§.§ Lieb-Robinson bounds and local approximations for dynamics
To guide our discussion, we consider classically simulating the value of a local observable A supported in finite set 𝖠, given an initial state ρ. In particular, we ask what is the expected value of A after a later time t: in the Heisenberg picture, this is equal to [ ρ A(t)]. At t = 0, this reduces to the marginal _𝖠[ρ_𝖠 A], where
ρ_𝖠 = _𝖠^cρ
is the reduced density matrix of ρ on subset 𝖠. If we know how to calculate ρ_𝖠 efficiently (which we often will), then we will classically evaluate _𝖠[ρ_𝖠 A] on a computer, which requires far fewer classical bits of memory. As time evolves (t > 0), intuitively, Lieb-Robinson bounds tell us that the operator A(t) will not have grown too large at small times t – if it had, then commutators C_𝖠𝖡(t) would be large for sets 𝖡 far from 𝖠. Hence for small t, the calculation of [ ρ A(t)] should also be tractable.
§.§.§ Local approximants
In this section, we discuss how to formally relate the bounds on commutators to the classical simulatability implied above. In many contexts, the local approximation form of Lieb-Robinson bounds are both conceptually and technically more powerful (e.g., when the Hamiltonian has a power-law decaying tail: see Theorem <ref>).
For any operator A and vertex subset 𝖲⊂𝖵,
ℙ_𝖲A-A≤sup_B_𝖲^c =1[A, B_𝖲^c]≤ 2ℙ_𝖲A-A.
Recall the definition of ℙ_𝖲 in (<ref>).
The first inequality uses the Haar integral representation (Proposition <ref>) where [d U]_𝖲 denotes the Haar measure of unitaries on set 𝖲
A - ℙ_𝖲A = ‖∫ [d U]_𝖲 (A-U^† A U)‖≤∫ [d U]_𝖲·[A,U]≤sup_B_𝖲 =1[A, B_𝖲]
and applies the commutator bound for each U. The second inequality uses that
[A, B_𝖲] = [A-ℙ_𝖲A , B_𝖲]≤ 2A-ℙ_𝖲A
for any operator B_𝖲 with B_𝖲=1. This is the advertised result.
For the task for obtaining the local marginal, _𝖠[ρ_𝖠 A], we additionally require an explicit, calculable form of the local approximation; this will also help implement the unitary dynamics efficiently on a gate-based quantum computer (Section <ref>). We can already see how to do this by tracing back to Corollary <ref>, which we illustrate again in the following example:
[Local approximation error on a 1d spin chain]
Consider the Example of Section <ref>. Decompose the Hamiltonian H = H_r-1,r + (H_≤ r-1 + H_≥ r). Consider the dynamics according to a restrcted Hamiltonian Ã(t) = ^_≤ r -1 t A. Here by construction,
ℙ_≤ r-1Ã(t) = Ã(t),
although Ã(t) ℙ_≤ r-1 A(t) in general. Still, we see that
A(t) - Ã(t) ≤∫_0^tds _r-1,r^_≤ r-1 s A≤∫_0^tds 2h (2hs)^r-1/(r-1)!
= (2ht)^r/r!.
The first inequality uses Duhamel's identity (Proposition <ref>) for = _r-1,r + (_≤ r-1 + _≥ r)
A(t) = ∫_0^t ds ^ (t-s)_r-1,r^_≤ r-1 s A + ^_≤ r-1 t A
and the unitary invariance of the operator norm.
The second inequality expands _r-1,r^_≤ r-1 s A into a sum over self-avoiding paths (Theorem <ref>).
The local approximation holds more generally. For any Hamiltonian, we define
H_𝖡 := ℙ_𝖡 H for each set 𝖡
H_𝖡:𝖢 := H_𝖡∪𝖢 - H_𝖡 - H_𝖢 for any disjoint sets 𝖡 and 𝖢.
For a spatially local Hamiltonian in d spatial dimensions, any regions B with complement C:= B^c, and any operator A supported on A, there exist constants μ,v, c>0 such that
^ ( H_ B + H_ C + H_B : C )t A ^- ( H_ B + H_ C + H_B : C )t - ^- H_ B t A ^ H_ B t≤
c ·∂ AAe^-μ d(A,C)(e^μ v|t| -1).
Indeed, the error term is reminiscent of the original Lieb-Robinson bound (Theorem <ref>). It is straightforward to generalize this result to any case where a Lieb-Robinson bound (<ref>) holds (but with an additional surface area term due to time integration).
By Duhamel's identity,
^(_𝖡 + _𝖢 + _𝖡 : 𝖢)s A - ^_𝖡 s A = ∫_0^t ds ^(_𝖡 + _𝖢 + _𝖡 : 𝖢)(t-s)_𝖡 : 𝖢^_𝖡 sA
≤∑_ℓ = 0^∞(2|t|)^ℓ/ℓ!∑_self-avoiding paths Γ: 𝖠→𝖢
Γ = ℓ∏_j=1^ℓ‖ H_Γ_j‖.
The last inequality is the observation that any path from set 𝖠 to set 𝖢 must contain a term in 𝖡:𝖢. The conversion from factorial form to exponential form is analogous to Theorem <ref>.
§.§.§ Classical simulation with controlled error
By approximating A(t) by an operator with strictly local support, we can efficiently simulate the expectation of local observables at short times.
Consider a d-dimensional lattice and local operators A, B with A=1, B=1 acting on small set R with R= O(1). Consider the correlation function ⟨ A(t)B⟩_ρ_0:=tr[ρ_0A(t)B] and suppose the marginals _ S^c[ ρ_0] can be obtained at cost ^O( S).
Then, for any ϵ>0, there exists a classical algorithm that outputs the local expectation ⟨ A(t) B⟩_ρ_0 up to error ϵ with
(classical memory and runtime)≤exp( O(vt+1/μlogc/ϵμ v)^d).
By Proposition <ref>, the Heisenberg evolution A(t) can be approximated by a strictly local Ã(t), that is evolved by the true dynamics restricted to the set of vertices S within distance L:
|⟨ A(t)B⟩_ρ_0-⟨Ã(t)B⟩_ρ_0|≤A(t)-Ã(t)B≤c/μ ve^μ (vt-L).
Error ϵ is guaranteed by choosing L to be sufficiently large:[A better error dependence is possible by using a stronger Lieb-Robinson bound with factorial decay.]
L=vt+1/μlogc/ϵμ v.
The expectation _ S[ρ_ SÃ(t)B] can be evaluated by standard linear-algebra manipulation (exact diagonalization and matrix multiplication) at cost (2^(L^D)), which is the advertised result.
§.§ Quantum algorithms for Hamiltonian simulation
Now, suppose we want to simulate the expectation [ρ O(t)] on a quantum computer, given some initial state ρ for a longer time t. The task boils down to Hamiltonian simulation <cit.>, that is, to approximate the true unitary evolution by a product of simple unitaries
U = ^- H t≈ V = g_1⋯ g_G.
A Hamiltonian simulation algorithm must achieve the desired accuracy with minimal cost. For simplicity, one may quantify the accuracy by the spectral norm of the difference
U-V≤ϵ
which guarantees accurate simulation of any input state with any observable
[ O (Uρ U^† - Vρ V^†) ] ≤ 2 ϵO. The cost is often calculated in terms of the number of gates. Such Hamiltonian simulation algorithms have numerous applications in quantum chemistry <cit.> and materials science <cit.>.
In this review, we focus on how accurate simulations can be when H itself is a spatially local Hamiltonian, as we can then apply a Lieb-Robinson bound to try and prove that the simulation can be done efficiently. Just as in the classical setting, it makes sense that evolution generated by a spatially local Hamiltonian should be approximated efficiently by only local gates within the Lieb-Robinson light cone. The technical question is how to patch local evolution together to approximate continuous time dynamics well. After all, in a local circuit, there is an exact light cone: information cannot be sent farther than the depth of the circuit (see Section <ref>).
A first attempt by <cit.> is to cut the systems into non-interacting pieces, and then put the interaction back via the interaction picture, which we briefly review:
Suppose the Hamiltonian consists of two terms H = H_0+ V. Then,
^ H t = ^∫^t_0 V(s) ds·^ H_0 t where V(s) := ^ H_0 s V ^- H_0 s.
Here 𝒯 denotes the time-ordered exponential.
Now, suppose our system is a spatially local Hamiltonian. We may take V to be the interaction H_ B: C between two regions B, C and H_0 to be H_ B+H_ C. Then, we expect the unitary ^∫^t_0 V(s) ds to be a quasi-local (by Proposition <ref>). One may iterate the above to cut the system into quasi-local patches, giving a quantum algorithm for simulation of spatially local Hamiltonian. The main issue with this approach is implementing the interaction picture, since the time-ordered integrals will be only quasi-local, and therefore expensive to simulate by brute force (such as directly using the Solovay-Kitaev algorithm <cit.>, whose costs generally scale with the Hilbert space dimension).
The more recent HHKL algorithm <cit.> currently serves as the state-of-the-art method for quantum simulation of spatially local Hamiltonian dynamics. Its core idea is to split the unitary evolution using back-and-forth local evolutions that circumvent the explicit interaction picture, achieved via the following lemma:
[Patching local evolution operators without the interaction picture]
For a local Hamiltonian supported on disjoint sets A, B , C, with 𝖽(𝖠,𝖡) = 𝖽(𝖢,𝖡) =1 but 𝖽(𝖠,𝖢)>1, and for constant time t = O(1), there is a constant μ >0 such that
^ H_ A B C t - ^ H_ A B t^- H_ B t^ H_ B C t≤( ^-μ𝖽(𝖠,𝖢)H_ A: BSupp(H_ A: B))
where H_ A B:= ℙ_ A BH and H_ A: B := H_ A B - H_ A - H_B are defined in (<ref>) and (<ref>), and Supp(H_𝖠:𝖡) is the set on which H_𝖠:𝖡) acts non-trivially.
Indeed, if the Hamiltonian is commuting, the equality holds; in the non-commuting case, the error is exponentially small in the distance between region 𝖠 and 𝖢. The terms H_ A: B and Supp(H_ A: B) scale only with the surface area and merely contribute a polylogarithmic overhead for algorithmic cost.
We begin with an elementary identity
^ H_ A B C t - ^ H_ A B t^- H_ B t^ H_ B C t = (^ H_ A B C t^- H_ B C t -^ H_ A B t^- H_ B t) ·^ H_ B C t.
The first term can be expanded in the interaction picture by isolating the terms cutting 𝖠 and 𝖡:
^ H_ A B C t^- H_ B C t = V ^ H_ A t^ H_ B C t·^- H_ B C t = V ^ H_ A t
^ H_ A B t^- H_ B t = V' ^ H_ A t
where
V :=exp( ∫_0^t d s^ (H_ A+H_ B C) sH_ A: B^- (H_ A+H_ B C) s)
V' := exp(∫_0^t d s^ (H_ A+H_ B) sH_ A: B^- (H_ A+H_ B) s).
Therefore,
^ H_ A B C t - ^ H_ A B t^- H_ B t^ H_ B C t ≤ V - V'
≤∫_0^t ds ^ (H_ A+H_ B C) sH_ A: B^- (H_ A+H_ B C) s - ^ (H_ A+H_ B) sH_ A: B^-( H_ A+H_ B) s
≤O( ^-μ𝖽(𝖠,𝖢)H_ A: BSupp(H_ A: B)).
The second inequality applies a telescoping sum over the time-ordered exponential. The second inequality uses Proposition <ref> and integrates over constant time t=O(1). This is the advertised result.
Recursively using the above gives the HHKL algorithm for d-dimensional lattices (Figure <ref>).
[The HHKL algorithm <cit.>]
A spatially local Hamiltonian on a L×⋯ L = L^d lattice in d spatial dimensions can be simulated for time t up to ϵ error in spectral norm using
gate complexity O(t L^d polylog(tL^d/ϵ)) and depth O(T polylog(tL^d/ϵ)).
The gate complexity is essentially (up to the polylogarithmic corrections) the space-time volume of the evolution, coinciding with our physical intuition. A matching lower bound (up to polylogarithmic factors) is known by constructing a family of time-dependent circuits <cit.>.
§ BOUNDS ON ENTANGLEMENT DYNAMICS AND CORRELATIONS
Now, we use Lieb-Robinson bounds on commutators of local operators to derive (in many cases) optimal bounds on the speed with which various information-theoretic tasks (such as entanglement generation or quantum correlation/entanglement generation) can be performed.
§.§ Information signaling and quantum state transfer
We start from perhaps the most directly relatable task: transmitting a qubit of quantum information across some distance in a many-body system. A particularly explicit example is to perform state transfer during a single logical qubit initially stored on site i is stored on site f after the protocol: see (<ref>) below. The following proposition shows that a quantum state can be transferred no faster than the Lieb-Robinson velocity v.
Consider the initial state and final state of the form
|Ψ_i(α,β)⟩ := ( α|0⟩_i + β|1⟩_i ) ⊗|ψ_-i⟩ ,
|Ψ_f(α,β)⟩ := |ψ_-f⟩⊗( α|0⟩_f + β|1⟩_f ),
where |ψ_-i⟩ and |ψ_-f⟩ are both arbitrary states on all qubits except i and f, respectively, and α^2+β^2 = 1. Then, for any unitary U,
U|Ψ_i(α,β)⟩ = |Ψ_f(α,β)⟩ implies ‖ U^† X_f U Z_i‖ = 2 .
Applying the commutator (<ref>) to the initial state (<ref>) involves two parts:
U^† X_f U Z_i |Ψ_i(α,β)⟩ = U^† X_f U |Ψ_i(α,-β)⟩ = U^† X_f |Ψ_f(α,-β)⟩ = U^†|Ψ_f(-β,α)⟩ = |Ψ_i(-β,α)⟩
Z_i U^† X_f U |Ψ_i(α,β)⟩ = Z_i U^† X_f |Ψ_f(α,β)⟩ = Z_i U^†|Ψ_f(β,α)⟩ = Z_i |Ψ_i(β,α)⟩ = -|Ψ_i(-β,α)⟩ ,
and subtracting the second line from the first gives the commutator
U^† X_f U Z_i |Ψ_i(α,β)⟩ = 2 |Ψ_i(-β,α)⟩
which implies that U^† X_f U Z_i ≥ 2. On the other hand,
U^† X_f U Z_i≤ 2 U^† X_f U Z_i = 2,
which follows from
AB=AB-BA≤AB+BA≤ 2 AB .
The upper and lower bounds on U^† X_f U Z_i imply (<ref>).
This relates directly to Lieb-Robinson bounds since if the protocol U came from continuous time evolution with some local time-dependent Hamiltonian H(t), for time t≲ r/v with r the distance between i and f, then a Lieb-Robinson bound will forbid (<ref>) from being true.
By transmitting a qubit, an agent at i can send a bit of classical message to an agent at f. Thus, sending quantum information is no faster than sending classical information. On the other hand, one may wonder if sending classical information could be strictly faster, by some protocol that encodes the classical bit into a quantum state in some more complicated way and then sends it via quantum dynamics. The answer is no since classical information also propagates no faster than the Lieb-Robinson velocity. This is summarized by:
[Information signaling bounded by Lieb-Robinson (informal version) <cit.>]
Suppose the Lieb-Robinson bound (<ref>) holds. Then information (both quantum and classical) travels at a speed upper bounded by the Lieb-Robinson velocity v.
Ref. <cit.> uses the Holevo capacity to quantify the classical information, which is beyond the scope of this review. Here we give an intuitive argument on why Theorem <ref> should hold, generalizing the idea of Proposition <ref>.
Consider Alice and Bob sitting at space-time points (x_i,0) and (x_f,t) respectively. The system starts in the state ρ_0 at time 0 when Alice accesses the system locally at site i. It then undergoes local dynamics via unitary U until time t, when Bob tries to receive the information at site f. All correlations Bob can measure are captured by the reduced density matrix ρ_f at site f:
ρ_f = _{ f}^c[ Uρ_0 U^†].
If ρ_f does not depend much on what Alice did at (x_i,0), then Bob effectively cannot retrieve information. For example, suppose Alice has a bit of classical information 0 or 1 at time 0, and she either does nothing to the system if the bit is 0, or flips the spin (applies unitary X_i at time 0) if the bit is 1. Then the final state at t is either Uρ_0 U^† or UX_iρ_0 X_i U^† based on the classical bit of Alice. Although these two states may be drastically different globally, they are indistinguishable locally for Bob at f if this site is far from i. Indeed, for any operator B_f on f, its expectation value differs between the two states by an amount
[B_fUρ_0 U^† - UX_iρ_0 X_i U^†] = [ρ_0B_f(t)-X_i B_f(t) X_i] ≤B_f(t)X_i.
Thus if r≳ vt, the right hand side is vanishingly small for any B_f, meaning that the two states are “close to each other locally" and Bob cannot distinguish them. In other words, in order to communicate information, the local “perturbation” by Alice's gate X_i should be able to reach Bob at time t. The Lieb-Robinson bound tells us how quickly that can happen.
§.§ Entanglement dynamics
Consider a system made out of two subsystems 𝖠 and B with Hilbert space ℋ=ℋ_ A⊗ℋ_ B. For any unitary U acting on ℋ, one can ask how much it can grow local operators in one subsystem to the other. According to previous sections, one way to quantify this is to study _ B A, where A is some operator supported in A, and is the evolution superoperator
A := U A U^†.
Note that our choice is different than Heisenberg evolution U^† A U for later convenience. In this section, we ask how much entanglement U generates between the two parties A and B, and connect this to a Lieb-Robinson bound.
First, to quantify entanglement, consider the Rényi entropy for any pure state |ψ⟩∈ℋ and any 0 ≤α≤ +∞
S_α(|ψ⟩) := 1/1-αlnρ_ A^α where ρ_ A=_ B |ψ⟩⟨ψ|.
In particular, we recover the von Neumann entropy at α→ 1
S_1(|ψ⟩) := -(ρ_ Alnρ_ A).
The entropy S_α(|ψ⟩) is decreasing function of α such that
α_1 ≤α_2 implies S_α_1(|ψ⟩) ≥ S_α_2(|ψ⟩).
In the following proposition, we show that the speed of generating the second Rényi entropy S_2 is bounded by operator growth.
Consider a unitary U_ A B acting systems A B and an operator A in the form
A = |ψ_ A⟩⟨ψ_ A|⊗ I_𝖡.
Then, we have
_ B_ A B A ≥ 1-^-S_2(|ψ_f⟩)/2 where |ψ_f⟩ := U_ A B|ψ_ A⟩⊗|ψ_ B⟩
for arbitrary |ψ_ B⟩.
As a result, U_ AB cannot generate O(1) entanglement measured by the second Rényi entropy starting from any product state |ψ⟩ = |ψ_A⟩⊗|ψ_B⟩, unless there is a local operator A that grows sufficiently to the other party by U_ AB: _ B_ AB A=O(1). Operator growth bounds then bound the generation of all Rényi entropies S_α with α≥ 2, according to (<ref>). The bound (<ref>) is loose in the situation where U_ AB is the SWAP operation between A and B: No entanglement is generated although operators are moved around. In
this case, one can bound _ A_ B_ A B A instead, which we leave as an exercise. Namely, in order to generate entanglement, a local operator needs to become nonlocal instead of just swapping to the other subsystem.
For any bipartite system A, B with dimensions D_ A,D_ B, consider the Schmidt decomposition of the final state |ψ_f⟩
|ψ_f⟩ = ∑_j=1^min(D_ A,D_ B)√(p_j) |j⟩_ A⊗ |j⟩_ B where ∑^min(D_ A,D_ B)_j=1 p_j =1
for some orthonormal basis {|j⟩}_ A, {|j⟩}_ B of A and B. In this basis, we expand the evolved operator as
_ AB A = _ B_ AB A + ∑_ i,j=1 ^D_ A T_ij|i⟩⟨j|_⊗ I_ B where T_ij = 1/D_ B⟨i|_ A_ (_ AB A) |j⟩_ A.
Then, rearrange and take the operator norm to obtain
_ B_ AB A≥⟨ψ_f | _ B_ AB A |ψ_f⟩≥ 1 - ∑_j=1^D_ A p_j T_jj≥ 1 - √(∑_j=1^D_ A p_j^2)√(∑_j=1^D_ AT_jj^2)≥ 1-^-S_2(|ψ_f⟩)/2.
The second inequality uses _ AB A |ψ_f⟩ = |ψ_f⟩. The third is Cauchy-Schwartz. The last inequality uses the definition of second Rényi entropy (<ref>) and that
∑_j=1^D_ AT_jj^2 ≤∑_ i,j=1 ^D_ AT_ij^2 ≤ D_ A∑_ i,j=1 ^D_ A T_ij|i⟩⟨j|_⊗ I_ B_F^2 ≤ D_ A_ AB A_ F^2=D_ A A_ F^2 = 1,
which concludes the proof.
§.§.§ von Neumann entanglement outside the Lieb-Robinson light cone
There are two other potential directions to improve Proposition <ref>. Are α<2 Rényi entropies also bounded by operator growth? Do tighter measures of operator growth, like Frobenius norm _ B_ AB A_ F, also bound entanglement generation? We give partial negative answers to these questions using explicit counterexamples.
[Generating large von Neumann entanglement with little operator growth]
Consider two systems A, B with dimension A= B=D and local basis {|j⟩}^D-1_0. Consider the unitary U_ AB=U_2⊕ I_D^2-2, where the nontrivial part U_2 is a 2× 2 matrix
U_2 = ([ √(1-ϵ) -√(ϵ); √(ϵ) √(1-ϵ) ]) acting on |00⟩, |diag⟩.
We require that 0<ϵ<1 and define the “diagonal” state to be
|diag⟩ = 1/√(D-1)∑_j=1^D-1 |jj⟩.
Then, at large D ≫ 1 and at a constantly small ϵ >0, the unitary U_ AB generates arbitary large von Neumann entropy
S_1(U_ AB|00⟩)=Ω(ϵln D)
yet for any local operator A,
_ B_ AB A≤AO(√(ϵ)).
Simply put, the diagonal state |diag⟩ has lots of von Neumann entanglement despite being one-dimensional.
To prove (<ref>), observe that U_ AB is close to identity I: U_ AB-I≤O(√(ϵ)). Therefore,
_ B_ AB A = _ B (U_ AB AU_ AB^†-A) ≤U_ AB A U_ AB^†- A
≤(U_ AB-I) A U_ AB^† + A (U_ AB^†-I)≤ A O(√(ϵ)).
But (<ref>) leads to
U_ AB|00⟩ = √(1-ϵ)|00⟩ + √(ϵ/D-1)∑_j=1^D-1 |jj⟩,
S_1(U_ AB|00⟩) = -(1-ϵ)ln(1-ϵ) + ϵlnD-1/ϵ=Ω(ϵln D)
which verifies (<ref>).
Given the above example, as well as Example <ref>, any improvement of Proposition <ref> should only involve S_α with 1<α≤ 2, and operator p-norms with p>2. Such a generalization seems to be an open problem. See also <cit.> for further remarks on discrepancies between operator growth and entanglement generation.
§.§.§ Entanglement generation bounds from interaction strength
In this section, we briefly discuss entanglement generation bounds independently of Lieb-Robinson bounds, as these are of great importance on their own. Suppose systems 𝖠 and 𝖡 have limited bipartite interaction. Can we bound the rate of bipartite entanglement growth? Here, the spatial locality is not the pronounced structure but rather the bipartition of the system.
More precisely, suppose we begin with a pure state |ψ⟩_𝖠𝖡, and we are free to operate any unitary operator on either set 𝖠 or 𝖡. The goal is to bound the growth rate of entanglement entropy given bipartite interactions H_𝖠𝖡. The answer to this question is thoroughly addressed in a series of works <cit.>; here, we provide an elementary argument and state the sharpest result. A technical difficulty is that the sets and can have arbitrarily large dimensions and arbitrary entanglement structure; a resource theoretical approach appears natural for addressing this.
Any 2-qubit Hamiltonian evolution ^ H can be implemented using (H)- bits of bipartite entanglement entropy.
Further, since bipartite entanglement is non-increasing under local operations and classical communication (LOCC) (see Section <ref>), internal dynamics in and cannot increase the entanglement further:
[Limited interaction means limited entanglement]
Any 2-qubit Hamiltonian evolution ^ H_ij acting on a bipartite pure state |ψ⟩_ A B for i ∈𝖠, j∈𝖡 can at most generate (H_ij) bits of bipartite entanglement entropy between systems 𝖠,𝖡.
For any systems 𝖠,𝖡 and for all initial pure states, suppose the global Hamiltonian takes the form H_𝖺𝖻+ H_𝖠 +H_𝖡 where 𝖺⊂𝖠, 𝖻⊂𝖡. Then, the bipartite von Neumann entanglement rate is bounded
by
dS_1/dt≤ 8 H_𝖺𝖻log [min ((𝖠),(𝖡))].
See Section <ref> for an application to the entanglement rate in power-law interacting systems.
§.§ Connected correlation functions
Suppose we start from a “short-range correlated” state |ψ⟩ such as a product state on all qudits. How long does it take for two remote regions A and B to become correlated? Unlike Proposition <ref>, the correlation between the two parties A and B is not bounded by the commutator quantity C_ A B: operators in one party do not need to grow to the other in order to build up correlation. In fact, A and B can be maximally entangled (by sharing | A|=| B| pairs of Bell states) even if C_ A B=0! As one example, in a 1d spin chain with A={1} and B={2L}, consider a protocol that first locally prepares a Bell pair on sites {L,L+1} out of a product state, and then transfers the two qubits left and right to 1 and 2L respectively (using SWAP gates for example). In the final state, 1 and 2L share a Bell pair and are maximally entangled. However, a local operator A_1, after the Heisenberg evolution that is backward in time, only grows “halfway” to site L+1. Similarly, B_2L only extends to L.
In the above example, two regions of distance 2L can be correlated after time t≈ L/v. This suggests that the “correlation speed” is bounded by 2v instead of v. Indeed, this will be proven in Theorem <ref>. Prior to that, we need to first quantify a useful notion of correlation.
Define the connected correlation function for a state |ψ⟩
_ψ( A, B) := max_A, B≤ 1A B_ψ - A _ψB_ψ,
where A,B are Hermitian operators acting on systems A and B.
Then, the connected correlation satisfies
0≤_ψ( A, B) ≤ 1.
Indeed, if ψ is a product state between A and B in the sense that _( A∪ B)^c|ψ⟩⟨ψ| = ρ_ A⊗ρ̃_ B, then _ψ( A, B)=0; otherwise, if A and B are maximally correlated by a Bell state ψ, then _ψ( A, B)=1. More generally, _ψ( A, B) measures how correlated A and B are, including both classical and quantum-mechanical correlation.
The first inequality _ψ( A, B)≥ 0 is trivial by choosing A=B=0 and that the maximum must be larger. To prove _ψ( A, B) ≤ 1, it suffices to show
A B_ψ - A _ψB_ψ≤ 1
for any Hermitian operators A,B obeying A, B≤ 1. To see this, consider Hermitian operators
à = A - A _ψ, B̃ = B- B _ψ
Then, we get
A B_ψ - A _ψB_ψ^2 = ÃB̃_ψ^2 ≤Ã^2_ψB̃^2_ψ
= A^2_ψ-A_ψ^2B^2_ψ-B_ψ^2 ≤A^2_ψB^2_ψ≤ 1.
The first inequality is Cauchy-Schwatz ⟨ψ_2|ψ_1|⟩^2 ≤⟨ψ_2|ψ_2|⟩^2⟨ψ_1|ψ_1|⟩^2. This implies (<ref>), which concludes the proof.
[Bounds on correlation generation <cit.>]
Suppose the initial state |ψ⟩ has a finite correlation length ξ defined by
_ψ( A, B) ≤c̃∂ A+∂ B^-d( A, B)/ξ, ∀ A, B.
If the Lieb-Robinson bound (<ref>) holds with constant μ, v, then after time t, the final state |ψ_f⟩=U|ψ⟩ roughly has correlation length 2vt+ξ. More precisely, for any two subsets A, B with
𝖽( A, B)>2vt,
the connected correlation is exponentially suppressed
_ψ_f( A, B) ≤ (c+c̃) ∂ A+∂ Bexp-𝖽( A, B)-2vt/ξ+2μ^-1.
In the Heisenberg picture, correlation in the final state is equivalent to correlation of evolved operators in the initial state, namely
_ψ_f( A, B) = max_A, B≤ 1A B_ψ_f - A _ψ_fB_ψ_f = max_A, B≤ 1A(t) B(t)_ψ - A(t) _ψB(t)_ψ.
Define 𝖱( A,r)={i∈𝖵: 𝖽(i, A)≤ r} (and similarly for 𝖱( B,r)) with a tunable parameter r<d( A, B)/2. According to (<ref>) and Proposition <ref>, there exists an operator à supported in 𝖱( A,r) (and B̃ in 𝖱( B,r) such that
A(t)-Ã≤ c∂ A^-μ(r-vt), B(t)-B̃≤ c∂ B^-μ(r-vt).
Then, the correlation function in (<ref>) is
A(t) B(t)_ψ - A(t) _ψB(t)_ψ = A(t) [B(t)-B̃]_ψ - A(t) _ψB(t)-B̃_ψ
+ [A(t)-Ã]B̃_ψ - A(t)-Ã_ψB̃_ψ + ÃB̃_ψ - Ã_ψB̃_ψ
≤B(t)-B̃ + A(t)-ÃB̃ + _ψ(𝖱( A,r),𝖱( B,r))
≤ c ∂ A+∂ B^-μ(r-vt) + c̃∂ A+∂ B^-𝖽( A, B)-2r/ξ.
The third line uses (<ref>) and the fact that correlation is proportional to the norms of each operator, due to the linearity of Cor and Proposition <ref>. The last line uses
B̃= B(t)-ℙ_𝖱(𝖡,r)B(t)≤B(t)=1
together with (<ref>) and (<ref>). We choose r such that the two terms in (<ref>) are comparable:
r= 𝖽( A, B)+ξμ vt/2+ξμ∈vt, 1/2𝖽( A, B) ,
which implies that
μ· (r-vt) = 𝖽( A, B)-2r/ξ
using (<ref>). We plug r into (<ref>) and take maximum over 𝖠,𝖡 in (<ref>) to conclude the proof.
§.§ Measurement-enhanced protocols
Theorem <ref> bounds the total correlation generated between two faraway regions due to time evolution. This correlation can be either quantum or classical; indeed quantum correlation is also generated by the Bell pair preparation protocol discussed (Section <ref>).
The distinction between classical and quantum correlation becomes extremely important, however, when one considers quantum dynamics with local measurements and active feedback. Here, classical information can propagate through the “experimentalist” who performs projective measurements and applies local unitaries based on those measurements. Since the experimentalist may only be limited by Einstein's speed of light c→∞, we should effectively consider this communication of classical information to be instantaneous. Does this classical communication, combined with projective measurement, allow us to beat the Lieb-Robinson bound?
It may seem that the answer is obviously yes. For example, after a measurement done at site 1, one can immediately apply a gate to site L≫ 1 that depends on the previous measurement outcome. Moreover, a local measurement is able to collapse the global quantum state, and one can apply gates adaptively based on outcomes of arbitrarily faraway measurements.
However, the situation is exactly like the EPR paradox discussed in the Introduction. If no measurement outcomes are used for feedback, local measurements are just local completely positive trace-preserving (CPTP) maps that do not propagate information. As discussed in Theorem <ref>, Lieb-Robinson bounds also hold in open quantum systems <cit.>; one can interpret an open quantum system as one that is measured, while the measurement outcome is discarded and averaged over.
What if measurement outcomes are used to adjust the unitary dynamics adaptively? For concreteness, consider the task of teleporting a quantum state from one end (site 1) to the other (site N=L+1) in a 1d spin chain. First, one should avoid directly measuring site 1 because the state would collapse and destroy the quantum information. Instead, site 1 needs to interact with its neighbors before some measurement is done. Thus the task depends on what the initial state is on sites 2,⋯,N. If the sites 2 and N share a Bell pair, one can perform the following standard teleportation protocol <cit.> that takes O(1) operations.
[Standard teleportation protocol]
Suppose the initial state on the three relevant qubits 1,2,N is
|ψ⟩ = (α|0⟩ + β|1⟩)_1⊗1/√(2) (|00⟩+|11⟩)_2N
= 1/2 (|00⟩+|11⟩)_12⊗ (α|0⟩ + β|1⟩)_N + 1/2 (|01⟩+|10⟩)_12⊗ (α|1⟩ + β|0⟩)_N
+ 1/2 (|01⟩-|10⟩)_12⊗ (α|1⟩ - β|0⟩)_N + 1/2 (|00⟩-|11⟩)_12⊗ (α|0⟩ - β|1⟩)_N,
where we have expanded in the Bell-basis on 1 and 2. The first step of this protocol is to measure 1 and 2 in the Bell basis, so that the state collapses to one of the four terms above. This can be done by measuring the commuting operators X_1X_2 and Z_1Z_2. If the measurement outcome is 1/√(2) (|00⟩+|11⟩)_12, and this classical information is transferred to an agent Bob at N, then Bob knows the state is already the honest qubit Alice at site 1 wants to transfer. If Bob knows that the measurement outcome is 1/√(2) (|01⟩+|10⟩)_12 instead, he can use an X gate on N to “correct” the state because X(α|1⟩ + β|0⟩)_N = (α|0⟩ + β|1⟩)_N. This correctability holds for the other two outcomes as well, so based on the transferred classical information about the measurement outcome, the state is honestly transferred from 1 to N deterministically, after error correction has been applied.
A long-range Bell pair is consumed in the above process, which is itself hard to generate if the initial state is a product state. Starting from short-range entangled states and/or product states, it is then expected that teleportation requires large resources that scale with L.
As it turns out, however, such Bell pairs can be efficiently prepared using measurement-enhanced teleportation protocols that operate in constant time. This is, for example, behind the theory of measurement-based quantum computation <cit.>. Applying the identity gate on qubit on 1, in MBQC, amounts to teleporting qubit 1 to L by pure measurements. MBQC is, in its simplest avatar, based on the cluster state which can be prepared in constant depth. An easier version of this idea to understand is the
quantum repeater <cit.>, or entanglement-swapping teleportation
protocol (ESTP) <cit.>, which teleports a qubit to distance
L≈ (2M+1)T,
using T layers of unitary gates and M local measurements. Fig. <ref>(a) gives an example of L=15,T=5,M=2, where the spin chain is divided into M+1=3 parts, each of length roughly L/3. In the leftmost part, the quantum state |ψ⟩ is simply transported by SWAP gates. In each of the other parts, a Bell pair in the middle is generated and then transported to the two ends of the part by SWAP gates. Then a Bell-basis measurement is performed in each shaded area that connects adjacent parts, and all outcomes are collected to decide the error-correction unitary ℛ that recovers |ψ⟩ at the rightmost site. Conceptually, one can think of this as a cascade of standard teleportation protocols in Example <ref>, which first transfers |ψ⟩ from site A_1 to A_2 by measuring A_1,B_1, and then from site A_2 to the final site by measuring A_2,B_2.
One can use (<ref>) to make a tradeoff between unitary dynamics and measurements in a quantum teleportation protocol. Is (<ref>) the best one can achieve in all possible protocols with M measurements and unitary dynamics of time T? <cit.> gives a positive answer by extending Lieb-Robinson bounds to this setting of quantum dynamics with measurements. The idea comes from examining the ESTP in the operator language. Fig. <ref>(b) shows how the final logical operator X_N is evolved in the Heisenberg picture (backward in time). Since the protocol can be schematically written as 𝒲= U, which does measurements and applies an adaptive gate in the end, X_N is first evolved to ^†^† X_N =X_N Z_A_1Z_A_2 acting on the measurement sites A_1,A_2. Then these two “seeds” together with X_N, will grow into light cones due to the circuit dynamics U. In order to teleport the quantum information, the evolved operators 𝒲^† X_N 𝒲=U^†^†^† X_N U and 𝒲^† Z_N 𝒲 need to commute on all sites except 1. This turns out to require that the light cones not only need to touch site 1, but also need to overlap with their neighboring light cones, which makes (<ref>) optimal. This is formalized by the following Theorem.
[Speed limit in quantum dynamics with measurements (informal version)]
Consider a teleportation protocol that starts from a product state of all qubits, and teleports a qubit to distance L using measurements in M local regions and unitary dynamics of time T. The unitary dynamics is generated by a time-dependent Hamiltonian H(t) that may depend on previous measurement outcomes. The measurement regions are also allowed to be adaptive. If the pure unitary dynamics generated by H(t) has Lieb-Robinson velocity v, then there exist constants M_0,T_0 that do not depend on L,M,T, such that
L≤ v(2M+M_0)(T+T_0).
Although we refer to <cit.> for the detailed proof, we would like to mention one key idea called Stinespring dilation <cit.>. To be specific, any quantum channel, like the dynamics with measurement and feedback, is equivalent to a unitary channel on a “dilated” Hilbert space ℋ_dil=ℋ_phys⊗ℋ_ss. Here ℋ_phys is the physical Hilbert space, while ℋ_ss is composed of ancilla Stinespring qubits that record the measurement outcomes. This justifies our previous notations like 𝒲= U. The above Theorem then comes from applying the Lieb-Robinson methods to this dilated unitary dynamics. The theorem makes clear that not only the act of measurement, but also subsequent error correction, is required to beat a Lieb-Robinson bound; see also <cit.>.
Theorem <ref> also has various generalizations and applications <cit.>. To name a few, the initial state can be generalized to all states with short-range entanglement. If one wants to teleport Q≫ 1 qubits to distance L with Hamiltonian dynamics of time T, although M measurement regions satisfying (<ref>) suffice, the number of measurements done M' should scale with Q such that
L≲ 2vTM'/Q+1,
(with a technical caveat that measurement locations do not depend on measurement outcomes).
Beyond quantum state transfer, (<ref>) also bounds the resources needed for preparing long-range entangled states, including long-range Bell pairs, error correcting code states <cit.>, the GHZ state (<ref>), W state (<ref>), and spin-squeezed states <cit.>. This theorem also has strong implications on the ease with which many tasks, such as preparing highly entangled quantum states, can be achieved using hybrid protocols involving both unitary dynamics and measurement. This has been a subject of intense recent interest <cit.>.
§ GROUND STATES OF GAPPED SYSTEMS
So far, we have only applied the Lieb-Robinson bounds to dynamics. Remarkably, we will see that this temporal bound also implies spatial bounds for properties of gapped systems. Historically, analyzing the ground states of gapped systems using Lieb-Robinson bounds <cit.> was what popularized the Lieb-Robinson Theorem in the broader physics community.
This section assumes that the lattice Hamiltonian H is time-independent, with a Lieb-Robinson bound given by (<ref>).
Without loss of generality, we also assume the Hamiltonian is non-negative H≥ 0 with ground energy zero;
the ground subspace projector P_0 satisfies HP_0 = 0. As a crucial assumption, we impose the existence of a spectral gap Δ>0 above the ground states.
§.§ Exponential clustering of gapped ground states
We define the connected correlation for any ground state |ψ⟩ such that P_0|ψ⟩ = |ψ⟩ as follows
Cor_ψ( A,B) := max_A, B≤ 1 ⟨ AB ⟩_ψ - 1/2[⟨ AP_0B ⟩_ψ + ⟨ B P_0 A ⟩_ψ],
= max_A, B≤ 1 ∑_ϕ:E_ϕ≥Δ⟨ A |ϕ⟩⟨ϕ| B⟩_ψ + 1/2⟨ AP_0B ⟩_ψ -1/2⟨ B P_0 A ⟩_ψ,
where ·_ψ :=⟨ψ|·|ψ⟩, A,B are operators acting in subsystem A,B respectively. The second line exposes the excited states |ϕ⟩ with energy E_ϕ≥Δ. Technically, the above definition is not equivalent to (<ref>): They coincide if the ground state is unique P_0=|ψ⟩⟨ψ|. However, if the ground subspace is degenerate, a ground state may have long-range correlations, i.e., ( A,B) does not decay with the distance between A and B. For example, consider the Greenberger–Horne–Zeilinger (GHZ) state <cit.>
|ψ⟩=| GHZ⟩:=1/√(2)| 0⟩ + | 1⟩,
where | 0⟩ is the product state where all sites are in state 0 (analogously for | 1⟩). |ψ⟩ is a ground state of the Ising Hamiltonian H=∑_⟨ij|⟩Z_i Z_j, and is highly entangled. However, Cor_ψ( A,B) defined above vanishes as long as A and B do not overlap.
The following theorem generalizes the above example to arbitrary gapped ground states: the connected correlations Cor_ψ( A,B) decay exponentially in the distance.
[Exponential clustering of gapped ground states <cit.>]
Suppose the Lieb-Robinson bound (<ref>) holds for the Hamiltonian H with gap Δ, and ground state energy 0. Then, for any ground state |ψ⟩ and any ϵ∈ (0,1),
Cor_ψ( A, B) ≤(1+ √(2/πeϵ)cμ v/Δ) e^-(1-ϵ)μ𝖽( A,B).
To bound the connected correlations with Lieb-Robinson bounds, one begin with expanding the commutator in the eigenbasis of H
⟨ [A(t), B]⟩_ψ = ⟨ A(t) B⟩_ψ - ⟨ BA(t)⟩_ψ
= ⟨ AP_0B ⟩_ψ - ⟨ B P_0 A ⟩_ψ+ ∑_ϕ:E_ϕ≥Δe^-itE_ϕ⟨ A |ϕ⟩⟨ϕ| B⟩_ψ - e^itE_ϕ⟨ B|ϕ⟩⟨ϕ|A⟩_ψ.
The second line uses the assumption that the ground state has zero energy P_0A(t)P_0=P_0AP_0.
The insight that converts temporal bounds (Lieb-Robinson) to spatial bounds (decay of correlation) is spectral filtering <cit.>: consider a kernel function K(t) whose Fourier transform is denoted by
K̂(E) = ∫^∞_-∞ t K(t) ^- tE,
with normalization
K̂(0)=∫^∞_-∞dt K(t) = 1/2.
Then, we may approximate the connected correlation by the weighted time-integral of (<ref>)
Cor_ψ( A, B) = max_A, B≤ 1[ ⟨ B𝒦_-A⟩_ψ - ⟨ A 𝒦_+ B⟩_ψ + ∫^∞_-∞K(t)⟨ [A(t), B]⟩_ψdt]
with “error” operators
𝒦_+ :=∑_ϕ:E_ϕ≥Δ(K̂(E_ϕ)-1)|ϕ⟩⟨ϕ|,
𝒦_- :=∑_ϕ:E_ϕ≥ΔK̂(-E_ϕ)|ϕ⟩⟨ϕ|.
To proceed, we impose two requirements for the kernel K(t). (1) The Fourier transform approximates a step function:
K̂(E) ≈
1 if E≥Δ
0 if E≤ -Δ.
This ensures both error operators 𝒦_+ and 𝒦_- are small.
(2) The kernel K(t) decays sufficiently fast at large |t|, so that the last term in (<ref>) is tightly bounded.
Our choice is the Gaussian filter with tunable variance
K(t) =i/2πlim_ϵ^'→ 0+e^-α t^2/t+iϵ^'.
Indeed, it decays exponentially, and satisfies (<ref>). Furthermore, one can calculate its Fourier transform:
[Fourier transform of the error function]
If Erf(x):=2/√(π)∫^x_0dξ e^-ξ^2 is the error function,
K̂(E) = 1/2(1+Erf(E/2√(α)))= {
1+ O(e^-E^2/4α), (E>0),
O(e^-E^2/4α), (E<0).
.
Consequently, the norm of operators 𝒦_+ and 𝒦_- are both bounded by e^-Δ^2/4α/2. Together with (<ref>), we can bound the connected correlation
Cor_ψ( A,B) ≤e^-Δ^2/4α +ce^-μ𝖽( A,B)∫^∞_-∞|K(t)| (e^μ v|t| -1)dt
=e^-Δ^2/4α +cμ v/πe^-μ𝖽( A,B)∫^∞_0 e^μ vte^-α t^2dt ≤e^-Δ^2/4α +cμ v/πe^-μ𝖽( A,B)√(π/α)
= (1+ 2cμ v/√(π)Δ√(μ𝖽( A,B))) e^-μ𝖽( A,B)≤(1+ √(2/πeϵ)cμ v/Δ) e^-(1-ϵ)μ𝖽( A,B).
The second line's inequality uses the elementary bound e^x-1≤ xe^x for x≥ 0. The last line optimizes the tunable parameter
α = Δ^2/4μ𝖽( A,B)
and used the estimate √(2eϵ x)e^-x≤e^-(1-ϵ)x for x≥ 0 and ϵ>0. This is the advertised result.
§.§ Local properties of gapped systems
Theorem <ref> on exponential clustering implies that in a (unique) gapped ground state, a region A does not have much correlation with faraway vertices. Then A basically correlates with A^ c only via the vertices near the boundary ∂ A, so one naturally conjectures that the entanglement entropy of A is bounded by an area law
S_ A = O∂ A.
This area law is proven <cit.> for general 1D gapped systems originally by Hastings, using Lieb-Robinson techniques. With refinements <cit.> afterward, the result is summarized as follows.
[Area law of 1D gapped ground states <cit.>]
Consider a chain of q-dimensional qudits with a unique ground state that has a gap Δ. Then the entanglement entropy across any cut is bounded by Olog^3 q/Δ.
The gap condition is explicitly used in the proof, which we omit here.[Gapless states generically do not have area laws: e.g. a lattice regularization of a conformal field theory <cit.>.] On the other hand, any state in 1D satisfying the exponential clustering condition is proven to obey an area law <cit.>, so an area law for 1D gapped ground states directly follows Theorem <ref>, if one does not care about the scaling of the entanglement with the gap, etc. As an application, Theorem <ref> guarantees that 1D gapped ground states can be faithfully approximated by matrix product states (MPSs) with bound dimension sublinear in N <cit.>, in contrast to exp(N) for general states. Based on the MPS representation, efficient classical algorithms have been developed for calculating the ground state and its properties. For example, the heuristic algorithm called density matrix renormalization group (DMRG) had been widely used <cit.>; a closely related algorithm with provable guarantees was later proposed <cit.>.
In higher dimensions, the area law (<ref>) is an important open problem. We refer to the literature <cit.> on recent progress, for example, a proof for 2D frustration-free systems <cit.>. For general graphs, see <cit.> for a counterexample that violates (<ref>) explicitly.
Instead of assuming a gap for a single Hamiltonian H, one can consider a family of Hamiltonians {H(s):0≤ s≤ 1}
with the local terms in H(s) depending on s continuously. We assume the ground states have a gap lower bounded by Δ for the entire family of Hamiltonian H(s). This assumption is common in condensed matter settings, where one says that two H belong to the same phase of matter if and only if this interpolation exists. Intuitively, ground state properties of two Hamiltonians are qualitatively the same if they are in the same phase, so one can study solvable points in the phase space, and generalize results to the whole phase.
Remarkably, the above intuition can be made rigorous. As proven in <cit.>, the ground state subspace (defined by projectors P(0) and P(1)) of H(0) and H(1) are connected by a quasi-local unitary U
P(1) = U P(0) U^†.
Here U is quasi-local in the sense that it is generated by a finite-time evolution of some sufficiently local (time-dependent) Hamiltonian H̃ (where local terms decay exponentially with the support size). Local operators are mapped to local operators by U due to Lieb-Robinson bound, so the local properties of P(0) and P(1) are smoothly connected. Moreover, H̃ acts nontrivially only near places where H(s) changes with s. This implies that the ground states locally only depend on terms in H that lie in the neighborhood of that local region, dubbed “local perturbations perturb locally”. The quasi-local unitary U is called “quasi-adiabatic continuation (evolution)”, and has many other applications <cit.>, including a rigorous proof of quantization of Hall conductance <cit.>.
Above, we have seen the consequences of locality assuming the gap condition. Perhaps surprisingly, Lieb-Robinson bounds also play an important role in deciding whether a Hamiltonian is gapped or not (more precisely, how large the gap is), despite the fact that this spectral gap problem is undecidable in general <cit.>. In fact, the revisiting of such bounds originates from such a problem. In 1961, Lieb, Schultz, and Mattis (LSM) proved that a periodic chain of half-integer spins cannot have a Ω(1) gap above the ground state <cit.>. Hastings generalized this LSM theorem to higher dimensions using the quasi-adiabatic continuation method:
[Lieb-Schultz-Mattis theorem in higher dimensions <cit.>]
Consider a local Hamiltonian H on a finite-dimensional lattice. Suppose there is one direction of length L, along which H is translational invariant with periodic boundary conditions. Suppose the total number of vertices N= poly(L). Let H have a conserved charge Q and ground state |ψ⟩. If the ground state filling factor ⟨ψ|Q|ψ⟩/L is not an integer, then the gap between |ψ⟩ and the first excited state is bounded by
Δ = Olog L/L.
On the other hand, Lieb-Robinson techniques are also used to prove an Ω(1) gap for some H that is close to a gapped H_0. To be specific, consider H=H_0+V where V is an extensive sum of local terms each of order ϵ≪Δ. The naive perturbation theory typically diverges for this many-body setting, and the gap is not stable in general. For example, the gap closes already at ϵ∼ 1/N when perturbing the Ising Hamiltonian H_0=-∑_⟨ij|⟩Z_i Z_j by a magnetic field V=ϵ∑_i Z_i. It is then a remarkable fact that for frustration-free H_0 with local topological order, the gap is provably stable <cit.>.
§ BOUNDS ON THERMALIZATION
In this section, we return to bounds on dynamics. In particular, we will describe the extent to which Lieb-Robinson bounds can give meaningful constraints on the thermalization time scales <cit.> observed in local correlation functions. Results in this area are more limited, and overall this is an interesting area for further exploration; we will highlight what is known.
§.§ Relaxation times of local observables
Consider a quantum system in initial mixed state ρ evolved under Hamiltonian H. On physical grounds, we expect equilibration of local observable A after some time t_thermal such that
[ρ A(t_thermal)] ≈[ρ_thermal A].
Can we bound this thermalization time t_thermal based on Lieb-Robinson bounds? Assuming a Hamiltonian of the form (<ref>), we have
[ρ A(t)]-[ρ A(0)] ≤A(t)-A(0) = ∫^t_0 d s ^ sH [H, A]^- sH
≤ t[H,A]≤ tA∑_e∈𝖤:e∩𝖠≠∅H_e.
Allowing ρ to be locally perturbed away from equilibrium, so that | [ρ A] - [ρ_thermalA]| ∼A, we obtain
t_thermal≳∑_e∈𝖤:e∩𝖠≠∅H_e^-1.
This also holds for relaxation of time-ordered correlation functions [ρ A(t)B(0)], because one can insert the B(0) in the left-hand side of (<ref>), with the result unchanged assuming B=1.
As a simple generalization, suppose H=H_0+V where H_0 does not yield thermal dynamics. We bound thermalization by the local norm of V alone, which is useful when V is a weak perturbation <cit.>.
Consider a perturbed local Hamiltonian H=H_0+V on a d-dimensional lattice. If H_0 obeys the Lieb-Robinson bounds(<ref>), then
[ρ A(t)]-[ρ^t _0 A]≤ c_ thermalAV_ local |𝖠|tvt+c'_ thermal^D,
where _0:= [H_0,·], and
V_ local=max_j ∈𝖵∑_e∈𝖤: e∋ jV_e,
is the local norm of V. The quantities c_ thermal,c'_ thermal are O(1) constants determined by c,μ and the lattice geometry.
We use the Duhamel identity, similarly to (<ref>):
[ρ A(t)]-[ρ^t _0 A] ≤∫^t_0 d s ^ sH [V, ^(t-s) _0A]^- sH≤∫^t_0 d s [V, ^s _0A].
If ^s _0A is supported in a set 𝖲, then
[V, ^s _0A]≤AV_ local|𝖲|.
From (<ref>) and its relation to the support of an evolved operator in Proposition <ref>, we know that the dominant part Ã(s) of ^s _0A is supported in a set 𝖲 containing vertices no farther than vs+c'_ thermal to the original set 𝖠:
^s _0A = Ã(s)+ ∑_r=⌊ vs+c'_ thermal⌋+1Ã_r,
where Ã_r has support no farther than r to the original set 𝖠. Here the constant c'_ thermal is chosen such that [V, ∑_r Ã_r]≤∑_r [V, Ã_r] is smaller than the main contribution [V, Ã(s)], which is possible because the volume increases polynomially with r, while Ã_r decays exponentially. Then (<ref>) becomes
[ρ A(t)]-[ρ^t _0 A] ≤∫^t_0 d s 2[V, Ã(s)]≤∫^t_0 d s AV_ local |𝖠|c̃_ thermal (vs+c'_ thermal)^D
≤ c_ thermalAV_ local |𝖠|tvt+c'_ thermal^D.
Here we have used the fact that 𝖲 (support of Ã(s)) has the largest volume if 𝖠 is a set of faraway vertices, where each vertex grows to a ball of radius vs+c'_ thermal.
Proposition <ref> implies a bound t_ thermal≳V_ local^1/D+1 if the unperturbed dynamics [ρ^t _0 A] is far from the equilibrium of H. We do not expect this bound to be tight; in somewhat more specialized settings, stronger bounds (Corollary <ref>) can be found. In general, it is important to find stronger bounds on thermalization.
Up to now we only bounded the local thermalization process. If the initial state is inhomogeneous with respect to some conserved charge, thermalization is slower. Transport is, firstly, bounded by the Lieb-Robinson velocity v, so if the length scale of the initial inhomogeneity is L, we have
t_ global thermal≳ L/v.
In usual systems however, this is a serious underestimate of the thermalization time scale, even accessible via local correlation functions. If in particular there is a single conserved quantity (usually energy, e.g. whenever H is time-independent), then that quantity will relax diffusively to equilibrium, meaning that in practice t_ global thermal≳ L^2 <cit.> for finite-range interactions.
The bounds we have described thus far are rather “simple" in that we simply pointed out that thermalization of local correlation functions is constrained by operator growth! A difficult open is to prove bounds on the nature of decay more generally. For example, it seems reasonable that if one takes the thermodynamic limit of N→∞ interacting degrees of freedom, we might expect that for any local operator A,
sup_t≥ t_0lim_N→∞⟨ A(t)A(0)⟩≥ C e^-γ t_0
for some non-negative constants C and γ. This would rule out in particular that correlation functions can decay as e^-t^2. The physical intuition for this is that in typical many-body quantum systems, there are poles in the lower half of the complex plane in the Green's functions for operator A (see e.g. <cit.>). Any such pole would lead to at best a finite γ (with hydrodynamic poles leading to algebraic decay). However, a proof of the finiteness of γ (in the thermodynamic limit N→∞) and a constraint on γ in terms of local coupling constants remains an open problem, as far as we know.
§.§ Prethermalization
In some cases, we can achieve far stronger results than Proposition <ref>. To see how this is possible, we describe a classic example of a slowly thermalizing system: the Fermi-Hubbard model, with Hamiltonian H=H_0+V, where
H_0 = Δ∑_i∈𝖵 n_i,↑n_i,↓, V = ϵ∑_{ i,j}∈𝖤∑_σ=↑, ↓ c^†_j,σ c_i,σ.
Here c_i,σ is the annihilation operator for a fermion of spin σ∈{↑,↓} at site i∈𝖵. Consider the limit where ϵ→ 0 while Δ stays finite. In this limit, the ground state H=0 becomes highly degenerate: the states of finite energy (Δ,2Δ,…) correspond to those where two fermions of opposite spin sit on the same site. We call such an excitation a doublon, and a singly-occupied site a singleton.
Suppose that we create one doublon excitation in a sea of singletons: how long will it take to decay, if ϵ is very small (but not exactly 0)?
If ϵ≪Δ, Fermi's golden rule suggests we cannot simply split it into two singletons. Fermions hopping on a lattice have a bandwidth: their maximal kinetic energy is ∼ϵ≪Δ. There can therefore be no way, via Fermi's golden rule, to spontaneously decay into just two energetic singletons. We must instead look for a much higher order process, where the doublon splits and then virtually transfers its energy Δ into the increased kinetic energy of k_* ∼Δ/ϵ singletons. In perturbation theory, this will require at least k_* powers of the perturbation V, meaning that the doublon decay rate is expected to be <cit.>
1/t_doublon decay∼ϵ(ϵ/Δ)^ϵ/Δ.
An exponential bound t_doublon decay∼exp[Δ/ϵ] was rigorously proved in <cit.>. The proof uses the fact that H_0 is trivially diagonalizable, and extends to Floquet systems and to other settings where H_0 (or its Floquet generalization) is solvable <cit.>.
The intuitive argument we gave above seems to only rely on the existence of a gap in H_0. Thus one expects a general robustness result for all H_0 with a many-body gap. Indeed, there is a long history of the study of false vacuum decay <cit.>, wherein local correlation functions appear consistent with ground states of a degenerate H_0, even when the true Hamiltonian H=H_0+V consists of a perturbation that has closed the gap. One often takes, e.g., H_0 to have a ferromagnetic ground state, while V is a symmetry-breaking field that selects one of the degenerate vacua as the true ground state.
However, as we have already explained at the beginning of Section <ref>, any robustness of a false vacuum cannot arise from the local robustness of eigenstates of H. A notion of spatial locality and Lieb-Robinson bound will play an important role in any proof. The strongest known bound on prethermalization is:
[Prethermalization of gapped systems (slightly informal) <cit.>]
Let H_0 be a spatially local Hamiltonian in D spatial dimensions, with a gap Δ in the many-body spectrum. Let H=H_0+V, with ‖ V‖_local = ϵ, as defined in (<ref>). Then, there exists a quasilocal unitary U, a Hamiltonian H_* and an operator V_* such that
U^† (H_0+V)U= H_* + V_*
and for any single-site operator A
‖ U^† A U-A‖ = O(ϵ/Δ).
In particular, the Hamiltonian H_* is block diagonal between the eigenstates of H_0 above and below the gap. The operator satisfies
‖ V_*‖_local≤1/t_* where t_* ∼1/ϵexp[ c(Δ/ϵ)^a ]
for any a<1/(2D-1) and some 0<c<∞.
The unitary can be written as
U = 𝒯exp[∫_0^T dt Ĥ(t)]
for T=O(ϵ) and Ĥ(t) quasilocal in the sense that
∑_𝖲⊂𝖵‖Ĥ_𝖲(t) ‖e^diam(𝖲)^α = O(1) for any 0<α<1.
In other words, there exists some effective Hamiltonian H_* that effectively describes the dynamics of local correlation functions for times t≪ t_*. For example, if we start in one of the degenerate ground states of H_0, |0⟩,
| ⟨ 0| (U^† A U)(t) |0⟩ - ⟨ 0|A(t)|0⟩| ≤‖ U^† A U - A ‖≲ϵ,
meaning that
⟨ 0|A(t)|0⟩≈⟨ 0| U^†e^iH_*tAe^-iH_*tU|0⟩ + ‖ V_*‖_localt.
If A acts in a trivial way on the ground states, but non-trivially on typical low-energy states, then we see that up to error O(ϵ), ⟨ 0|A(t)|0⟩ will evolve very slowly away from its ground state value. For a non-perturbatively long time, it will appear from ⟨ A⟩ as if the system is in one of its ground states, even if the perturbation has added a finite energy density to the state! This proves, therefore, that false vacuum decay is non-perturbatively slow.
To formalize the intuition about a mismatch of energy scales between H_0 and V causing prethermalization, one needs to do perturbation theory in a rigorous way. A convenient technique, used in <cit.>, is the Schrieffer-Wolff transformation <cit.>. Note that this proof strategy is similar in spirit to the proof of the Kolmogorov-Arnold-Moser Theorem <cit.>.
Starting from the original H=H_0+V_1 with V_1=V, we first look for a quasi-local unitary U_1=^A_1 that block-diagonalizes the system among the gapped subspaces of H_0 at order ϵ^1. Note that we do not want a unitary that block-diagonalizes the system completely, as it cannot be quasilocal due to the orthogonality catastrophe <cit.>. More precisely, we look for anti-Hermitian A_1 = O(ϵ) obeying
^-A_1(H_0+V_1)^A_1 = H_0 + V_1 + [H_0, A_1] + O(ϵ^2).
We demand that for some D_2, block-diagonal betewen the high/low energy subspaces of H_0:
V_1 + [H_0, A_1] = D_2.
A_1 is not uniquely determined by (<ref>), but one solution suffices.
For commuting H_0 like (<ref>), A_1 and D_2 can be found easily in the eigenstate representation of H_0. For example, in (<ref>), H_0 has integer spectrum 0,Δ,2Δ,…, and one can choose <cit.>
D_2 =Δ/2π∫_0^2π/Δdt e^itH_0V_1e^-itH_0,
A_1 = -i∫_0^2π/Δdt 1-Δ t/2πe^itH_0V_1e^-itH_0.
By the evolution of H_0 in (<ref>), each local term of V_1 grows larger in support, but remains strictly local because H_0 is commuting.
For general H_0, a solution similar to (<ref>) still holds. One finds a filter function w(t) with compact Fourier transform <cit.>, which decays reasonably quickly as w(t) ∼e^-|t|/log^2 |t| at large |t|, and chooses <cit.>
D_2 ∼∫_-∞^∞dt w(t) e^itH_0V_1e^-iH_0.
The matrix elements ⟨ E| D_2 |E^'⟩ between eigenstates of H_0 are proportional to the Fourier transform of w(t): w(E-E^'); hence our filter function with compact Fourier transform enforces D_2 being block-diagonal across the gap.
However, terms in D_2 (and A_1) are no longer strictly local, and one needs to invoke a special Lieb-Robinson bound <cit.> to control how large they can become. With A_1 chosen to satisfy (<ref>), we have rotated the Hamiltonian by U_1 to H_0 + D_2+V_2, where V_2∼ϵ^2 is the last term in (<ref>). At this second step, we wish to further block-diagonalize the Hamiltonian, using a quasi-local unitary U_2=^A_2 that is determined similar to (<ref>). One again needs to invoke locality and Lieb-Robinson bounds to show that U_2 is still quasi-local. This process can be iterated up to some optimal order k_*∼ (Δ/ϵ)^a, where the range of operators has become so large that further Schrieffer-Wolff transformations do not decrease the local strength of V_k anymore. At this optimal order, (<ref>) is achieved with H_* = H_0+D_k_* and an exponentially small V_* = V_k_*.
Based on (<ref>), there is a hierarchy of how strongly t_* depends on ϵ. First, (<ref>) always holds trivially with U=I and t_*=1/ϵ, so the first nontrivial result would be t_*∼ϵ^-k_* for some finite k_*>1 using finite-order perturbation theory <cit.>. Usually Fermi's golden rule implies that t_*∼ϵ^-2.
In integrable models, one can define a decay time in an alternative fashion to (<ref>). While perturbing away from such integrability typically gives rise to t_*∼ϵ^-2 governed by Fermi golden rule <cit.>, there are exceptions with t_*∼ϵ^-2k for k>1 <cit.>.
There are even cases with infinite-time stability (t_*=∞), such as frustration-free ground states with local topological order <cit.>. The toric code <cit.> is the classic example of such a state. Intuitively, topological order guarantees a macroscopic code distance in the language of quantum error correction: any operator of size smaller than system length neither couples nor distinguishes different low-energy sectors that encode quantum information. Thus perturbation theory converges up to d_ code-th order, and the remaining V_* vanishes in the thermodynamic limit. In addition to preserving the gap, the energy splitting in the ground subspace is also then exponentially small, making such models robust quantum memories at zero temperature. Although we believe the frustration-free condition is a technical issue rather than being physical, Theorem <ref> is currently the best bound for frustrated systems.
On general grounds, one might have expected the prethermalization time to scale as
t_thermal∼exp[(Δ/ϵ)^d ]
in d spatial dimensions, since this is the energy barrier one needs to overcome to tunnel out of the false vacuum <cit.>. A rigorous proof of this result would likely require something beyond a Lieb-Robinson bound to control the validity of the Schrieffer-Wolff transformation, and this is an interesting open problem.
§ QUANTUM WALK BOUNDS AND THE FROBENIUS LIGHT CONE
So far, we have discussed a notion of light cone inspired by Lieb-Robinson bounds on operator norms of commutators, such as ‖ [A_0(t),B_r]‖ = C(r,t).
These bounds have been popular because they hold for all matrix elements of the commutator: therefore, if a Lieb-Robinson bound exists, it serves as a versatile subroutine whenever a notion of locality is needed.
However, there are many physical settings where one does not want a Lieb-Robinson-like bound, but rather something different. For example, suppose we wish to calculate a retarded Green's function in some finite temperature many-body system:
G^R_AB(r,t) := i/Z(β)tr( e^-β H [A_r(t),B_0]),
where Z(β) := tr(e^-β H) is the thermal partition function.
Especially if temperature T is very small (or inverse temperature β=1/T large compared to couplings in H), quite often G^R_AB will vanish outside of a light cone with an apparent temperature-dependent velocity. By definition, this temperature dependence cannot be captured by a Lieb-Robinson bound, as the single Lieb-Robinson bounds must accommodate all states.
Therefore, it is desirable to incorporate the initial state dependence into a Lieb-Robinsonb bound. For the most part, this is an open problem in mathematical physics, with preliminary progress just beginning. The simplest context where many rigorous results – which are notably stronger than optimal Lieb-Robinson bounds – appear is when studying the Frobenius norm of a commutator: (<ref>). This should not be a surprise: the Lieb-Robinson bounds must hold for all matrix elements of an operator, while the Frobenius norm simply bounds the average magnitude of a matrix element between any states in Hilbert space. What is more non-trivial is the qualitatively new methods for bounding the Frobenius norm, which can both be applied to physically relevant problems and give us new and helpful insight into the bottlenecks of the underlying quantum dynamics.
In this section, we will review this Frobenius light cone in our usual context: systems with local interactions on a lattice. In later sections, we will show that it is the Frobenius approach to bounding commutators that can have elegant generalizations to more challenging problems, including systems with power-law interactions (Section <ref>) or bosons (Section <ref>).
§.§ Quantum walk of a single particle on the line
We begin by revisiting the toy problem of Section <ref>; as before, we wish to bound C(r,t) = ⟨ r|e^-iHt|0⟩. This time, we will not try to think of this problem combinatorially. Instead, we observe that |C(r,t)|^2 represents the classical probability of measuring the particle on site r at time t. Our strategy – and more generally, the strategy of existing “quantum walk bounds" – will be to bound this probability distribution directly, using methods of classical probability theory, as an indirect way of saying something useful about the underlying quantum dynamics.
Before we explain how such a quantum walk bound could be found, let us emphasize why this shift in perspective should be quite useful. In the combinatorial approach that underlies the simplest Lieb-Robinson bounds, we found in (<ref>) that C(r,t) was bounded by a sum over all paths.
Somewhat annoyingly in this formula, C(0,t) > 1 once t>0. Now of course this is merely an artifact of us trying to express C(r,t) in some elegant way – physically |C(0,t)|^2≤ 1, as it is the probability of measuring the particle on site 0. Still, when we derived a bound on C(r,t) at time t, it depended on our bound at time t-Δt. The overcounting that we are doing is not innocuous – it is “corrupting" our bound for all later time, artificially inflating the values of all C(r,t). Might it be leading to an overestimate of the velocity of the “light cone" outside of which C(r,t) is exponentially small?
To understand whether this concern is justified, we seek a formalism in which (perhaps indirectly) we are assured that C(r,t) remains the coefficients of some normalized wave function. Yet this is somewhat awkward since it is |C(r,t)|^2 which represents the probabilities. The strategy which has been used so far is to solve this problem by not bounding C(r,t) directly, but rather by bounding the expectation values of operators on the Hilbert space. Suppose we define
F := ∑_r∈ℤ F_r |r⟩⟨ r|;
then
⟨ F(t)⟩ = ⟨ψ(t)|F|ψ(t)⟩ = ∑_r∈ℤ F_r |C(r,t)|^2.
Since F is diagonal in the position basis of interest, ⟨ F⟩ can be interpreted using classical probability theory as simply the average value of the random variable F_r. But now we can efficiently bound
d/dt⟨ F(t)⟩ = ⟨i[H,F]⟩.
While at this point there are a variety of strategies that one could use, two common ones are to seek functions F where it can be proved that for some constant c>0
|⟨i[H,F]⟩ |≤ c or |⟨i[H,F]⟩ |≤ c ⟨ F⟩.
In this section, we will focus on this latter possibility, which leads to tighter bounds – the strategies for dealing with the former are quite similar.
Observe that one choice[We might really wish to use b|r|, not br, in the exponent, but this choice will simplify a few equations and the approach's merits are more easily revealed.] satisfying (<ref>) is
F_r = e^br for constant b>0.
Indeed,
|⟨i [H,F]⟩| ≤|h∑_r(iψ̅_r ψ_r+1 - iψ̅_r+1ψ_r)(e^b(r+1) - e^br) |
≤ h(e^b/2-e^-b/2) ∑_r (|ψ_r|^2 e^br + |ψ_r+1|^2e^b(r+1))
= 4h sinhb/2∑_r |ψ_r|^2 e^br
= 4hsinhb/2⟨ F⟩.
The second inequality uses Cauchy-Schwartz (e.g.)
iψ̅_r ψ_r+1e^b(r+1) = iψ̅_r e^br/2ψ_r+1e^b(r+1)/2e^b/2≤e^b/2·1/2[ |iψ̅_r e^br/2|^2 + |ψ_r+1e^b(r+1)|^2 ].
Now, since F_r≥ 0 is a non-negative operator, and |ψ_r|^2 is a well-posed classical probability distribution, we can invoke Markov's inequality:
ℙ[particle is at x≥ x_0 at time t] = ∑_r=x_0^∞ |ψ_r(t)|^2 ≤⟨ F(t)⟩/F_x_0.
Here and below ℙ[⋯] is used to denote the probability of an event arising, and we use this notation (rather than the expected value of a quantum observable) to highlight the close mathematical connections to probability theory. Combining (<ref>), (<ref>), and (<ref>), we can now choose the optimal value for the parameter b to get the tightest possible bound on the velocity of the particle:
ℙ[particle is at x≥ x_0 at time t]
≤exp[-bx_0(1-4ht/x_0sinh (b/2)/b) ].
Since sinh(b)/b ≥ 1, we conclude that we should take b→ 0 to get the strongest possible light cone bound. Our bound is exponentially small when 2ht ≤ x_0, implying that the velocity of the particle is
v ≤ 2h.
This is tighter than what we could find using our Lieb-Robinson combinatorics in (<ref>). This velocity admits a natural physical interpretation: it is the largest possible group velocity of a particle in the system: see (<ref>).
We call this approach the “quantum walk" approach to bounding dynamics since we aim to use (as much as possible) the unitarity of the quantum dynamics to constrain the quantum walk of the wave function. In the many-body setting, this problem can of course become much more complicated, but we will describe a few examples (F ansatzes) where this method has been used to tightly bound quantum dynamics. This approach has also been employed in the literature on continuous-space Lieb-Robinson bounds (Section <ref>).
§.§ Operator growth and operator size
We now turn to the many-body problem. As explained in Section <ref>, a critical difference between our single-particle warm-up and the many-body problem is operator dynamics appear more natural than state dynamics. Indeed, we have already seen that local operators evolve “slowly" (at least for short times) under local Hamiltonian dynamics. This was the key insight behind our derivation of a Lieb-Robinson bound in Section <ref>. And in recent years, capturing the growth of local operators – beyond the Lieb-Robinson bound – has become a question of particular interest among physicists. There are a few (related) reasons why. Firstly, the Lieb-Robinson bounds capture the “worst case" speed of information, but it may be the case that in typical states signals propagate much more slowly. We will see that this is strikingly the case in systems with power-law interactions in Section <ref>. Secondly, the growth of operators has been conjectured to be related to the emergence of geometry and gravity via the AdS/CFT correspondence in string theory: we will discuss such theories in Section <ref>. Thirdly, typical experiments probe thermal correlation functions and so often times we are only interested in the behavior of the commutator [A(t),B] averaged over (exponentially) many states.
If the Lieb-Robinson bounds are too specialized, we can try alternatively to study the opposite limit where we only ask about the typical behavior of a commutator. Indeed, suppose we want to know: how large should we expect [A(t),B] | φ^'⟩ to be for randomly chosen state |φ⟩? As usual in probability theory, it is easier to study the square of this object, where the averaging becomes simple: denoting C=[A(t),B] for simplicity, along with a finite-dimensional Hilbert space,
𝔼_φ[ C|φ⟩^2] = 𝔼_φtr( C^† C |φ⟩⟨φ|)=tr(C^† C)/tr(I).
Here we have used 𝔼_φ to denote expectation over the Haar measure[Concenptually we often take the “random" average over the Haar measure. However, one only needs a much weaker randomness 𝔼_φ|φ⟩⟨φ| = I/[I] for (<ref>).] . Note that the final object in (<ref>) is the Frobenius norm, introduced in (<ref>). Hence, the Frobenius norm of C will tell us about the size of typical matrix elements of C.
In a system with a many-body Hilbert space, there is a particularly valuable way to think about this Frobenius norm. Using the elementary properties in Section <ref>, we notice two key facts. Firstly, if we expand an operator into the |a_1⋯ a_N) basis, the coefficients (a_1⋯ a_N|A) can be thought of as the elements of an “operator wave function", which (by Proposition <ref>) will be normalized just as a usual quantum wave function. In particular, observe that
Let |A(t)) = e^ℒt|A) for some Hamiltonian = [· ,H]. Then
(A(t)|A(t)) = (A|A).
Take the time derivative
d/dt (A(t)|A(t)) = (A(t)|ℒ^† + ℒ|A(t)) = 0,
using ℒ^† = -ℒ, which follows from the cyclic trace identity.
Secondly, we will make heavy of the super-projector _A (Definition <ref>) instead of commutators; recall
[A,B]= [A,ℙ_𝖠B].
This statement holds irrespective of a Frobenius light cone, and indeed such notation was used in <cit.>. However, this notation of projection is particularly nice when working with the Frobenius inner product, as ℙ can be thought of as an explicit projection matrix! Therefore, we have the intuitive picture of the “light cone" for operator growth as associated with a small operator exploring the intersection of increasingly many ℙ_j hyperplanes for sites j: see Figure <ref>.
A crude way to capture how much an operator has grown (which has become an object of some study in its own right) is the operator size. Define the superoperator
𝒮|a_1⋯ a_N) = [∑_j=1^N 𝕀(a_j 0) ]|a_1⋯ a_N).
Thus, 𝒮 counts the number of sites on which a given Pauli string is not the identity. As a superoperator, size can act non-trivially on a complicated operator (just as not all wave functions are eigenstates of a general Hermitian operator). But we often care about the average size of an operator: (A|𝒮|A). The average size of an operator is, fortunately, related to the typical size of commutator matrix elements:
For a quantum system with N qubits,
(A|𝒮|A) = 1/8∑_j=1^N ∑_a=1^3 ([A,X_j^a]|[A,X_j^a]).
Hence, the average size of operator A measures the Frobenius norm of an average commutator of A with a single-site Pauli. While this proposition is for qubit degrees of freedom, for appropriate changes in constant factors it also holds for qudits. Notice the absence of spatial locality in the problem; often notions of operator size are most relevant in problems without a notion of spatial locality. We will discuss much more about operator size and why it was studied in Section <ref>.
§.§ Many-body quantum walk bounds
In this section, we describe a strategy to efficiently bound Frobenius light cones dubbed the “many-body quantum walk" in <cit.>. This technique is very similar to one which has been developed independently in the mathematics literature (see e.g. <cit.>), though the notation is rather different. The key idea is that since the Frobenius norm is simply the length of the “operator" in the “operator Hilbert space", we can follow our technique from Section <ref>.
In particular, suppose we want to bound ‖ [A_0(t),B_r]‖_F – this can only happen if the operator string |A(t)) contains terms that act non-trivially on site r.
Let ℙ_r:=ℙ_{r}. Then, the following inequality holds:
4(A_0(t)|ℙ_r|A_0(t)) ·B_r^2 ≥‖ [A_0(t),B_r]‖_F^2.
This follows from Hölder's inequality (Proposition <ref>):
‖ [A_0(t),B_r]‖_F = ‖ [_r A_0(t),B_r]‖_F≤ 2 B_r‖_r A_0(t) ‖_F,
which squares to (<ref>).
§.§.§ Frobenius bounds on general graphs
Now that we have related the Frobenius light cone to the expectation value of ℙ_r, it remains to bound (A_0(t)|ℙ_r|A_0(t)). This is very similar to what we did in Section <ref>, except that ℙ_r is not the projection onto a single state.
[Frobenius bound on a graph of bounded degree]
In the model studied in Example <ref>,
(A_0(t)|ℙ_v|A_0(t)) ≤e^v_Bt-𝖽(v,0)
where the butterfly velocity v_B, which characterizes the Frobenius light cone, is defined as
v_B=2h min_b>0b^-1[d+^-b+(d-1)^b].
We follow the strategy of Section <ref>. Define
ℱ = ∑_v∈𝖵e^b𝖽(v,0)ℙ_v.
Now consider the time derivative
d/dt (A|e^-ℒtℱe^ℒt|A) = -(A(t)| [ℒ,ℱ]|A(t)) = -∑_v∈𝖵e^b𝖽(v,0) (A(t)|[ℒ,ℙ_v]|A(t)).
The only terms that survive the commutator [ℒ,ℙ_v] are those where either ℒ annihilates the non-trivial operator on site v, or creates one:
[ℒ,ℙ_v] = (I-ℙ_v)ℒℙ_v - ℙ_vℒ(I-ℙ_v) = ∑_e∈∂ v [ℒ_e,ℙ_v].
So (<ref>) becomes
d/dt (A|e^-ℒtℱe^ℒt|A) =-∑_e={u,v}∈𝖤 (A(t)|[ℒ_e,e^b𝖽(v,0)ℙ_v+ e^b𝖽(u,0)ℙ_u]|A(t))
= ∑_e={u,v}∈𝖤e^b𝖽(v,0) (A(t)| (_v _e (1-_v) _u - _u (1-_v)_e _v)|A(t)) + (u↔ v)
Here in the second line, we have used (<ref>) where (I-ℙ_v)ℒ_eℙ_v, for example, gets an extra factor ℙ_u in front because otherwise ℒ_e just annihilates the identity operator.
If we define
a_v(t) := √((A(t)|ℙ_v|A(t))),
then observe that for e={ u,v}:
(A(t)| _v _e (1-_v) _u|A(t))≤ a_ua_v · 2‖ H_e‖≤(a_u^2+a_v^2) ·‖ H_e‖.
Then
d/dt (A|e^-ℒtℱe^ℒt|A) ≤ 2h ∑_e={u,v}∈𝖤^b 𝖽_u+^b 𝖽_v(a_u^2+a_v^2)
= 2h ∑_v∈𝖵 a_v^2 ∑_u:𝖽(u,v)=1^b 𝖽_u+^b 𝖽_v
≤ 2h ∑_v∈𝖵 a_v^2 ^b 𝖽_v (d+^-b+(d-1)^b)
= 2h(d+^-b+(d-1)^b) (A|e^-ℒtℱe^ℒt|A).
In the second line's inequality, we have assumed the worst case where v has only one neighbor u that is closer to the initial vertex 0; all other d-1 neighbors are farther. Exponentiating (<ref>) gives (<ref>).
§.§.§ One dimension
In one dimension, we can get much stronger bounds by thinking only about the right most site on which an operator acts. Let us define the projector
ℚ_r|{ a_i}) = 𝕀[a_j=0 if j>r, a_r 0 ] |{ a_i}).
Hence ℚ_r projects onto the rightmost site on which an operator acts (Figure <ref>). Observe that if we define for any operator |A(t)),
|ψ_r(t)|^2 = (A(t)|ℚ_r|A(t)),
then a simple modification of the proof of Theorem <ref>, upon defining
ℱ = ∑_r e^brℚ_r,
exactly reproduces the calculation in Section <ref>. In particular, we find that in one-dimensional models with nearest neighbor hopping (as in Example <ref>),
v_B≤ 4 max_e∈𝖤‖ H_e ‖.
This suggests that there may indeed be a qualitative difference between Frobenius and Lieb-Robinson light cones.
We don't know whether there is any one-dimensional model for which the Lieb-Robinson velocity 2eh ≥ v_LR>v_B. In fact, upon careful inspection, we can find the velocity 2eh in our Frobenius light cone bound! Suppose that r ≫ 4ht, and choose the value of b which minimizes (<ref>), where h should multiply by 2 for the many-body case. One finds that
(A(t)|ℚ_r|A(t)) ≲exp[ -2r logr/2eht].
The only difference between this bound and our earlier Lieb-Robinson bound in Example <ref> is the additional 2 in the exponential. This arises from the inner product in (A(t)|ℚ_r|A(t)) – the coefficient of t^r/r! is squared when evaluating the Frobenius light cone.
§.§ Entanglement and the Frobenius light cone
We have seen in Section <ref> that von Neumann entanglement generation could be large even when operator growth is small (outside the Lieb-Robinson light cone). One might, however, presume that the Frobenius light cone might be closely related to the second Rényi entropy (<ref>), due to the fact that
(ρ|ℙ_𝖠|ρ) = e^-S_2(𝖠).
Indeed, <cit.> discuss how entanglement generation generally appears slower than operator growth; this is also the case in random circuit models (Section <ref>). However, the following counterexample shows that operator growth may not always precede entanglement generation.
[Generating a maximally entangled state with little Frobenius operator growth]
Consider the same setting as Example <ref> with
ϵ=1-1/D. Then,
U|00⟩ = 1/√(D)∑_j=0^D-1 |jj⟩,
is maximally entangled. Yet for any local operator A, its evolution A=U A U^† satisfies
_ B A _ F≤ A _ FO(D^-1).
Although this is a somewhat tedious calculation, we produce it in full since it has not appeared in the literature before (to our knowledge).
Since (<ref>) comes from the direct calculation, we focus on proving (<ref>). Because (1-_ B) is much easier to compute than _ B, we use the equivalence between (<ref>) and
(1-_ B) A _ F≥ A _ F [1-O(D^-1)].
Let {T_J}_J=0^D^2-1 be a normalized operator basis of A, so that the superoperator (1-_ B) can be represented as a matrix _J_1 J:
(1-_ B) T_J_1 = ∑_J_J_1J T_J.
(<ref>) is then further equivalent to the statement that the eigenvalues of are all of the form 1-O(D^-1).
We choose T_J to be the matrix-element operators |j⟩⟨ j'|, and denote each J by a pair (j,j'). We prove that the matrix has the following structure: (1) if j≠ j',
_J,jj' = [1-O(D^-2)] 𝕀(J=jj').
(2) If j≠ 0,
_j_1 j'_1,jj = 𝕀(j_1=j_1^')[ [1-O(D^-1)] 𝕀(j_1=j) + O(D^-2)].
For now, assume these properties are true; we now show that eig=1-O(D^-1), and thus (<ref>). As a result of (<ref>), is diagonal outside the subspace (j,j):j=0,⋯,D-1, with the diagonal entries being 1-O(D^-2). Thus, it remains to verify whether the sub-matrix ^'_j_1j := _j_1j_1,jj has 1-O(D^-1) eigenvalues. According to (<ref>), the diagonals of ^'_j_1j are also 1-O(D^-1), while the off-diagonals are O(D^-2). Then any eigenvalue of '_j_1j is indeed 1-O(D^-1), from the Gershgorin circle theorem <cit.>.
Lastly, we verify (<ref>) and (<ref>) explicitly. U acts on states by (<ref>) and
U|jj⟩ = (I-| diag⟩⟨ diag|) |jj⟩ + -√(1-1/D)|00⟩ + √(1/D)| diag⟩⟨ diag | jj |⟩
= |jj⟩ + O(D^-1/2) |00⟩ + O(D^-1)∑_j'≠ 0|j'j'⟩,
for j≠ 0. Then the action on T_jj' (j≠ j') is
|j⟩⟨ j'|⊗∑_i|i⟩⟨ i| = |j⟩⟨ j'|⊗∑_i|i⟩⟨ i| + (𝒰-ℐ) [|jj⟩⟨j'j| + |jj'⟩⟨j'j'|]
= |j⟩⟨ j'|⊗∑_i|i⟩⟨ i| + [(U-I)|jj⟩⟨j'j| + |jj'⟩⟨j'j'|(U^† -I)],
where we have used ⟨j'j|U^† = ⟨j'j| for example in the second line.
When acting further with 1-ℙ_ B, the first term is unchanged, while only the O(D^-1) |jj⟩ term of (U-I)|jj⟩ survives (j' similarly), so the result is proportional to T_jj':
(1-ℙ_ B)|j⟩⟨ j'| = |j⟩⟨ j'| 1+ O(D^-1) 1/D_ B(|j⟩⟨j|) = |j⟩⟨ j'| 1+ O(D^-2).
Therefore (<ref>) holds. Similar arguments also show that the diagonal elements of the sub-matrix '_j_1j is 1- O (D^-1), so what remains is to prove its off-diagonals are O(D^-2). Similar to (<ref>),
T_jj = ⋯ + U |jj⟩⟨jj| U^† = ⋯ + α_j |jj⟩ + O(D^-1/2) ∑_i≠ j|ii⟩α_j ⟨jj| + O(D^-1/2) ∑_i≠ j⟨ii|,
where ⋯ only contributes to diagonals, and we have combined (<ref>) and (<ref>). After expanding the product and project by 1-ℙ_ B, the cross terms |ii⟩⟨i'i'| (i≠ i') are eliminated. Furthermore, |jj⟩⟨jj| only contributes to diagonals, so off-diagonals only come from O(D^-1)∑_i |ii⟩⟨ii|, which gain an extra O(D^-1) similar to (<ref>). Thus the off-diagonals are indeed O(D^-2).
§.§ Hamiltonians with random coefficients
In Section <ref>, we will encounter Hamiltonians with random coefficients, such as the Sachdev-Ye-Kitaev model. Applying the deterministic bounds for random Hamiltonian often yields unphysical results: in practice, operator growth is “incoherent”, but the Lieb-Robinson bounds use the triangle inequality throughout, which adds terms “coherently”. Capturing the effects of classical (external) randomness in the Hamiltonian in an operator growth bound has recently become possible. And, remarkably, it will turn out that these methods are often valuable even when there is no intrinsic randomness in the problem!
§.§.§ Matrix concentration bounds
We present an instructive example that captures the essential problems with Lieb-Robinson bounds when we are interested in typical state behavior <cit.>. Consider
H = Z_1 + ⋯ + Z_N,
where each Pauli Z_i is supported on qubit i. The “size” of this matrix depends on the question of interest. The spectral (infinity) norm gives the largest eigenvalue in magnitude:
Z_1 + ⋯ +Z_N = N.
The Frobenius norm gives the average magnitude of eigenvalues:
Z_1 + ⋯ + Z_NF = √(N).
In other words, the worst case is qualitatively different from the average case. In fact, in this problem, the eigenvalue distribution is equivalent to the probability distribution of a sum of independent random variables S_N:= x_1+⋯+x_N each drawn from the Rademacher distribution ℙ(x_i=1)=ℙ(x_i=-1)=1/2.
Now, we may call a concentration inequality to describe how rarely the random variable deviates from its expectation
ℙ( λ_i ≥ϵ) ≡ℙ( S_N ≥ϵ) ≤^-ϵ^2/2N.
Therefore, the typical magnitude of eigenvalues λ= O(√(N)) ≪ N is much smaller than the extreme eigenvalues.
This simple example illustrates that the “size” of high-dimensional objects could behave quite differently depending on the norm; this distinction could lead to drastically different implications (e.g., in power-law interacting systems in Section <ref>).
To derive concentration for more complicated matrix functions, we highlight a family of recursive inequalities for their Schatten p-norms, which proved extremely versatile.
Consider matrices A, B ∈(_i⊗_j) that satisfy the so-called non-commutative martingale condition
_i(B) = 0 and A= A_j⊗ I_i.
Then, for p ≥ 2,
‖ A + B‖_p^2≤‖ A ‖_p^2 + (p-1)‖ B‖_p^2.
Remarkably, the martingale condition is compatible with a wide range of matrices beyond independent sums. At the same time, uniform smoothness delivers sum-of-squares behavior (analogous to independent sums) that contrasts with the triangle inequality, which is linear
A+B≤A+B.
This difference underpins the essential distinction between the worst and typical cases.
For random Hamiltonians, the flavor of the problem changes slightly; we can think of adding independent Gaussian coefficients in our guiding example
H = g_1 Z_1 + ⋯ + g_N Z_N.
The Gaussian coefficient (i.e., external randomness) requires the following version of uniform smoothness regarding the expected p-norm A_p:= ([ A_p^p ] )^1/p that will allow us to control the spectral norm by setting p ≳log( H)∼ N.
Consider random matrices A, B of the same size that satisfy
[A|B] = 0. When 2 ≤ p,
A+B_p^2 ≤A_p^2 + (p-1)B_p^2 .
Compared with Proposition <ref>, the above contains both classical randomness (the expectation) and quantum randomness (the trace), which is especially suitable for matrices with random coefficients. Historically, uniform smoothness (both Proposition <ref> and Proposition <ref>) is a descendant of the scalar two-point inequality or Bonami's inequality <cit.>, which features in, e.g., Boolean analysis <cit.>. The matrix version was first derived <cit.> and later rewritten in the above form, leading to simple derivations of matrix concentration for martingales <cit.>. We expect these robust inequalities to find applications in numerous quantum information settings, by exploiting the tensor product structure of the Hilbert space or by the random coefficients: e.g. when studying power-law interacting systems in Section <ref>, Trotter error <cit.>, dynamics with random Hamiltonians in Section <ref>, or randomized quantum simulation <cit.>.
§.§.§ Bounds based on self-avoiding paths
Combining matrix concentration inequalities (Section <ref>) with the self-avoiding path (Section <ref>) yields operator growth bounds for random Hamiltonians in the Frobenius norm.
[Operator growth bounds for random time-independent Hamiltonian <cit.>]
Consider a random time-independent 2-local Hamiltonian where the terms H_e are independent for e∈𝖤, zero mean: [H_e] =0, and bounded almost surely: H_e≤ b_e.
Then, for any normalized operators A=B = 1 supported on subsets 𝖠 and 𝖡 respectively, the Frobenius norm of the commutator can be bounded by a weighted incoherent sum over self-avoiding paths of interactions Γ={Γ_ℓ,…,Γ_1}, as in (<ref>):
[ [A(t), B ] F^2 ]≤ 4∑_self-avoiding paths Γ ∫_t<t_ℓ<⋯ <t_1
ℓ = Γdt_ℓ⋯dt_1 ∏_1≤ k≤ℓ(e^β_k(t_k+1-t_k)8 b_Γ_k^2/β_k)
where β_k = β (Γ_ℓ,⋯,Γ_k) are tunable parameters that can depend on the path and t_ℓ+1:=t.
Compared with the deterministic bounds (Theorem <ref>), the expression above has interaction strengths appearing in squares b_X^2, entailing the incoherence across different terms. The tunable parameters β_k are slightly distracting, but a convenient choice often suffices. The above bound naturally extends to the case with p-norms which leads to sharper concentration (Section <ref>) and Brownian circuits where the randomness is both spatial and temporal <cit.>.
§ SYSTEMS WITH ALL-TO-ALL INTERACTIONS AND HOLOGRAPHIC QUANTUM GRAVITY
In this section, we will turn to the study of Hamiltonians that can include few-body interactions between a small number of the N total degrees of freedom at a time. In particular, we will often focus on k-local models of the form
H = ∑_j=1^k ∑_i_1<i_2<⋯ < i_k h^a_1⋯ a_k_i_1⋯ i_k(t) X_i_1^a_1⋯ X_i_k^a_k
that couple together N qubits. Here we assume that each h^a_1⋯ a_k_i_1⋯ i_k(t) = O(1). Such models are the extreme opposite of the spatially local models we have studied thus far, and their study will lead to the ultimate limits on what quantum systems can achieve using few-body interactions. There is hope that a future quantum computer might be able to implement such generic kinds of models (at the cost of many local qubits used for teleportation, as in Section <ref>), although one may also wish to use photons <cit.> or trapped ions <cit.> to realize non-local couplings. However (<ref>) is achieved, we come across interesting theoretical questions both in quantum information and, interestingly enough, in high energy physics. In this section, we will describe how Lieb-Robinson and Frobenius bounds can be generalized to such systems, despite the lack of spatial locality.
§.§ Fast state preparation
We first discuss preparing globally entanglement many-body states from product states. We consider the GHZ state | GHZ⟩ (<ref>) and the W state <cit.>
| W⟩ := 1/√(N)|10⋯ 0⟩ + |010⋯ 0⟩ + ⋯ + |0⋯ 01⟩,
as two examples. The fastest protocols, to our knowledge, are the following:
[A O(1)-time GHZ state preparation protocol]
The Hamiltonian
H = (I-Z_1) ∑_j=2^N (I-X_j),
prepares GHZ state in time t=π/4, starting from |+⟩_1⊗| 0⟩_2⋯ N where |+⟩=(|0⟩+|1⟩)/√(2).
Observe that
| GHZ⟩ = U_1N⋯ U_13U_12|+⟩_1⊗| 0⟩_2⋯ N,
where
U_1j = ^-π/4(I-Z_1)(I-X_j),
is the controlled-NOT (CNOT) gate on qubit 1 and j. Since all U_1js commute, they combine to U_1N⋯ U_13U_12=^-π H/4 with H given in (<ref>).
[A O(N^-1/2)-time W state preparation protocol <cit.>]
Consider Hamiltonian
H = X^-_1 ∑_j=2^N X^+_j + ( H.c.),
where X^± := (X± Y)/2.
Starting from |1⟩_1⊗| 0⟩_2⋯ N, we obtain the W state after time t=1/√(N-1)arccos(1/√(N)).
By direct calculation,
H|1⟩_1⊗| 0⟩_2⋯ N = |0⟩_1⊗∑_j=2^N X^+_j | 0⟩_2⋯ N = √(N-1)|0⟩_1⊗| W⟩_2⋯ N,
H|0⟩_1⊗| W⟩_2⋯ N = -|1⟩_1⊗∑_j=2^N X^-_j | W⟩_2⋯ N = -√(N-1)|1⟩_1⊗| 0⟩_2⋯ N.
Thus, H/√(N-1) acts as the Pauli Y matrix in |1⟩_1⊗| 0⟩_2⋯ N, |0⟩_1⊗| W⟩_2⋯ N. Since for a 2-level system
^-θ Y|0⟩ = cosθ|0⟩ + sinθ|1⟩,
we choose √(N-1)t = θ = arccos(1/√(N)) so that
^- t H|1⟩_1⊗| 0⟩_2⋯ N = 1/√(N)|1⟩_1⊗| 0⟩_2⋯ N + √(N-1/N)|0⟩_1⊗| W⟩_2⋯ N = |W⟩,
which indeed prepares the W-state.
See <cit.> for another GHZ protocol with O(1) time.
It is an open question whether the above protocols are asymptotically optimal in terms of the N scaling of time t. There is a separation between them and the best-known lower bound. For example, the operator growth bound on entanglement generation in Proposition <ref> yields t=Ω(1/N) for preparing GHZ. The following Proposition achieves a log N factor improvement by assuming a local qubit of information (instead of a single product state) is encoded in the N-qubit repetition code:
U α|0⟩ +β|1⟩_1 ⊗| 0⟩_2,⋯,N = α| 0⟩ + β| 1⟩,
Note that Example <ref> fulfills this condition.
For any H of the form (<ref>), if U=^- t H prepares GHZ in the sense of (<ref>), then
t=Ωlog N/N.
We prove for 2-local Hamiltonians. Similar to Proposition <ref>, we have
‖ U X_1 U^† Z_2‖ = 2,
because U X_1 U^† and Z_2 are logical operators for the repetition code. Note that (<ref>) holds for any Z_j, while only one Z_j≠ 1 is sufficient to yield our bound.
We want to utilize Theorem <ref> since (<ref>) implies C_12(t)=1. The matrix h defined by (<ref>) takes the form h=a J + b N I, where a,b are O(1) constants, and J is the N-by-N matrix with all elements equal to 1. Note that we do not need b=-1/N from the self-avoiding path techniques in Section <ref>, since it does not change the final scaling.
The matrix h can be easily diagonalized: it has eigenvalue aN+bN for the state |ψ⟩=1,⋯,1^ T/√(N), and eigenvalue bN for all other orthogonal states. Then Theorem <ref> yields
C_12(t) ≤^2th_12 = ^2t(a+b)N⟨2|ψ|⟨%s|%s⟩⟩ψ|1 + ^2tbN⟨2|(I-|ψ⟩⟨ψ|)|1|=⟩1/N^2t(a+b)N-^2tbN,
which implies that (<ref>) holds whenever C_12(t)=1, as it must be to prepare the GHZ state. Here we have used the smallness of ⟨2|ψ|=⟩⟨ψ|1|=⟩1/√(N) to get the extra log N factor.
A stronger bound t=Ω(N^-1/2) holds for Frobenius norm growth <cit.>, in comparison to the operator norm growth (<ref>). However, it is not obvious such operator growth should be relevant for state preparation. While naively, the logical X_1 must grow to X_1⋯ X_N after time evolution, it only must have such a long Pauli string on states stabilized by Z_1Z_2, etc., meaning that we could have X_1(t) = X_1⋯ X_N 1+Z_1Z_2/2⋯ + ⋯ which has exponentially small Frobenius weight. Making progress on this question is an important open problem.
Finally, one can also consider circuit models (instead of Hamiltonian models) with all-to-all connectivity. Assuming each qubit is acted on by at most one local gate at each time step (i.e., do not parallelize overlapping yet commuting gates as in Example <ref>), the depth of the circuit needs to be Ω(log N) for preparing any state that is globally entangled. The reason is simply that each qubit needs to build up correlation with all other qubits, yet the strict light cone is restricted in qubits of number exponential in depth. Θ(log N)-depth circuits are known for GHZ and W states. GHZ is prepared simply by inductively applying CNOT gates to double the qubits sharing the GHZ. The W state can be prepared in a similar fashion <cit.>. We refer to the literature <cit.> for further discussions.
§.§ Lyapunov exponents, quantum chaos, and operator growth
In the previous section, we discussed models with all-to-all interactions as valuable for the fast preparation of interesting entangled states; however, the Hamiltonians involved are not thermodynamically extensive: ‖ H‖∼ N^k for a k-local Hamiltonian. In this section, we will describe random models with all-to-all Hamiltonians, but which are thermodynamically extensive: ‖ H‖ = O(N). As we will see, this does not simply mean dividing by N^k-1 in (<ref>).
A paradigmatic model to study is the Sachdev-Ye-Kitaev (SYK) model <cit.> of N-interacting Majorana fermions: N operators chosen to obey the anti-commutation relation[There is a simple way, the Jordan Wigner transform, to present 2N Majorana fermion operators in terms of Pauli matrices: X_1 = ψ_1, Y_1 = ψ_2, Z_1 X_2 = ψ_3, …, Z_1⋯ Z_N-1Y_N = ψ_2N. Note however that a Hamiltonian which is k-local in terms of Majorana fermions may be N-local written in terms of Pauli matrices. We will not spell out in this review, but it is straightforward to show that all of the notions of locality, operator size etc., continue to make sense in a Hamiltonian written in terms of Majorana fermions.]
{ψ_i, ψ_j} = 2𝕀(i=j).
We then consider the random Hamiltonian
H = ^q/2/N^(q-1)/2∑_i_1<i_2<⋯ <i_q J_i_1⋯ i_qψ_i_1⋯ψ_i_q,
where J_i_1⋯ i_q are independent and identically distributed (i.i.d.) random variables with variance
𝔼[J_i_1⋯ i_q^2 ] = 1/2q([ N-1; q-1 ])^-1.
Note that the model is chosen so that the maximal and minimal eigenvalues of H scale linearly with N (thermodynamic extensivity) <cit.>.
The fast scrambling conjecture <cit.> asserts that the time it takes for an operator to “grow large" scales should as ∼log N. A cartoon model for this conjecture comes from considering random circuit dynamics (Section <ref>), in which we apply one interaction term in each discrete time step. In the first interaction, a single Majorana fermion grows as
ψ_1 → [ψ_1⋯ψ_q, ψ_1] = ψ_2 ⋯ψ_q.
The operator has grown from size 1 to size q-1, because the Hamiltonian involves q Majorana fermions. In the next time step, each of these q-1 seeds can also grow into q-1 new fermions, and so on; after discrete time t∈ℤ^+, we then estimate that size∼ (q-1)^t, and the time it takes for the size to scale as N is then t∼log N <cit.>.
There is a remarkable analogy between this cartoon of operator growth, and classical chaos, where one studies some number of degrees of freedom x_j(t) governed by deterministic equations, one often finds that
∂ x_i(t)/∂ x_j(0)∼e^λ_L t,
where the exponent λ_L is called the Lyapunov exponent. While we caution that this exponential growth can also arise from saddle point instabilities <cit.>, it is often associated with the onset of chaotic and irregular behavior (often known as the butterfly effect). In quantum mechanics, it was first noted a long time ago <cit.> that there is a natural analogy between ∂ x(t)/∂ x(0) and a commutator [x(t),p(0)] (here p denotes the momentum operator). In recent years, this analogy has been extended to discrete systems via the study of out-of-time-ordered correlators (OTOC) at infinite temperature between two small operators A_i and B_j, acting on single qubits i and j:
[A_i(t),B_j]_F^2=([A_i(t),B_j]^†[A_i(t),B_j]) /(I)≤1/Ne^λ_Lt.
This correlation function is called out-of-time-ordered because, in ordinary many-body quantum physics, one usually studies either time-ordered or anti-time-ordered correlation functions (e.g. when studying linear response in thermal systems). To actually evaluate the correlation function in (<ref>) in an “experiment", one needs to evolve both forwards and backward in time when evaluating ⟨ψ | A_i(t)B_jA_i(t)B_j |ψ⟩ in any state |ψ⟩. As such, these are not physically accessible correlation functions in most experiments, although nuclear magnetic resonance has been able to achieve such a task for a long time (usually in the study of fairly simple Hamiltonians) <cit.>: see also <cit.> for some recent experimental proposals and progress. Nevertheless, they have been of some interest in the past decade, as we will discuss more in Section <ref>.
Indeed, we have already seen OTOCs in Section <ref> as a natural probe of the Frobenius light cone. Is it possible that there is a sharper analogy between classical chaos, and exponential growth of OTOCs? We have already seen in (<ref>) that in local quantum systems, OTOC growth may be algebraic: [A_0(t),B_r] ∼ t^2r, rather than exponential. Therefore, genuine exponential growth in OTOCs should only be expected in special circumstances. One such setting is in systems with either a semiclassical degree of freedom, such as an infinite-dimensional boson, or a large-S spin model <cit.>: see <cit.> for some rigorous results on engineered models of fast scramblers <cit.>. Alternatively, one can study systems with all-to-all interactions among N finite-dimensional systems, such as Majorana fermions or qubits, e.g. SYK. To the extent that there is an honest period of exponential growth in out-of-time-ordered correlators in local models, it is likely only the case when there are perturbatively weak interactions in quantum field theory <cit.>; see also the cartoon circuit model of <cit.>.
In systems involving all-to-all interactions between N local degrees of freedom, we will define the Lyapunov exponent in quantum mechanics as the growth rate of operator size:[Note that relative to the classical definition, there is a factor of 2 mismatch. In the quantum chaos literature, however, the normalization here is fairly standard.]
(A(t)|𝒮|A(t)) ≈e^λ_Lt, (1≪λ_Lt ≪log N ).
Using Proposition <ref>, we can relate this to the typical value of an OTOC between A and a randomly chosen single-site operator.
Let us now return to the SYK model (<ref>). From the proof of Proposition <ref>, we find
({ψ_1(t),ψ_2}^2) ≤1/N(exp[c N^(q-1)/2 t ] -1 ).
Because the exponent scales with N, we cannot prove the fast scrambling conjecture for the SYK model. This is due to the requirement that H be extensive for typical states, in contrast to the Lieb-Robinson bound (which assumes worst-case scaling of ‖ H‖, and is saturated only by commuting Hamiltonians). Microscopic calculations, in contrast, do find a finite Lyapunov exponent <cit.>. New techniques have been developed to describe operator growth in such systems by incorporating concentration bounds from probability theory <cit.>.
[(Heuristic statement) Fast Scrambling bound]
For fixed q and sufficiently large N, there exists a constant c=O(1) such that (<ref>) holds for times
|t| < c log N.
Therefore, the Lyapunov exponent is constant λ_L=O(1).
The first proof was done by brute force combinatorics first in <cit.>, and later by more elegant methods for general random Hamiltonians in <cit.>. Both proofs rely heavily on the notion of concentration bounds for random systems, while <cit.> also introduced matrix concentration methods (Section <ref>) for many-body Hamiltonians. The latter was stated in Section <ref>.
To give some brief conceptual intuition, one can think of the Lyapunov exponent as being finite because the growth of operator size is at best exponential (as in our cartoon above). A way to make this rigorous is to show that <cit.>
‖ℚ_s ℒℚ_s^'‖≤λ_Lmax(s,s^')/q-2𝕀(|s-s^'|<q-2).
where ℚ_s = 𝕀(𝒮=s) is the projection onto operators of size s, and λ_L=O(1). One shows that (<ref>) holds with extremely high probability in the SYK model, demonstrating non-perturbatively the scaling obtained diagrammatically in <cit.>. If (<ref>) holds, then we find that
d/dt(A(t)|𝒮|A(t)) = (A(t)|[𝒮,ℒ]|A(t)) ≤λ_L (A(t)| 𝒮 | A(t)).
Solving this differential inequality leads to (<ref>).
In general, the proof of <cit.> relies on the randomness of the coupling constants in order to get strong bounds on λ_L. In the less rigorous physics literature, the randomness of coupling constants can be thought of as helping to organize an expansion of calculations in terms of Feynman diagrams, with dangerous loop diagrams suppressed at large N. There are also non-random quantum systems where this same diagrammatic suppression can occur. A particularly relevant example is in matrix quantum mechanics, which is relevant to holography since the matrix degrees of freedom represent the start and end points of open strings on brane stacks <cit.>. A recent “cartoon matrix model" <cit.> has also confirmed that such models exhibit analogs of Theorem <ref>.
There is a notion of “Krylov complexity" which has been introduced <cit.>, that also appears to compute the Lyapunov exponent λ_L, yet appears distinct from operator size.
§.§ Random quantum dynamics
In this section, we briefly review a particularly simple limit of operator dynamics where the problem has random spacetime evolution. In this case, the problem of operator growth reduces to a completely classical problem.
The minimal model for operator growth is the random unitary circuit <cit.>. We will focus on the dynamics in a model with nearest-neighbor interactions in one spatial dimension, but the discussion straightforwardly generalizes to arbitrary graphs. As shown in Figure <ref>, we consider time evolution in discrete time steps: U=⋯ U(2)U(1), where
U(1) = U_12(1)U_34(1)⋯ ,
U(2) = U_23(2)U_45(2)⋯,
and so on. Here U_ij denotes a 2-local randomly chosen unitary matrix acting on sites i and j. We choose – at every time step – the U_ij from the Haar distribution, which means that we choose a unitary matrix uniformly from all possible choices. The key is that since every unitary shows up exactly once, it is easy to perform time averages.
To see how, let us further restrict to the case where each site has a single qubit on it. Let us consider how a Pauli matrix X_1 grows under the first time evolution U(1):
U(1)^† X_1 U(1) = U_12^† U_34^†⋯ X_1 ⋯ U_34U_12= U_12^† X_1 U_12
= ∑_a_1=1^3 c_a_1X_1^a_1 + ∑_a_2=1^3 c_a_2X_2^a_2 + ∑_a_1,a_2=1^3 c_a_1a_2X_1^a_1X_2^a_2.
Since X_1 is local, the only unitary that evolves it non-trivially is U_12. If U_12 is Haar random, all operators acting on the set { 1,2} that square to I are equally likely: in particular, this means that
𝔼[c_a_1^2] = 𝔼[c_a_1^2] = 𝔼[c_a_1a_2^2] = 1/15,
while any two coefficients are uncorrelated.
It is helpful to adopt a “super-superoperator" picture in which
𝒰(0)|X_1] = ∑_a_1,a_1^'=1^3 c_a_1c_a_1^' |X_1^a_1)(X_1^a_1^'| + ⋯,
since in this picture it is easy to average over U_12:
𝔼[ |X_1(1)] ] = 1/15(∑_a=1^3 (|X_1^a)(X_1^a| + |X_2^a)(X_2^a| ) + ∑_a,b=1^3 |X_1^aX_2^b)(X_1^aX_2^b| ).
The only terms that show up in this average are “diagonal" in a Pauli basis, meaning that the resulting dynamics can be mapped to a classical stochastic process, essentially corresponding to what sites have a non-trivial Pauli on them. This allows for large-scale numerical simulations of the resulting dynamics. Note that when one considers non-Haar random dynamics, such as dynamics constrained by a conservation law, there is no longer a simple picture for operator dynamics in general <cit.>, as the coefficients c become correlated and off-diagonal terms in (<ref>) cannot be ignored.
Random unitary circuits are useful as toy models for a broad range of problems, as they often illustrate more general phenomena. One such phenomenon that we have already encountered is a discrepancy between a Lieb-Robinson light cone and a Frobenius light cone. In units of lattice spacing, the Lieb-Robinson velocity in the circuit of Figure <ref> is v_LR=1, since in principle there exists a circuit where X_1 evolves to X_1⋯ X_L at discrete time t=L-1. However, in a typical circuit, one finds the operator is supported with overwhelming probability inside a smaller domain <cit.>: this corresponds to a butterfly velocity (see Section <ref>) v_B<1. In these models, v_B can (in 1d) be analytically computed.
It is straightforward to extend this discussion to continuous time dynamics. In this case, as one example, one considers a Brownian Hamiltonian of the form
H(t) = ∑_e∈𝖤h_e(t)A_e(t),
where A_e is an operator acting on edge e, while the couplings h_e(t) are taken to be (usually) Gaussian white noise obeying:
𝔼[h_e(t)h_e^'(t^')] = δ_ee^'δ(t-t^').
In this case, again one finds that the operator growth problem reduces to a classical continuous-time Markov process: see e.g. <cit.>.
§.§ Possible connections to quantum gravity and black holes
We now briefly discuss the historical origin of the interest in quantum operator growth and many-body chaos. While the observation that OTOCs should probe chaos was first noticed many decades ago <cit.>, the OTOC became a much more intensely studied object when it was noticed to possibly relate to quantum theories of gravity.
A bit of background is in order. About 25 years ago, it was first noticed <cit.> that certain quantum field theories (QFT) which arise in string theory appear to admit a description in terms of gravity in one higher dimension. It is widely believed (albeit an open conjecture) that this holographic duality provides our first explicit model of quantum gravity, and quantum black holes: see <cit.> for a review on the subject. Here, we will focus on a peculiar aspect of the duality: a black hole in the gravity theory is related to a thermal state in the QFT. Suppose, from the gravity side, we toss in a small particle into the black hole. In the QFT, this is interpreted as applying a spatially local operator such as A_i. Under time evolution in the QFT, we expect that A_i(t) becomes a large size operator as discussed above, while in the gravity picture, the particle is falling towards the black hole horizon <cit.>. It was therefore proposed in <cit.> that there must be a relation between the particle motion in gravity and operator size; this conjecture has some evidence for it in SYK <cit.> but remains open more generally. See <cit.> for related ideas about the black hole interior and quantum complexity.
For the purposes of this review, the key feature of this story is that black hole states are finite temperature states – in fact, the temperature T ≪ J must actually be very low compared to any microscopic energy scale J appearing in the Hamiltonian! If T∼ J, the black hole becomes large enough that it is not believed any semiclassical description of gravity exists. This is parametrically the opposite regime of the one studied in Section <ref>, where rigorous results on Lyapunov exponents are known. At finite temperature, it is believed that OTOCs of the form
(√(ρ) [A_i(t),B_j]^†√(ρ) [A_i(t),B_j]) ≲1/Ne^2 T t
have a Lyapunov exponent λ_L≤ 2 T <cit.>. While it seems many physicists believe that this conjecture is proven, the “proof" relies on crucial (but reasonable) assumptions about typical thermal/chaotic systems which are not proven. In our view, it would be extremely valuable to prove a bound on the Lyapunov exponent at finite temperature, assuming only k-locality of the Hamiltonian. Such an achievement would have key implications for quantum gravity since it is known that the holographic models of semiclassical gravity actually saturate the conjectured bound on the Lyapunov exponent <cit.>. A rigorous proof of this bound would imply at least one sense in which black holes are the “fastest scramblers" – more explicitly, they would be the quantum systems that can most effectively scramble information contained in a local operator A_i into a non-local operator A_i(t). We expect a rigorous proof of any such bound to be an extreme challenge; Section <ref> describes the limited results known to us in finite temperature models.
While we have focused on a particular class of random k-local Hamiltonians in this review, we emphasize that there has been a large literature on OTOCs and operator growth <cit.> in spatially local Hamiltonians as well, including via holographic duality <cit.> and “SYK chains" <cit.>.
§ SYSTEMS WITH POWER-LAW INTERACTIONS
While the celebrated Lieb-Robinson bounds have found profound applications in the past decades, one fundamental caveat is that many physical systems are not, strictly speaking, local but with a power-law decay tail (Table <ref>).
For simplicity, our discussion will focus on models defined on some d-dimensional graph of vertex set 𝖵 (Section <ref>). However, we emphasize that the interactions will not only couple sites connected by an edge of the graph. For this section only, we define a Hamiltonian with two-body (2-local) interactions to have power-law interactions of exponent ≤α whenever
H = ∑_i j∈𝖵 h_ij(t) H_ij
such that
h_ij(t) ≤C/𝖽(i,j)^α
where H_ij acts non-trivially only on sites i and j, with ‖ H_ij‖ = 1, and 0<C<∞ is an absolute constant.
When we say that a system has power-law interactions of exponent α, we mean that α is the largest possible exponent for which this definition holds.
§.§ Lieb-Robinson light cone
While an understanding of quantum dynamics with power-law interactions will thus be relevant for a broad range of physical systems and quantum information processing platforms, it is surprisingly challenging to reasonably extend the Lieb-Robinson Theorem to power-law interacting systems. Let us briefly review the history of bounds on the commutator ‖ [A_0(t),B_r]‖ := C(r,t), between two local operators separated by a distance r. In 2005, it was shown <cit.> that for any α>d, we have
C(r,t) ≤ C_0e^λ t-1/r^α.
The proof essentially follows that of Theorem <ref>.
Since C(r,t) ∼ 1 when t∼log r, we say that this system is bounded by a “logarithmic light cone". Consequently, we can disprove that, e.g., a Bell pair can be created between sites separated by distance r before this time. Such a bound is no tighter than what we saw for systems with all-to-all interactions! A decade later, <cit.> found a much tighter bound: for α>2d, we have
C(r,t) ≤ C_0 (t/r^κ)^β,
where β>0 and 0<κ<1 are constants depending on α, d (see the references for the precise values). These bounds demonstrated an exponential improvement, but do not yield a linear light for any large values of α.
In the past four years, the shape of the “light cone" has been essentially tightly established <cit.>, as summarized below.
[Lieb-Robinson bounds for power-law interacting systems]
Consider r,t large with t/r^min(1,α-2d) fixed. For α>2d+1, the shape of the light cone is linear <cit.>
C(r,t) ≤C/(r-v_LRt)^α
For 2d<α<2d+1, one instead finds an algebraic light cone <cit.>
C(r,t) ≤ C_0 (t/r^α-2d)^β.
The constants C_0, β, v_LR depend only on α, d. If d<α<2d, then the shape of the light cone is polylogarithmic, as bounded by (<ref>).
The proofs of these results are exceedingly technical and take up a few hundred pages. Very briefly, the sharpest results of <cit.> implement a multiscale decomposition of the unitary, which relies on alternating two technical ingredients, one in space and one in time: spatially, one adds interaction with longer ranges via the interaction picture; temporally, one connects short-time Lieb-Robinson bounds into long-time Lieb-Robinson bounds. In contrast, the naive recursive Lieb-Robinson bounds in terms of summing over paths (Theorem <ref>), albeit simple, seem to lose some essential physics of the power-law interaction system.
In 1D, a much shorter alternative proof is possible <cit.> (and historically precedes the sharpest results in Theorem <ref>); this requires regrouping the Hamiltonian by scales and expanding the exponential into a carefully chosen interaction picture (as a variant of the self-avoiding path construction in Theorem <ref>). Unfortunately, this approach does not seem to generalize to higher dimensions.
§.§ Frobenius light cone
The Frobenius light cone in power-law interacting systems qualitatively differs from the Lieb-Robinson bounds <cit.>: see Figure <ref>. This means that quantum dynamics in power-law interaction systems drastically depends on whether one considers the fine-tuned (worst-case) or random (average-case) states; there are even regimes where the distinction is exponentially large!
Right now, the complete shape of the Frobenius is only fully understood in d=1:
[Frobenius bounds for 1d power-law interacting systems <cit.>]
For d=1, α >1, and any δ >0, we have
‖ [A_0,B_r] ‖_F≥δ requires |t| ≥δ^2 C ×{[ r/ln r α>2; r/ln^2 r α = 2; r^α-1 1<α<2 ].
where the constant 0<C<∞ depends only on α.
Concretely, we see the transition to the algebraic light cone (α =2) is distinct from the Lieb-Robinson bounds (α= 3). In higher-dimension (d≥ 2), the critical value for this transition remains unknown, but is conjectured to be d+1. However, we do at least know that the possibility for exponentially fast scrambling (a la Section <ref>) is forbidden until α=d:
[Algebraic Frobenius bounds for power-law interacting systems <cit.>]
For any α >d,
‖ [A_0,B_r] ‖_F≤ C ( t/r^κ)^β
where the constants 0<C <∞, 0<κ <1, 0<β depend only on α, d.
Another setting where the (conjectured, in d>1) Frobenius light cone is reached is when studying single-particle quantum walks (which also apply to free fermion models), where single-particle hopping rates are suppressed by power-law decay with distance:
Consider a single-particle walk on a d-dimensional lattice with power-law interactions, generated by
H(t) = ∑_u,v∈𝖵 h_uv(t)|u⟩⟨ v|
where the matrix h_uv(t) is Hermitian and obeys (<ref>). Then for any ϵ>0, so long as α>d, there exist constants 0<v_sp,K<∞ such that
|⟨ u|e^-iHt|v⟩| ≤Kt/(𝖽(u,v)-v_spt)^α-d-ϵ
at sufficiently short time. For α<d+1, we may take v_sp=0.
§.§ Applications
As we have emphasized in this review, Lieb-Robinson bounds constrain the minimal time required for various practical tasks. An important question becomes whether these bounds can ever be saturated. Remarkably, it turns out to be the case for many of the bounds in this section! Hence we know that these bounds are optimal.
In particular, it is possible <cit.> to use power-law interactions to prepare GHZ states (<ref>) at the maximal rate allowed by Theorem <ref>. The algorithm is an iterative process (<ref>), with the parameters of the algorithm (such as the number of clusters and number of iterations) chosen efficiently, so as to essentially saturate the limit allowed by Theorem <ref>.
[Optimal state transfer protocol with power-law interactions <cit.>]
The shapes of the light cone in Theorem <ref> are achieved by the state transfer protocols <cit.>.
[Fast W-state preparation with power-law interactions <cit.>]
The basic strategy is to use a free-fermion quantum walk, with all-to-all interactions of power-law strength between sets B_n of increasing size D_n ∼ 2^n leading to a W-state expanding from one bubble to the next: see Figure <ref>. In the n^th time step, the Hamiltonian takes the form of
H = ∑_u ∈ B_n,v∈ B_n+1-B_n1/D_n+1^α(c^†_u c_v + c_v^† c_u )
At each time step, due to constructive interference, the time to grow a W-state in B_n into a W state in B_n+1 scales as
τ_n ∼ D_n+1^α-d,
meaning that the total runtime of the algorithm scales as R^min(1,α-d). For α>d+1, nearest neighbor hopping algorithms can be employed as an alternative. Note that this quantum walk thus also asymptotically saturates Proposition <ref>. Two interesting features of this protocol are that it leads to efficient transmission of multiple qubits (with only √(m) increased runtime needed to send m qubits), and that it is robust to certain kinds of coherent errors in the protocol <cit.>.
Both the GHZ and W state preparation algorithms can be used to perform state transfer, by simply reversing the unitary protocol that generates it, but “ending" on a site on the other side of the domain. An earlier state transfer protocol based on power-law interactions is given in <cit.>.
In addition to preparing a particular entangled state, one may seek to generate as much bipartite entanglement as possible between two regions exploiting power-law interaction. Naturally, one strategy is to repeat single-qubit state transfer <cit.>, which turns out to be optimal using resource theory arguments (Section <ref>).
[Optimal generation of bipartite entanglement with power-law interactions]
In a d-dimensional model with power-law interactions of exponent α, generating the maximally entangled state between two adjacent cubes with side length r takes time at least <cit.>
t = Ω(r^min(1,α-d)),
starting from an arbitrary initial state without bipartite entanglement. This is asymptotically saturated (up to sub-algebraic corrections) by sequentially sending 1-qubit at a time using the protocol of <cit.>.
The above is a direct application of bipartite entanglement generating bounds (Proposition <ref>) by summing over all interactions.
Recent work <cit.> has also discussed bounds on correlations and entanglement in gapped ground states of systems with power-law interactions. Some results on prethermal behavior in power-law interacting systems can be found in <cit.>.
§ BOUNDS AT FINITE ENERGY AND FINITE DENSITY
The Frobenius light cone perspective is closely related to the study of dynamics at finite charge density or finite energy density. Indeed, while any formal Lieb-Robinson bound would hold for any state at low energy (e.g.), we usually anticipate a much stronger bound holding in practice. In this section, we will describe a variety of methods that are used to try and provide stronger bounds on dynamics at low temperature or low density.
§.§ Dynamics at low charge density
We begin with a discussion of dynamics in a system of N qubits governed by time evolution that commutes with the total Z-spin (or magnetization):
Q = ∑_i=1^N 1+Z_i/2 = ∑_i=1^N n_i.
If time evolution is generated by a continuous Hamiltonian,
[H(t),Q] = 0.
Note that in this section it will be more convenient for us to define n_i=0,1 rather than Z_i = -1,1.
§.§.§ Formalism for low-density quantum walk bounds
We are interested in “low density" states, or those where ⟨ Q⟩≪ N. While it follows from (<ref>) that Q is exactly conserved if we restrict the Hilbert space to states with Q “particles", the Hilbert space does not have a product space structure. Notions like operator size become challenging to define, and more importantly, it is far from obvious how to exploit the low-density nature of the state to derive an improvement on a Lieb-Robinson-like light cone, restricted to such a low-density state.
For low-density states, the situation seems relatively mild, due to the following proposition:
Consider the “grand canonical" density matrix
ρ = e^-μ Q×normalization.
In the N→∞ limit, correlation functions tr(ρ A) of operators A that can only create or destroy O(1) particles are determined by states at density
n̅ = Q/N = 1/1+e^μ.
The allowed family of A includes all local k-point functions for fixed k.
Since ρ is diagonal in the n_i basis, this proposition is a statement about the probability that a state is drawn from ρ has a given density of particles n = Q/N? From the form of ρ, the probability that we would draw n_i=1 is independent and identically distributed with respect to any n_j (j i). Using a modification of (<ref>), we find:
ℙ[ | Q/N-n̅| > c/√(N)] < exp[ - c^2/2n̅(1-n̅)].
We say that ρ concentrates on states of density n̅.
This proposition is very helpful because it turns out to be quite natural to calculate expectation values with ρ using a mild modification of the formalism of Section <ref>. In particular, using the density matrix (<ref>), consider redefining the operator inner product (<ref>) to <cit.>
(A|B) = tr(√(ρ) A^†√(ρ) B).
This inner product concentrates in the thermodynamic limit onto states at density n̅.
Ref. <cit.> proposed a natural generalization of operator size to a (low-density) system. Defining the operators
c_i = | 0⟩⟨ 1|_i and c_i^† = |1⟩⟨ 0|_i,
we notice that the space of operators is
End(ℬ) = span( { I, c_i, c_i^†, n_i }^⊗ N).
There is then a natural definition of operator size:
𝒮 = ∑_j=1^N 𝒮_j,
where on a single site
𝒮|I) = 0|I), 𝒮|c) = |c), 𝒮|c^†) = |c^†), 𝒮|ñ) = 2|ñ),
where
|ñ) := |n) - n̅ |I).
Since n=c^† c, one can think of this 𝒮 as counting the number of c and c^† in an operator string. |ñ) is defined to be orthogonal to the identity, which is why we have subtracted off its average.
Note that this definition does not reproduce, when μ=0, the standard definition of operator size: the Pauli Z has “twice" the length of X or Y, at μ=0. After a short calculation, one finds that
(I|I) = 1,
(c_i|c_i) = (c_i^† | c_i^†) = e^μ/2n̅ = √(n̅ (1-n̅)),
(ñ_i |ñ_i) = n̅ (1-n̅).
When n̅≪ 1, one can heuristically think that the inner product of an operator A of size s has an inner product (A|A) ∼n̅^s/2.
§.§.§ Operator growth and decay
With these definitions, we are now ready to discuss two useful results that allow us to generalize the many-body quantum walk bounds to low-density systems.
Under the inner product (<ref>) and charge-conserving dynamics, (A(t)|A(t)) = (A|A).
The proof of this follows immediately from (<ref>) and Proposition <ref>. The Lyapunov exponent λ_L can be defined for the μ-dependent notion of size, analogously to Section <ref>. We then find:
[Bounds on Lyapunov exponent at finite density]
For some 0<C<∞, in a model subject to the assumptions of Theorem <ref>, together with (<ref>),
λ_L≤ C √(n̅).
The idea is rather similar to Theorem <ref>: we expand
|A) = ∑_s |A_s)
into operators of fixed size: 𝒮|A_s)=s|A_s), such that
d/dt(A(t)|𝒮|A(t)) = (A(t)|[𝒮,ℒ]|A(t)) = ∑_s_1<s_22(s_2-s_1)× (A_s_2(t)|i[H,A_s_1(t)]).
The key observations are that: (1) using antisymmetry of ℒ we can always do this, and (2), as this inner product vanishes unless [H,A_s_1] has size s_2>s_1, we can bound (under similar k-locality assumptions to Theorem <ref>):
(A_s_2(t)|i[H,A_s_1(t)]) ≤ Cs_1 ×[n̅ (1-n̅)]^(s_2-s_1)/4×√((A_s_2|A_s_2)(A_s_1|A_s_1)).
The constant C will be related by a constant prefactor to the value at n̅=0, but due to the fact that the analog of Pauli Z has both size-0 and size-2 components under our current counting, it may have quantitative (though not qualitative) n̅ dependence. The new factor of interest in (<ref>) is the n̅^(s_2-s_1)/4 scaling. The reason we have this prefactor is that the inner product (A_s_2(t)|i[H,A_s_1(t)]) is between two operators of size s_2, whereas (A_s_1|A_s_1) is normalized to a size s_1 operator, so we need additional factors from (<ref>).
Lastly, due to [H,Q]=0, if [A,Q] = kA, then [A(t),Q]=kA(t). In particular, this means that under time evolution, we can only modify A by operators that do not contribute an odd number of “c or c^†", as defined in (<ref>). Therefore, in (<ref>), we must have s_2-s_1 ∈ 2ℤ^+. The smallest value that can contribute to the Lyapunov exponent is s_2-s_1=2. Hence we obtain (<ref>).
The fact that λ_L must vanish at low density is qualitatively similar to the proposal of <cit.> that dynamics must slow down at low temperature, although it is far from clear how to generalize this argument to finite temperature states. Using the same technique, one can prove the following corollary, which states that in typical states, the time it takes for a single-particle operator to decay into a many-particle operator is slow. This is reminiscent of a conjecture of <cit.> about the slow decay of “small operators" in finite temperature dynamics.
[Decay time bound at finite density]
For times t < τ = C n̅^-1/2, the time evolution of a size-1 operator (“creation/annihilation operator"), is well approximated by single-particle dynamics. Namely, if 𝒮|A)=|A), then there exists |B(t)) = 𝒮|B(t)) such that for t<τ, (A(t)|B(t)) ≥1/2√((A|A)(B|B)).
Using Fermi's Golden Rule, we might expect to have the stronger scaling τ∼n̅^-1, but such a result has not yet been proved in generality (as far as we know). Intuitively, this scaling would then be optimal, since a particle traveling at constant velocity (see the next subsetion) will encounter another particle in a time ∼n̅^-1, at which point we expect single-particle correlation functions to decay.
§.§.§ Butterfly velocity
One might expect that, similarly to how the Lyapunov exponent decreases with increasing n̅, the butterfly velocity also decreases as v_B∼n̅. Indeed this is expected on heuristic grounds <cit.>. However, we emphasize that this is quite non-trivial to prove (in fact an outstanding question). The challenge can be seen by considering just one particle (the Q=1 subspace). In this setting, the quantum dynamics reduces to a single particle quantum walk, which we have seen has a finite velocity in Section <ref>. So there cannot, in a strict sense, be any bound on signal propagation at low density where the velocity vanishes with n̅.
What was conjectured in <cit.> is that for short times τ≲n̅^-1, an operator indeed behaves as if it propagates in this Q=1 Hilbert space, with a finite velocity. After t∼τ, however, the operator grows more complex, and destructive interference sets in between operators of different sizes, in such a way that the effective operator growth front propagates with a velocity v_B∼n̅. It would be interesting if this can be shown rigorously in any context. The fact that there is a fast velocity for operator growth at short times, and a slow velocity at late times, poses a challenge to attempts <cit.> to universally bound diffusion constants in terms of v_B and λ_L.
§.§ Models of interacting bosons
We now turn to a very similar story, where we study the dynamics of interacting bosons. Starting for the moment with a single boson, the Hilbert space is that of the quantum harmonic oscillator, labeled by an infinite tower of states |n⟩, for n∈ℤ^+. We define the operators
b|n⟩ := √(n)|n-1⟩,
b^† |n⟩ := √(n+1)|n+1⟩.
Next, we consider an interacting boson model on a graph 𝖦=(𝖵,𝖤). On every vertex of the graph, we consider a bosonic Hilbert space as above. The creation and annihilation operators obey
[b_u,b^†_v] = 𝕀(u=v).
For convenience, we will restrict our study to (time-dependent) Hamiltonians of the form
H(t) = ∑_{ u,v}∈𝖤 J_uv(t) (b^†_u b_v + b^†_v b_u) + ∑_v∈𝖵f(b^†_v b_v),
where f is an arbitrary function. The results we describe below can be generalized to slightly more complex H; for pedagogy, we stick to the above. However, the essential features of (<ref>) are that: (1) only one boson can move at a time, and (2) the energy in f will in general be unbounded; however it only depends on the boson number operator b^†_v b_v. For u v, we have [b^†_u b_u, b^†_v b_v] = 0, so the interaction terms in the Hamiltonian commute. (<ref>) generalizes the classic Bose-Hubbard model <cit.>, in which J_uv=J does not depend on time, while for some constant U,
f(n) = Un(n-1).
Even with these restrictions, however, it is non-trivial to imagine a Lieb-Robinson bound for such a problem. Every single operator in (<ref>) is unbounded in operator norm, so the conventional proof of a Lieb-Robinson bound as in Section <ref> will not work. Moreover, there is a physical construction <cit.> that leads to propagating velocity v∼n̅, if n̅ is the mean number of bosons per site in the system. Therefore, for some time, Lieb-Robinson bounds with bosons were only found in quite restrictive settings, such as classical models <cit.>, harmonic (non-interacting) models or models with bounded interaction strength <cit.>, or models with a bounded boson number <cit.>.
Recently, the nature of Lieb-Robinson light cones in interacting boson models has been rigorously established. A nearly linear light cone was presented in <cit.>, while the exact linear light cone (in a sense described below) was proved in <cit.>. The proofs of all results are rather involved so we leave them to the literature, and just highlight the conclusions here with some prototypical examples.
[Linear light cone for interacting bosons in typical states]
Let A_u and B_v denote local operators consisting of a finite number of raising and lowering operators, acting on single sites u,v∈𝖵. Then for some constants 0<C,v,a<∞, <cit.>
(√(ρ)[A_u(t),B_v]^†√(ρ)[A_u(t),B_v]) ≤ C (vt/r)^ar
When A_u and B_v are single boson creation or annihilation operators, there exist 0<c_1,2<∞ such that
v ≤ c_1 + c_2 n̅.
This scaling is known to be asymptotically optimal <cit.>.
[Lieb-Robinson light cone in finite density states in one dimension]
Consider two arbitrary states |ψ_1,2⟩ of bosons on a one-dimensional lattice, restricted to the form
|ψ_1,2⟩ = ∑_n_i = 0^M c_1,2(𝐧) |⋯ n_1n_2⋯⟩
Namely, there are in the initial state, no more than M bosons on any given site. Then for any M and some 0<C,v,a<∞ which can depend on M, <cit.>
|⟨ψ_1|[A_u(t),B_v]|ψ_2⟩ | ≤ C (vt/r)^ar .
All matrix elements of commutators are small in one dimension.
One can prove, as a consequence of this theorem, that gapped ground states have exponential correlations <cit.>, and that bosons are not too much more difficult to simulate than spins, at low density. However, the analogy between the locality in the Bose-Hubbard model and in interacting spin models does not persist in higher dimensional settings.
[No Lieb-Robinson light cone beyond one dimension <cit.>]
There exist states |ψ_1,2⟩ of the form (<ref>), and time-dependent H of the form (<ref>), on a d-dimensional lattice (d>1), for which |⟨ψ_1|[A_u(t),B_v]|ψ_2⟩ | ≥ 1 for r=bt^d, for O(1) constant b. Hence, there is an effective velocity v_eff∼ t^d-1. However, up to logarithmic corrections, one cannot find any protocol for which v_eff is faster.
The basic idea behind this theorem is to imagine propagating information in the x_1-direction, and starting with a state with one boson on every site at time t=0. For time 0<t<T/2, we pile up bosons in x_1=const. planes, as much as possible, along the axis x_2=⋯ = x_d=0. At time T/2, we have ∼ T^d-1 bosons on every site. Then we use the protocol of <cit.> (see (<ref>)) to send signals at a speed v∼ T^d-1 along the x_1-axis. However, it is also known that while “signals" can be sent very quickly in higher dimensions, a large number of bosons cannot be:
[No fast particle transport (informal) <cit.>]
Let 𝖱⊂𝖵 have diameter r. Then in any state with N bosons in region 𝖱 at t=0, the time τ needed to move a finite fraction (e.g. N/2 bosons) out of 𝖱 obeys τ≥ Cr for some 0<C<∞.
Even in one dimension, it is known that the finite speed limit at low density arises only due to the particular nature of the Hamiltonian (<ref>). One way to violate any Lieb-Robinson-like bound is to include number-conservation-violating terms such as b_i^† b_i+1^† + H.c. <cit.>, which can cause the effective velocity to grow exponentially with time: v∼exp(t). But even if we conserve number, a density-dependent hopping term f_i(n_i+n_i+1) b_i^† b_i+1+H.c.) will destroy many notions of locality. Recall for example that with f=1, the time it would take to get from a state where all bosons are piled up on the left end of a 1d chain (|n0⋯ 0⟩), to a state where they are all piled up on the right (|0⋯ 0n⟩) would scale with the length of the chain, and independently of n. However, by simply choosing f_i=n_i+n_i+1, we can make the time arbitrarily small by decreasing n. We expect that using similar strategies to Theorem <ref>, especially in higher dimensions, one will find little remains of a notion of locality once the interacting terms incorporate boson hopping.
Lastly, we remark that special Lieb-Robinson bounds have been derived <cit.> for Hamiltonians of the schematic form
H = b^† b + b A + b^† A^†
where A is a k-local many-body operator, and b is the boson annihilation operator. One can generalize to multipole boson modes as well. Such Hamiltonians arise when modeling trapped ion crystals <cit.>.
§.§ Lieb-Robinson bounds in continuous space at finite energy
Now, we turn to bounds that only hold at finite energy (density). This is an extremely hard problem, albeit one of significant physical importance. We begin by briefly reviewing the efforts to extend the Lieb-Robinson Theorem into the continuum. This literature has mainly remained restricted to the mathematics community <cit.>; however, we will give an intuitive sketch of the ideas in the context of the one-dimensional Schrödinger equation (which seems to us to capture the essence of many of the ideas developed there). The key insight is, as we explain shortly, such bounds are only plausible at finite energy. Hence, this provides a nice gateway into the study of bounds on finite temperature dynamics more generally. We will avoid technical discussions of functional spaces and smoothness, which are of course discussed at length by mathematicians, and focus on aspects of the literature that seem relevant for finite-dimensional quantum systems as well.
We now prove the following theorem, which represents the minimal model of a continuum Lieb-Robinson-style bound, applicable to the motion of a single particle.
[Continuous space Lieb-Robinson bound at low energy]
Consider the time-independent Hamiltonian operator
H = -1/2∂_x^2 + V(x) such that V(x) ≥ 0 .
Define a projector onto low-energy states
ℙ_E := 𝕀(H ≤ E ).
Then,
‖ℙ_E [H,x] ℙ_E ‖≤√(2E),
and for any state obeying |ψ⟩ = ℙ_E|ψ⟩,
⟨ψ| e^iHt x e^-iHt|ψ⟩≤⟨ψ | x | ψ⟩ + √(2E)t.
Since H does not depend on time, [e^iHt,ℙ_E]=0, so (<ref>) follows immediately from (<ref>). To prove (<ref>), observe that
[H,x] = -1/2[∂_x^2, x] + [V(x),x] = -∂_x.
Now using (<ref>), we see that (for any normalized states ⟨φ|φ⟩ = ⟨φ^' | φ^'⟩ = 1):
| ⟨φ | ℙ_E ∂_x ℙ_E|φ^'⟩|^2 ≤⟨φ | ℙ_E ∂_x ℙ_E^2 ∂_x^†ℙ_E|φ⟩≤⟨φ | ℙ_E (- ∂_x^2) ℙ_E|φ⟩ = ⟨φ| ℙ_E (2(H-V))ℙ_E|φ⟩
≤ 2⟨φ|ℙ_EHℙ_E|φ⟩≤ 2E.
Since we have bounded the largest possible matrix element of ℙ_E[H,x]ℙ_E, we obtain (<ref>).
What this theorem implies is that, if we can restrict to low energy states, there is a Lieb-Robinson-like bound that depends on energy E. Note that in the present proof, we have assumed V does not depend on time t. This assumption was important to ensure that the potential does not inject energy into the system.[It is likely that certain time-dependent potentials are mild, however: see e.g. <cit.> for a nonlinear Schrödinger equation where an effective time-dependent potential does not qualitatively change the nature of (<ref>).] We also note (but do not show) that by studying ⟨ψ| e^ax(t) |ψ⟩ using quantum walk techniques, we find that |ψ(t)⟩ must be exponentially localized in space.
This bound has been generalized to higher dimensions and more recently to a weakly nonlinear Schrödinger equation <cit.>. This technique can also be straightforwardly extended to certain many-body fermion models <cit.>, similar to the Bose-Hubbard model.
§.§ Butterfly velocity and finite temperature bounds
An idealistic goal would be to generalize Theorem <ref> to many-body systems. Of course in principle this is possible formally: one could study for example a first-quantized model of N particles interacting on a lattice, or in the continuum, and apply this bound. However, there is a crucial problem. If we have N particles interacting on the line, then E∼ N in a physically reasonable state (e.g. one drawn from the finite temperature ensemble, with high probability). Our energy-dependent velocity bound would then diverge in the thermodynamic limit. This problem arises because we cannot rule out the possibility that all of the energy in the system is dumped into a single particle's kinetic energy, which then can propagate very fast.
While this scenario is almost certainly unphysical, ruling it out has been a mathematical challenge. It is noted in <cit.>, following earlier work <cit.> on particle transport in the Bose-Hubbard model, that if one asks about average particle velocity, this effect disappears and one can show that the typical particle cannot move faster than allowed by the average energy per particle.
Conjecturing, however, that one can achieve this goal of finding an energy-dependent velocity bound in many-body systems, what should we expect to find? We conjecture that the correct bound would be of the form
‖ℙ_E [H,x_i]ℙ_E ‖≲ v_B≈ Tξ,
where T is the temperature and ξ is the thermal correlation length. For single-particle motion, we can “derive" (<ref>) from Theorem <ref> as follows: the energy E of the particle is roughly the temperature T, while the thermal correlation length ξ∼ 1/⟨ |∂_x|⟩∼ 1/√(T). In lattice models, this scaling of ξ can be derived rigorously using a Chebyshev expansion <cit.> of the thermal density matrix e^-β H <cit.>.
For single particle motion, (<ref>) was proved in <cit.> subject to some rather special constraints on H. Roughly speaking, suppose one has H ∼∂_x^z, where z=2,4,6,… is an even integer. Then one expects
ξ∼ T^-1/z.
Using methods analogous to the proof of Theorem <ref>, <cit.> has demonstrated a family of spatially inhomogeneous lattice and continuum models where (<ref>) can be derived with (<ref>). Using non-rigorous methods, this scaling has been demonstrated for the dynamics of free fermions in <cit.>, and in holographic models (see Section <ref>) of quantum matter <cit.>.
We believe that (<ref>) is quite intuitive: at low temperatures, one might expect an effective description of the dynamics with a Hamiltonian where local terms have energy of at most T: the price we must pay is that this effective Hamiltonian will be non-local on a scale set by the thermal correlation length ξ.
Note that the thermal correlation length ξ has been bounded to always be less than T^-1 in local lattice models with a finite-dimensional local Hilbert space dimension <cit.>; unfortunately, with this scaling, (<ref>) simply reproduces the Lieb-Robinson bound. Indeed, the proof that ξ≲ T^-1 uses Lieb-Robinson bounds! Other recent work <cit.> has studied entanglement in thermal states. It is possible that these methods could be helpful in proving rigorous bounds on the butterfly velocity.
The authors of <cit.> have taken a somewhat different attempt to bound the butterfly velocity; however, their approach is not known to reproduce the desired scaling of (<ref>).
§ OPEN PROBLEMS
We have given a fairly detailed overview of Lieb-Robinson bounds, along with their known extensions and applications. Now, we conclude with a brief discussion and recap of interesting open problems and directions.
(1) As discussed in Section <ref>, we do not know how to bound the decay times of simple correlation functions. Solving this problem may lead to qualitatively new methods for locality bounds in quantum dynamics, and seems like an important issue to address in the near future.
(2) As we just discussed, bounds on finite temperature dynamics are both notoriously difficult (as are statements about even equilibrium properties such as entanglement!), yet they have been the inspiration for many of the important developments in this field in recent years. We hope that it is possible to generalize the Frobenius light cones described in Section <ref> to generic finite temperature Hamiltonian systems, but this is likely to be an extraordinary challenge. A particularly motivating problem would be a proof of the chaos bound of <cit.> in all-to-all interacting models, without ergodicity assumptions (see also <cit.>).
(3) It is not known how to prepare the W state (<ref>) as quickly as the GHZ state (<ref>), using both unitary dynamics and local measurement. We expect that it is provably harder to prepare W states. Whether or not a clever application of Lieb-Robinson bounds can prove this result or one needs a more fine-grained bound on multipartite entanglement, is an important open problem. More generally, we expect that deeper incorporation of Lieb-Robinson bounds into error-corrected quantum dynamics with measurement can be a fruitful endeavor.
(4) It would be interesting if the techniques of Section <ref> can rigorously address actively debated questions about the existence and robustness of many-body localization <cit.>.
(5) There is rather extensive literature on quantum walks <cit.>. Sometimes, this literature makes deep connections to the classical theory of random walks and Markov chains <cit.>, although certain notions such as hitting time have been delicate to extend to the quantum setting. It might be fruitful to revisit some of these questions with the recent developments of Section <ref> in mind.
(6) Recent work <cit.> uses cluster decomposition techniques (more well-known in equilibrium statistical mechanics) to study quantum dynamics. Combining these techniques with Lieb-Robinson bounds may be a fruitful direction for future research.
(7) Preparing squeezed states <cit.> is notoriously difficult in experiments, and we expect that Lieb-Robinson bounds, and the corresponding notions of locality, could help find efficient ways to generate highly squeezed states, likely using error correction as part of the protocol <cit.>.
(8) The linear-to-algebraic transition in the Frobenius light cone for power-law interactions (Section <ref>) remains open for d≥ 2 dimensions.
(9) Understanding whether there are any more general classes of interacting boson models where sharp Lieb-Robinson bounds can be derived in thermodynamically reasonable states is an important problem, especially since many future quantum computers (whose operation speed might be constrained by a Lieb-Robinson light cone) will contain bosonic degrees of freedom.
tocsectionAcknowledgments
§ ACKNOWLEDGMENTS
This work was supported in part by a Research Fellowship from the Alfred P. Sloan Foundation under Grant FG-2020-13795 (AL), and by the U.S. Air Force Office of Scientific Research under Grant FA9550-21-1-0195 (AL, CY).
JHEP
tocsectionReferences
|
http://arxiv.org/abs/2303.07053v1
|
20230313122238
|
Bandit-supported care planning for older people with complex health and care needs
|
[
"Gi-Soo Kim",
"Young Suh Hong",
"Tae Hoon Lee",
"Myunghee Cho Paik",
"Hongsoo Kim"
] |
stat.ML
|
[
"stat.ML",
"cs.LG"
] |
Tracing chirality from molecular organization to triply-periodic network assemblies:
Threading biaxial twist through block copolymer gyroids
Gregory M. Grason
Accepted xxxx xxxxxx xx. Received xxxx xxxxxx xx; in original form xxxx xxx xx
================================================================================================================================================
Long-term care service for old people is in great demand in most of the aging societies. The number of nursing homes residents is increasing while the number of care providers is limited. Due to the care worker shortage, care to vulnerable older residents cannot be fully tailored to the unique needs and preference of each individual. This may bring negative impacts on health outcomes and quality of life among institutionalized older people. To improve care quality through personalized care planning and delivery with limited care workforce, we propose a new care planning model assisted by artificial intelligence. We apply bandit algorithms which optimize the clinical decision for care planning by adapting to the sequential feedback from the past decisions. We evaluate the proposed model on empirical data acquired from the Systems for Person-centered Elder Care (SPEC) study, a ICT-enhanced care management program.
§ INTRODUCTION
The world’s population is aging rapidly. In 2050, one fifth of the population will be over 60 years and about 80% of the older people will be residing in Low- and Middle-Income Countries (LMICs) <cit.>. As the longevity is extended, long-term care needs of older people also increase dramatically. According to the recent OECD projection on the size of care workers needed in 2030 <cit.>, member countries anticipate severe shortage in number of care workers; in particular, South Korea experiencing the most rapid population aging needs about 140% increase of long-term care workers assuming the care demands would be the same in 2030 as in 2016. In fact, shortage in professional care workers and lack of competency of personal care workers have impeded improvement in care quality in long-term care system in Korea <cit.>. It will be a real challenge to meet the rapidly increasing needs of skilled care workers in Korea as well as other developed countries. For LMICs, long-term care is still highly dependent on family members often without relevant training and formal support. Given the big global challenge in caring vulnerable older people in aging societies, policy-makers and business sectors explore the potential of innovation, but empirical evidence is sparse so far. In this paper, we focus on the feasibility and applicability of artificial intelligence-assisted health care in nursing homes.
The care provision in nursing homes can be framed as an online sequential decision problem. Once a resident is admitted to a nursing home, the care provider decides which interventions to apply. Health outcomes of a patient will be affected by the interventions (s)he received. Care provider learns from these feedbacks and reinforces his(her) decision for the next admitted resident. Bandit algorithms <cit.> address the online decision problem. A learning agent faces a set of available actions (or arms) sequentially. The agent can execute only one action at a time, and receives a corresponding feedback (or reward). The expected value of the reward depends on the action executed and is unknown to the agent. The agent should learn the unknown values adaptively from the cumulated feedbacks. The goal of the agent is to reinforce the arm selection strategy sequentially so as to maximize the cumulative sum of rewards. We specifically focus on the contextual bandit problem, where side information called context is given on the reward and can be used when selecting the action. Popular contextual bandit algorithms include the Upper-Confidence Bound algorithm (LinUCB; <cit.>) and the Thompson Sampling algorithm for linear payoffs (LinTS; <cit.>) .
In this work, we propose a new care planning model assisted by LinUCB and LinTS. To evaluate the efficacy of care of the proposed framework, we analyze the data acquired from the Systems for Person-centered Elder Care (SPEC) study <cit.>. The SPEC study is a randomized controlled trial to examine the effectiveness of ICT-enhanced integrated care management on quality of care for older residents in nursing homes of South Korea. In the study, we analyze data of 278 residents from 10 nursing homes who participated in the SPEC program. The care plan for each resident was developed by one of 20 nurses (SPEC care managers) in the nursing homes through care planning meetings with his(her) multi-disciplinary team. The number of residents who were assigned to a care manager for care planning varied from 1 to 31. The feedback of reward is preventing the loss of activities of daily living (ADL), a very critical goal of nursing home care. The care to prevent ADL loss was provided as the combination of 20 different intervention items, which include assessing new acute health problems, risk factor management, referral to therapy specialists, setting the care priorities, etc. Among the 20 interventions, the minimum number of interventions applied to a resident was 1 and the maximum was 16. The care provider applied a combination of interventions based on the observed characteristics of the older resident such as age, sex, length of stay, cognition, and baseline ADL.
We apply the bandit algorithms on the data and compare their performance with that of the nurses (care managers).
§ ALGORITHMS
§.§ Settings
We assume that residents are admitted to nursing homes sequentially and at each time t, a patient with characteristics X_t is assigned to the agent. The covariate X_t includes the age, gender, length of stay, cognition level, baseline ADL score. Based on available information in X_t, the agent chooses an action, i.e., a combination of interventions, and applies it to the patient. We restrict the agent to choose the same number of interventions as was originally applied to the patient by the care provider. Also, we restrict the type of combinations to the ones that were realized in the data. For example, if a patient originally received 3 interventions, the action set that the bandit agent can choose from is a subset of the set of 203 possible combinations. Hence, the number of available actions changes with time t. We denote the number of available actions at each time t as N_t
and we denote the index of the chosen action as a(t). We also denote the reward of the i-th action for the resident at time t as r_i,t. Among r_1,t, r_2,t, ⋯, r_N_t,t, the agent observes only one reward, r_a(t),t. This is the binary value indicating the prevention of ADL loss (1: prevention/ 0: no prevention).
§.§ LinUCB and LinTS
LinUCB and LinTS assume that the reward follows a linear model with sub-gaussian errors as follows.
r_i,t=b_i,t^Tμ+ε_i,t.
The vector b_i,t denotes the context variable of the i-th action at time t. We assume that b_i,t is d-dimensional. We will specify the components of b_i,t in our study in later sections. The coefficient vector μ is an unknown d-dimensional vector and should be learned by the learning agent. The scalar error ε_i,t is assumed to be independent over i and t and to be sub-Gaussian with unknown variance. LinUCB is a bandit algorithm for linear payoffs proposed by <cit.>. At each time t , the algorithm updates the high-probability upper confidence bound (UCB) of the expected reward of each action and selects the action that has the highest value. The UCB of the i-th action at time t has the following form,
UCB_i(t)=b_i,t^Tμ̂(t)+α√(b_i,t^TB(t)^-1b_i,t),
for some positive constant α where
B(t)=λ I_d+∑_τ=1^t-1b_a(τ),τb_a(τ),τ^T
for some positive constant λ and d× d identity matrix I_d and μ̂(t) is the Ridge estimator of μ fitted on the context-reward pair of the selected actions up to time t-1, i.e.,
μ̂(t)=B(t)^-1∑_τ=1^t-1b_a(τ),τr_a(τ),τ.
This UCB is the sum of the current estimate of the reward and its uncertainty. Therefore, selecting the action with highest UCB means to select an action which has either a high estimate (“exploitation”) or high uncertainty (“exploration”). Exploration helps reducing the uncertainty related to that arm and it helps to make better choice in the future. Balancing between exploitation and exploration is crucial in achieving a high total reward. In LinUCB, this balance is controlled by the constant α. In <cit.>, authors derived the value of α which makes the UCB a tight bound that holds with high probability and consequently, guarantees of high cumulative rewards. This value is determined by various model parameters including the variance of the error and hence, is unknown to the learning agent. In practice, we need to tune this parameter by grid search. Bigger this value, more the algorithm will concentrate on exploration rather than exploitation. Exploration helps to learn the unknown rewards but does not help in maximizing the payoff. On the other hand, exploitation concentrates on maximizing the reward but may be misguided if the learning is not sufficient. Therefore, we should carefully tune this parameter in order to achieve our ultimate goal, maximizing the cumulative sum of rewards.
LinTS is similar to LinUCB, except that it uses Bayesian ideas to control the exploitation-exploration tradeoff. LinTS makes an additional assumption that the noise of the reward is normally distributed and selects the action randomly according to the posterior probability that it is the best arm, i.e., the arm that has the highest expected reward. Under the assumption that the prior distribution of μ is 𝒩(0_d,v^2I_d) where 0_d is a zero-valued d-dimensional vector and the error is normal 𝒩(0,v^2) for some positive constant v, it can be shown that the procedure is equivalent to sampling μ̃(t) from a multivariate normal distribution 𝒩(μ̂(t),v^2B(t)^-1) and then selecting the arm with highest value of b_i,t^Tμ̃(t). Note that when μ̃(t)∼𝒩(μ̂(t),v^2B(t)^-1), then b_i,t^Tμ̃(t) ∼𝒩(b_i,t^Tμ̂(t),v^2b_i,t^TB(t)^-1b_i,t). Here, we can observe that the standard deviation of the distribution is equivalent to the uncertainty term in LinUCB. The value v is analogous to the value α in the LinUCB and is also a hyper parameter to tune.
§ METHODS OF EXPERIMENTS
§.§ Preprocessing of the data
§.§.§ Inherent incompleteness of real data
The data constitutes of the covariates, intervention types, and the indicator of ADL loss prevention of 278 patients in 10 nursing homes, who participated in the six-month SPEC intervention study from April 2015 to December 2016 (a total of 21 months trial). The covariates X_t of the t-th patient include the age, gender, cognition, ADL, and additional variables (hearing, depression, pain, comorbidities, number of comorbidities) of older residents. A resident could receive a subset of 20 different interventions. We made a binary indicator I_k(t) for the k-th intervention to indicate whether or not it was provided to the t-th patient. Among the residents, 13.3% experienced ADL loss.
A challenge in applying the bandit algorithm to this dataset is that the reward from every action is not observed. For example in our dataset, for each patient incoming at time t, only one action that a nurse/care team selected is realized and the rewards of the other N_t-1 actions are unobserved. We denote the missing rewards as counterfactuals, as they are the outcomes that would have been observed if a different action had been applied. That is, for each t, only r_ã(t),t is observed among r_1,t, r_2,t, ⋯, r_N_t,t where ã(t) denotes the realized action in the dataset. Therefore, if the action choice of the bandit algorithm does not match the one that is realized, i.e., if ã(t)≠ a(t), we cannot provide any feedback to the algorithm.
§.§.§ Synthesis of `full’ data
To circumvent this problem, we impute the missing rewards for each patient using a machine learning model which fits the data well. To find the best model, we fitted Support Vector Machine (SVM; <cit.>), Random Forest (RF; <cit.>), and Light Gradient Boosting Machine (LGBM; <cit.>) to the data using the observed binary reward r_ã(t),t as outcome and the X_t and intervention indicators I_1(t), I_2(t), ⋯, I_20(t) as covariates. For the SVM, we used either the linear or radial basis function kernel kernel. For RF, we tried different combinations of number of trees, maximum number of features used to split the nodes and the maximum depth of the trees. For LGBM, we tried different combinations of number of trees, number of leaves, maximum depth, learning rate, L1 penalization and L2 penalization parameters. Also for all the models, we implemented two different versions, one that upweights the samples in the minority class with r_ã(t),t=0 and the other which uses equal weights.
We compared the Area Under the ROC Curve (AUC) using a 5 fold cross-validation samples. The LGBM with 50 trees, 30 leaves, maximum depth 20, learning rate 0.1 using upweighting and with both L1 and L2 regularizations achieved the highest AUC, 0.65284. After selecting the model, we refitted the model on the whole data using the same hyperparameters.
We verified that by setting the classification threshold to 0.26, our model achieves training accuracy 0.996. Thus, we consider our model as one possible scenario that might have generated the observed rewards. From the next section, we treat this model as the true model that should be learned by bandit algorithms. We emphasize that the goal of this process is to synthesize a ‘full’ real data including the rewards for the arms that the real setting did not choose.
§.§ Application of bandit algorithms
We applied both LinUCB and LinTS to the fully imputed data. We randomly sampled one patient at a time (allowing repetition) to simulate the situation where patients are admitted to a nursing home sequentially. Each time a resident comes in, LinUCB and LinTS select a subset of 20 interventions respectively, receive the corresponding rewards (provided by the LGBM in Section <ref>), and update the estimates μ̂(t) and B(t), which are used in the action selection at the next step. Then the next older resident (randomly sampled) comes in and the process is repeated.
To describe the procedure in detail, we introduce new notations. We let I^i=[I^i_1, I^i_2, ⋯, I^i_20]^T denote the set of the 20 binary indicators of the interventions for the i-th action, i.e., the i–th combination among the N_t possible combinations. We let X̃_t be the subset of the full covariates X_t which includes only the age, gender, length of stay, cognition, and baseline ADL of a resident. We assume that only X̃_t is observed and the remaining variables in X_t are not available to the learning agent so cannot be used for action selection. Note that in Section <ref>, we used the full covariates X_t to fit the LBGM. This is because the LGBM was used to impute the missing rewards, not to make an action decision.
We ran two versions of each algorithm depending on the linear model that the algorithm assumes. The first version assumes that the reward model is
r_i,t=X̃_t^Tμ_1+I^iTμ_2+ε_i,t
and second version assumes
r_i,t=X̃_t^Tμ_1+I^iTμ_2+(X̃_t ∘ I^i)^Tμ_3+ε_i,t,
where X̃_t ∘ I^i denotes the set of all possible interaction terms between X̃_t and I^i. In the first model, b_i,t=[X̃_t^T, I^iT]^T and μ=[μ_1^T, μ_2^T]^T. In the second model, b_i,t=[X̃_t^T, I^iT, (X̃_t ∘ I^i)^T]^T and μ=[μ_1^T, μ_2^T, μ_3^T]^T.
In the first model, the best action is identical for all patients irrespective of the patient characteristics. The effect of the X̃_t on the reward is only additive to the intervention indicators. On the other hand, in the second model, the best action is allowed to vary according to the patient characteristics. This allows personalized care by the bandit algorithm.
The second model includes the first model as a special case, and hence is more flexible. However, the second model has more parameters to learn (the coefficients of the interaction terms), so the optimization can be much slower than the first model. In the bandit setting, fast learning is one of the desired properties, especially when the time horizon is small. We compare the performance of the two algorithms, and compare it with the performance of the nurses (care manager).
We tuned the hyperparameters – α in LinUCB and v in LinTS – by grid search. We tried 3 different candidate values, 0.1, 0.3, and 0.5, and chose the value that resulted in highest cumulative reward.
§ RESULTS
We observe the regret of each algorithm which is defined as regret(t)=r_a^*(t),t-r_a(t),t at each time t , where a^*(t) is the optimal action, i.e., the action which achieves the highest reward. Figure <ref> shows the cumulative regret of LinUCB and LinTS for each version of the models according to 3 different values of the hyper parameters. For each of the 4 cases, we chose the best value of the hyper parameter and used them to generate Figure <ref>.
Figure <ref> depicts the cumulative regret of the bandit algorithms for each version of the model along with a purely random algorithm and the nurses’s decision. The care manager's decision corresponds to the realized action in the dataset, i.e., ã(t). Interestingly, we can observe that up to the 21st patient, the nurses’ performance is the best, but the bandit algorithms start to outperform as soon as they learn the reward model. In this experiment, LinUCB appears to perform better than LinTS. Among the two versions of the reward model, the second one which assumes interaction effects between the intervention and the patient characteristics outperforms the other one. Further study on the performance of the two algorithms may be required.
§ DISCUSSION
This study supports the idea that bandit algorithms may help shortage of human experts by assisting tailored care planning for each older person with complex care needs.
The algorithm learns the feedback mechanism systematically. At the beginning of the deployment, the model has high uncertainty and the algorithm concentrates on exploring the large action space to collect data that help reduce the uncertainty. As data accumulate, the learned model converges to the true model and the algorithm concentrates on exploitation, maximizing the rewards. This systematic care planning model can help human care managers to decrease unnecessary variation in their performance.
While the experiment results in this paper are promising, discussions on safety should be intensively conducted before deploying bandit algorithms in health care settings. Bandit algorithms require sufficient exploration of the action space to accelerate the learning process. Consequently, the algorithm suffers higher regret than skilled care providers at the beginning of the deployment. While any intervention considered in this study is unlikely to have bad effect on the residents, so that applying a different action from the optimal one would hardly result in dangerous outcomes, there could be other health care settings where such unrestricted exploration could cause adverse events. Future work on bandit algorithms with safety constraints or blending the knowledge of the skilled care providers to the bandit algorithm would be beneficial.
Further studies are guaranteed to advance AI-assisted care decision-support under conditions with limited human and financial resources. This study has focused on a single critical outcome, prevention of late loss of ADL; but further studies can apply bandit care models for other important outcomes related to the well-being of frail older people, such as cognitive decline, delirium, and/or behavioral problems. Future studies can also develop prediction models for multiple outcomes, which are more likely in real-world care settings, where older people have two or more care needs and nurses make care decisions for complex care needs simultaneously.
plainnat
|
http://arxiv.org/abs/2303.07124v1
|
20230313135612
|
Dimensional Analysis of Vapor Bubble Growth Considering Bubble-bubble Interactions in Flash Boiling Microdroplets of Highly Volatile Liquid Electrofuels
|
[
"Avijit Saha",
"Abhishek Y. Deshmukh",
"Temistocle Grenga",
"Heinz Pitsch"
] |
physics.flu-dyn
|
[
"physics.flu-dyn"
] |
mymainaddress]A. Sahamycorrespondingauthor
[mycorrespondingauthor]Corresponding author
[email protected]
mymainaddress]A. Y. Deshmukh
mymainaddress,mysecondaryaddress]T. Grenga
mymainaddress]H. Pitsch
[mymainaddress]Institute for Combustion Technology, RWTH Aachen University, Aachen, Germany
[mysecondaryaddress]Faculty of Engineering and Physical Science, University of Southampton, Southampton, United Kingdom
Electrofuels (e-fuels) produced from renewable electricity and carbon sources have gained significant attention in recent years as promising alternatives to fossil fuels for the transportation sector. However, the highly volatile e-fuels, such as short-chain oxymethylene ethers (OME_x) are prone to flash vaporization phenomena, which is associated with the formation and growth of vapor bubbles, followed by explosive bursting of the liquid jet. This phenomenon is important in many practical applications, for example, superheated liquid sprays in gasoline direct injection engines as well as cryogenic engines. The simulation of a flash boiling spray of such highly volatile liquid fuels is numerically challenging due to several reasons, including (1) the complexity of the bubble growth process in the presence of multiple vapor bubbles and (2) the need to use an extremely small time step size to accurately capture the underlying physics associated with the flash boiling process. In this paper, we first present a bubble growth model in flash boiling microdroplets considering bubble-bubble interactions along with the finite droplet size effects. A dimensional analysis of the newly derived Rayleigh-Plesset equation (RPE) with bubble-bubble interactions is then performed for Reynolds numbers of different orders of magnitude to estimate the relative importance of different forces acting on the bubble surface. Based on this analysis, a simplified nondimensional semi-analytical solution for bubble growth, which also includes the bubble-bubble interactions, is derived to estimate the bubble growth behavior with reasonable accuracy using the larger time step sizes for a wide range of operating conditions. The derived semi-analytical solution is shown to be a good approximation for describing the bubble growth rate over the whole lifetime of the bubble, thus making it useful for simulations of superheated sprays with large numbers of droplets and even more bubbles. The bubble-bubble interactions are found to have a significant impact on the bubble growth dynamics and result in delaying the onset of droplet bursting due to the slower growth of the vapor bubble compared to the bubble growth without bubble-bubble interactions. Furthermore, in a comparison with DNS results, the proposed bubble growth model is shown to reasonably capture the impact of bubble interactions leading to smaller volumetric droplet expansion.
Flash boiling Bubble-bubble interactions Bubble growth Bubble dynamics Reduced-order model E-fuels
Electrofuels (e-fuels) produced from renewable electricity and carbon sources have gained significant attention in recent years as promising alternatives to fossil fuels for the transportation sector. However, the highly volatile e-fuels, such as short-chain oxymethylene ethers (OME_x) are prone to flash vaporization phenomena, which is associated with the formation and growth of vapor bubbles, followed by explosive bursting of the liquid jet. This phenomenon is important in many practical applications, for example, superheated liquid sprays in gasoline direct injection engines as well as cryogenic engines. The simulation of a flash boiling spray of such highly volatile liquid fuels is numerically challenging due to several reasons, including (1) the complexity of the bubble growth process in the presence of multiple vapor bubbles and (2) the need to use an extremely small time step size to accurately capture the underlying physics associated with the flash boiling process. In this paper, we first present a bubble growth model in flash boiling microdroplets considering bubble-bubble interactions along with the finite droplet size effects. A dimensional analysis of the newly derived Rayleigh-Plesset equation (RPE) with bubble-bubble interactions is then performed for Reynolds numbers of different orders of magnitude to estimate the relative importance of different forces acting on the bubble surface. Based on this analysis, a simplified nondimensional semi-analytical solution for bubble growth, which also includes the bubble-bubble interactions, is derived to estimate the bubble growth behavior with reasonable accuracy using the larger time step sizes for a wide range of operating conditions. The derived semi-analytical solution is shown to be a good approximation for describing the bubble growth rate over the whole lifetime of the bubble, thus making it useful for simulations of superheated sprays with large numbers of droplets and even more bubbles. The bubble-bubble interactions are found to have a significant impact on the bubble growth dynamics and result in delaying the onset of droplet bursting due to the slower growth of the vapor bubble compared to the bubble growth without bubble-bubble interactions. Furthermore, in a comparison with DNS results, the proposed bubble growth model is shown to reasonably capture the impact of bubble interactions leading to smaller volumetric droplet expansion.
§ INTRODUCTION
The growth of a vapor bubble in a liquid is of great interest in the study of superheated boiling phenomena, e.g., flash boiling in gasoline direct injection engines and cryogenic engines. Generally, a bubble undergoes four different growth stages, i.e., (1) surface tension-controlled (ST) stage, (2) transition (T) stage, (3) inertia-controlled (IC) stage, and (4) thermal diffusion-controlled (TD) stage <cit.>. The bubble grows very slowly in the initial growth stage, which is mainly dominated by the surface tension force. A significant growth starts in the later ST-period due to strong positive thermal feedback from the surrounding superheated liquid. The transition growth stage is limited by both surface tension and inertia forces. As the bubble grows sufficiently large, in the IC-stage, the surface tension force diminishes, and only the inertial force limits the growth rate. Once the inertial forces tend towards zero, in the TD-stage, only the thermal diffusion acts as a rate-limiting factor for the bubble growth. It is to be noted that in cases, where the liquid inertial force is not sufficient to balance the pressure difference at the bubble surface, thermal diffusion along with the surface tension control the growth in the transition stage <cit.>, which thus connects the surface tension and thermal diffusion-controlled growth stages. Several numerical studies are available in the literature, which simulate all the growth stages that a vapor bubble undergoes during its lifetime, such as <cit.>, <cit.>, <cit.>, and <cit.> to name a few. <cit.> developed a simple theory of bubble growth assuming temperature equilibrium at the liquid-vapor interface and a linear temperature drop across a thin thermal boundary layer surrounding the bubble surface. <cit.>, <cit.>, and <cit.> proposed similar bubble growth models by relaxing the assumption of the linear temperature drop across the thin thermal boundary layer. They numerically solved a one-dimensional energy equation together with the one-dimensional momentum equation such that the temperature gradient at the liquid-vapor interface can be obtained from the computed temperature field. The bubble evolutions predicted by their models were in good agreement with the experimental measurements. The numerical studies described above were performed to simulate the growth of a single vapor bubble in a homogeneous infinite liquid medium. The liquid expansion and disruption phenomena were not considered in these studies. However, for flash boiling spray in automotive or cryogenic engines, multiple bubbles can be present inside superheated liquid droplets. As the vapor bubbles grow, the droplets continue to expand and can eventually rupture into smaller child droplets once a critical void fraction is reached. To explore the effect of the presence of multiple bubbles and the droplet disruption phenomena, <cit.> simulated the flash boiling in a superheated single droplet of dimethyl ether (DME) using the boiling explosion model derived by <cit.>. They reported that the boiling explosion time becomes shorter for higher fuel temperatures and lower ambient pressures. <cit.> recently proposed a reduced-order model (ROM) for simulating the flash boiling of a superheated single droplet of highly volatile e-fuels with multiple monodisperse vapor bubbles under subatmospheric operating conditions. They also investigated the detailed underlying physics associated with the growth of vapor bubbles. The effect of bubble-bubble interactions is crucial in determining the growth characteristics of vapor bubbles in superheated microdroplets. <cit.> performed a direct numerical simulation (DNS) of bubble clusters to quantify the effects of bubble-bubble interactions in comparison with the single bubble growth for liquid oxygen (LOx) in different simplified configurations. They reported a significant reduction (more than 70%) in the growth rate of the vapor bubbles located near the center of the LOx jet. These bubbles were found to have a negligible contribution to the volumetric expansion of the liquid jet. However, such fully-resolved simulations for accurate predictions of the bubble growth characteristics in multibubble environments are not feasible for large-scale spray simulations due to the high computational cost. A ROM considering the bubble-bubble interactions is thus necessary in this regard. The studies available in the literature mainly focus on the reduced-order modeling of the bubble-bubble interactions in the context of cavitation phenomena (such as <cit.>, <cit.>, <cit.>, <cit.>, <cit.>, <cit.>, and <cit.>, to name a few). In contrast, studies on reduced-order modeling of flash boiling of single droplets are still scarce in the literature. Although there are plenty of studies on flash boiling ROMs of single droplets and spray available in the literature (such as <cit.>, <cit.>, <cit.>, <cit.>, <cit.>, <cit.>, <cit.>, <cit.>, <cit.>, and <cit.>, to name a few), none of them considered the effect of bubble-bubble interactions in their study.The time-step size is another important factor in the simulation of the flash boiling phenomena of high-volatility liquid fuels. In a previous study by the current authors <cit.>, a fixed time-step size of one nanosecond (𝒪(10^-9 s)) was used to simulate the flash vaporization phenomena of highly volatile e-fuel microdroplets. Yet, it was found that this time-step size is still insufficiently small when considering bubble-bubble interactions for high-volatility fuels. Thus, the computational cost will also increase for the simulation of the large-scale spray case consisting of millions of single droplets.A universal correlation or a simplified analytical solution for the bubble growth rate throughout the whole bubble lifetime, which also considers all the complex physical processes including bubble-bubble interactions occurring during the flash vaporization of a superheated single droplet, would be useful for the accurate and computationally efficient simulation of the large-scale spray case.Previous studies were mainly focused on the derivation of the analytical formulation and correlation for the single vapor-bubble growth in an infinite superheated liquid medium only at later growth stages, such as IC and TD growth <cit.>. <cit.> proposed an analytical solution for bubble growth by neglecting the viscous effect and the cooling effect of vaporization as
d/dt=(2/3-/)^1/2,
where is the bubble radius, t the time, and the liquid pressure. and are the saturated liquid density and vapor pressure, respectively, at bulk liquid temperature . eqn:rayleigh is referred to as inertia-controlled growth and provides a good description of bubble dynamics for sufficiently large initial superheating degrees or sufficiently low system pressures. <cit.> later obtained an asymptotic solution of bubble growth controlled by the thermal diffusion effect as
d/dt=1/2(12/π t)^1/2(-())/,
where is the thermal diffusivity of the liquid and the liquid specific heat capacity. and denote the latent heat and saturated vapor density at saturation temperature, , respectively. The time t in eqn:pless is measured from the onset of nucleation of the bubble. The range of applicability of the analytical works described above is limited to the later stages of bubble growth when the radius is much larger than the critical radius defined as
=2σ()/ -,
where σ is the surface tension.In order to correlate the bubble radius as a function of time in terms of nondimensional parameters, <cit.> derived the reference length and time scales by requiring the nondimensionalization to be reasonable for both eqn:rayleigh and eqn:pless, which leads to
= B^2/A, =B^2/A^2,
with
A =(2/3-/)^1/2, B=Ja (12/π)^1/2,
where Ja is the Jakob number defined as
Ja=(-())/.
The nondimensional radius and time are then expressed as
= / and =t/.
<cit.> reported an analytical formulation for bubble growth rate by combining eqn:rayleigh and eqn:pless in terms of nondimensional parameters proposed by <cit.> as
d/dt^*=√(t^*+1)-√(t^*).
The scaling proposed by <cit.> works well only in the later period of the bubble lifetime when the growth is mainly controlled by inertia or thermal diffusion effect. <cit.> later attempted to derive an approximate law of bubble growth based on the theory provided by <cit.> for the bubbles that have grown sufficiently large beyond their critical radius, at least by about an order of magnitude. In addition, they also defined a more general scaling law, which was expected to work also in the surface tension-dominated growth phase, However, the detailed analysis of this scaling law was not reported as they found it to be of less practical interest compared to the former one. The scaling relationships proposed by <cit.> are given in <ref>.The surface tension-controlled growth may become relevant to automotive or cryogenic engine applications, such as injecting superheated liquid fuel into a combustion chamber. Here, the lifetime of the vapor bubbles becomes much shorter as the liquid jet undergoes bursting phenomena once the critical void fraction is reached <cit.>. <cit.> reported that for moderate to high superheating degrees, the onset of droplet burst times, t_b, for highly volatile e-fuel microdroplets are in the order of 𝒪(t_b)≈10^-6-10^-7 s. For the lower superheating degree case, the order of magnitude increases to 𝒪(t_b)≈10^-4 s. Due to the shorter droplet lifetime, the initial surface tension-controlled growth phase of the vapor bubbles becomes equally important to the inertia, transition, and thermal diffusion-controlled growth phases. This is because the shorter the ST growth stage is, the earlier the significant bubble growth starts and vice-versa, thus influencing the bubble-growth characteristics in the later bubble growth stages as well. However, the influence of the ST growth stage on the bubble dynamics becomes negligible when the bubble grows for a long period <cit.>.Recently, <cit.> derived two different analytical solutions for the vapor bubble growth rate in superheated single droplets for high and low Reynolds numbers (Re) using a similar general scaling law to that proposed by <cit.>, but neglected the bubble-bubble interactions in their study. The analytical solutions derived by <cit.> are provided in <ref>.Along these lines, the objectives of this paper can be summarized as follows: (1) to propose a modified Rayleigh-Plesset equation (RPE) for characterizing the growth of vapor bubbles in superheated microdroplets considering bubble-bubble interactions; (2) to highlight the limitations of the numerical solver for simulating the bubble growth with the newly derived RPE in a flash boiling single droplet of highly volatile liquid fuels; (3) to analyze the effect of bubble-bubble interactions on the growth characteristics of the vapor bubbles in superheated microdroplets; (4) to explore a scaling law for evaluating its capability of describing the different bubble growth stages including ST, T, IC, and TD growth for a flash boiling single droplet; and (5) to derive a semi-analytical solution in terms of nondimensional parameters for the bubble growth considering the bubble-bubble interactions to describe the bubble evolution with reasonable accuracy in different growth phases. The manuscript is organized as follows: in Section <ref>, first, we present the bubble growth models for superheated microdroplets with and without considering bubble-bubble interactions. Next, we provide the nondimensional formulations of the governing equations. The details of the computational setup and the solution procedure are shown in Section <ref>. The performance of the proposed bubble growth model is compared with that of the DNS results by <cit.> in Section <ref>. Section <ref> outlines the results from the numerical simulations. Finally, the findings are summarized in Section <ref>.
§ THEORETICAL FORMULATIONS
10pt
The conventional Rayleigh-Plesset equation (RPE) <cit.> is often used to describe the temporal dynamics of a single vapor bubble in a superheated liquid medium. However, the conventional RPE needs to be modified for the flash boiling microdroplets containing multiple bubbles, where the interaction among bubbles significantly alters the bubble dynamics <cit.>. In this study, we first derive the modified RPE considering the bubble-bubble interactions along with the finite-size effects of the flash boiling microdroplets. In this section, first, we discuss the governing equations of the single isolated vapor bubble growth in an infinite liquid medium and in a finite-size superheated microdroplet. Next, we describe the equations governing the vapor bubble growth in superheated microdroplets considering the bubble-bubble interactions. Finally, we present the nondimensional form of the governing equations.
§.§ Single isolated vapor bubble growth
10pt
The growth rate of an isolated spherically symmetric vapor bubble in a homogeneous infinite liquid medium can be estimated using the conventional RPE as <cit.>
()-_ = d^2/ d t^2_+3/2(d/ d t)^2_+4/d/d t_+2 σ/_,
where (t) denotes the instantaneous vapor bubble radius and the liquid viscosity. The physical parameters of RPE1 are evaluated at , which is assumed to be equal to the liquid temperature at the liquid-vapor interface <cit.>. In RPE1, describes the difference between saturated vapor pressure inside the vapor bubble and liquid pressure acting on the bubble surface, the pressure due to liquid viscosity, and the pressure due to the surface tension force at the liquid-vapor interface. and are the hydrodynamic pressures induced by the surrounding liquid due to the bubble surface acceleration and velocity, respectively. In this study, we denote the total hydrodynamic pressure for the bubble growth without bubble-bubble interactions as =+.For a finite-size single droplet in a quiescent gaseous medium, the conventional RPE can be modified as
()-=[(1-/) d^2/ d t^2+(3/2-2 /+^4/2 ^4)(d/ d t)^2]+4 μ_l/d/ d t+2σ/,
where (t) denotes the instantaneous droplet radius. In comparison with the conventional RPE shown in RPE1, RPEtrl includes additional inertia terms on the right-hand side given by -(^2/)(d^2/dt^2) and {-2/+^4/(2^4)}(d/dt)^2. in RPEtrl is given by the mechanical balance between the liquid and the surrounding gas phase as
=+2 σ/,
where is the surrounding gas pressure. Substituting into RPEtrl yields
()-_=(1-/) d^2/ d t^2_+(3/2-2 /+^4/2 ^4)(d/ d t)^2_+4 μ_l/d/ d t_+2 σ(1/+1/)_.
It is to be noted that the RPE2 is valid only for a single isolated vapor bubble inside a superheated single droplet.
§.§ Vapor bubble growth in a multibubble environment
10pt
In reality, there are multiple bubbles inside the droplet. Thus, the bubble growth rate is also influenced by the interaction between the individual bubbles. Considering the bubble-bubble interactions, the RPE in RPE2 is modified as
()-=[d/d t(∑^2/d/ d t)+(1-/) d^2/ d t^2+(3/2-2 /+^4/2 ^4)(d/ d t)^2]
+4 /d/ d t
+2 σ(1/+1/),
where the first term on the right-hand side of RPE3 represents the pressure, , acting on the target bubble surface induced by all the other bubbles. The distance is measured from the center of the i-th bubble to the center of the target bubble. The bubbles are assumed to be monodisperse in this study. For simplicity, it is also assumed that the bubbles remain sufficiently far away from each other such that the interactions among the boundary layers across the bubble surface can be neglected <cit.> and the relative position of the bubbles remain unchanged during the vaporization process. A schematic model of the bubble-bubble interactions is shown in Schm_Int.
The detailed derivation of is given in <ref>. can be rearranged as follows <cit.>
d/d t[∑^2/d/ d t]=d/d t[^2d/ d t∑1/]=d/d t[^2d/ d t∫_0^1/r(n d v)],
where n denotes the number density of the vapor bubbles and n d v the total number of bubbles in an infinitesimal volume of the droplet, dv.Assuming heterogeneous nucleation due to air as dissolved gas, the number density of the vapor bubble nuclei can be estimated using the approximation suggested by <cit.> as
n=5.757 × 10^12·exp(-5.279 K/Δθ),
where Δθ denotes the superheating degree defined as Δθ = -(), with the droplet bulk temperature and the droplet boiling temperature at .The integration over the sphere of influence () in prss1 yields
d/d t[^2d/ d t∫_0^1/r(n d v)] =d/d t[^2nd/ d t∫_0^1/r 4 π r^2 d r]
=d/d t[2π^2 nd/ d t^2]
=2 π n [{d^2/ d t^2+2(d/ d t)^2}+2 ^2(d/ d t)(d/ d t)],
where it is assumed that the number of vapor bubbles in the droplet remains constant during the flash vaporization process. Substituting prss2 into RPE3 and rearranging the terms, the modified RPE for spherically symmetric vapor bubbles in a single droplet of radius considering the bubble-bubble interactions is written as
()-_=(1-/+2 π^2 n ) d^2/ d t^2_+(3/2-2 /+^4/2 ^4+4 π^2 n )(d/ d t)^2_+4/d/ d t_
+4 π n ^2(d/ d t)(d/ d t)_+2 σ(1/+1/)_,
where the superscript ` ' ' denotes the modified pressures acting on the bubble surface for the bubble growth considering the bubble-bubble interactions. The new pressure term, , is the contribution to the total hydrodynamic pressure () due to the expansion velocities of both the bubble and the droplet. is thus expressed as =++.In this study, the droplet is considered much larger than the vapor bubbles (≫). Thus, the second term of can be neglected, since the order of magnitude of the bubble to droplet radius ratio, /, remains very small compared to the first and third terms. Similarly, the contribution from the second and third terms of also becomes negligible with respect to the first and fourth terms and hence can be neglected. The second term of can also be neglected, since 1/≫1/. The resulting simplified RPE after neglecting the above-mentioned terms is given as
()-_=ρ_l(1+2 π^2 n ) d^2/ d t^2_+(3/2+4 π^2 n )(d/ d t)^2_+4 /d/ d t_
+4 π n ^2(d/ d t) (d/ d t)_+2σ/_.
The saturated vapor temperature, , is obtained by solving the implicit relation as <cit.>
W/d/d t+/3d/d t( W/)=-/δ,
where W is the molecular weight of the fluid, the liquid thermal conductivity, and the universal gas constant. δ in eqn:vap_tmp denotes the thickness of the thin thermal boundary layer adjacent to the bubble surface defined as <cit.>
δ=(π t/3)^1/2.
The energy flux at the liquid-vapor interface causes the liquid to vaporize and creates a pressure difference, which is then balanced in the RPE by the hydrodynamic terms (IC growth stage), the surface tension term (ST growth stage)), or both (T stage).In this study, the vapor bubbles are assumed to grow until a critical void fraction value is reached. The void fraction, ε, is defined as <cit.>
ε=V_bubble/V_bubble+V_droplet,
where V_droplet describes the volume of the liquid droplet and V_bubble the total volume of the vapor bubbles. The droplet is considered to burst once the void fraction exceeds its critical limit (ε≥ε_crit). The critical void fraction value of 0.55 is chosen here for all simulated test cases <cit.>.
§.§ Nondimensionalization of the governing equations
10pt
The RPE is nondimensionalized using the critical bubble radius, , as the length scale, A as the velocity scale (eqn:LienAB), and the time scale, =/A <cit.>:
_k =R_k/, Ṙ_k^+ = Ṙ_k/A, =t/, =/;
=/, =P/ A^2, =σ/σ_0, =n^3,
where the subscript `k' can be replaced by subscripts `d' and `b' for droplet and bubble quantities, respectively. The superscript ‘+’ denotes the nondimensional quantities and the subscript ‘0’ represents the initial values.The resulting nondimensional RPE for a spherically symmetric vapor bubble, considering the bubble-bubble interactions, in a finite-size single droplet of radius is given as
-_=(1+2 π) d^2/ dt^+2_+(3/2+4 π)(d/ d)^2_+4//Red/ d_
+4 π(d/ d) (d/ d)_+2/We1/_.
RPEndwB can be simplified for the bubble growth without bubble-bubble interactions as
-_ =d^2/d_+^+3/2(d/d)^2_+4//Red/d_+2 /We1/_.
Re and We are the Reynolds number and Weber number defined as
Re=ρ_l A R_c/μ_l0.5cmand0.15cm We=ρ_l A^2 R_c/σ_0=4/3.
The derivation of the nondimensional RPE with and without bubble-bubble interactions is given in <ref>.
§ NUMERICAL METHODOLOGY
In this work, a square box of size 0.54 m × 0.54 m × 0.54 m with no-slip walls is chosen as the simulation domain. The schematic of the simulation domain is shown in Schm. A superheated single droplet with a diameter of 200 m is placed at the center of the domain. Although a spherical droplet is introduced into a three-dimensional computational domain, the complete problem is reduced to the solution of an ordinary differential equation in zero dimension by assuming the spherical symmetry of the droplet and considering the surrounding flow field as frozen.
The droplet is considered to be stationary. Inert gas nitrogen is used as an ambient medium and the chemistry in the gas phase is neglected. The temperature and pressure inside the liquid droplet are assumed to be homogeneous. The vaporization from the droplet's external surface is neglected in this study due to its negligible contribution compared to internal vaporization. The reader is referred to <cit.> for a more detailed discussion regarding coupled internal and external vaporization under superheated operating conditions. It is to be noted that the size of the square box and the subsequent spatial discretization were chosen such that they have no influence on the bubble dynamics presented in this study due to the assumptions of the frozen surrounding flow field.
The nondimensional RPEs are advanced using a fixed time-step second-order Runge-Kutta (RK) scheme. RPEndwB is solved for the case with bubble-bubble interactions. Whereas for the case without bubble-bubble interactions, eqn:nd_RPE1 is solved assuming monodisperse vapor bubbles of the number density of n in an infinitely large single droplet (≫). The bubble growth is initiated by perturbing the bubble critical radius, , by 10^-4%. A detailed discussion on the influence of initial perturbation on the bubble dynamics has been provided by <cit.> and <cit.>. The temperature inside the vapor bubble, , is obtained by iteratively solving eqn:vap_tmp using the Newton-Raphson method.
§ MODEL VALIDATION
Ideally, the proposed ROM needs to be validated at a microscopic level in two steps. First, the validation with experimental measurements of single isolated vapor bubbles is required to ensure that the model is able to accurately capture the single bubble growth in a superheated liquid medium. In the second step, the validation must be performed using flash boiling single droplet experimental measurements in the presence of multiple bubbles. The present model has already been validated in a previous publication <cit.> at the single isolated bubble level, which is shown here for completeness in <ref>, and a further comparison with the single isolated bubble simulation by <cit.> will be shown in the following. Additionally, the performance of the proposed reduced-order bubble growth model with bubble-bubble interactions is compared against the DNS of multiple bubbles with variable expansion rate performed by <cit.> in terms of the volumetric expansion of a superheated LOx fuel droplet. A single droplet including 221 vapor bubbles was simulated for this purpose. The initial perturbation in was chosen based on their single isolated bubble reference solution. The volume of the droplet was considered to be equivalent to that of the cylindrical liquid jet of <cit.>. DNSVald2 depicts the comparison of the nondimensional volumetric expansion of the LOx droplet for the isolated bubble and the bubble-bubble interaction case with the DNS results. For the single isolated bubble simulations, both the DNS and the ROM predict a similar volumetric expansion of around 75 %, as can be seen from DNSVald2. It is observed that the present ROM predicts a volumetric droplet expansion of around 7.5 % for the case with bubble-bubble interactions, whereas the multibubble DNS with variable expansion rate results in approximately a 5 % increase in the volume of the liquid jet. This demonstrates the strong impact of bubble interactions in the present case. The simulation is continued only up to t=0.45s, as this marks the minimum time required to the onset of bubble merging for the <cit.> case. The resulting overprediction from the ROM in the volumetric expansion for the bubble-bubble interactions case is reasonably small compared with the total effect of bubble interactions and can be attributed to the assumptions considered in its derivation such as spherically symmetric monodisperse vapor bubbles and homogeneous pressure and temperature distribution in the liquid droplet. Overall, it can be concluded that the proposed ROM is capable of predicting the considerably smaller volume expansion in presence of the bubble-bubble interactions with reasonable accuracy.
At a macroscopic scale, the present bubble growth model could be validated by applying it to the primary breakup simulation of the flash boiling spray case and comparing the droplet size distributions in the near-nozzle regime obtained from the simulations with the experiments. This validation at a macroscopic level is beyond the scope of the present article and will be left for future work.
§ RESULTS AND DISCUSSION
10pt
In order to accurately and efficiently describe the vapor bubble growth rate in superheated microdroplets, it is necessary to consider the following three sub-problems: (1) the limitations of the numerical solver, (2) the influence of bubble-bubble interactions, and (3) nondimensional analysis of vapor bubble growth. In this section, considering high volatility e-fuels, such as short-chain oxymethylene ethers (OME_x) as a generic example, first, the issues related to the use of large time-steps are illustrated for the simulation of highly volatile liquid fuels under various operating conditions considering the bubble-bubble interactions. Next, the influence of the bubble-bubble interactions on the dynamics of the vapor bubble growth in superheated microdroplets is described. Then, the applicability of different scaling laws in describing the bubble growth in a flash boiling single droplet is highlighted under subatmospheric operating conditions. After that, the nondimensional RPE is used to evaluate the relative importance of different forces acting on the bubble surface. Finally, based on the nondimensional analysis, a semi-analytical solution is proposed for the bubble growth in terms of nondimensional parameters and validated with the numerical solution of the RPE.
§.§ Limitations of the numerical solver
Saha567wB shows the variation of bubble growth rate for different time-step sizes for microdroplets under two different operating conditions considering the bubble-bubble interactions. For Δθ=135 K, it is observed that the time-step size of Δ t=1×10^-9 s causes the growth rate to become negative in the very beginning (see Saha567wBa), which then causes an increasing vapor temperature, as shown in Saha567wBb. The simulation is not continued further since the Newton-Raphson iteration estimates an unrealistically negative vapor temperature with the negative bubble growth rate in the next time-step. As the time-step size is decreased to Δ t=1×10^-10 s, the bubble evolves well in the very beginning. However, it shows a sudden jump in growth rate at around 7 ×10^-4 s, followed by a sharp decline at 9 ×10^-4 s. A sudden drop in vapor temperature can also be seen from Saha567wBb due to a sudden rise in bubble growth rate. Nevertheless, the bubble growth rate increases further in time and subsequently results in decreasing . This fluctuating growth behavior does not appear to be physical <cit.>. The time-step sizes are then further reduced to Δ t=1×10^-11 s and Δ t=5×10^-12 s, which are found to eliminate the spurious fluctuations in the bubble growth rate curve, as obtained earlier with the larger time step sizes. All the physical phenomena associated with the bubble growth such as the surface-tension dominated extremely slow growth stage, followed by the rapid bubble surface acceleration and subsequent gradual deceleration are captured with the reduced Δ t. Qualitatively, these results are in good agreement with previous publications <cit.>. Saha567wBc & Saha567wBd depict the bubble growth rate and vapor temperature variation for Δθ=120 K. Similarly, Δ t=1×10^-9 s and
Δ t=1×10^-10 s result in unrealistic growth rates and vapor temperatures, whereas Δ t=1×10^-11 s and Δ t=5×10^-12 s correctly predict the evolution of the bubble. The numerical issue with the time-step size is also demonstrated using another highly volatile cryogenic e-fuel microdroplets of DME and the results are included in <ref>.The numerical results described above are obtained using the explicit RK solver as mentioned in CompStSolPrc. An implicit ODE solver CVODE, which includes variable time-step, variable-order backward differentiation formulas, is also employed in this study to simulate the bubble growth characteristics. It is observed that the CVODE solver produces spurious fluctuations in the bubble growth rate curve near the beginning of the T growth stage. The simulation results obtained from the CVODE solver are shown here for Δθ=90 K with Δ t=1×10^-9 s in Saha19a. As the time-step size is reduced to Δ t=1×10^-10 s, the bubble growth rate is found to be well predicted by the CVODE solver similarly to the explicit RK solver, as shown in Saha19b. However, due to its implicit nature, the computational cost associated with the CVODE solver is higher compared to the explicit RK solver. For example, the simulated case with the CVODE solver is run on a machine using the Intel Broadwell processor architecture on a single core for 1.2585 CPUh, whereas the same case with the explicit RK solver is run on the same machine on a single core for 0.0186 CPUh.
§.§ Influence of bubble-bubble interactions on the bubble dynamics
The comparison between the bubble growth characteristics of microdroplets with and without bubble-bubble interactions is shown in Bubbub1 for =0.3 bar, =434.72 K, and Δθ=150 K. It can be seen that the bubble growth characteristics are significantly influenced by the bubble-bubble interactions once the bubbles surpass the T stage and enter into the IC growth stage. Bubbub1a depicts that the bubble-bubble interactions cause much slower expansion of the bubbles. This is because the additional pressure force induced by the surrounding growing bubbles on the target bubble surface markedly reduces its growth rate in the IC growth stage, as illustrated in Bubbub1b. It is also observed from Bubbub1b that the rate at which the vapor temperature decreases considering the bubble-bubble interactions decreases substantially in this growth stage and subsequently reduces the positive thermal feedback at the bubble surface, which is proportional to =-. The higher hydrodynamic pressure emerging from the bubble-bubble interactions in the IC growth stage is eventually the reason behind this phenomenon, which is depicted in Bubbub2.
From Bubbub1b, it is interesting to note that the vapor temperature curve for the bubble growth with bubble-bubble interactions shows a gradual rise near the onset of droplet bursting. This phenomenon can be explained as follows: the mass within the bubbles increases in time as the surrounding superheated liquid becomes vapor due to the continuous energy flux at the bubble surface. The increasing mass causes a build-up of vapor pressure inside the bubbles. The bubbles then grow in size such that this excess of pressure can be relaxed. Since the vapor inside the bubbles is assumed to be saturated, a reduction in also lowers the vapor temperature . However, for the bubble growth considering the bubble-bubble interactions, a gradual rise in near the onset of the droplet bursting suppresses the bubble growth, and subsequently the bubble surface acceleration (as shown in Bubbub2a) to such an extent that the vapor pressure continues to build up due to the slower growth of the vapor bubbles, and thus leading to an increase in vapor temperature near the onset of droplet bursting, as shown in Bubbub1b. The faster droplet expansion in this regime eventually increases (as can be seen from Bubbub2b) in the later period of IC growth, which in turn, causes the total hydrodynamic pressure, to increase (note that the slope of curve changes from negative to positive in the IC growth stage). Whereas for the bubble growth without the bubble-bubble interactions, continues to decrease in the IC growth stage due to the absence of the additional pressure force term, . Thus, the vapor temperature also shows a continuous decline in time, as shown by the blue dash-dotted line in Bubbub1b. Due to the slower growth of the vapor bubbles, the onset of droplet bursting is also considerably delayed for the bubble growth with bubble-bubble interactions. The variation of the nondimensional pressure terms due to the viscous and surface tension forces is not shown as the bubble-bubble interactions are found to have negligible influence on these forces.The dimensionless volume of the fuel droplet is shown in Bubbub3 for the bubble growth with and without bubble-bubble interactions up to 2.67 s, which marks the onset of droplet bursting for the later case. It is observed that the volumetric expansion of the liquid droplet is significantly smaller in presence of bubble-bubble interactions. It can be seen that the droplet volume has increased by only 23% after 2.67 s when considering bubble-bubble interactions. Conversely, the case without bubble-bubble interactions leads to an increase in droplet volume by approximately 120% within the same time interval.
§.§ Scaling law for superheated microdroplets
The scaling relationships of <cit.> (eqn:AB) work well only for the later bubble growth stages when the bubble surpasses the T stage and enters into the IC or TD growth stage <cit.>. This is expected because the effect of surface tension, which remains a dominating factor during the first two growth stages <cit.>, is not considered in the <cit.> formulation. The <cit.> scaling law (Pros) also shows a behavior similar to the <cit.> scaling law because it assumes a linear variation of saturated vapor pressure with temperature and constant physical properties in the formulations to describe the scaled bubble growth behavior.In real engine conditions, liquid jets or droplets will not remain intact for a long period. They will rupture within a very short period (in the order of microseconds) due to the rapid growth of multiple vapor bubbles. Thus, the scaling laws, eqn:AB and Pros, which work well in later bubble growth stages when the bubbles are grown sufficiently large beyond their critical radius, will not be applicable for the realistic engine conditions. This is illustrated in Saha9a, where the temporal variations of nondimensional bubble radii of microdroplets are plotted using the <cit.> scaling law considering the bubble-bubble interactions for various operating conditions, as listed in OMcases. Hence, the need arises for a more general scaling law, which reasonably models not only the later IC and TD growth stages but also the initial ST growth stage.
Saha9b shows the variation of dimensionless bubble radii plotted with eqn:scl_qnt1 considering the bubble-bubble interactions for the similar pressure and temperature ranges, as shown in OMcases. It can be seen from Saha9b that all the dimensionless radius curves merge into a single curve of value unity in the regime of ST growth. In the later growth stages, however, the scaled radius-time curves do not perfectly collapse into a single curve. Thus, it is difficult to describe a reasonably accurate universal bubble growth behavior with a relation of the form
= f().
§.§ Dimensional analysis of the modified RPE
In this section, first, a dimensional analysis of the modified RPE (RPEndwB) is performed to determine the magnitude of the different nondimensional force terms acting on the bubble surface for Reynolds numbers of different orders of magnitude. Based on the dimensional analysis, a semi-analytical solution for the bubble growth is then derived in terms of nondimensional parameters considering the bubble-bubble interactions to mitigate the numerical issues described in Limit. Finally, the proposed semi-analytical solution is validated with the numerical solution of the modified RPE.Saha10wB illustrates the variation of for three different Re with bubble-bubble interactions. The physical parameters and their values corresponding to the different Reynolds number cases are listed in Recases. It is to be noted that the definition of the Re shown in ReWe allows a maximum value of Re in the order of the magnitude of 2, which corresponds to a very low superheating degree case (Δθ≈𝒪(10^-2 K)). In this study, we have considered three different Re of 31.35, 5.06, and 0.85, termed as high Reynolds number (`HRe'), moderate Reynolds number (`MRe'), and low Reynolds number (`LRe'), respectively.
It can be seen from Saha10wBa that for the case of `HRe', the order of magnitude of is negligible throughout the whole bubble lifetime compared to the other terms. However, with decreasing Re, the influence of becomes important already in the later period of the ST growth stage, as shown in Saha10wBc for `LRe'. The order of magnitude of starts to become important towards the end of the ST growth stage and becomes negative in the transition stage with gaining importance for later times. Nevertheless, as the Re is reduced, the rate of decrease in also decreases. Thus, it can be concluded that becomes less important in determining the bubble growth characteristics compared to as the Re is reduced from 31.35 to 0.85. Since has a tendency to become less significant with decreasing Re, we neglect this term in the following to derive an approximate semi-analytical solution of RPEndwB. The effect of neglecting on bubble growth behavior will be discussed later in detail. Neglecting , RPEndwB becomes
-=(3/2+4 π)(d/ d)^2+4//Red/ d+4 π(d/ d) (d/ d)+2/We1/.
Defining
X = (3/2+4 π),
Y = 4{/Re+ π(d/ d)},
Z = {2/We1/-(-)},
RPEnd34 becomes
X(d/ d)^2+Y(d/ d)+Z=0.
Treating RPEnd6 as a quadratic equation for d/d, it can be analytically solved for d/d as
(d/ d)=-Y±√(Y^2-4XZ)/2X.
Replacing X, Y, and Z from A, B, and C, respectively, into RPEnd5 and assuming the temporal variation of , , and , to be negligible, one obtains
(d/ d)=-2{1/Re +π(d/ d)}/3/2+4 π+[4{1/Re+π(d/ d) /3/2+4 π}^2 - {2/We-(-)}/(3/2+4 π)]^1/2.
The negative root does not have physical significance in the context of vapor bubble growth in superheated microdroplets, and therefore is neglected in this study. RPEnd7 describes the simplified semi-analytical solution for the bubble growth, which needs to be numerically integrated to obtain the bubble radius. The assumptions considered to derive RPEnd7 are summarized as: (1) spherical symmetric bubble; (2) /≪ 1; (3) = constant; (4) ≈ 0, and (5) ≈ ≈ ≈ 1.Saha1314wB compares the numerically obtained nondimensional radius-time behavior of the vapor bubble with the dimensionless semi-analytical solution for three Reynolds numbers of 31.35 (Saha1314wBa), 5.06 (Saha1314wBb), and 0.85 (Saha1314wBc), as listed in Recases. The three different Re cases are chosen based on the different superheating degrees ranging from very low (θ = 6 K) to super-high (θ = 150 K) values. We have considered the numerical solution of the modified RPE (RPEndwB) as the reference to validate the proposed semi-analytical solution. It is observed from Saha1314wB that the semi-analytical solution underpredicts the bubble growth behavior for all the investigated cases. This is expected due to the neglection of the acceleration term in the derivation of RPEnd7. Nevertheless, it can be seen that the underprediction reduces with decreasing Re. This is because the acceleration term becomes less significant with decreasing Re as also revealed by the analysis of the order of magnitude of the different pressure terms in Saha10wB. Overall, it can be concluded that the simplified nondimensional semi-analytical solution provides a good approximation of the bubble evolution for the whole bubble lifetime.
It has to be noted that the derived semi-analytical solution does not depend on the source (e.g., turbulence, throttling effect, etc.) and location of inception (e.g., inside or outside of the injector nozzle) of the vapor bubble. As soon as a bubble nucleates in a superheated liquid medium, it can be used to reasonably predict the bubble evolution until the liquid jet (or droplet) bursts even with the larger time-step sizes compared to the numerical approach.
§.§ Computational cost
The proposed semi-analytical solution is found to accurately predict the bubble growth behavior with a time-step size of Δ t=1×10^-8 s, whereas a much smaller time-step size is required by the numerical solver (as described in Limit), thus substantially increasing the required number of time-steps. In order to demonstrate the capability of the derived semi-analytical solution, the numerical and semi-analytical predictions of the bubble growth characteristics for microdroplet are shown in Saha11 for =0.8 bar, =428.71 K, and Δθ=120 K with Δ t=1×10^-8 s. It is observed in Saha11 that the semi-analytical solution accurately captures the growth characteristics of the vapor bubbles regardless of the large time-step size, whereas the numerical approach results in an unphysical bubble growth rate and vapor temperature, as described in Limit.
Five different cases with superheating degrees ranging from 80 K (Case `A-80') to 150 K (Case `E-150') are investigated to illustrate the reduction of the computational cost with the derived semi-analytical formulation. In this work, all the simulations are performed on machines using the Intel Broadwell processor architecture. The simulation parameters are listed in Cost. The semi-analytical solution is found to accelerate the computing speed significantly for all the investigated cases, as shown by factor x in Cost. Thus, for large-scale spray simulations with millions of microdroplets <cit.>, the semi-analytical solution would be very beneficial to speed up the whole computation process.
§.§ Limitations of the proposed ROM
Several assumptions were made in the derivation of the modified RPE (RPE5), such as constant bubble number density, monodisperse and spherically symmetric vapor bubbles, and sufficiently large inter-bubble spacing, which may not always hold true in comparison to the practical scenario. It has to be noted that while the assumptions are being made, the proposed model is closer to reality than completely neglecting the interactions. A more advanced subgrid-scale model for bubble growth may be derived by relaxing these assumptions. For example, polydisperse vapor bubbles arranged randomly in a superheated microdroplet could be considered. However, such an advanced modeling approach requires solving the RPE for each of the vapor bubbles present in the superheated droplet. This is also likely to increase the computational cost for large-scale sprays due to the presence of millions of microdroplets with multiple polydisperse vapor bubbles. Although it is necessary to study the dynamics of the droplet-bubble system with the above-mentioned advanced modeling strategy, the actual need for such models in predicting global spray characteristics should be determined based on the comparative analysis of cost-accuracy trade-off for different subgrid-scale bubble growth models with varying degrees of simplification.
§ CONCLUSIONS
10pt
A new ROM for vapor bubble growth considering the bubble-bubble interactions in superheated microdroplets is proposed in this study. The model performance is compared with the DNS performed by <cit.>. The present reduced-order bubble-growth model was shown to capture the trend in considerably smaller volumetric droplet expansion relative to the single isolated bubble case. It was found that the bubble-bubble interactions significantly influence the bubble growth characteristics once the bubble surpasses the transition growth stage. The additional inertial force, , emerging from the bubble-bubble interactions was found to markedly reduce the bubble growth rate, and thus, significantly delay the onset of droplet bursting.The numerical challenges associated with the proposed bubble growth model for the accurate prediction of the vapor bubble growth process were highlighted for highly volatile liquid fuels using OME_x as a generic example. It was found that for certain operating conditions, the numerical approach requires an extremely small time-step size to accurately capture the bubble growth rate as well as the temperature at the liquid-vapor interface, thus hindering the simulation of large-scale flash boiling spray cases due to the high computational cost associated with it. Realizing the need for developing a simple correlation for bubble growth, a scaling law was first explored in this study to assess its ability to characterize bubble growth for superheated microdroplet cases under subatmospheric operating conditions. It was observed that the scaling law does not result in a perfect collapse of the scaled radius-time curves over the whole lifetime of the vapor bubble.To derive a simplified solution of the modified RPE, a dimensional analysis was performed for different orders of magnitudes of Reynolds numbers. It was revealed that the nondimensional acceleration term possesses much lower significance in determining the bubble growth characteristics as the order of magnitude of the Re is decreased from 𝒪(10^1) to 𝒪(10^0). Thus, neglecting this term, a simple semi-analytical solution was derived for the bubble growth rate considering the bubble-bubble interactions and validated for different operating conditions against its numerical solution. The derived semi-analytical solution for bubble growth was found to provide a good approximation of the bubble radius as a function of nondimensional time. A posteriori computational cost analysis for the single droplet cases also revealed that the proposed semi-analytical solver is significantly faster compared to the numerical solver; thus, it may be used in many practical applications including but not limited to flash-boiling spray simulations with millions of single droplets in automotive or cryogenic engines, where tracking of bubble growth phases in an individual droplet by solving the full RPE simultaneously with the energy balance at the liquid-vapor interface may be computationally very expensive.
§ ACKNOWLEDGEMENTS
This work was performed as part of the Cluster of Excellence “The Fuel Science Center”, which is funded by the Deutsche Forschungsgemeinschaft (DFG, German Research Foundation) under Germany’s Excellence Strategy – Exzellenzcluster 2186
“The Fuel Science Center” ID: 390919832.
§ PREVIOUS SCALING RELATIONSHIPS AND NONDIMENSIONAL ANALYTICAL SOLUTIONS
§.§ Scaling laws
The first scaling law proposed by <cit.> based on the theory provided by <cit.> is given by
=C^2/, t̃=D C^2 t,
and
C=(2 σ() /9π)^1/2/{[-]}^-1/2/(-()),
D=[-]^3/2/2 σ() ^1/2,
where `' implies nondimensional quantities. The physical parameters of Cconst and Dconst are evaluated at (), except σ. The second scaling law proposed by <cit.> is given by
=/, t̂=Dt,
where `' denotes nondimensional quantities.
§.§ Analytical solutions
The nondimensional analytical solutions derived by <cit.> are expressed as
d^+/dt^+=√(2/3(-){1-(1/^+)^3}-2/^+We{1-(1/^+)^2}) for high Re,
and
d^+/dt^+=-4/3^+Re + √((4/3^+Re)^2-{4/3^+We-2/3(-)}) for low Re,
§ DERIVATION OF THE PRESSURE FORCE DUE TO BUBBLE-BUBBLE INTERACTIONS
Let us consider a spherically symmetric superheated microdroplet consisting with multiple bubbles. The pressure force, , induced by the i-th bubble on the target bubble, located at the center of the droplet can be obtained by solving the continuity and momentum equations for an inviscid incompressible liquid flow <cit.>. The one-dimensional momentum and continuity equations in spherical coordinates are given by:
∂/∂ t+∂/∂ r=-1/∂/∂ r,
∂/∂ r( r^2)=0,
where (r,t) describes the velocity in the liquid phase relative to the interface, r denotes the radial coordinate with the origin at the droplet center, and t is the time. Integrating the continuity equation (Cont1) in radial direction yields
(r, t)=F(t)/r^2.
F(t) can be obtained by prescribing the kinematic boundary condition at the bubble surface.The vapor mass flow rate for a single bubble can be computed as
ṁ_b=4π^2ρ_vd/d t+4/3π^3dρ_v/dt,
where is the saturated vapor density at . Neglecting the second term on the right-hand side of mdotb1, as it can be shown to be very small compared to the first term, ṁ_b can be expressed as <cit.>
ṁ_b=4π^2ρ_vd/d t.
Equating mdotb with the inward liquid mass flux yields
u_l,a=d/d t,
u_l,a=/d/d t,
where subscript `a' represents absolute quantity and the saturated liquid density at . Thus, the relative velocity of the liquid across the interface (r=R_b),
(, t)=d/d t-()/d/d t=[1-()/] d/d t.
Substituting uR1 into Cont2, F(t) at the liquid/vapor interface can be obtained as
F(t)=[1-ρ_v()/] ^2d/d t.
Assuming ≪, Ft becomes
F(t)=^2d/d t.
Substituting F(t) into Cont2 yields,
u(r, t)=^2/r^2d/d t.
Replacing u(r,t) in Cont2 with uR2 yields
∂/∂ t(^2/r^2d/d t)+(^2/r^2d/d t) ∂/∂ r(^2/r^2d/d t)=-1/∂/∂ r.
Assuming (r→∞,t)=0 and integrating Mom2 along r, can be expressed as
=/rd/d t(^2 d/d t)+O(1/r^4).
Neglecting the higher order term in Pint and summing over multiple bubbles, finally becomes
=d/dt(∑^2/d/ d t).
§ DERIVATION OF THE NONDIMENSIONAL RPE
The RPE for an isolated spherically symmetric vapor bubble in a homogeneous infinite liquid medium is given by
- = [d^2/ d t^2+3/2(d/ d t)^2]+4/d/d t+2 σ/.
The modified RPE for spherically symmetric vapor bubble in a single droplet of radius considering bubble-bubble interactions is given by
-=[(1+2 π^2 n ) d^2/ d t^2+(3/2+4 π^2 n )(d/ d t)^2]+4 /d/ d t
+4 π n ^2(d/ d t) (d/ d t)+2σ/.
Substituting the following relationships
=/, =/A, =t/τ, =/, =n^3;
=/, =P/ A^2, =σ/, =/,
into RPE11 yields,
(-) A^2= A^2d^2/d+ A^23/2(d/ d)^2+4 A/d/d+2 σ^+σ_0/.
Dividing both sides of RPEnd1 by A^2 one obtains
-=d^2/d+3/2(d/ d)^2+4/ Ad/d+2 σ^+σ_0/ A^2.
Defining Re= A/ and We= A^2/, the nondimensional RPE for an isolated vapor bubble in an infinite liquid medium without bubble-bubble interactions is expressed as
-=d^2/d+3/2(d/ d)^2+4/Red/d+2 σ^+/We.
Substituting the scaling relations shown in eqn:scl_qnt into RPEMod yields
(-) A^2= A^2(1+2 π)d^2/d+ A^2(3/2+4 π)(d/ d)^2+4 A/d/d
+4π A^2(d/d)(d/d)+2 σ^+σ_0/.
Dividing both sides by A^2, RPEnd4 becomes
-=(1+2 π)d^2/d+(3/2+4 π)(d/ d)^2+4/ Ad/d
+4π(d/d)(d/d)+2 σ^+σ_0/ A^2.
Substituting Re= A/ and We= A^2/, the nondimensional RPE of a spherically symmetric vapor bubble in a single droplet configuration considering bubble-bubble interactions is given by
-=(1+2 π)d^2/d+(3/2+4 π)(d/ d)^2+4/Red/d
+4π(d/d)(d/d)+2 σ^+/We.
§ MODEL VALIDATION RESULTS AT SINGLE ISOLATED BUBBLE LEVEL
WaterVald shows the validation of the bubble growth model for a single isolated vapor bubble growth in a homogeneous infinite superheated liquid water medium. The reader is referred to <cit.> for more details about the simulation setup considered for this validation.
§ LIMITATIONS OF THE NUMERICAL SOLVER FOR DME
The numerical issue with the time-step size is also demonstrated using another highly volatile cryogenic e-fuel microdroplets of DME in Saha8910wB for Δθ=150 K (Case `DM-150'), Δθ=100 K (Case `DM-100'), and Δθ=80 K (Case `DM-80'), with bubble-bubble interactions. The simulation parameters are listed in LMCases2. As described for microdroplets, the smaller time-step size is also required for the accurate prediction of vapor bubble growth in DME microdroplets. For a very high superheating degree of Δθ=150 K, the time-step size needs to be further reduced to the order of picoseconds (𝒪(10^-12 s)) to avoid unphysical prediction of bubble growth and vapor temperature.
|
http://arxiv.org/abs/2303.07093v1
|
20230313132357
|
Weakly Unsupervised Domain Adaptation for Vestibular Schwannoma Segmentation
|
[
"Shahad Hardan",
"Hussain Alasmawi",
"Xiangjian Hou",
"Mohammad Yaqub"
] |
eess.IV
|
[
"eess.IV",
"cs.CV"
] |
Hardan et al.
Mohamed bin Zayed University of Artificial Intelligence, Abu Dhabi, UAE
{shahad.hardan, hussain.alasmawi, xiangjian.hou, mohammad.yaqub}@mbzuai.ac.ae
<https://mbzuai-biomedia.com/biomedia/>
Weakly Unsupervised Domain Adaptation for Vestibular Schwannoma Segmentation
Shahad Hardan These authors contributed equally Hussain Alasmawi 1 Xiangjian Hou Mohammad Yaqub
===================================================================================================
Vestibular schwannoma (VS) is a non-cancerous tumor located next to the ear that can cause hearing loss. Most brain MRI images acquired from patients are contrast-enhanced T1 (ceT1), with a growing interest in high-resolution T2 images (hrT2) to replace ceT1, which involves the use of a contrast agent. As hrT2 images are currently scarce, it is less likely to train robust machine learning models to segment VS or other brain structures. In this work, we propose a weakly supervised machine learning approach that learns from only ceT1 scans and adapts to segment two structures from hrT2 scans: the VS and the cochlea from the crossMoDA dataset. Our model 1) generates fake hrT2 scans from ceT1 images and segmentation masks, 2) is trained using the fake hrT2 scans, 3) predicts the augmented real hrT2 scans, and 4) is retrained again using both the fake and real hrT2. The final result of this model has been computed on an unseen testing dataset provided by the 2022 crossMoDA challenge organizers. The mean dice score and average symmetric surface distance (ASSD) are 0.78 and 0.46, respectively. The predicted segmentation masks achieved a dice score of 0.83 and an ASSD of 0.56 on the VS, and a dice score of 0.74 and an ASSD of 0.35 on the cochleas. Among the 2022 crossMoDA challenge participants, our method was ranked the 8^th.
§ INTRODUCTION
Deep learning (DL) is becoming more popular due to its practicality and its ability to outperform experts in various applications, such as in the medical field. However, unlike humans who can adapt and learn new experiences from different existing ones, DL models are sensitive to the settings they are trained in and do not implicitly adapt to these unseen settings. For instance, changes due to different scanners, image acquisition protocols, and medical centers are among forms of variability <cit.>. Domain Adaptation (DA) is a field in machine learning (ML) that deals with the distribution changes between different data. The cross-Modality Domain Adaptation (crossMoDA) challenge <cit.> introduced the first multi-class benchmark for unsupervised cross-modality DA. The challenge consists of two tasks: the segmentation of two structures in the hrT2 scans, and the classification of hrT2 images with vestibular schwannoma (VS) according to the Koos grade. Our work is focused on the first, which involves using contrast-enhanced T1 (ceT1) MRI as a source domain and high-resolution T2 (hrT2) MRI as a target domain to segment two objects: the VS and the cochleas. Vestibular schwannoma is a benign tumor in the brain that, in case of growth, affects the hearing nerves. As an intervention, open surgery or radiosurgery is performed to cure it. These operations require information about the volume and the exact location of the tumor <cit.>. Therefore, accurate segmentation of the relevant anatomy helps plan the operation properly and consequently increases the chance of patients' recovery.
§ RELATED WORK
Several studies tackled domain adaptation in the medical imaging field. However, they are mostly private, small, and aim for binary image segmentation,
unlike the crossMoDA dataset <cit.>. The challenge started in 2021, providing a total of 242 training images from the two domains (ceT1 and hrT2). In 2021, the winning model achieved a dice score of 0.857 for VS and 0.844 for the cochleas <cit.>. They applied CycleGAN for domain translation, then used the fakeT2 images to train the nnUNet. After that, they inferred pseudo-labels of the real hrT2, which are used to retrain the model. The second 2021 ranking model used nnUNet while applying the approaches of pixel alignment and self-training <cit.>. They generated fake hrT2 images using NiceGAN and achieved a mean dice score of 0.839. Finally, the third model used the Contrastive Unpaired Translation (CUT) method to generate fake hrT2, with 3D nnUNET for segmentation to attain a mean dice score of 0.829 <cit.>. Their approach mainly depends on doubling the number of images by generating augmented images with varying tumor intensities. Aside from the 2021 crossMoDA challenge, several approaches were followed for medical imaging domain adaptation, including weak supervision. In <cit.>, the authors applied a weak supervision methodology based on having partial annotations derived from scribbles on the target domain. They propose a technique that combines structured learning and co-segmentation to segment VS on T2 scans (target domain) from T1 scans (source domain). They achieved a dice score of 0.83 on the target domain
§ METHODS
Our work consists of two public frameworks: Contrastive Unpaired Translation (CUT) <cit.> for transferring ceT1 to hrT2, and nnUNet <cit.> for segmentation. All the following work is implemented using PyTorch 1.11 and with the same mathematical formulation proposed in the CUT and nnUNet papers.
§.§ Data
The dataset contains 210 ceT1 MRI scans, 210 hrT2 MRI scans for training, and 64 hrT2 MRI scans for validation <cit.>. This dataset is an addition to the publicly available Vestibular-Schwannoma-SEG dataset, a part of The Cancer Imaging Archive (TCIA), that was manually segmented <cit.>. The ceT1 and hrT2 scans are unpaired, and the segmentation masks are only provided for the ceT1 scans. The tumor is on one side of the brain, thus, only one of the cochleas would experience the pressure caused by it. Regardless, the segmentation masks include both the cochleas, as it was found that segmenting the two increases the performance of the models <cit.>. Image acquisition happened at two institutes in two locations: London and Tilburg. The testing set is made of hrT2 and is not publicly available. Evaluation of the testing set is made by the challenge organizers using the participant's submitted Docker container.
§.§ Pre-processing
The provided 3D scans differ in size and voxel spacing. Thus, we resampled the images into an isotropic resolution of 1 mm3. During resampling, the interpolation techniques used are a third order b-spline for the images and nearest neighbor for the labels. Based on each image dimension, they were either cropped or padded in the xy-plane to 256 × 256, with a varying number of slices per image. The scans were normalized on a 3D basis, which led to better results during the domain translation phase. Previous techniques included normalization per slice. Since the slices have different ranges of pixel intensities, 2D normalization resulted in inconsistencies that decreased the quality of the generated hrT2 images during the domain translation phase. We note that domain adaptation processes that rely on generative algorithms are sensitive to the pre-processing techniques, as these results are essentially the input to the segmentation task.
§.§ Domain Translation
Our domain translation work is mainly based on CUT <cit.> (based on CycleGAN without bijection request) framework to transfer ceT1 images to hrT2 images. In the original CUT paper, ResNet was used as the generator network and a multi-layer perceptron as the discriminator network. In our work, we used StyleGAN2 backbone <cit.> instead, as it showed more promising results in the literature. Also, the authors trained the CUT for N number of epochs with a fixed learning rate, followed by another N epochs where the learning rate linearly decays to zero. Similarly, we applied this approach during our domain translation phase.
We trained the CUT model in two stages to speed up the training and avoid the discriminator over-shadowing the generator which could make it generate poorly representative hrT2 images. In the first stage, we set a batch size of 32 and a learning rate of 0.001 for the first 50 epochs. Then, for the second 50 epochs, the learning rate was linearly decaying to reach 0 at the final epoch. We used the Fréchet Inception Distance (FID) <cit.> as a metric to evaluate the proximity of the generated image to the target domain.
In the second stage, we re-initialized the discriminator with random weights. This makes it more challenging for the discriminator to distinguish the views, allowing the generator to learn a better representation of hrT2 images. If the discriminator was not re-initialized, its effect will dominate, and the generator will produce low-quality hrT2 scans. We trained the CUT for 5 epochs with a learning rate of 0.001, followed by another 5 epochs where the learning rate experienced a linear decay to finally reach 0. The method is summarized in Table <ref>. In addition, Figure <ref> shows 2D slices of a scan after passing through stage 1 and clarifies how it gets clearer after stage 2. We used these pseudo hrT2 images as the training dataset of the segmentation network.
§.§ Segmentation
For the segmentation task, we used the nnUNet framework with the 3D full-resolution U-Net configuration. Following the approach of <cit.>, we generated the augmented fake hrT2 images by reducing the tumor signal by 50%, naming them the AT dataset. By that, we had a total of 420 training images. We applied five-fold cross validation using the default nnUNetTrainerV2 which combines two losses: cross entropy and dice, which are
ℒ_dice = -2/C∑_c∈ C∑_ip_i^c g_i^c +
ϵ/∑_ip_i^c + ∑_ig_i^c + ϵ
ℒ_CE = ∑_i-g_ilog(p_i) - (1-g_i)log(1-p_i)
where i refers to the voxel, p is the predicted mask, g is the ground truth, C is the number of classes, and ϵ is the smoothing parameter. In the default setting, ϵ is set to 1. We also used the nnUNet variant that applies the non-smooth dice loss instead of the regular one, having ϵ =0 in Equation <ref>. The non-smooth dice loss proved its effectiveness when the structure of interest is small relative to the scan size, such as the cochlea. We still noticed a gap between the performance on the training and validation datasets. Therefore, to alleviate the generalizability of the model, we used a nnUNet variant which applies multiple augmentation techniques to the training data. Since <cit.> showed that generating pseudo-labels of real hrT2 images to train on increases the dice score, we followed a similar approach. Thus, our models were then trained on a total of 630 images.
For all the nnUNet variants used in this work, instance normalization was used. Following <cit.>, we applied squeeze-excitation normalization that enhances channel interdependencies. The SE blocks include a global average pooling layer, two fully connected layers (FC), and activation functions. The aim of the pooling layer is to squeeze the channel information into one value, while the FC layers learn the non-linear dependencies between the channels. The model involved a reduction rate ratio of 2 and a ReLU activation function. Other than the normalization approach, all settings were kept the same as in the default nnUNet.
For the final model, we made it depend on augmentations as a weak supervision approach as shown in Figure <ref>. We applied eight types of augmentations on the real hrT2 dataset and predicted their pseudo-labels. The augmentation techniques are random rotation of up to 20 degrees, adding noise, scaling and translating, changing the contrast, and flipping on the three axes. As a result, we had 2100 images with a majority of real hrT2 images. This approach allows our model to better learn the features specific to the hrT2 modality and makes it less prone to the discrepancy arising from the GAN used. All the nnUNet variants apply the deep supervision approach for the loss functions which helps with the gradient vanishing problems for deep networks. Lastly, we ensembled two models involving: the augmentations variant with the combined loss, and the augmentations variant with the non-smooth dice loss. When predicting on an unseen case, we post-process the mask by finding the largest connected component of the VS. This is because the model tends to segment it on both sides of the brain while it is only located on one.
§ RESULTS
As for the CUT model, the first stage achieved an FID of 70.37, while the second stage improved the model, reaching an FID of 51.3. Regarding the nnUNet implementation, Table <ref> presents some of the results acquired from the different settings on the validation dataset. The baseline model included the fake hrT2 images with their tumor augmented version. The mean dice score achieved is 0.73, with low performance on segmenting the cochleas. Then, two models were trained after producing the pseudo-labels of the original hrT2 images, giving almost similar results: a mean dice score of 0.76. We then experimented by replacing the instance normalization in the default nnUNet with a squeeze-excitation normalization. However, obtaining a mean dice score of 0.73, we noticed no significant improvement using SE normalization. Thus, we used instance normalization in the rest of the experiments.
After that, we experimented with various augmentation techniques on the training data. Table <ref> describes the performance of the augmentations variant models. Relatively, tested on the validation dataset, our analysis concludes that the two models with augmentations during training gave the best results. As a consequence, we produced augmented real T2 images with their pseudo-labels and ran the final ensemble model described in Section <ref>. The ensemble model achieved a mean dice score of 0.77 on the validation set, with a considerable improvement on the ASSD of the cochleas, reaching 0.37. As we can see from Table <ref>, this model has a lower variance compared to the other proposed models, which could be due to its learning to focus on the regions that are shared with the augmented pseudo-label.
Since the testing dataset is not made public, our performance metrics were obtained by the challenge organizers. Our model achieved a mean dice score of 0.78 and an ASSD of 0.46. As to the VS, the dice score is 0.83 and the ASSD is 0.56. The cochleas have a dice score of 0.74 and an ASSD of 0.35.
§ QUALITATIVE ANALYSIS
Our best and worst segmentation results of our final model on the validation set are shown in Figure <ref>. The final model is an ensemble of two networks: nnUNet with augmentations and non-smooth dice loss, and nnUNet with augmentations and combined loss. It is still possible to discuss a few points even though we do not have the ground truth mask at hand. As observed in Figure <ref>, the model missed parts of the cochleas during segmentation and over-segmented the background. On the other hand, in the best case scenario for the cochlea in Figure <ref>, the model over-segments the cochlea region. Based on the two VS cases in Figures <ref> and <ref>, we can see that the model can segment clear tumors well, while dark tumors are more difficult to segment.
§ DISCUSSION
We developed a deep learning algorithm that follows a weak supervision approach to segment two brain structures in the hrT2 modality. The model uses a GAN to generate fake hrT2 images from the ceT1 scans, then these hrT2 images are trained using an nnUNet. After that, the fake hrT2 images are augmented and the nnUNet is used to predict the pseudo-labels of the augmented images. Finally, the model is retrained using the real hrT2 images and the latter augmented hrT2 images as the training dataset, and is validated on the validation dataset provided from the challenge organizers. The applied experiments vary in the loss function, datasets, and augmentations. We observed that the implementation of an accurate GAN model plays a huge role in the success of the unsupervised DA model. Given that the model is predicting an unseen modality, the more generalizable it is, the better. Thus, even if the augmentations increase the size of the training data, it offers the model an optimal chance to diversify the features learned from the target domain. We noticed that the model is more consistent in predicting the cochlea, but less accurate, relative to segmenting the VS. This may be due to the cochlea's size being small in relation to the entire image, but has a fixed location across the patients' scans. However, the VS prediction is not consistent because the tumor intensity, location, and size vary by patient. Moreover, the ASSD metric improved significantly in the final model compared to the improvement noticed in the dice score, especially for the cochleas. We associate it with the different augmentations applied during training, which led to a better study of the overall shape of the structures in different orientations. The ASSD considers the distance between the boundaries of the ground truth and the predicted mask which is more sensitive to outliers in prediction. Thus, we can conclude that the improvement in ASSD indicates that the final model is more robust than the previous models.
§ CONCLUSION
The application of domain adaptation enables ML models to aid in cases similar to the VS disease, where there is a growing interest in using hrT2 images, but not enough data. Both the settings of the GAN used and the segmentation network impacts the efficiency, especially for small-size structures, such as the cochleas. In some cases, weak supervision approaches may be computationally expensive. Regardless, they enable the model to learn different properties and views of the target domain scans. Thus, they maximize the learning of features and increase generalizability. Since the augmented hrT2 scans are predicted from the initial nnUNet network, improving it would significantly improve the quality of the prediction. Therefore, further work includes higher performing segmentation models, especially on the cochleas, in order to be combined with our weak supervision approach.
splncs04
|
http://arxiv.org/abs/2303.06663v1
|
20230312135659
|
SAR-UNet: Small Attention Residual UNet for Explainable Nowcasting Tasks
|
[
"Mathieu Renault",
"Siamak Mehrkanoon"
] |
cs.LG
|
[
"cs.LG",
"physics.ao-ph",
"I.2; I.5"
] |
SAR-UNet: Small Attention Residual UNet for Explainable Nowcasting Tasks
Mathieu Renault2, Siamak Mehrkanoon 231*Corresponding author.
2
Department of Advanced Computing Sciences, Maastricht University, Maastricht, Netherlands
3 Department of Information and Computing Sciences, Utrecht University, Utrecht, Netherlands
[email protected],
[email protected]
March 30, 2023
==========================================================================================================================================================================================================================================================================================================================================================================
The accuracy and explainability of data-driven nowcasting models are of great importance in many socio-economic sectors reliant on weather-dependent decision making. This paper proposes a novel architecture called Small Attention Residual UNet (SAR-UNet) for precipitation and cloud cover nowcasting. Here, SmaAt-UNet is used as a core model and is further equipped with residual connections, parallel to the depthwise separable convolutions. The proposed SAR-UNet model is evaluated on two datasets, i.e., Dutch precipitation maps ranging from 2016 to 2019 and French cloud cover binary images from 2017 to 2018. The obtained results show that SAR-UNet outperforms other examined models in precipitation nowcasting from 30 to 180 minutes in the future as well as cloud cover nowcasting in the next 90 minutes. Furthermore, we provide additional insights on the nowcasts made by our proposed model using Grad-CAM, a visual explanation technique, which is employed on different levels of the encoder and decoder paths of the SAR-UNet model and produces heatmaps highlighting the critical regions in the input image as well as intermediate representations to the precipitation. The heatmaps generated by Grad-CAM reveal the interactions between the residual connections and the depthwise separable convolutions inside of the multiple depthwise separable blocks placed throughout the network architecture.
UNet, Precipitation Nowcasting, Cloud Cover Nowcasting, Deep Learning
§ INTRODUCTION
An accurate precipitation nowcast is essential in many domains such as urbanization, agriculture and tourism. Sudden heavy rainfalls can lead to major catastrophes such as floods and landslides and have a tremendous economic impact. Early Warning Systems (EWSs) use the nowcast/forecast to limit damages due to climate hazards. Therefore, quick, accurate and trustworthy forecasts are invaluable, especially for the near future, i.e., nowcasting. For instance, highly competitive mechanical sports such as Formula 1 rely on forecasts as detailed as minute-by-minute predictions on different parts of a circuit to decide the race setup and strategy. The aviation sector depends on various factors such as precipitation, wind speed and direction to ensure a safe journey for the passengers daily. State-of-the-art NWP based models rely on numerical methods simulating the intrinsic physical dynamics of the climate. These simulations are often complex and require vast computational resources. In this context, the development of advanced data-driven models such as Deep Learning (DL) in the past years has gained a lot of attention even has challenged the performance of NWP models <cit.>.
Deep Learning based models have been previously successfully applied for forecasting tasks in a range of application domains including crop yield <cit.>, solar irradiance <cit.>, traffic <cit.> and weather
<cit.>.
The weather datasets are time-series with observations of a weather element at each time step. Recurrent Neural Networks (RNNs) are previously designed to include the order and time-dependency observed in datasets <cit.>. Over the last decade, literature has observed the development of Convolutional Neural Networks for several computer vision tasks <cit.>. In particular, LeNet-5 <cit.>, GoogLeNet <cit.> and U-Net <cit.> have shown promising results for image segmentation or object detection, especially in the medical field <cit.><cit.>.
The literature on traditional computer vision tasks such as image classification is rich. However, image-to-image forecasting is rather a new field, and many architectures have yet to be developed to address the problems as the one studied here.
Despite outperforming performance of deep learning approaches, they are not yet fully transparent in how they reach to a particular decision. Recently, researchers have developed Explainable AI (XAI) techniques to help the user understand the logic that leads the model to the prediction <cit.>. Standard methods to achieve this are gradient-based saliency maps, Class Activation Maps, or Excitation Backpropagation. These post hoc methods produce heatmaps by computing the layers' activation after the network is trained. Other popular post hoc algorithms are perturbation-based, where one determines the essential features by altering or removing parts of the input and quantifying the impact on the prediction performance.
Here, we use post hoc algorithms used previously in image classification and segmentation to give additional insights on model predictions. This paper proposes a novel architecture called Small Attention Residual UNet (SAR-UNet) which uses SmaAt-UNet <cit.> as core model and equips it with a Residual Connection parallel to each Depthwise Separable Convolution on both encoder and decoder paths. We evaluate the introduced model on precipitation and cloud cover nowcasting over the Netherlands and France respectively. The main contributions of the paper are the following:
* We introduce a novel deep architecture for precipitation as well as cloud cover nowcasting. This network relies on the use of Depthwise Separable Convolution (DSC) with Residual connections and Attention mechanisms in its encoder and decoder. The SAR-UNet outperforms its predecessor, the SmaAt-UNet, in precipitation and cloud cover nowcasting tasks.
* We utilize Grad-CAM, a visual explanation technique, in order to provide additional insights on the nowcasts. Given an input image, Grad-CAM produces heatmaps of the activations in different levels of our network. To the best of our knowledge, this is the first adaptation of Grad-CAM for an image-to-image nowcasting task.
This paper is organized as follows. A brief overview of the related research works is given in Section II. Section III, introduces the proposed SAR-UNet model and the explains the used visual explanation technique. The experimental settings and description of the used datasets are given in Section IV. The obtained results are discussed in Section V and the conclusion is drawn in Section VI.
§ RELATED WORK
Data-driven weather forecasting has recently gained a lot of attention. Among many successful deep learning architectures, Recurrent Neural Networks <cit.> and Long short-term memory (LSTM) <cit.> have shown promising results in sequential data analysis. Xu et al. <cit.> combined a Generative Adversarial Network with LSTM architecture to produce a network suitable for prediction using satellite cloud maps. An attempt to design an LSTM block that would encompass the treatment of the spatial aspect of the given input image led to the Convolutional LSTM Network (ConvLSTM) <cit.>, which has been successfully applied on precipitation nowcasting and outperformed the Fully Connected LSTM network.
UNet <cit.>, the widely used architecture in computer vision, has been previously extended and modified in various ways. For instance, the authors in <cit.> introduced the SmaAt-UNet, using a UNet core model, by replacing all regular convolutions with Depthwise-Separable Convolution (DSC) <cit.> as well as adding Convolutional Block Attention Modules (CBAMs) <cit.> to the encoder part. The explored DSC mechanism in the SmaAt-UNet significantly reduced the number of trainable parameters of the network. Moreover, the utilized CBAM blocks create attention maps both for the channel dimensions and the spatial dimensions, therefore can better learn the inter-channel as well as inter-spatial relationships of the weather variables. Diakogiannisa et al. <cit.> proposed a UNet backbone enhanced with residual connections parallel to the convolutional blocks. The use of the residual connections avoids the problem of exploding and vanishing gradients, allowing the creation of deeper networks.
Explaining and interpreting deep weather forecasting models is still in its early stage. Abdellaoui et al. <cit.> used occlusion analysis to infer the importance of weather variables. The great advantage of this process is that it can be applied to any network architecture. In <cit.>, the author quantifies the uncertainty in the prediction through Test Time Dropout, a method that approximate the Bayesian inference of Bayesian Neural Networks. An uncertainty map is then produced to visualize and interpret the prediction. The authors in <cit.> use Local Interpretable Model-agnostic Explanations (LIME) in a weather forecast context to interpret the decisions from their model. LIME approximates the deep learning network with a simple model as a linear one to understand the relationships in the weather features. Most of the explainable AI techniques adapted to CNN architectures have been applied to image classification or segmentation tasks. For instance, the authors in <cit.> introduced Gradient-weighted Class Activation Maps (Grad- CAM) to interpret a CNN's output.
§ METHOD
§.§ Proposed SAR-UNet model
§.§.§ Architecture
Fig. <ref>(a) shows a diagram that summarizes the proposed model. The model receives several images of size 288 by 288 stacked over the channels as input. Similar to UNet, its encoder-decoder transforms the data into spatially smaller images with more channels, then back into spatially larger images with fewer channels on each level before the output. Each level of the encoder is made of three transformations: Residual DSC Block (blue arrow), CBAM (yellow arrow), and 2x2 Max Pooling (red arrow). The CBAM's output is used as input for Max Pooling layer as well as it is send to the corresponding level (purple arrow) of the decoder part, where it is concatenated to the images from the lower level. The 2x2 Max Pooling reduces the spatial size of the images by 2, and its output is used as input to the next (lower) level of the encoder. A decoder level begins with 1x1 convolution followed by upsampling, represented by the green arrow in the diagram. The 1x1 convolution aims to halve the number of channels, while the upsampling doubles the spatial size of the images. The images are then concatenated to the CBAM's output over the channels and fed into a Residual DSC block. Note that the Residual DSC blocks double the number of channels in the encoder whilst they halve them in the decoder. A 1x1 output convolution (black arrow) layer is used in the end to obtain a single output image with the prediction.
§.§.§ Residual DSC Block
Residual connections act as a shortcut in the network and therefore make it easier to optimize the network parameters which itself can result in improving the training of the network and its accuracy. In addition, the residual connections allow for deeper networks to be trained without suffering from the vanishing gradients problem.
In the proposed Residual DSC Block, shown in Fig. <ref>(b), we combine the Residual connection with the Depthwise Separable Convolution mechanism.
The input goes through DSC with 3x3 kernel, Batch Normalization and ReLU twice. Moreover, this same input goes, in parallel, through a residual connection with 1x1 convolution to match the output channels of DSC. The output of the Residual DSC block is obtained by summing the output of the residual and the DSC paths.
§.§.§ CBAM
We place CBAMs after each Residual DSC block in the encoder. As opposed to <cit.>, where the CBAM's output is only used in the skip connection, here it is also used as the input of the next level. The last adaptation of the SmaAt-UNet resides in the number of channels in the bottleneck layer. Our network has 1024 channels, twice as many as in the bottleneck of the SmaAt-UNet. For this reason, we use 1x1 Convolutions before each upsampling operation to reduce the channels in the next decoder level. These adaptations induce a slight increase in the network's total number of trainable parameters. We compare the total number of parameters of UNet, SmaAt-UNet and SAR-UNet in Fig. <ref>.
§.§ Training
For training we followed the guidelines of <cit.>. The initial learning rate is set to 0.001 with a learning rate scheduler dividing the learning rate by 10 every time the validation loss has not decreased in four consecutive epochs.
The Adam optimizer is used for training the model. The maximum number of epochs is set to 200, with an early stopping criterion of 15 epochs, effectively stopping training if there was no improvement over the last 15 epochs. The models are trained using a batch size of 6 on the Google Colab Pro platform with a GPU (Nvidia Tesla P100).
§.§ Evaluation
To evaluate the performance of the examined models, we use the Mean Squared Error (MSE) which is also used as the loss function during training. We also set a range of metrics after binarizing the output image. Following the lines of <cit.>, using a threshold of 0.5mm/h, we binarize each pixel of the output image and count the number of True Positives (TP), True Negatives (TN), False Positives (FP), and False Negatives (FN). Thanks to this, we get the Accuracy, Precision, Recall, and the F1-score of the model. We emphasize the MSE as an indicator of performance as this is a regression task, and the objective is to predict the exact quantity of precipitation in millimeters. Moreover, we compare the performance of the proposed model with that of SmaAt-UNet and the Persistence method, which uses the last input image of a sequence as the prediction image.
§.§ Explainability
Explainability is an essential part of deep learning nowcasting.
Here, we explain the predictions through activation heatmaps. These heatmaps show which areas of the input are responsible for the high values in the output, thus making the nowcast more transparent. Grad-CAM was originally developed by <cit.> to produce a visual explanation of a classification network. It takes the gradient of the score for a class with respect to feature map activations to obtain neuron importance weights. Then it performs a linear combination of the forward activation maps followed by ReLU to obtain the final result.
As mentioned before, after binarizing the output readar image for evaluation metrics, we obtain an image that is segmented with rain and no rain classes. We thus obtain explanations for our nowcasting task by transforming it into an image segmentation task. We set the algorithm to produce heatmaps for the rain class on the entire image.
§ EXPERIMENTS
§.§ Precipitation nowcasting
We use the same precipitation map dataset as in <cit.>. This dataset is collected from 2016 to 2019 by the Royal Netherlands Meteorological Institute (Koninklijk Nederlands Meteorologisch Instituut) with two radars in Den Helder and De Bilt, The Netherlands, capturing precipitation intensities every 5 minutes. Every pixel of the resulting image corresponds to one square kilometer of land, and its numerical value stands for the amount of rainfall, in hundredth of a millimeter. That means a pixel value of 1 translates to 0.01mm of rainfall. We follow the preprocessing steps of <cit.>, by cropping the images to a size of 288x288 pixels, centered on the Netherlands. As our interest is focused on images with rain, similar to <cit.>, we select images with a threshold set to 50% of the total pixels having a value strictly higher than 0.
The sequence of images used as input for the network are stacked over the channel dimension. We have conducted a set of experiments to quantify the nowcasting performance in different situations. In particular, we use three different input sizes with 6, 12 and 18 channels, corresponding to 30, 60 and 90 minutes of data input for the network. For each of the input sizes, we conduct a range of nowcasting tasks: 30, 60, 90, 120 and 180 minutes ahead. This amounts to a total of 15 different nowcasting tasks. We used checkpoints to save the model after each epoch during training and for each setup we selected the checkpoint with lowest loss on the validation set. An example of the nowcastings obtained by our proposed SAR-UNet model is shown in Fig. <ref>.
§.§ Cloud cover nowcasting
We also examine our model on the French cloud cover dataset used in <cit.>. The images in this dataset are binary and of size 256x256; each pixel has a value 1 if there is a cloud and 0 if there is none. The images are recorded every 15 minutes. Following the lines of <cit.>, we output six images (corresponding to the nowcasts for the next 1.5 hours ahead) using four images (corresponding to the past 1 hour data) as input.
An example of the four input images is shown in Fig. <ref>.
§ RESULTS AND DISCUSSION
§.§ Precipitation and cloud cover nowcasting
This section presents the results obtained for the precipitation and cloud cover nowcasting tasks.
The obtained results of the precipitation task are summarized in Table <ref>, which show
that SAR-UNet model is better than the other tested models in 13 of the 15 different setups when considering only the MSE.
which
We emphasize this by plotting the average MSE (average of all minutes ahead predictions) by the amount of input used for each model in Fig. <ref>.
In this Figure, we compare the performance of the examined models and visualize the superiority of SAR-UNet model over the SmaAt-UNet and the Persistence models. In addition, there does not seem to be an substantial increase or decrease in the model performance when varying input data amounts. Table <ref> shows that nowcasting further away in the future is a more challenging task, and in general the losses increase as the minutes ahead increases.
For Precision, Recall and F1-score, the SAR-UNet is better than the SmaAt-UNet in about as many setups as when the SmaAt-UNet is better than the SAR-UNet. Therefore, SAR-UNet and SmaAt-UNet are comparable in terms of these tested metrics. This result might be explained by the arbitrary choice of a threshold for binarization of the prediction used in calculating these metrics. The obtained metrics for the cloud cover nowcasting task are tabulated in Table <ref>.
Similar to precipitation task, here SAR-UNet in most of the cases outperforms the SmaAt-UNet and Persistence models.
§.§ Activation heatmaps
The collection of heatmaps obtained using Grad-CAM bring additional clarity to how SAR-UNet functions and what parts of the images are responsible for the prediction. In Fig. <ref> and Fig. <ref> we show the heatmaps of network's activations for the precipitation nowcasting. These heatmaps are obtained using the same data shown in Fig. <ref>. The figures contain heatmaps of the activations of different inner layers of the SAR-UNet to explain how they operate. Therefore, we output a heatmap for the whole Residual DSC blocks, as well as each DSC sequence and Residual connection inside of these blocks, and finally for all CBAMs in the encoder path of the model. We split the plots between the encoder part in Fig. <ref> and decoder part in Fig. <ref> where the complete path followed by the data, from the very beginning to the very end are shown. This provides additional insights on which part of the input image is most important at each layer and level of the model and that how these information are combined to give a final prediction.
We start by analyzing the first column of the figures, representing the Residual DSC Blocks. The first three levels of the encoder in Fig. <ref> seem to be focused on the areas where the last input image presents the highest precipitation amounts. In particular, first only the areas with very high precipitation are activated in the encoder depth 0, progressing to a larger activated area in encoder depth 2 corresponding to areas with rain in the input. The deeper levels of the network, shown in Fig. <ref> and <ref>, namely Encoder depth 3,4 and Decoder depth 3, appear to activate in more abstract areas, with a few dots being significantly activated, leaving the rest of the image inactivated. The final three levels (depth 2,1 and 0) of the decoder in Fig. <ref> are much more similar to the prediction made by the network. These layers smooth out the prediction so that areas vary gradually from little rain to substantial rain, giving a more realistic appearance to the prediction.
The activation from a Residual DSC block is generally similar to the ones from the DSC path and the Residual connection as it is the sum of both. Nevertheless, it appears in Fig. <ref> that the DSC path is closer to the output of the Residual DSC block, while the Residual connection is less important with the first two depth levels being uniformly activated. On the other hand, in Fig. <ref> it is the Residual connection that is activated similarly to the Residual DSC Block of the same row. Therefore, in the encoder and decoder parts, we can infer that the two paths of a Residual DSC Block switch roles and their importance change gradually. Finally, the fourth column in Fig. <ref> presents the activations of the CBAMs in the Encoder part of the network. We observe that the CBAMs activate almost exactly as the Residual DSC Blocks. The visible difference is in the intensity of the activation, especially near the points where the activation is the maximum, i.e., the red and orange areas. The activation of the CBAM is less intense in these areas, leading to fewer red areas and more yellow and green ones. Fig. <ref> shows the activation heatmaps of Encoder depth 1 and 4, and Decoder depth 3 and 1 of the SAR-UNet for the cloud cover dataset.
We notice the Encoder depth 1, placed at the beginning of the network, is activated at the borders between cloud and non-cloud zones with high precision. Encoder depth 4 is also activated on these borders but in wider patches, leading to larger red zones on the heatmap. In Decoder depth 2, we observe activation zones in the center of the cloudy areas of the image. It is focused on the inside of the cloud area delimited in the previous layers. Decoder depth 1 is one of the final layers of the network. Its activation heatmap is very different from the other shown heatmaps. This layer's activation covers almost entirely the cloud areas of the image. It is therefore a combination of the previous layers, with the borders and the centre of the clouds all activated areas.
§ CONCLUSION
In this paper a novel Small Attention Residual UNet (SAR-UNet) is proposed for weather element nowcasting tasks.
The model is based on a U-shape convolutional network that combines Depthwise Separable Convolutions, Residual Connections and the Convolutional Block Attention Modules to outperform its predecessor, the SmaAt-UNet.
The proposed model is evaluated on two nowcasting tasks, i.e., precipitation and cloud cover nowcasting. The experimental results demonstrate that SAR-UNet model outperforms the other tested models for the studied datasets.
In order to shed lights on the explainability of the inner workings of the proposed SAR-UNet model, we have visualized the activation heatmaps for the nowcasts using Grad-CAM technique. The implementation of our SAR-UNet model is available at GitHub[https://github.com/mathieurenault1/SAR-UNethttps://github.com/mathieurenault1/SAR-UNet].
IEEEtran
|
http://arxiv.org/abs/2303.06631v1
|
20230312110015
|
Higher-order statistics and intermittency of a two-fluid HVBK quantum turbulent flow
|
[
"Zhentong Zhang",
"Ionut Danaila",
"Emmanuel Lévêque",
"Luminita Danaila"
] |
physics.flu-dyn
|
[
"physics.flu-dyn"
] |
Focus on Change: Mood Prediction by Learning Emotion Changes via Spatio-Temporal Attention
Soujanya Narayana, Student Member, IEEE, Ramanathan Subramanian, Senior Member, IEEE, Ibrahim Radwan, Member, IEEE, and Roland Goecke, Senior Member, IEEESoujanya Narayana, Ramanathan Subramanian, Ibrahim Radwan, and Roland Goecke are with the Human-Centred Technology Research Centre, Faculty of Science and Technology, Uni. Canberra, Bruce, ACT, Australia.
==========================================================================================================================================================================================================================================================================================================================================================================
The Hall-Vinen-Bekharevich-Khalatnikov (HVBK) model is widely used to numerically study quantum turbulence in superfluid helium. Based on the two-fluid model of Tisza and Landau, the HVBK model describes the normal (viscous) and superfluid (inviscid) components of the flow using two Navier-Stokes type equations, coupled through a mutual friction force term. This feature makes the HVBK model very appealing in applying statistical tools used in classical turbulence to study properties of quantum turbulence. A large body of literature used low-order statistics (spectra, or second-order structure functions in real space) to unravel exchanges between the two fluids at several levels. The novelty in this study is to use a theoretical approach based on first principles to derive transport equations for the third-order moments for each component of velocity. New equations involve the fourth-order moments, which are classical probes for internal intermittency at any scale, revealing the probability of rare and strong fluctuations.
Budget equations are assessed through Direct Numerical Simulations (DNS) of the HVBK flow based on accurate pseudo-spectral methods. We simulate a forced homogeneous isotropic turbulent flow with Reynolds number of the normal fluid (based on Taylor's microscale) close to 100. Values from 0.1 to 10 are considered for the ratio between the normal and superfluid densities. For these flows, an inertial range is not discernible and the Restricted Scaling Range (RSR) approach is used to take into account the Finite Reynolds Number (FRN) effect. We analyse the importance of each term in budget equations and emphasize their role in energy exchange between normal and superfluid components. Some interesting features are observed: i) transport and pressure-related terms are dominant, similarly to single-fluid turbulence; ii) the mathematical signature of the FRN effect is weak in the transport of the third-order moment, despite the low value of the Reynolds number; iii) for the normal fluid at very low temperatures, the mutual friction annihilates the effects of viscosity within the RSR.
The flatness of the velocity derivatives is finally studied through the transport equations and their limit for very small scales, and it is shown to gradually increase for lower and lower temperatures, for both the normal fluid and the superfluid. This similarity highlights the strong locking of the two fluids. The flatness factors are also found in reasonable agreement with classical turbulence.
§ INTRODUCTION
Liquid helium below the critical (lambda) temperature T_λ =2.17K is a quantum fluid, also called He II. Following the two-fluid concept suggested by <cit.> and reformulated and enriched by <cit.>, He II is represented as a mixture of two fluids with independent velocity fields: a normal viscous fluid and an inviscid superfluid. A detailed recount of the historical events leading to the two-fluid model is offered by <cit.>. A striking feature of the superfluid component is the nucleation of quantized vortices, with fixed (quantized) circulation and fixed core diameter (of the atomic size). Stretching or viscous diffusion of vortices, which are essential vortex phenomena in classical fluids, are absent in the superfluid component. Complex interactions between quantized vortices lead to Quantum turbulence (QT), a relatively young investigation field opened by Vinen's 1957 experiments on thermally induced counterflow in He II (see the review by <cit.>). Since then, considerable experimental and theoretical efforts (see dedicated reviews or volumes by <cit.>) were devoted to unravel properties of QT and underline similarities or differences with Classical turbulence (CT).
Several investigation paths were explored for the study of QT. Since it is admitted that in He II below 0.3K, the normal fluid fraction is negligible, important focus was given to characterize QT in the superfluid flow. This state is also referred as superfluid turbulence, or vortex tangle turbulence, since it is generated in an inviscid flow from the interaction of a large number of quantized vortices tangled in space. Quantized vortices being topological line defects, with infinite velocity and singular vorticity at the centreline, they can be modelled by 'Vortex filament' methods. In such methods, the vorticity is represented by Dirac distributions localised at vortex line locations, which are moved following the Biot-Savart-Laplace law for the velocity induced by neighbouring lines. Phenomenological models for vortex reconnection are applied. Since the pioneering work by Schwarz in 1980s, numerous numerical studies of superfluid turbulence using the 'Vortex filament' method were published (see the recent review by <cit.> and citations therein). Another model used for inviscid superfluid turbulence was the Gross-Pitaevskii equation, which is a nonlinear Schrödinger equation describing at macroscopic level a quantum system of weakly interacting bosons, as in Bose-Einstein condensates.
Even though the GP model offers only a partial description of the complexity of superfluid helium, it was extensively used to explore properties of superfluid turbulence in an ideal setting containing only the superfluid <cit.>.
Considering simultaneously the viscous and inviscid components of He II in a global model is a difficult problem, since characteristic scales range from Angstrom (size of the quantized vortex) to meter (size of the container). The Hall–Vinen–Bekharevich–Khalatnikov (HVBK) model <cit.> follows the original idea of the two-fluid model. The Navier-Stokes (NS) model describes the normal fluid motion and the superfluid motion is defined by an Euler-like equation <cit.>. The two fluids do not slip one over other, as they are coupled through a friction force. The improvement over the original two-fluid model is that the expression of the friction force takes into account the influence of quantized vortices through a coarse-grained averaged superfluid vorticity. The average is considered over an ensemble of parallel (polarized) vortex filaments and uses Feynman's rule to find an equivalent solid-body vorticity for a dense vortex bundle of line density ℒ. Derived initially for two-dimensional or rotating QT, the HVBK was widely used to study QT for general settings.
Recent modelling efforts were focused on more realistic estimations of the vortex line density
using approaches considering ℒ as an independent variable, described by an additional evolution equation (based essentially on Vinen's equation) <cit.>.
In <cit.>, the averaged vortex line density per unit volume was introduced and its evolution equations were considered, for homogeneous, inhomogeneous, isotropic and anisotropic situations.
<cit.> studied the effects of anisotropy and polarization in the hydrodynamics of inhomogeneous vortex tangles, thus generalizing the HVBK equations. These effects contribute to the mutual friction force between normal and superfluid components and to the vortex tension force. An additional equation for the vortex line density was proposed. Applications pertained to rotating counterflows, flow behind a cylinder, and other types of superfluid turbulence.
Other recent contributions <cit.> use ideas from the HVBK expression of the friction force to derive models for coupling NS equations with vortex filaments dynamics for superfluid vortices. These NS-VF models, which also include phenomenological approximations, are not discussed in this contribution.
These models are still flow dependent and a general theory of coupling Navier-Stokes equations with quantized vortex effects is not yet available <cit.>.
The focus of this paper is the detailed investigation of turbulent dynamics of the HVBK model, considered in its original form. The HVBK model has the merit to
provide a physically consistent closed set of equations for the coarse-grained (two-fluid) dynamics of He II, and to yield results in agreement with
experimental studies of He II <cit.>. The analysis presented here is based on Direct Numerical Simulations (DNS) of the model and thus could be easily adapted to further evolutions of the HVBK or other equivalent QT models based on Navier-Stokes type equations.
We adapt statistic analysis tools originally developed for CT governed by classical Navier-Stokes equations.
Exploring similarities between CT and QT has been a permanent guideline for studying QT, <cit.>.
The novelty of this study is to push the analysis to high-order moments of each component of velocity, with the aim to probe internal intermittency, i.e. assess the 4th-order structure function, and the corresponding flatness of the velocity derivative. Previous contributions used low-order statistics (spectra, or second-order structure functions in real space) to describe exchanges between the two fluids. We derive transport equations for the 3rd-order moments based on first principles. New equations involve the 4th-order moments, which are classical probes for internal intermittency at any scale. The general purpose of this contribution is therefore to build new bridges between CT and QT, as explained in detail below.
Previous studies have noted that QT in He II has a lot in common with CT.
Experimental studies focused on the total velocity of the fluid, are unable, as yet, to distinguish between the normal and the superfluid components. Several authors <cit.> have reported that, in the inertial range, the isotropic and homogeneous quantum turbulence velocity spectrum has a (-5/3) scaling law. The effective spectrum of superfluid vorticity (superfluid vortices averaged on a volume much larger than the inter-vortex length scale) scales as 1/3. Scaling laws such as 5/3, or 1/3 for the vorticity, are predicted by Kolmogorov theory and are well established for classical turbulence, when the Reynolds number of the flow is large enough <cit.>.
Numerical studies of QT have proved the same large-scale behavior using the HVBK, 'Vortex filament' or GP models (see recent review by <cit.>).
Turbulence statistics received a huge attention since 1941, when <cit.> argued that small scales have the best prospect to exhibit universal properties. This theory did not account for the internal intermittency, defined as strong fluctuations in space and time of the local, instantaneous kinetic energy dissipation rate ε <cit.>.
While the famous Kolmogorov turbulence theory in 1941 accounted for neither the internal intermittency phenomenon nor the finite Reynolds number effect (FRN), e.g. <cit.>, Kolmogorov theory 1962 <cit.> was underpinned by modified similarity hypotheses, aimed at accounting for intermittency.
One important merit of K41 and K62 is that they confer a phenomenological <cit.> and a theoretical <cit.> framework allowing to link statistics at large scales (presumably, within in an inertial range) and the smallest scales at which ε is properly defined. Numerous later studies <cit.> discussed the inappropriateness of these hypotheses, and proposed adequate amendments. One of them is the accounting of the FRN effect, which implies to consider in theoretical developments all specific physical phenomenon of the flow, such as decay, diffusion, production, etc. The approach developed in this work follows this philosophy, and considers all terms in the transport equations, none of them being a priori neglected.
Turbulence statistics which pertain to internal intermittency usually encompass two kinds of methods: i) one-point statistics of small scales (reflected by gradients of the velocity field); and ii) two-point statistics, particularly by the scaling exponents of higher-order structure functions. Note that the small-scale limit of ii) fully recovers i). Scaling laws of longitudinal structure functions of order p, defined as the difference of the velocity component u between two space points separated by the scale r, are sought as:
⟨ (u(x+r) - u(x))^p ⟩∼ r^ζ_p,
where u is the x-component velocity in the (x,y,z) reference system, r the separation distance between the two points and ⟨⟩ denotes averaging. Assessing the scaling exponents demands particular care.
Strictly speaking, they can only be correctly assessed in a range of scales called 'inertial sub-range', which, in turn, requires a large Reynolds number. The exact value of the threshold depends on the flow: for instance, <cit.> showed that Re_λ (based on Taylor's microscale λ) must exceed 500, which implies a minimum resolution of 1024 in a periodic box simulating homogeneous and isotropic turbulence. This requirement is very impelling for the computational resources of DNS.
For lower Reynolds numbers, it is common to designate as Restricted Scaling Range (RSR) those scales for which a scaling of different statistics can be discerned. In the RSR, the value of the scaling exponent is smaller than the asymptotic prediction of Kolmogorov. K41 predicts that, under the assumption of sufficiently high Reynolds numbers, the structure function of order p should scale as ζ_p^K=p/3 within the inertial range (the superscript K denotes 'Kolmogorov'). The prediction is exact for p=3 since the Kármán-Howarth-Kolmogorov equation is deduced from the Navier-Stokes equations and grants the 4/5 law for longitudinal 3rd-order structure function, for sufficiently high Reynolds numbers. However, for p>3, the deviation of the scaling exponent ζ_p from p/3 is often attributed to the effect of internal intermittency, although the FRN effect is also mixed up with intermittency <cit.>. For classical turbulence, a solid theory for predicting higher-order moments scaling laws is still missing. One of the intricacies stands in the correct account of the FRN, and associated closures for the numerous terms highlighted in transport equations <cit.>.
Intermittency has also been addressed through GP models <cit.>. It is outlined that
the incompressible velocity are found to be skewed for turbulent states. Comparisons with homogeneous and isotropic Taylor-Green flow, revealed the universality of
the statistics, including a Kolmogorov constant
close to the one of classical fluid.
The HVBK model of QT at finite temperature it is the perfect framework to develop such statistical analysis, since the two components of the flow are governed by Navier-Stokes type equations (over which the coupling, mutual friction term, is to be accounted for) and thus can be easily separated. The two components are denoted by subscripts 'n' and 's' standing for the normal fluid and superfluid, respectively. The total density of the fluid is the sum of each component densities, ρ=ρ_n+ρ_s. The density ratio is temperature-dependent. For T ≈ T_λ, ρ_n/ρ = 1 and for T = 0, ρ_n/ρ = 0. Both experimental <cit.> and numerical (based on the HVBK shell model) <cit.> studies were devoted to inspecting intermittency by analyzing the scaling exponents for higher-order structure functions. A consensus emerged that the intermittency of quantum turbulence is very similar to classical turbulence for temperatures close to T_λ, or close to absolute zero (see Table I in <cit.>). There is no clear conclusion for intermediate temperatures (between T_λ and 0). Experimental studies covered a wide range of temperatures (0<T<T_λ) and concluded that for quantum turbulence, the higher-order scaling exponents are smaller than p/3 as in classical turbulence, and they are almost unaffected by the temperature <cit.>. However, HVBK shell model studies lead to different conclusions at intermediate temperatures, where ρ_n ≈ρ_s. <cit.> claim that for the quantum turbulence in intermediate temperatures ρ_n ≈ρ_s, the scaling exponents are more significant than the Kolmogorov prediction, ζ_p^c<ζ_p^K<ζ_p^q (superscripts 'c' and 'q' stand for 'classical' and 'quantum', respectively), while <cit.> found that scaling exponents are smaller than the Kolmogorov prediction and even smaller than the scaling exponents of classical turbulence, ζ_p^q<ζ_p^c<ζ_p^K. <cit.> performed DNS for a gradually damped HVBK model and provided support for the latter conclusion. This discrepancy is due to the additional effect of the mutual friction force in both normal fluid and superfluid, in the case of ρ_n ≈ρ_s.
In the present work, we use DNS results based on the HVBK model for forced homogeneous isotropic turbulent flow with Reynolds number of the normal fluid (based on Taylor's microscale) close to 100. We consider density ratios ρ_n/ρ_s between 0.1 and 10, corresponding to temperature spanning [0, T_λ]. Because of the moderate Reynolds numbers of the normal fluid, the range of scales over which statistics will be revealed are: the dissipative range, the RSR (intermediate scales), and large scales (comparable with the size of the simulation box, at which forcing is applied).
The first question we address is the role of the mutual friction in the transport equation of the 3rd-order structure function. We deduce this equation from the first principles (here, two-fluids HVBK) by accounting for the FRN effect at each scale and different temperatures, as a function of the density ratio ρ_n/ρ. Each term of the balance equation is assessed from DNS data. We corroborate this analysis with
one-point statistics of velocity derivatives, which is another tool to probe turbulent intermittency. We quantitatively study the tails of Probability distribution functions (PDFs) of velocity derivatives by computing the flatness, defined as the 4th-order moment normalised by the square of the 2nd-order moment. We then compare with CT, for which DNS at very high Reynolds numbers <cit.> revealed that the flatness of the velocity gradients is much larger than 3 (typical for a Gaussian distribution).
Despite the easy accessibility of small scales in numerical simulations of QT, we are not aware of any report of similar analysis for probing internal intermittency.
The paper is organized as follows. Section <ref> describes the two-fluids HVBK model and the main parameters of direct numerical simulations. Section <ref> is devoted to inspecting each term in the transport equation of the 3rd-order structure-function, with particular attention paid to the influence of the mutual friction term over the whole range of scales and for different density ratios. Section <ref> reports one-point statistics of the longitudinal velocity gradients of each fluid component and the total velocity of the turbulent flow. Section <ref> deals with the flatness of the velocity derivative. Conclusions are drawn in Sect. <ref>.
§ THE HVBK MODEL AND DIRECT NUMERICAL SIMULATIONS
We use the so-called incompressible Hall–Vinen–Bekharevich–Khalatnikov (HVBK) model <cit.>. Navier-Stokes equations describe the normal fluid (variables with subscript 'n') and the superfluid motion (variables with subscript 's') is governed by an Euler-like equation:
∇·v_n =0 , ∇·v_s =0,
∂v_n/∂ t+(v_n ·∇)v_n=-1/ρ_n∇ p_n + 1/ρ_nF_ns + ν_n ∇^2v_n,
∂v_s/∂ t+(v_s ·∇)v_s=-1/ρ_s∇ p_s - 1/ρ_sF_ns+ ν_s ∇^2v_s,
where ∇ stands for the nabla operator, v is the velocity vector, ρ the density and p the pressure. Note that the superfluid viscosity ν_s is theoretically zero, and it is added for the purpose of stability of numerical simulations at very low temperatures. It may also be viewed as a crude surrogate for the superfluid dissipation processes at inter-vortex scales and below.
The two fluid components are coupled through a mutual friction force F_ns. The form of the friction force is <cit.>, <cit.>:
F_ns = -B/2ρ_sρ_n/ρω_s (ω_s (v_s -v_n))/|ω_s | -B'/2ρ_sρ_n/ρω_s (v_s -v_n),
where ω_s = ∇v_s is the coarse-grained superfluid vorticity (see below).
We assume that for the superfluid the predominant energy loss is due to macroscopic friction with the normal fluid. We implicitly neglect dissipation process by vortex reconnection. This certainly excludes the validity of such a model for temperatures very close to 0K, and does not allow to investigate scales smaller than the intervortex distance. The perpendicular component of the force in Eq. (<ref>) is neglected, since it does not contribute to the energy exchange. A discussion on the impact of these simplifications is provided in Appendix <ref>.
The simplified form of the friction force is then <cit.>:
F_ns = -B/2ρ_sρ_n/ρ|∇v_s| (v_n -v_s),
where B is a temperature related parameter, measured in various experiments (see for instance <cit.>). We set the value B=1.5 corresponding to the averaged value extracted from experimental data.
This calculation of the mutual friction was based on Feynman's rule. Assuming that a large number of superfluid vortices of quantized circulation κ are parallel (polarized) in a bucket, the equivalent solid-body rotation vorticity is 2 Ω=|∇v_s| = |ω_s |=κℒ, where ℒ is the vortex line density per unit volume and Ω the equivalent angular velocity. The equivalent averaged coarse-grained velocity of the superfluid is then v_s = Ω×r.
The validity of the expression of the mutual friction force (<ref>) in general quantum turbulent flows, where vortex lines are randomly oriented rather than highly polarized, is still matter of debate. The existence in QT of dense vortex clusters (bundles) with quasi-parallel vortex lines <cit.> supports the idea of an averaged vorticity. Obtaining a model equation for the evolution of L that accounts for non-polarized vortices is still an open question <cit.>.
The kinematic viscosity ν_n =μ/ρ_n in Eq. (<ref>) is a simulation parameter. Based on the concept of the two-fluid model, ρ_n decreases with temperature, while the dynamic viscosity μ is also temperature-dependent. Naturally, the parameter μ in the two-fluid model should be taken as the dynamic viscosity μ_*, which was measured in superfluid helium for a range of temperatures 1K<T<T_λ (see <cit.>). It is common practice in HVBK simulations to fix μ as a constant, independent of temperature. We adopt this simplification, since the dynamic viscosity of the normal fluid could be different from μ_* at low temperatures because of other dissipative effects in the superfluid. We choose here to fix ν_n as a constant, independent of the temperature.
We solved numerically the system of equations (<ref>)-(<ref>) using Fourier pseudo-spectral methods classically used for Navier-Stokes equations. Direct numerical simulations were performed by adapting a Navier-Stokes code that proved efficient and accurate in computing high-order statistics of turbulent flows <cit.>. Periodic boundary conditions were applied to a computational box of length 2π. Grid resolution was 512^3, which was sufficient to reach a moderate Re_λ∼ 100, based on Taylor's microscale. We have also performed numerical simulations with a better resolution of 1024^3 (see Appendix <ref>). The results reported are not affected by the resolution, except the value of the flatness of the velocity derivative of the superfluid, as discussed later. To achieve a quasi-stationary homogeneous isotropic turbulence, an additional forcing term was added in the momentum equations (<ref>) and (<ref>) at large scales.
The energy injection rate ε_*
is constant in time, for different temperatures, and for both fluid components. We set ε_*=7e-4 for all simulations. The energy injected in superfluid is transferred by mutual friction and eventually dissipated by the normal fluid component. But, the energy transfer becomes less efficient for low temperatures because of ρ_n/ρ tending to zero.
Accounting for an additional forcing term would result in unstable simulations. To maintain the stability of the simulations for very low temperatures, a common technique in the HVBK model is to impose an artificial viscosity ν_s to the superfluid. To respect the two-fluid concept, one should make sure that the artificial viscosity of the superfluid is much smaller than the viscosity of the normal fluid, ν_s≪ν_n.
To summarize, in the present work we fix ν_n as a constant independent of the temperature, and ν_s=0.1ν_n for all numerical simulations. Other techniques exist, like the gradually damped HVBK model <cit.> and the shell model <cit.>, for which a temperature-dependent normal fluid viscosity ν_n and temperature-dependent superfluid viscosity ν_s are imposed. The statistics of the DNS HVBK model were computed over 30 integration time scales. Table <ref> contains simulation parameters for all 7 considered cases. The first part refers to the normal fluid, while the second one pertains to the superfluid.
§ SCALE-BY-SCALE EVOLUTION OF THE THIRD AND FOURTH-ORDER STRUCTURE FUNCTIONS OF THE NORMAL AND SUPERFLUID
We present in this section the scale-by-scale budget equation for the 4th-order structure functions of velocity increments in a HVBK turbulent flow. We start from the transport equation of the 3rd-order structure function for a single-fluid Navier-Stokes turbulent flow. This equation was derived by <cit.> and <cit.> and assessed through experimental and numerical data by <cit.>, and <cit.>. Denoting by r the space increment, δ u=u(x+r)-u(x) the longitudinal velocity increment and δ v=v(x+r)-v(x) the transverse velocity increment, the following transport equation was established under the assumption of homogeneity and isotropy:
∂_t D_111_Term1 + (∂_r+ 2/r) D_1111_Term2 - 6/r D_1122_Term2'= -T_111_Term3+ 2ν C_Term4- 2 ν Z_111_Term5,
where ∂_r ≡∂/ ∂ r, ν is the kinematic viscosity and
D_111 =⟨(δ u)^3⟩,
D_1111 =⟨(δ u)^4⟩,
D_1122 =⟨(δ u)^2(δ v)^2⟩,
C(r,t) =-4/r^2 D_111 (r,t) + 4/r∂_r D_111 + ∂_r ∂_r D_111,
Z_111 =3 ⟨δ u [(∂ u/∂ x_l)^2+(∂ u'/∂ x_l')^2]⟩.
In expressions (<ref>) double indices indicate summation (over l=1,2,3) and a prime refers to variables at point x+r. Term Z_111, also called dissipation-source term, couples components of the dissipation with δ u, and thus acts at all scales (this will be discussed in detail later). Term T_111 is related to the pressure gradient and has the form:
T_111=3⟨( δ u)^2 δ( ∂ p/∂ x)⟩.
We apply the same approach to obtain a similar transport equation for HVBK equations (<ref>)-(<ref>), which have Navier-Stokes structure.
We denote by D_111^n and D_111^s the 3rd-order longitudinal structure functions for normal and superfluid components, respectively. The two transport equations are:
∂_t D_111^n_Term1 + (∂_r+ 2/r) D_1111^n_Term2 + (-6/r D_1122^n )_Term2'= -T_111^n_Term3+ 2ν_n C^n_Term4 +(-2 ν_n Z_111^n)_Term5
+ ⟨(δ u_n)^2 (3 ρ_s/ρδ F_∥^ns)⟩_Term 6+3 ⟨(δ u_n)^2 δ f_∥^n⟩_Term 7 ,
∂_t D_111^s_Term1 + (∂_r+ 2/r) D_1111^s_Term2 + (-6/r D_1122^s)_Term2'= -T_111^s_Term3+ 2ν_s C^n_Term4 + (-2 ν_s Z_111^s)_Term5
+ ⟨(δ u_s)^2 (-3 ρ_n/ρδ F_∥^ns)⟩_Term 6+3 ⟨(δ u_s)^2 δ f_∥^s⟩_Term 7.
For the sake of simplicity, we used the same notations for different terms as in Eq. (<ref>), while referring to either normal or superfluid components. New Term6 and Term7 appear. The former comes from the mutual friction force F_ns (appearing with opposite signs in the two equations) and the latter from forcing terms f^n and f^s added in both equations to force turbulence.
Equations (<ref>) and (<ref>) allow us to obtain exact expressions of the 4th-order structure function (and, further on, of the flatness factor). Recalling that (∂_r+ 2/r)=(∂_r(r^2 ))/r^2, we obtain after integration with respect to the scale r:
D_1111^n=1/r^2∫_0^r s^2 (-Term1-Term2'+Term3+Term4+Term5+Term6+Term7)^n ds,
D_1111^s=1/r^2∫_0^r s^2 (-Term1-Term2'+Term3+Term4+Term5+Term6+Term7)^s ds.
To assess the importance of each term in transport equations (<ref>)-(<ref>) for the 3rd-order structure functions, we naturally start with the simulation case ρ_n/ρ=0.91 (see Tab. <ref>). For this case, where the normal fluid is predominant, the results are expected to be similar to those known for a classical single-fluid turbulent flow <cit.>. Figure <ref> shows the scale-dependence of each term in Eq. (<ref>), after normalization by ε_*^5/4ν_n^1/4, with ε_* the constant energy rate injected to force turbulence.
Note that for this case the smallest resolved scale is smaller than the Kolmogorov scale η_n (see Tab. <ref>).
Term1 reflects the temporal decay of the 3rd-order structure function. This term is zero for steady-state flows and thus negligible here. Term2 (blue ∙ -) is the prevalent term over the scales within the RSR. The sum of the two transport terms Term2+Term2' (red ∘) balances the pressure-related Term3 (black - · ) fairly well, over the whole range of scales.
Term4 (red ×-, plotted with changed sign) is negative at small scales and positive at large scales. It represents the viscous destruction of the 3rd–order structure functions. As expected, this contribution is negligible over the RSR, but becomes important in the viscous range. At the smallest resolved scale, this is the most prevalent term and is balanced by
Term5 (black —), the dissipation source term. This term exhibits a plateau over the RSR, and it is 15 % of the other terms. Albeit smaller, this term cannot be ruled out.
Term6 (magenta -), representing the friction force coupling, is the less important term. This seems reasonable behaviour for a fluid essentially composed of normal fluid. Note also that Term6 is negative for the normal fluid, so the figure illustrates (-Term6). Finally, the forcing term (Term7) (green - ·) affects the very large scales only and its effect gradually diminishes towards small scales.
The analysis of this case suggests that, as in classical single-fluid turbulence <cit.>, the two transport terms (Term2+ Term2') are only balanced by the pressure-related term Term3. This occurs over the whole range of scales, albeit the effect of the viscosity is obviously felt within the viscous range. The same conclusion was reached by
<cit.> on the basis of experimental and DNS data. However, these authors did not calculate exactly the dissipation source term, neither the forcing term (which was neglected within the derivation, on the basis of the assumption of very large Reynolds numbers). They also noted departures from homogeneity and isotropy, which are clearly observed in our simulations.
Another important remark is that, despite the low Reynolds number of the flow (R_λ≤ 100), all terms that might have represented the FRN effect (friction force coupling through Term6, forcing term Term7 and dissipation source term Term5) are negligible. Therefore, there is no direct imprint of the FRN effect on the 4th-order moments of velocity increments. There is the possibility that this effect might be indirect, through the pressure field. The conclusion that FRN effect is negligible is further comforted by other simulations for different temperatures (see below). The consequences are that 4th-order structure functions are only shaped by the pressure field. This observation was revealed by e.g. <cit.>. The latter authors suggested a valuable model for the role of the pressure in turbulence.
We now extend our analysis to other cases (see Tab. <ref>). We consider the case ρ_n/ρ=0.5 (temperature around 2K) with balanced normal and superfluid fractions and the case ρ_n/ρ=0.09 (temperature close to 0.3K), with the superfluid dominating the flow. Terms in Eqs.
(<ref>)-(<ref>) are depicted in Fig. <ref>. For the coherence of the message, we replot in upper panels of Fig. <ref> the results obtained for ρ_n/ρ=0.91.
Term1 reflects the temporal decay of the 3rd-order structure function. As stated above, this term is absent in our simulations. We have kept it in the transport equations, as it provides a way to assess the degree at which other terms influence its behaviour. For a direct cascade, D_111 is negative. An enhance of the cascade is consistent with positive values of the temporal derivative of (-D_111). For the normal fluid, this enhancement can be the result of the friction force coupling, via Term6, which is negative (so -Term6 is positive). Therefore, the cascade of the normal fluid may be enhanced by Term6. The opposite effect stands for the superfluid, for which Term6 is positive. The origin of this different sign is at the level of the HVBK model, for which the coupling term is accounted for with different signs, reflecting an enhancement of the momentum for the normal fluid, and a reduction of the momentum for the superfluid.
Forcing terms (Term7) are not shown in Fig. <ref>, because they only affect very large scales.
Generally speaking, as already emphasized, they exhibit similar behaviour to classical turbulence, if high temperatures are considered, corresponding to ρ_n/ρ=1. However, the additional mutual friction term Term6 plays a requisite role particularly for low temperatures, thus distinguishing the HVBK flow from classical fluids.
In the following section, we analyse the results for each specific range of scales.
§.§ Dissipative scales
For the normal fluid, similar to classical turbulence at small scales, the pressure source Term3 and transport terms (Term2 + Term2') scale as r^3. In contrast, the viscous Term4 and dissipation source Term5 vary proportionally to r. The viscous Term4 balances the dissipation source Term5 for the very small scales. Although small differences between these two terms are noticeable for the lowest density ratio (ρ_n/ρ=0.09, see Figs. <ref> and <ref>), they are most likely due to the limited grid resolution. If we decrease r to very small values, the two terms eventually cancel each other.
Moreover, transport terms (Term2 + Term2') are nearly balanced by the pressure source Term3 for the normal fluid (as already discussed and illustrated in the left column of Fig. <ref>).
For the superfluid (right column of Fig. <ref>), unlike classical turbulence at smallest scales, transport terms are slightly larger than the pressure source term. This difference is most likely attributable to the equipartition of energy <cit.>, which finally results in the accumulation of energy at highest wavenumbers due to the very small value of the supefluid viscosity.
Moreover, when the superfluid is dominant in the flow, the kinetic energy cannot be completely dissipated. This energy accumulates at the scales of the same order as the inter-vortex scale, which leads to an upward trend for the superfluid velocity spectrum. In quantum physics, this is associated with a partial thermalisation of superfluid excitations <cit.>. Note that the upward trend of the superfluid velocity spectrum depends on simulation parameters of the HVBK model. The truncated HVBK model resolves two coupled viscous fluids with different, albeit constant, viscosities. The ability to settle the smallest scales of both fluids requires, nonetheless, a sufficiently high resolution.
For small scales, the mutual friction term Term6 scales as r^3 in both normal and superfluid components. Term6 decreases much faster than both dissipation source and viscous terms. This underlines that at small scales, the viscous and the dissipation source terms (both directly depending on the viscosity) are dominant.
§.§ Intermediate scales
Considering the moderate values of the Reynolds number in these simulations, a clear inertial range is not established. We prefer to refer to a restricted scaling range (RSR), defined as the range of scales over which different statistics exhibit a discernible scaling, albeit with exponents smaller than those predicted by asymptotic (for infinitely large Reynolds numbers) theories.
An analytical form of the 4th-order longitudinal structure function can be obtained from Eq. (<ref>) by integrating the sum of terms 1 to 5:
D_1111=1/r^2∫_0^r s^2 (-Term1-Term2'+Term3+Term4+Term5) ds.
In a statistically steady flow, Term1 is zero. In the RSR, Term4 is negligible. One condition that D_1111 follows a pure power law is consistent with the requirement that all terms on the right-hand side of Eq. (<ref>) also exhibit pure power laws, or cancel each other. Term2' and Term3 are shown to follow similar power laws, while the dissipation source Term5 exhibits a different exponent <cit.>. It is important to shed some light on the difference between classical turbulence and HVBK quantum turbulence entailed by the mutual friction coupling effect quantified by Term6.
Similar to classical turbulence, the RSR is not clearly discernible due to the low value of the Reynolds number. Nonetheless, the pressure source Term3 perfectly balances transport terms (Term2 + Term2'), while the viscous Term4 is negligible. Unlike the classical turbulence in the RSR, the mutual friction Term6 acts as a source term. Since D_111 is negative, ∂_t D_111 < 0 reflects vortex stretching enhancement, whilst ∂_t D_111 > 0 corroborates with reduced vortex stretching. The sign of Term6 (negative in Eq. (<ref>) and positive in Eq. (<ref>)), directly reflects enhanced vortex stretching in the normal fluid (thus, an accelerated cascade) and reduced vortex stretching and cascade in the superfluid.
For the normal fluid, Term6 and the dissipation source Term5 have opposed signs. For decreasing values of the density ratio ρ_n/ρ, the mutual friction Term6 gradually increases, which in turn leads to an enhancement of the dissipation source Term5. The physical picture behind this statistical equilibrium between terms is that the increase of the vortex stretching rate reflected by Term5 requires damping through the dissipation source term. For the flow to be statistically stationary at the highest normal fluid density ratio (ρ_n/ρ=0.91), only a small vortex stretching rate has to be introduced by the mutual friction. The normal fluid remains indeed unaffected by the superfluid, thus behaving as in classical turbulence. When the superfluid is dominant (ρ_n/ρ=0.09), the mutual friction becomes important in the normal fluid, thus resulting in a large dissipation source term. At the level of Eqs. (<ref>) and (<ref>), the dissipation source term is non-negligible. This term can effectively modify the scaling exponent of the 4th-order structure functions of velocity increment in the RSR. Interestingly, one can expect that for 0.09<ρ_n/ρ<0.5, the mutual friction term cancels the dissipation source term completely. This could trigger an exact 4/3 scaling exponent for the 4th-order structure functions in the RSR, for the normal fluid. Therefore, one of our important conclusions is that the normal fluid behaves at very low temperatures as a perfect fluid, since viscous effects are annihilated by the mutual friction coupling.
For the superfluid, the mutual friction Term6 and the dissipation source Term5 are positive and thus reduce the vortex stretching. When one of them grows, the other one diminishes. In the inviscid limit ν_s = 0, only Term6 prevails. When the temperature goes to absolute zero, Term6 diminishes and there is no source in the superfluid. In classical turbulence, the scaling exponent of the 4th-order structure functions of the velocity increment in RSR (or in the inertial range) should be ζ_4=4/3 as predicated by the Kolmogorov theory K41.
In the HVBK model, the viscosity of the superfluid ν_s is not exactly zero. For large superfluid density ratios (ρ_s/ρ =0.91) the mutual friction term is small and the dissipation source term prevails, being comparable to Term6. For low superfluid density ratios (ρ_s/ρ =0.09), the dissipation source term is negligible compared to the mutual friction term in the RSR. Both Term6 and Term5 are scale-dependent and they may impact the scaling exponent of the 4th-order structure functions.
Finally, the mutual friction terms make the behavior of the 4th-order structure function in the RSR to be more complicated than in classical turbulence. The normal fluid is associated with an enhanced dissipation source term in the RSR for lower and lower temperatures (decreasing ρ_n/ρ). In the superfluid, the mutual friction term acts as an addition to the dissipation source term.
In the following, we complete our overview of the flow by focusing on the smallest scales, represented by velocity gradients.
§ ONE-POINT STATISTICS OF VELOCITY GRADIENTS
We focus on one-point statistics of the small-scale motion. Particular emphasis is put on the flatness of the velocity gradient, which reflects the effect of turbulence intermittency on small scales dynamics. The probability density function (PDF) of the longitudinal velocity gradient ξ = ∂_x u, for the same density ratios as previously (ρ_n/ρ=0.91, 0.5, 0.09), are shown in Figs. <ref> and <ref> for the normal and superfluid components, respectively. Similar to classical turbulence, PDFs exhibit non-Gaussian skewed shapes, with stretched tails skewed towards negative values of the velocity gradients. Note that negative values of velocity gradients are much larger than its variance. For decreasing values of the normal fluid density ratios, PDFs tails become more and more stretched. However, PDFs of the velocity gradients in the superfluid show non-monotonic trends.
The integration over the whole domain leads to the pth-order moment of ξ:
⟨ξ^p ⟩ = ∫_-∞^∞ξ^p PDF(ξ) dξ.
The normalized 4th-order moment is the flatness factor:
F = ⟨ξ^4⟩/⟨ξ^2⟩ ^2.
Figure <ref> shows PDFs of gradients of longitudinal velocity (panels a and b) and normalized PDFs (panels c and d) as
(ξ/σ)^4PDF, where σ = √(⟨ξ^2 ⟩ - ⟨ξ⟩^2) is the standard deviation of the velocity gradient.
PDFs are well converged for large events, with errors smaller than 1%. This signifies that flatness factors computed from the PDFs are accurate. Flatness factors are plotted in Fig. <ref> for all considered cases. For the normal fluid, the flatness factor increases monotonically when ρ_n/ρ diminishes, which indicates that the intermittency in normal fluid is enhanced for lower and lower temperatures. The superfluid follows the same trend as the normal fluid.
This observation can be explained by the energy exchange between the two fluid components. On average, mutual friction acts as a source term that enhances energy at all scales in the normal fluid. Since energy input is expected to occur mainly at locations with strong vorticity, we suggest the following scenario.
First, vorticity distributions in the two fluids are coherent (aligned) and the mutual friction depends directly on the magnitude of the vorticity.
As the relative velocity seems to be uniformly distributed in space, with a Gaussian PDF, we infer that the mutual friction enhances locally the vorticity and thus the intermittency. When the density ratio ρ_n/ρ decreases, the mutual friction term in the normal fluid momentum equation is more important. As a consequence, the intermittency grows when the temperature diminishes. The superfluid is strongly locked with the normal fluid, thus following a similar trend.
We further compute the flatness of the total longitudinal velocity gradient ∂_x u = ρ_n/ρ∂_x u_n +ρ_s/ρ∂_x u_s, with u_n and u_s the longitudinal velocity components in the normal fluid and superfluid, respectively.
Flatness factors of the total longitudinal velocity gradient are plotted against ρ_n/ρ in Fig. <ref>. The flatness factor is controlled by the normal fluid for high ρ_n/ρ, and by the superfluid for low ρ_n/ρ. The intermittency of the total fluid continuously increases when the temperature diminishes.
In Fig.
<ref>, horizontal short lines indicate DNS results of classical turbulence flatness factor for different values of R_λ <cit.>. For Reynolds numbers close to that considered in our simulations (R_λ≈ 94), the flatness F in classical turbulence ranges between 5.42 and 5.55. These values are very close to the flatness we obtained for ρ_n/ρ = 0.91, corresponding to R_λ≈ 90 in the normal fluid. When ρ_n/ρ decreases, R_λ also decreases in normal fluid (due to the mutual friction), and the flatness factor increases for the total fluid. We obtained the value F=5.786 for ρ_n/ρ=0.5. While a resolution of N=512 leads to a flatness that drops back to F=5.268 for ρ_n/ρ=0.09, an enhanced resolution of N=1024 leads to values comparable for both normal and superfluid, thus emphasizing their locking.
HVBK quantum turbulence simulated here exhibits the same degree of intermittency as observed in classical turbulence.
§ THE FLATNESS OF THE VELOCITY DERIVATIVE IN SUPERFLUID TURBULENCE
At this stage, it is important to go back to the theoretical framework provided by first principles (here the HVBK equations) and to consider the limiting behavior of Eqs. (<ref>) and (<ref>).
To obtain the expression of the flatness derivative, we consider that r → 0 and apply a Taylor series expansion up to the fifth-order in r <cit.>. Using the homogeneity hypothesis, we obtain:
∂/∂ x( ∂ u/∂ x)^2( ∂ ^2u/∂x^2) = 0⟹ 2 (∂ u/∂ x) ( ∂^2 u/∂ x^2) = -(∂ u/∂ x)^2 ( ∂^3 u/∂ x^3),
and hence
(δ u)^3≃(∂ u/∂ x)^3 r^3 - 1/4(∂ u/∂ x) ( ∂^2 u/∂ x^2)^2 r^5+....
The 4th-order structure function can be written as
D_1111= (δ u)^4≃( ∂ u/∂ x)^4 r^4+ ...
and similarly
D_1122= ⟨(δ u )^2(δ v )^2⟩≃( ∂ u/∂ x)^2 ( ∂ v/∂ x)^2 r^4+....
An equation for F, the velocity derivative flatness factor (<ref>), can be obtained <cit.> by applying the following operator O to terms in Eqs. (<ref>) and (<ref>):
O(Term) ≡lim_r→ 0Term/r^3/(δ u)^2^2/r^4=lim_r→ 0
r ·Term/(δ u)^2^2.
We obtain that
O (Term 2')= -6 ( ∂ u/∂ x)^2 ( ∂ v/∂ x)^2 / ( ∂ u/∂ x)^2^2 = -6 S_uv,2,
where the notation S_uv,2 was introduced for the sake of simplicity.
The pressure term becomes, once O is applied:
O (Term 3) = - 3 (∂ u/∂ x)^2 ∂^2 p /∂ x^2/(∂ u/∂ x)^2^2.
After applying the operator O to the coefficient r^3, the dissipation term leads to
O (Term 4)|_r^3 = 9ν( ∂^3 u/∂ x^3)( ∂ u /∂ x)^2 /(∂ u/∂ x)^2^2.
Term5 leads to a linear combination
O (Term 5)|_r^3 = - 2ν( ∂^3 u/∂ x^3)(∂ u /∂ y)^2 +4ν(∂^3 u/∂ x^3)(∂ u /∂ x)^2/(∂ u/∂ x)^2^2.
Term6, specific to HVBK equations, leads after Taylor series expansion and application of the operator O, for the normal fluid:
O (Term 6)^n ∼ 3 ρ_s/ρ(∂ u/∂ x)^2(∂ F_∥/∂ x)^ns/(∂ u/∂ x)^2^2,
and for the superfluid
O (Term 6)^s ∼ - 3 ρ_n/ρ(∂ u/∂ x)^2(∂ F_∥/∂ x)^ns/(∂ u/∂ x)^2^2.
Similarly, Term7 leads for the normal fluid
O (Term 7)^n ∼ 3 (∂ u/∂ x)^2(∂ f_∥/∂ x)^n/(∂ u/∂ x)^2^2,
and for the superfluid
O (Term 7)^s ∼ 3 (∂ u/∂ x)^2(∂ f_∥/∂ x)^s/(∂ u/∂ x)^2^2.
The limiting form of Eqs. (<ref>) and (<ref>) as r → 0 can be finally presented as
6(F^n-S_uv,2^n) = O (Term 3)^n + O (Term 4)^n|_r^3 + O (Term 5)^n|_r^3+ O (Term 6)^n+ O (Term 7)^n,
6(1-S_uv,2^s/S_4^s) F^s = O (Term 3)^s + O (Term 4)^s|_r^3 + O (Term 5)^s|_r^3+ O (Term 6)^s+ O (Term 7)^s,
<cit.> showed that S_uv,2 / F ≈ 0.85 if Re_λ >200 and this constant is independent of the Reynolds number. For the present study, values of S_uv,2 / S_4 are shown for different density ratios in Tab. <ref>. These values remain almost unchanged for the ρ_n/ρ = 0.91, 0.5, but for ρ_n/ρ = 0.09, S_uv,2 / S_4 slightly diminishes and drops to 0.75 for the normal fluid, and 0.705 for the superfluid.
Table <ref> shows that all terms in Eq. (<ref>) are very well balanced. This proves that all terms are correctly accounted for.
In the normal fluid, the balance between different terms is reached within an error of 0.05 % for the flatness F. O(Term3) increases as the temperature diminishes (the normal fluid is less and less present). Viscous terms are not negligible in the case of present Re_λ. The combined contribution of O(Term4)+O (Term5) increases, but this enhancement is counter-balanced by the mutual friction force contribution O (Term 6). The external force was neglected, as usually done for larger scales in classical turbulence.
For the superfluid, only the pressure-related term O(Term 3) matters. This result corroborates with a scenario valid for large Reynolds numbers in classical turbulence. O(Term 3) increases monotonically when the temperature decreases. For the lowest temperature, the ratio S_uv,2 /F is the smallest and both S_uv,2 and F are smaller than for higher temperatures. This behaviour is corroborated with the spectral cut-off inherently introduced in DNS at the inter-vortex scale, which leads to an under estimation of high-order moments of small scales (here, represented by velocity gradients). However, this behaviour can have a physical explanation in the superfluid helium by the energy accumulation at scales close to the inter-vortex scale.
We finally note that for ρ_n/ρ=0.09 the terms are not well balanced as in other cases and errors are up to 15%. This is due to the limited resolution for the superfluid at low temperatures.
§ CONCLUSION
We used direct numerical simulations of the HVBK model to inspect, for different density ratios, the behaviour of the 4th-order structure function, as resulting from the transport equation of the 3rd–order structure function. Starting from the HVBK equations for two fluids, we derived the 3rd-order structure function transport equations in both normal and superfluid.
Within the Restricted Scaling Range, we found that the mutual friction does not modify significantly the dynamics of viscous scales. Similar to the classical turbulence, viscous terms and dissipative source terms are less important than the other terms. The mutual friction term acts differently for the two fluid components. For the normal fluid, the mutual friction term has an opposite sign with respect to the dissipation source terms. Depending on the density ratios, it can diminish, and even completely cancel the action of the dissipation source term.
For the lowest temperature, we show that the normal fluid behaves, in the RSR, as a fluid with zero viscosity.
In superfluid, the mutual friction term is mostly irrelevant. It can be neglected when compared to the transport terms and the pressure source term. The dissipation source term, introduced by the (artificial) superfluid viscosity, has the same sign as the mutual friction term, finally resulting in a diminished cascade and reduced small-scales intermittency, as reflected by the flatness of the velocity derivative.
Note that RSR intermittency effects are not addressed here, as the conventional assessment of the scaling exponents is limited by the relatively low values of the Reynolds numbers.
We also used one-point statistics, PDFs of longitudinal velocity gradient to analyse the temperature dependency of small-scale intermittency of quantum turbulence. We conclude that both the normal fluid and superfluid intermittency is enhanced when ρ_n/ρ is decreasing. This is consistent with the strong locking of the two fluids. The flatness factors are also found in reasonable agreement with classical turbulence.
Further perspectives of this work include the account of a more general expression of the friction force, based upon at least one additional equation for e.g. the vortex line density <cit.>. Another open question is the coupling between Navier-Stokes like equations with Gross-Pitaevskii equation for very small scales and very low temperatures.
The authors declare no conflict of interest.
§ ACKNOWLEDGEMENTS
The authors acknowledge financial support from the French ANR grant ANR-18-CE46-0013 QUTE-HPC. This work used computational resources provided by CRIANN (Centre Régional Informatique et d'Applications Numériques de Normandie).
Drs. M. Gauding and G. Sadaka are warmly thanked for technical support and useful discussions.
§ APPENDIX 1. ROBUSTNESS OF THE RESULTS FOR A SMALLER VISCOSITY RATIO
We have performed numerical simulations for a different viscosity ratio, i.e. 0.025, a quarter of that initially studied and reported in the corpus of the paper.
Figure <ref> shows the energy spectrum for different viscosity ratios, and for the density ratio of ρ_s/ρ_n = 1. For smaller viscosity ratio ν_s/ν_n=0.025, the energy content at the level of the cut-off scales is slightly larger than for the viscosity ratio ν_s/ν_n=0.1. While this result is obvious, as the superfluid dissipates less, the difference is negligible. The dissipation scale η_s = (ν_s^3/ε_s)^1/4 (the Kolmogorov scale) for the smaller viscosity ratio ν_s/ν_n=0.025 is significantly reduced, and equal to η_s = 0.0017, whereas it was of η_s = 0.0034 for ν_s/ν_n=0.1.
For ν_s/ν_n=0.025, the viscosity of the superfluid decreases, while the mean energy dissipation rate of the superfluid increases. The dissipation rate for ν_s/ν_n=0.1 was of ε_s = 1.8e-4, while for ν_s/ν_n=0.025 we compute ε_s = 5.5463e-4. The reason of this increase is the accumulation of the energy at small scales, resulting in an increase of velocity gradients.
Figure <ref> shows terms in the equations for different viscosity ratios. Noticeable is the fact that variations of the density ratio affect only the dissipation source term of the superfluid, viz. (- x) and (- -) on the right column. The inertial terms are the same. We can therefore conclude that the choice of the viscosity ratio has limited influence on the results, as long as the ratio of viscosities is small (<0.1) and respects the concept of the HVBK two-fluid model. The same result is supported by our simulations for other values of density ratios.
For lowest temperatures, the resolution currently used is not sufficient to capture the smallest scales motion. We recall that the mesh size should be smaller than both the normal fluid Kolmogorov scale η_n, and the inter-vortex length of the superfluid. The superfluid also has its Kolmogorov scale η_s but it should be irrelevant in the framework of the HVBK two-fluid model.
§ APPENDIX 2. THE EFFECT OF THE RESOLUTION ON THE RESULTS
We have performed additional numerical simulations, with a better resolution. Different statistics, such as spectra for a number of grid points N=512 and N=1024 are depicted in figure <ref> for ρ_n/ρ_s = 1 and ρ_n/ρ_s = 0.1 respectively. For N=1024, the spectrum is cut-off at higher wave numbers. The additional kinetic energy is, however, negligible.
The normalised 4th-order structure function (Fig. <ref>) tends towards a slightly larger value at the smallest scales, but still within the error bars. Figure <ref> depicts values for the flatness of the velocity derivative for two resolutions. While for the normal fluid the results are the same, we notice a slight increase of the flatness of the superfluid at the lowest temperature, from a value of 5.25 obtained for N=512 to a value of 6 for N=1024.
§ APPENDIX 3. EFFECT OF CONSIDERING THE FULL EXPRESSION OF THE MUTUAL FRICTION FORCE
We test our claims by considering a generalized expression of the mutual friction force <cit.>, viz.
F_ns = B/2ρ_sρ_n/ρω_s×[ ω_s× (v_n -v_s -L)]+Bp/2ρ_sρ_n/ρω_s× (v_n -v_s - L),
where L is the vortex line velocity due to the oscillation of the vortex wave and writes
L = κ/4πlog(l/a_0) ∇×ω_s
l=√(κ/ω_s) is the inter-vortex length, a_0 is the vortex core size, and κ is the unit circulation.
In this work, we have made two simplifications.
First, we neglected the velocity due to the vortex line oscillation L. Because in the limit of high Reynolds numbers, l →𝒪(a_0) implies L→𝒪(κ). The latter is too small compared to the characteristic velocity of the superfluid to be taken into account.
On the other hand, in the original idea of the mutual friction force proposed by Hall and Vinen, the vortex lines are considered as filaments with no mass, which implies that the inertial effects of the vortex lines are irrelevant. As a matter of fact, based on the concept of two-fluid model, the superfluid velocity resolved by the NS equations is a space-smoothed value ṽ_s, which is the velocity induced by the vortex line smoothed (or averaged) over a large volume of fluid. In this context, ṽ_s is equivalent to v_s + L. The velocity due to the vortex tangle oscillation is not actually neglected, but merged into ṽ_s.
Although we have ignored L into a simplified scenario, we do not suggest L should always be neglected. The contribution of L is interesting to be considered in some situations. For instance, when v_n -v_s = 0, due to the contribution of L the mutual friction force is not zero. However, for the present work, we neglect L.
The mutual friction force then consists of two components: one is parallel to the relative velocity v_n -v_s, noted F_ns∥ = B/2ρ_sρ_n/ρω_s×[ ω_s× (v_n -v_s)]. The other one is perpendicular to the relative velocity v_n -v_s, noted F_ns⊥ = Bp/2ρ_sρ_n/ρω_s× (v_n -v_s). The mutual friction force is
F_ns = B/2ρ_sρ_n/ρω_s×[ ω_s× (v_n -v_s)]+Bp/2ρ_sρ_n/ρω_s× (v_n -v_s),
and with the supposition that ω_s ⊥ (v_n -v_s), it becomes
F_ns∥ = B/2ρ_sρ_n/ρω_s×[ ω_s× (v_n -v_s)] = - B/2ρ_sρ_n/ρ|ω_s|(v_n -v_s),
and
F_ns⊥ = Bp/2ρ_sρ_n/ρω_s× (v_n -v_s).
The second simplification of the present work is to consider only the component F_ns∥, basically because F_ns⊥ is considered as being non-dissipative and represents a Magnus effect associated with quantized vortices <cit.>. It signifies that F_ns∥ is responsible for the energy exchange between the two components, while F_ns⊥ does not contribute much to the energy exchange between the two fluids.
A first validation of our considerations is backed by the statistics of the angle made by u_n and F_ns. Figure <ref> depicts the PDF of the angle made by the velocity vector and different components of the force F_ns⊥ and F_ns∥, for the normal fluid (left) and the superfluid (right). The PDF ∡ (u_n, F_ns∥) is skewed towards values of the angle between (0,π/2). This signifies that u_n is preferably aligned with F_ns∥. Therefore, F_ns∥ injects energy to the normal fluid. The PDF of the angle ∡ (u_n, F_ns⊥) is almost symmetric about the value of π/2. This signifies that the F_ns⊥ does not inject energy to the normal fluid.
The same qualitative observation holds for the PDF of ∡ (u_s, F_ns). The parallel component F_ns∥ extracts energy from the superfluid and F_ns⊥ does not affect, on average, the superfluid. These are arguments that serve as a basis in neglecting F_ns⊥.
Furthermore, the temperature-related coefficient B is generally larger than Bp. For example, for T=1.95K, B=0.98 and Bp=0.05. The spectrum of u_n,sF_ns⊥ is negligible compared to that of u_n,sF_ns∥, see figure <ref>. This is an additional reason for considering the simplified form of the mutual friction force, as provided by Eq. (<ref>), and considered in the present work.
The scale-by-scale transport equation for the third–order structure function is not affected by the consideration of the complete expression of the friction force, (<ref>).
Additional numerical studies considering the full expression of vortex oscillations will be performed in the future.
64
natexlab#1#1#1#1 #1#1 #1#1#1#1#1#1
#1#1#1#1 #1#1 #1#1
#1#1#1#1#1#1#1#1
[Abid et al.(2003)Abid, Huepe, Metens, Nore, Pham, Tuckerman &
Brachet]Abid2003509
Abid, M., Huepe, C., Metens, S., Nore, C., Pham,
C., Tuckerman, L. & Brachet, M. E. 2003
Gross-Pitaevskii dynamics of Bose-Einstein condensates and
superfluid turbulence. Fluid Dynamics Research 33 (5-6),
509–544.
[Baggaley et al.(2012)Baggaley, Barenghi, Shukurov &
Sergeev]Baggaley_2012
Baggaley, A. W., Barenghi, C. F., Shukurov, A. &
Sergeev, Y. A. 2012 Coherent vortex structures in quantum
turbulence. Europhysics Lett. 98 (2), 26002.
[Balibar(2017)]QT-Balibar-Tisza
Balibar, S. 2017 Laszlo Tisza and the two-fluid model of
superfluidity. Comptes Rendus Physique 18 (9), 586–591.
[Barenghi et al.(1983)Barenghi, Donnelly &
Vinen]Barenghi_1983
Barenghi, C. F., Donnelly, R. J. & Vinen, W. F. 1983
Friction on quantized vortices in Helium II. A review. J.
Low Temp. Phys. 52, 189–247.
[Barenghi et al.(2014a)Barenghi,
L’vov & Roche]Barenghi_2013
Barenghi, C. F., L’vov, V. S. & Roche,
P.-E. 2014a Experimental, numerical, and
analytical velocity spectra in turbulent quantum fluid. Proceedings of
the National Academy of Sciences 111 (Supplement 1),
4683–4690.
[Barenghi et al.(2014b)Barenghi, Skrbek &
Sreenivasan]Barenghi_etal_2014
Barenghi, C. F., Skrbek, L. & Sreenivasan, K. R.
2014b Introduction to quantum turbulence.
Proc. Natl. Acad. Sci. 111, 4647.
[Batchelor & Townsend(1949)]Batchelor_Townsend_nature_1949
Batchelor, G. K. & Townsend, A. A. 1949 The nature
of turbulent motion at large wave-numbers. Proceedings of the Royal
Society of London. Series A. Mathematical and Physical Sciences 199,
238–255.
[Biferale et al.(2018)Biferale, Khomenko, L'vov, Pomyalov,
Procaccia & Sahoo]Biferale_2018
Biferale, L., Khomenko, D., L'vov, V. S., Pomyalov,
A., Procaccia, I. & Sahoo, G. 2018 Turbulent
statistics and intermittency enhancement in coflowing superfluid
^4He. Phys. Rev. Fluids 3, 024605.
[Boschung et al.(2017)Boschung, Hennig, Denker, Pitsch &
Hill]Boschung2017
Boschung, J., Hennig, F., Denker, D., Pitsch, H. &
Hill, R. J. 2017 Analysis of structure function equations up
to the seventh order. J. of Turbulence 18 (11),
1001–1032.
[Boué et al.(2015)Boué, L'vov, Nagar, Nazarenko, Pomyalov
& Procaccia]Boue_2015
Boué, L., L'vov, V. S., Nagar, Y., Nazarenko, S. V.,
Pomyalov, A. & Procaccia, I. 2015 Energy and vorticity
spectra in turbulent superfluid ^4He from T=0 to
T_. Phys. Rev. B 91, 144501.
[Boué et al.(2013)Boué, L'vov, Pomyalov &
Procaccia]Boue_2013
Boué, L., L'vov, V. S., Pomyalov, A. & Procaccia,
I. 2013 Enhancement of intermittency in superfluid turbulence.
Phys. Rev. Lett. 110, 014502.
[Bradley et al.(2008)Bradley, Fisher, Guénault, Haley,
O'Sullivan, Pickett & Tsepelin]Bradley_2008
Bradley, D. I., Fisher, S. N., Guénault, A. M.,
Haley, R. P., O'Sullivan, S., Pickett, G. R. & Tsepelin,
V. 2008 Fluctuations and correlations of pure quantum turbulence
in superfluid ^3HeB.
Phys. Rev. Lett. 101 (4), 065302.
[Djenidi et al.(2017a)Djenidi, Antonia &
Danaila]Djenidi2017PRF
Djenidi, L., Antonia, R. A. & Danaila, L.
2017a Self-preservation relation to the
Kolmogorov similarity hypotheses. Phys. Rev. Fluids
2, 054606.
[Djenidi et al.(2017b)Djenidi, Antonia,
Danaila & Tang]Lyazid2017
Djenidi, L., Antonia, R. A., Danaila, L. & Tang,
S. L. 2017b A note on the velocity
derivative flatness factor in decaying HIT. Phys. of
Fluids 29, 051702.
[Donnelly(1991)]QT-book-1991-donnelly
Donnelly, R. J., ed. 1991 Quantized Vortices in Helium
II. CUP.
[Donnelly(2009)]2009_Donnelly_yearophysic
Donnelly, R. J. 2009 The two-fluid theory and second sound
in liquid Helium. Physics Today 62 (10),
34–39.
[Galantucci et al.(2020)Galantucci, Baggaley, Barenghi &
Krstulovic]QT-coupling-2020-gal
Galantucci, L., Baggaley, A. W., Barenghi, C. F. &
Krstulovic, G. 2020 A new self-consistent approach of quantum
turbulence in superfluid helium. The European Physical Journal Plus
135 (7), 547.
[Galantucci et al.(2021)Galantucci, Krstulovic &
Barenghi]galantucci2021-bundle
Galantucci, L., Krstulovic, G. & Barenghi, C. F.
2021 Friction-enhanced lifetime of bundled quantum vortices.
arXiv 2107.07768.
[Gauding et al.(2017)Gauding, Danaila &
Varea]gauding2017high
Gauding, M., Danaila, L. & Varea, E. 2017
High-order structure functions for passive scalar fed by a mean
gradient. International Journal of Heat and Fluid Flow 67,
86–93.
[Gotoh & Nakano(2003)]Gotoh_Nakano_2003
Gotoh, T. & Nakano, T. 2003 Role of pressure in
turbulence. J. Stat. Phys. 113, 855–875.
[Hall & Vinen(1956)]Hall_Vinen_1956
Hall, H. E. & Vinen, W. F. 1956 The rotation of
liquid Helium II: Experiments on the propagation of second
sound in uniformly rotating Helium II. Proc. Roy.
Soc. London Ser A, 238, 204.
[Halperin & Tsubota(2009)]QT-book-2009-tsubota
Halperin, B. & Tsubota, M., ed. 2009 Quantum
Turbulence. Progress in Low Temperature Physics 16.
Springer.
[Henderson & Barenghi(2004)]henderson2004superfluid
Henderson, K. L. & Barenghi, C. F. 2004 Superfluid
couette flow in an enclosed annulus. Theoretical and Computational
Fluid Dynamics 18 (2), 183–196.
[Hill(2001)]Hill2001
Hill, R. 2001 Equations relating structure functions of
all orders. J. Fluid Mech. 434, 379–388.
[Hill & Boratav(2001)]Hill_Boratav2001
Hill, R. & Boratav, O. 2001 Next-order structure
function equations. Phys. of Fluids 13, 276.
[Ishihara & Gotoh(2009)]Ishihara_2009review
Ishihara, T. & Gotoh, T.and Kaneda, Y. 2009 Study of
high-Reynolds number isotropic turbulence by direct numerical simulation.
Annual Review of Fluid Mechanics 41 (1), 165–180.
[Ishihara et al.(2007)Ishihara, Kaneda, Yokokawa, Itakura &
Uno]Ishihara_2007
Ishihara, T., Kaneda, Y., Yokokawa, M., Itakura, K. &
Uno, A. 2007 Small-scale statistics in high-resolution direct
numerical simulation of turbulence: Reynolds number dependence of one-point
velocity gradient statistics. J. Fluid Mech. 592,
335–366.
[Jou et al.(2011)Jou, Mongiovì &
Sciacca]jou2011hydrodynamic
Jou, D., Mongiovì, M. S. & Sciacca, M. 2011
Hydrodynamic equations of anisotropic, polarized and inhomogeneous
superfluid vortex tangles. Physica D: Nonlinear Phenomena
240 (3), 249–258.
[Khalatnikov(1965)]QT-book-1965-khal
Khalatnikov, I. M. 1965 An Introduction to the Theory of
Superfluidity. Benjamin.
[Kobayashi et al.(2021)Kobayashi, Parnaudeau, Luddens,
Lothodé, Danaila, Brachet & Danaila]dan-2021-CPC-QUTE
Kobayashi, M., Parnaudeau, P., Luddens, F.,
Lothodé, C., Danaila, L., Brachet, M. & Danaila, I.
2021 Quantum turbulence simulations using the Gross-Pitaevskii
equation: High-performance computing and new numerical benchmarks.
Computer Physics Communications 258, 107579.
[Kolmogorov(1941a)]Kolmogorov1941
Kolmogorov, A. N. 1941a Dissipation
of energy in the locally isotropic turbulence. Dokl. Akad. Nauk SSSR
32(1), 16–18.
[Kolmogorov(1941b)]Kolmogorov1941a
Kolmogorov, A. N. 1941b The local
structure of turbulence in incompressible viscous fluids for very large
Reynolds numbers. Dokl. Akad. Nauk SSSR 30(4),
301–305.
[Kolmogorov(1962)]Kolmogorov1962
Kolmogorov, A. N. 1962 A refinement of previous hypotheses
concerning the local structure of turbulence in a viscous incompressible
fluid at high Reynolds number. J. Fluid Mech. 13(1),
82–85.
[Krstulovic(2016)]krstulovic2016
Krstulovic, G. 2016 Grid superfluid turbulence and
intermittency at very low temperature. Phys. Rev. E 93,
063104.
[Landau(1941)]Landau1941
Landau, L. 1941 Theory of the superfluidity of
Helium II. Physical Review 60 (4),
356–358.
[Lipniacki(2006)]QT-Lipniacki-2006
Lipniacki, T. 2006 Dynamics of superfluid 4He: Two-scale
approach. European Journal of Mechanics - B/Fluids 25 (4),
435–458.
[Lvov et al.(2006)Lvov, Nazarenko & Skrbek]Lvov_2006
Lvov, V., Nazarenko, S. & Skrbek, L. 2006
Energy spectra of developed turbulence in Helium superfluids.
J. of Low Temperature Physics 145, 125–142.
[Maurer & Tabeling(1998)]Maurer_1998
Maurer, J. & Tabeling, P. 1998 Local investigation
of superfluid turbulence. Europhysics Lett. 43 (1),
29–34.
[Mongiovi et al.(2018)Mongiovi, Jou & Sciacca]MONGIOVI2018
Mongiovi, M. S., Jou, D. & Sciacca, M. 2018
Non-equilibrium thermodynamics, heat transport and thermal waves in
laminar and turbulent superfluid helium. Physics Reports 726,
1–71, non-equilibrium thermodynamics, heat transport and thermal waves
in laminar and turbulent superfluid helium.
[Nemirovskii(2013)]QT-review-2013-nemirovskii
Nemirovskii, S. K. 2013 Quantum turbulence: Theoretical
and numerical problems. Physics Reports 524, 85–202.
[Nemirovskii(2020)]nemirovskii2020
Nemirovskii, S. K. 2020 On the closure problem of the
coarse-grained hydrodynamics of turbulent superfluids. Journal of Low
Temperature Physics 201, 254–268.
[Nore et al.(1997)Nore, Abid & Brachet]Nore97a
Nore, C., Abid, M. & Brachet, M. E. 1997
Decaying Kolmogorov turbulence in a model of superflow. Physics
of Fluids 9 (9), 2644–2669.
[Roberts & Donnelly(1974)]Roberts_1974
Roberts, P. H. & Donnelly, R. J. 1974 Superfluid
mechanics. Annual Review of Fluid Mechanics 6 (1),
179–225.
[Roche et al.(2009)Roche, Barenghi &
Lévêque]Roche_etal_2009
Roche, P.-E., Barenghi, C. F. & Lévêque, E. 2009
Quantum turbulence at finite temperature: the two-fluids cascade.
European Phys. Lett. 87, 54006.
[Roche et al.(2007)Roche, Diribarne, Didelot, Français,
Rousseau & Willaime]Roche_2007
Roche, P.-E., Diribarne, P., Didelot, T.,
Français, O., Rousseau, L. & Willaime, H. 2007
Vortex density spectrum of quantum turbulence. Europhysics Lett.
77 (6), 66002.
[Rusaouen et al.(2017)Rusaouen, Chabaud, Salort &
Roche]Rusaouen_etal_2017
Rusaouen, E., Chabaud, B., Salort, J. & Roche, P.-E.
2017 Intermittency of quantum turbulence with superfluid fractions
from 0% to 96%. Phys. of Fluids 29, 105108.
[Salort et al.(2010a)Salort, Baudet,
Castaing, Chabaud & Daviaud]Salort_etal_2010
Salort, J., Baudet, C., Castaing, B., Chabaud, B. &
Daviaud, F. 2010a The rotation of liquid
Helium II: Experiments on the propagation of second sound in uniformly
rotating Helium II. Phys. of Fluids 22, 125102.
[Salort et al.(2010b)Salort, Baudet,
Castaing, Chabaud, Daviaud, Didelot, Diribarne, Dubrulle, Gagne, Gauthier,
Girard, Hébral, Rousset, Thibault & Roche]Salort2010Specmeasure
Salort, J., Baudet, C., Castaing, B., Chabaud, B.,
Daviaud, F., Didelot, T., Diribarne, P., Dubrulle, B.,
Gagne, Y., Gauthier, F., Girard, A., Hébral, B.,
Rousset, B., Thibault, P. & Roche, P.-E.
2010b Turbulent velocity spectra in superfluid
flows. Phys. of Fluids 22 (12), 125102.
[Salort et al.(2012)Salort, Chabaud, Lévêque &
Roche]Salort_etal_2012
Salort, J., Chabaud, B., Lévêque, E. & Roche,
P.-E. 2012 Energy cascade and the four-fifths law in superfluid
turbulence. European Phys. Lett. 97, 34006.
[Sasa et al.(2011)Sasa, Kano, Machida, Lvov, Rudenko &
Tsubota]Narimsa_2011
Sasa, N., Kano, T., Machida, M., Lvov, V.,
Rudenko, O. & Tsubota, M. 2011 Energy spectra of
quantum turbulence: Large-scale simulation and modeling. Phys. Rev. B
84, 054525.
[She & Lévêque(1994)]She_1994universal
She, Z.-S. & Lévêque, E. 1994 Universal scaling
laws in fully developed turbulence. Phys. Rev. Lett. 72 (3),
336.
[Shi(2021)]Shi_qian_2021
Shi, J. 2021 Qian Jian (1939–2018) and his contribution
to small-scale turbulence studies. Phys. of Fluids 33 (4),
041301.
[Shukla & Pandit(2016)]Shukla2016
Shukla, V. & Pandit, R. 2016 Multiscaling in
superfluid turbulence: A shell-model study. Phys. Rev. E 94,
043101.
[Skrbek & Sreenivasan(2012a)]QT-review-sreeni-2012
Skrbek, L. & Sreenivasan, K. R. 2012a Developed quantum turbulence. Phys. Fluids 24,
011301(1–48).
[Skrbek & Sreenivasan(2012b)]QT-book-sreeni-2012
Skrbek, L. & Sreenivasan, K. R. 2012b How similar is quantum turbulence to classical turbulence?
In Ten Chapters in Turbulence (ed. P. A. Davidson, Y. Kaneda
& K. R. Sreenivasan), p. 405. Cambridge University Press.
[Tang et al.(2017)Tang, Antonia, Djenidi, Danaila &
Zhou]Shunlin2017
Tang, S. L., Antonia, R. A., Djenidi, L., Danaila, L.
& Zhou, Y. 2017 Finite Reynolds number effect on
the scaling range behavior of turbulent longitudinal velocity structure
functions. J. Fluid Mech. 820, 341–369.
[Tang et al.(2018)Tang, Antonia, Djenidi, Danaila &
Zhou]Shunlin2018
Tang, S. L., Antonia, R. A., Djenidi, L., Danaila, L.
& Zhou, Y. 2018 Reappraisal of the velocity derivative
flatness factor in various turbulent flows. J. Fluid Mech.
847, 244–265.
[Tisza(1938)]Tisza_1938
Tisza, L. 1938 Transport phenomena in Helium
II. Nature 141, 913.
[Townsend(1951)]Townsend1951fine
Townsend, A. A. 1951 On the fine-scale structure of
turbulence. Proc. R. Soc. Lond. A 208 (1095), 534–542.
[Tsubota et al.(2017)Tsubota, Fujimoto &
Yui]QT-review-2017-tsubota-num
Tsubota, M., Fujimoto, K. & Yui, S. 2017
Numerical studies of quantum turbulence. J. of Low Temperature
Physics 188, 119–189.
[Vinen & Niemela(2002)]QT-review-2002-vinen
Vinen, W. F. & Niemela, J. J. 2002 Quantum
turbulence. J. Low Temp. Phys. 128, 167–231.
[Yakhot(2003)]Yakhot2003
Yakhot, V. 2003 Pressure–velocity correlations and
scaling exponents in turbulence. J. Fluid Mech. 495,
135–143.
[Yui et al.(2018)Yui, Tsubota &
Kobayashi]QT-coupling-2018-tsu
Yui, S., Tsubota, M. & Kobayashi, H. 2018
Three-dimensional coupled dynamics of the two-fluid model in superfluid
He 4: deformed velocity profile of normal fluid in thermal counterflow.
Phys. Rev. Lett. 120, 155301.
[Zhou(2021)]zhou_turbulence_2021
Zhou, Y. 2021 Turbulence theories and statistical closure
approaches. Physics Reports 935, 1–117.
|
http://arxiv.org/abs/2303.07339v1
|
20230313175913
|
Constraining the X-ray heating and reionization using 21-cm power spectra with Marginal Neural Ratio Estimation
|
[
"Anchal Saxena",
"Alex Cole",
"Simon Gazagnes",
"P. Daniel Meerburg",
"Christoph Weniger",
"Samuel J. Witte"
] |
astro-ph.CO
|
[
"astro-ph.CO"
] |
firstpage–lastpage
Optimal parallel wire cutting without ancilla qubits
Naoki Yamamoto
March 30, 2023
====================================================
Cosmic Dawn (CD) and Epoch of Reionization (EoR) are epochs of the universe which host invaluable information about the cosmology and astrophysics of X-ray heating and hydrogen reionization. Radio interferometric observations of the 21-cm line at high redshifts have the potential to revolutionize our understanding of the universe during this time. However, modeling the evolution of these epochs is particularly challenging due to the complex interplay of many physical processes. This makes it difficult to perform the conventional statistical analysis using the likelihood-based Markov-Chain Monte Carlo (MCMC) methods, which scales poorly with the dimensionality of the parameter space. In this paper, we show how the Simulation-Based Inference (SBI) through Marginal Neural Ratio Estimation (MNRE) provides a step towards evading these issues. We use to model the 21-cm power spectrum during CD-EoR with a six-dimensional parameter space. With the expected thermal noise from the Square Kilometre Array (SKA), we are able to accurately recover the posterior distribution for the parameters of our model with an order of magnitude fewer simulations than the conventional likelihood-based methods. We further show how the same training dataset can be utilized to investigate the sensitivity of the model parameters over different redshifts. Our results support that such efficient and scalable inference techniques enable us to significantly extend the modeling complexity beyond what is currently achievable with conventional MCMC methods.
dark ages, reionization, first stars – methods: data analysis – methods: statistical
§ INTRODUCTION
sections/introduction.tex
§ IMPLEMENTATION OF MNRE USING SWYFT
sections/swyft_framework.tex
§ SIMULATIONS AND TRAINING DATA
sections/sims_data.tex
§ RESULTS
sections/results.tex
§ SUMMARY
sections/summary.tex
§ ACKNOWLEDGEMENTS
P.D.M acknowledges support from the Netherlands organization for scientific research (NWO) VIDI grant (dossier 639.042.730). S.G acknowledges support from the Harlan J. Smith McDonald fellowship. S.J.W. and C.W. are supported by the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme (Grant agreement No. 864035 - Undark).
§ DATA AVAILABILITY
Accompanying code is available at <https://github.com/anchal-009/swyft_21cmPk>. The data underlying this article will be shared on reasonable request to the corresponding author.
mnras
§ COVERAGE OF THE NETWORK
With the trained network d_ϕ (x, θ), we can quickly estimate the posterior p(θ|x) for any mock observation x. This allows us to test the statistical properties of the Bayesian inference. We evaluate the nominal and empirical expected coverage probabilities to check the consistency of the trained network. Given a set of n i.i.d. samples (x_i, θ_i^*) ∼ p(x, θ), the empirical expected coverage probability of the (1 - α) highest posterior density regions (HPDR) for the posterior estimator p̂(θ|x) is given as <cit.>
1 - α̂ = 1/n∑_i=1^n1[θ_i^* ∈Θ_p̂(θ|x_i)(1-α)] ,
where Θ_p̂(θ|x_i)(1-α) function gives the (1-α) HPDR of p̂(θ|x) for the mock data x_i with the ground truth θ_i^*. We then compare it with the nominal expected coverage probability, which is equal to the confidence level (1 - α). For an estimator with perfect coverage, the empirical coverage probability is equal to the nominal coverage probability, so when we randomly generate n samples (x_i, θ_i^*) ∼ p(x, θ), the ground truth θ_i^* lies outside the (1-α) HPDR in α of the cases <cit.>.
We re-parameterize α (α̂) in terms of a new variable z which is 1 - α/2 (1 - α̂/2) quantile of the standard normal distribution. This means that the (1, 2, 3)σ regions correspond to z=(1, 2, 3) with (1-α) = (0.6827, 0.9545, 0.9997). The uncertainties on the empirical expected coverage probability follow from the finite number of samples (n) and are estimated using the Jeffreys interval <cit.>. In Figure <ref>, we show the empirical expected coverage probability of the network as a function of confidence levels for all 1D and 2D marginal posteriors. We find that in all cases, they match to good precision.
§ COMPARISON WITH 21CMMC
In this section, we compare the posteriors obtained from MNRE with an MCMC sampling-based method, 21CMMC. As sampling our joint six-dimensional parameter space with the likelihood-based approach is computationally very demanding, we shrink our parameter space to two dimensions, including ζ and log_10(T_ vir^ min). We keep the other parameters fixed to {R_ mfp, log_10(L_ X), E_0, α_ X} = {15, 40.5, 0.5, 1} and target redshifts z = 10, 9 and 8.
To set up 21CMMC, we use 48 random walkers with 2000 iterations each, generating ∼ 10^5 samples. On the other hand, the training data for MNRE consists of 10^4 simulations. The mock observation with (ζ, log_10(T_ vir^ min)) = (30, 4.70) is generated using a different realization of the density field from the one used in sampling. In Figure <ref>, we show the posteriors obtained from 21CMMC (red) and MNRE (blue). The 1D and 2D marginal posteriors obtained from MNRE are in good agreement with 21CMMC at a significantly reduced computational cost. These results are consistent with the findings of <cit.>.
|
http://arxiv.org/abs/2303.07099v1
|
20230313133945
|
Beyond Fish and Bicycles: Exploring the Varieties of Online Women's Ideological Spaces
|
[
"Utkucan Balci",
"Chen Ling",
"Emiliano De Cristofaro",
"Megan Squire",
"Gianluca Stringhini",
"Jeremy Blackburn"
] |
cs.CY
|
[
"cs.CY",
"cs.SI"
] |
Beyond Fish and Bicycles: Exploring the Varieties of Online Women's Ideological Spaces
Utkucan Balcı^1, Chen Ling^2, Emiliano De Cristofaro^3,
Megan Squire^4, Gianluca Stringhini^2, Jeremy Blackburn^1
^1Binghamton University, ^2Boston University, ^3University College London, ^4SPLC
========================================================================================================================================================================================================
The Internet has been instrumental in connecting under-represented and vulnerable groups of people.
Platforms built to foster social interaction and engagement have enabled historically disenfranchised groups to have a voice.
One such vulnerable group is women.
In this paper, we explore the diversity in online women's ideological spaces using a multi-dimensional approach.
We perform a large-scale, data-driven analysis of over 6M Reddit comments and submissions from 14 subreddits.
We elicit a diverse taxonomy of online women's ideological spaces, ranging from counterparts to the so-called Manosphere to Gender-Critical Feminism.
We then perform content analysis, finding meaningful differences across topics and communities.
Finally, we shed light on two platforms, ovarit.com and thepinkpill.co, where two toxic communities of online women's ideological spaces (Gender-Critical Feminism and Femcels) migrated after their ban on Reddit.
[1]Published in the Proceedings of the 15th ACM Web Science Conference 2023 (ACM WebSci 2023). Please cite the WebSci version.
§ INTRODUCTION
While issues of misogyny and the LGBTQ+ community have been a part of public discourse for quite some time, the focus on gender, and specifically women, has become central.
Although gender studies is a well-established field, discussions of gender identity have grown well beyond academic circles.
In particular, online communities focused on gender identity of women have emerged, birthing full-blown social movements.
In this paper, we perform the first large-scale, data-driven study of online women's ideological communities – i.e., communities that are focused on not just issues that women face but also what it means to be a woman.
To do so, we construct a dataset of over 6 million posts/comments from 14 women-oriented ideological subreddits.
We perform a data-driven analysis across several axes, focusing on identifying and understanding different subcommunities within our dataset.
First, we identify women-oriented ideological subreddits and quantitatively derive a taxonomy from them, resulting in three clusters: 1) Mainstream Feminism, 2) Gender-Critical Feminism, and 3) Manosphere Analogs.[The Manosphere is, roughly speaking, a conglomerate of Web-based, mostly misogynist, movements focused on “men’s issues” <cit.>.]
We compare the user-base similarity of each community, finding similiarties between Gender-Critical Feminism (which became very popular a few months before being banned) and two Manosphere Analog communities, Femcels and WGTOW.
We then perform a quantitative topic analysis using Top2Vec, a model extracting semantic meaning from text.
We also analyze, qualitatively, a random sample of 100 posts from the various topics; this reveals how even discussions about mundane topics like clothing can serve to differentiate the communities.
We find that Mainstream Feminism is more focused on women's problems related to toxic masculinity; also, among Manosphere Analogs, the overall leaning of the posts of Female Dating Strategy, Femcels, and WGTOW are more similar to each other compared to Red Pill Women.
Finally, we explore the effect of the deplatforming of two toxic communities in our dataset, Gender-Critical Feminism and Femcels.
We find that bans increased the toxicity of latter and decreased that of the former.
That said, deplatforming appears to have increased identity attacks in both communities.
§ BACKGROUND & RELATED WORK
Gender-based ideologies and movements are much older than the Internet and social media.
First-wave feminism dates back to the 19th century <cit.>, the transgender rights movement to the 1950s <cit.>, and the men's rights movement to 1970s <cit.>.
Although there are studies to understand gendered online movements and communities <cit.>, these mostly lack a variety of online women's ideological spaces, prompting the need for a broader taxonomy.
Online Feminism.
Feminism, in general, is defined as “the belief in social, economic, and political equality of the sexes <cit.>.”
In the past, studies on online feminism have predominantly examined the movement as a cohesive whole, without differentiating between its various branches or perspectives.
Previous studies have examined the use of hashtags on Twitter to gain insights into online feminist movements <cit.>.
Khan and Golab <cit.> analyzed gendered movements on Reddit, focusing on r/Feminism, r/MensRights, and r/TheRedPill; they found that users of r/Feminism were more similar to those of the Men's Liberation Movement, a feminist ally, than users of r/MensRights and r/TheRedPill.
Similarly, Brattland <cit.> examined the information preferences of users on r/Feminism and r/MensRights using r/News to investigate the Brock Turner case, and found that only the former actively worked to combat rape culture.
Simoes et al. <cit.> argue that online feminism and misogyny gain strength under similar online conditions.
Studies examining feminist Facebook pages have found that they offer greater participation and empowerment to feminist activism, serving as a safe space <cit.>, and feminism is also linked to greater internal political efficacy <cit.>.
Moreover, while feminism uses “trolling” to celebrate women's embodiment and sexuality and to engage with feminist values, feminists do not suppress debate when being trolled <cit.>.
These studies do not always distinguish between its various branches, even though prior research has identified a division within feminism based on either liberal versus radical or trans-inclusive versus trans-exclusive viewpoints <cit.>.
Gender-Critical Feminism (GCF), also derogatorily known as trans-exclusionary radical feminism (TERF), views transgender people's activism and visibility as a possible threat to women's rights and spaces due to their challenging of the binary understanding of sex and gender <cit.>.
In June 2020, Reddit banned r/GenderCritical in response to new hate speech rules, leading to the migration of r/GenderCritical to a Reddit-like platform called ovarit.com <cit.>.
Previous research used Twitter data to build classifiers to detect TERF hate groups on Twitter <cit.>.
Nonetheless, there has not been any large-scale, comprehensive study that analyzes and compares the more liberal, trans-inclusive side of feminism and the more radical, trans-exclusive side of feminism.
Manosphere “Analogs.”
One well-explored gender-based ideological space is a collection of men's ideological communities called “the Manosphere.”
Lilly <cit.> presented a taxonomy of the Manosphere by analyzing its subcultures, showing these communities view masculinity to be “in crisis,” constantly under attack by feminizing forces, and see feminism as hypocritical and repressive.
Communities within the Manosphere exhibit disturbingly increased levels of toxicity, hate, and a proclivity for real-world violence <cit.>.
There is also a connection between them and the alt-right <cit.>.
The alt-right has embraced the practice of describing women as “shield maidens” and “trad wives,” which serves to mask their underlying white supremacist ideology <cit.>.
The Manosphere, due to its nature, has a notably low participation rate among women <cit.>.
Nevertheless, its increasing popularity has led to the emergence of women's communities analogous to those in the Manosphere.
One example of these “Manosphere Analogs” is femcels (female involuntary celibates).
As the analog of incels, the women in this community cannot find a sexual or a romantic partner, and many share their experiences of living with a body that is deemed unappealing to men <cit.>.
Similar to other pilled ideologies, femcels refer to their “realization” about society as taking the pink pill <cit.>.
In January 2021, a femcel subreddit, r/Trufemcels, was banned on Reddit for violating the site's rules against promoting hate, leading to the community's migration to thepinkpill.co as an alternative <cit.>.
Another example is Red Pill Women (RPW).
As the analog of the Manosphere subculture The Red Pill <cit.>, most of the users in this community do not believe in gender equality, and they discuss house-wife duties, or supporting their alpha men <cit.>.
Even though there are previous studies on RPW and femcels <cit.>, there have not been any large-scale studies focusing on them.
There are also understudied Manosphere Analog communities, or communities that have been covered in online journalistic articles, but only recently gained attention from the academic research community.
One such community is Female Dating Strategy (FDS), present on Reddit as r/FemaleDatingStrategy, and seemingly similar to a Manosphere subgroup called Pick Up Artists (PUA).
Like PUA, FDS members objectify the opposite gender by approaching interactions as some kind of a game <cit.>.
Ling <cit.> examined a sample of r/FemaleDatingStrategy, considering it as a movement related to femcels, but we treat it as a distinct community due to their similarities to PUA.
Notably, Ling identified parallels between femcel ideology and radical feminism.
Another study <cit.> found that Femcels and FDS use certain words in an analogous manner to Manosphere communities.
Another community is WGTOW (Women Going Their Own Way).
As the analog of Men Going Their Own Way (MGTOW), this community consists of women who aim to separate their lives with men, and they have gathered on r/wgtow on Reddit <cit.>.
§ DATASET
While previous research investigated various aspects of online women's ideological spaces (OWIS) <cit.>, a well-defined taxonomy is currently lacking, and certain communities within OWIS remain unexplored.
To address this gap, we select a variety of feminist and Manosphere Analog subreddits as seeds; then, we identify subreddits with a similar community structure (i.e., subreddits that are a part of OWIS).
§.§ Identifying Women-Based Ideological Subreddits
We set out to build a compact cluster that includes all of our seed subreddits, which consist of women-based ideological subreddits covering many viewpoints (e.g., feminist and anti-feminist).
Feminist Seed Subreddits.
We select r/Feminism, which is previously used in studies to represent feminism <cit.>, as well as r/GenderCritical.
While GCF has a relatively toxic culture and has made alliances with non-feminist groups that share their anti-trans views <cit.>, it is a feminist community nevertheless.
By including both r/Feminism and r/GenderCritical as seeds, we aim to capture a wider portion of the OWIS spectrum.
Manosphere Analog Seed Subreddits.
To represent Female Dating Strategy, Femcels, Red Pill Women, and WGTOW, we choose r/FemaleDatingStrategy, r/Trufemcels, r/RedPillWomen, and r/wgtow, as their relationships to these communities are explained in Section <ref>.
Subreddit Embeddings.
To identify the subreddits that belong to OWIS, we rely on pre-trained subreddit embeddings provided by Raymond et al. <cit.>, who build on <cit.> to train subreddit embeddings (aiming to explore the community structure of Reddit).
This embedding is trained with word2vecf <cit.>, using users as contexts and subreddits as words.
The training data consists of comments posted to the top 10,000 subreddits of 2019, which encompass 95.6% of all comments made that year (1.59 billion comments from 19.34 million users) <cit.>.
We opt for this embedding for three reasons:
1) the seed subreddits we select were active between February 2019 (the first post of r/FemaleDatingStrategy) and June 2020 (the last post of r/GenderCritical before its ban), and 2019 accounts for almost two-thirds of this time period,
2) of the six seed subreddits, five are among the 10,000 subreddits featured in this embedding, with the exception of r/wgtow,
and 3) as we show in Section <ref>, the normalized user overlaps of each subreddit we identify later in this section exhibit a strong correlation with their corresponding normalized user overlaps from 2019.
Clustering.
After applying dimensionality reduction with UMAP <cit.>, we perform agglomerative clustering <cit.>, which is hierarchical clustering that follows a bottom-up approach by merging the closest clusters at each step, with the number of clusters controlled by a parameter (k).
We start with k = 10 and increment it by 10 until we find the largest k that results in all of the seed subreddits appearing in the same cluster (i.e., while there is still a single, potential OWIS cluster).
This method produces 50 clusters, where the cluster containing our seed subreddits has a size of 284.
Upon manual inspection, we find these subreddits cover a broader set of topics than just OWIS, including dating-related subreddits (e.g., r/Tinder, r/Bumble, r/dating_advice), self-improvement subreddits (r/selfimprovement, r/IWantToLearn, r/getdisciplined), men's ideological online spaces (e.g., r/TheredPill, r/GenderCriticalGuys, r/MensRights), and many general interest subreddits (r/AmItheAsshole, r/confession, r/offmychest).
To get a more compact cluster, we apply another step of clustering.
We use the same technique on the vectors of the subreddits of this cluster, starting from k = 1 and incrementing by one until we get the largest cluster that contains all seed subreddits.
With k = 7, we get 69 subreddits, most of which are gender-based ideological spaces or subreddits based on appearance (e.g., r/short, r/tall, r/amiugly).
We believe these subreddits are clustered with gender-based ideological spaces mainly because of their relations with Incel subreddits (e.g., r/shortcels).
Results.
To extract women-based ideological subreddits, we manually examine the subreddits in this cluster in terms of names, titles, bios, and banners of these subreddits, choosing the ones that are clearly women-oriented according to our interpretation of the relevant literature (i.e., self-statements that they are women oriented or belong to a women-oriented community).
Overall, we identify 15 women-based subreddits, but ultimately exclude two that are based on appearance (r/TallGirls and r/GirlsMirin), as we find no evidence of them being ideology related.
In the end, our dataset includes 14 subreddits, with 13 from the clustering, along with r/wgtow, a clear analog of MGTOW.
§.§ Data Collection
We collect 6,876,566 posts (submissions + comments) from the 14 subreddits using the Pushshift API <cit.> between February 2008 and February 2022.
Table <ref> reports the total number of posts, and the total number of authors, with the earliest and latest post dates of each subreddit.
The most popular subreddit is r/FemaleDatingStrategy with 1,763,702 posts, followed by r/GenderCritical with 1,629,169 posts, while r/wgtow is the smallest, with 35,644 posts.
Ethics.
We are aware that social media data can potentially reveal personal information.
To ensure that our research adheres to ethical principles, we adopt standard best practices <cit.>, including not attempting to further de-anonymize any author.
As our study solely employs publicly available data and does not involve interactions with participants, our institution does not consider it as human subjects research.
However, to avoid targeting any user on the basis of their comments featured in our topic analysis, when presenting examples, we paraphrase text while preserving its original tone and context.
§ USER ANALYSIS
In this section, we present our taxonomy of OWIS.
Then, we analyze the activity and the user-bases of the communities we identify within the taxonomy.
§.§ Creating an OWIS Taxonomy
In Section <ref>, we use agglomerative clustering to find a cluster that keeps all our seed subreddits by controlling the cluster size.
Next, to create a taxonomy, we perform agglomerative clustering without controlling the cluster size to automatically find the communities of OWIS.
In the end, we find three main clusters:
1) Mainstream Feminism.
2) Gender-Critical Feminism (GCF),
and 3) Manosophere Analogs.
For the latter, rather than examining all the subreddits together, we split the cluster into their respective Manosphere Analog communities (Femcels, FDS, and RPW) while treating r/wgtow as its own community (due to being a direct analog of WGTOW) to allow for more fine-grained analysis.
Figure <ref> presents our final taxonomy, which goes to complement Table <ref>.
Note that Mainstream Feminist subreddits are the oldest, and have the most posts.
Also, due to being banned from Reddit, three of the five Femcel subreddits and all of the GCF subreddits most recent posts are in 2020 and 2021, about a year before the end of our dataset.
§.§ Monthly User Activity
To understand the popularity of the communities over time, we look for their monthly user counts.
Figure <ref> shows Mainstream Feminism is the most popular community for the majority of the time.
We find GCF has become the most popular community in 9 out of 10 months in their last year before their ban on Reddit.
We also see a sharp increase in FDS after its establishment, where they became the most popular community of September 2019.
We observe a trend of decrease in FDS starting after January 2021.
Although the decrease in the monthly user counts of Femcels is naturally expected after three of their subreddits were banned on January 2021, we also see a decrease in this community after the ban on GCF subreddits.
As we explore it next, this can indicate an underlying relationship between the authors of GCF and Femcels.
For RPW, we see a relatively stable monthly user count, with an average of 616 monthly users.
As the smallest community, WGTOW has the fewest monthly users, averaging 114.
§.§ User-Base Overlaps
To look deeper into the relationship between each community, we examine the user overlaps between each subreddit.
Since there are different amounts of users in each community, following Squire's work <cit.>, we normalize the user overlaps with Bonacich's method <cit.>.
From Figure <ref>, we see Mainstream Feminism has the least inter-community normalized user overlaps (mean: 0.35) compared to the other two communities with more than one subreddit, namely, GCF (mean: 0.77) and Femcels (mean:0.67).
This might be due to the subreddits of Mainstream Feminism appealing to more mainstream audiences than the other OWIS communities.
We find r/GenderCritical is less similar to r/Feminism compared to the two subreddits of Manosphere Analogs, r/PinkPillFeminism and r/wgtow.
Considering r/GenderCritical has a more normalized user overlap score with 6 out of 8 Manosphere Analog subreddits compared to any Mainstream Feminist subreddit, this might imply that GCF is a fringe feminist community.
Moreover, RPW is more similar to Femcels and WGTOW compared to other communities.
Also, despite WGTOW having a 0.74 normalized user overlap with r/PinkpillFeminism (a Femcel subreddit), they are closer to FDS compared to their normalized mean overlaps with Femcel subreddits (0.62).
Since we use subreddit embeddings from 2019 to create our taxonomy, we also check whether the user-base overlaps from 2019 correlate with our results.
To this end, we calculate Spearman correlation, finding it to be strong (ρ = 0.95, p < 0.01).
Takeaways.
Mainstream Feminism, GCF, and Manosophere Analogs are the three main communities of OWIS.
Interestingly, even though Mainstream Feminism was the most popular community of OWIS for most of the time, GCF overtook it closer to their ban on Reddit.
We also show that r/GenderCritical has more normalized user overlaps with 6 out of 8 Manosphere Analog subreddits compared to any of the Mainstream Feminist subreddits; this suggests an underlying relationship with GCF and some of the Manosphere Analogs.
§ TOPIC ANALYSIS
We now we examine the main focus of each community by analyzing their most popular topics, which allows us to study, at scale, differences in discussion across the communities.
Topic Modeling. We train a Top2Vec model to explore the most popular topics of the communities of OWIS.
Top2Vec finds the topics of the documents by clustering their embedding vectors using UMAP and HDBSCAN <cit.>, where this intuition comes from the assumption of many semantically similar documents (in our case, posts on Reddit) are indicative of an underlying topic <cit.>.
We choose Top2Vec over “traditional” topic modeling techniques like LDA for three main reasons:
1) Top2Vec does not ignore the ordering and semantics of words, and makes it possible to automatically find the number of topics <cit.>;
2) It finds topics based on documents instead of words; and
3) Its underlying techniques help us capture more specific topics, and yield a better intuition about each community.
While training our model, we use default parameters, remove hyperlinks, and the posts from r/AutoModerator to avoid auto-moderation posts, and train a Doc2Vec <cit.> model from scratch to ensure unique vocabulary (e.g., slang) is captured.
We then conduct a more in-depth analysis of their popular topics by manually reviewing 100 sampled posts for the top 10 most frequently discussed topics in each community.
We remove at most one topic for each community if we consider it an outlier consisting of incoherent posts with basic replies to other posts or salutations.
<ref>tab:feminism_top10,tab:gcf_top10,tab:fds_top10,tab:femcels_top10,tab:rpw_top10,tab:wgtow_top10 show the top 10 topics of each community.
Mainstream Feminism.
We observe that the posts in the sex conviction topic are generally oriented around discussions related to false accusations, e.g:
Fake accusations are increasingly being used as a means of political manipulation.
Posts in the career, kyriarchy (a term linked to patriarchy and refers to an individuals's status in different social categories <cit.>), and toxic masculinity topics are generally about women's disadvantages due to patriarchal and toxic-masculine mindsets, e.g.:
Women get more college degrees but men dominate high-paying jobs.
Posts in the elections topic are US presidential election oriented, focusing on Democratic candidates (e.g., Hillary Clinton and Bernie Sanders),
while those in the sexual assault topic are generally about date rapes or discussions around intoxication and consent, e.g.:
Sexual activity with a person unable to consent due to intoxication is considered rape.
We find two topics related to the Men's Right Activists (MRA) are among the top 10 topics of Mainstream Feminism.
Posts in the MRA (Reddit) topic are generally about the Mainstream Feminist subreddits' tensions between MRAs, e.g.:
It seems that r/mensrights has come here for a downvote brigade.
We also see discussions on MRA and feminism relationship in the MRA topic, with participation from both sides, e.g.:
I hold the belief that if MRA and Feminists were to collaborate, it could be a highly effective path towards achieving equality.
Overall, while certain Mainstream Feminist users oppose MRA on account of the toxic subgroups associated with the movement, there are others who advocate for strengthening the relationship between feminism and MRA as a means of advancing gender equality.
Aligning with feminist history <cit.>, the posts in the abortion topic are supportive of abortion rights.
In addition, the topic of fetuses in relation to abortion often involves ethical, moral, and legal debates, and the prevailing sentiment in these discussions tends to support the idea of abortion being permissible until a certain point in the pregnancy, e.g.:
Once a fetus is considered a person, its right to live takes precedence over a woman's right to make choices regarding her own body, but prior to that, I have no objections.
Gender-Critical Feminism.
Similar to Mainstream Feminism, GCF mostly talks about US presidential election in the elections topic, with focusing on Democratic candidates.
In the bathroom access topic, GCF mostly talks about sharing the bathroom with transgender people and men.
We see many posts criticizing the idea of separating restrooms as “men's” and “others.”
While there are some posts that approach the issue of bathroom access for transgender individuals with a sense of fairness and common sense, there are also posts that display transphobia on this matter, e.g.:
Opposite sex in women's bathroom/locker is not acceptable. Regardless of how much they “pass”.
For trans-athletes, we see posts about the advantages trans-athletes might have in women's sports, with more leaning towards trans-exclusion compared to bathroom access, e.g.:
The solution is not to allow them to participate in sports, rather they can seek employment in a different field.
In the clothing topic, we see many posts on gender-oriented discussions.
Even though we see posts with positive viewpoints on wearing clothes associated with the opposite gender, we also encounter transphobic ones, e.g.:
No one is really transgender. A man in a dress and wig is still not a woman. Men are not women.
GCF mostly talks about bisexuality in the sexual orientation topic, where many posts have users identify themselves as bisexual.
In the leftism and sex work topics, we see support for leftism and opposition to sex work, as it aligns with the radical feminist perspective <cit.>.
We also find discussions related to autogynephilia, a controversial term used for defining male's tendency to sexually arouse by thinking of themselves as woman <cit.>.
We see many posts related to intersex individuals in the karyotype (an individual’s complete set of chromosomes <cit.>) topic.
However, we again encounter many posts that approach the karyotypes in a transphobic manner, e.g.:
Only those who were born with ambiguous genitalia and were misdiagnosed by physicians should be valued as trans women.
As yet another topic of discussion related to the potential challenges faced by transgender individuals, we find discussions related to gender dysphoria (a condition where individuals experience significant distress or discomfort due to a mismatch between their gender identity and the sex they were assigned at birth, or the physical characteristics associated with that sex <cit.>) in the respective topic.
Female Dating Strategy.
True to their name, FDS's most popular topics are primarily oriented around dating and relationships.
In the dating apps, valentines day, jewelry, orgasm, blocking/unblocking, restaurants, and (red/green) flags topics, FDS share their romantic and sexual experiences.
Many of the posts in these topics have leaning to categorize the partners based on their ability to provide, e.g.:
Gift giving in a romantic relationship signals feelings. A thoughtful gift is a green flag, a mediocre effort is yellow, and low effort is a red flag.
We see lots of acronym use, e.g., hvm for high-value males and lvx for low-value ex (partner) in posts, which can be a sign of a toxic culture of FDS.
In the housework topic, FDS mostly talk about not doing housework for their partners or letting their partners do the housework, e.g.:
He is a LVM. He has driven his girlfriends away by expecting them to clean up after him, and his living space is always dirty.
As another indicator of FDS's toxicity, several posts stereotype ethnicities in the ethnicity topic, e.g.:
It is harder for white men to be HV, compared to other races.
In the pets topic, many posts evaluate the partners of FDS users based on their approaches to pets/animals, e.g.:
The way he treats cats worse compared to dogs indicates that he’s a misogynist.
Femcels.
We find that the posts in femcels/incels topic are centered around being a femcel, and opposed to incels, e.g.:
Try to imagine valuing the opinions of incels.
In general, Femcels talk about their appearance more negatively than the other communities.
In the hair color and college topics, Femcels mostly share their experiences and give/seek advice.
Additionally, we observe that in the college topic, Femcels share their negative experiences, often attributing them to their appearance, e.g.:
Even my sorority sisters wouldn't let me in on their group photos because of my look.
This can be related to the bullying and social rejection femcels typically face during their school and work lives <cit.>.
We also observe the impact of negative experiences faced by femcel users due to their appearance in various other topics, with many posts in the attractiveness, lookism, and loneliness topics in this direction, e.g.:
I'm currently content with being a femcel, and I plan to use this time to work on improving my appearance to better align with societal norms.
Femcels use Stacy to define attractive women and Becky as women who can charm a partner even though she is not as attractive as Stacies <cit.>.
Many posts in Stacies-Beckies are about defining “them”, e.g.:
Stacies are very attractive (8-10 over 10), Beckies are 5-7, and the rest might be marked as femcels.
Similar to FDS, we find many posts stereotyping ethnicities instead of defining individuals, e.g.:
Honestly, you're worse than blacks.
Femcels converted an incel term, foid (deragotory term to indicate women are sub-human <cit.>), to “moid” to use it as the same meaning for men <cit.>.
Posts in this topic are usually about complaints from “moids.”
Red Pill Women.
We see discussions regarding TRP and being a RPW in The Red Pill and Red Pill Women topics.
In general, RPW users admire TRP, although many posts emphasize the differences between TRP and RPW, e.g.:
We follow TRP ideology and use its theories and concepts to help achieve the goals related to women that are part of the red pill movement.
We see RPW sharing their experiences and giving each other advice in the emotions and relationships topics, with posts mentioning the term “plate,” a term used by TRP to define “using women only for sex” <cit.>, e.g.:
Don't settle for being a plate to get commitment in hopes of obtaining commitment from someone, but it's not impossible for that commitment to happen either.
In the submissiveness topic, RPW discuss about being submissive, where they refer to their partners as “captains,” e.g.:
I'm owned. My Captain has the authority to establish my position in the way that he decides, and I have given my consent to all of them with pleasure.
In contrast to GCF, RPW tends to focus primarily on femininity in their discussions regarding clothing.
Although the cooking topic is primarily focused on sharing cooking recipes, a considerable number of posts emphasize that the authors are preparing meals for their husbands, partners, or “captains.”
We see posts in the engagement topic are discussions related to engagements/marriages.
We also find RPW classify males into alphas and betas, similar to the Manosphere <cit.>, while RPW talk about their education and give/seek advice in the respective topic, where we also see many posts related to the education degrees of the husbands/partners of RPW.
WGTOW.
Posts in the topics of WGTOW are mostly related to living a single lifestyle.
In the financial independence, renting, and financing topics, posts are mostly about being a WGTOW, emphasizing their struggles, e.g.:
She advises me to be financially independent before considering marriage. She tried to be a good girl, but it did not work for her.
In the MGTOW/WGTOW topic, discussion is mainly about opposing MGTOW, and about being a WGTOW, e.g.:
MGTOW have negative feelings towards women, while WGTOW have positive feelings towards women.
In the moderation topic, posts are generally about subreddit/user bans and discussions about subreddit mods, with posts about adopting a child as a part of the WGTOW lifestyle in the adoption topic.
In the evolution topic, discussions include justifying sexual instincts for the WGTOW lifestyle, e.g.:
It's simply instinct to reproduce. Nobody likes to recognize that animal instincts have influence over them, so they make up ludicrous explanations to justify their basic desires.
Finally, WGTOW users seem to share their experiences and thoughts with friendship, family, and plants topics.
Document Similarities.
We compare the general leaning of posts of each community by looking at the pairwise cosine similarities between the centroids of the Doc2Vec vectors of their posts (See Figure <ref>).
GCF posts are most similar to Mainstream Feminism, while WGTOW ones are more than twice as similar to GCF compared to Mainstream Feminism.
We also find Femcels are most similar to FDS (cosine similarity: 0.54) and WGTOW (cosine similarity: 0.53) communities, whereas, FDS posts are most similar to Femcels.
Similar to Figure <ref>, we find low similarity between RPW and other Manosphere Analog communities.
Takeaways.
Mainstream Feminism is arguably more focused on problems related to the patriarchy and toxic masculinity, while GCF also concentrates on issues related to transgender people, with some of them clearly crossing the threshold into transphobia.
Aligning with their user-base similarities (see Section <ref>), we find FDS, Femcels, and WGTOW are more similar to each other than RPW.
Additionally, while Femcels and WGTOW express opposition to their respective Manosphere counterparts, RPW expresses support for their analogs.
This is also evident in their posts, where RPW users express more admiration for the opposite sex, often due to traditional family roles, compared to the other Manosphere Analogs.
§ TOXICITY ANALYSIS
Since six subreddits from GCF and Femcels were banned due to hateful content, we set out to compare the differences in toxicity levels across the communities.
Ribeiro et al. <cit.> show that a Manosphere community, r/Incels, does not significantly increase their toxicity level after migrating to incels.co.
We also measure the differences in toxicity levels of GCF and Femcels before and after their migrations to their own platforms, namely, ovarit.com and thepinkpill.co.
These platforms have a similar structure to Reddit and refer to their “subreddits” as channels.
ovarit.com.
We collect 658,962 posts between July 2020 and February 2022 using a custom crawler.
Table <ref> reports the top 20 most popular channels of ovarit.com.
GenderCritical is the most popular channel with 287,780 posts, which accounts for 43.6% of all posts of ovarit.com.
We also see many Radical Feminist/Gender-Critical Feminist (e.g., ItsAFetish) Reddit communities on this platform.
thepinkpill.co.
We collect submissions (and their comments) between February 2021, the month this platform was founded, and February 2022.
Overall, we gather 26,778 posts (submissions + comments) from 128 channels.
As reported in Table <ref>, TruFemcels is the most popular channel with 8,380 posts, which makes up 31.2% of all posts.
We also find other femcel subreddits (Vindicta, AskTrueFemcels, and PinkpillFeminism), and FemaleDatingStrategy among the top 20 channels.
WGTOW and TheGlowUp are also on this platform, as the 23rd and 30th most popular channels, respectively.
This makes thepinkpill.co is not just a hub for Femcels, but also for the other Manosophere Analogs, except for RPW.
Measuring Toxicity Levels.
We use Google's Perspective API <cit.>, which relies on several machine learning models to measure abusive content prpoviding scores from 0 to 1, trained on millions of comments using multiple Internet sources <cit.>.
Even though it is a widely used tool in the research community <cit.>, Perspective is not without limitations, with drawbacks including biases and the tendency to mislabel conversational patterns it has not been encountered during its training <cit.>.
In our analysis, we opt for the model; we also use the model, which measures negative or hateful content targeting someone because of their identity (see <cit.>).
Following Hoseini et al. <cit.>, we consider scores ≥ 0.8 as a high score.
Since Ribeiro et al. did not measure the scores of r/Incels and the platform they migrated (incels.co), we also measure their scores, finding a slight increase (0.06% to 0.09%) after deplatforming.
A 2-sample KS Test shows that the difference in distributions are statistically significant for each pair for each Perspective API model for each platform (p < 0.05 for all pairs, all p are adjusted for multiple testing using Benjamini-Hochberg method <cit.>).
Reddit.
Figure <ref> plots the cumulative distributions of and scores of each community.
For both models, GCF tends to have higher scores than the other communities.
We find 12.6% of the posts of GCF have ≥ 0.5 score, followed by FDS (11%≥ 0.5) and Femcels (10.7%≥ 0.5).
However, we find Femcels have the highest percentage of high scores with 1.71% rate (GCF is second with 1.55% and WGTOW is third with 1.51%).
For , GCF has higher scores for both posts with ≥ 0.5 (24.2%) and ≥ 0.8 (4.63%).
GCF is followed by WGTOW and Mainstream Feminism for scores ≥ 0.5 (14.6% and 14.1%), and Femcels and WGTOW for scores ≥ 0.8 (2.05% and 2.04%).
We also find RPW has the least tendency to post with high and scores compared to the other communities.
ovarit.com.
We compare the and score distributions of the GenderCritical channel, the entire ovarit.com, subreddits of GCF, and r/GenderCritical – see Figure <ref>.
We find Reddit's GCF has a higher proportion of scores for both ≥ 0.5 (12.6%) and ≥ 0.8 (1.55%).
Although r/GenderCritical, the entire ovarit.com and its GenderCritical channel have relatively similar proportions for scores ≥ 0.5 (11.82%, 11.63%, and 11.83%) and ≥ 0.8 (1.32%, 1.28% and 1.22%).
However, for scores, ovarit.com and its GenderCritical have slightly more proportion of posts for scores ≥ 0.5 (25.65% and 25.60%) than Reddit's GCF and r/GenderCritical (24.25% and 24.21%).
Even though ovarit.com's GenderCritical has the highest proportion of high scores (4.64%), we find Reddit's GCF has a similar proportion (4.63%), followed by r/GenderCritical and the entire ovarit.com (4.45% and 4.14).
thepinkpill.co.
We find scores of thepinkpill.co and its TruFemcels channel are higher than Reddit's Femcels community and r/Trufemcels – see Figure <ref>.
While more than 20% of the thepinkpill.co and TruFemcels have scores ≥ 0.5 (20.8% and 20.3%), this is 13.1% for r/Trufemcels, and 10.7% for Reddit's Femcels.
For high , thepinkpill.co and TruFemcels have a 3.3% and 3.2% ratio, while we find 2.1% for r/Trufemcels and 1.7% for Reddit's Femcels.
Our findings show similar results to <cit.>, where another gender-based ideological community, Femcels, does not decrease its toxicity levels after their migration due to deplatforming.
We find thepinkpill.co has the highest proportion of scores ≥ 0.5 with 22.7%, followed by TruFemcels (20.3%), r/Trufemcels (12.9%), and Reddit's Femcels (11.7%).
The exact order preserves for high scores with 3.7%, 3.4%, 2.2%, 2.0% respectively.
Which identities do GCF and Femcels attack?
Given that the GCF and Femcels subreddits were banned from Reddit for engaging in hate speech and have the highest proportions of high scores, we conduct an analysis to examine the entities targeted by these communities.
Additionally, we explore the entities targeted in ovarit.com and thepinkpill.co to gain insight into differences in their targeting behaviors following their deplatforming.
Named Entity Recognition.
Next, we extract named entities using the en_core_web_lg model of the SpaCy library <cit.>, which has been trained on datasets like WordNet <cit.> and Common Crawl <cit.>.
en_core_web_lg is a widely used tool in the research community <cit.>.
To gain a clearer understanding of the identities targeted by these communities, we narrow our focus to (named) entities that appear in posts more than 100 times on GCF and Femcels.
For ovarit.com and thepinkpill.co, we adjust these thresholds to account for the lower number of posts on the platforms to which these communities migrated.
Specifically, we scale the thresholds by the fraction of total posts on the migration platforms compared to the total number of posts on their respective origin communities, with keeping the minimum possible threshold as 10.
Table <ref> reports the top 10 entities with high scores for GCF, ovarit.com, Femcels, and thepinkpill.co.
Consistent with the findings in Section <ref>, our analysis reveals that GCF predominantly targets transgender identities.
While the entities “lesbians,” “lesbian,” and “WLW (Women Love Women)” may appear to suggest that GCF also targets lesbians, a closer examination of the posts containing these entities indicates that they are mainly associated with the conflict between trans-exclusionary lesbians and transgender individuals <cit.>, e.g.:
A lot of transgender-women harass lesbians since they do not find the male body sexually attractive.
We also encounter transphobic attitudes in GCF posts that mention “Grindr,” a popular LGBTIQ+ dating app.
Besides transgender identities, GCF targets “Muslims,” “Mexicans,” and “Jews,” although the appearance of “Islamophobia” and “non-Muslim” may suggest that there is a polarization among GCF related to Islam.
We encounter a similar picture for ovarit.com, where the primary target of this platform is also transgender identities.
However, unlike GCF, ovarit.com also targets “Bill Burr (comedian)” and “white” entities more frequently than “Mexicans” and “non-Muslim”.
Our manual inspection on posts that include Bill Burr suggests that GCF targets the comedian due to his statements regarding the role of white women in black oppression <cit.>, which also explains the appearance of “white” in our results – e.g.:
It's clear that Bill Burr doesn't give a shit about women of color and is simply trying to create conflict between women.
Our findings for Femcels are consistent with those presented in Section <ref>, indicating that this community primarily directs its attacks towards ethnicities/identities, as evidenced by all the entities listed in Table <ref> being associated with either ethnicities (BBC, Jewish, White, Indians) or identities (Muslims, Muslim, Islam, Islamic, LGBT).
Our analysis of thepinkpill.co reveals a similar pattern of targeting towards specific groups, such as “Muslims,” “Asians,” “Christians,” “Africans,” and “westerners”.
Our examination of both Reddit and thepinkpill.co demonstrates that Muslims are the primary target for Femcels, e.g.:
Ex-Muslims are the only good Muslims.
Overall, deplatforming does not seem to have altered the set of identities that GCF and Femcels primarily target.
Takeaways.
Communities that are banned from Reddit because of their toxic behavior (Femcels and GCF) are indeed the most toxic communities of OWIS.
We find a decrease in the proportion of high toxicity scores for GCF after their deplatforming.
This is somewhat in contrast with previous work on the Manosphere showing that the toxicity levels of incels do not decrease after their migration <cit.>.
We also find an increase in Femcels, GCF, and incels in terms of high identity attack scores after migrating to their new platforms.
Finally, despite deplatforming, the groups of people mainly targeted by GCF and Femcels do not seem to have changed.
§ DISCUSSION & CONCLUSION
This paper present a data-driven analysis of online women's ideological spaces (OWIS).
We quantitatively derived a taxonomy of OWIS consisting of 14 subreddits, and analyzed over 6M comments along several axes.
Among other things, we found that Gender-Critical Feminism has user-base similarities with Femcels and Women Going Their Own Way, which might seems odd, but can be explained by Gender-Critical Feminism's roots in radical feminism, which is generally more “opposed” to men than other forms of feminism.
Gender-Critical Feminism and Femcels are the most toxic communities, which is in line with the fact that they were been banned from Reddit.
When exploring their migrations to custom-built platforms upon being banned, we observe an increase in toxicity for Femcels, but not for Gender-Critical Feminism.
We also see an increase in identity attacks after migration for both GCF and Femcels, which is one of the specific behaviors that they were banned from Reddit for in the first place.
Similar to what previous work found with alt-right communities like r/The_Donald and Gab <cit.>, deplatforming is correlated with increases in negative behavior for GCF and Femcels.
Acknowledgements.
This material is based upon work supported by the National Science Foundation under Grant No. IIS-2046590 and CNS-1942610.
Chen Ling was supported by the Meta Research PhD Fellowship Award.
abbrv
|
http://arxiv.org/abs/2303.06654v1
|
20230312130328
|
Twice Regularized Markov Decision Processes: The Equivalence between Robustness and Regularization
|
[
"Esther Derman",
"Yevgeniy Men",
"Matthieu Geist",
"Shie Mannor"
] |
cs.LG
|
[
"cs.LG",
"cs.AI"
] |
Twice Regularized Markov Decision Processes:
The Equivalence between
Robustness and Regularization
Esther Derman
Technion
[email protected]
Yevgeniy Men
Technion
[email protected]
Matthieu Geist
Google Research, Brain Team
[email protected]
Shie Mannor
Technion & Nvidia Research
[email protected]
======================================================================================================================================================================================================================================================================================================================================================
Robust Markov decision processes (MDPs) aim to handle changing or partially known system dynamics. To solve them, one typically resorts to robust optimization methods. However, this significantly increases computational complexity and limits scalability in both learning and planning. On the other hand, regularized MDPs show more stability in policy learning without impairing time complexity. Yet, they generally do not encompass uncertainty in the model dynamics. In this work, we aim to learn robust MDPs using regularization. We first show that regularized MDPs are a particular instance of robust MDPs with uncertain reward. We thus establish that policy iteration on reward-robust MDPs can have the same time complexity as on regularized MDPs. We further extend this relationship to MDPs with uncertain transitions: this leads to a regularization term with an additional dependence on the value function. We then generalize regularized MDPs to twice regularized MDPs (MDPs), MDPs with both value and policy regularization. The corresponding Bellman operators enable us to derive planning and learning schemes with convergence and generalization guarantees, thus reducing robustness to regularization. We numerically show this two-fold advantage on tabular and physical domains, highlighting the fact that preserves its efficacy in continuous environments.
reinforcement learning, robust Markov decision processes, robust optimization, regularization, Fenchel-Rockafellar duality
§ INTRODUCTION
MDPs provide a practical framework for solving sequential decision problems under uncertainty <cit.>. However, the chosen strategy can be very sensitive to sampling errors or inaccurate model estimates. This can lead to complete failure in common situations where the model parameters vary adversarially or are simply unknown <cit.>. Robust MDPs aim to mitigate such sensitivity by assuming that the transition and/or reward function (P,r) varies arbitrarily inside a given uncertainty set <cit.>. In this setting, an optimal solution maximizes a performance measure under the worst-case parameters. It can be thought of as a dynamic zero-sum game with an agent choosing the best action while Nature imposes it the most adversarial model. As such, solving robust MDPs involves max-min problems, which can be computationally challenging and limits scalability.
In recent years, several methods have been developed to alleviate the computational concerns raised by robust reinforcement learning (RL).
Apart from <cit.> who consider specific types of coupled uncertainty sets, all rely on a rectangularity assumption without which the problem can be NP-hard <cit.>. This assumption is key to deriving tractable solvers of robust MDPs such as robust value iteration <cit.> or more general robust modified policy iteration (MPI) <cit.>. Yet, reducing time complexity in robust Bellman updates remains challenging and is still researched today <cit.>.
At the same time, the empirical success of regularization in policy search methods has motivated a wide range of algorithms with diverse motivations such as improved exploration <cit.> or stability <cit.>. <cit.> proposed a unified view from which many existing algorithms can be derived. Their regularized MDP formalism opens the path to error propagation analysis in approximate MPI <cit.> and leads to the same bounds as for standard MDPs. Nevertheless, as we further show in Sec. <ref>, policy regularization accounts for reward uncertainty only: it does not encompass uncertainty in the model dynamics.
Despite a vast literature on how regularized policy search works and convergence rates analysis <cit.>, little attention has been given to understanding why it can generate strategies that are robust to external perturbations <cit.>.
To our knowledge, the only works that relate robustness to regularization in RL are
<cit.>. <cit.> employ a distributionally robust optimization approach to regularize an empirical value function. Unfortunately, computing this empirical value necessitates several policy evaluation procedures, which is quickly unpractical. <cit.> provide a dual relationship with robust MDPs under uncertain reward. Their duality result applies to general regularization methods and gives a robust interpretation of soft-actor-critic <cit.>. Although these two works justify the use of regularization for ensuring robustness, they do not enclose any algorithmic novelty. Similarly, <cit.> specifically focus on maximum entropy methods and relate them to either reward or transition robustness. We shall further detail on these most related studies in Sec. <ref>.
The robustness-regularization duality is well established in statistical learning theory <cit.>, as opposed to RL theory.
In fact, standard setups such as classification or regression may be considered as single-stage decision-making problems, one-step MDPs, a particular case of RL setting. Extending this robustness-regularization duality to RL would yield cheaper learning methods with robustness guarantees. As such, we introduce a regularization function Ω_ that depends on the uncertainty set and is defined over both policy and value spaces, thus inducing a twice regularized Bellman operator (see Sec. <ref>). We show that this regularizer yields an equivalence of the form v_π, = v_π, Ω_, where v_π, is the robust value function for policy π and v_π, Ω_ the regularized one. This equivalence is derived through the objective function each value optimizes. More concretely, we formulate the robust value function v_π, as an optimal solution of the robust optimization problem:
max_v∈^v, μ_0 s. t. v≤inf_(P,r)∈T_(P,r)^πv,
RO
where T_(P,r)^π is the evaluation Bellman operator <cit.>. Then, we show that v_π, is also an optimal solution of the convex (non-robust) optimization problem:
max_v∈^v, μ_0 s. t. v≤ T_(P_0,r_0)^πv -Ω_(π, v),
CO
where (P_0,r_0) is the nominal model. This establishes equivalence as the two problems admit the same optimum for any policy.
Moreover, the inequality constraint of (<ref>) enables to derive a twice regularized () Bellman operator defined according to Ω_, a policy and value regularizer. For ball-constrained uncertainty sets, Ω_ has an explicit form and under mild conditions, the corresponding Bellman operators are contracting. The equivalence between the two problems (<ref>) and (<ref>) together with the contraction properties of Bellman operators enable to circumvent robust optimization problems at each Bellman update. As such, it alleviates robust planning and learning algorithms by reducing them to regularized ones, which are known to be as complex as classical methods.
To summarize, we make the following contributions:
(i) We show that regularized MDPs are a specific instance of robust MDPs with uncertain reward. Besides formalizing a general connection between the two settings, our result enables to explicit the uncertainty sets induced by standard regularizers. (ii) We extend this duality to MDPs with uncertain transition and provide the first regularizer that recovers robust MDPs with s-rectangular balls and arbitrary norm. (iii) We introduce twice regularized MDPs (MDPs) that apply both policy and value regularization to retrieve robust MDPs. We establish contraction of the corresponding Bellman operators. This leads us to proposing an MPI algorithm with similar time complexity as vanilla MPI. (iv) We also introduce a model-free algorithm, q-learning, that solves MDPs, and for which we establish theoretical convergence. (v) With the aim of extending q-learning to large state-spaces, we provide an easy method for estimating the value regularization term when a tabular representation is no longer available. Experiments on tabular and continuous domains prove the efficiency of for both planning and learning, thus opening new perspectives towards practical and scalable robust RL.[This paper extends the conference article Twice regularized MDPs and the equivalence between robustness and regularization published in Advances in Neural Information Processing Systems 2021 by . This manuscript extends the theory by introducing q-learning and proving its convergence. We additionally scale this approach to deep RL by proposing our new algorithm, double DQN. Experiments on both tabular and physical domains evaluate the performance of learning, thus confirming our previous findings on planning.]
§ PRELIMINARIES
This section describes the background material that we use throughout our work. Firstly, we introduce some notations. Secondly, we recall useful properties in convex analysis. Thirdly, we address classical discounted MDPs and their linear program (LP) formulation. Fourth, we briefly detail regularized MDPs and the associated operators and lastly, we focus on the robust MDP setting.
§.§ Notations
=-1
We designate the extended reals by := ∪{-∞, ∞}.
Given a finite set , the class of real-valued functions (resp. probability distributions) over is denoted by ^ (resp. Δ_), while the constant function equal to 1 over is denoted by 1_. Similarly, for any set 𝒳, Δ_^𝒳 denotes the class of functions defined over and valued in Δ_. The inner product of two functions , ∈^ is defined as , := ∑_z∈(z)(z), which induces the ℓ_2-norm := √(,). The ℓ_2-norm coincides with its dual norm, = max_≤ 1, =:_*.
Let a function f: ^→. The Legendre-Fenchel transform (or convex conjugate) of f is
f^*() := max_∈^{, - f()}. Given a set ℨ⊆^,
the characteristic function δ_ℨ: ^→ is δ_ℨ() = 0 if ∈ℨ; +∞ otherwise. The Legendre-Fenchel transform of δ_ℨ is the support function
σ_ℨ() = max_∈ℨ, <cit.>.
Let C⊂^ be a convex set and Ω:C→ a strongly convex function.
Throughout this study, the function Ω plays the role of a policy and/or value regularization function.
Its Legendre-Fenchel transform Ω^* satisfies several smoothness properties, hence its alternative name smoothed max operator <cit.>.
Our work makes use of the following result <cit.>.
Given Ω:C→ strongly convex, the following properties hold:
(i)
∇Ω^* is Lipschitz and satisfies
∇Ω^*() = _∈ C, - Ω(), ∀∈^.
(ii) For any c∈, ∈^, Ω^*( + c1_) = Ω^*() +c.
(iii) The Legendre-Fenchel transform Ω^* is non-decreasing.
§.§ Discounted MDPs and LP formulation
Consider an infinite horizon MDP (, , μ_0, γ, P, r) with and finite state and action spaces respectively, 0< μ_0 ∈Δ_ an initial state distribution and γ∈ (0,1) a discount factor. Denoting
:= ×,
P∈Δ_^ is a transition kernel
mapping each state-action pair to a probability distribution over and r∈^ is a reward function.
A policy π∈Δ_^ maps any state s∈ to an action distribution π_s∈Δ_, and we evaluate its performance through the following measure:
ρ(π) := 𝔼[∑_t = 0^∞γ^tr(s_t, a_t) | μ_0, π, P] = v_(P,r)^π, μ_0.
Here, the expectation is conditioned on the process distribution determined by μ_0, π and P,
and for all s∈, v_(P,r)^π(s) = 𝔼[∑_t = 0^∞γ^tr(s_t, a_t) | s_0=s, π, P] is the value function at state s.
Maximizing (<ref>) defines the standard RL objective,
which can be solved thanks to the Bellman operators:
T^π_(P,r)v := r^π + γ P^πv ∀ v∈ℝ^, π∈Δ_^,
T_(P,r)v := max_π∈Δ_^T^π_(P,r)v ∀ v∈ℝ^,
𝒢_(P,r)(v) := {π∈Δ_^: T^π_(P,r)v = T_(P,r)v} ∀ v∈ℝ^,
where r^π := [π_s, r(s,·)]_s∈ and P^π = [P^π(s'| s)]_s',s∈ with P^π(s'| s) := π_s, P(s' | s,·).
Both T^π_(P,r) and T_(P,r) are γ-contractions with respect to (w.r.t.) the supremum norm, so each admits a unique fixed point v^π_(P,r) and v^*_(P,r), respectively. The set of greedy policies w.r.t. value v defines 𝒢_(P,r)(v), and any policy π∈𝒢_(P,r)(v^*_(P,r)) is optimal <cit.>. For all v∈^, the associated function q∈^ is given by q(s,a) = r(s,a) + γP(·|s,a),v ∀ (s,a)∈. In particular, the fixed point v^π_(P,r) satisfies v^π_(P,r) = π_s, q^π_(P,r)(s,·) where q^π_(P,r) is its associated q-function.
The problem in (<ref>) can also be formulated as an LP.
Given a policy π∈Δ_^, we characterize its performance ρ(π) by the following v-LP <cit.>:
min_v∈^v, μ_0 subject to (s.t.) v ≥ r^π + γ P^πv. P^π
This primal objective provides a policy view on the problem. Alternatively, one may take a state visitation perspective by studying the dual objective instead:
max_μ∈^r^π,μ s. t. μ≥ 0 and (𝐈𝐝_^ - γ P_*^π)μ = μ_0, D^π
where P_*^π is the adjoint policy transition operator[It is the adjoint operator of P^π in the sense that P^πv, v' = v, P_*^πv' ∀ v, v'∈^.]:
[P_*^πμ](s):= ∑_s̅∈P^π(s|s̅)μ(s̅) ∀μ∈^,
and 𝐈𝐝_ is the identity function in ^.
Let 𝐈(s'| s,a) := δ_s'=s ∀ (s,a,s')∈× the trivial transition matrix and
define its adjoint transition operator as 𝐈_*μ(s) := ∑_(s̅, a̅)∈𝐈(s| s̅, a̅)μ(s̅, a̅) ∀ s∈.
The correspondence between occupancy measures and policies lies in the one-to-one mapping
μ↦μ(·, ·)/𝐈_*μ(·)=:π_μ
and its inverse π↦μ_π given by
μ_π(s,a):= ∑_t = 0^∞γ^tℙ(s_t=s, a_t = a |μ_0, π, P) ∀ (s,a)∈.
As such, one can interchangeably work with the primal LP (<ref>) or the dual (<ref>).
§.§ Regularized MDPs
A regularized MDP is a tuple (, , μ_0, γ, P, r, Ω) with (, , μ_0, γ, P, r) an infinite horizon MDP as above, and Ω:= (Ω_s)_s∈ a finite set of functions such that for all s∈, Ω_s: Δ_→ is strongly convex. Each function Ω_s plays the role of a policy regularizer Ω_s(π_s). With a slight abuse of notation, we shall denote by Ω(π):= (Ω_s(π_s))_s∈ the family of state-dependent regularizers.[In the formalism of <cit.>, Ω_s is initially constant over . However, later in the paper <cit.>, it changes according to policy iterates. Here, we alternatively define a family Ω of state-dependent regularizers, which accounts for state-dependent uncertainty sets (see Sec. <ref> below).] The regularized Bellman evaluation operator is given by
[T^π, Ω_(P,r)v](s) := T^π_(P,r)v(s) - Ω_s(π_s) ∀ v∈^, s∈,
and the regularized Bellman optimality operator by T^*,Ω_(P,r)v:= max_π∈Δ_^T^π, Ω_(P,r)v ∀ v∈^ <cit.>. The unique fixed point of T^π, Ω_(P,r) (respectively T^*,Ω_(P,r)) is denoted by v^π, Ω_(P,r) (resp. v^*,Ω_(P,r)) and defines the regularized value function (resp. regularized optimal value function).
Although the regularized MDP formalism stems from the aforementioned Bellman operators in <cit.>, it turns out that regularized MDPs are MDPs with modified reward. Indeed, for any policy π∈Δ_^, the regularized value function is v^π, Ω_(P,r) = (𝐈_ - γ P^π)^-1(r^π - Ω(π)), which corresponds to a non-regularized value with expected reward r̃^π:= r^π - Ω(π). Note that the modified reward r̃^π(s) is no longer linear in π_s because of Ω_s being strongly convex. Also, this modification does not apply to the reward function r but only to its expectation r^π, as we cannot regularize the original reward without making it policy-independent.
§.§ Robust MDPs
In general, the MDP model is not explicitly known but rather estimated from sampled trajectories. As this may result in over-sensitive outcome <cit.>, robust MDPs reduce such performance variation. Formally, a robust MDP (, , μ_0, γ, ) is an MDP with uncertain model belonging to :=×, uncertain transition P∈⊆Δ_^ and
reward r∈⊆^ <cit.>.
The uncertainty set typically controls the confidence level of a model estimate, which in turn determines the agent's level of robustness.
It is given to the agent, who seeks to maximize performance under the worst-case model (P,r)∈. Although intractable in general, this problem can be solved in polynomial time for rectangular uncertainty sets, when = ×_s∈_s = ×_s∈(_s×_s) <cit.>. For any policy π∈Δ_^
and state s∈, the robust value function at s is v^π, (s) := min_(P,r)∈ v_(P,r)^π(s)
and the robust optimal value function v^*, (s):= max_π∈Δ_^v^π, (s).
Each of them is the unique fixed point of the respective robust Bellman operators:
[T^π, v](s) := min_(P, r)∈ T_(P,r)^πv(s) ∀ v∈^, s∈, π∈Δ_^,
[T^*, v](s) := max_π∈Δ_^[T^π, v](s) ∀ v∈^, s∈,
which are γ-contractions. For all v∈^, the associated robust q-function is given by
q(s,a) = min_(P, r)∈{r(s,a) + γP(·|s,a),v} ∀ (s,a)∈, so that v^π, = π_s, q^π,(s,·) where q^π, is the robust q-function associated to v^π,.
§ REWARD-ROBUST MDPS
This section focuses on reward-robust MDPs, robust MDPs with uncertain reward but known transition model. We first show that regularized MDPs represent a particular instance of reward-robust MDPs, as both solve the same optimization problem. This equivalence provides a theoretical motivation for the heuristic success of policy regularization. Then, we explicit the uncertainty set underlying some standard regularization functions, thus suggesting an interpretable explanation of their empirical robustness.
We first show the following proposition <ref>, which applies to general robust MDPs and random policies. It slightly extends <cit.>, as Lemma 3.2 there focuses on uncertain-transition MDPs and deterministic policies. For completeness, we provide a proof of Prop. <ref> in Appx. <ref>.
For any policy π∈Δ_^, the robust value function v^π, is the optimal solution of the robust optimization problem:
max_v∈^v, μ_0 s. t. v≤ T_(P,r)^πv for all (P,r)∈. P_
In the robust optimization problem (<ref>), the inequality constraint must hold over the whole uncertainty set . As such, a function v∈^ is said to be robust feasible for (<ref>) if v≤ T_(P,r)^πv for all (P,r)∈ or equivalently, if max_(P,r)∈{v(s) - T_(P,r)^πv(s) }≤ 0 for all s∈. Therefore, checking robust feasibility requires to solve a maximization problem. For properly structured uncertainty sets, a closed form solution can be derived, as we shall see in the sequel.
As standard in the robust RL literature <cit.>, the remaining of this work focuses on uncertainty sets centered around a known nominal model.
Formally, given P_0 (resp. r_0) a nominal
transition kernel (resp. reward function), we consider uncertainty sets of the form
(P_0 + )× ( r_0+ ). The size of × quantifies our level of uncertainty or alternatively, the desired degree of robustness.
§.§ Reward-robust and regularized MDPs: an equivalence
We now focus on reward-robust MDPs, robust MDPs with = {P_0}× (r_0+ ). Thm. <ref> establishes that reward-robust MDPs are in fact regularized MDPs whose regularizer is given by a support function. Its proof can be found in Appx. <ref>. This result brings two take-home messages: (i) policy regularization is equivalent to reward uncertainty; (ii) policy iteration on reward-robust MDPs has the same convergence rate as regularized MDPs, which in turn is the same as standard MDPs <cit.>.
Assume that = {P_0}× (r_0+ ). Then, for any policy π∈Δ_^, the robust value function v^π, is the optimal solution of the convex optimization problem:
max_v∈^v, μ_0 s. t. v(s)≤ T_(P_0,r_0)^πv(s) - σ__s(-π_s) for all s∈,
where σ__s is the support function of the reward uncertainty set (see definition in Sec. <ref>).
Thm. <ref> clearly highlights a convex regularizer Ω_s(π_s):= σ__s(-π_s) ∀ s∈. We thus recover a regularized MDP by setting
[T^π,Ωv](s) = T_(P_0,r_0)^πv(s) - σ__s(-π_s) ∀ s∈. In particular, when _s is a ball of radius α_s^r, the support function (or regularizer) can be written in closed form as Ω_s(π_s):= α_s^rπ_s, which is strongly convex. We formalize this below (see proof in Appx. <ref>).
Let π∈Δ_^ and = {P_0}× (r_0+ ). Further assume that for all s∈, the reward uncertainty set at s is _s:= {r_s∈^: r_s≤α_s^r}. Then, the robust value function v^π, is the optimal solution of the convex optimization problem:
max_v∈^v, μ_0 s. t. v(s)≤ T_(P_0,r_0)^πv(s) - α_s^rπ_s for all s∈.
While regularization induces reward-robustness,
Thm. <ref> and Cor. <ref> suggest that, on the other hand, specific reward-robust MDPs recover well-known policy regularization methods. In the following section, we explicit the reward-uncertainty sets underlying some of these regularizers.
§.§ Related Algorithms
Consider a reward uncertainty set of the form := ×_(s,a)∈_s,a. This defines an (s,a)-rectangular (a particular type of s-rectangular ) whose rectangles _s,a are independently defined for each state-action pair. For the regularizers below, we derive appropriate _s,a-s that recover the same regularized value function. Detailed proofs are in Appx. <ref>. There, we also include a summary table that reviews the properties of some RL regularizers, as well as our function which we shall introduce later in Sec. <ref>. Note that the reward uncertainty sets here depend on the policy. This is due to the fact that standard regularizers are defined over the policy space and not at each state-action pair. It similarly explains why the reward modification induced by regularization does not apply to the original reward function, as already mentioned in Sec. <ref>.
Negative Shannon entropy:
Let _s,a^NS(π):= [ln(1/π_s(a)), +∞) ∀ (s,a)∈.
The associated support function enables to write:
σ__s^NS(π)(-π_s)
= max_r(s,·): r(s,a')∈_s,a'^NS(π), a'∈∑_a∈ -r(s,a)π_s(a)
= ∑_a∈π_s(a)ln(π_s(a)),
where the last equality comes from maximizing -r(s,a) over [ln(1/π_s(a)), +∞) for each a∈.
We thus recover the negative Shannon entropy Ω(π_s)= ∑_a∈π_s(a)ln(π_s(a)) <cit.>.
Kullback-Leibler divergence: Given an action distribution 0<d∈Δ_, let _s,a^KL(π):= ln(d(a)) + _s,a^NS(π) ∀ (s,a)∈. It amounts to translating the interval
_s,a^NS by the given constant. Writing the support function yields Ω(π_s)= ∑_a∈π_s(a)ln(π_s(a)/d(a)), which is exactly the KL divergence <cit.>.
Negative Tsallis entropy: Letting _s,a^T(π):= [(1-π_s(a))/2, +∞) ∀ (s,a)∈, we recognize the negative Tsallis entropy Ω(π_s) = 1/2(π_s^2-1) <cit.>.
The worst-case rewards derived for the KL divergence and the Tsallis entropy are consistent with those obtained by <cit.>. Indeed, in both cases, taking the finite endpoint of the interval recovers the same worst-case reward. Yet, the dual view adopted there yields larger reward uncertainty, which may yield more conservative solutions when using approximate solvers.
§.§ Policy-gradient for reward-robust MDPs
The equivalence between reward-robust and regularized MDPs leads us to wonder whether we can employ policy-gradient <cit.> on reward-robust MDPs using regularization. The following result establishes that a policy-gradient theorem can indeed be established for reward-robust MDPs (see proof in Appx. <ref>).
Assume that = {P_0}× (r_0+ ) with _s= {r_s∈^: r_s≤α_s^r}. Then, the gradient of the reward-robust objective J_(π):= v^π, , μ_0 is given by
∇ J_(π) = 𝔼_(s,a)∼μ_π[ ∇lnπ_s(a)(q^π, (s,a) - α_s^rπ_s(a)/π_s)],
where μ_π is the occupancy measure under the nominal model P_0 and policy π.
Although Prop. <ref> is an application of <cit.> for a specific regularized MDP, its reward-robust formulation is novel and suggests another simplification of robust methods. Indeed, previous works that exploit policy-gradient on robust MDPs involve the occupancy measure of the worst-case model <cit.>, whereas our result sticks to the nominal. In practice, Prop. <ref> enables to learn a robust policy by sampling transitions from the nominal model instead of all uncertain models. This has a twofold advantage: (i) it avoids an additional computation of the minimum as done in <cit.>, where the authors sample next-state transitions and rewards based on all parameters from the uncertainty set, then update a policy based on the worst outcome; (ii) it releases from restricting to finite uncertainty sets. In fact, our regularizer accounts for robustness regardless of the sampling procedure, whereas the parallel simulations of <cit.> require the uncertainty set to be finite. Technical difficulties are yet to be addressed for generalizing our result to transition-uncertain MDPs, because of the interdependence between the regularizer and the value function (see Secs. <ref>-<ref>). We detail more on this issue in Appx. <ref>. Recently, <cit.> established a robust policy gradient for transition-uncertain MDPs, but their setting focuses on a fixed mixture between the nominal kernel and an arbitrary transition matrix, = ((1-R)P_0 + RΔ_^ )×{r_0}. By design, this yields an (s,a)-rectangular uncertainty set included in an ℓ_∞-ball of size R around the nominal, whereas our setup considers more general s-rectangular uncertainty.
§ GENERAL ROBUST MDPS
Now that we have established policy regularization as a reward-robust problem, we would like to study the opposite question: can any robust MDP with both uncertain reward and transition be solved using regularization instead of robust optimization? If so, is the regularization function easy to determine? In this section, we answer positively to both questions for properly defined robust MDPs. This greatly facilitates robust RL, as it avoids the increased complexity of robust planning algorithms while still reaching robust performance.
The following theorem establishes that similarly to reward-robust MDPs, robust MDPs can be formulated through regularization (see proof in Appx. <ref>). Although the regularizer is also a support function in that case, it depends on both the policy and the value objective, which may further explain the difficulty of dealing with robust MDPs.
Assume that = (P_0+ )×(r_0+ ). Then, for any policy π∈Δ_^, the robust value function v^π, is the optimal solution of the convex optimization problem:
max_v∈^v, μ_0 s. t. v(s)≤ T_(P_0,r_0)^πv(s) -σ__s(-π_s) -σ__s(-γ v·π_s) for all s∈,
where [v·π_s](s',a):=v(s')π_s(a) ∀ (s',a)∈.
The upper-bound in the inequality constraint (<ref>) is of the same spirit as the regularized Bellman operator: the first term is a standard, non-regularized Bellman operator on the nominal model (P_0, r_0) to which we subtract a policy and value-dependent function playing the role of regularization.
This function reminds that of <cit.> also coming from conjugacy. This is the only similarity between both regularizers: in <cit.>, the Legendre-Fenchel transform is applied on a different type of function and results in a regularization term that has no closed form but can only be bounded from above. Moreover, the setup considered there is different since it studies distributionally robust MDPs. As such, it involves general convex optimization, whereas we focus on the robust formulation of an LP.
The support function further simplifies when the uncertainty set is a ball, as shown below. Yet, the dependence of the regularizer on the value function prevents us from readily applying the regularized MDP tool-set. We shall study the properties of this new regularization function in Sec. <ref>.
Assume that = (P_0+ )×(r_0+ ) with _s:= {P_s∈^: P_s≤α_s^P} and _s:= {r_s∈^: r_s≤α_s^r} for all s∈. Then, the robust value function v^π, is the optimal solution of the convex optimization problem:
max_v∈^v, μ_0 s. t. v(s)≤ T_(P_0,r_0)^πv(s) -α_s^rπ_s - α_s^Pγvπ_s for all s∈.
We restrict our statement to the ℓ_2-norm for notation convenience only, the dual norm of ℓ_2 being ℓ_2 itself. In fact, one can consider two different norms for reward and transition uncertainties. Thus, Cor. <ref> can be rewritten with an arbitrary norm, which would reveal a dual norm ·_* instead of · in Eq. (<ref>) (see proof in Appx. <ref>). As a result, our regularization function recovers a robust value function independently of the chosen norm, which extends previous results from <cit.>. Indeed, <cit.> reduce the complexity of robust planning under the ℓ_1-norm only, while <cit.> focus on KL and ℓ_2 ball-constrained uncertainty sets. Both works rely on the specific structure induced by the divergence they consider to derive more efficient robust Bellman updates. Differently, our method circumvents these updates using a generic, problem-independent regularization function while still encompassing s-rectangular uncertainty sets as in <cit.>.
§ MDPS
In Sec. <ref>, we showed that for general robust MDPs, the optimization constraint involves a regularization term that depends on the value function itself. This adds a difficulty to the reward-robust case where the regularization only depends on the policy. Yet, we provided an explicit regularizer for general robust MDPs that are ball-constrained. In this section, we introduce MDPs, an extension of regularized MDPs that combines policy and value regularization. The core idea is to further regularize the Bellman operators with a value-dependent term that recovers the support functions we derived from the robust optimization problems of Secs. <ref>-<ref>.
For all v∈^, define Ω_v, : Δ_→ as
Ω_v, (π_s):= π_s (α_s^r + α_s^P γv). The Bellman evaluation and optimality operators are defined as
[T^π,v](s) := T_(P_0,r_0)^πv(s)-Ω_v, (π_s) ∀ s∈,
[T^*, v](s) := max_π∈Δ_^ [T^π,v](s)= Ω_v, ^*(q_s) ∀ s∈.
For any function v∈^, the associated unique greedy policy is defined as
π_s = _π_s∈Δ_ T^π,v(s)= ∇Ω_v, ^*(q_s), ∀ s∈,
that is, in vector form, π = ∇Ω_v, ^*(q) =: 𝒢_Ω_(v) T^π,v = T^*, v.
The Bellman evaluation operator is not linear because of the functional norm appearing in the regularization function. Yet, under the following assumption, it is contracting and we can apply Banach's fixed point theorem to define the value function.
[Bounded radius]
For all s∈, there exists ϵ_s > 0 such that
α_s^P≤min( 1-γ-ϵ_s/γ√(); min_𝐮_∈^_+, 𝐮_=1
𝐯_∈^_+, 𝐯_=1𝐮_^⊤ P_0(·| s,·)𝐯_).
Asm. <ref> requires to upper bound the ball radius of transition uncertainty sets. The first term in the minimum is needed for establishing contraction of Bellman operators (item (iii) in Prop. <ref>), while the second one is used for ensuring monotonicity (item (i) in Prop. <ref>). We remark that the former depends on the original discount factor γ: radius α_s^P must be smaller as γ tends to 1 but can arbitrarily grow as γ decreases to 0, without altering contraction. Indeed, larger γ implies longer time horizon and higher stochasticity, which explains why we need tighter level of uncertainty then. Otherwise, value and policy regularization seem unable to handle the mixed effects of parametric and stochastic uncertainties. The additional dependence on the state-space size comes from the ℓ_2-norm chosen for the ball constraints. In fact, for any ℓ_p-norm of dual ℓ_q, ^1/q replaces √() in the denominator, so the bound becomes independent of as (p,q) tends to (1,∞) (see Appx. <ref>). Although we recognize a generalized Rayleigh quotient-type problem in the second minimum <cit.>, its interpretation in our context remains unclear. Asm. <ref> enables the Bellman operators to admit a unique fixed point, among other nice properties. We formalize this below (see proof in Appx. <ref>).
Suppose that Asm. <ref> holds. Then, the following properties hold:
(i) Monotonicity: For all v_1, v_2∈^ such that v_1≤ v_2, we have T^π,v_1 ≤ T^π,v_2 and
T^*, v_1 ≤ T^*, v_2.
(ii) Sub-distributivity: For all v_1∈^, c∈, we have T^π,(v_1 + c1_)≤ T^π,v_1 + γ c1_ and T^*, (v_1 + c1_)≤ T^*, v_1 + γ c1_, ∀ c∈.
(iii) Contraction: Let ϵ_*:= min_s∈ϵ_s>0. Then, for all v_1, v_2∈^, we have
T^π,v_1 - T^π,v_2_∞≤ (1-ϵ_*)v_1-v_2_∞ and
T^*, v_1 - T^*, v_2_∞≤ (1-ϵ_*)v_1-v_2_∞.
We emphasize that the contracting coefficient 1-ϵ^* from Prop. <ref> is different from the original discount factor γ. Yet, as Asm. <ref> suggests it, an intrinsic dependence between γ and
ϵ^* makes the Bellman updates similar to the standard ones: when γ tends to 0, the value of ϵ^* required for Asm. <ref> to hold increases, which makes the contracting coefficient 1-ϵ^* tend to 0 as well, the two contracting coefficients behave similarly.
The contracting feature of both Bellman operators finally leads us to introduce value functions.
(i) The value function v^π, is defined as the unique fixed point of the Bellman evaluation operator: v^π, = T^π,v^π,. The associated q-function is q^π,(s,a) = r_0(s,a) + γ P_0(·|s,a), v^π,.
(ii) The optimal value function v^*, is defined as the unique fixed point of the Bellman optimal operator: v^*, = T^*,v^*,. The associated q-function is q^*,(s,a) = r_0(s,a) + γ P_0(·|s,a), v^*,.
The monotonicity of Bellman operators plays a key role in reaching an optimal policy, as we show in the following. A proof can be found in Appx. <ref>.
The greedy policy π^*, = 𝒢_Ω_(v^*, ) is the unique optimal policy, for all π∈Δ_^, v^π^*, = v^*, ≥ v^π,.
An optimal policy may be stochastic. This is due to the fact that our MDP framework builds upon the general s-rectangularity assumption. Robust MDPs with s-rectangular uncertainty sets may similarly yield an optimal robust policy that is stochastic <cit.>. Nonetheless, the MDP formulation recovers a deterministic optimal policy in the more specific (s,a)-rectangular case, which is in accordance with the robust MDP setting (see proof in Appx. <ref>). [The stochasticity of an optimal entropy-regularized policy as in the examples of Sec. <ref> is not contradicting. Indeed, even though the corresponding uncertainty set is (s,a)-rectangular there, it is policy-dependent. ]
§ PLANNING IN MDPS
§.§ Modified Policy Iteration
R0.33
All of the results above ensure convergence of MPI in MDPs. We call that method MPI and provide its pseudo-code in Alg. <ref>. The convergence proof follows the same lines as in <cit.>. Moreover, the contracting property of the Bellman operator ensures the same convergence rate as in standard and robust MDPs, a geometric convergence rate. On the other hand, MPI reduces the computational complexity of robust MPI by avoiding to solve a max-min problem at each iteration, as this can take polynomial time for general convex programs. Advantageously, the only optimization involved in MPI lies in the greedy step: it amounts to projecting onto the simplex, which can efficiently be performed in linear time <cit.>. Still, such projection is not even necessary in the (s,a)-rectangular case: as mentioned in Rmk. <ref>, it then suffices to choose a greedy action in order to eventually achieve an optimal value function.
§.§ Planning on a Maze
We aim to compare the computing time of MPI with that of MPI <cit.> and robust MPI <cit.>. The code is available at <https://github.com/EstherDerman/r2mdp>. To do so, we run experiments on an Intel(R) Core(TM) i7-1068NG7 CPU @ 2.30GHz machine, which we test on a 5×5 grid-world domain. In that environment, the agent starts from a random position and seeks to reach a goal state in order to maximize reward. Thus, the reward function is zero in all states but two: one provides a reward of 1 while the other gives 10. An episode ends when either one of those two states is attained.
The partial evaluation of each policy iterate is a building block of MPI. As a sanity check, we evaluate the uniform policy through both and robust policy evaluation (PE) sub-processes, to ensure that the two value outputs coincide.
For simplicity, we focus on an (s,a)-rectangular uncertainty set and take the same ball radius α^r (resp. α^P) at each state-action pair for the reward function (resp. transition function). Parameter values and other implementation details are deferred to Appx. <ref>. We obtain the same value for PE and robust PE, which numerically confirms Thm. <ref>. On the other hand, both are strictly smaller than their non-robust, non-regularized counterpart, but as expected, they converge to the standard value function when all ball radii tend to 0 (see Appx. <ref>). More importantly, PE converges in 0.02 seconds, whereas robust PE takes 54.8 seconds to converge, 2740 times longer. This complexity gap comes from the minimization problems being solved at each iteration of robust PE, something that PE avoids thanks to regularization. PE still takes 2.5 times longer than its standard, non-regularized counterpart, because of the additional computation of regularization terms. Table <ref> shows the time spent by each algorithm until convergence.
We then study the overall MPI process for each approach. We know that in vanilla MPI, the greedy step is achieved by simply searching over deterministic policies <cit.>. Since we focus our experiments on an (s,a)-rectangular uncertainty set, the same applies to robust MPI <cit.> and to MPI, as already mentioned in Rmk. <ref>. We can see in Table <ref> that the increased complexity of robust MPI is even more prominent than its PE thread, as robust MPI takes 3953 (resp. 3270) times longer than MPI when m=1 (resp. m=4). Robust MPI with m=4 is a bit more advantageous than m=1, as it needs less iterations (31 versus 67), less optimization solvers to converge. Interestingly, for both m∈{1,4}, progressing from PE to MPI did not cost much more computing time to either the vanilla or the version: both take less than one second to run.
§ LEARNING IN MDPS
In general, we do not know the nominal model (P_0,r_0) and can only interact with the underlying system. Therefore, in this section, we are interested in devising a model-free method that (i) achieves a robust optimal policy (ii) has low time complexity. We show that when the uncertainty set is (s,a)-rectangular, an q-learning scheme provably converges to the optimal robust q-value. In the remaining part of this work, we thus assume that = ×_(s,a)∈_s,a so there exists a deterministic policy which is optimal. We first formalize q-learning and its convergence guarantees in Sec. <ref>. Then, in Sec. <ref>, we numerically evaluate its properties on a tabular environment. We finally propose to extend q-learning to a deep variant in Sec. <ref>. In particular, we introduce an easy method for estimating the norm of the value regularizer in non-tabular settings. The source code for q-learning and its deep extension is available at <https://github.com/yevgm/r2rl>.
§.§ q-learning
q-learning is an variant of vanilla q-learning <cit.> aiming to learn a robust optimal policy. Its pseudo-code can be found in Alg. <ref>. The only variation with standard q-learning is that we update an temporal difference (TD) to target an Bellman recursion. On the other hand, differently than robust q-learning <cit.>, q-learning does not involve any optimization problem in updating TDs. Indeed, robust q-learning requires computing the support function of the current value, which demands a linear program solver. Therefore, the additional time complexity is of 𝒪(^3) at least, the time required for multiplying square matrices using standard methods <cit.>. Instead, q-learning computes the norm of the current value, thus involving 𝒪() additional operations at most compared to vanilla q-learning.
We set the convergence of q-learning below. To prove it, we first construct an Bellman operator over state-action values, then establish the robust q-function as its fixed point. The rest of the proof relies on stochastic approximation theory <cit.> – see Appx. <ref>. Bellman operators for q-values are similarly defined in <cit.>. However, the robust q-value is established as a fixed point without proof there, whereas we show a formal equivalence in Appx. <ref>. Moreover, the q-learning algorithm derived in <cit.> is essentially a value iteration method that relies on a known nominal model. Here, q-learning is model-free and guaranteed to converge to the robust q-function, as stated below.
For any (s,a)∈, let a sequence of step-sizes (β_t(s,a))_t∈ satisfying 0≤β_t(s,a)≤ 1, ∑_t∈β_t(s,a) = ∞ and ∑_t∈β_t^2(s,a)< ∞. Then, the q-learning algorithm as given in Alg. <ref> converges almost surely to the optimal robust q-function.
The assumption ∑_t∈β_t(s,a) = ∞, ∀ (s,a)∈, implicitly requires that we must visit all state-action pairs infinitely often, which is a standard conjecture for convergence proofs <cit.>. Also, we emphasize that even in the (s,a)-rectangular case, the q-function q^π, from Def. <ref> associated with v^π, is generally not the same as the robust q-function q^π, obtained from the robust Bellman operators on state-action values (see proof in Appx. <ref>). This is similar to the regularized MDP setting where in general, the regularized value v^π,Ω does not equal q^π,Ω·π or equivalently, q^π,Ω·π does not necessarily correspond to the fixed point of a regularized Bellman operator <cit.>. Instead, the regularized action-value function is solely defined from the regularized value, itself being a fixed point of the regularized Bellman operator. The same phenomenon arises in the robust setting under s-rectangular uncertainty, and in the case regardless of rectangularity.
§.§ Learning on a grid
As proof of concept, we perform experiments in a tabular environment. Here, our goals are the following: (i) numerically illustrate the convergence of q-learning; (ii) highlight its computational advantage over robust q-learning concurrently with its robustness properties.
We consider a Mars Rover domain as in <cit.>. The objective is to find the shortest path to a goal state in a 10× 10 grid. However, taking a shorter path implies higher risk: the rover has a greater chance to hit a rocket and get a negative reward. The transition function is stochastic: the agent moves to the chosen direction with probability 1-ϵ, and randomly otherwise. At each step, it receives a small penalty r_step. An episode terminates whenever the rover reaches the goal state or hits a rock. The two scenarios yield a reward of r_success and r_fail respectively. We thus have r_success > 0 > r_step > r_fail. We compare our q-learning algorithm with two baselines: vanilla and robust q-learning. Vanilla is the standard method that ignores model uncertainty and assumes the reward and dynamics are fixed. Robust q-learning trains a robust optimal policy using robust Bellman updates as in Eq. (<ref>), thus requiring solving an optimization problem at each iteration <cit.>.
Fig. <ref> shows the convergence plot across iteration steps for the three agents: vanilla, robust and . All of them have similar sample complexity and fulfill the task within 100 iteration steps. The difference between them arises when we look at the time complexity of each algorithm. As we can see in Fig. <ref>, robust q-learning takes more than 2 minutes to converge, whereas vanilla and q-learning achieve the highest reward within 4 seconds (see also Fig. <ref> in Appx. <ref>). Similarly, we calculated the average time necessary to perform one learning step in each algorithm: one update takes 7.7± 5.9 × 10^-6 seconds to run, which is slightly slower than vanilla with 1.24± 0.89× 10^-6 seconds. On the other hand, a robust q-update takes 3 ± 0.9 ×10^-2 seconds, thus representing 10^4 higher cost than the other two approaches. This highlights the clear advantage of over robust q-learning in terms of computational cost. To check robustness, after training, we evaluate each policy under varying dynamics. In particular, we increase the value of ϵ to make the environment more adversarial. Fig. <ref> shows that the policy performs similarly to the robust one under more adversarial transitions when ϵ tends to 1, both being less sensitive than vanilla.
§.§ Scaling q-learning
The current expression of TD (line 6 of Alg. <ref>) suggests that we have access to the whole q-table for computing the current value's norm. This no longer applies when the state space is infinite or even continuous. Instead, we need to estimate the norm based on sampled observations. We thus keep track of a replay buffer that memorizes and updates past information online. At each iteration, we randomly extract a batch ℬ_t
of samples thanks to which we derive an empirical estimate of the norm. Formally, v_t_ℬ_t^2 := ∑_s∈ℬ_tv_t(s)^2,
where the index in ·_ℬ_t indicates the empirical nature of the norm. Finally, our approximate setting motivates us to stabilize value norm estimates. Thus, in the same spirit as <cit.>, we use a moving average mixing the previous estimate with the current one, at iteration t+1, the value norm squared is given by βv_t_ℬ_t^2 + (1-β)v_t+1_ℬ_t+1^2.
To evaluate the reliability of our norm estimate, we compared it to an oracle. Practically, in Mars Rover, we stored the tabular value function obtained after convergence of q-learning, then measured how the norm estimated from batches evolves across iteration steps.[To avoid state duplicates in the norm expression (which may apply when q-learning starts converging), we further re-normalized each state by its number of occurrences: v_t_ℬ_t = ∑_s∈ℬ_tn_s/*ℬ_tv_t(s)^2, where n_s is the number of instances of state s∈ in the batch.] In Fig. <ref>, we see that decreasing β improves stability at the expense of convergence speed. This trade-off similarly occurs in <cit.>, although in the different context of conservative policy iteration. We could also think of a time-adaptive parameter β to take the best of both worlds, but leave this for future work.
§ DEEP LEARNING
We are now able to scale tabular q-learning to a deep variant we name double DQN (DDQN) and compare it to vanilla and robust baselines. DDQN (resp. robust DDQN) is similar to DDQN <cit.>, except that it minimizes an TD (resp. robust TD) when updating the q-network q_θ. Defining the loss as:
l_ℬ_t(θ_t) = 1/ℬ_t∑_(s_j,a_j,s'_j,r_j)∈ℬ_t(y_j^baseline - q_θ_t(s_j, a_j))^2,
the target variable is:
y_j^=r_j - α^r+γ q_θ_t-1(s'_j,_b∈q_θ'_t-1(s_j',b))
-γα^P*q_θ_t-1(·,_b∈q_θ'_t-1(·,b))_ℬ_t
and the robust target variable is:
y_t^robust= r_j-σ_ℛ(s_j,a_j)(-1)+γ q_θ_t-1(s_j',_b∈q_θ'_t-1(s'_j,b))
-γσ_𝒫(s_j,a_j)(-q_θ_t-1(·,_b∈q_θ'_t-1(·,b))),
where θ and θ' denote the weights of the q-network and the target q-network respectively. Recall that we follow the method described in Sec. <ref> to estimate the norm in Eq. (<ref>).
For the three algorithmic variants, DDQN <cit.>, robust DDQN <cit.> and DDQN, we use a fully connected q-network with an input size corresponding to the dimension of the state space, 2 hidden layers of size 256, and an output size corresponding to the dimension of the action space.
We selected three physical environments from OpenAI Gym: Cartpole, Acrobot, and Mountaincar <cit.>. In Cartpole, the longer the episode, the higher the cumulative reward: at each step, the agent receives a reward of 1 if it maintains a small inclination angle and stays close to the starting x-position, and 0 otherwise. Oppositely, in Acrobot and MountainCar, the longer the episode, the lower the cumulative reward: the agent incurs a negative reward of -1 if it did not reach the goal area, and 0 otherwise–in which case the episode terminates. In each environment, the underlying transition model is directly affected by the physical properties assigned to the agent. Therefore, changing the environment properties implicitly introduces transition uncertainty into the MDP.
We train the three agents on one nominal environment and five different seeds. For a fair comparison, each seed set is taken to be the same for vanilla, robust and DDQN. Robust and DDQN are trained under the same uncertainty level, namely, α^P=α^r=10^-4. Fig. <ref> shows that all three agents converge to similar performance, except in Mountaincar where DDQN outperforms both vanilla and robust DDQN.
To check the computational advantage of DDQN over robust DDQN, we calculate the average time each algorithm takes to perform one update of the q-network. As we see in Tab. <ref>, one learning step of robust DDQN is slower than one update by an order of magnitude. This is expected, as robust DDQN must solve an optimization problem at each step. On the other hand, one update is approximately four times slower than vanilla because of the additional computations it requires. This confirms the results we obtained previously for MPI and q-learning: robust updates take much longer than updates, themselves being slightly slower than standard, non-robust updates.
We finally aim to check the robustness of each algorithm to unseen or changing dynamics. After training, we select two environment parameters across a range of values and evaluate the average performance over several episodes run under the corresponding dynamics. We repeat the same procedure for all seeds and environments. Fig. <ref> displays the performance obtained by each agent undergoing such treatment. In all environments, achieves similar performance as robust DDQN. Both exhibit more robust behavior than vanilla DDQN except for mass pole changes in Cartpole, where the three algorithms demonstrate similar results. We also notice that in Mountaincar, is much more robust to changing gravity than the other two agents. To additionally evaluate their robustness to shock, we conduct the following experiment: each agent starts the task under the same nominal parameters as those it has been trained on but at time step t=20, the dynamics abruptly change and remain in this tweaked environment until the episode ends. As we can see in Fig. <ref>, and robust DDQN achieve higher performance than vanilla DDQN as the change becomes more abrupt or equivalently, as we look further away from the cell corresponding to the nominal parameters.
§ RELATED WORK
In statistical learning, regularization has long been used as a computationally low-cost tool for reducing over-fitting <cit.>. Later on, the theory of robust optimization <cit.> has enabled establishing formal connections between regularization and robustness in standard learning settings such as support vector machines <cit.>, logistic regression <cit.> or maximum likelihood estimation <cit.>. As stated in Sec. <ref>, these represent particular RL problems as they concern a single-stage decision-making process. In that regard, the generalization of robustness-regularization duality to sequential decision-making has seldom been studied in the RL literature.
It is only recently that policy regularization started being viewed from a robustness perspective <cit.>. In <cit.>, regularization is applied to the dual objective instead of the primal. This has two shortcomings: (i) It prevents the formulation of regularized Bellman operators and dynamic programming methods; (ii) The feasible set is that of occupancy measures, so the connection with standard policy regularization remains unclear. Whilst <cit.> address this shortcoming by providing relevant reward sets, their focus on the dual problem yields larger uncertainty. As mentioned in Sec. <ref>, although it is consistent with our results at optimality, using approximate solvers may result in overly conservative performance. Moreover, the optimization problem studied there is unrelated to robust dynamic programming, which hinders the facilitation of robust RL. Also, both of these works focus on reward robustness. Differently, <cit.> address reward and transition uncertainty by showing that policies with maximum entropy regularization solve a particular type of robust MDP. Yet, their analysis separately treats the uncertainty on P and r, which questions the robustness of the resulting policy when the whole model (P,r) is adversarial. Moreover, the dual relation they establish between entropy regularization and transition-robust MDPs is weak and applies to specific uncertainty sets. Both of these works treat robustness as a side-effect of regularization more than an objective on its own, whereas we aim to do the opposite, namely, use regularization to solve robust RL problems.
Two works that do use regularization as a tool for achieving robust policies are <cit.>. Through distributionally robust MDPs, <cit.> show upper and lower bounds between transition-robustness and regularization. There again, duality is weak and reward uncertainty is not addressed. Moreover, since the exact regularization term has no explicit form, it is usable through its upper bound only. Finally, regularization is applied on the mean of several value functions v^π_(P̂_i,r), where each P̂_i is a transition model estimated from an episode run. Computing this quantity requires as many policy evaluations as the number of model estimates available, which results in a linear complexity blowup at least. <cit.> extend the conference version of this work <cit.> by additionally constraining all kernels in P_0+ to reside in a probability simplex. This yields less conservative policies at the expense of additional computational cost. Moreover, similarly as <cit.>, <cit.> focus on model-based methods, whereas we provably extend regularization to model-free learning.
Previous studies analyze robust planning algorithms to provide convergence guarantees. The works <cit.> propose robust value iteration, while <cit.> introduce robust policy iteration. <cit.> generalize both schemes by proposing a robust MPI and determine the conditions under which it converges. The polynomial time within which all these works guarantee a robust solution is often insufficient, as the complexity of a Bellman update grows cubically in the number of states <cit.>.
In order to reduce the time complexity of robust planning algorithms, <cit.> propose faster methods able to compute robust Bellman updates in 𝒪(log()) operations for ℓ_1-constrained uncertainty sets, while the algorithms from <cit.> require 𝒪(log()) operations for ℓ_∞-robust updates. Advantageously, our regularization approach reduces each such update to its standard, non-robust complexity of 𝒪().
Moreover, although <cit.> address both (s,a) and s-rectangular uncertainty sets, sets that are independently defined over each state-action pair or state only, they focus on transition uncertainty, whereas we tackle both reward and transition uncertainties in the general s-rectangular case. Finally, their contribution relies on LP formulations that necessitate restricting to one predefined norm while our method applies to any norm. This may come from the fact that our main Theorems (Thms. <ref> and <ref>) use Fenchel-Rockafellar duality <cit.>, a generalization of LP duality (see Appx. <ref> and <ref>). More recently, <cit.> proposed a first-order method to accelerate robust value iteration under s-rectangular uncertainty sets that are either ellipsoidal or KL-constrained, while <cit.> provide an algorithmic speedup for general f-divergence robust MDPs. To our knowledge, our study is the first one reducing the time complexity of robust to standard planning when the uncertainty set is s-rectangular and constrained with an arbitrary norm.
Despite its theoretical guarantees, robust RL has been sparingly applied to deep settings. We believe this is due to its computational challenges, which this work aims to address. As mentioned in Sec. <ref>, previous methods require samples from several models to train a robust policy <cit.>. Besides their increased sample complexity, these parallel simulations bind the learning process to finite uncertainty sets. Differently, the robust fitted value iteration method of <cit.> learns a robust policy based on the nominal system's observations only. It derives the worst-case model in closed form, so it can iterate over the value function in a standard way. Yet, the dynamics should be deterministic and satisfy structural assumptions while the nominal model needs to be known. In contrast, we study a general MDP setting without structure in the environment and propose a model-free algorithm that is guaranteed to converge to a robust optimal policy.
Recently, <cit.> leveraged the regularization technique to derive robust policies. There, as in <cit.>, an Bellman equation is provided for q-values without a formal equivalence to its robust analog being established. In fact, the uncertainty they consider here is not rectangular: the transition model is parameterized by uncertain parameters (like in <cit.>), but these lie in a ball regardless of the state or action. Finally, while several notions of robustness may be addressed in deep RL methods, action perturbation <cit.>, execution delay <cit.> or adversarial observations <cit.>, these are outside the scope of our study which focuses on robustness w.r.t. the transition and/or reward functions.
§ CONCLUSION AND FUTURE WORK
In this work, we established a strong duality between robust MDPs and twice regularized MDPs. This revealed that the regularized MDPs of <cit.> are in fact robust MDPs with uncertain reward, which enabled us to derive a policy-gradient theorem for reward-robust MDPs. When extending this robustness-regularization duality to general robust MDPs, we found that the regularizer depends on the value function besides the policy. We thus introduced MDPs, a generalization of regularized MDPs with both policy and value regularization. The related Bellman operators lead us to propose a converging MPI (resp. q-learning) algorithm that achieves the optimal robust value function within a similar computing time as standard MPI (resp. q-learning), as confirmed by our tabular experiments. Then, we devised a scalable method to estimate the value regularizer in an approximate setting. Finally, we tested the resulting DDQN algorithm on physical domains.
This study settles the theoretical foundations for scalable robust RL. We should note that our results naturally extend to continuous but compact action spaces in the same manner as standard MDPs do <cit.>. Theoretical extension to infinite state space would be more involved because of the state-dependent regularizer in MDPs. In fact, it would be interesting to study the MDP setting under function approximation, as such approximation would have a direct effect on the regularizer. Similarly, one could analyze approximate dynamic programming for MDPs in light of its robust analog <cit.>.
Apart from its practical effect, we believe our work opens the path to more theoretical contributions in robust RL. For example, extending MPI to the approximate case <cit.> would be an interesting problem to solve because of the evaluation operator being non-linear. So would be a sample complexity analysis for MDPs with a comparison to robust MDPs <cit.>. Another line of research is to extend policy-gradient to MDPs, as this would avoid parallel learning of adversarial models <cit.> and be very useful for continuous control.
We would like to thank Raphael Derman for his useful suggestions that improved the clarity of the text, and Navdeep Kumar for noticing a mistake in the proof of Prop. <ref> from <cit.>. Although it has no effect on our results, this manuscript fixes it. Thanks to Roee Ben-Shlomo for taking part in the numerical experiments. Thanks also to Stav Belogolovsky for reviewing a previous version of this paper. Funding in direct support of this work: ISF grant.
This appendix provides proofs for all of the results stated in the paper.
We first recall the following theorem used in the sequel and referred to as Fenchel-Rochafellar duality <cit.>.
[Fenchel-Rockafellar duality]
Let X, Y two Euclidean spaces, f:X→ and g: Y→ two proper, convex functions, and A: X→ Y a linear mapping such that
0∈core(dom(g) - A(dom(f))).[Given C⊆^, we say that x∈core(C) if for all d∈^ there exists a small enough t∈ such that x+td∈ C <cit.>.]
Then, it holds that
min_x∈ Xf(x) + g(A x) = max_y∈ Y -f^*(-A^*y) - g^*(y).
§ REWARD-ROBUST MDPS
§.§ Proof of Proposition <ref>
For any policy π∈Δ_^, the robust value function v^π, is the optimal solution of the robust optimization problem:
max_v∈^v, μ_0 s. t. v≤ T_(P,r)^πv for all (P,r)∈. P_
Let v^* an optimal point of (<ref>). By definition of the robust value function, v^π, = T^π, v^π, = min_(P,r)∈ T_(P,r)^πv^π,. In particular, v^π, ≤ T_(P,r)^πv^π, for all (P,r)∈, so the robust value is feasible and by optimality of v^*, we get v^*,μ_0≥v^π, , μ_0. Now, we aim to show that any feasible v∈^ satisfies v≤ v^π, .
Let an arbitrary ϵ > 0. By definition of T^π,, there exists (P_ϵ,r_ϵ)∈ such that
T^π, v^π, +ϵ > T_(P_ϵ,r_ϵ)^πv^π, .
This yields:
v - v^π, = v - T^π, v^π, [v^π, = T^π, v^π, ]
< v + ϵ - T_(P_ϵ,r_ϵ)^πv^π, [By Eq. (<ref>)]
≤ T^π, v+ ϵ - T_(P_ϵ,r_ϵ)^πv^π, [v is feasible for (<ref>)]
≤ T_(P_ϵ,r_ϵ)^πv+ ϵ - T_(P_ϵ,r_ϵ)^πv^π, [T^π, v ≤ T_(P,r)^πv for all (P,r)∈]
= T_(P_ϵ,r_ϵ)^π(v-v^π, )+ ϵ. [By linearity of T_(P_ϵ,r_ϵ)^π]
Thus, v - v^π, ≤ T_(P_ϵ,r_ϵ)^π(v-v^π, ) + ϵ, which we iteratively apply as follows:
v - v^π, ≤ T_(P_ϵ,r_ϵ)^π(v-v^π, ) + ϵ
≤ T_(P_ϵ,r_ϵ)^π(T_(P_ϵ,r_ϵ)^π(v-v^π, ) + ϵ) + ϵ [u≤ w T_(P_ϵ,r_ϵ)^πu≤ T_(P_ϵ,r_ϵ)^πw]
=(T_(P_ϵ,r_ϵ)^π)^2(v-v^π, ) + γϵ + ϵ
≤ (T_(P_ϵ,r_ϵ)^π)^2(T_(P_ϵ,r_ϵ)^π(v-v^π, ) + ϵ) + γϵ + ϵ
⋮
≤ (T_(P_ϵ,r_ϵ)^π)^n+1(v-v^π, ) + ∑_k = 0^nγ^kϵ
= (T_(P_ϵ,r_ϵ)^π)^n+1(v-v^π, ) + 1-γ^n+1/1-γϵ.
By definition of the sup-norm and applying the triangular inequality we obtain:
v - v^π, ≤*(T_(P_ϵ,r_ϵ)^π)^n+1(v-v^π, )_∞ + 1-γ^n+1/1-γϵ
≤γ^n+1v - v^π, _∞ + 1-γ^n+1/1-γϵ [T_(P_ϵ,r_ϵ)^π is γ-contracting]
Setting n→∞ yields v - v^π, ≤ϵ/1-γ. Since both ϵ>0 and v were taken arbitrarily, v^* - v^π, ≤ 0, while we have already shown that v^*,μ_0≥v^π, , μ_0.
By positivity of the probability distribution μ_0, it results that v^*,μ_0 = v^π, , μ_0, and since μ_0 >0, v^π, = v^*.
§.§ Proof of Theorem <ref>
[Reward-robust MDP]
Assume that = {P_0}× (r_0+ ). Then, for any policy π∈Δ_^, the robust value function v^π, is the optimal solution of the convex optimization problem:
max_v∈^v, μ_0 s. t. v(s)≤ T_(P_0,r_0)^πv(s) - σ__s(-π_s) for all s∈.
For all s∈, define: F(s):= max_(P, r)∈{v(s) - r^π(s) - γ P^πv(s) }.
It corresponds to the robust counterpart of (<ref>) at s∈. Thus, the robust value function v^π, is the optimal solution of:
max_v∈^v, μ_0 s. t. F(s)≤ 0 for all s∈.
Based on the structure of the uncertainty set = {P_0}× (r_0+ ), we compute the robust counterpart:
F(s) = max_r'∈ r_0 + {v(s) - r'^π(s) - γ P_0^πv(s) }
=max_r': r' = r_0 + r, r∈{v(s) - r'^π(s) - γ P_0^πv(s) }
=max_ r∈{v(s) - (r_0^π(s) + r^π(s))- γ P_0^πv(s) } [(r_0 + r)^π = r_0^π + r^π ∀π∈Δ_^]
= max_ r∈{v(s) - r^π(s)-r_0^π(s) - γ P_0^πv(s) }
= max_ r∈{v(s) - r^π(s)-T_(P_0,r_0)^πv(s) } [T_(P_0,r_0)^πv(s) = r_0^π(s) + γ P_0^πv(s)]
= max_r∈{- r^π(s)} + v(s) - T_(P_0,r_0)^πv(s)
= max_r∈^{- r^π(s) - δ_(r')}+ v(s) - T_(P_0,r_0)^πv(s)
= -min_r∈^{ r^π(s) +δ_(r)}+ v(s) - T_(P_0,r_0)^πv(s)
= -min_r∈^{r_s, π_s +δ_(r)}+ v(s) - T_(P_0,r_0)^πv(s). [r^π(s) = r_s, π_s]
By the rectangularity assumption, = ×_s∈_s and for all r:= (r_s)_s∈∈^, we have
δ_(r) = ∑_s'∈δ__s'(r_s'). As such,
F(s)
= -min_r∈^{r_s, π_s +∑_s'∈δ__s'(r_s')}+ v(s) - T_(P_0,r_0)^πv(s)
= -min_r∈^{r_s, π_s +δ__s(r_s)}+ v(s) - T_(P_0,r_0)^πv(s),
where the last equality holds since the objective function is minimal if and only if r_s∈_s.
We now aim to apply Fenchel-Rockafellar duality to the minimization problem. Let the function
f : ^→ defined as r_s ↦r_s, π_s, and consider
the support function δ__s: ^→ together with
the identity mapping 𝐈𝐝_: ^→^.
Clearly, dom(f) = ^, dom(δ__s) = _s, and dom(δ__s) - 𝐈𝐝_(dom(f)) = _s - ^ = ^. Therefore, core(dom(δ__s) - A(dom(f))) = core(^) = ^ and 0∈^. We can thus apply Fenchel-Rockafellar duality: noting that 𝐈𝐝_ = (𝐈𝐝_)^* and (δ__s)^*(y) = σ__s(y), we get
min_r_s∈^{ f(r_s) + δ__s(r_s)} = -min_y∈^{f^*(-y)+(δ__s)^*(y)} = -min_y∈^{f^*(-y)+σ__s(y)}.
It remains to compute
f^*(-y)
= max_r_s∈^ - r_s, y -r_s, π_s
= max_r_s∈^r_s, -y-π_s
=
0 if -y-π_s = 0
+∞ otherwise,
and obtain
F(s) = min_y∈^{f^*(-y)+σ__s(y)} + v(s) - T_(P_0,r_0)^πv(s)
= σ__s(-π_s) + v(s) - T_(P_0,r_0)^πv(s).
We can thus rewrite the optimization problem (<ref>) as:
max_v∈^v, μ_0 s. t. σ__s(-π_s) + v(s) - T_(P_0,r_0)^πv(s)≤ 0 for all s∈,
which concludes the proof.
§.§ Proof of Corollary <ref>
Let π∈Δ_^ and = {P_0}× (r_0+ ). Further assume that for all s∈, the reward uncertainty set at s is _s:= {r_s∈^: r_s≤α_s^r}. Then, the robust value function v^π, is the optimal solution of the convex optimization problem:
max_v∈^v, μ_0 s. t. v(s)≤ T_(P_0,r_0)^πv(s) - α_s^rπ_s for all s∈.
We evaluate the support function:
σ__s(-π_s) = max_r_s∈^: r_s≤α_s^r r_s,-π_s(1)=α_s^r -π_s = α_s^r π_s,
where equality (1) holds by definition of the dual norm.
Applying Thm. <ref>, the robust value function v^π, is the optimal solution of:
max_v∈^v, μ_0 s. t. α_s^r π_s + v(s) - T_(P_0,r_0)^πv(s)≤ 0 for all s∈,
which concludes the proof.
Ball-constraint with arbitrary norm. In the case where reward ball-constraints are defined according to an arbitrary norm ·_a with dual norm ·_a^*, the support function becomes:
σ__s(-π_s) = max_r_s∈^: r_s_a≤α_s^r r_s,-π_s=
α_s^r -π_s_a^* = α_s^r π_s_a^*.
§.§ Related Algorithms: Uncertainty sets from regularizers
Negative Shannon entropy. Each (s,a)-reward uncertainty set is _s,a^NS(π):= [ ln(1/π_s(a)), +∞).
We compute the associated support function:
σ__s^NS(π)(-π_s) = max_r_s∈_s^NS(π)r_s, -π_s
= max_r(s,a'): r(s,a')∈_s,a'^NS(π), a'∈∑_a∈ -r(s,a)π_s(a)
= max_r(s,a'): r(s,a')≥ln(1/π_s(a)), a'∈
-∑_a∈π_s(a)r(s,a)
= ∑_a∈π_s(a)ln(π_s(a)),
where the last equality results from the fact that π_s≥ 0, and -r(s,a)π_s(a) is maximal when r(s,a) is minimal.
We thus obtain the negative Shannon entropy.
KL divergence. Similarly, given d∈Δ_, let _s,a^KL(π):= ln(d(a)) + _s,a^NS(π) ∀ (s,a)∈. Then
σ__s^KL(π)(-π_s)
=max_r(s,a'): r(s,a')∈_s,a'^KL(π), a'∈∑_a∈ -r(s,a)π_s(a)
=max_r(s,a')+ ln(d(a)):
r(s,a')∈_s,a'^NS(π), a'∈∑_a∈ -r(s,a)π_s(a)
= max_r(s,a'):
r(s,a')∈_s,a'^NS(π), a'∈∑_a∈ - (r(s,a) + ln(d(a))π_s(a)
= max_r(s,a'):
r(s,a')∈_s,a'^NS(π), a'∈{-∑_a∈π_s(a) r(s,a) }-∑_a∈π_s(a) ln(d(a))
= ∑_a∈π_s(a)ln(π_s(a)) - ∑_a∈π_s(a)ln(d(a)),
where the last equality uses Eq. (<ref>).
We thus recover the KL divergence Ω(π_s)= ∑_a∈π_s(a)ln(π_s(a)/d(a)).
Negative Tsallis entropy. Given _s,a^T(π):= [1-π_s(a)/2, +∞) ∀ (s,a)∈, we compute:
σ__s^T(π)(-π_s) =
max_r(s,a'): r(s,a')∈_s,a'^T(π), a'∈∑_a∈ -r(s,a)π_s(a)
= max_r(s,a'): r(s,a')∈[1-π_s(a')/2, +∞), a'∈∑_a∈ -r(s,a)π_s(a)
= ∑_a∈ -1-π_s(a)/2π_s(a)
= -1/2∑_a∈π_s(a) + 1/2∑_a∈π_s(a)^2
= -1/2+ 1/2π_s^2,
where Eq. (<ref>) also comes from the fact that π_s≥ 0, and -r(s,a)π_s(a) is maximal when r(s,a) is minimal.
We thus obtain the negative Tsallis entropy Ω(π_s) = 1/2(π_s^2-1).
The reward uncertainty sets associated to both KL and Shannon entropy are similar, as the former amounts to translating the latter
by a negative constant (translation to the left). As such, both yield reward values that can be either positive or negative. This is not the case of the negative Tsallis, as its minimal reward is 0, attained for a deterministic action policy, when π_s(a) = 1.
Table <ref> summarizes the properties of each regularizer.
For the Tsallis entropy, we denote by τ: ^→ the function q_s↦∑_a∈𝔄(q_s)q_s(a)-1/𝔄(q_s), where 𝔄(q_s)⊆ is a subset of actions:
𝔄(q_s) = {a∈: 1 + i q_s(a_(i)) > ∑_j=0^iq_s(a_(j)), i ∈{1,⋯, }}, and a_(i) is the action with the i-th maximal value<cit.>.
§.§ Proof of Proposition <ref>
Assume that = {P_0}× (r_0+ ) with _s= {r_s∈^: r_s≤α_s^r}. Then, the gradient of the reward-robust objective J_(π):= v^π, , μ_0 is given by
∇ J_(π) = 𝔼_(s,a)∼μ_π[ ∇lnπ_s(a)(q^π, (s,a) - α_s^rπ_s(a)/π_s)],
where μ_π is the occupancy measure under the nominal model P_0 and policy π.
We prove the following more general result. To establish Prop. <ref>, we then set α_s^P = 0 and apply Thm. <ref> to replace v^π, = v_π, and q^π, = q^π,.
Set Ω_v, (π_s):= π_s (α_s^r + α_s^P γv). Then, the gradient of the objective J_(π):= v_π, , μ_0 is given by
∇ J_(π) = 𝔼_s∼ d_μ_0,π[ ∑_a∈π_s(a)∇lnπ_s(a)q^π, (s,a) - ∇Ω_v, (π_s)],
where d_μ_0,π:=μ_0^⊤(𝐈_ - γ P_0^π)^-1, with μ_0∈^× 1 the initial state distribution.
By linearity of the gradient operator, ∇ J_(π) = ∇ v^π, , μ_0. We thus need to compute ∇ v^π, . Using the fixed point property of v^π, w.r.t. the Bellman operator yields:
∇ v^π, (s)
= ∇(r_0^π(s) + γ P_0^πv^π, (s) - Ω_v, (π_s))
= ∇(∑_a∈π_s(a)(r_0(s, a) + γP_0(·| s,a), v^π, ) - Ω_v, (π_s))
= ∑_a∈∇π_s(a) (r_0(s, a) + γP_0(·| s,a), v^π, )
+ γ∑_a∈π_s(a)P_0(·| s,a), ∇ v^π, - ∇Ω_v, (π_s) [Linearity of gradient & product rule]
= ∑_a∈∇π_s(a)q^π, (s,a)+ γ∑_a∈π_s(a)P_0(·| s,a), ∇ v^π, - ∇Ω_v, (π_s)
[q^π, (s,a) = r_0(s, a) + γP_0(·| s,a), v^π, ]
= ∑_a∈π_s(a)( ∇lnπ_s(a)q^π, (s,a)+ γP_0(·| s,a), ∇ v^π, ) - ∇Ω_v, (π_s)
[∇π_s = π_s∇ln(π_s)]
= ∑_a∈π_s(a)( ∇lnπ_s(a)q^π, (s,a) - ∇Ω_v, (π_s) + γP_0(·| s,a), ∇ v^π, ).
Thus, the components of ∇ v^π, are the non-regularized value functions corresponding to the modified reward R(s,a):= ∇lnπ_s(a)q^π, (s,a) - ∇Ω_v, (π_s). By the fixed point property of the standard Bellman operator, it results that:
∇ v^π, (s) = (𝐈_ - γ P_0^π)^-1(∑_a∈π_·(a)(∇lnπ_·(a)q^π, (·,a) - ∇Ω_v, (π_·)))(s)
and
∇ J_(π) = ∑_s∈μ_0(s)∇ v^π, (s)
= ∑_s∈μ_0(s)(𝐈_ - γ P_0^π)^-1(∑_a∈π_·(a)(∇lnπ_·(a)q^π, (·,a) - ∇Ω_v, (π_·)))(s)
= ∑_s∈ d_μ_0, π(s)(∑_a∈π_s(a)∇lnπ_s(a)q^π, (s,a) - ∇Ω_v, (π_s)),
by definition of d_μ_0, π.
The subtraction by ∇Ω_v, (π_s) also appears in <cit.>. However, here, the gradient includes partial derivatives that depend on both the policy and the value itself. Let's try to compute the gradient of the double regularizer Ω_v, (π_s) = π_s (α_s^r + α_s^P γv^π, ). By the chain-rule we have that:
∇Ω_v, (π_s) = ∑_a∈∂Ω_v, /∂π_s(a)∇π_s(a)
+ ∑_s∈∂Ω_v, /∂ v^π, (s)∇ v^π, (s)
=∑_a∈(α_s^r + α_s^P γv^π, )π_s(a)/π_s∇π_s(a)
+ ∑_s∈α_s^P γπ_sv^π, (s)/v^π, ∇ v^π, (s).
We remark here an interdependence between ∇Ω_v, (π_s) and ∇ v^π, (s): computing the gradient ∇Ω_v, (π_s) requires to know ∇ v^π, (s) and vice versa. There may be a recursion that still enables to compute these gradients, which we leave for future work.
§ GENERAL ROBUST MDPS
§.§ Proof of Theorem <ref>
[General robust MDP]
Assume that = (P_0+ )×(r_0+ ). Then, for any policy π∈Δ_^, the robust value function v^π, is the optimal solution of the convex optimization problem:
max_v∈^v, μ_0 s. t. v(s)≤ T_(P_0,r_0)^πv(s) -σ__s(-π_s) -σ__s(-γ v·π_s) for all s∈,
where [v·π_s](s',a):=v(s')π_s(a) ∀ (s',a)∈.
The robust value function v^π, is the optimal solution of:
max_v∈^v, μ_0 s. t. F(s)≤ 0 for all s∈,
where F(s):= max_(P, r)∈{v(s) - r^π(s) - γ P^πv(s) } is the robust counterpart of (<ref>) at s∈. Let's compute it based on the structure of the uncertainty set = (P_0+ )×(r_0+ ):
F(s) = max_(P',r')∈ (P_0+ )×(r_0+ ){v(s) - r'^π(s) - γ P'^πv(s) }
= max_P': P' = P_0 + P, P∈
r': r' = r_0 + r, r∈{v(s) - r'^π(s) - γ P'^πv(s) }
= max_P∈ , r∈{v(s) - (r_0^π(s) +r^π(s)) - γ (P_0^π + P^π )v(s) } [(P_0 + P)^π = P_0^π + P^π,
(r_0+r)^π = r_0^π+r^π]
= max_P∈, r∈{v(s) - r_0^π(s) -r^π(s) - γ P_0^πv(s) -γ P^π v(s) }
= max_P∈, r∈{v(s) - T_(P_0,r_0)^πv(s)-r^π(s) -γ P^π v(s) } [T_(P_0,r_0)^πv(s) = r_0^π(s) + γ P_0^πv(s)]
= max_P∈{-γ P^π v(s)} + max_r∈{-r^π(s)} +v(s) - T_(P_0,r_0)^πv(s)
= -min_P∈{γ P^π v(s) }- min_r∈{r^π(s)}+v(s) - T_(P_0,r_0)^πv(s)
= -min_P∈^×{γ P^π v(s) + δ_(P)} - min_r∈^{r^π(s) + δ_(r)}
+v(s) - T_(P_0,r_0)^πv(s)
= -min_P∈^×{γP^π_s, v + δ_(P) }
-min_r∈^{r_s, π_s +δ_(r)}
+v(s) - T_(P_0,r_0)^πv(s). [P^π v(s) = P^π_s, v, r^π(s) = r_s, π_s]
As shown in the proof of Thm. <ref>, min_r∈^{r_s, π_s +δ_(r)} = min_r_s∈^{r_s, π_s + δ__s(r_s)} thanks to the rectangularity assumption. Similarly, by rectangularity of the transition uncertainty set, for all P:= (P_s)_s∈∈^, we have
δ_(P) = ∑_s'∈δ__s'(P_s'). As such,
min_P∈^×{γP^π_s, v + δ_(P) } = min_P∈^×{γP^π_s, v + ∑_s'∈δ__s'(P_s')}
= min_P_s∈^{γP^π_s, v + δ__s(P_s)},
where the last equality holds since the objective function is minimal if and only if P_s∈_s.
Finally,
F(s) = - min_P_s∈^{γP^π_s, v + δ__s(P_s)} - min_r_s∈^{r_s, π_s + δ__s(r_s)}+v(s) - T_(P_0,r_0)^πv(s).
Referring to the proof of Thm. <ref>, we know that
-min_r∈^{r_s, π_s +δ_(r)} = σ__s(-π_s), so
F(s) = - min_P_s∈^{γP^π_s, v + δ__s(P_s)} + σ__s(-π_s)+v(s) - T_(P_0,r_0)^πv(s).
Let the matrix v·π_s∈^ defined as
[v·π_s](s',a):=v(s')π_s(a) for all (s',a)∈. Further define
φ(P_s) := γP^π_s, v, which we can rewrite as
φ( P_s) = γP_s, v·π_s.
Then, we have that:
min_P_s∈^{γP^π_s, v + δ__s(P_s)} = min_P_s∈^{φ( P_s) + δ__s(P_s)} = -min_∈^{φ^*( -) + σ__s()},
where the last equality results from Fenchel-Rockafellar duality and the fact that (δ__s)^* = σ__s.
It thus remains to compute the convex conjugate of φ:
φ^*(-) = max_P_s∈^{P_s, - - φ( P_s) }
= max_P_s∈^{P_s,- -γP_s, v·π_s}
=max_P_s∈^P_s, - - γ v·π_s
=
0 if - - γ v·π_s = 0
+∞ otherwise,
which yields min_∈^{φ^*( -) + σ__s()} = σ__s(- γ v·π_s).
Finally, the robust counterpart rewrites as: F(s) = σ__s(-γ v·π_s)+ σ__s(-π_s) + v(s) - T_(P_0,r_0)^πv(s),
and plugging it into the optimization problem (<ref>) yields the desired result.
§.§ Proof of Corollary <ref>
Assume that = (P_0+ )×(r_0+ ) with _s:= {P_s∈^: P_s≤α_s^P} and _s:= {r_s∈^: r_s≤α_s^r} for all s∈. Then, the robust value function v^π, is the optimal solution of the convex optimization problem:
max_v∈^v, μ_0 s. t. v(s)≤ T_(P_0,r_0)^πv(s) -α_s^rπ_s - α_s^Pγvπ_s for all s∈.
As we already showed in Cor. <ref>, the support function of the reward uncertainty set is
σ__s(-π_s) = α_s^r π_s. For the transition uncertainty set, we similarly have:
σ__s(-γ v·π_s) = max_P_s∈^:
P_s≤α_s^P P_s,-γ v·π_s
= α_s^P -γ v·π_s
= α_s^P γ v·π_s
= α_s^P γ vπ_s. [ v·π_s^2 = ∑_(s',a)∈(v(s')π_s(a))^2
= ∑_s'∈v(s')^2∑_a∈π_s(a)^2 = v^2π_s^2]
Now we apply Thm. <ref> and replace each support function by their explicit form to get that the robust value function v^π, is the optimal solution of:
max_v∈^v, μ_0 s. t. v(s)≤ T_(P_0,r_0)^πv(s) - α_s^rπ_s - α_s^Pπ_s·γv for all s∈.
Ball-constraints with arbitrary norms. As seen in the proof of Thm. <ref> and Cor. <ref>,
for ball-constrained rewards defined with an arbitrary norm ·_a of dual ·_a^*, the corresponding support function is σ__s(-π_s) = α_s^r π_s_a^*. Similarly, for ball-constrained transitions based on a norm ·_b of dual ·_b^*, we have:
σ__s(-γ v·π_s) = max_P_s∈^:
P_s_b≤α_s^P P_s,-γ v·π_s= α_s^P -γ v·π_s_b^*,
in which case the robust value function v^π, is the optimal solution of:
max_v∈^v, μ_0 s. t. v(s)≤ T_(P_0,r_0)^πv(s) - α_s^rπ_s_a^* - α_s^P -γ v·π_s_b^* for all s∈.
§ MDPS
§.§ Proof of Proposition <ref>
Suppose that Asm. <ref> holds. Then, we have the following properties:
(i) Monotonicity: For all v_1, v_2∈^ such that v_1≤ v_2, we have T^π,v_1 ≤ T^π,v_2 and T^*, v_1 ≤ T^*, v_2.
(ii) Sub-distributivity: For all v_1∈^, c∈, we have T^π,(v_1 + c1_)≤ T^π,v_1 + γ c1_ and T^*, (v_1 + c1_)≤ T^*, v_1 + γ c1_, ∀ c∈.
(iii) Contraction: Let ϵ_*:= min_s∈ϵ_s>0. Then, for all v_1, v_2∈^,
T^π,v_1 - T^π,v_2_∞≤ (1-ϵ_*)v_1-v_2_∞ and
T^*, v_1 - T^*, v_2_∞≤ (1-ϵ_*)v_1-v_2_∞.
Proof of (i). Consider the evaluation operator and let v_1,v_2∈^ such that v_1≤ v_2.
For all s∈,
[T^π,v_1 - T^π,v_2](s)
= T_(P_0,r_0)^πv_1(s) - α_s^rπ_s - α_s^P γv_1π_s
- (T_(P_0,r_0)^πv_2(s) - α_s^rπ_s - α_s^P γv_2π_s)
= T_(P_0,r_0)^πv_1(s) - T_(P_0,r_0)^πv_2(s) + α_s^P γπ_s (v_2 - v_1)
= γ P_0^π(v_1 - v_2)(s) + α_s^P γπ_s (v_2 - v_1)
= γπ_s, P_0_s(v_1 - v_2)+ α_s^P γπ_s (v_2 - v_1)
[∀ v∈^, P_0^πv(s) = ∑_(s',a)∈π_s(a)P_0(s'|s,a)v(s')
= ∑_a∈π_s(a)[P_0_s v](a) =π_s, P_0_sv]
= γπ_s( *π_s/π_s, P_0_s(v_1 - v_2) + α_s^P (v_2 - v_1))
≤γπ_s( *π_s/π_s, P_0_s(v_1 - v_2) + α_s^P (v_2- v_1)) [∀ v, w∈^, v - w≤*v - w≤v-w].
By Asm. <ref>, we also have
α_s^P ≤min_𝐮_∈^_+, 𝐮_=1
𝐯_∈^_+, 𝐯_=1𝐮_^⊤ P_0(·| s,·)𝐯_ =min_𝐮_∈^_+, 𝐮_=1
𝐯_∈^_+, 𝐯_=1*𝐮_, P_0(·| s,·)𝐯_ ≤*π_s/π_s, P_0(·| s,·)(v_2-v_1)/v_2-v_1,
so that
[T^π,v_1 - T^π,v_2](s)
≤γπ_s( *π_s/π_s, P_0_s(v_1 - v_2) + *π_s/π_s, P_0(·| s,·)(v_2-v_1)/v_2-v_1v_2- v_1)
= γπ_s( *π_s/π_s, P_0_s(v_1 - v_2) + *π_s/π_s, P_0(·| s,·)(v_2-v_1)) =0,
where we switch notations to designate P_0(·| s,·) = P_0_s ∈^×. This proves monotonicity.
Proof of (ii). We now prove the sub-distributivity of the evaluation operator. Let v∈^, c∈. For all s∈,
[T^π,(v + c1_)](s)
= [T_(P_0,r_0)^π(v + c1_)](s) - α_s^rπ_s - α_s^P γv + c1_π_s
= T_(P_0,r_0)^πv(s) + γ c - α_s^rπ_s - α_s^P γv + c1_π_s [T_(P_0,r_0)^π(v + c1_) = T_(P_0,r_0)^πv + γ c1_]
≤ T_(P_0,r_0)^πv(s) + γ c - α_s^rπ_s - α_s^P γπ_s (v + c1_)
= T_(P_0,r_0)^πv(s)+ γ c - α_s^rπ_s - α_s^P γπ_sv
- α_s^P γπ_s c1_
= [T^π,v ](s) + γ c- α_s^P γπ_s c1_
≤ [T^π,v ](s) + γ c. [γ > 0, α_s^P > 0, ·≥ 0]
Proof of (iii).
We prove the contraction of a more general evaluation operator with ℓ_p regularization, p≥ 1. This will establish contraction of the operator T^π, by simply setting p=2.
Define as q the conjugate value of p, such that 1/p + 1/q =1. As seen in the proof of Thm. <ref>,
for balls that are constrained according to the ℓ_p-norm ·_p, the robust value function v^π, is the optimal solution of:
max_v∈^v, μ_0 s. t. v(s)≤ T_(P_0,r_0)^πv(s) - α_s^rπ_s_q - α_s^P -γ v·π_s_q for all s∈,
because ·_q is the dual norm of ·_p, and we can define the operator accordingly:
[T^π,_qv](s) := T_(P_0,r_0)^πv(s) - α_s^rπ_s_q - α_s^P γv·π_s_q ∀ v∈^, s∈.
We make the following assumption:
[A_q]
For all s∈, there exists ϵ_s > 0 such that α_s^P≤1-γ-ϵ_s/γ^1/q.
Let v_1,v_2∈^. For all s∈,
*[T_q^π,v_1](s) - [T_q^π,v_2](s)
= | T_(P_0,r_0)^πv_1(s) - α_s^rπ_s_q - α_s^P γv_1·π_s_q
- (T_(P_0,r_0)^πv_2(s) - α_s^rπ_s_q - α_s^P γv_2·π_s_q)|
= *T_(P_0,r_0)^πv_1(s) - T_(P_0,r_0)^πv_2(s) + *α_s^P γ (v_2 ·π_s_q - v_1·π_s_q)
= *T_(P_0,r_0)^πv_1(s) - T_(P_0,r_0)^πv_2(s) + α_s^P γ*v_2 ·π_s_q - v_1·π_s_q
≤ *T_(P_0,r_0)^πv_1(s) - T_(P_0,r_0)^πv_2(s) + α_s^P γv_2 ·π_s - v_1·π_s_q
[∀, ∈^, *_q - _q≤-_q]
≤ γ*v_1 - v_2_∞ + α_s^P γv_2 ·π_s - v_1·π_s_q
[T_(P_0,r_0)^πv_1 - T_(P_0,r_0)^πv_2_∞≤γ*v_1 - v_2_∞]
= γ*v_1 - v_2_∞ + α_s^P γ(v_2 -v_1)·π_s _q
[∀ v, w∈^, v·π_s - w·π_s = (v-w)·π_s]
≤ γ*v_1 - v_2_∞ + α_s^P γv_2 -v_1_q [∀ v∈^, v·π_s_q≤v_q]
≤ γ*v_1 - v_2_∞ + α_s^P γ^1/q*v_1 - v_2_∞ [∀ v, w∈^, v-w_q ≤^1/qv-w_∞]
= γ (1 + α_s^P^1/q)*v_1 - v_2_∞
≤ γ(1 + 1-γ- ϵ_s/γ)v_1-v_2_∞ [α_s^P ≤1-γ-ϵ_s/γ^1/q by Asm. (A_q)]
= (1- ϵ_s )v_1-v_2_∞
≤ (1- ϵ_* )v_1-v_2_∞,
where ϵ_*:= min_s∈ϵ_s. Setting q=2 and remarking that: (i) the first bound in Asm. <ref> recovers Asm. (A_q); (ii) T_2^π, = T^π,, establishes contraction of the evaluation operator. For the optimality operator, the proof is exactly the same as that of <cit.>, using Prop. <ref>.
§.§ Proof of Theorem <ref>
[optimal policy]
The greedy policy π^*, = 𝒢_Ω_(v^*, ) is the unique optimal policy, for all π∈Δ_^, v^π^*, = v^*, ≥ v^π,.
By strong convexity of the norm, the function
Ω_v, : π_s ↦π_s (α_s^r + α_s^P γv) is strongly convex in π_s. As such, we can invoke Prop. <ref> to state that the greedy policy π^*, is the unique maximizing argument for v^*,.
Moreover, by construction,
T^π^*, ,v^*, = T^*, v^*, = v^*, .
Supposing that Asm. <ref> holds, the evaluation operator T^π^*, , is contracting and has a unique fixed point v^π^*, ,. Therefore, v^*, being also a fixed point, we have v^π^*, , = v^*,. It remains to show the last inequality: the proof is exactly the same as that of <cit.>, and relies on the monotonicity of the operators.
§.§ Proof of Remark <ref>
An optimal policy may be stochastic. This is due to the fact that our MDP framework builds upon the general s-rectangularity assumption. Robust MDPs with s-rectangular uncertainty sets similarly yield an optimal robust policy that is stochastic <cit.>. Nonetheless, the MDP formulation recovers a deterministic optimal policy in the more specific (s,a)-rectangular case, which is in accordance with the robust MDP setting.
In the (s,a)-rectangular case, the uncertainty set is structured as = ×_(s,a)∈(s,a), where (s,a):= P_0(·|s,a)× r_0(s,a)+ (s,a)×(s,a). The robust counterpart of problem (<ref>) is:
F(s) = max_(P, r)∈{v(s) - r^π(s) - γ P^πv(s) }
=max_(P(·|s,a), r(s,a))∈(s,a)×(s,a){v(s) - r_0^π(s) - r^π(s)- γ P_0^πv(s) - γ P^πv(s) }
=max_(P(·|s,a), r(s,a))∈(s,a)×(s,a){ - r^π(s) - γ P^πv(s) } + v(s) - r_0^π(s)- γ P_0^πv(s)
= max_ r(s,a)∈(s,a){-r^π(s) }
+γmax_P(·|s,a)∈(s,a){ - P^πv(s) } + v(s) - T_(P_0,r_0)^πv(s)
= max_ r(s,a)∈(s,a){ -∑_a∈π_s(a)r(s,a) }
+γmax_P(·|s,a)∈(s,a){ - ∑_a∈π_s(a) P(·|s,a), v}
+ v(s) - T_(P_0,r_0)^πv(s)
= ∑_a∈π_s(a)(max_ r(s,a)∈(s,a){ -r(s,a) }
+γmax_P(·|s,a)∈(s,a){P(·|s,a), -v})
+ v(s) - T_(P_0,r_0)^πv(s).
In particular, if we have ball uncertainty sets (s,a):= {P(·|s,a)∈^: P(·|s,a)≤α_s,a^P} and (s,a):= {r(s,a)∈: r(s,a)≤α_s,a^r} for all (s,a)∈, then we can explicitly compute the support functions:
max_r(s,a): r(s,a)≤α_s,a^r -r(s,a) = α_s,a^r and max_P(·|s,a): P(·|s,a)≤α_s,a^PP(·|s,a), -v = α_s,a^Pv.
Therefore, the robust counterpart rewrites as:
F(s) = ∑_a∈π_s(a)(α_s,a^r + γα_s,a^Pv)+ v(s) - T_(P_0,r_0)^πv(s),
and the robust value function v^π, is the optimal solution of the convex optimization problem:
max_v∈^v, μ_0 s. t. v(s) ≤ T_(P_0,r_0)^πv(s) - ∑_a∈π_s(a)(α_s,a^r + γα_s,a^Pv) for all s∈.
This derivation enables us to derive an Bellman evaluation operator for the (s,a)-rectangular case. Indeed, the regularization function now becomes
Ω_v, (π_s):= ∑_a∈π_s(a)(α_s,a^r + γα_s,a^Pv),
which yields the following operator:
[T^π,v](s) := T_(P_0,r_0)^πv(s)-Ω_v, (π_s) , ∀ s∈.
We aim to show that we can find a deterministic policy π^d∈Δ_^ such that [T^π^d,v](s) = [T^*,v](s) for all s∈. Given an arbitrary policy π∈Δ_^, we first rewrite:
[T^π,v](s) = r_0^π(s) + γ P_0^πv(s) - Ω_v, (π_s)
= ∑_a∈π_s(a)r_0(s,a) + γ∑_a∈π_s(a)P_0(·|s,a), v - (∑_a∈π_s(a)(α_s,a^r + γα_s,a^Pv))
= ∑_a∈π_s(a)(r_0(s,a)- α_s,a^r + γ (P_0(·|s,a), v - α_s,a^Pv))
By <cit.>, we have that:
∑_a∈π_s(a)(r_0(s,a)- α_s,a^r + γ (P_0(·|s,a), v - α_s,a^Pv))
≤max_a∈{r_0(s,a)- α_s,a^r + γ (P_0(·|s,a), v - α_s,a^Pv)},
and since the action set is finite, there exists an action a^*∈ reaching the maximum. Setting π^d(a^*)=1 thus gives the desired result.
We just derived a regularized formulation of robust MDPs with (s,a)-rectangular uncertainty set and ensured that the corresponding Bellman operators yield a deterministic optimal policy. In that case, the optimal Bellman operator becomes:
[T^*,v](s) = max_a∈{r_0(s,a)- α_s,a^r + γ (P_0(·|s,a), v - α_s,a^Pv)}.
§ Q-LEARNING
§.§ The q-function
Assume that = ({P_0} + ) × ({r_0} + ) and is (s,a)-rectangular. Then, its corresponding robust action-value function is an optimal solution of:
max_q∈^q, μ_0·π s.t. q(s,a)≤ T^π_(P_0, r_0)q(s,a) - σ_(s,a)(-1) - σ_(s,a)(-γ q·π) for all (s,a)∈,
where [q·π](s'):= ∑_a'∈π_s'(a')q(s', a'), ∀ s'∈.
It is known from <cit.> that the robust action-value function is an optimal solution of:
max_q∈^q, μ_0·π s.t. q(s,a)≤ T^π_(P, r)q(s,a) for all (s,a)∈, (P(·|s,a), r(s,a))∈(s,a),
which can be rewritten as:
max_q∈^q, μ_0·π s.t. q(s,a) ≤ T^π_(P_0, r_0)q(s,a) +r(s,a) + γP(·|s,a)·π, q
for all (s,a)∈, (P(·|s,a), r(s,a))∈(s,a),
with [P(·|s,a)·π](s',a'):= π_s'(a')P(s'|s,a), ∀ (s',a'∈).
More synthetically, the robust action-value function is an optimal solution of:
max_q∈^q, μ_0·π
s.t. max_(P(·|s,a), r(s,a))∈(s,a){
q(s,a) - T^π_(P_0, r_0)q(s,a) - r(s,a) - γP(·|s,a)·π, q}≤ 0
for all
(s,a)∈.
We now compute the robust counterpart. For any (s,a)∈ and policy π∈Δ_^, denote by:
F^π(s,a):= max_(P(·|s,a), r(s,a))∈(s,a){
q(s,a) - T^π_(P_0, r_0)q(s,a) - r(s,a) - γP(·|s,a)·π, q}.
Removing the constant terms from the maximization and using the indicator function yields:
F^π(s,a) = q(s,a) - T^π_(P_0, r_0)q(s,a) +
max_(P(·|s,a), r(s,a))∈(s,a){- r(s,a) - γP(·|s,a)·π, q}
=q(s,a) - T^π_(P_0, r_0)q(s,a) - min_(P(·|s,a), r(s,a))∈(s,a){ r(s,a) + γP(·|s,a)·π, q}
= q(s,a) - T^π_(P_0, r_0)q(s,a) - min_r(s,a)∈(s,a)r(s,a) - min_P(·|s,a)∈(s,a)γP(·|s,a)·π, q
= q(s,a) - T^π_(P_0, r_0)q(s,a) - min_r(s,a)∈{r(s,a) + δ_(s,a)(r(s,a))}
-min_P(·|s,a)∈^{γP(·|s,a)·π, q +δ_(s,a)(P(·|s,a))}.
Applying Fenchel-Rockafellar duality to both minimization problems yields the desired result.
If, additionally, _sa is a ball of radius α_sa^P w.r.t. some norm · and _sa an interval of radius α_sa^r, then the
robust action-value function is an optimal solution of:
max_q∈^q, μ_0·π s.t. q(s,a)≤ T^π_(P_0, r_0)q(s,a) - α_sa^r -γα_sa^P q·π_* for all (s,a)∈.
The upper-bound in the optimization problem enables to define the Bellman operator on q-functions as:
[T^π,q](s,a):= T^π_(P_0, r_0)q(s,a) - α_sa^r -γα_sa^P q·π_*
§.§ Distinguishing between and robust q-functions
We aim to show that although we can interchangeably optimize an q-function or a robust q-value under (s,a)-rectangularity,
the q-function obtained from the value v is not the same as the q-function obtained from the original robust optimization problem. This nuance is reminiscent of the regularized MDP setting, where defining the regularized q-function w.r.t. the regularized value v is not equivalent to taking v as the expected q-function over a policy.
Let thus assume that the uncertainty set is (s,a)-rectangular. Then, by Sec. <ref>, the value function v^π, is the unique fixed point of the Bellman operator as below:
[T^π,v](s) := T_(P_0,r_0)^πv(s)-∑_a∈π_s(a)(α_s,a^r + γα_s,a^Pv), ∀ s∈.
This rewrites as:
v^π, (s) = ∑_a∈π_s(a)(r_0(s,a) +γP_0(·|s,a), v^π, - α_s,a^r - γα_s,a^Pv^π, )
= ∑_a∈π_s(a)(q^π,(s,a) - α_s,a^r - γα_s,a^Pv^π, ),
where the last equality holds by definition of the q-function associated with v^π, (Def. <ref>). As a result,
q^π,·π(s) = v^π, (s) + [α^r + γα^Pv^π, ] ·π (s)
Alternatively, by optimizing w.r.t. q∈^ instead of v∈^ and applying Cor. <ref>, the robust action-value function q^π, satisfies:
q^π, (s,a) = T^π_(P_0, r_0)q^π, (s,a) - α_sa^r -γα_sa^P q^π, ·π_* for all (s,a)∈.
Taking the expectation over policy π yields:
q^π, ·π = r_0^π + P_0^π (q^π, ·π) - ∑_a∈π_s(a)(α_sa^r -γα_sa^P q^π, ·π_*) for all (s,a)∈,
so that q^π, ·π is a fixed point of the Bellman operator. By unicity of its fixed point, we obtain that q^π, ·π = v^π,.
As a result:
q^π, ·π = v^π,
= (q^π, - α^r-γv^π, α^P)·π
= q^π,·π - [α^r + γα^Pv^π, ]·π
Taking deterministic policies on each possible action, we end up with an element-wise identity:
q^π, (s,a) = q^π,(s,a) - α^r_s,a-γv^π, α^P_s,a
§.§ Convergence of q-learning
For any (s,a)∈, let a sequence of step-sizes (β_t(s,a))_t∈ satisfying 0≤β_t(s,a)≤ 1, ∑_t∈β_t(s,a) = ∞ and ∑_t∈β_t^2(s,a)< ∞. Then, the q-learning algorithm as given in Alg. <ref> converges almost surely to the optimal q-function.
We will use the convergence result from <cit.>.
The update rule is given by:
q_t+1(s_t,a_t) = q_t(s_t,a_t)
+ β_t(s_t,a_t)(
r_t+1 + γmax_b∈q_t(s_t+1,b) - α_s_t a_t^r -γα_s_t a_t^Pmax_b∈q_t(·,b)_* - q_t(s_t,a_t))
which we rewrite as:
q_t+1(s_t,a_t) = (1-β_t(s_t,a_t))q_t(s_t,a_t)
+ β_t(s_t,a_t)(
r_t+1 + γmax_b∈q_t(s_t+1,b) - α_s_t a_t^r -γα_s_t a_t^Pmax_b∈q_t(·,b)_* ).
Further let Δ_t(s,a):= q_t(s,a) - q^*,(s,a), ∀ (s,a)∈. Then Eq. (<ref>) rewrites as:
Δ_t+1(s,a) = (1-β_t(s_t,a_t))Δ_t(s_t,a_t)
+ β_t(s_t,a_t)(
r_t+1 + γmax_b∈q_t(s_t+1,b) - α_s_t a_t^r -γα_s_t a_t^Pmax_b∈q_t(·,b)_* - q^*,(s_t,a_t) ).
We introduce the following random variable:
G_t(s,a):= r(s,a) + γmax_b∈q_t(X(s,a),b) - α_sa^r -γα_s a^Pmax_b∈q_t(·,b)_* - q^*,(s,a),
so that
𝔼[G_t(s,a) | ℱ_t ]
= 𝔼[r(s,a) + γmax_b∈q_t(X(s,a),b) - α_sa^r -γα_s a^Pmax_b∈q_t(·,b)_* - q^*,(s,a) | ℱ_t]
= r(s,a)+γ∑_s'∈max_b∈P(s'|s,a)q_t(s',b)- α_sa^r -γα_s a^Pmax_b∈q_t(·,b)_* - q^*,(s,a)
= [T^*,q_t](s,a)- q^*,(s,a)
= [T^*,q_t](s,a)- [T^*,q^*,](s,a).
By contraction property of the Bellman operator, we thus obtain:
*𝔼[G_t(s,a) | ℱ_t ]_∞ = *[T^*,q_t](s,a)- [T^*,q^*,](s,a)_∞
≤ (1-ϵ^*)*q_t(s,a)- q^*,(s,a)_∞ = (1-ϵ^*)*Δ_t(s,a)_∞
§ PLANNING ON A MAZE
In the following experiment, we play with the radius of the uncertainty set and analyze the distance of the robust/value function to the vanilla one obtained after convergence of MPI. Except for the radius parameters of Table <ref>, all other parameters remain unchanged. In both figures <ref> and <ref>, we see that the distance norm converges to 0 as the size of the uncertainty set gets closer to 0: this sanity check ensures an increasing relationship between the level of robustness and the radius value. As shown in Fig. <ref>, the plots for robust MPI and MPI coincide in the reward-robust case, but they diverge from each other as the transition model gets more uncertain. This does not contradict our theoretical findings from Thms. <ref>-<ref>. In fact, each iteration of robust MPI involves an optimization problem which is solved using a black-box solver and yields an approximate solution. As such, errors propagate across iterations and according to Fig. <ref>, they are more sensitive to transition than reward uncertainty. This is easy to understand: as opposed to the reward function, the transition kernel interacts with the value function at each Bellman update, so errors on the value function also affect those on the optimum and vice versa. Moreover, the gap grows with the radius level because of the simplex constraint we ignored when computing the support function of the transition uncertainty set. The work <cit.> accounts for this additional constraint to derive a regularization function that recovers the robust value under transition uncertainty.
0.2in
§ LEARNING EXPERIMENTS
In this section, we provide additional details and plots regarding our q-learning algorithm.
|
http://arxiv.org/abs/2303.06923v1
|
20230313084008
|
Strategy-proof Budgeting via a VCG-like Mechanism
|
[
"Jonathan Wagner",
"Reshef Meir"
] |
cs.GT
|
[
"cs.GT"
] |
0pt
-
acmnumeric
]Strategy-proof Budgeting via a VCG-like Mechanism
We present a strategy-proof public goods budgeting mechanism where agents determine both the total volume of expanses and the specific allocation. It is constructed as a modification of VCG to a non-typical environment, namely where we do not assume quasi-linear utilities nor direct revelation. We further show that under plausible assumptions it satisfies strategyproofness in strictly dominant strategies, and consequently implements the social optimum as a Coalition-Proof Nash Equilibrium. A primary (albeit not an exclusive) motivation of our model is Participatory Budgeting, where members of a community collectively decide the spending policy of public tax dollars. While incentives alignment in our mechanism, as in classic VCG, is achieved via individual payments we charge from agents, in a PB context that seems unreasonable. Our second main result thus provides that, under further specifications relevant in that context, these payments will vanish in large populations. In the last section we expand the mechanism’s definition to a class of mechanisms in which the designer can prioritize certain outcomes she sees as desirable. In particular we give the example of favoring equitable/egalitarian allocations.
[style=definition]assumption
[style=definition]observation
⌊⌋
𝐱
ℝ
ℕ
ℳ
ℐ
V
𝒟
X̂
x̂
ℳ̂
β̂
α̂
α̅
Θ̂
𝒞
ℱ
v̂
ĝ
P̂
ê
p̂
þt̂
Δ^m ×[-B_0/n,∞)
[-B_0/n,∞)
Δ^m ×_++
rtheorem[1]Theorem <ref>.
atheorem[2]#1 #2 .
rproposition[1]Proposition <ref>.
rlemma[1]Lemma <ref>.
rcorollary[1]Corollary <ref>.
rdefinition[1]Definition <ref>.
rexamplecont[1]#1Continued
ℐ
q21/2
S.P.E.
[
Jonathan Wagner, Reshef Meir
March 30, 2023
================================
§ INTRODUCTION
We study a model where a population of n agents face the decision of funding several pubic goods or investments that serve their collective objectives. Formally, we start with an available budget of B_0 ≥ 0 that should be allocated among m≥ 1 different alternatives. The budget decision we seek is a pair (x,t) where t ∈ is a monetary sum ("tax") that each agent adds to (or subtracts from) the budget, and x ∈Δ^m:={x ∈ R^n | x_j ≥ 0 ∀ j, ∑_j x_j =1} represents the allocation of the resulting budget B_t = B_0 +nt among the m alternatives. Note that we allow t<0, meaning that some of the initial budget B_0 will be distributed equally among agents rather than fund public investments. We are interested in constructing a collective decision mechanism to which every agent submits her preferred budget decision, and one that is incentive compatible (IC) particularly. Table <ref> demonstrates how agents might report to such mechanism their preferences for budget allocation among three municipal services.
Note e.g. that agent a suggests an individual payment of t=20 each, and so
to allocate a total of B_0+3t=100+3·20=160. Also note that agents b
and c propose the same normalized allocation x_b=x_c ∈Δ^3 but
differ in their preferred tax.
§.§ Motivation and Main Results
Incentives alignment has long been a major interest in Social Choice and Mechanism Design research. While Gibbard & Satterthwaite's Theorem <cit.> provides a negative result for the most general setup, positive results do exist when the preference space is contracted somehow (mainly to singled-peaked <cit.>), or when monetary transfers that the mechanism charges from agents are introduced. In the latter case, the VCG mechanism <cit.> is the canonical model and moreover, Roberts' Theorem <cit.> shows that for a general preferences domain, any strategy-proof mechanism is in a sense a generalized version of the VCG principle. However, VCG is built upon an assumed model that cannot apply to every scenario. Most importantly, it depends crucially on underlying quasi-linear utilities, meaning that the overall satisfaction of agent i when the mechanism outputs the decision Ω and charges her with a payment p_i is expressed as
u_i(Ω,p_i)=v_i(Ω)-p_i where v_i(Ω) is the value she attributes to Ω. While plausible in many economic situations, quasi-linearity is in particular violated if agents do not asses their benefits from different outcomes in monetary terms (making the subtraction of p_i from v_i(Ω) a meaningless expression), whether because these are purely non-financial or just difficult to quantify. When we consider investments in public goods, that is likely to be the case.
Furthermore, VCG is a 'Direct Revelation' mechanism in which agents explicitly report the full description of their preferences <cit.>. That is reasonable when, for example, we ask agents to specify a value (that is, the maximum price they are willing to pay) for each of the items offered in an auction. In our case the space of optional outcomes is a multidimensional continuum and the 'value' is quite an abstract concept, non-linear in particular. As should be obvious when we later introduce our model to its full details, a direct revelation mechanism becomes unlikely in that context and we thus only collect optimal allocations,[Possibly proceeded by a few follow-up questions presented to agents, See <ref>.] as demonstrated in Table <ref>.
Contribution and paper structure We show that for the budgeting problem described above we can construct a 'VCG-like' mechanism all the same. The key idea we will use is that while we can no longer justify the simple quasi-linear relation between the utility in the outcome and that of the charged payment, the fact that the decision space itself involves monetary transfers enables revealing of the true relation between these two in each agents' perspective. At the begining of Section <ref> show how full information can in fact be extracted from the preferences that agents report. Section <ref> introdoces our proposed mechanism, and in <ref> we show that under certain conditions it is IC in strictly dominant strategies and consequently Coalition-proof <cit.>. Finally, in some applications of the model collecting money from agents (that is, money paid "to the mechanism", on top of the tax t that is a part of the chosen outcome and finances shared expenditures) serves well the purpose of aligning incentives, however may not be reasonable on its own merits. Thus, our second and most technically challenging main result, presented in Section <ref>, provides that, for a relevant subclass of utility functions, these payments become negligible in large populations .
A few examples of environments where our mechanism may be useful are listed below, starting with the one standing at the center of our focus.
Participatory Budgeting Our model falls naturally within a Participatory Budgeting (PB) framework, where members of a community determine the allocation of their shared budget via some voting mechanism.[’The Participatory Budget Project’: https://www.participatorybudgeting.org/] While most PB implementations worldwide, and accordingly much of the PB literature, involve the allocation of a given budget among several public indivisible goods, several previous works were dedicated to divisible PB models <cit.>, where `projects' may correspond to city departments, e.g. education, transportation, parks and recreation and so on. Our model moreover involves taxation in the collective decision, in which we find several advantages. Technically, our adjustment of VCG payments to non quasi-linear utilities is enabled solely due to that feature. Conceptually, it expands the scope of control delegated to society through direct democracy, and also brings a more valuable feedback to the designer on the true value that public expenditures create, rather than just a comparison between them. Being our primary motivation, the terminology we use and our approach to modelling is mainly driven by the PB application, however intended to represent a wider range of real life economic situations. While we are aware that some of the assumptions we make may not be generically adequate in every possible instance of different environments too, the basic ideas extend to at least some of them.
We thoroughly discuss our works' relations with previous models and results in that area in the next section of the introduction.
Shared financing among nearby businesses A group of nearby businesses (for example in the same shopping center) might cofinance some facilities and services that are more public or regional by nature, e.g. security, costumers' parking, shared dining areas, public activities that increase exposure, etc.
Environmental or other non-financial investments That could apply to governments imposing an 'environmental (or other) tax' on firms or different countries deciding on their coordinated actions <cit.>. Other pursued goals might include border controls of neighbouring countries, for example.
Joint R&D and Human Capital ventures R & D and Human Capital investments are typically long term and require considerable resources. Thus, firms in the same or related industries might benefit from joining forces in funding e.g. the training of required professions or the development of new technologies and methods. Such collaborations might scale from a small number of businesses deciding to cooperate, through a unionized industry and up to being run by the government state-wide.
Non-monetary 'Currencies'
As the concept of 'value' of different outcomes is more abstract in our model, it may also apply to situations where the investments themselves, and thereby the collected tax payments, are not necessarily monetary. Examples may include members in a community willing to dedicate an agreed amount of working hours within their community, or firms that allocate resources such as land (e.g. agricultural land dedicated to cooperative experimental planting), or technological resources such as storage space or computation force.
A variation of our model where we employ a heterogeneous taxation may also be relevant, especially to applications other than PB. For example, imposing higher contributions on wealthier countries in joint environmental investments. We discuss that in appendix <ref> and show that our IC results extend to such setup.
§.§ Modeling Approaches in Divisible Participatory Budgeting
Before presenting our own model, we discuss here the limitations of existing incentive compatibility concepts from the divisible PB literature.
Spatial models
Several past works have studied incentive alignment in PB and divisible PB particularly <cit.>. Notably, two different works <cit.> presented incentive compatible (or 'strategyproof') mechanisms for a divisible PB scenario similar to ours. These works assume ℓ_1-norm preferences in which each agent i reports her optimal allocation x^(i)∈Δ^m to the mechanism, and her utility in any allocation x is given by u_i(x)=-x^(i)-x_1. Other ℓ_p norms <cit.>, or more generally single-peaked preferences <cit.>, are well studied in social choice literature and known to allow for mechanisms with strong strategyproofness guarantees. This IC definition relies on the underlying assumption that the utility of an agent depends solely on the `distance' between the accepted outcome and her favoured alternative. Indeed, in the absence of a concrete way to measure the monetary value of decisions, minimizing the distance to a voter's ideal allocation is a reasonable solution.
However, we argue that when agents have concrete measurable utility from decisions, as in PB, the spatial approach may not adequately capture the preference of a voter, as the very reason that voters' optimal allocations are not typically uniform is that they value money spent on each alternative differently. In particular, minimizing the ℓ_1 distance is not just suboptimal, but may in fact incentivize agents to manipulate .
To see why, consider Voter a from Table <ref>, with her ideal allocation x_a = (0.6,0.3,0.1). Now, let us further assume that a is the parent to children under 18 years of age and the three public goods considered are education systems, public parks and public transportation— that she very rarely uses and thus does not value highly. Reasonably, that voter might strictly prefer the allocation x'=(0.7,0.2,0.1) over x”=(0.6,0.2,0.2) because while both are suboptimal to her, investing another 0.1 of the budget in the education of her children may serve her interests better than investing it in a facility she rarely enjoys.
However, under the ℓ_1-distance model she is indifferent between the two, meaning that her incentive to manipulate the outcome from x” to x', when and if facing the opportunity, is not accounted for.[Indeed, concrete examples that show how the incentive compatibility in <cit.> and <cit.> might “fail", in the above sense, are not difficult to construct. ]
Social choice vs. microeconomic models
As explained in <cit.>, the solution concept that minimizes the ℓ_1 distances from agents' ideal points generalizes the one-dimensional median rule <cit.>. Similarly, most of the literature on divisible PB adopt or generalizes the same assumptions used for PB with indivisible projects, which in turn stem from standard modelling assumptions in voting and computational social choice.
However, we argue that divisible budget allocation is much closer in nature to problems typically treated within microeconomic framework <cit.>. This is true especially when assigning budgets to departments etc. rather than to specific projects with variable costs.[See e.g. <https://pbstanford.org/boston16internal/knapsack>] Hence, it makes more sense to adopt conventional economic assumptions regarding demand and utility, as in <cit.> and as we do here. In particular:
* Additive concave utilities. We adopt the additive concave utilities model <cit.> that offers a more concrete description of the utility gained from different public investments. Its most closely related version to ours is found in a former work by Fain et al. <cit.>. There, the utility of agent i in allocation X=(X_1,X_2…) is expressed as
U_i(X)=∑_j α_i,jθ_j(X_j)
where X_j is the amount spent on public good j, the {θ_j}_j functions are monotonically increasing in X_j for all j and strictly concave, (smoothly) expressing the plausible assumption of decreasing marginal gains, and α_i,j are scalars that vary between agents. As we assume that part of the budget is collected via a tax-per-agent t, our model adds on the above the disutility of a voter from the tax payment.
* Optimal points characterized by the MRS conditions, that follows form the concavity and some additional conventions on utilities <cit.>.
* Utility depends on public investment per capita. (that we add to the model in Section <ref>) . On a large scale, it is reasonable that the quality of public goods depends more on spending per capita rather than on the nominal amount.[See for example <https://data.oecd.org/gga/general-government-spending.htm>, and <cit.>.]
In contrast, elicitation is an issue that has received much more attention in the literature of mechanism design and computational social choice than in microeconomics. For example there is a live discussion in the context of indivisible PB on the tradeoff between expressiveness of the ballot and effort required for elicitation <cit.>. Similarly, we argue that it does not make sense to assume that we have direct access to voters' preferences, and here we adopt from computational social choice the assumptions that voters simply report their most preferred allocation, as in <cit.>.
In terms of applicability, however, the obvious shortcoming of our model is that it requires us to explicitly specify the functions {θ_j}_j and f, which are fairly abstract. Importantly, we do not assume that agents are 'aware' of their assumed utility function, but, conventionally, only know their preferences regarding the decision space, that presumably can be interpreted as derived from an underlying utility model <cit.>. Of course, any such model would be an approximation at best. Nevertheless, it is fair to assume that any choice of monotonically increasing concave functions probably better approximates individuals' preferences—and thereby incentives—than the spatial model or a linear additive model <cit.>. (Note that the linear additive model is arguably much less reasonable than concave, not merely due to excluding diminishing returns, but because it implies boundry optimal allocations where only alternatives j that maximize α_i,j are implemented).
§.§ Further related literature
The Economic literature on public goods markets, equilibria and optimal taxation is abundant. (<cit.>, just to name a few). While our work adopts a similar approach to modelling and also optimizes social welfare, this brunch of the literature rarely discusses mechanisms. One exception that we know of is found in <cit.>, in which the socially optimal outcome is implemented in strictly dominant strategies using a method very similar to ours, however for quite a different utility model.
To the best of our knowledge, the only existing PB mechanism that included tax in the collective decision previously to ours was studied by Garg et al. <cit.> in the context of experimenting 'iterative voting' mechanisms. Interestingly, it may suggest some supporting evidence in favour of the additive concave utility model over spatial models in that context. Two other previous works <cit.> incorporated private funding into a PB model, albeit in the form of voluntary donations that every agent can choose freely and not as a collectively decided sum that is collected from (or paid to) everyone, as we consider here.
The literature on divisible PB is relatively narrow. In terms of incentive compatibility, <cit.> presented the soundest results, under a spatial utility model.
Alternatively, Fain et al. <cit.> offer a randomized mechanism that is `approximately-truthful' for the special case of 1-degree homogeneous additive utilities. The Knapsack Voting mechanism introduced in <cit.> also satisfies some weaker notion of strategyproofness under a similar model. Aziz et al. <cit.> presented IC mechanisms for additive linear utilities, although their model is primarily motivated by randomized approval mechanisms. A similar utility model is also found in <cit.>.
Overall, in relation to the divisible PB field, this work offers an SDSIC mechanism under concave additive utilities, to the best of our knowledge for the first time.
Our desire for diminishing the (modified) VCG payments resembles the idea of redistribution in mechanism design <cit.>. Such methods are especially relevant in a discrete decision space and can eliminate surplus only partially, while in our model the complete (asymptotic) vanishing is much thanks to the continuity of the decision space.
Much of the PB literature deals with the concept of fair allocations <cit.>. While not a primary goal of our model, we show that the designer can bias the allocation closer to a favorable allocation—including one they see as fair.
§ MODEL AND PRELIMINARIES
We denote by Δ^m the set of distributions over m elements, and use [m] as a shortcut for {1,…,m}.
A set of n agents (voters) need to collectively reach a budget decision (x,t) described as follows. t∈ is a lump-sum tax collected from every agent. x ∈Δ^m is an allocation of the total available budget B_t:=B_0+nt among some m pre-given public goods, where B_0 is an external, non tax-funded source of public funds. t is restricted only by t>-B_0/n, meaning that voters can decide either to finance a budget larger than B_0 through positive taxation, or allocate some of it to themselves directly as cash (negative taxation). The collective decision is taken through some voting mechanism to which every agent submits her most preferred budget decision (x^(i),t^(i)) .
§.§ Preferences
We now introduce the utility function step by step. We start with agents' valuation for public expenditures alone that follows from <cit.>:
Θ_i(X) := ∑_j=1^m α_i,jθ_j(X_j)
where X=(X_1,…,X_m) ∈_+^m and X_j is the amount spent on project j. For all j ∈ [m], an agent i gains α_i,jθ_j(X_j) from an X_j spending on public good j. {θ_j}_j=1^m are identical across agents while agents differ one from another in their coefficients (α_i,1…,α_i,m) ∈Δ^m.
For all 1 ≤ j ≤ m, θ_j:→, ∈{_+,_++} is increasing and strictly concave, and lim_X_j → 0θ(X_j) ≤ 0, where _+ := {x ∈ | x ≥ 0}, _++ := {x ∈ | x > 0}.
As explained earlier in the Introduction, our model includes monetary transfers of two types. One is the collectively decided tax that will be collected from every agent, and beyond that, a mechanism may charge payments in order to align incentives, where these payments are not affecting public expenditure. Thus we include in our model the value agents attribute to reduction (or increment) in their overall wealth,
π_i(δ_w) := -α_i,f· f(δ_w)
where δ_w is monetary loss (gain when negative) and the coefficient α_i,f>0 varies between agents.
Our formulation of the disutility function f will follow Kahneman and Tversky's Prospect Theory <cit.>. Their and others' empirical findings <cit.> demonstrate that people tend to exhibit loss aversion in relation to monetary gains or losses, meaning: (a) valuating monetary transfers with reference to their current status presumably located at the origin; and (b) exhibit risk-aversion with respect to monetary losses, and risk-seeking with respect to gains. Meaning, we shall assume that f(0)=0 and that it is strictly convex in (-∞,0] and strictly concave in [0,∞). In principle, our analysis requires differentiable utility functions. However, the most natural examples of elementary increasing concave functions, the logarithmic and power functions, are not differentiable at zero, which still allows for our results. Thus, for the sake of giving more intuitive and simple examples, we will allow a diverging derivative at zero.[Moreover, Kahneman and Tversky themselves suggested the following explicit functional form (the"value function" in their terminology) built on power functions, that has been adopted widely ever since <cit.>:
f^KT_q,r,λ(δ_w)=-1_{δ_w ≤ 0}|δ_w|^q+λ·1_{δ_w >0}(δ_w)^r
for some 0 <q,r<1, λ>0 (See <cit.>, p. 309). Assumption <ref> thus includes the above form and extends beyond it.]
f:→ is increasing, strictly convex in (-∞,0] and strictly concave in [0,∞). f(0)=0. We assume that f is either continuously differentiable in all or anywhere but the origin, in which case lim_z → 0^+_-f'(z)=∞.
Now, by adding Θ_i and π_i together we get the full description of an agent's
utility function:
u_i(X,δ_w) := Θ_i(X)+π_i(δ_w)= ∑_j=1^m α_i,jθ_j(X_j)-α_i,ff(δ_w).
In particular, the problem at hand is reaching a collective budget decision (x,t) via some voting mechanism that aggregates the collective preferences on the whole decision space . We therefore specifically define an agent's valuation for a budget decision (i.e. with no regard to payments on top of the collected tax):
∀ x ∈Δ^m, t ∈,
v_i(x,t): = u_i(x · B_t,t) = ∑_j=1^m α_i,jθ_j(x_j · B_t)-α_i,ff(t)
Thus the type of i is defined by the coefficients:
α_i:=(α_i,1…,α_i,m,α_i,f) ∈Δ^m ×_++
In a more general sense, we also write u_α, Θ_α and v_α for functions of a hypothetical "type α" agent.
Finally, we reasonably want to assume that every agent would like to fund some level of public expenditures, whereas no agent favors an infinite budget funded by infinite tax.
gg
* ∀ i ∃ j s.t. lim_t → 0nα_i,jθ'(nt) > α_i,flim_t → -B_0/nf'(t).
* For any m ∈, lim_z →∞θ'_j(z/m)/f'(z)=0 ∀ j ∈ [m].
Hence, a budgeting instance ={m,n,B_0, α⃗,{θ_j}_j∈[m],f} is defined by the number of public goods n, number of agents m, initial budget B_0, the type profile α⃗=(α_i,…,α_n) and functions {θ_j}_j∈[m],f that respect Assumptions <ref>,<ref>,<ref>. For example,
[Running example]
Consider an instance with B_0=0,m=2,n=3, where for every agent i ∈ [3], the valuation is:
v_i(x,t):=10·∑_j=1^2α_i,jln(x_j· 3t)-α_i,f√(t)
That is, θ_j(X_j):=10ln(X_j) for both j∈{1,2}, and f(t):=√(t).
§ MECHANISMS
Preference Elicitation
The mechanism we introduce in the next section is designed to maximize the social welfare ∑_iv_i(x,t). However, agents do not report their full valuations v_i(·,·) explicitly but rather their optimal budget decisions (x^(i),t^(i)) ∀ i ∈ [n]. Eliciting the underlying the types proceeds in two steps, where in the first we extract all the information we can out of {x^(i),t^(i)}_i ∈ [n].
In every budgeting instance , for every type α∈Δ^m ×:
* There exists a solution (x^(α),t^(α)) to the optimization problem
max_(x, t) v_α(x,t)=∑_jα_jθ_j(x_jB_t)-α_ff(t)
s.t. x ∈Δ^m, t ∈ [-B_0/n,∞);
* t^(α) > B_0/n and nθ'_j(x^(α)_jB_t^(α))/f'(t^(α))=α_f/α_j for all j s.t. x^(α)_j>0
;
* If lim_z → 0θ'_j(z)=∞ and x^(α)_j=0 then α_j=0.
The proof is deferred to the tract_alpha_proofappendix. (2) and (3) provide us with k ≤ m linear conditions for every agent i. If k<m, for each j such that x^(i)_j · B_t^(i)=0 we present i with the follow-up question: "How much are you willing to pay for adding an χ_j spending on public good j?" where χ_j is any fixed amount. For any number τ she responds, we extract α_i,j/α_i,f from
α_i,jθ_j(χ_j)=α_i,f(f(t)-f(t+τ))
(If τ=0 then α_i,j=0). Note that here we do not ask the agent for her preferred consistent budget decision, i.e. her response must not admit χ_j=nτ. Rather, we ask her for the price she is willing to pay for a specific good, that is public good j at a level of χ_j spending. After presenting her with at most m such follow-up questions, we have enough information to fully describe her type.[While presenting up to m such follow-up questions to every agent may seem a bit tedious and adding a significant cognitive load on them, it is plausible that not much will actually be needed, if any. We address that in section <ref>.]
The type profile α⃗ can be fully extracted via the following steps.
* We ask all agents for their preferred budget decisions (x^(i),t^(i)) ∈Δ^m × ∀ i ∈ [n].
* For every i,j such that x^(i)_j · B_t^(i)>0,
α_i,f/α_i,j=θ'_j(x^(i)_j(B_0+nt^(i)))/f'(t^(i))
and, if lim_z → 0θ'_j(z)=∞ and x^(i)_j=0 then α_i,j=0.
* If x^(i)_j· B_t^(i)=0 for some i and j and lim_z → 0θ'_j(z)<∞ , we ask agent i for τ_i,j, the maximum increase in t^(i) she willing to add for financing
a χ_j spending on public good j, where χ_j could be any positive number. For every such i and j,
α_i,j/α_i,f=(f(t)-f(t+τ_i,j))/θ_j(χ_j)
* Each agent's type is given (decisively) by the m linear equations above and the additional ∑_jα_i,j=1.
[Running example, cont.]
Every agent submits the optimal budget decision w.r.t. her valuation function, i.e. some (x^(i),t^(i)) ∈ that maximizes (<ref>). Using the above Corollary, we infer every agent's underlying type α_i from
10(x^(i)_j· 3t^(i))^-1/(2√(t^(i)))^-1=α_i,f/α_i,j
if x^(i)_j>0, and α_i,j=0 otherwise. For example, the voting profile on the left can only be induced by the preference profile α^RE on the right (RE for Running Example):
(votes) t X^(i)_1 (x^(i)_1) X^(i)_2 (x^(i)_2)
voter 1 69.4 145.8 (0.7) 62.5 (0.3)
voter 2 26.3 0 (0) 78.9 (1)
voter 3 44.4 66.6 (0.5) 66.6 (0.5)
(types) α_i,1 α_i,2 α_i,f
i=1 0.7 0.3 0.8
i=2 0 1 1.3
i=3 0.5 0.5 1
Mechanisms We now want to define a class of mechanisms for our budgeting problem. The first step in every such mechanism must be eliciting the types based on Corollary <ref>. However, for the sake of a more convenient exposition, we formally define a class of Direct Revelation <cit.> mechanisms that take the explicit type profile as input, which by Corollary <ref> will bring to no loss of generality.
A mechanism for budgeting instance is a pair M=(ϕ,P) where:
* ϕ: (Δ^m × )^n ↦ is a social choice function that inputs the type profile α⃗=(α_1,…,α_n)
and outputs a budget decision (x,t) ∈;
* P : ()^n ↦^n is a function of the type profile that assigns a payment P_i for every agent i ∈ [n].
Note again that in our model, the outcome itself includes a tax payment t that every agent pays to fund the public budget, and the individual payments (P_i,…,P_n) are charged on top of that. Hereinafter we abuse notation a little when writing u_i((x,t),P_i) or u_i(M), u_i(ϕ,P) for the overall utility of agent i from budget decision (x,t) and payment P_i (that are determined by M=(ϕ,P)). While we defined u_i earlier as a function of an allocation X ∈^m_+ and a general monetary transfer δω, the interpretation should be clear as every pair of budget decision (x,t) and payment P_i implicitly define an allocation X=xB_t and an overall monetary transfer of δω = t+P_i.
Incentive Compatible mechanisms Incentive Compatibility requires that no agent could benefit from reporting some false preferences α'_i ≠α_i to the mechanism.
A mechanism M is dominant strategy incentive compatible (DSIC) if for all i ∈ [n], α_i ∈, α⃗_-i∈ ()^n-1 and every α' ∈ s.t. α' ≠α_i,
u_i(M(α_i,α⃗_-i))≥ u_i(M(α',α⃗_-i))
If that inequality is strict for all i, α_i, α⃗_-i and α' we say that M is strictly dominant strategy incentive compatible (SDSIC).
§ UTILITY-SENSITIVE VCG
In this section section we present our proposed mechanism (Def. <ref>) and discuss its properties. We start with the payment function P.
§.§ Payments
Essentially, the payments we define are VCG payments adjusted to our non quasi-linear setup.<cit.>
In general, the social choice function in a VCG mechanism ϕ^VCG outputs the socially optimal outcome Ω^*=argmax_Ω∑_iv_i(Ω) and payments are defined as follows.
p^VCG_i=-∑_k≠ iv_k(Ω^*)+h(α⃗_-i) ∀ i ∈ [n]
where h(α⃗_-i) could be any function of α⃗_-i, the partial preferences profile submitted by all agents excluding i. The VCG model assumes Quasi-linear utility functions, meaning that
(*) u_i(VCG(α⃗))
=v_i(Ω^*)-p^VCG_i=∑_kv_k(Ω^*)-h(α⃗_-i)
The above expression is the key property on which the DSIC of a VCG mechanism relies. Since Ω^* maximizes ∑_kv_k(·) and h(α⃗_-i) is independent of i's vote, an agent can never (strictly) increase her utility by manipulating the outcome Ω^*. In our model, however, the quasi-linearity assumption is violated. If we write Ω^*:=(x^*,t^*) then our model assumes
u_i(M(α⃗))=∑_jα_i,jθ_j(x^*_jB_t^*)-α_i,ff(t^*+P_i),
for any mechanism M. Clearly, naïvely setting P_i=p^VCG_i will not result in anything as useful as (*). However, our utility model does entail some significant information we can exploit. While individuals in our model no more exhibit the simple, linear relation between utility gains (or losses) that stem from monetary transfers and those that come from the chosen outcome itself, their true relation is in fact described in the utility function, thanks to the introducing of f in it. Relying on that, we can adjust the payments appropriately so that the key property (*) is maintained. We do that in the next definition and lemma.
Let Ω^*=(x^*,t^*) ∈_(x,t)∑_i ∈ [n]v_i(x,t) be the socially optimal budget decision. For every agent i, we define the utility-sensitive VCG payment as
P_i=-t^* +f^-1(f(t^*)+1/α_i,fp^VCG_i).
Let Ω^*=(x^*,t^*) be the social optimum and P_i the utility sensitive VCG payment given in <ref> above. Then
u_i(Ω^*,P_i)=∑_kv_k(Ω^*)-h(α⃗_-i).
u_i(Ω^*,P_i) =∑_j=1^m α_i,jθ_j(x^*_jB_t^*)-α_i,ff(t^*+P_i)
=∑_j=1^m α_i,jθ_j(x^*_jB_t^*)-α_i,ff(t^*)-p^VCG_i
=v_i(x^*,t^*)-p^VCG_i= ∑_kv_k(x^*,t^*)-h(α⃗_-i)
§.§ Definition of the mechanism
The Utility-Sensitive VCG (US-VCG) mechanism is a tax-involved PB mechanism defined by:
∀α⃗∈ (Δ^m × )^n, (α⃗):=(Ω^*,P)
where Ω^*=(x^*,t^*) ∈_Ω∑_iv_i(Ω) is the social optimum and P is the utility-sensitive VCG payment assignment given in Def. <ref>.
§.§ Incentive Compatibility
The US-VCG is DSIC.
We omit a formal proof of that result since given Lemma <ref>, it would proceed exactly as the DSIC proof for general VCG <cit.>, and very similarly to our SDSIC proof we later present. Some preparations are needed before that.
Mean-dependency
We here point out some very useful characteristic of our model that plays a major role in both of our main results
. Namely, that the outcome Ω^* depends solely on the average of types reported by all agents. Let α̅:=1/n∑_i ∈ [n]α_i denote the types mean. Now, simply changing the order of summation in the social welfare
∑_iv_i(x,t) =∑_i[∑_jα_i,jθ_j(x_jB_t)-α_i,ff(t)]
=∑_j[∑_iα_i,jθ_j(x_jB_t)-α_i,ff(t)]
=∑_j nα̅_jθ_j(x_jB_t)- nα̅_ff(t)=n· v_α̅(x,t)
shows that:
In any budget decision (x,t), the social welfare is given by ∑_iv_i(x,t)=n· v_α̅(x,t). Consequently, Ω^*=(x^*,t^*) maximizes the social welfare if and only if it maximizes v_α̅(x,t), the valuation function defined by the average type α̅.
Note that in addition, the above observation means that the social optimum Ω^* is computed in O(1) time w.r.t. n. As for payments, the typical choice for h(α_-i) is the "Clarke Pivot Rule" h(α_-i)=∑_k ≠ iv_k(g(_-i)) <cit.>, meaning, charging every agent with the social welfare of others in her absence. With that choice, computing every agent's payment is as hard as computing the outcome Ω^*.
[Running example, cont.]
For the utility functions from Eq. (<ref>)
we have _(x,t)v_α=((α_1,α_2),( 2· 10/α_f)^2).
The average type in the type profile α^RE from Example <ref>
is =(0.4,0.6,1.03), and thus the budget decision chosen by is Ω^*=((0.4,0.6),377).
Following Observation <ref>, we can use the definition below for a more convenient presentation.
For all α∈, define g(α):Δ^m×→Δ^m× such that
g(α)=(x^(α),t^(α)) ∈_(x,t) v_α(x,t)
Meaning, g maps every preferences vector α=(α_1,…,α_m,α_f) to an optimal budget decision w.r.t. the corresponding valuation function v_α. If that optimum is not unique, g chooses one arbitrarily. In some places we use this notation somewhat abusively, ignoring that indecisiveness in the specific choice of g(α). In particular, by Observation <ref> Ω^*=g().
We are now almost ready to state our main result. That is, that the US-VCG mechanism satisfies the stronger SDSIC if we further assume that optimal points are characterized by MRS conditions.
For any α∈, an optimum g(α)=(x^(α),t^(α)) ∈_(x,t)v_α(x,t) satisfies the MRS conditions if
nθ'_j(x^(α)_j · B_t^(α))/f'(t^(α))=α_f/α_j ∀α_j >0, and α_j=0 x^(α)_j=0.
That characterization of optimal points is a standard convention in economic literature <cit.>, and we elaborate on its justification after proving the Theorem. The proof will take advantage of the fact that the MRS conditions define a unique α∈ for any given g(α) ∈, as the m linear equations in <ref> above, along with ∑_jα_j=1, have a unique solution. We also add the assumption that _j >0 ∀ j, in other words that ∀ j ∃ i s.t. α_i,j >0 which is fair to assume.
Assume that _j >0 ∀ j and that all social optima g() satisfy the MRS conditions. Then the US-VCG mechanism is SDSIC.
Fix i, α_i and α̅_-i. Note that by Observation <ref> the US-VCG mechanism outputs g(), and, by Lemma <ref>,
u_i((α⃗))=∑_k v_k(g(α̅))-h(α⃗_-i)=n· v_α̅(g(α̅))-h(α⃗_-i)
Now, assume that i falsely reports α'_i ≠α_i. Inevitably, that shifts the mean preferences to some α̅' ≠α̅, and the social optimum that outputs to g(α̅'). We want to show now that g(α̅') is certainly not an optimum of v_. If g(α̅') admits the MRS equations w.r.t. ' then it does not w.r.t. , as these equations define a unique type that solves them. Thus, by assumption, g(α̅') is not an optimum of v_. Otherwise, since by Lemma <ref> interior optimal points satisfy the MRS conditions, we have that g(α̅') is on the boundary. However, points on the boundaries (i.e. with x_j=0 for some j) cannot satisfy the MRS conditions w.r.t. because _j >0 ∀ j, and thus g(') is not an optimum of v_ in that case too. Therefore,
u_i((α'_i,α⃗_-i)) =n· v_α̅(g(α̅'))-h(α⃗_-i)
<n· v_α̅(g(α̅))-h(α⃗_-i)=u_i((α_i,α⃗_-i))
MRS characterization First note that by Lemma <ref>, internal optimal points always satisfy the MRS conditions. Even without further justifications, the conjecture that social optima implement every public good in some level, even minor, seems reasonable in many contexts. Especially, if we consider a high-level allocation of the budget between city departments or sectors that are unlikely to be completely dismissed in any society (e.g. education systems, infrastructure, culture activities and such). Technically, however, our model does not imply that. In this short discussion we give some further (and reasonable) assumptions that will suffice.
Basically, g(α) satisfies the MRS conditions unless nα_jθ'_j(0) < α_ff'(t^(α)) for some α_j >0, meaning that a type α agent would rather not to fund public good j by a further tax increase. Since f' has a maximum at zero, demanding that nα_i,jθ'_j(0)>α_i,ff'(0) ∀ i,j—meaning that all agents wish to spend some amount on each and every public good—is sufficient to rule that out, and implies the same inequality for too. In particular, assuming lim_X_j → 0θ'_j(X_j)=∞ ∀ j promises, along with Assumption <ref>, that g(α) satisfies the MRS conditions for all types α. That assumption, that can also be put as lim_X_j → 0ΘX_j=0 ∀ j holds in some very natural examples - e.g. for logarithmic or power functions, and also in the canonical Cobb-Douglas and Leontief utility models. Moreover, we should note that the θ_j utilities input monetary investment, and not the public good itself. Meaning, we should properly interpret them as the composition of an underlying production function Φ_j(X_j) and a direct utility function ζ_j(Φ_j). Now if Φ_j is a production function, the conventional Inada conditions <cit.> include, inter alia, that lim_X_j → 0Φ'_j(X_j)=∞ and thus any increasing direct utility ζ_j with ζ'_j(0)>0 would imply lim_X_j → 0θ'_j(X_j)=lim_X_j → 0Φ'(X_j)ζ'(Φ(X_j))=∞. Under that assumption, agents allocate any given budget among all public goods such that α_i,j >0, and thus optimal points satisfy MRS. Whether assuming the Inada conditions explicitly or not, the characterization of optimal points by MRS conditions is a widely accepted convention in public goods Economic literature <cit.>.
Summing the above more formally, for an SDSIC mechanism we need the following.
We assume that either one of the following holds:
* nα_i,jθ'_j(0)>α_i,ff'(0) ∀ i,j.
* lim_X_j → 0θ'_j(X_j)=∞ ∀ j.
The US-VCG mechanism is SDSIC in any budgeting instance that respects Assumption <ref>.
Note, moreover, that if Assumption <ref> holds then elicitation is completed with no follow-up questions needed.
§.§ Manipulations By Coalitions
In general, VCG mechanisms are known to be highly prone to group manipulations <cit.>. While individuals cannot benefit from reporting false preferences when the reports of all others are fixed, a group of agents can sometimes coordinate their misreports in such way that each of them (or some at least) benefits due to the untruthful reports of others. The US-VCG is no different in that. However, the SDSIC property ensures that any such coalition would not be sustainable in the sense that the colluding agents cannot trust each other to follow the agreed scheme. Thus, it may suggest that such coalitions are not likely to form in the first place. That softer robustness demand where we allow for manipulating coalitions as long as they are unsustainable in the above sense is captured in the Coalition Proof Nash Equilibrium (CPNE) solution concept <cit.>. While the original term is quite involved,
the application to our context is intuitive: in an SDSIC mechanism, no sustainable coalition could exist since the individual unique best response, under any circumstances, is for every agent to report her true preference. We thus formulate here a simpler term that the US-VCG satisfies, and that implies CPNE.[We refer the reader to <cit.> for the original CPNE definition.]
First, we define a manipulation by a coalition as a coordinated misreport by all its members, that benefits them.
A manipulation by a coalition S ⊂ [n] is a partial type profile α'_S={α'_i}_i ∈ S such
that α'_i ≠α_i ∀ i ∈ S and
u_i(M(α'_S,α_-S) ≥ u_i(M(α_S,α_-S) ∀ i ∈ S.
and there exists i ∈ S for which the inequality is strict.
Now, we demand that if such a manipulation exists then α'_i is not a best response for at least one agent in the coalition.
We say that a mechanism is One Step Coalition-Proof (OSCP) if for any manipulation α'_S by a coalition S, there exists i ∈ S s.t.
α'_i ∉ BR_i(α'_S ∖{i},α_[n]∖ S).
The US-VCG mechanism is OSCP in any budgeting instance that admits Assumptions <ref>, <ref> and <ref>.
(and consequently implements the social optimum as a CPNE).
The claim follows trivially from SDSIC, which means that BR_i(α_-i)={α_i} for all i and α_-i.
§ VANISHING PAYMENTS UNDER PER-CAPITA UTILITIES
In this section we show that payments become negligible in large populations. While these payments are essential for aligning incentives, charging additional money from voters would be undesired in a PB context. For the technical proofs, we will have to further specify the utility model so that it captures some important feature of divisible PB, which has been (justifiably) overlooked in past PB literature as well as in this work up to this point. That is, that the utility achieved from a given spending X_j on some public good j must also depend on the number of people that enjoy it, n.[In applications other than PB this may not be plausible. However, in such applications charging payments from agents could be acceptable.] The reason we only have to address that now is that in this section we analyse the asymptotic behavior of payments w.r.t. n, and in our model the overall budget B_t = B_0+nt depends on it directly. The following example illustrates the problem.
Consider a budgeting instance where m=1, B_0=0, θ(nt)=(nt)^p and f(t)=t^q for some 0<p<q<1. A type α_f agent thus maximizes her utility
u_α_f=(nt)^p-α_ft^q at
t=[α_f q/p]^1-q/1-p· n^1-q∞
That is a very unlikely result, whatever that sole public good may be. There is no reason to expect that larger populations would wish to pay infinitely larger taxes, nor is it the situation found in reality. The model allows that because every tax unit payed by an individual is presumably "matched" n-1 times by others, thus making the substitution rate grow proportionally with n. However, while larger societies probably do have larger available resources, they are also likely to have greater needs. Just as a country's economic state is conventionally measured by its GDP index, on the large scale the quality of public goods should be associated with spending per capita rather than with nominal spending.[See for example <https://data.oecd.org/gga/general-government-spending.htm>, and <cit.>.]
Hence, we now narrow down the definition of Θ_i(X) to
Θ_i(X,n)=∑_j=1^mα_i,jθ_j(X_j/n)=∑_j=1^mα_i,jθ_j(x_j(b_0+t)) where b_0:=B_0/n.
Note that all of our previous results follow through since for any fixed n, θ_j(X_j/n) is a particular case of θ_j(X_j).
Realistically, the dependency on n might not be necessarily that we assumed, and we take θ_j(X_j/n) as a benchmark and relatively simple case of a more general class of functions of the form θ_j(X_j,n). While for some public goods X_j/n may capture the relation adequately—for example, the quality of an education system surely depends on its resources per child—for others it may serve more as a large scale approximation—e.g., if the city offers free cloud services that allocates space equally among users, the total number of users affects each of them only to the point where the provided space exceeds their needs. Still, the benefit for users must be somehow connected the to the available space per user (which is determined by spending).
Some comments on the notations before we proceed. First, in this section we define h(α⃗_-i) in the VCG payments as the conventional Clarke pivot-rule <cit.> function that charges a voter with the (normalized) social welfare of all others in her absence
h(α⃗_-i)=∑_k ≠ iv_k(g(α̅_-i)),
making the VCG payments
p^VCG_i=-∑_k≠ iv_k(g(α̅))+∑_k ≠ iv_k(g(α̅_-i))=(n-1)(v_α̅_-i(g(α̅_-i))-v_α̅_-i(g(α̅)))
where the second equality is by Observation <ref>. Next, we give an alternative representation for valuation functions that would ease the technical analysis significantly.
Define the vector valued function : Δ^m×→^m+1
(x,t)=(θ_1(x_1(b_0+t)),…,θ_m(x_m(b_0+t)),-f(t))
For every α∈Δ^m×, we write the valuation function v_α as the dot product of α and :
v_α(x,t)=∑_jα_jθ_j(x_j(b_0+t))-α_ff(t)=α·(x,t)
In these notations, the VCG payments are written as
p^VCG_i=(n-1)α̅_-i·((g(α̅_-i))-(g(α̅)))
Our main results in this section (Theorems <ref> and <ref>) are basically the convergence of that expression to zero, at different rates. Essentially, the conditions for convergence are that as α̅_-i→α̅ with n, g(α̅_-i) → g(α̅) as well, and fast enough. In other words, they rely on the guarantees we can provide for g's smoothness around the solution g(). In our running example, for instance, easy to check that g is as smooth as you can wish for.
[Running example, cont.]
Consider again Example <ref>, where the utility model is
v_α(x,t)=∑_j=1^2α_jln(x_j· t)-α_f√(t)
We have shown that for any α∈, g(α)=((α_1,…,α_m),(2/α_f)^2). Thus g(α) is continuously differentiable for all α∈ (and in particular at ).
Coming up next are two preliminary lemmas that establish the continuity of g at the solution g() when that is uniquely defined, which is sufficient for Theorem <ref> that follows. The proof of <ref> is deferred to the appendix.
Let S ⊂Δ^m × such that inf{α_f:α∈ S}>0. Then sup{|g(α)| : α∈ S}<∞.
For any given α∈Δ^m×, if v_α has a unique global maximum then
lim_β→αg(β)=g(α).
Before presenting the proof, note that (a) this statement is not obvious because we did not assume that g is continuous, and (b) it holds for any function g that follows Definition <ref>, i.e. the specific arbitrary choice of g(β) in case v_β has multiple optima is irrelevant.
By assumption, 0 < α·((g(α))-(g(β))). On the other hand, putting ϵ:=(α-β),
0 < α·((g(α))-(g(β))) =β·((g(α))-(g(β)))+ϵ·((g(α))-(g(β))
≤ϵ·((g(α))-(g(β)))≤ |ϵ|·|(g(α))-(g(β))| .
where the second inequality is by definition of g(β). By Lemma <ref> g(β) is bounded, and therefore |ϵ|· |(g(α))-(g(β))| 0. Ergo,
lim_β→αα· ((g(α))-(g(β)))=lim_β→αv_α(g(α))-v_α(g(β))=0
Since v_α is continuous, g(α) is unique and g(β) is bounded, it must be that g(β) → g(α).
§.§ Bounding individual payments
We need one more definition before stating our main result in this section.
A characteristic triplet in a budgeting instance is σ =(b_0,μ,α̅) where
* b_0:=B_0/n≥ 0 is the non tax funded budget source per capita.
* α̅:=1/n∑_kα_k ∈Δ^m × is the mean preferences vector of all agents.
* 1/μ<α_i,f<μ ∀ i ∈ [n].
Let σ =(b_0,μ,α̅) such that v_α̅ has a unique global maximum at g(α̅). Then for every ϵ >0 there exists n_ϵ(σ) such that in every budgeting instance with characteristic triplet σ and n > n_ϵ(σ),
|P_i|<ϵ ∀ i ∈ [n].
As stated, Theorem <ref> means that prices vanish if the population is sufficiently large while not taking into account the likely possibility that in reality, new members that join a community might change it's characteristic parameters b_0,μ and α̅. That is, we are saying that in any given community with known parameters (b_0,μ,α̅), prices will be arbitrarily small if the population is large enough. Thus, as there is no reason to assume some correlation between these parameters and the population's size, the theorem essentially implies that prices are likely to be small, even negligible, in larger societies.
The p^VCG payments are defined as the loss an agent imposes on all others by participating, and are therefore always non-negative. Now,
0≤ p^VCG_i =(n-1)α̅_-i((g(α̅_-i))-(g(α̅)))
=(n-1)α̅((g(α̅_-i))-(g(α̅)))+(n-1)(α̅_-i-α̅)((g(α̅_-i))-(g(α̅)))
≤ (n-1)(α̅_-i-α̅)((g(α̅_-i))-(g(α̅)))
≤n-1/n|α̅_-i-α_i||(g(α̅_-i))-(g(α̅))| 0
Where the first inequality is by definition of g(α̅), and in the second we used α̅=n-1/nα̅_-i+1/nα_i and Cauchy–Schwarz. Since |α̅_-i-α_i| is bounded, and by Lemma <ref> ∘ g is continuous, we get the convergence at the end. Now, as _-i→ with n →∞,
P_i=-t(α̅) +f^-1(f(t(α̅))+1/α_i,fp^VCG_i) -t(α̅)+t(α̅) =0
(note that f^-1 is continuous). Thus for any arbitrary small ϵ we can find n_ϵ(σ) that yields the result.
Note that the mean-dependency is crucial for that result too. It yields that _-i approaches at a 1/n rate, precisely canceling the increase in the number of agents n.
§.§ Non-Positive Payments
The theorem above shows that individual payments vanish with n. Our next goal is to formulate them as non positive for all agents. Meaning, we want no agent to add any payment on top of the tax t, even negligible. Instead, they might be paid a "negative payment" that we can view as a bonus or a "tax discount" for their participation. We defer the complete discussion and formalities to the app_sec:np_paymentsappendix, and only outline here the main ideas.
First, we formulate the condition needed for a stronger convergence result.
Define F:(Δ^m×)^2 →^m+1 as:
F_j(α,(x,t)) =α_jθ'_j(x_j(b_0+t))-α_ff'(t) ∀ 1≤ j ≤ m
F_m+1(α,(x,t)) =∑_jx_j-1
We say that g(α)=(x^(α),t^(α)) is a "regular maximum" of v_α if F(α,(x^(α),t^(α)))=0 and
[F(x,t)(α,g(α))]≠ 0
where F(x,t) is the (m+1)×(m+1) Jacobi matrix of F with respect to the variables (x,t).
Next, in Appendix <ref>
we show that a unique regular solution g() implies that g is differentiable in its surrounding. That will enable us, by linear approximation, to evaluate the convergence rate of the difference ((g(α̅_-i))-(g(α̅))), which essentially determines the payment of agent i. Theorem <ref> then shows that this rate is O(1/n).
Let σ =(b_0,μ,α̅) such that v_α̅ has a regular unique global maximum g(α̅). Then there exist some ℬ∈ and n(σ) such that
in every population with characteristic triplet σ and size n > n(σ),
|P_i| ≤ℬ/n for all i ∈ [n].
Now we construct non-positive payments the following way. We add to the VCG payments an amount that we pay back to every agent and equals (or is greater than) the maximum payment she could have been charged with, given the partial type profile of her peers α_-i. Theorem <ref> will not only provide that bound, but also implies that the total amount paid to agents will not diverge as n →∞. Corollary <ref> states the final result.
In any budgeting instance with characteristic triplet σ of size n>n(σ) such that v_α̅ has a regular unique global maximum, there exist a payment assignment P that satisfies:
* P_i ≤ 0 ∀ i ∈ [n]
* ∑_i ∈ [n]P_i ≥ -ℬ̃ for some ℬ̃∈_+.
§ BIASED MECHANISMS
In this section, we expand the US-VCG definition to a class of mechanisms that insert a bias towards an arbitrary desired outcome or a set of outcomes. Indeed, the designer may have some goal in mind that she may want to balance with welfare, for example a particular project she wants to promote, a legacy allocation from previous years, or an allocation she sees as fair.
The general form of mechanisms in that class follows the familiar affine-maximizer generalization of a VCG mechanism. (See <cit.>, p. 228). We start with choosing a bias function (x,t): Δ^m×↦, that in one way or another favours—that is, assigns higher values to—outcomes we see as desirable. Note that (x,t) must be independent of the realization of preferences α⃗=(α_1,…,α_n). Then, we generalize the US-VCG definition as follows.
For any bias function (x,t): Δ^m×↦, we define the Biased Utility-Sensitive VCG (BUS-VCG)
mechanism:
(α⃗):= ((),)
where
* ∀α∈, (α):= (x,t) ∈_(x,t) v_α(x,t)+(x,t) [For the time being, let us just assume that indeed such a maximum exists. Note that Obviously depends on our choice for , but we do not refer to that explicitly as it should be clear in the context.]
* is the payment assignment
_i:=-þ+f^-1(f(þ)+1/α_i,f(p^VCG_i+n((_-i))-n(()))
§.§ Equitable/Egalitarian Allocations
We now give an example for a specific choice of allocations that promotes two well-known notions of distributive justice and that a social planner might favor. We focus here only on the choice of the allocation x ∈Δ^m and not on the tax decision t, assuming the designer only cares for the division of the budget B_t once it is determined. Conceptually, we desire a "fair" use of public resources, whereas t is a private resource. There are also technical reasons for refering to the allocation alone, that will be clarified shortly.
For every t ∈ (-B_0/n,∞), let
^t := _x ∈Δ^mmax_j,k ∈ [m] |θ_j(x_jB_t)-θ_k(x_kB_t)|
Thanks to the fact that Θ_i(xB_t) is a convex combination of θ_j(x_jB_t), j ∈ [m] for every agent i, ^t minimizes the possible difference in satisfaction between any two agents, up to a point of a complete equitable allocation where θ_j(^t_jB_t)=θ_k(^t_kB_t) ∀ j,k and consequently Θ_i(^tB_t)=Θ_h(^tB_t) for every two agents i,h, whenever that is feasible under B_t. (Such cases are not too scarce, for example if θ_j(0) is the same value for all j ∈ [m] then an equitable allocation exists for all t.) We state that formally in the following proposition, given without a formal proof.
For all t ∈ (B_0/n,∞), ^t= _x Δ^mmax_α,β∈Δ^m|Θ_α(xB_t)-Θ_β(xB_t)|
Note that ^t optimizes with respect to all hypothetical types, as our bias function cannot depend on realized votes. Thus, diverting the outcome towards ^t brings an improvement in terms of the "worst case" result only. For that reason, searching for an equitable or egalitarian budget decisions, i.e. w.r.t. the tax decision as well, also does not make too much sense on the technical level, as in every budget decision (x,t), the worst-case maximum gap in -α_i,ff(t) is between two hypothetical agents that have the two extreme values of α_i,f. Next, our choice of ^t implements (in the worst case) another celebrated principle in Social Choice literature, namely the Egalitarian Rule.
For all t ∈ (-B_0/n,∞), ^t= _x ∈Δ^mmin_α∈Δ^mΘ_α(xB_t).
The minimum level of satisfaction in (x,t) is attained by a unit-vector type such that
Θ_(xB_t)=θ_j(x_jB_t)=min_j'θ_j'(x_j'B_t). Now, it is clear that
^t : = _x ∈Δ^mmax_j,k ∈ [m] |θ_j(x_jB_t)-θ_k(x_kB_t)|
= _x ∈Δ^mmin_j ∈ [m]θ_j(x_jB_t)
as one cannot increase both the minimum and maximum of θ_j'(x_j'B_t), j' ∈ [m] while keeping the budget B_t fixed, and thereby cannot increase the minimum without reducing the difference.
§.§ Properties inherited by
We would obviously like to preserve useful properties of the US-VCG mechanism when generalizing to BUS-VCG. Some of them carry over quite easily. First, note that mean-dependency (Observation <ref>) holds for too. (We in fact rely on that in the definition of ). It is not difficult to see now that DSIC extends under any choice for , as the definition of imitates the situation where v_i(x,t) → v_i(x,t)+(x,t) and h(α_-i) → h(α_-i)+n((_-i)) for every agent i.[See <cit.> for a rigorous proof.] One also easily checks that payments vanish if () satisfies the same demands we needed earlier for g(), that is, continuity for Theorem <ref> and differentiability for <ref> (Albeit, for we will have to explicitly demand that while for g we had other terms that implied its smoothness).
The BUS-VCG mechanism is DSIC. Moreover, Theorem <ref> (<ref>) hold if is continuous (differentiable) near the solution ().
SDSIC, however, will not carry over that easily. The condition we need for that is α≠α' (α) ≠(α'), which is not satisfied by any arbitrary choice of (x,t). For example,
(x,t)=
K (x,t)∈ W
0 (x,t)∉ W
where K ∈ R is some large number and W ⊂ is the set of favoured outcomes, does not satisfy that. In
Appendix <ref> we describe a class of bias functions that do preserve SDSIC.
§ CONCLUDING REMARKS
We presented a collective decision budgeting mechanism, the US-VCG mechanism, that concerns both the allocation and total volume of expenses. It is essentially a VCG mechanism adjusted to our setting, in which we had to tackle a few issues. Mainly, we had to reformulate the payments to suit our preference model of non quasi-linear utilities. The US-VCG mechanism is welfare-maximizing and DSIC in the most general setup, and we specified the conditions in which it further satisfies strict DSIC and consequently also resistance against coalition manipulations. In Section <ref>, we showed that the modified VCG payments the mechanism charges become negligible in large populations, which is especially relevant in the Participatory Budgeting application that stood in the center of our focus. Finally, we showed a generalization of the US-VCG mechanism that inserts a bias towards any set of outcomes of one's choice.
Future Directions In the introduction, we discussed the theoretic advantages of an additive concave utility model over other examples from the literature. The obvious downside is, when considering a mechanism that aggregates preferences, is the difficulty in assessing the concrete functions we should assume. While we can nevertheless argue that any such functions are probably a better approximation for the true underlying preferences than previous suggestions, future experimental research attempting to evaluate, similarly to those performed in relation to the disutility monetary function f <cit.>, could make a valuable contribution to the field.
ACM-Reference-Format.bst
§ MISSING PROOFS
tract_alpha
tract_alpha_proofIn every budgeting instance , for every type α∈:
* There exists a solution (x^(α),t^(α)) to the optimization problem
max_(x, t) v_α(x,t)=∑_jα_jθ_j(x_jB_t)-α_ff(t)
s.t. x ∈Δ^m, t ∈ [-B_0/n,∞)
* t^(α) > B_0/n and for all j s.t. x^(α)_j>0,
nθ'_j(x^(α)_jB_t^(α))/f'(t^(α))=α_f/α_j
* If lim_z → 0θ'_j(z)=∞ and x^(α)_j=0 then α_i,j=0.
For any preferences vector α, consider first the (convex) optimization w.r.t. some fixed t ∈, that is
max_x ∈Δ^m∑_jα_jθ_j(x_jB_t)-α_ff(t)
and let x^(α)(t) be the solution (that surely exists because Δ^m is a compact set) for any given t ∈. Then x^(α)(t) must satisfy the first order conditions:
α_jθ'_j(x^(α)_j(t)B_t) = α_kθ'_k(x^(α)_k(t)B_t)
for every x^(α)_j(t),x^(α)_k(t) >0 and if x_j>x_k=0 then
α_jθ'_j(x^(α)_j(t)B_t) ≥α_kθ'_k(0)
because otherwise we can increase utility by some infinitesimal change of x^(α)(t). Note that (3) follows immediately from the above inequality if lim_z → 0θ'_k(z)=∞. We assume w.l.o.g. that x^(α)(t): →Δ^m is differential, because if not there exists a differentiable mapping arbitrarily close to x^(α)(t).
Now, consider
tv_α(x^(α)(t),t) =t[∑_jα_jθ_j(x^(α)_j(t)B_t)-α_ff(t)]
=∑_jα_jθ'_j(x^(α)_j(t)B_t)[x^(α)_j(t)tB_t+nx^(α)_j(t)]-α_ff(t)
Now, there exists some l ∈ [m] s.t. x^(α)_l(t) ≥ 1/m, and by the first order conditions we derived above,
tv_α(x^(α)(t),t) =α_lθ'_l(x^(α)_l(t)B_t)∑_j[x^(α)_j(t)tB_t+nx^(α)_j(t)]-α_ff(t)
≤ nθ'_l(t/m)-α_ff(t)
where we used ∑_jx^(α)_j(t)t=0, ∑_jx^(α)_j(t)=1 and θ”_l<0.
Now by Assumption <ref>, there exists some t_0 ∈ s.t. ∀ j ∈ [m]
θ'_j(B_t/m)≤θ'_j(t/m) < α_f/nf'(t) ∀ t >t_0
and therefore tv_α(x^(α)(t),t)<0 for t >t_0. Thus v_α(x^(α)(t),t) has a global maximum at some t^(α)≤ t_0. By Assumption <ref>, there exists some j such that lim_t → 0nα_jθ'(nt) > α_flim_t → -B_0/nf'(t). nθ'_j(0), and thus t=-B_0/n must be suboptimal. In other words t^(α)>-B_0/n.
We abbreviate the notation now to x^(α):= x^(α)(t^(α)). We proceed while first assuming that f is differentiable at t^(α).
α_jθ'_j(x^(α)_j· B_t^(α))=α_ff'(t^(α)) ∀ x^(α)_j>0
because otherwise v_α(x^(α),t^(α)+ϵ)>v_α(x^(α),t^(α)) for some infinitesimal (smaller or greater than zero) ϵ.
To complete the proof, we now show that in case lim_t → 0^+_-f'(t)=∞, t^(α)≠ 0 and thus f has a derivative at t^(α) in any case. Let v_α(x^(α),t):=∑_jα_jθ_j(x^(α)_j· B_t)-α_ff(t), meaning, we fix x^(α) and define v_α(x^(α),t) ∀ t> B_0/n. Then if lim_t → 0_-f'(t)=∞, there exists some ϵ>0 such that tv_α(x^(α),t)<0 for all t∈ [-ϵ,0) and because v_α(x^(α),t) is continuous, v_α(x^(α),0)<v_α(x^(α),-ϵ). Thus (x^(α),0) cannot be a maximum. (Note that if B_0=0 then t^(α)=0 is not possible by Assumption <ref>).
lemma_bound_solutions
Let S ⊂Δ^m × such that inf{α_f:α∈ S}>0. Then sup{|g(α)| : α∈ S}<∞.
Note that x^(α)∈Δ^m so we really only have to prove that t^(α) is bounded. By Lemma <ref>,
θ'_j(x^(α)_j(b_0+t^(α)))/f'(t^(α))=α_f/α_j ∀ j
For all α∈ S, there exists j ∈ [m] such that x^(α)_j ≥ 1/m and thus, since θ'_j is decreasing,
θ'_j(t^(α)/m)/f'(t^(α))≥θ'_j(x^(α)_j · t^(α))/f'(t^(α))≥θ'_j(x^(α)_j(b_0+t^(α)))/f'(t^(α))=α_f/α_j
Therefore , by Assumption <ref>, the LHS of that equality vanishes as t^(α)→∞ and since the ratio on the RHS is bounded away from zero, t^(α) is bounded for all α∈ S.
§ NON-POSITIVE PAYMENTS
We give here the full analysis that leads to Corollary <ref>. We start at formulating the condition needed for Theorem <ref>.
Define F:(Δ^m×)^2 →^m+1 as:
F_j(α,(x,t)) =α_jθ'_j(x_j(b_0+t))-α_ff'(t) ∀ 1≤ j ≤ m
F_m+1(α,(x,t)) =∑_jx_j-1
By Lemma <ref>, F(α,(x^(α),t^(α)))=0 for all α∈Δ^m× R. We say that g(α)=(x^(α),t^(α)) is a "regular maximum" of v_α if, moreover,
[F(x,t)(α,g(α))]≠ 0
where F(x,t) is the (m+1)×(m+1) Jacobi matrix of F with respect to the variables (x,t).
The next Lemma is a direct application of the Implicit Function Theorem <cit.>.
Let g(α) be a regular maximum of v_α. Then there exist an open neighborhood of α S ⊂Δ^m× R and a unique mapping s:S → such that :
* s(α)=g(α).
* s is continuously differentiable in S.
* ∀β∈ S, F(β,s(β))=0
The Lemma does not yet provide the smoothness we want for g, because it only promises that {s(β)}_β∈ S are critical points of v_β that satisfy F(β,s(β))=0, not necessarily maxima. In other words s and g are not the same function by definition. However, an immediate corollary is that if g(α) is also unique they indeed must coincide.
Assume that g(α) is a regular unique global maximum of v_α. Then there exist a neighborhood of α, S ⊂Δ^m× R, such that g is uniquely defined and continuously differentiable in S.
Denote by S the neighborhood of α from the statement of Lemma <ref> and let g(S) be the image of S under g. By Lemma <ref>, g(β) approaches g(α)=s(α) as β→α, therefore there exists a neighborhood S ⊆S of α in which g(β) ∈ g(S) ∀β∈ S. Now, every solution g(β) must satisfy F(β,g(β))=0, but, by Lemma <ref> s is the unique function that maps β∈S to s(β) such that F(β,s(β))=0, therefore g|_S=s. Thus by Lemma <ref>, g is uniquely defined and continuously differentiable in S.
We now have the necessary for the stronger version of payments convergence stated in Theorem <ref>. Basically, this further result is due to the differentiabilty of g that allows for a linear approximation of the difference ((g(α̅_-i))-(g(α̅))), which essentially determines the VCG payment of an agent i. Thus, we can not only say that this difference vanishes as we did in Theorem <ref>, but also specify the convergence rate of O(1/n).
price_conv_2
Let σ =(b_0,μ,α̅) such that v_α̅ has a regular unique global maximum g(α̅). Then there exist some ℬ∈ and n(σ) such that
in every population with characteristic triplet σ and size n > n(σ),
|P_i| ≤ℬ/n ∀ i ∈ [n]
In the proof of Theorem <ref> we showed that:
0 ≤ p^VCG_i≤n-1/n|α̅_-i-α_i||(g(α̅_-i))-(g(α̅))|
By Corollary <ref>, g is differentiable in some neighborhood of α̅ S, and so ∘ g is too. Thus, if we take n_0 sufficiently large so that α̅_-i∈ S, we have for all n>n_0 that
p^VCG_i ≤n-1/n|α̅_-i-α_i||𝒟_∘ g(α̅)(α̅_-i-α̅))+o|α̅_-i-α̅||
≤n-1/n|α̅_-i-α_i| (𝒟_∘ g(α̅)|α̅_-i-α̅|+o|α̅_-i-α̅|)
=n-1/n|α̅_-i-α_i| (𝒟_∘ g(α̅)|α̅_-i-α_i|1/n+o(|α̅_-i-α_i|1/n))
Where 𝒟_∘ g is the Jacobian matrix of ∘ g and 𝒟_∘ g is its matrix-norm, and in the equality at the end we put α̅=n-1/nα̅_-i+1/nα_i. Since the {α_i,f} are bounded there exists some γ∈ such that |α̅_-i-α_i|<γ for all i, thus
p^VCG_i≤n-1/n^2γ^2(𝒟_∘ g(α̅)+o(1))
Now taking n_1 ≥ n_0 such that the o(1) term above is less than 1 and ℬ_0=γ^2(𝒟_∘ g(α̅)+1) gives
P_i=-t(α̅) +f^-1(f(t(α̅))+1/α_i,fp^VCG_i)<(f^-1)'(t(α̅))μℬ_0/n+o(μℬ_0/n)
(Note that by Lemma <ref>, in case f is not differentiable at zero then t(α̅) ≠ 0 thus (f^-1)' alwyas exists.) And now taking ℬ=μ(f^-1)'(t(α̅))𝒞_0+1 with sufficiently large n(σ) ≥ n_1 completes the proof.
In any budgeting instance with characteristic triplet σ and n>n(σ), and such that v_α̅ has a regular unique global maximum,
∑_i ∈ [n]P_i ≤𝒞
Besides telling us how fast payments converge, Theorem <ref> and the corollary that follows allow for the definition of payments that not only vanish asymptotically, but are also non-positive for all agents. That is, instead of charging a "fee" for participating in the vote (and moreover, one that is not identical for everyone), agents will be paid by the mechanism, which you might see as a reward for their participation. The idea is quite simple—after charging an agent with her VCG payment, we “pay her back" no less than the maximum possible payment she could have been charged with given the preferences of her peers α⃗_-i. This way no one is charged with a strictly positive payment. Thanks to Corollary <ref>, we know that the overall sum needed to implement that will not diverge with the number of agents.
Define the non-positive VCG payment assignment p̂^VCG as
p̂^VCG_i:=p^VCG_i-γ^2/n(𝒟_∘ g(α̅_-i)+1)-r/n
where γ is the bound defined in the proof of Theorem <ref> and r ≥ 0 is any constant factor.
Note that this payment assignment does not violate SDSIC as it does not involve α_i.
γ^2/n(𝒟_∘ g(α̅_-i)+1) is a bound we take for p^VCG_i (See clarification below) and the purpose of the r/n factor is to allow for even higher payments to the agents, as much as the social planner wishes and can afford. We thus conclude that:
cor_npp
In any budgeting instance with characteristic triplet σ and n>n(σ) such that v_α̅ has a regular unique global maximum, the payment assignment P̂_i:=-t(α̅) +f^-1(f(t(α̅))+1/α_i,fp̂^VCG_i) satisfies:
* P̂_i ≤ 0 ∀ i ∈ [n]
* ∑_i ∈ [n]P̂_i ≥ -ℬ̃ for some ℬ̃∈_+.
Let us clear out these statements. First, P_i ≤ 0 because p̂^VCG_i ≤ 0 and f^-1 is increasing. Theoretically, we could have just put
[max_α_i ∈Δ^m ×p_i^VCG(α_-i,α_i)] instead of γ^2/n(𝒟_∘ g(α̅_-i)+1) in the above definition, however we cannot guarantee that this maximum can be found efficiently. Note that γ^2/n(𝒟_∘ g(α̅_-i)+1) is almost exactly the upper bound we put on p^VCG_i in the proof of Theorem <ref>, the only difference is that we now use the derivative at α̅_-i to evaluate the difference V(g(α̅_-i))-V(g(α̅)), instead of the derivative at α̅. Obviously, that is just as valid and we could have similarly reached that bound. The reason for this substitution is that the payments formula must be independent of α_i to maintain Incentive Compatibility. Now, While 𝒟_∘ g(α̅_-i) is different for every agent i, we know that these are bounded globally because α̅_-i→α̅ and the Jacobian matrix is a continuous function. Thus p̂_i^VCG=O(p_i^VCG)=O(1/n).
§ BIAS FUNCTIONS THAT PRESERVE SDSIC
§.§ Phantom-Agents
We shall define our special bias function in the form of utility functions of fictitious agents that favour our targeted outcomes. In the simplest case where we have a sole budget decision in mind we can take (x,t)=λ· v_α̃(x,t) where α̃ is chosen so that g(α̃) is the desired outcome and λ >0 indicates the extent of bias we want. The SDSIC then extends trivially, as the our new biased mechanism is essentially the US-VCG mechanism for the n real agents plus λ n fictitious ones with mean preference α̃.
However, diverting the mechanism towards a set of outcomes while maintaining SDSIC will not be as simple (Note that if we add fictitious agents of multiple types, their impact on the outcome is ultimately determined only by the mean of fictitious preferences).
The bias function we introduce below (Def. <ref>) is composed as the sum of two functions, one that favours certain tax decisions and another that targets specific allocations ^t for any given t ∈. That separation corresponds to the nature of our optimization problem, that can be solved in two steps accordingly (See details in the proof of Lemma <ref>). Nonetheless, as we do not demand that ^t necessarily exists for all t, i.e., it is possible that under some tax decisions no allocation is favourable, it should not harm its generality. Meaning, any arbitrary set of outcomes W ⊂ can be targeted this way. We first define the follwing once {x^t}_t are chosen.
For any choice of {^t}_t and for every t ∈ (-b_0,∞) such that ^t exists, we define the corresponding type ^t=(^t_1,…,^t_m) and valuation function ^t such that
_x ∈Δ^m^t(xB_t)=_x ∈Δ^m∑_j^t_jθ_j(x_jB_t)=^t
and if ^t does not exist put ^t=0⃗.
For all t, ^t is derived uniquely from ^t using the first order conditions that we show in the proof of Lemma <ref>:[We assume that ^t is an internal point of Δ^m for all t.]
θ'_j(_jB_t)/θ'_k(_kB_t)=^t_k/^t_j ∀ j ∈ [m]
(and note that these are linear equations as ^t is given). Now, we define our bias function as follows.
For any choice of {^t}_t and for every λ>0, define
_λ(x,t):=λ(^t(xB_t)-^t(^tB_t))+ ψ(t)
where ψ:(-B_0/n,∞) ↦ is continuous and lim_t →∞ψ(t)=0.
That is, for any given t we add the (non-positive) utility loss of λ fictitious agents that favour ^t over x (but have no preferences regarding the tax t), plus ψ(t) that expresses the designer's preference on tax decisions. Note that by a similar argument to that used in the proof of Lemma <ref>, that choice of assures that is well defined, i.e. that v_α(x,t)+_λ(x,t) has a global maximum for all α∈.
[Running example with bias to equitable allocation]
We show an example for executing the BUS-VCG mechanism with ^t taken as the equitable allocation ^t defined in <ref>. In case that θ_j are identical for all j then ^t and ^t are trivial, ^t_j =^t=1/m ∀ j. Thus,
C_λ(x,t)=λ(10∑_j1/mln(x_j· 3t)-10∑_j1/mln(1/m· 3t))
To compute ()=(,þ), let us first find w.r.t. any fixed t. When t is fixed, solving
max v_(x,t)+3_λ(x,t)
x ∈Δ^m
is just as solving the original problem, only for a modified preferences mean β_j=_j+λ/m/1+λ/m∀ j ∈ [m], and with logarithmic functions we know that _j=β_j ∀ j, independently of t. Now we need to solve
max v_(,t)+3_λ(,t)
t ∈
but, note that (,t) is a constant function of t, thus not affecting þ. To conclude, the introduction of _λ shifts the allocation from x^*_j=_j ∀ j to _j=_j+λ/m/1+λ/m∀ j while not affecting the tax decision t^*=þ=( 2· 10/3_f)^2.
As mentioned above, to maintain SDSIC we also have to see that (α) defines α uniquely. That requires further assumption on the smoothness of _λ.
Assume that _λ(x,t) is differentiable in t. Then for any two distinct preferences vectors α≠β∈Δ^m×, (α) ≠(β).
Fix any α∈, and let
(α)=(x^*,t^*) ∈_(x,t) ∈ v_α(x,t)+_λ(x,t).
Then in particular, x^* solves
max_x ∈Δ^m v_α(x,t^*)+_λ(x,t^*).
Since
v_α(x,t^*) +_λ(x,t^*)=
∑_jα_jθ_j(x_jB_t^*)-α_ff(t^*)
+λ∑_j^t^*_jθ_j(x_jB_t^*)
-λ∑_j^t^*_jθ_j(^t^*_jB_t^*)+ψ(t^*),
x^* also solves
max_x ∈Δ^m∑_j(α_j+λ^t^*_j)θ_j(x_jB_t^*) because once we fix t^* all the remaining terms are just constants.
By the proof of Lemma <ref>, that problem has a unique solution
for every (α_1,…,α_m) ∈Δ^m and moreover, two distinct vectors cannot share the same solution. We thus conclude that (α)=(β) α_j=β_j ∀ j ∈ [m].
Now, let α,β∈ where α_j=β_j ∀ j ∈ [m] and assume that (α)=(β)=(x^*,t^*). Then
t^* ∈_t v_α(x^*,t)+_λ(x^*,t)
and t^* ∈_t v_β(x^*,t)+_λ(x^*,t)
Since α_j=β_j ∀ j ∈ [m], we can write
v_α(x^*,t)+_λ(x^*,t)=Γ(t)-α_ff(t) ;
v_β(x^*,t)+_λ(x^*,t)=Γ(t)-β_ff(t)
for some Γ: (-b_0,∞) ↦ that is differentiable by our assumption on and the initial assumptions on θ_j, j ∈ [m].
Thus,
Γ'(t^*)-α_ff(t^*)=Γ'(t^*)-β_ff(t^*)=0 α_f=β_f
For all λ≥ 0 and for every bias function _λ(x,t) that is differentiable in t, the BUS-VCG mechanism is SDSIC in every budgeting instance that the US-VCG is.
§ HETEROGENEOUS TAX
In some situations we may prefer a heterogeneous tax distribution, especially in applications outside PB. For example, imposing higher contributions on wealthier countries in joint environmental investments.[Heterogeneous taxation is obviously appropriate as an income tax policy too, however it is less likely that private income levels are common knowledge in that scenario] We can implement a non-uniform distribution of tax revenues via assigning a parameter ω_i to each agent i, such that each pays ω_it and ∑_iω_i =n. The valuation function v_i(x,t) is then reformulated to
v_i(x,t) = ∑_j=1^m α_i,jθ_j(x_j · (B_0+nt))-α_i,ff(ω_it)
We show here how the US-VCG mechanism can still be implemented and with similar IC guarantees. (In particular, note that if f is a power function then f(ω_it)=f(ω_i)f(t) and thus we can absorb ω_i into α_i,f, effectively changing nothing in the model and thus all results will follow through). As for preferences elicitation, the introduction of ω_i imposes no limitations on Corollary <ref>. We only need to alter the individual equations from which we derive each agent's type accordingly.
In constructing the US-VCG mechanism, we shall define the payments assignment accordingly as
P_i=-t^* +f^-1(f(ω_it^*)+1/α_i,fp^VCG_i)
and then Lemma <ref> proceeds through, which is sufficient for DSIC. As for SDSIC, the social welfare is now expressed as
∑_j=1^m _jθ_j(x_j · B_t )-∑_iα_i,ff(ω_it)
Meaning that mean dependency (Observation <ref> is lost. Nevertheless, Lemma <ref> is built on the fact that a misreport of any agent necessarily shifts the outcome g() to a sub-optimal point, thus bringing to a loss in her overall utility. Here we still have that, if the social optimum is characterized by MRS conditions, then
n_jθ'_j(x^*_jB_t^*)=∑_iα_i,ff'(ω_it^*)·ω_i ∀ j
and thus if agent i falsely report some α'_i, then social optimum inevitably changes, and in particular to a sub-optimal point w.r.t the true social welfare. To see that, assume that w.l.o.g. i reports α'_i,f>α_i,f. Then new (manipulated) type profile can still admit the above equations only if _j increases for all j, which is impossible.
|
http://arxiv.org/abs/2303.07018v1
|
20230313112936
|
Readout of quantum devices with a sideband microwave interferometer immune to systematic noise
|
[
"N. Crescini",
"E. G. Kelly",
"G. Salis",
"A. Fuhrer"
] |
quant-ph
|
[
"quant-ph"
] |
[Present address: ]Univ.Grenoble Alpes, CNRS, Grenoble INP, Institut Néel, 38000 Grenoble, France
IBM Research Europe, Säumerstrasse 4, 8803 Rüschlikon, Switzerland
IBM Research Europe, Säumerstrasse 4, 8803 Rüschlikon, Switzerland
[email protected]
IBM Research Europe, Säumerstrasse 4, 8803 Rüschlikon, Switzerland
IBM Research Europe, Säumerstrasse 4, 8803 Rüschlikon, Switzerland
The accuracy of microwave measurements is not only critical for applications in telecommunication and radar, but also for future quantum computers. Qubit technologies such as superconducting qubits or spin qubits require detecting minuscule signals, typically achieved by reflecting a microwave tone off a resonator that is coupled to the qubit. Noise from cabling and amplification, e.g. from temperature variations, can be detrimental to readout fidelity.
We present an approach to detect phase and amplitude changes of a device under test based on the differential measurement of microwave tones generated by two first-order sidebands of a carrier signal. The two microwave tones are sent through the same cable to the measured device that exhibits a narrow-band response for one sideband and leaves the other unaffected. The reflected sidebands are interfered by down-conversion with the carrier. By choosing amplitude and phases of the sidebands, suppression of either common amplitude or common phase noise can be achieved, allowing for fast, stable measurements of frequency shifts and quality factors of resonators.
Test measurements were performed on NbN superconducting resonators at 25 mK to calibrate and characterise the experimental setup, and to study time-dependent fluctuations of their resonance frequency.
Readout of quantum devices with a sideband microwave interferometer immune to systematic noise
A. Fuhrer
March 30, 2023
==============================================================================================
§ INTRODUCTION
Interferometric measurements are among the most sensitive and well studied in experimental physics. Their application ranges from fundamental physics and metrology to quantum information <cit.>, and they are of transversal interest for many other fields of research <cit.>. In an optical interferometer, the probe and reference laser beams follow distinct paths and their interference is indicative of relative variations between the two paths, see Fig. <ref>(a). Microwave interferometers can also be realized in this way <cit.> and were used to measure frequency variations of devices such as resonators <cit.>. For qubit readout in solid state quantum processors <cit.> or to measure frequency variations and noise in resonators used for kinetic inductance detectors <cit.>, standard single side band (SSB) detection is employed to convert a variation of the microwave signal to baseband. In that scheme, a modulation signal is up- and down-converted in frequency allowing for sensitive measurements at high frequency with relatively inexpensive baseband instrumentation.
One of the advantages of interferometric measurements is their insensitivity to common mode noise or long-term drifts common to both interfering paths. Measurements where the two paths are likely to experience differential noise – e.g. when a microwave signal senses a sample in a cryostat and is then referenced to a carrier signal routed outside the cryostat – cannot benefit from this suppression, and the signal will be affected by variations in temperature, losses of microwave components or amplification noise specific to one path.
Here, we demonstrate how the two paths of an interferometer in the microwave domain can be substituted by two different frequencies, thus using a bichromatic signal along the same physical path (e. g. the same cable going into and out of a cryostat). In this case a relative phase or amplitude shift between the two microwave tones produces the desired signal, whereas noise in amplitude or phase common to the two tones can be suppressed.
The basic idea to separate the two interfering signals in the frequency domain is shown in Fig. <ref>(b). Our approach is based on sideband modulation of a carrier signal, and is thus referred to as a sideband microwave interferometer (SMI).
We describe the implementation and characterisation of the SMI, provide a theoretical model and experimentally verify the suppression of common-mode phase noise and amplitude noise at two different operation points of the interferometer. The setup is then used to probe the response of a coplanar waveguide resonator at millikelvin temperatures,
allowing rapid microwave measurements of fluctuations of the resonator's frequency and quality factor induced by two-level-systems (TLSs).
The experiment is implemented with a signal generator, a splitter, two mixers, and a lock-in amplifier.
The bandwidth is limited by the shortest lock-in integration time, and in the present case can extend up to tens of MHz, allowing for the measurement of fast variations although at the expense of the detection sensitivity.
In the following Section we provide a detailed explanation of the measurement scheme and its experimental implementation. Section <ref> shows the operation of the SMI, and characterization of its noise suppression properties. In Section <ref> we conclude and provide perspectives on improvements with which we plan to advance our scheme.
§ MEASUREMENT SCHEME
The general idea [see Fig. <ref>(b)] is to modulate a microwave carrier signal to generate two sidebands. These are reflected off or transmitted through a device under test, and then demodulated to make them interfere. In contrast to conventional SSB detection <cit.>, the interference allows for the detection of relative phase or amplitude changes between the two sidebands, which can be exploited to get a first-order suppression of the common-mode noise introduced e. g. in the cable by thermal expansion or vibrations. For instance, one sideband can be tuned to the frequency of a resonator and be used as a probe, while the other one may lie several linewidths away, acting as a reference.
The parameters of the SMI can be tuned to obtain an output signal that is proportional to a constructive or destructive interference of the two reflected or transmitted sidebands, thus reducing either common-mode phase or amplitude noise.
The definitions of the various frequencies used in this work are reported in Table <ref> in Appendix <ref>, and are hereafter used to detail the theoretical description of this method.
Fig. <ref> shows the setup used in this work. The carrier signal proportional to e^iω_0 t is modulated in an IQ mixer with I and Q signals a_1e^iω_s t + iα_1 and a_2e^iω_s t + iα_2 generated by a lock-in amplifier. This creates two first-order sidebands at frequencies ω_1,2=ω_0±ω_s. The amplitudes and phases of the two sidebands can be selected by setting the modulation parameters a_1, a_2, α_1 and α_2.
More specifically, the sidebands are proportional to a_1 e^iω_1t + iα_1-a_2 e^iω_1t + iα_2 and a_1 e^iω_2t - iα_1+a_2e^iω_2t - iα_2.
In our case the signal is then attenuated in multiple steps (by a total of 90 dB) and sent to a coplanar waveguide resonator in a dilution refridgerator. The reflected signal is amplified by a low-noise cryogenic amplifier (LNA) at 4 K. A second amplification stage at room temperature further increases the signal strength resulting in a combined amplification of 70 dB. The output signal is then down-converted by mixing it with the carrier signal e^i ω_0 t + iδ at a second mixer (accounting for a phase difference δ of the carrier signal between the two mixers). The output of the latter is finally measured using the lock-in amplifier yielding in-phase and quadrature components x and y.
For simplicity we assume that the device under test only affects the signal at frequency ω_1, in this sense the two sidebands can be referred to as probe (ω_1) and reference (ω_2). We assume that the device under test shifts the phase of the probe sideband by ϕ and reduces its amplitude by a factor ξ. Neglecting the terms that oscillate with 2ω_0, the output signal of the SMI that is measured by the lock-in amplifier is
s_out(t) = a_1 e^iω_s t+iα_1+iδ + ξ a_1 e^iω_s t + iα_1 + iϕ - iδ
+ a_2 e^iω_s t + iα_2 + iδ - ξ a_2 e^iω_s t + iα_2 + iϕ - iδ.
The in-phase and quadrature components of the terms oscillating at ω_s in Eq. (<ref>) are visualized in Fig. <ref>(a). The total signal can be understood as two interfering terms, b_1 e^iβ_1=a_1 e^iα_1+iδ+a_2 e^iα_2 + iδ and b_2 e^iβ_2=ξ e^i ϕ(a_1 e^iα_1 - iδ-a_2 e^iα_2 - iδ). The amplitudes b_1 and b_2 are given by
b_1^2=a_1^2+a_2^2+2a_1a_2cos(α_1-α_2)
and
b_2^2=ξ^2(a_1^2+a_2^2-2a_1a_2cos(α_1-α_2)).
By tuning the parameters of the modulation signals (a_1, α_1, a_2, α_2 and δ) we can achieve identical amplitudes for the two interfering terms, b_1 = b_2, and an arbitrary phase β_1 - β_2 between them. The parameters for same amplitudes are found by equating Eq. <ref> with Eq. <ref>, yielding the condition cos(α_1-α_2)= (ξ^2-1)(a_1^2+a_2^2)/((1+ξ^2)(2a_1a_2)). The phase β_1 - β_2 can be tuned by adapting a_1, a_2 and either α_1 - α_2 or δ.
There are two phases of specific interest, geometrically illustrated in Fig. <ref>(b): for β_1 - β_2=0, we achieve constructive interference, and common mode phase noise at the two sideband frequencies is suppressed. For β_1 - β_2=π, we achieve destructive interference, where common noise in the amplitude of the two sidebands is canceled. For both, destructive and constructive interference, the signal demodulated by the lock-in amplifier senses ξ and ϕ, in a similar way as in conventional SSB detection schemes, but here with the added advantage of suppressed common-mode noise.
§ TEST AND CALIBRATION OF THE SIDEBAND INTERFEROMETER
§.§ Phase and amplitude noise rejection
To verify the predicted common-mode amplitude-noise and phase-noise rejection, we use the interferometric scheme reported in Fig. <ref> but replace the resonator with a variable attenuator and a variable phase shifter. We determine the optimal rejection points for both noise sources by applying either a controlled attenuation or a controlled phase shift to the up-converted signal. In Fig. <ref>, we compare the magnitude of noise sensitivity Δ S = √(Δ x^2 + Δ y^2) as a function of varying a_2 and α_2 (at fixed a_1 of 10 mV and α_1 of 330 degrees). Δ x and Δ y correspond to the changes of the I and Q components x and y of the demodulated signal when varying the common-mode amplitude by one percent or the common-mode phase by 0.01 rad. The detailed experimental setup is presented in Appendix <ref>.
Common amplitude noise is suppressed at x=y=0.0 mV [see Fig. <ref>(a)] as predicted in Sec. <ref> and because of destructive interference of the two sidebands. We reach this point at a_2 = 43.7 mV and α_2=246.4. The linecut of Δ S versus x at y=0.0 mV in Fig. <ref>(c) shows that Δ S linearly decreases towards the rejection point. Similiarly, the common-mode phase noise [see Fig. <ref>(b)] is linearly suppressed towards its rejection point at x=1.7 mV and y=0.0 mV, see Fig. <ref>(d). This point corresponds to a_2 = 23.2 mV and α_2 = 57.2. The values in Figs. <ref>(c) and (d) can be compared to the noise sensitivity at the SSB configuration [a_2=11 mV and α_2=61, crosses in Fig. <ref>(a) and (b)], where Δ S is 7.6 μ V for both one percent of amplitude noise or 0.01 rad of common-mode phase change. These results quantitatively demonstrate that the SMI can to first order suppress either form of common-mode noise by adjusting amplitude and phase of the two lock-in outputs. We expect that the ultimate limit of such suppression is given by the stability of phases and amplitudes of the lock-in outputs and by that of the carrier signals used for the up- and down-conversion.
§.§ Resonator measurements
To test the interferometer, we use a high kinetic inductance coplanar waveguide resonator in a hanger geometry, fabricated from a thin film of sputtered NbN with a nominal thickness of 10 nm on an intrinsic silicon substrate.
The resonator has a length of 2 mm. Its resonance frequency is f_r=6.16 GHz, the loaded and coupling quality factors are Q_l ≃ 8.0 × 10^3 and Q_c≃9.8 × 10^3, and the resonator has an impedance Z_r ≃ 316 Ω. Since the low-power internal quality factor is of order Q_i≃5×10^4, the resonator is overcoupled. Measurements are performed at 25 mK, the base temperature of a dilution refrigerator. The reader is referred to the appendices for more details, which show the measured probe signal (microwave output) of the SMI and the phase and amplitude response of the resonator under study.
If the frequency of the probe sideband is set to the resonator's center frequency ω_r/2π, a small variation of ω_r by δ_r≪γ_r mostly affects the phase ϕ of the reflected sideband. Here, γ_r is the resonator linewidth. With the SMI probing at a fixed frequency, only frequency shifts δ_r < γ_r can be resolved. For larger δ_r≫γ_r, the signal exceeds the measurement bandwidth (MBW) and changes in ϕ or ξ become very small.
To determine absolute frequency shifts of the resonator, it is necessary to relate the SMI signal to the resonance lineshape. The latter is obtained from SSB spectroscopy by sweeping the frequency of the carrier ω_0 in an interval ≃γ_r, with ω_1 close to the resonator frequency, and independently with a vector network analyzer (VNA). In Fig. <ref> this is shown together with the signal where the SMI is tuned to the amplitude-noise suppression point at ω_1=ω_r (orange curve). Note that the electrical phase delay (i.e. a background phase component linearly varying with frequency) leads to a circular (elliptical) background signal in the SSB (SMI) configuration, respectively.
If probed on resonance, small shifts of the resonator frequency affect mostly the phase ϕ of the reflected probe sideband, whereas variations in the quality factor change the reflected amplitude ξ, changing the SMI signal in the orthogonal direction in the IQ (x, y) plane of the demodulated signal. In Fig. <ref> we indicate the calculated SMI signal for a resonator with reduced internal quality factor (red square) and with a shifted resonance frequency (green diamond).
§.§ Study of resonator noise
Noise in microwave resonators usually originates from the presence of TLSs in amorphous materials or interfaces of these devices <cit.>. Due to the relevance for improving coherence of quantum devices, this is the object of an intense research activity <cit.>.
Techniques that track frequency fluctuations <cit.> can shed light on the properties of TLSs <cit.>, and have brought on new possibilities for studying their distribution, origin and stability <cit.>.
In this context the SMI, that allows suppression of common mode noise, can be a powerful tool to gain further insights into the underlying TLS physics.
With the SMI tuned to the amplitude noise rejection point, we have measured resonator frequency noise fluctuations for more than 11 hours at a time and an example trace is reported in Fig. <ref>(a). Frequency fluctuations of the resonator were obtained from the SMI signal using a calibration as discussed in Section <ref> and using a linear interpolation between SMI phase and resonator frequency. The detected noise increases by more than a factor of 100 with respect to the signal measured off resonance, and is thus dominated by the resonator's fluctuations. The average photon occupation number was calculated using <cit.>
⟨ n ⟩ = E_r/ħω_r = 2/ħω_r^2Q_l^2/Q_c50 Ω/Z_rP_in,
where P_in is the input power of the on-resonance sideband. In this measurement the resonator is studied with ⟨ n ⟩≃ 8.
The sampling frequency is set to 100 Hz and the lock-in integration time is 10 ms.
The time trace of the resonator frequency shown in Fig. <ref>(a) displays clear random telegraph signals (see inset) typically associated with TLSs noise.
The histogram (b), spectral density (c) and Allen deviation (d) put a slightly different spotlight on the TLSs properties. The histogram (b) of the time trace in (a) can be fit with three shifted Gaussians. This seems to indicate that a few slow TLSs dominate the disturbance of the resonator and lead to three large characteristic frequency shifts. In an ensemble of TLSs, a few near resonant fluctuators can be more strongly coupled to the resonator <cit.> giving rise to such discrete offsets.
The noise spectrum √(S_p) in (c) is obtained through a Fourier transform of the time trace after subtracting offsets and by application of a moving average in the frequency domain. Here, we expect to see an ensemble of TLSs show up as the typical S_p = a_p/f dependence (dashed line). There are two obvious deviations from this behavior in the data. Above 10 Hz we see that the noise is suppressed due to the measurement bandwidth limited by the lock-in integration time (brown shading). At around 20 mHz we find more noise than expected from the 1/f background. We argue that this is due to a characteristic timescale of the dominant TLSs that contribute to an additional broad peak in the spectrum <cit.>. A comparison with the 400 s inset in (a) shows that the switching frequency of the dominant TLS is compatible with this value. Another, complementary way of visualizing this, is the Allan deviation σ_f(τ) shown in Fig. <ref>(d). The Allan deviation for a a_p/f power spectrum should be constant at a level of σ_f(τ) = √(2ln2 a_p) (dashed line). We again find a peak centered around τ =1/(2π 20 mHz) ≈ 8 s and a reduction of the noise at small τ.
We also studied the dependence of these noise spectra and Allan deviations down to photon numbers ⟨ n ⟩ < 0.1 where white noise dominates the spectrum for frequencies >0.2 Hz and the low frequency fluctuation amplitude of the resonator increases to a_p = 4.0·10^6 Hz^2 (see Appendix <ref>). These findings are in agreement with previously reported results, e. g. <cit.>.
This shows that the application of the SMI to the study of TLS noise is promising. The fact that variations in frequency and Q value of the resonator lead to orthogonal signals in the SMI readout (see Fig. <ref>) can be used to simultaneously track both frequency and quality factor shifts of a quantum device <cit.>. This allows the study of noise correlations in these two values, something that we will explore in a forthcoming work.
§ CONCLUSIONS AND PERSPECTIVES
We describe and operate a microwave interferometer based on the modulation of a carrier resulting in two sidebands, which are used as probe and reference signals.
This setup measures relative phase or amplitude shifts between the probe and reference, therefore selectively eliminating common mode noise and enabling long-term stability in quantum device characterization.
We test our scheme by adding controlled common phase and amplitude variations which demonstrate the scheme's resilience to systematic noise. We use the SMI for the readout of a superconducting resonator at millikelvin temperatures, and measure its frequency noise induced by nearby TLS fluctuators.
The ultimate sensitivity that can be reached with this setup is not thoroughly addressed in this work, but will be the subject of future analysis. A critically coupled resonator could be read out at lower power with the same signal-to-noise ratio. Exploiting this, one could test a resonator's noise with a much lower photon number ⟨ n ⟩ or increase the MBW to study higher frequency noise.
In the case of frequency shifts that exceed the linewidth of the resonator, a feedback loop with a PID controller could be implemented via software in the lock-in amplifier, in order to track the resonance frequency and extend the MBW of the present experiment. This addition does not necessarily reduce signal bandwidth, as the PID could be integrated digitally in the lock-in.
In the present work the potential of the SMI is demonstrated in a study of TLS noise affecting a coplanar-waveguide resonator, but we stress that its application is far more general. For instance, the properties of the SMI can be leveraged for the readout of qubits at lower power and reduced sensitivity to systematic sources of noise such as slow drifts induced by temperature fluctuations. Instead of using the two sidebands as probe and reference, the principle of sideband interference can be extended by using both sidebands as a probe e.g. of two different resonators each coupled to a qubit. This could enable parity readout of the two qubits with reduced common-mode noise.
§ ACKNOWLEDGEMENTS
The authors would like to thank the Cleanroom Operations Team of the Binnig and Rohrer Nanotechnology Center (BRNC) for their help and support. We are also grateful to Stephan Paredes and Peter Müller for the experimental help, and to Clemens Müller, Giuseppe Ruoso and Leonardo Massai for fruitful discussions.
We gratefully acknowledge funding from Swiss National Science Foundation under grant number 200021_188752 and by the NCCR SPIN, funded by the SNSF under grant number 51NF40-180604.
§ ADDITIONAL EXPERIMENTAL DETAILS
In the main text there are several frequency quantities and abbreviations which are important to tell apart. Table <ref> sums them up and lists their name, symbol, a short description and their value. The first group of rows are frequencies and frequency shifts of the interferometer signals and of the resonator, while the second, separated by a line, describes the bandwidths of the readout system.
The spectrum of the microwave signal that is used to probe the resonator is shown in Fig. <ref>(a), which is also helpful to frame the quantities described in the text and in Table <ref>. Fig. <ref>(b) shows the resonator response measured with a VNA.
The left sideband is on-resonance with ω_r, and thus interacts with the resonator, while the right sideband remains unaffected. The signal at the carrier frequency ω_0 is suppressed by roughly five orders of magnitude.
This is obtained with a carrier power ≃ 15 dBm and frequency ω_0/2π≃ 6.16 GHz, while the modulation amplitudes a_1, a_2 are of order 50 mV and frequencies are ω_s/2π≃ 10 MHz. The IQ mixer is balanced with DC offsets in order to minimise the amplitude of the carrier at the microwave output by more than four orders of magnitude.
This signal is gradually attenuated by -91 dB and sent to the resonator.
§ EXPERIMENTAL SETUP FOR DEMONSTRATION OF PHASE AND AMPLITUDE NOISE REJECTION
The experimental setup for the demonstration of phase and amplitude noise rejection found in Sec. <ref> is displayed in Fig. <ref>. A voltage-controlled variable attenuator and a variable phase shifter were placed in series after the microwave output of the IQ mixer. A DC block was used to prevent any DC leakage from the IQ mixer that would affect the value of either attenuation or phase arising from these components. An isolator was placed after each component to prevent the formation of standing waves.
For the common-mode phase noise measurements, attenuation arising from the phase shifter was calibrated using a single sideband configuration. A small voltage-dependent attenuation of the phase shifter was compensated with the variable attenuator. A common-mode amplitude variation was achieved by varying both amplitudes a_1 and a_2 of the signals coming from the lock-in amplifier.
The different working points in the IQ plane as displayed in Fig. <ref> were obtained for different amplitudes a_2 ranging from 0 mV to 80 mV and phases α_2 from 0 to 360 of the Q-input of the IQ mixer for fixed amplitude a_1 = 10 mV and fixed phase α_1.
§ POWER DEPENDENCE OF RESONATOR NOISE
We studied the frequency noise of the resonator for different probing powers and otherwise same parameters as in the main text. The resulting noise spectral densities (SD) and Allan deviations are shown in Fig. <ref>.
The measurements reported in the main text are (a) and (d), both showing excellent agreement with the expected 1/f behavior up to a timescale of several hours. The reduced probing power, used in (b), (e), (c) and (f), decreases the signal-to-noise ratio of the interferometer, therefore measurement noise (white noise) starts to dominate over the one from the resonator.
For both measurements at weaker probing power the Allan deviation shows a slope closer to -0.5 (green dashed line) at small τ values which is expected for white noise.
§ GUIDE OF OPERATION
Here, we detail a practical guide to setup an interferometric readout like the one described in this work. In this context, Fig. <ref> is taken as a reference.
* Take a microwave source and tune its frequency (carrier) ω_0 close to the one of the DUT.
* The carrier is then split, and the two outputs are connected to the LO ports of an IQ mixer and a down-conversion mixer. In the former, the in-phase and quadrature inputs are wired to two low-frequency oscillators which create sidebands and have the same frequency ω_1=ω_2 (but tunable phase α_1 and α_2 and amplitude a_1 and a_2).
In our setup these are the reference outputs of the lock-in amplifier and can therefore also be used for phase-sensitive detection of the down converted output signal of the SMI. The amplitude of the probe signal can be varied by changing a_1 and a_2, or by attenuating the entire input signal.
* At this point, using similar initial values of the two amplitudes and phases, it is convenient to connect the resulting signal to a spectrum analyser and check the sidebands. The DC offsets of the low-frequency oscillators can eliminate the residual carrier at ω_0 by balancing the mixing, and yield a spectrum like the one of Fig. <ref>(a).
This is the input signal that is sent to the DUT, so one should take care that only one sideband is on-resonance with the spectral features of the DUT. The output signal of the SMI is down-converted in the second mixer, and its phase and amplitude detected with the lock-in amplifier.
* With this the setup is fully wired, and measurements can commence.
The first thing to test is that one sideband is actually on resonance with the DUT, which can be done for example by sweeping ω_0 and resolving the spectral features of the DUT on the lock-in output. This spectroscopic measurement can also be fit to the resonator lineshape (measured e. g. with a VNA) to calibrate the system. Once the resonance of the DUT is found, the amplitude-noise rejection configuration is simply obtained by tweaking a_2 and α_2 to get a zero in the amplitude √(x^2+y^2) of the output signal, as is shown in Fig. <ref>(a).
Before starting measurements, the input signal is checked again and the mixer re-balanced such as to account for intermittent adjustments of the oscillator's parameters.
The interferometer is ready to measure in the amplitude-noise rejection configuration. The simplest way to switch to phase-noise rejection requires a phase-shifter between the splitter and the LO (carrier or local oscillator) input of the down-conversion mixer. The interferometer can be configured to the amplitude-noise rejection following the previous procedure, and by applying a phase shift of π one ends up in the phase-noise rejection configuration.
apsrev4-2
|
http://arxiv.org/abs/2303.12514v1
|
20230313171753
|
Algebraic Properties of Euclidean Geometry with Transcendental Curves
|
[
"Nicole Venner"
] |
math.GM
|
[
"math.GM",
"01A20, 11R32"
] |
Disc population synthesis: decrease of the solid mass reservoir through pebble drift
J. Appelgren
1
,
M. Lambrechts2,1
N. van der Marel3
Received ; accepted
==========================================================================================================
While geometry with transcendental curves, like the Quadratrix of Hippias and the Spiral of Archimedes, played a significant role in our modern developments of geometry and algebra. The investigation has fallen off in the modern era despite advancements in algebraic tooling. This paper [Discussion of original results begins with Definition def:beginningofresults] gives a description of the fields using modern techniques such as Galois theory while solving an open conjecture in a 1988 paper <cit.> to provide an answer to if these curves can solve the problem of doubling the cube.
Recently extensions of classical euclidean geometry with paper folding have garnered significant interest in the mathematical community. Although these approaches do dramatically expand the domain of solvable problems, several important problems remain unconstructive in this approach. This paper takes an alternative approach, looking to the first historical attempt at extending euclidean geometry, the Quadratrix of Hippias to generate a field of numbers that can hopefully solve those problems.
* Fix Sympy Citation
*
§ A QUICK REVIEW OF GEOMETRIES
Over 2000 years ago, the Ancient Greeks developed a system of mathematics in response to the discovery that some numbers such as √(2) were not constructible as proportions of integers.
A point α is constructible if and only if α can be constructed as a point using an unmarked ruler and compass. More specifically those tools allow you to:
* Draw a line through any two points.
* Draw a circle centered at one point while passing through another point.
* For any 2 curves (either a line or a circle), you can draw points wherever they intersect.
An extremely important step in the understanding of problems in euclidean geometry is the invention of thinking of points on the plane as pairs of real numbers and more recently as complex numbers a+bi. Thinking of individual points as numbers allow you to prove some very interesting theorems:
Given any 2 constructible points a, b∈𝒞 represented as complex numbers. Then the points with complex representations of a+b, a-b, ab and a/b are constructible.
For any constructible numbers a,b ∈ C that 0=a-a,and 1=a/a and a+b=a-((a-a)-b) and a· b = a/b/b÷ b. You can subtract and divide complex numbers using ruler and compass constructions as shown in Figure <ref> and fig:complexsub:
For any numbers a exist geometric constructions for: a̅,Re(a),Im(a),|a| and √(a)
Constructing the |a| is relatively easy since the construction involves just constructing a circle with a as a point on the radius and finding the intersection with the real line. From there you can find a̅ since a̅=|a|^2/a. This also lets you say construct Re(a)=a+a̅/2 and Im(a)=a-Re(a). The construction involving square roots in the complex plane follows from the general square root construction from Euclid combined with an angle bisector.
As the Ancient Greeks were first developing geometry three classical problems remained unsolved.
* Construct a square with the same area as a circle.
* Construct a cube with double the volume of another cube.
* Trisect an angle. (In general arbitrary angle partitions)
* Construct a regular-sided heptagon (In general an any-sided regular polygon)
Under the classical rules of euclidean geometry, all three of these problems are impossible and we shall spend the next few sections giving a brief overview of why. The key insight comes from the fact that a solution to each one of these problems must involve constructing certain numbers, namely √(π), √(2) and sin(20^∘). (Importantly sin(20) happens to be the root of 8x^3 - 6x + √(3) = 0)
So what numbers can be constructed with Ancient Greek geometry? Since you are dealing with the geometry of a two-dimensional plane it makes sense to involve numbers that carry the same structure, namely complex numbers. From here you can define
It turns out that these are all the numbers you can construct with classical euclidean geometry, via the following theorem:
Any Intersections that can be created with classic euclidean geometry (line intersected with line, circle and line, or circle and circle), can be represented using roots of quadratic polynomials
Since in the cartesian plane, all circles can be written as (x-c)^2+(y-d)^2=r^2 and lines as y=ax+b. Then you can algebraically represent the x and y coordinates of intersections as solutions to polynomials, the calculations for a line intersecting a line and a circle intersecting a circle are relatively straightforward, so all that is left is to work out the algebra in the case of a circle intersecting with another circle.
√(r^2-(x-a)^2)+c =√(p^2-(x-b)^2)+d
√(r^2-(x-a)^2) =√(p^2-(x-b)^2)+(d-c)
r^2-(x-a)^2 =(√(p^2-(x-b)^2)+(d-c))^2
r^2-(x-a)^2 =p^2-(x-b)^2+2(d-c)√(p^2-(x-b)^2)+(d-c)^2
(r^2-p^2)+(x-b)^2-(x-a)^2-(d-c)^2/2(d-c) =√(p^2-(x-b)^2)
(2b-2a)x+(b^2+r^2-p^2-a^2-d^2+2dc-c^2)/2(d-c) =√(p^2-(x-b)^2)
((2b-2a)x+(b^2+r^2-p^2-a^2-d^2+2dc-c^2))^2/4(d-c)^2 =p^2-(x-b)^2
Expanding out yields:
2x^2(b-a)^2+4x(b-a)(b^2+r^2-p^2-a^2-d^2+2dc-c^2)+(b^2+r^2-p^2-a^2-d^2+2dc-c^2)^2/4(d-c)^2=(p^2-(x-b)^2)
2x^2(b-a)^2+4x(b-a)(b^2+r^2-p^2-a^2-d^2+2dc-c^2)+(b^2+r^2-p^2-a^2-d^2+2dc-c^2)^2=4(d-c)^2(-x^2+2xb-b^2+p^2)
2x^2((b-a)^2+2(d-c)^2)+4x((b-a)(b^2+r^2-p^2-a^2-d^2+2dc-c^2)-2b(d-c)^2)+(b^2+r^2-p^2-a^2-d^2+2dc-c^2)^2+4(d-c)^2(b^2-p^2)=0
Since the x is solvable, we can obtain the y value by substituting x into either ax+b=y or (x-a)^2+(y-b)^2=r^2 yielding a quadratic as well.
Since any quadratic can be solved using the quadratic formula, we can construct every constructible number, using the operations we have defined so far (+,-,×, ÷, √()) suffice to construct any constructible number. Having reduced the problem to algebra we can show it just isn't enough to solve those classic geometry problems.
§.§ The Foldable Numbers
Knowing that it is only possible to construct solutions of quadratics, it seems natural to ask if other possible sets of constructions could create more numbers. A recent modern example is the trigonometric numbers:
A number α is in 𝒪 if the point representing the complex number α is constructible using simple reduced[Every other kind of simple paper fold can be completed using repeated applications of operation 3] origami folds
* Given two points P1 and P2, we can fold a crease line connecting them.
* Given two lines, we can locate their point of intersection, if it exists.
* Given two points P1 and P2 and two lines L1 and L2, we can, whenever possible, make a fold that places P1 onto L1 and also places P2 onto L2.
This may seem like an oversimplification of origami, but helpfully a proof from hull_origametry_2020 (originally proved by Lang in 2003) shows us that
If we only allow one fold at a time and assume all our creases are straight lines. Then any folding operation can be described by our three origami operations
Using these techniques it becomes possible to create solutions to cubic equations, consider the following construction for the cube root of 2 in Figure fig:cuberoot2
This is done by moving the x and y axes to intersect at (1,2) and then using our third rule to map (-1,0) and (0,-2), to the new axes. From there it is possible to use conventional geometry and an argument from similar triangles to argue that the side length of the square is the cube root of 2.
This exact argument can be easily generalized to solving any cubic as first proved by Lil.
The roots of any cubic can be expressed using simple paper folds.
The author's first exposure to this was in a video produced by polster_why_2019. Furthermore using a similar argument from algebra it turns out to completely describe the numbers you can make with simple folds in origami. [There do exist extensions of origami involving multi-folds that create multiple creases at once. While these drastically expand the numbers that can be produced. The author believes there are significant issues in using them for real-life demonstrations or educational purposes. Not only since the constructions require a large amount of technical skill to execute, but inaccuracies in the construction are known to propagate and grow, making developing intuition quite difficult.]
The intersections created by any origami fold can be described by a cubic polynomial.
Proof for this can be found in hull_origametry_2020
§.§ Galois Theory and Unconstructible Numbers
From here since we have 2 notions of geometry that can be modeled as algebraically solving polynomial equations, it remains if it is possible to construct different numbers like √(2) or transcendental numbers like π or e.
The original idea that these problems are impossible to construct in either comes from a branch of mathematics called Galois Theory, which we shall briefly stroll-through for the sake of brevity.
A polynomial is irreducible if it cannot be factored.
A Field ℱ is a set of numbers that is closed under the operations required for traditional arithmetic (addition, subtraction, multiplication, and division). A Field Extension is a process of extending a field ℱ with new numbers to form a field 𝒢, this extension is often written as G/F
A field ℱ splits over a polynomial p(x) if every root of p(x) is contained in ℱ. An extension ℱ/𝒢 is a splitting extension if for any irreducible polynomial in 𝒢 then either all or none of its roots are in ℱ.
While this is a helpful definition, it might seem hard to come up with examples where this is true.
For any irreducible polynomial p(x with coefficients ℱ, then the extension smallest field containing all roots ℱ(x_1,x_2,…)/ℱ is splitting.
this can be shown to not be the case.
Some examples and a short lemma might be helpful to understand the concept.
Our first example is going to be the smallest field containing both the rationals and √(5), written as ℚ(√(5)). It is reasonable to ask what the elements of this field look like, and it turns out it is completely describable using 2 rational numbers like so: ℚ(√(5))={a+b√(5)| a,b ∈ℚ}. These form a field since you can prove they are closed under subtraction and division like so:
(a+b√(5))-(c+d√(5)) =(a-b)+(b-d)√(5)
a+b√(5)/c+d√(5) =(ac-5bd/c^2-5d^2)+(bc-ad/c^2-5d^2)√(5)
We can also see that this field is the splitting field for the polynomial x^2-5 since both of its roots of √(5) and -√(5) are contained in it.
If a field ℱ is composed of a tower of fields ℚ⊂ℱ_1⊂ℱ_2⊂ℱ_3 ⊂…, where each extension is splitting. Then ℱ/ℚ is splitting.
As proved in <cit.>.
A field automorphism is an invertible function on a field such that.
f(a-b)=f(a)-f(b) f(a/b)=f(a)/f(b)
Based on those properties we can conclude that f(a)· f(b)=f(ab) and f(a)+f(b)=f(a+b). And for any rational q then f(q)=q.
Through the power of field automorphisms, we can prove some useful results:
If f is a field automorphism defined on a splitting field ℱ defined by a polynomial with rational coefficients p(x), for any root z, then f(z) is also a root.
If z is a root of p(x), then we know by definition that
0=a_n z^n+a_n-1x^n-1 + … + a_1 x^n +a_0
We can now apply f to both sides of this equation, and since by the properties of a field automorphism we know that you can distribute across integer powers f(a^n)=f(a)^n (proven by using induction with multiplication) we can finish the proof.
f(0) =f (a_n z^n+a_n-1z^n-1 + … + a_1 z +a_0)
0 =f(a_n z^n)+f(a_n-1z^n-1) + … + f(a_1 z) +f(a_0)
0 =a_n f(z^n)+a_n-1f(z^n-1) + … + a_1 f(z) +a_0
0 =a_n f(z)^n+a_n-1f(z)^n-1 + … + a_1 f(z) +a_0
Thus f(z) is a root of p(x). (This applies generally to polynomials with irrational coefficients if the automorphism f keeps the coefficients fixed in place.)
If ℱ is a splitting field of a polynomial p(x) with rational coefficients, for any root z of p(x), then both the conjugate z̅ as well as the real, imaginary parts (z) and i ·(z) are in ℱ,
Consider that the field automorphism f(a+bi)=a-bi. We can prove that this is a field automorphism with some basic algebra
f(a+bi)-f(c+di)=a-bi-c+di=(a-c)-(b-d)i=f(a-c+(b-d)i)
Furthermore
f(a+bi)/f(c+di) =a-bi/c-di
=(a-bi)(c+di)/c^2+d^2
=ac+bd/c^2+d^2+i ad-bc/c^2+d^2
=f(ac+bd/c^2+d^2+i bc-ad/c^2+d^2)
=f(a+bi/c+di)
any root z=a+bi of a polynomial with rational coefficients, then consider the
Now
Every field and field extension can be put into correspondence with a group, often written as Gal(ℱ) or Gal(ℱ/𝒢). Defined to be the group formed by all field automorphisms on your field. (The Galois Group of a field extension ℱ/𝒢 are the field automorphisms of 𝒢 that keep the values of ℱ unchanged.)
A true understanding of galois theory is going to require a fair bit of understanding of the properties of groups. But even then an example might be helpful:
Let ℱ be the smallest field where x^3-2 splits over the rationals. Since ℱ is the smallest field that contains all the roots of x^3-2 we can say ℱ=ℚ(√(2),ω√(2),ω^2√(2)), where ω^3=1. It also does have a representation using rational numbers like so:
ℱ={a+b· 2^1/3+c· 2^2/3+d·ω+e·ω 2^1/3+f·ω 2^2/3 | a,b,c,d,e,f ∈ℚ}
Since ℱ is a splitting extension over the rationals it is relatively easy to calculate its Galois group. Since the rationals (or your preferred base field) must remain fixed by any field automorphism, by the properties of the automorphism for any root z, then f(z) must also be a root. Likewise, since every element of your field can be written as an element of the base field p_n, times a product of roots to some polynomial α, applying the permutation yields:
f(∑_i=1^k a_i ·α_1^n_1_i·α_2^n_2_i·α_3^n_3_i·…)=∑_i=1^k a_i · f(α_1)^n_1_i· f(α_2)^n_2_i· f(α_3)^n_3_i·…
Thus the field automorphisms are given by any permutation of the roots of the polynomial while keeping all of their algebraic properties intact.
For our specific polynomial, the only algebraic properties the roots need to respect are:
x_0^3=x_1^3=x_2^3=x_0· x_1· x_2=2
Thus any permutation leads to a valid automorphism. Showing that the Galois group of x^3-2 is the symmetric group S_3.
The order of any (Galois) group G written as |G| is defined to be the number of elements (field automorphisms) in the group.
For any fields F⊂ G with a splitting field extension G/F. Then
|Gal(G/F)| · |Gal(F)|=|Gal(G)|
Furthermore
For any irreducible polynomial p of degree n, the splitting field F containing all the roots F(p_1,p_2,…) then the order of Gal(F(p_1,p_2,…)/F) is divisible by n and divides n!.
For interested readers, the proofs for these statements are a combination and simplification of several proofs in the Galois theory chapter of dummit_abstract_2009. Using these 2 theorems we can show that the three problems are impossible. First starting by saying that
Every constructible number c is contained in a field with a Galois group with an order of 2^n for some natural number n.
Since every constructible number is created using a finite number of ruler and compass constructions, you can interpret it as extending the base field of the rationals using a finite number of solutions to quadratic polynomials. Combining the previous 2 theorems, we get that the order of the final field containing our number c must be contained in a field with degree 2^n.
Likewise following the same argument one can see that
But notice that classic problems of doubling the cube and trisecting the angle involve extensions of irreducible cubic polynomials, x^3-2 and 8x^3 - 6x + √(3). Thus any 'nice' field containing them must be divisible by 3[If you calculate them out it turns out that the first polynomial has a Galois group of order 6 and the second has order 3.] But since every number constructible with classic euclidean geometry has a degree with no factors of 3.
We can further see that the field of foldable numbers can solve these since:
From here we have one final result
For any number o ∈𝒪_1 then the smallest field containing o is of degree 2^n · 3^k for any integers n and k
Since it is possible to describe doubling the cube and trisecting the angle as the solutions of the cubics x^3-a and 3x^3-2x+c for c<1 and any a. However, some numbers are still out of reach, arbitrary angle division and arbitrary regular polygons are still unconstructible as well as the elusive square of the circle.
§ THE QUADRATRIX OF HIPPIAS
In Ancient Greece, the first partial solution to the angle trisection problem comes from Hippias where he imagines a new curve in the plane drawn with a compass-like construction. The definition of the curve can be given as so.
Given a circle with center A and point on the radius B. The quadratrix is defined so that for any point on the circle X. Then the point on the quadratrix Z on the line AX is defined so that the arc-length of BX is equal to the distance from the line AB As seen in Figure fig:quaddef
(Construction of the number π/7)
Using the definition of the quadratrix, we can try to find the points where it intersects the imaginary axis, since the imaginary line is angled at π/2 radians from the real line, then by fig:quaddef, it must intersect at the points ±iπ/2. Since the number iπ/2 is constructible, we can multiply by the constructible number -2i/7 to construct the point π/7.
(Partition of an angle into 5 pieces)
Hippias also proved that this curve can partition an arbitrary angle, and can therefore create any regular-sided polygon. 130 years later the mathematician Dinostratus proved that it is also possible to square the circle as well. (Both techniques will be proved later by saying that the field containing quadratrix is also inside) But from here to the best of the author's knowledge no one has done a further dive into the quadratrix aside from reiterating the results from over 2 millennia ago.
§ ALGEBRAIC DEFINITION OF 𝒯_1
As we have just seen, the majority of the power of the quadratrix in classic constructions comes from its ability to convert angles into segment lengths and segment lengths into angles, thus let us consider a field generated by those 2 constructions:
The field of ”Perpendicular Trigonometric” Numbers 𝒯_1 is defined to be the smallest field satisfying
* The set of rational numbers ℚ is contained in 𝒯_1 (Lemma <ref> lets us show that every constructible number is in 𝒯_1)
* The field is closed under the operation defined in Definition <ref>
* The field is closed under the operation defined in Definition <ref>
For any arc AB it is possible to construct a segment CD with length equal to the arc-length of AB
For any segment CD it is possible to construct a arc AB with arc-length equal to the length of CD
It is quite apparent that this field is already solving ancient problems from antiquity as since it is easy to construct a segment of length π, you can easily square the circle (Also showing that 𝒞(π)⊂𝒯_1). It goes significantly deeper than that as the following theorem should show
For any real trigonometric α, then α is trigonometric if and only if e^iα is trigonometric. (Alternatively stated, for any |β|=1 is trigonometric if and only if ln(β) is trigonometric)
If a real number α is constructible then via T2 we can wrap the segment from 0 to α around the unit circle with an endpoint of cos(α)+isin(α)=e^iα. Likewise for any trigonometric point on the unit circle is expressible as cos(α) + i sin(α)=e^iαthen we can use T1 to unwind that to a segment length, thereby constructing α. (This can also be expressed by taking the natural log of any point on the unit circle in the complex plane.)
Any real number α is trigonometric if and only if sin (α), cos (α), tan (α), are trigonometric.
Its notable that if α is real and trigonometric then by theorem thm:exp, then e^iα is trigonometric and since:
sin(x) =e^ix-e^-ix/2i
cos(x) =e^ix+e^-ix/2
tan(x) =-ie^ix-e^-ix/e^ix+e^-ix
Every number of this type is therefore constructible.
Using the functions above, it is possible to derive the following formulas using the socks and shoes rule ie. (f∘ g)^-1=g^-1∘ f^-1.
sin^-1(x) =-i ln(√(1-x^2)+ix)
cos^-1(x) = π/2+i ln(√(1-x^2)+ix)
tan^-1(x) = i/2ln(1-ix/1+ix)
Where the inverse trig functions are defined for real values ([0,1] for sin^-1 and cos^-1, and the entire real line for tan^-1), then the values that are given to ln(x) are all of magnitude 1.
§ GEOMETRIC DEFINITIONS OF 𝒯_1
So how does this curve relate to the quadratrix and other transcendental curves throughout history that have been used to solve similar problems? While it might be tempting to look at the fields generated by creating a "quadratrix" compass, or "trigonometric" compass that can draw these shapes and think about what intersections you might get, however trying this method can easily lead to intractable problems since by definition of your field is going to include solutions to equations like this:
α x = sin(x)
Since it must include the intersections of a sloped line and the standard trigonometric curve. Based on that it makes sense to examine subfields with fewer allowed constructions.
§.§ Trigonometric Curves
Consider the field of numbers generated by allowing intersections with the curves x ↦ (x,sin(x)) or x ↦ (x, cos(x)), then consider the subfield:
* All the standard constructions in classic euclidean geometry, (ie, creating lines and circles, and finding intersections of any two lines, two circles, or a line and a circle)
* Given the curve x ↦ (x,sin(x)) or x ↦ (x, cos(x)) when graphed on ℝ^2, you can construct the intersection of the curves, and any vertical line.
* Given the curve x ↦ (x,sin(x)) or x ↦ (x, cos(x)) when graphed on ℝ^2, you can construct the intersection of the curves, and any horizontal line.
The field described in Definition def:trigt1field is equal to 𝒯_1.
The first direction of proving that 𝒯_1 contains the construction amounts to showing that all the intersections with vertical lines are constructible since this happens to be the same as evaluating the function, and horizontal lines are the same as finding function inverses. Thus applying Theorem thm:trig deals with both halves of our equivalence. Showing every number constructible using classic Euclidean constructions will wait until lemma lem:t1constructible
§.§ Quadratrix of Hippias
Consider a subfield of numbers constructible with the quadratrix, generated using these constructions:
* All the standard constructions in classic euclidean geometry, (ie, creating lines and circles, and finding intersections of any two lines, two circles, or a line and a circle)
* Given the standard quadratrix as constructed in Figure fig:quaddef, you can construct the intersection of the quadratrix and any line passing through the origin.
* Given the standard quadratrix as constructed in Figure fig:quaddef, you can construct the intersection of the quadratrix and any horizontal line.
The field described in Definition def:quadt1field is equal to 𝒯_1.
To proceed with this proof we shall show that every number in each field is present in the other
(Quad ⇒𝒯_1). Notice that given any angle measure α, you can construct a ray at the origin where the angle formed with the real axis is α. Then by definition, the distance between the intersection and the real axis is α. Likewise, creating a horizontal line given by {x+i·α x ∈ℝ}. Then find the intersection with the quadratrix and draw the line to the origin creating an angle with the real axis of value α. Showing every number constructible using classic Euclidean constructions will wait until lemma lem:t1constructible
(𝒯_1 ⇒ Quad ). Consider a line drawn through the origin with angle α, by definition, the point on the quadratrix can be written as |α|+ i · |α|·(α). Since the point is expressible using trigonometric numbers, it does not extend the field further. Likewise, taking a horizontal line, by the first property we can turn its distance from the real axis into an angle value and see where that line intersects
§.§ Archimedean Spiral
The field 𝒯_1 is equal to the field of constructible numbers with the additional ability to construct intersections with the Archimedean Spiral with lines passing through the origin and circles centered at the origin.
Consider a subfield of numbers constructible with the Spiral of Archimedes, generated using these constructions:
* All the standard constructions in classic euclidean geometry, (ie, creating lines and circles, and finding intersections of any two lines, two circles, or a line and a circle)
* Given the standard Spiral of Archimedes as constructed in Figure fig:spiraldef, you can construct the intersection of the spiral and any line passing through the origin.
* Given the standard Spiral of Archimedes as constructed in Figure fig:spiraldef, you can construct the intersection of the spiral and any circle centered at the origin.
The field described in Definition def:spiralt1field is equal to 𝒯_1.
To proceed with this proof we shall show that every number in each field is present in the other
(Archm ⇒𝒯_1). Notice that if you have any angle, you can create a ray from the origin with an angle α the distance from the point of intersection on the spiral and the origin will be |α|, thus showing it is constructible. Likewise for any constructible real number r, then taking that number we can create a circle of radius r centered at the origin. Drawing a ray from the origin to this point lets us create a ray of z radians from the real axis. Showing every number constructible using classic Euclidean constructions will wait until lemma lem:t1constructible
(𝒯_1 ⇒ Archem). Notice the parameterization of the spiral of Archimedes as (t·cos(t),t·sin(t))., this lets us algebraically solve for the intersection points of any circle centered at the origin with radius r, namely rcos(t)+i· r sin(t). Likewise for any ray from the origin with an angle θ its intersection point will be defined by θcos(θ)+ i ·θ + sin(θ)
§ TRANSCENDENCE OF 𝒯_1
Now having established some various formulas for the algebra of 𝒯_1 we can continue deriving results first citing an important theorem in transcendental number theory.
The transcendence degree of a field ℱ is the smallest number of transcendental elements a_1, …, a_n such that every element of ℱ can be expressed as the roots of polynomials with coefficients in ℚ(a_1, …, a_n)
For any linearly independent set of algebraic numbers a_1,a_2,…,a_n, then the transcendence degree of ℚ(e^a_1,e^a_2…, e^a_n) is n
A proof for this is available in natarajan_pillars_2020
π is transcendental (not the root of any polynomial with rational coefficients)
To show that π is not algebraic, we must show that π being algebraic leads to a contradiction. If π is algebraic, then iπ is algebraic, and therefore the field ℚ(e^iπ)=ℚ(-1)=ℚ has transcendence degree 1. But ℚ trivially has a transcendence degree of 0, so π is transcendental.
The transcendence degree of 𝒯_1 is infinite.
The key to this will be the Lindemann–Weierstrass theorem. Since the set
{i√(p) | p prime}
gives you an infinite set of algebraic numbers that are trigonometric and linearly independent. Via theorem thm:exp the number e^i √(p) is constructible. And since 𝒯_1 is contained in the extension
ℚ(e^i,e^i√(2),e^i√(3),e^i√(5)…) ⊂𝒯
Thus the transcendence degree of 𝒯_1 is infinite.
For a,b∈𝒯_1 and β∈ℝ, then α^β is constructible if and only if |α|^β is constructible.
One direction is simple since for real β then we can take the absolute value of α^β to give us |α^β|=|α|^β. For the other direction notice that for any trigonometric α we can break it down into α = |α|e^iδ. Like so
α =|α|e^iδ
α^β =(|α|e^iδ)^β
α^β =|α|^β e^iδβ
Since e^iδβ is trigonometric then if |α|^β is trigonometric then α^β is trigonometric.
For α∈ S_1 and trigonometric then √(α) is trigonometric. (Setting α =1 gives you the roots of unity.)
The special case of Theorem thm:exp1 where |α|=1 since 1^β=1. Any nth root of unity is constructible since e^2π i/n=ζ_n.
For the next result, we need a quick definition:
A group is abelian, if for any 2 elements a,b then a ⋆ b = b ⋆ a.
If ℱ is a field with a finite abelian Galois extension then ℱ is contained in the field generated by some nth root of unity.
Due to Kronecker and Weber the author originally found the theorem in dummit_abstract_2009 on page 600.
Every number inside a finite abelian extension of ℚ is contained in 𝒯_1.
This also with a quick lemma lets us take care of showing that our algebraic definition of 𝒯_1 also contains all constructible numbers
Every constructible number is contained in 𝒯_1, alternatively written as 𝒞⊆𝒯_1
Every quadratic has degree 2 and thus has galois group of at most degree 2!=2, since every group of order 2 is abelian it is contained in 𝒯_1
This shows that there is a vast array of polynomials that can be created through this process, including the roots of irreducible polynomials to any degree.
§ ROOTS OF POLYNOMIALS WITH NONABELIAN GALOIS GROUPS IN 𝒯_1 AND DOUBLING THE CUBE IS NOT POSSIBLE WITH ANGLE PARTITONS
The main goal of this section will be to show that it is possible to construct algebraic numbers outside of the abelian numbers generated by the Kronecker-Weber theorem. And build the foundations for why certain numbers such as √(2) are probably not contained in 𝒯_1
For any nontrivial Pythagorean triple a^2+b^2=c^2 Then
a+bi/c
is not a root of unity.
Via the previous theorem, all we need to do is check that a+bi is not a root of unity of degree n where φ(n)=2, namely we have to check 3, 4 and 6. And since the 3rd and 6th roots of unity involve Gaussian integers divided by square roots. And the fact that a and b have to be not equal to zero takes care of the 4th roots of unity.
Minimal polynomial of the trigonometric number √(a+bi/√(a^2+b^2)) for a,b ∈ℝ is x^2n -(2a(a^2+b^2)^-3/2)x^n+1
√(a+bi/√(a^2+b^2)) = x
a+b√(-1) = x^n√(a^2+b^2)
b√(-1) =x^n√(a^2+b^2)-a
-b^2 =(x^n√(a^2+b^2) -a)^2
0 =(a^2+b^2)x^2n -2ax^n√(a^2+b^2)+a^2+b^2
0 =x^2n-2a/√(a^2+b^2)x^n+1
𝒯_1 contains algebraic numbers with nonabelian field extensions.
Consider the number 3+4i/5, via Theorem thm:exp1, the number √(3+4i/5) is trigonometric. Since it's algebraic it must have a minimal polynomial and using lemma lem:minpoly1 it has a minimal polynomial of 5x^6 - 6x^3 + 5. The Galois group of this subgroup of the permutation group S_6 is generated by the following elements.
{(24),(35),(12),(34),(56)}
This group is not abelian since (24)(12)≠ (12)(24).[Calculated using the Magma CAS]
We can solve many more polynomials with nonabelian galois extensions.
The solutions for a reduced cubic polynomial x^3+px+q=0 are expressible using trigonometric functions:
x_k=2 √(-p/3)cos[1/3arccos(3 q/2 p√(-3/p))-2 π k/3] for k=0,1,2
This quite helpful result is given by nickalls_viete_2006 paper on Descartes and the cubic equation. Furthermore doing some results on the cubic discriminant quantity 3 q/2 p√(-3/p). Lets us conclude that the polynomial has 3 real roots if the discriminant has a magnitude less than or equal to 1. And has 2 complex roots and 1 real root otherwise.
If a cubic has three real roots then it splits over 𝒯_1
The proof for this hinges on the proof that when the input value to arccos namely (3 q/2 p√(-3/p)) is between -1 and 1, then the polynomial will have three real solutions. The alternative case where a cubic has 1 real and 2 complex roots, (ie x^3-2), will involve putting values with a magnitude greater than or equal to 1.
Does this describe all the polynomials we can create with our algebra? This and other questions have a nonzero probability of potentially being answered in this paper!
The polynomial x^2n+2cx^n+1 has solutions in 𝒯_1 for trigonometric and real |c|≤ 1
Consider the minimal polynomial of
x=√(-1+√(c^2-1)/√(1+c^2-1))
Since it is in our special form we can use Lemma lem:minpoly1 to say that the minimal polynomial is:
0 =x^2n-2(-1)/√(c^2)x^n+1
0 =x^2n-(-2c)x^n +1
0 =x^2n+2cx^n+1
Unfortunately, the limitation is that √(c^2-1) must be real forces c to be in 0≤ c ≤ 1. Luckily doing some variable substitution and flipping the sign of a in our initial number gives us the minimal polynomial
x=√(1+√(c^2-1)/√(1+c^2-1))
0=x^2n-2cx^n+1
Thus letting us conclude that |c|≤ 1.
Given a root z of x^2n+2cx^n+1, the polynomial splits over {z,z̅,zζ_n^1,z̅ζ_n^1,…,zζ_n^n,z̅ζ_n^n}
The step is to verify that if z is a root of x^2n+2cx^n+1 then so is zζ^k_n we can do this with substitution and the definition that (ζ_n^k)^n=1 we can simplify down
0 =(zζ_n^k)^2n+c(zζ_n^k)^n+1
0 =z^n(ζ_n^k)^2n+cz^n(ζ_n^k)^n+1
0 =z^n(ζ_n^k)^2n+cz^n(ζ_n^k)^n+1
0 =z^n+cz^n+1
0 =0
Thus verifying that zζ^k_n is a root. Since the polynomial has all real coefficients the conjugate of every root z ζ^k_n is also a root. Since the conjugate of any root of unity is also a root of unity, you can write the set of 2n roots as {z ζ^k_n,z̅ζ^k_n}
For any x composed of a linear combination of roots of unity ζ_n such that |x|=1. If x is equal to a minimal kth root of unity then φ(k)|φ(n).
Since x is a root of unity ζ_k and all x,x^2,… are in the field extension given by the cyclotomic polynomial Φ(n). This implies that the field extension given by Φ(k) is a subfield of Φ(n). Implying that φ(k)|φ(n).2
For any natural number n, then φ(n) denotes the number of naturals less than or equal to n that are coprime to n. (Notice that every number less then any prime p is coprime to it, so φ(p)=p-1)
The degree of the splitting field of x^2n+cx^n+1 with coefficients in ℱ is |ℱ(z,z̅)|·φ(n).
If you extend the field of coefficients ℱ to include a root z and its conjugate z̅, then including the roots of unity will create the splitting field of x^2n+cx^n+1. Since the degree of the root of unity ζ_n is φ(n), we can calculate the degree of the entire field.
Going further we can see that the nice polynomial x^2n-2cx^n+1 has a root of
z so using the field properties we have that 2(z)=z+z̅ is trigonometric. The minimal polynomial of this through computer algebra calculations yields interesting patterns.
√(c - i √(1 - c^2)) + √(c + i √(1 - c^2)) ⇒ x^3 - 3 x - 2 c
√(c - i √(1 - c^2)) + √(c + i √(1 - c^2)) ⇒
x^4 - 4 x^2 - 2 c + 2
√(c - i √(1 - c^2)) + √(c + i √(1 - c^2)) ⇒
x^5 - 5 x^3 + 5 x - 2 c
√(c - i √(1 - c^2)) + √(c + i √(1 - c^2)) ⇒
x^6 - 6 x^4 + 9 x^2 - 2 c - 2
√(c - i √(1 - c^2)) + √(c + i √(1 - c^2)) ⇒
x^7 - 7 x^5 + 14 x^3 - 7 x - 2 c
√(c - i √(1 - c^2)) + √(c + i √(1 - c^2)) ⇒
x^8 - 8 x^6 + 20 x^4 - 16 x^2 - 2 c + 2
√(c - i √(1 - c^2)) + √(c + i √(1 - c^2)) ⇒
x^9 - 9 x^7 + 27 x^5 - 30 x^3 + 9 x - 2 c
√(c - i √(1 - c^2)) + √(c + i √(1 - c^2)) ⇒
x^10 - 10 x^8 + 35 x^6 - 50 x^4 + 25 x^2 - 2 c - 2
√(c - i √(1 - c^2)) + √(c + i √(1 - c^2)) ⇒
x^11 - 11 x^9 + 44 x^7 - 77 x^5 + 55 x^3 - 11 x - 2 c
as computed by sympy.
Do the polynomials as defined above follow the following patterns indefinitely?
S_2n+1(k) =0
S_0(k) =1
S_2(k) =-n
S_4(k) =(k-1)(k-2)/2
S_6(k) =-(k-1)(k-2)(k+3)/6
S_8(k) =(k-1)(k-2)(k-3)(k+4)/24
(S_4,S_6 and S_8 were found using the help of OEIS: https://oeis.org/A000096A000096, https://oeis.org/A005581A005581 and https://oeis.org/A005582A005582)
Each of the minimal polynomials has at least n real roots. (Where n is the degree of the angle partition.)
Since we are asking what the minimal polynomial of z+z̅, P(x) where z is a root of x^2n+2cx^n+1.
Namely,
a_n(z+z̅)^n+a_n-1(z+z̅)^n-1+…+a_1(z+z̅)+a_0=0
Then consider the field automorphism f_k on the roots of that polynomial mapping z ↦ z ζ_n^k and z̅↦z̅ (ζ_n^k)^-1. Since this automorphism has the property that f_k(z̅)=f_k(z). We now have that f_k(z+z̅)=f_k(z)+f_k(z) and it thus forms a valid automorphism on whatever the minimal polynomial of z+z̅ will be. Since there are n different f_k each with a different ζ_n^k, it shows that there will be a minimum of n different roots created by the images of the principal root. In addition, all roots must be real since 2 (z)=z+z̅.
Each of the minimal polynomials has at least n real roots. (Where n is the degree of the angle partition.)
Since we are asking what the minimal polynomial of z+z̅, P(x) where z is a root of x^2n+2cx^n+1.
Namely,
a_n(z+z̅)^n+a_n-1(z+z̅)^n-1+…+a_1(z+z̅)+a_0=0
Then consider the field automorphism f_k on the roots of that polynomial mapping z ↦ z ζ_n^k and z̅↦z̅ (ζ_n^k)^-1. Since this automorphism has the property that f_k(z̅)=f_k(z). We now have that f_k(z+z̅)=f_k(z)+f_k(z) and it thus forms a valid automorphism on whatever the minimal polynomial of z+z̅ will be. Since there are n different f_k each with a different ζ_n^k, it shows that there will be a minimum of n different roots created by the images of the principal root. In addition, all roots must be real since 2 (z)=z+z̅.
The degree of ℱ(z+z̅):ℱ is at most degree n.
Recall de-moivres formula
(cos(θ)+i sin(θ))^n=cos(nθ)+isin(nθ)
Then taking the real values of this expression we get that
cos(nθ) =cos(θ)^n+a_n-2cos(θ)^n-2sin(θ)^2+a_n-4cos(θ)^n-4sin(θ)^4+…
cos(θ) =P(cos(θ),sin(θ)^2)
Notice that every component must have an even power of sin(θ), since the only way to get an odd coefficient would be to multiply together isin(θ) an odd number of times, giving you an imaginary value. However, we can use some substitution at this point, namely since |z|=1, we can let (z)=cos(θ) and (z)=sin(θ). Furthermore, using the geometric interpretation we can say that cos(nθ) is just the real value of the point we were partitioning, aka c. performing this substitution we get
c = P((z),(z)^2)
c = P(z+z̅/2,(√(1-(z+z̅/2)^2))^2)
c = P(z+z̅/2, 1-(z+z̅/2)^2)
0 =(z+z̅/2)^n+(z+z̅/2)^n-2(1-(z+z̅)^2/4)+(z+z̅/2)^n-4(1-(z+z̅)^2/4)^2+…-c
Closely inspecting this polynomial we can see that it is a polynomial with coefficients in mathcalF with z+z̅ as a root that is at most degree n. Thus showing the degree of ℱ(z+z̅):ℱ is at most degree n.
The minimal polynomial of z+z̅ has all real roots.
The minimal polynomial of z+z̅ must be at most degree n but since it has n real roots all its roots must be real.
Let 𝒫 be the field generated by allowing the traditional euclidean geometric constructions in addition to additional constructions allowing arbitrary partitions of any angle.
The field 𝒫∩ℝ (the field of real partitionable values) is splitting over ℚ.
We shall prove this by showing that 𝒫∩ℝ is generated by extensions of splitting fields of any quadratic with real roots, plus the minimal polynomials of z+z̅ where z is a root of x^2n+2c+1. The field extension ℱ(z,z̅):ℱ(z+z̅)=2. Since we can write z in this form.
z = z+z̅/2+i√(1-(z+z̅/2)^2)
Using our earlier lemmas about the minimal polynomial about numbers of the form a+bi then z must be the root of the polynomial
x^2-x(z+z̅)+1
Thus every element in our field can be generated using polynomials with all real roots and quadratics. Since every extension composed of repeated quadratics can be decomposed as quadratics with real roots, plus a single imaginary extension. Since every quadratic has either all real or all imaginary roots, then every member of the field can be constructed using a polynomial with real roots, plus real quadratic extensions plus an imaginary quadratic extension. Thus for any real number in 𝒫∩ℝ, it can be included in a tower of splitting fields with all real values. Thus the entire real field must be splitting.
The real constructible numbers and resultant constructions are generated using quadratics with real roots. The nth partition is taken care of using the minimal polynomial of z+z̅, since if you are partitioning an angle α, since you can calculate the cos(α), then the entire problem can be boiled down to calculating cos(α/n) luckily our number z+z̅ can be described as taking in our initial value c and applying this exact map.
z+z̅=2*cos(arccos(c)/n)
We can then replicate sinα/n by using the result of a real valued quadratic √(1-(z+z̅)^2/4). Since nth partitions of angles can be reduced to operations on the unit circle, this is enough to generate 𝒫∩ℝ. Since it is possible to generate the field using splitting fields, via Lemma lem:splittower, the entire field 𝒫∩ℝ is splitting.
If p(x) is an irreducible polynomial over the rationals with real and complex roots then it has no roots in 𝒫
Consider what would happen if a real root k_R of p(x) was included, since 𝒫(x) ∩ℛ is splitting then every root of p(x) must be in 𝒫(x) ∩ℛ, this is impossible since some roots of p(x) are complex. Likewise any complex root k_I cannot be included since 𝒫 is splitting, but k_R cannot be included so neither can k_I.
The first form I have seen of a proof for this in the literature is <cit.>, where he proves a weaker version for cubics and angle trisection only using Cardano's closed-form solution. (There is an error in this earlier formulation where he states: "A real cubic equation can be solved geometrically using ruler, compass, and angle-trisector if and only if its roots are all real", this is true of irreducible cubics, but simple examples like x^3-1 disprove the general case.)
Every irreducible polynomial with an abelian galois extension has all real or all complex roots.
Via Theorem thm:kron our polynomial must have all its roots constructible using angle partitions. Thus our polynomial must have all real or all complex roots via Theorem thm:thebigone.
Any odd kth root of a prime number √(p), is not constructible using angle partitions, for any odd k greater than 3.
Since the minimal polynomial x^n-p is irreducible via Eisenstein's criterion since p divides every coefficient except for the first and p^2 does not divide p. For n ≥ 3 the polynomial has both real and complex roots then √(p) is not constructible using partitions. (Also serves as an argument that doubling the cube is impossible with conventional euclidean geometry.)
This leads us to the following result that will be further expanded upon in the conclusion.
Since doubling the cube is impossible with angle partitions it seems unlikely that it is possible in 𝒯_1.
§ GENERAL INTERSECTIONS OF TRANSCENDENTAL CURVES
Limiting ourselves to certain intersections let us use the similar geometric interactions of all curves to produce a field with an interesting algebraic structure. Letting in other kinds of intersections introduces a great amount of complexity to the problem. Consider first the field created by allowing any sloped line intersections with simple trigonometric functions like sin and cos
The field generated by allowing sloped line intersections with sin or cos is the field 𝒯_1 adjoined with the roots of the expression sinx+ax+b
If both a and b are algebraic then any solution x, qsin^-1(x) are transcendental.
First, assume that x is algebraic, then since a and b are algebraic then ax+b is algebraic, and therefore sinx is algebraic, but if x is algebraic then sinx is algebraic, but via [Lindemann–Weierstrass] sinx and x cant both be algebraic so by contradiction x is transcendental. Since ax+b is transcendental then sinx is also transcendental.
Under the constraints of Theorem thm:t2tran1 then for any solution x then sin^-1(x) must be transcendental
Because sinπ·p/q is algebraic, it contradicts the aforementioned theorem. Thus π·p/q is not a valid solution.
For any numbers a ∈ℝ and b ∈𝒯_1 the equation sin(x)=ax+(sin(b)-ab) has a trigonometric solution
A solution of x=b satisfies the equation.
The problem statement is equivalent to finding all roots of bx-x^3/6+x^5/25+…
Using the Taylor series expansion for sin(x) we have that we are trying to find the roots of
-(b_1x+a_1)+(x-x^3/3!+x^5/5!-x^7/7!)
Any sloped line intersecting the quadratrix involves finding the solution to a+b/x=(x)
ax+b =x(π x/2)
a+b/x =(π x /2)
a+b/x =(x)
Furthermore, some basic plots seem to indicate that there is a trove of complex solutions to even the simple base case of sin(x)-ax
Furthermore, the where sin(x) and ax intersect and are tangent has a fascinating expression in the complex plane, where the complex solutions combine on the real line into a solution with a multiplicity of 2, before separating on the real line as seen in Figure fig:sintangent.
What's interesting is that the characteristic equations for the quadratrix seem to buck the trend and only have solutions appearing on the real line.
§ CONCLUSION
Despite the best efforts of the author some important questions on this matter remain unresolved,
Does the field created by allowing arbitrary partition of angles 𝒫 completely encapsulate the algebraic numbers in 𝒯_1
The strategy used for this involved turning our geometric constructions into algebra and then using our base algebraic objects to construct the following class of functions that take in algebraic numbers and output algebraic numbers.
f_q: 𝔸→𝔸
f_q(z)= e^q ·ln(z)
However, saying that this class of functions generates all algebraic numbers would involve proving that there are no other "ways" of making algebraic numbers. For example, consider the function
g: 𝔸×𝔸×𝔸→ℂ
g(a,b,c)=e^ln(a)ln(b)/ln(c)
We know that this function does produce algebraic output when c equals 0. Or when either a or b are expressible as c raised to a rational power. (Actually plugging in values gives you results that look like 2^log_3(5).) There might very well be a theorem in transcendental number theory that could easily resolve this.
Likewise, there are a bunch of additional questions that could be answered about allowing general intersections, namely.
Are all the fields allowing general intersections with the transcendental curves (trig functions, Quadratrix of Hippias, Archemedian Spiral) identical? (Do they form a larger 𝒯_2)
I suspect that if it is true it would be very hard to prove, but on the other hand, it would be very pretty if it was true.
Does allowing general intersections in any of the transcendental curves allow the construction of algebraic numbers that are impossible in 𝒯_1
There might very well be a clever trick in the algebra to allow this and if any reader would be interested in continuing this work further I would recommend they consider starting here.
§ ACKNOWLEDGEMENTS
I would like to sincerely thank Dr. John Carter for advising me on this project and helping me through the publication process, as well as teaching the History of Mathematics class where the quadratrix was first introduced to me.
|
http://arxiv.org/abs/2303.07379v1
|
20230313180102
|
Dynamical abelian anyons with bound states and scattering states
|
[
"Sven Bachmann",
"Bruno Nachtergaele",
"Siddharth Vadnerkar"
] |
math-ph
|
[
"math-ph",
"cond-mat.str-el",
"math.MP",
"quant-ph"
] |
1]Sven Bachmann
2]Bruno Nachtergaele
3]Siddharth Vadnerkar
[1]Department of Mathematics, University of British Columbia, Vancouver, BC V6T 1Z2, Canada
[2] Department of Mathematics and Center for Quantum Mathematics and Physics, University of California, Davis, Davis, CA, 95616, USA
[3]Department of Physics, University of California, Davis, Davis, CA, 95616, USA
Dynamical Abelian anyons with bound states and scattering states
[
March 30, 2023
================================================================
We introduce a family of quantum spin Hamiltonians on ^2 that can be regarded as perturbations of Kitaev's abelian quantum double models that preserve the gauge and duality symmetries of these models. We analyze in detail the sector with one electric charge and one magnetic flux and show that the spectrum in this sector consists of both bound states and scattering states of abelian anyons. Concretely, we have defined a family of lattice models in which abelian anyons arise naturally as finite-size quasi-particles with non-trivial dynamics that consist of a charge-flux pair. In particular, the anyons exhibit a non-trivial holonomy with a quantized phase, consistent with the gauge and duality symmetries of the Hamiltonian.
§ INTRODUCTION
When Leinaas and Myrheim published their remarkable paper <cit.>, the possibility of a new type of quasi-particles in two space dimensions with more general statistics than the well-established fermions and bosons, was a purely theoretical observation. This changed abruptly with the discovery of the fractional quantum Hall effect (FQHE) by Tsui, Stormer, and Gossard <cit.> and Laughlin's many-body wave function <cit.> as a proposed explanation shortly after the experimental discovery. Wilczek called these hypothetical particles with fractional statistics anyons <cit.> and they quickly became a central piece of many theoretical works on the FQHE <cit.>. Convincing experimental evidence for the existence of anyonic excitations in fractional quantum Hall materials has emerged in recent experiments <cit.>.
All this motivated several efforts to construct explicit Hamiltonian models of anyons and study their mathematical and physical properties. Many of such efforts focus on interpreting anyons as charge and flux tube pairs <cit.>. A relation between the filling fraction and the ground state degeneracy was proved in <cit.> for lattice models and in <cit.> for the Laughlin state. Haldane's pseudo-potential Hamiltonians have been derived in <cit.>. A truncated version of a pseudo-potential for the ν=1/3 filled Laughlin state introduced in <cit.> was shown to have a non-vanishing ground state gap in <cit.>. Other aspects were investigated in a variety of models <cit.>.
The possibility of topological quantum computation envisaged in <cit.> has been a further incentive to deepen our understanding of anyons. Among the Hamiltonian models in two dimensions developed for that purpose, the most famous ones are Kitaev's quantum double models <cit.> and his honeycomb model <cit.>, as well as the Levin-Wen string-net models <cit.>. They do exhibit localized excitations with anyonic statistics, can be extended to describe anyon condensation <cit.>, but these quasi-particles are not dynamical. In fact, the main purpose of these models is to realize, in their ground state space, a topological quantum field theory <cit.>. This has led to further developments in the classification of topological matter in the language of tensor categories <cit.>. Experimental realizations of these exotic topological phases have recently been proposed <cit.>.
These rigorous results recover some of the features of anyons in the theories for the FQHE mentioned above but it is fair to say that we are still lacking a coherent theory starting from first principles. In this paper we present Hamiltonian lattice models of anyons with short-range interactions of the type prevalent in condensed matter theories of real materials. It may also be realizable as an artificial system created in today's laboratories. We introduce our models as perturbations of Kitaev's quantum double models based on an arbitrary abelian group G and rely on the stability of its anyon structure under short-range perturbations proved in <cit.>. This generalizes earlier work on the case of G=_2, which starts with the Toric Code model <cit.>. These models have a unique gapped ground state on the infinite lattice, and the excitation spectrum can be described by a set of abelian anyons. They have a duality symmetry which is reflected in the structure of the anyons: they consist of two basic sets, which we call electric and magnetic charges that appear symmetrically in the Hamiltonian. Anyons that have both non-zero electric and magnetic charges obtained by fusion, appear with their own dispersion relation. We calculate the dispersion relation for single-anyon excitations and show that it exhibits a Dirac cone for these fused anyons with non-trivial braiding statistics. We show that under a simple condition on the coupling constants and the energy and momentum, bound states appear that should be interpreted as finite-size quasi-particles with non-trivial dynamics. We also prove that bounds states do not appear when the Hamiltonian only includes separate hopping terms for electric and magnetic charges. In summary, we have constructed a family of lattice models in which abelian anyons arise naturally as charge-flux pairs with the expected properties. We explicitly find that the anyons exhibit a non-trivial holonomy with a quantized phase, consistent with the gauge and duality symmetries of the Hamiltonian. There is no need to introduce charge-flux pairs or tracer particles a priori <cit.>. The anyonic holonomy as observed in <cit.> arises directly from the many-body Hamiltonian.
In Section <ref> we introduce the family of Hamiltonians, discuss their symmetry properties, and describe the structure of the anyons and the associated superselection sectors for these models, including concrete instances of the corresponding GNS representations. The spectral analysis of the Hamiltonian in the invariant subspaces of the relevant GNS representations is carried out in Section <ref>. We illustrate our findings with a set of figures based on numerical calculations.
§ THE MODEL
§.§ The (static) quantum double model
Let us start with a quick reminder of the family of quantum double models (QDMs) with a finite Abelian group (G,·), which will allow us to set notations. We denote by Γ the cell complex given by a set 𝒱 = ^2 of vertices, a set ℰ of oriented edges and a set ℱ of faces. We denote by ∂ the standard boundary map of this cell complex. For simplicity, all `vertical' edges are oriented upwards while all `horizontal' edges are pointing rightward. We attach to each edge e∈ the | G|-dimensional Hilbert space ℋ_e = ℂ^| G| and label an orthonormal basis by group elements g ∈ G: {|g⟩_e:g∈ G}; If a statement is not specific to one particular edge, we shall simply denote . The observable algebra associated with each edge is _e = (_e). For any finite subset Λ⊂, the algebra is given by _Λ = (⊗_e∈Λ_e). As usual, Λ_1⊂Λ_2 yields a natural embedding _Λ_1↪_Λ_2 by the identification of A∈_Λ_1 with A⊗__Λ_2∖Λ_2. The algebra of local observables _loc is the union of these finite volume algebras, and the C*-algebra of quasi-local observables is the completion of _loc with respect to the operator norm.
For any h∈ G, let L^h be the linear operator defined by its action on the basis:
L^h|g⟩ = |hg⟩.
Similarly, for any character χ∈Ĝ, let T^χ be the linear operator defined by
T^χ|g⟩ = χ̅(g)|g⟩,
where χ̅ denotes the inverse of the character χ. These operators form a unitary representation of G, respectively Ĝ, on , and (L^h) = L^h̅, (T^χ) = T^χ, where h̅=h^-1, the inverse in G. Moreover, they satisfy the following commutation relation:
T^χ L^h = χ̅(h)L^hT^χ.
It will be convenient to label operators not only by an edge, but by pairs (v,e) with v∈∂ e or (f,e) with e∈∂ f. For a vertex-edge pair, ^h(v,e) = L^h_e and ^χ(v,e) = T^χ_e if the edge is outgoing from v, while ^h(v,e) = L^h̅_e and ^χ(v,e) = T^χ̅_e if it is incoming. Similarly for a face-edge pair with incoming (respectively outgoing) being replaced by the face being on the left (respectively on the right) of the edge. These conventions are illustrated in Figure <ref>.
A string γ is a sequence of pairs {(v_i,e_i):v_i∈, e_i∈} such that ∂ e_i = {v_i,v_i+1}. If it is finite, the last vertex is not listed but it is uniquely determined by (v_N,e_N) and we denote it ∂_1γ; analogously, ∂_0γ = v_1, and we let ∂γ = {∂_0γ,∂_1γ}. We define similarly a dual string γ, where faces replace vertices, and the edge e_i is the unique edge in ∂ f_i∩∂ f_i+1, see Figure <ref>.
We now define the following unitary string operators
^g_γ = (f,e) ∈γ∏ℒ^g (f ,e) ^χ_γ= (v,e) ∈γ∏𝒯^χ (v ,e)
for g∈ G, χ∈Ĝ. Note that the order in which the operators appear is irrelevant in the present context. The boundary of a face f∈ℱ is naturally associated with a string γ(f), while a vertex v ∈𝒱 is naturally associated with a dual string γ(v). We shall always consider these strings to carry a counterclockwise orientation. We define for any face f and vertex v
^h_f= 1/|Ĝ|∑_χ∈Ĝχ(h) ^χ_γ(f),
χ_v= 1/| G|∑_g ∈ Gχ(g)^g_γ(v).
The normalization is chosen so as to make these operators into (orthogonal) projections, and one can check that they are mutually commuting: In fact,
_v^χ_v^ξ = δ_χ,ξ_v^χ = _v^ξ_v^χ, _f^g_f^h = δ_g,h_f^g = _f^h _f^g,
by the orthogonality of the characters. Their action on basis vectors is illustrated in Figure <ref>.
For any finite subset Λ⊂, the Hamiltonian of the (static) quantum double model is given by
H^0_Λ = v∈Λ∑ ( - ι_v) + f∈Λ∑ ( - ^1_f),
where ι∈Ĝ is the constant character ι(g) = 1, 1∈ G is the neutral element, and v∈Λ means that {e∈:v∈∂ e}⊂Λ, and similarly for f∈Λ. This choice of boundary condition is arbitrary and made only for simplicity here; it will not play a role in the following discussion.
In fact, we shall be interested in the infinite-volume limit of the model. We recall some elementary properties of the model exhibited in the original <cit.>, and refer to <cit.> for a complete set of proofs. The sum (<ref>) is not convergent in norm, but it remains meaningful as the generator of the dynamics: for any local observable A, the limit
δ^0(A) = lim_Λ→^2[H^0,A]
exists for all A∈_loc and extends to a densely defined unbounded *-derivation on . In this infinite volume limit, the model has a unique translation-invariant ground state ω_0 which is frustration-free and gapped – we shall henceforth call it the vacuum state. ω_0 is a ground state in the sense of being a positive normalized functional on such that
-ω_0(Aδ^0(A))≥0
for all A∈_loc. That it is gapped means that there is g>0 such that
-ω_0(Aδ^0(A))≥ gω_0(A A)
for all A∈_loc such that ω_0(A) = 0. Specifically, g=1 here. Finally, the frustration-freeness is expressed by
ω_0(ι_v)=1, ω_0(^1_f) = 1,
for all v∈,f∈.
Additional properties of the vacuum state are that ω_0(χ_v)=0=ω_0(^g_f) for all non-trivial elements of G (respectively Ĝ) from which we deduce that
ω_0([_v^χ,A])=0, ω_0([_f^g,A])=0,
for all A∈ by the Cauchy-Schwarz inequality.
Let us briefly come back to the string operators introduced above. They satisfy the following commutation relations:
χ_∂_0 γξγ = ξγχξ̅_∂_0 γ, χ_∂_1 γξγ = ξγχξ_∂_1 γ,
^h_∂_0 γgγ = gγ^hg_∂_0 γ,
^h_∂_1 γgγ = gγ^hg_∂_1 γ,
where we used that χ(g̅) = χ(g) = χ(g). Moreover, χ_v commutes with ξγ for v ∉∂γ and ^h_f commutes with gγ for f ∉∂γ. We further note that any (dual) string operators commute with all 's and all 's. We shall also need commutation relations between string operators of different types:
_γ^χ_γ^g = (χ(g))^c(γ,γ)_γ^g _γ^χ
Here, c(γ,γ) is the number of signed crossings of the two strings: each crossing, from right to left, of γ and γ yields a factor χ(g); since a change in the orientation of a string amounts to the exchange of the charge with its inverse, a crossing from left to right yields χ(g) = χ(g).
Localized excitations above the ground state are simple to characterize. These quasi-particles arise from the violation of the conditions (<ref>). Indeed, we shall say that a state ω carries an electric charge at vertex v if ω(ι_v) = 0, or a magnetic flux through face f if ω_0(^1_f) = 0. The commutation relations (<ref>) yield that
ω_0((F_γ^χ) A_∂_0γ^ξ F_γ^χ)=δ_ξ,χ, ω_0((F_γ^χ) A_∂_1γ^ξ F_γ^χ)=δ_ξ,χ,
so that it is natural to interpret the string operator ^ξ_γ as creating a pair of quasi-particles with opposite electric charges (χ,χ) at either ends of γ, while ^g_γ creates a pair of fluxes (g,g̅) on the two extremal faces of γ. This is consistent with the fact that if γ_1,γ_2 are such that ∂_1γ_1 = ∂_0γ_2, then ^ξ_γ_1^ξ_γ_2 = ^ξ_γ_1·γ_2, where γ_1·γ_2 denotes the concatenation of two strings.
Since this Hamiltonian is a sum of strictly local commuting terms, we have that
δ^0(χ_v) = 0 = δ^0(^g_f),
for all χ∈Ĝ and g∈ G, showing that excitations are not dynamical. We shall in the next section introduce hopping terms for these quasi-particles which will define a dynamical version of the QDM.
§.§ The dynamical quantum double model
Hopping of electric charges between two vertices along an edge e∈ will be induced by the following operator
T_e^ϵ = ∑_χ∈Ĝ,χ≠ι(
ℱ^χ_(v,e)ι_v'χ_v + ℱ^χ_(v',e)ι_vχ_v')
where the edge e is between v and v'. Since (ℱ^χ_(v,e)) = ℱ^χ_(v,e)=ℱ^χ_(v',e), the second term is the adjoint of the first one and hence T_e^ϵ is self-adjoint. Flux hopping between two faces across e∈ can be defined similarly,
T_e^μ = ∑_h∈ G,h≠ 1(
ℱ^h_(f,e)^1_f'^h_f + ℱ^h̅_(f',e)^1_f^h_f')
where the edge e is shared by f and f'.
Finally, and in accordance with the fact that a flux-charge pair can be considered a particle of its own type, we also introduce a hopping such a pair:
T_e^ϵμ = ∑_h∈ G,h≠ 1
χ∈Ĝ,χ≠ι{ (
ℱ^χ_(v,e)ι_v'χ_v + ℱ^χ_(v',e)ι_vχ_v')(_f^h + _f'^h)
+ (
ℱ^h̅_(f,e)^1_f'^h_f + ℱ^h̅_(f',e)^1_f^h_f')(_v^χ + _v'^χ)
}
where e,v,v',f,f' are illustrated in Figure <ref>.
With these definitions, we define the full Hamiltonian of the model by
H = H^0 + λ_ϵ H^ϵ + λ_μ H^μ + λ_ϵμ H^ϵμ,
where H^♯ = ∑_e∈ T^♯_e, with ♯ stands for ϵ, μ or ϵμ, and the sum is interpreted as in (<ref>). We denote
δ = lim_Λ→^2[H_Λ,·] = δ^0+δ^ϵ+δ^μ+δ^ϵμ,
the generator of the dynamics in the infinite volume limit, while δ^♯ are the derivations associated with H^♯. The corresponding dynamics is denoted τ_t, respectively τ_t^♯.
The following proposition justifies the nomenclature that has been used thus far in describing the various terms of the Hamiltonian. The first part (<ref>) is a continuity equation for the charge ζ∈Ĝ and it should be contrasted with (<ref>). The operator _Λ^ζ has the natural interpretation of the total charge of type ζ in the volume Λ. The second part of the proposition shows that the hopping terms are gauge invariant.
Let ζ∈Ĝ, ζ≠ι, and let Λ be a finite subset of . Let _Λ^ζ = ∑_v∈Λ^ζ_v.
(i) Let ^ζ_(v,e) = (^ζ̅_(v,e)^ι_v'^ζ_v - ^ζ̅_(v',e)^ι_v^ζ_v'). Then
δ^ϵ(^ζ_Λ) = ∑_(v,e)∈∂Λ^ζ_(v,e),
where (v,e)∈∂Λ if ∂ e∩Λ≠∅ and ∂ e∩Λ^c ≠∅. Moreover, δ^μ(^ζ_Λ) = 0.
(ii) For any edge e∈,
∑_v∈[T_e^ϵ, ^ζ_v] = 0.
The operators T_e^ϵ and ^ζ_v do not commute only if v is one of the vertices at the boundary of e, in which case as short calculation yields
[T_e^ϵ, ^ζ_v] = ∑_χ∈Ĝ([^χ_(v,e),^ζ_v] ^ι_v'^χ_v +
[^χ_(v',e),^ζ_v] ^ι_v^χ_v')
= ∑_χ∈Ĝ(^χ_(v,e)(^ζ_v - ^ζχ_v)^ι_v'^χ_v
+ ^χ_(v',e)(^ζ_v - ^ζχ_v)^ι_v^χ_v').
With (<ref>) and since ζ≠ι, we have that ^ζχ_v^χ_v = 0 as well as ^ζ_v^ι_v=0, and this further imposes that χ = ζ in both remaining terms, namely [T_e^ϵ, ^ζ_v] = ^ζ_(v,e). Claim (ii) immediately follows since [T_e^ϵ, ∑_v^ζ_v] = ^ζ_(v_1,e) + ^ζ_(v_2,e) = 0 by the antisymmetry of ^ζ_(v,e) under the exchange of the vertices. Claim (i) follows similarly: By the same argument, the contribution from all edges that are internal to Λ vanish, the only remaining ones being those on the boundary. Finally, δ^μ(^ζ_Λ) = 0 follows from the fact that both 's and dual strings are products of operators, which are all mutually commuting.
We conclude this section by pointing out that a natural extension of the Hamiltonian above would be to introduce an external `vector potential' by twisting the various hopping term, as for example
-β_eℱ^χ_(v,e)ι_v'χ_v + β_eℱ^χ_(v',e)ι_vχ_v'.
An edge-dependent β:→ would allow one to add external `fluxes' through plaquettes. Of course, similar variations are possible with the other hopping terms. As we shall see shortly, such a flux attachment that is typical of anyons will appear intrinsically as soon as pairs of particles are present in the system.
§.§ Superselection sectors and anyons
Recall that the state ω_0 is the unique translation invariant ground state. We briefly discussed above the states ω_0∘Γ_γ^χ where Γ_γ^χ = _γ^χ(·)_γ^χ creates a pair of excitations (χ,χ) localized at the ends of the string on top of the existing vacuum.
If γ = {(v_i,e_i):i∈} is an infinite string, the operator _γ^χ is not well-defined, but the corresponding automorphism Γ_γ^χ exists. Indeed, let γ^(N) = {(v_i,e_i):i=1,…,N} be its truncation to the first N edges. For any A∈_loc, the limit
Γ^χ_γ(A) = lim_N→∞_γ^(N)^χ A _γ^(N)^χ
exists since the sequence of operators on the right hand side is eventually constant, and Γ_γ^χ extends to an automorphism of since ‖Γ_γ^χ(A)‖ = ‖ A‖. In particular, the linear functional ω_0∘Γ^χ_γ defines a state on , which we shall refer to as a charged state. It is so that
(ω_0∘Γ^χ_γ)(_v^ι) =
0 if v=∂_0γ
1 otherwise and (ω_0∘Γ^χ_γ)(_f^1) = 1 for all f∈.
Now, if λ is a (finite) closed loop, namely ∂_0λ = ∂_1λ, then the action of F_λ^χ is trivial on the vacuum state, namely
ω_0(_λ^χ A _λ^χ) = ω_0(A) (λ closed)
for all A∈. This, and the composition property of string operators implies that
ω_0∘Γ^χ_γ = ω_0∘Γ^χ_γ̃
for all strings γ such that ∂γ = ∂γ̃. If γ is an infinite string, this shows that the state ω_0∘Γ^χ_γ depends only on the position of the initial vertex v = ∂_0γ, which justifies the notation ω_v^χ. Physically, the state ω_v^χ is a state carrying one electric charge χ at the vertex v and remains indistinguishable from the vacuum state everywhere else. It can be shown (<cit.>,<cit.>) that ω_v^χ is a ground state in the sense of (<ref>) for any χ∈Ĝ and any v∈.
Let (_0,π_0,Ω_0) be the GNS representation of the vacuum state — we shall henceforth refer to it as the vacuum representation.
For a given state, all GNS representations are unitarily equivalent.
A charged state ω_v^χ is not equivalent to ω_0. Its GNS representation can be given by (_0,π_0∘Γ_γ^χ,Ω_0), where ∂_0γ = v:
ω_v^χ(A) = ⟨Ω_0|(π_0∘Γ_γ^χ)(A) Ω_0⟩ = ω_0∘Γ_γ^χ(A).
Similarly, if χ≠ξ, then ω_v^χ and ω_v^ξ are inequivalent.
While the state ω_v^χ depends only on the endpoint v of the string γ, the GNS representation does depend on the entire string γ. The uniqueness of the GNS representation implies that for any two strings γ_1,γ_2 starting at v, the representations π_0∘Γ_γ_1^χ,π_0∘Γ_γ_2^χ are equivalent: this is very reminiscent of the freedom of choice of the flux line needed to introduce a flux piercing the plane in a 2d electron gas. We shall make a choice which will be convenient for the rest of the discussion: The string associated with the state ω_v^χ is taken to be extending vertically down from the vertex v, as illustrated in Figure <ref>.
The construction just discussed can be carried out with dual strings to yield charged ground states of the form ω_f^g = ω_0∘Γ_γ^g, and we pick those strings to be oriented vertically upwards from the face f.
A superselection sector of δ^0 is a class of unitarily equivalent δ^0-ground state representations. The above discussion shows that group elements and characters label superselection sectors. We claim furthermore that states carrying the same charge but located at different vertices are equivalent. Indeed, the composition property of the string operators implies that two states ω_v^χ and ω_v'^χ are related by
ω_v'^χ(A) = ω_v^χ(^χ_γ(v'→ v) A ^χ_γ(v'→ v)),
where γ(v'→ v) is any string such that ∂_0γ(v'→ v) = v' and ∂_1γ(v'→ v) = v. The operator ^χ_γ(v→ v') is a unitary element of the algebra, so that the two states are indeed unitarily equivalent. That these are all possible sectors is the following result of <cit.>:
The complete set of superselection sectors of δ^0 is labelled by elements of G×Ĝ.
As was already pointed out in the original paper <cit.>, the quasi-particles associated with each superselection sector are Abelian anyons. In the present language, this can be made precise in the sense of the DHR analysis <cit.>, see again <cit.>. While the anyonic nature of particles has a general abstract treatment in terms of the superselection sectors, see <cit.>, or <cit.> for the quantum double models, we can understand braiding here in the sense of parallel transport, close to the original description of Leinaas and Myrheim, namely by starting with the two-particle representation (_0,π_0∘Γ_γ^g∘Γ_γ^χ,Ω_0), and continuously braiding the electric charge χ around the flux g. For this, let λ be a closed string of length N such that ∂_0λ = ∂_1λ = ∂_0γ. Let Ψ_λ(t)∈_0 be defined by Ψ_λ(0) = Ω_0 and Ψ_λ(t) = F^χ_λ(t) Ω_0, where F^χ_λ(t) is given by
F^χ_λ(t) = (π_0∘Γ_γ^g∘Γ_γ^χ) (∏_j=0^N( + f(t - j)(ℱ^χ_(v_N-j,e_N-j) - ))), (t>0).
Here, f is a smooth switch function such that f(t) = 0 if t≤0 and f(t) = 1 if t≥1. At integer time steps t=k with 1≤ k≤ N, we have that
Ψ_λ(k) = (π_0∘Γ_γ^g∘Γ_γ^χ) (∏_j=0^k-1ℱ^χ_(v_N-j,e_N-j))Ω_0,
and Ψ_λ(t) = (π_0∘Γ_γ^g∘Γ_γ^χ) (ℱ^χ_λ) Ω_0 for all t≥ N. It is now immediate to compute the holonomy associated with λ and note that it is quantized.
Let η_λ = ⟨Ω_0|Ψ_λ(N)⟩. Then
η_λ = χ(g)^w_∂_0γ(λ),
where w_∂_0γ(λ) is the winding number of the string λ around the face ∂_0γ.
The commutation relation (<ref>) implies that
(Γ_γ^g∘Γ_γ^χ)(ℱ^χ_λ)
= Γ_γ^g(ℱ^χ_λ) = χ(g)^w_∂_0γ(λ)ℱ^χ_λ
which yields immediately η_λ = χ(g)^w_∂_0γ(λ)⟨Ω_0,π_0(ℱ^χ_λ)Ω_0⟩ = χ(g)^w_∂_0γ(λ) since λ is a closed string, see (<ref>).
§.§ Symmetries
§.§.§ Charge conservation
For any χ∈Ĝ, let δ^χ be the *-derivation on formally given by ∑_v[^χ_v,·]. Similarly, for any g∈ G, let δ^g be the *-derivation given by ∑_f[_f^g,·]. Let α^χ_s, respectively β^g_s be the corresponding groups of automorphisms. A slight extension of the proof of Proposition <ref> yields the following proposition:
For all χ∈Ĝ and all g∈ G,
α^χ_s ∘τ_t = τ_t∘α^χ_s, β^g_s∘τ_t = τ_t∘β^g_s,
for all s,t∈.
§.§.§ Charge conjugations
There are two types of conjugations in these models, corresponding to a flux-anti flux exchange or a charge-anti charge exchange. We first define an antilinear transformation θ^μ on by
θ^μ| g⟩ = |g̅⟩,
and extension by antilinearity, for which (θ^μ)^2 =. It is immediate to check that
θ^μ L^g = L^g̅θ^μ, θ^μ T^χ = T^χθ^μ,
for all g∈ G,χ∈Ĝ. The automorphism
Θ^μ(·) = lim_Λ→^2Θ^μ_Λ(·)Θ^μ_Λ,
where Θ^μ_Λ = ⊗_e∈_Λθ_e, acts as
Θ^μ(_v^χ) = _v^χ, Θ^μ(^h) = ^h̅.
A second antiunitary on is given by complex conjugation, namely
θ^ϵ| g⟩ = | g⟩,
and extension by antilinearity. It again squares to the identity but
θ^ϵ L^g = L^gθ^ϵ, θ^ϵ T^χ = T^χθ^ϵ,
for all g∈ G,χ∈Ĝ. It follows that
Θ^ϵ( _v^χ ) = _v^χ, Θ^ϵ( ^h ) = ^h,
where Θ^ϵ is the automorphism of associated with the local θ^ϵ.
For all χ∈Ĝ and all g∈ G,
Θ^♯∘τ_t = τ_-t∘Θ^♯,
where ♯∈{ϵ,μ}.
§.§.§ Duality
The Abelian quantum double models exhibit a duality symmetry that corresponds to the exchange of fluxes with charges. Using the Fourier transform associated with the finite Abelian group G, and the fact that G and Ĝ are isomorphic as
Abelian groups, we can define a duality transformation U on the edge Hilbert space . For clarity we recall the standard definitions.
Since ≅ℓ^2(G)≅ℓ^2(Ĝ), and using the orthogonality relation for characters, we can introduce an orthogonal
basis {|χ⟩|χ∈Ĝ}, labelled by the characters, by requiring ⟨χ|ξ⟩=χ(g). The conventional normalization
then gives:
⟨χ|ξ⟩=|G| δ_χ,ξ, χ,ξ∈Ĝ.
The two bases {|g⟩: g∈ G} and {|χ⟩: χ∈Ĝ} give rise to a unitary transformation U on =ℓ^2(G) such that
v̂ = Uv, v̂(χ) = | G|^-1/2∑_g∈ Gχ(g) v(g).
and with the inverse given by
v(g) = | G|^-1/2∑_χ∈Ĝχ(g) v̂(χ).
As operators on ℓ^2(G), L^h and T^χ take the form
(L^h v)(g) = v(h̅ g), (T^χ v)(g) = χ(g)v(g).
The Fourier transform interchanges their actions on ℓ^2(Ĝ) (up to a complex conjugate)
U L^h U^* v̂ (ξ) = ξ(h) v̂ (ξ), U T^χ U^* v̂ (ξ) = v̂ (χξ).
It follows that the transformed Hamiltonian (⊗ U) H (⊗ U^*) is identical to H upon the replacement of G by Ĝ and the lattice by its dual lattice, and after interchanging λ_ϵ
and λ_μ.
Note that in the cyclic case G=_N, with the characters labelled by m=0,…,N-1, χ_m: j↦ω^mj, with ω=e^2π i/N, U is the usual finite Fourier transform:
U| j⟩ = 1/√(N)∑_k=0^N-1ω^jk| k⟩.
§.§ Dynamics in Hilbert space
The vacuum state remains invariant under the full dynamics τ_t since ω_0∘δ = ω_0. It follows that
τ_t is unitarily implementable in the vacuum representation, namely there is a strongly continuous unitary group t↦ U_0,t on _0 such that
U_0,tπ_0(A)(U_0,t) = π_0(τ_t(A)), U_0,tΩ_0 = Ω_0.
Let K_0 be its self-adjoint generator, normalized so that K_0Ω_0=0:
[K_0,π_0(A)] = π_0(δ(A)).
While the charged states were also invariant under δ^0, this is not the case anymore in the presence of the hopping terms. However, the dynamics is still unitarily implementable in the charged representations. We start with the charged state having one electric charge χ.
The dynamics τ_t is unitarily implementable in the GNS representation of ω_v^χ: There is a strongly continuous unitary group t↦ U_γ,t^χ on _0 such that
U_γ,t^χ(π_0∘Γ_γ^χ)(A)(U_γ,t^χ) = (π_0∘Γ_γ^χ)(τ_t(A)),
for all A∈.
Since the automorphism Γ^χ_γ is strictly local, in the sense that Γ^χ_γ(_Λ)⊂_Λ for any Λ⊂, its action on any Hamiltonian is naturally defined by letting Γ^χ_γ act on every interaction term. Denoting the resulting Hamiltonian Γ^χ_γ(H) and the corresponding derivation δ^Γ^χ_γ(H), we have that
Γ^χ_γ∘δ = δ^Γ^χ_γ(H)∘Γ^χ_γ.
A short calculation yields that
Γ_γ^χ(H^0) = H^0 + (^ι_∂_0γ - ^χ_∂_0γ)
and
Γ_γ^χ(H^ϵ) = H^ϵ + ∑_e∈:
∂ e = {∂_0γ,v}∑_ξ∈Ĝ,ξ≠ι(^ξ_(∂_0γ,e)^ι_v(^χξ_∂_0γ - ^ξ_∂_0γ)
+ ^ξ_(v,e)(^χ_∂_0γ - ^ι_∂_0γ)^ξ_v).
The action of Γ_γ^χ on H^μ is trivial, up to the phase picked by all hopping terms across γ, see (<ref>), resulting in
Γ_γ^χ(H^μ) = H^μ + ∑_e∈γ∑_h∈ G,h≠ 1(
(χ(h)^c(γ,(f,e))-1) ℱ^h_(f,e)^1_f'^h_f + (χ(h)^c(γ,(f',e))-1)ℱ^h̅_(f',e)^1_f^h_f').
Finally, we consider the action of Γ_γ^χ on H^ϵμ. The charge hopping corresponding to the first line of (<ref>) is affected as in (<ref>) since operators are left invariant. The flux hopping corresponding to the second line of (<ref>) if affected in two ways: Firstly as in (<ref>), the hopping terms across the string γ pick up a phase, and secondly the projectors _∂_0γ^ξ are mapped to _∂_0γ^ξχ.
By (<ref>), all terms that contain an ^χ for χ≠ι or a ^g for g≠ 1 leave the vacuum state invariant. The same holds for H^0, and we gather the action of all of them under the notation δ^χ_γ,0. The only terms that have a non-trivial action on ω_0 are supported in a finite neighbourhood of ∂_0γ and given explicitly by
P^χ_∂_0γ = ^ι_∂_0γ
+ ∑_e∈:
∂ e = {∂_0γ,v}^χ_(∂_0γ,e)^ι_v^ι_∂_0γ∈_loc.
Summarizing, we have that
δ^Γ^χ_γ(H) = δ^χ_γ,0+[P^χ_∂_0γ,·],
and ω_0 is invariant under the action of δ^χ_γ,0. We conclude as in (<ref>) that δ^χ_γ,0 is implemented by a self-adjoint operator K_γ,0^χ and so
π_0∘Γ_γ^χ∘δ(A) = [K_γ,0^χ + π_0(P^χ_∂_0γ),π_0∘Γ_γ^χ(A)] K_γ,0^χΩ_0 = 0.
Hence, U_γ,t^χ = t K_γ^χ where K_γ^χ = K_γ,0^χ + π_0(P^χ_∂_0γ).
The Hamiltonian K^χ_γ — and its cousins to be described shortly — will be the main object of the spectral analysis carried out in the next section. Before doing this, we recall that, in the representation π_0∘Γ_γ^χ, the vector Ω_0 corresponds to the state having one electric charge χ at ∂_0γ. That this charge is dynamical is reflected in the fact that the propagator has a non-trivial action on Ω_0 since
K^χ_γΩ_0 = π_0(P^χ_∂_0γ) Ω_0
=Ω_0 + λ_ϵ∑_e:∂_0γ∈∂ eπ_0(^χ_(∂_0γ,e)) Ω_0,
where we used that π_0(^ι_v)Ω_0 = Ω_0 for all v∈.
The results above extend with the obvious modifications to the case of a magnetic charge localized on a face. The case of both an electric charge χ∈Ĝ at vertex v and a magnetic flux g∈ G at face f is similar but requires a little more attention. The GNS representation of the state ω^χ,g_v,f is given by (π_0∘Γ^g_γ∘Γ_γ^χ,_0,Ω_0), where ∂_0γ = v and ∂_0γ= f, as in Figure <ref>. We denote K^χ,g_γ,γ the generator of the dynamics in the GNS representation. It is of the same form as (<ref>), namely
K^χ,g_γ,γ = K^χ,g_γ,γ,0 + π_0(P^χ,g_v,f),
K^χ,g_γ,γ,0Ω_0 = 0,
where P^χ,g_v,f is again strictly local. The action of Γ_γ^g on (<ref>) is simple,
(Γ^g_γ∘Γ^χ_γ)(H^0)-H^0 =
(^ι_∂_0γ - ^χ_∂_0γ)
+(_∂_0γ^1 - _∂_0γ^g),
providing (^ι_∂_0γ + _∂_0γ^1) to P^χ,g_v,f. Secondly, Γ_γ^g adds phases to the hopping terms of (<ref>) that cross γ with only
∑_e∈:
e = ⟨∂_0γ,v⟩χ(g)^-c((∂_0γ,e),γ)^χ_(∂_0γ,e)^ι_v^ι_∂_0γ
not leaving ω_0 invariant. Furthermore, the only non-trivial action of Γ_γ^g on Γ_γ^χ(H^μ) given in (<ref>) is at the end of the dual string ∂_0γ, which adds
∑_e∈:
e ∈∂∂_0γ∩∂ fχ(g)^c(γ,(∂_0γ,e))^g_(∂_0γ,e)^1_f^1_∂_0γ.
to P^χ,g_v,f.
Finally, (Γ^g_γ∘Γ^χ_γ)(H^ϵμ) acts that act non-trivially on ω_0 if and only if ∂_0γ, ∂_0γ belong to the same site, namely ∂_0γ∈∂_0γ. In that case, there are four different possible hopping terms of either form above, as illustrated in Figure <ref>.
As expected, the see that in a two-particle state, the χ particle exhibits nearest neighbour hopping on the set of vertices, the g particle exhibits nearest neighbour hopping on the set of faces, and the hopping of the composite particle is to the neighbouring sites. The hopping of each type of single particle is influenced by the presence of the other type in its immediate vicinity.
§ SPECTRAL ANALYSIS IN THE ONE-PARTICLE SECTORS
§.§ The Hamiltonian in one- and two-particle subspaces
We introduced in Section <ref> the derivations corresponding to the number operators. In the GNS representations discussed above, the derivation is implemented by the commutator with a self-adjoint operator, analogous to the number operator on Fock space. Let us first recall the definition of ^ζ_Λ in Proposition <ref>. We define
^Ĝ_Λ = ∑_ζ∈Ĝ^ζ_Λ∈.
If ∂_0γ∈Λ, then
Γ_γ^χ(^Ĝ_Λ) = ^Ĝ_Λ + (^ι_∂_0γ - ^χ_∂_0γ).
In the vacuum representation, the limit
N_0^Ĝ = _Λ→π_0(^Ĝ_Λ)
defines an unbounded self-adjoint operator with a dense domain for which N_0^ĜΩ_0 = 0. It follows that the derivation lim_Λ→[_Λ^Ĝ,·] is implemented in the GNS space of ω_∂_0γ^χ by
N^Ĝ = N_0^Ĝ + π_0(A^ι_∂_0γ - A^χ_∂_0γ).
In particular, N^ĜΩ_0 = π_0(A^ι_∂_0γ)Ω_0 = Ω_0. Had we not summed over Ĝ, the same sequence of ideas would have given a generator N^ζ for any ζ∈Ĝ with the property that N^ζΩ_0 = δ_ζ,χΩ_0.
Replacing ^χ's by ^g's, we obtain a second number operator denoted N^ G and such that N^ GΩ_0=0. Finally,
N = N^Ĝ + N^ G
is the total number operator.
Two charged states differing only by the position of the particle are unitarily equivalent and the intertwiner of representations is explicit. (<ref>) shows that if T_v→ v' = π_0(^χ_γ(v'→ v)), then T_v→ v' (π_0∘Γ_v^χ)(A) T_v→ v' provides a GNS representation of ω_v'^χ on _0. The corresponding string does however not satisfy the gauge fixing condition. As shown in <cit.>, this can be remedied by introducing an additional unitary intertwiner V^χ which is explicitly given as a limit, in the weak operator topology, of operators corresponding to closed strings. In particular, V^χΩ_0 = Ω_0. Precisely,
Γ^χ_γ'(A) = lim_n→∞(_v,v',n^χ) (^χ_γ(v'→ v))Γ^χ_γ(A)
^χ_γ(v'→ v)_v,v',n^χ
for all A∈_loc, and ω_0((_v,v',n^χ) A _v,v',n^χ) = ω_0 as well as V ^χ= _n→∞π_0(_v,v',n^χ), where _v,v',n^χ are illustrated in Figure <ref>. We conclude that
(_0, π_0∘Γ_γ^χ, T_v→ v'Ω_0)
is a GNS representation of ω_v'^χ, with the gauge fixed as prescribed.
For notational clarity and simplicity, we denote the vectors T_v→ v'Ω_0 of _0 in the representation π_0∘Γ_γ^χ by {|χ,v'⟩:v'∈} and let _χ⊂_0 be the space they span; in particular, Ω_0 = |χ,v⟩. They satisfy
N|χ,v⟩ = |χ,v⟩
for all v∈ and we refer to them as one-particle states. The vector |χ,v⟩ corresponds to a state having exactly one charge χ localized at vertex v. The same holds for the dual picture, yielding one-particle vectors {| g,f'⟩:f'∈} of _0 in the representation π_0∘Γ^g_γ, for any g∈ G.
Finally, in the GNS space of the states ω^χ,g_v,f, the corresponding vectors {| (χ,v), (g,f)⟩:v∈,f∈} are such that N| (χ,v), (g,f)⟩ = 2| (χ,v), (g,f)⟩ and we refer to their span _χ,g⊂_0 as a two-particle subspace. In fact, _χ,g is completely characterized by
ψ∈_χ,g ⟺ Nψ = 2ψ and N^χψ = ψ, N^gψ = ψ.
We note here, and shall use it later, that
_χ,g≃ℓ^2(^2×^2).
We also point out that the transportability of charges remains simple in the two-particle state. Indeed, while operators corresponding to intersecting strings and dual strings do not commute, the corresponding automorphisms do so: Γ_γ^g((_v,v',n^χ) (^χ_γ(v'→ v))Γ_γ^χ(A) ^χ_γ(v'→ v)_v,v',n^χ) = (_v,v',n^χ) (^χ_γ(v'→ v)) (Γ^g_γ∘Γ_γ^χ)(A) ^χ_γ(v'→ v)_v,v',n^χ. Hence,
(_0, π_0∘Γ^g_γ∘Γ_γ^χ, T^χ_v→ v'Ω_0)
is a GNS representation of ω^χ,g_v',f, with the gauge fixed as prescribed.
Since charge is conserved, we obtain the following:
Let K^χ,g_γ,γ be the GNS Hamiltonian introduced in (<ref>). Then
K^χ,g_γ,γ_χ,g⊂_χ,g.
We now concentrate our attention on the Hamiltonian restricted to this two-particle (respectively one if either χ = ι or g = 1) invariant subspace. The fact that the GNS representation and K^χ,g_γ,γ are explicit allows us to compute all relevant matrix elements, allowing for a spectral study of the model.
§.§ A matrix representation of the Hamiltonian
To start with an easy case, we first consider (<ref>), denote again v = ∂γ, and compute
⟨χ,v_1 | K_γ^χ |χ,v⟩ = ⟨χ,v_1 | K_γ^χ | Ω_0 ⟩
=⟨χ,v_1 |Ω_0⟩ + λ_ϵ∑_e:v∈∂ e⟨χ,v_1 |π_0(^χ_(v,e)) Ω_0⟩
If v≠ v_1, then
⟨χ,v_1 | χ,v⟩ = ⟨π_0(^χ_γ(v_1→ v))Ω_0 |Ω_0⟩ = ω_0(^χ_γ(v_1→ v))
vanishes since π_0(^χ_γ(v_1→ v)) adds one pair of particles to the existing Ω_0. More formally, since χ≠ι, there is g∈ G such that χ(g)≠ 1; the invariance of ω_0 under the action of ^g_λ for any closed dual path λ and (<ref>) together yield that for any A∈,
ω_0(^χ_γ(v_1→ v)) = ω_0((^g_λ)^χ_γ(v_1→ v)^g_λ) =
χ(g)ω_0(^χ_γ(v_1→ v))
whenever λ winds once around v but not around v_1, and so ω_0(^χ_γ(v_1→ v)) = 0 indeed.
For the same reason, ⟨χ,v_1 |π_0(^χ_(v,e)) Ω_0⟩ is non-zero only if ^χ_γ(v_1→ v) = ^χ_(v,e) (in which case it is equal to 1) namely γ(v_1→ v) = (v_1,e). As could have been expected from the basic picture of a single particle freely hopping on the lattice, we conclude that the one-particle Hamiltonian reduces to a multiple of the discrete Laplacian:
⟨χ,v_1 | K_γ^χ |χ,v_2⟩=
λ_ϵ if d(v_1,v_2)=1,
1 if v_1 = v_2,
0 otherwise.
The same holds for any other type of particle, with the hopping amplitude adjusted accordingly. In the following, we shall renormalize the Hamiltonian by replacing K_γ^χ→ K_γ^χ-.
In the two-particle situation, it will be convenient to insist on the representation of the lattice using sites. We first rescale the lattice so that vertices are on v∈(4)^2 and faces lie on f∈(4+2)^2. The sites are then labelled by (2+1)^2. Physically, they correspond to the coordinates of the center of mass of pairs of particles, which we denote
X = 1/2(f+v) ∈ (2+1)^2.
Their relative position is given by the complementary coordinate
d = 1/2(f-v)∈ (2+1)^2,
and a general two-particle wavefunction is given by ψ(X,d) in ℓ^2((2+1)^2×(2+1)^2).
§.§ Dirac anyons
We now consider a two-particle state having a charge χ∈Ĝ at v∈ and a charge g∈ G at f∈. We let λ^ϵ = λ^μ = λ to ensure that the duality symmetry holds, and denote λ^ϵμ=ρ. We shall label the Hamiltonian K^χ,g_λ,ρ. As we shall see, the anyonic nature of the composite particle will reveal itself in the appearance of a non-trivial spectrum.
Let us first consider the case λ = 0, ρ = 1. Let S = {(1,1),(1,-1),(-1,1),(-1,-1)}. The results of Section (<ref>), see also Figure <ref>, imply that the subspace ℓ^2((2+1)^2× S) is invariant for K^χ,g_0,1, and that its orthogonal complement is the kernel of the Hamiltonian. After Fourier transforming with respect to the variable X, we conclude that, for k∈^2,
K^χ,g_0,1(k) = 2
[ 0 cos(2k_y) cos(2k_x) 0; cos(2k_y) 0 0 χ(g) cos(2k_x); cos(2k_x) 0 0 cos(2k_y); 0 χ(g) cos(2k_x) cos(2k_y) 0; ].
As discussed earlier, the phase χ(g) is accumulated by the hopping of the particles across each other's string, which happens only in the case (1,-1)↔(-1,-1), see again Figure <ref>. We obtain four bands given explicitly by
E^χ,g_0,1(k) = ±2√(cos^2(2k_x)+cos^2(2k_y)±|cos(2k_x)cos(2k_y)|√(2+2Reχ(g)))).
Generically, this exhibits a Dirac cone at (π/4,π/4), see Figure <ref>. The case χ(g) = -1, which arises for example for G = _2, is special in that two sheets are exactly degenerate.
The case χ(g) = 1 is trivial with dispersion relation ± 2cos(2k_x)±2cos(2k_y). It corresponds to simple bosons with no phase being accumulated as the strings cross each other. Unsurprisingly maybe, the anyonic nature of the quasi-particles manifests itself in the spectrum of the two-particles Hamiltonian.
The Dirac cone is a consequence of the duality symmetry, and it is not stable under the breaking of the symmetry. If we consider an asymmetric hopping by giving a different weight to the two terms of (<ref>), namely (
ℱ^χ_(v,e)ι_v'χ_v + ℱ^χ_(v',e)ι_vχ_v'
)(_f^h + _f'^h) and (1+m)(
ℱ^h̅_(f,e)^1_f'^h_f + ℱ^h̅_(f',e)^1_f^h_f'
)(_v^χ + _v'^χ), with m>0, the dispersion relation then reads
E^(χ,g)_0,1(k) = ±√(| c(k_x)|^2+| c(k_y)|^2±| c(k_x)|| c(k_y)|√(2+2Reχ(g))).
where c(s) = 2 s + (1+m)-2 s opening up a gap of size 2 m at the Dirac point, see Figure <ref>.
§.§ Bound states and scattering states.
The dynamics discussed above is that of a strictly bound pair of a flux and a charge. In the presence of the additional terms producing independent hoppings of the charge and the flux, we now show that the bound pair may become unstable and decay into two freely moving particles scattering away from each other.
First of all we prove that, in the extreme case ρ = 0 and λ≠ 0, there is no bound state of the two particles at all. The restriction of H^ϵ+H^μ to the invariant space _χ,g is immediately read off (<ref>,<ref>). As in Section <ref>, it reduces to a simple discrete Laplacian, up to the phase picked up whenever the χ particle crosses the string γ associated with the g flux and reciprocally. After subtraction of the constant, we obtain
K^χ,g_1,0(k) = 2cos(2 k_x)Δ⊗+2 cos(2k_y) ⊗Δ
+2cos(2 k_x) (χ(g) σ^+ + χ(g)σ^- - σ^x) ⊗Θ,
acting on the fibers ℓ^2(2+1)⊗ℓ^2(2+1) and corresponding to the dynamics of the relative coordinate. Here
(Δψ)(z) = ψ(z-2) + ψ(z+2)
for any z∈ 2 + 1 and Θ is the multiplication operator by the characteristic function of {j∈2+1,j<0}. In the last term, σ^♯ are the Pauli matrices acting in the space spanned by |±1⟩ (as a function in ℓ^2(2 + 1), the vector | m⟩ for m∈2 + 1 is the normalized sequence whose only non-zero element is at m), and this term amounts to replacing the trivial phase accumulated along a hopping by χ(g), respectively χ(g), whenever the two strings cross.
Let k≠(π/4,π/4) (modπ/2). The pure point spectrum of K^(χ,g)_1,0(k) is empty.
We recall the setting of <cit.>, which is very close to the current situation. For j=1,2, let T^A_j∈(ℓ^2((2+1)^2)) be the magnetic translations in the direction of the unit vectors e_j, associated with a magnetic vector potential A: (2+1)^2×(2+1)^2→:
(T_e_jψ)(x) = - A(x,x+2e_j)ψ(r+2e_j).
Here A is so that -A(x,y) = A(y,x). A simple calculation yields that (T_e_j) = (T_e_j)^-1 = T_-e_j. They satisfy the following commutation relations
T_e_j^-1T_e_k^-1T_e_jT_e_k = -ϕ_(e_k,e_j),
where
ϕ_(e_k,e_j)(x) = A(x,x-2e_j) + A(x-2e_j, x-2e_j-2e_k) - A(x-2e_k,x-2e_k-2e_j) - A(x,x-2e_k)
is naturally interpreted as the flux through the face centred at x-e_k-e_j∈(2)^2; In particular it is equal to zero whenever j=k. Note that -ϕ_(e_k,e_j) is to be understood as the corresponding multiplication operator.
The magnetic Hamiltonian is given by
H = c_1(T_e_1 + T_-e_1) + c_2(T_e_2 + T_-e_2),
where c_1,c_2 are real constants. Let q(x) = ⟨ x,x⟩, where ⟨,⟩ is the restriction of the Euclidean inner product to (2+1)^2. Let now
A = [H,q].
We observe that for any function f,
[T_e_j,f] = (D_e_jf)T_e_j
where (D_e_jf)(x) = f(x+2e_j) - f(x), and that
D_e_jD_e_kq = 8 ⟨ e_j,e_k⟩.
A computation now yields that
/8[H, A] = -∑_j,k=1^2(T_e_j-T_-e_j) c_j ⟨ e_j,e_k⟩ c_k(T_e_k-T_-e_k) + C,
where
C = ∑_j, k=1^2(c_jc_k)(D_e_kq)[T_e_j + T_-e_j,T_e_k] + (c_jc_k)(D_-e_kq)[T_e_j + T_-e_j,T_-e_k]
is only non-zero because of the non-commutativity of the magnetic translations, since
[T_e_j,T_e_k] = ( - -ϕ_(-e_j,-e_k)))T_e_jT_e_k.
Let us now consider the specific case K^χ,g_1,0(k), namely
c_1 = 2cos(2k_x), c_2 = 2cos(2k_y), - A(x,x+2e_j)=χ(g) δ_j,1δ_x_1,-1δ_x_2<0.
Here, the magnetic vector potential corresponds to a flux tube through the plaquette at (0,0). Hence, the factor 1 - -ϕ_(∓ e_j,∓ e_k)(x) appearing in C does not vanish if and only if x± e_j± e_k = (0,0). In particular, it vanishes if x∉ S and hence C is a finite rank operator.
We now note that q(x) = ‖ x‖^2 is constant on S and hence (D_e_kq)(x) vanishes for all (e_k,x) such that ϕ_(-e_j,-e_k)(x)≠ 0. It follows that C=0 and
/8[K^χ,g_1,0(k), A] = -∑_j=1^2c_j^2(T_e_j-T_-e_j)^2 = ∑_j=1^2c_j^2(T_e_j-T_-e_j)(T_e_j-T_-e_j),
which is the sum of two non-negative, but mutually non-commuting, terms. The triangle inequality yields
| ((T_e_j-T_-e_j)ψ)(x)|≥||ψ(x+2e_j)| - |ψ(x-2e_j)||
=| ((T_e_j^0-T_-e_j^0)|ψ|)(x) |,
where T_e_j^0 are translation operators with A=0. This is a discrete version of the diamagnetic inequality. Hence,
1/8⟨ψ,[K^χ,g_1,0(k), A]ψ⟩≥∑_j=1^2c_j^2‖ (T_e_j^0-T_-e_j^0)|ψ|‖^2
and it suffices to show that Ker(T_e_j^0-T_-e_j^0) = {0} to rule out pure point spectrum. That is immediate since the only square summable solution of
((T_e_j^0-T_-e_j^0)ψ)(x) = ψ(x+2e_j)-ψ(x-2e_j) = 0
is the zero function.
We now turn to the full Hamiltonian K^χ,g_λ,ρ in the two-particle sector. Let P be the orthogonal projection onto the space spanned by |±1⟩. Then
K^χ,g_0,1(k) = cos(2 k_x)σ^x⊗(σ^z+P)+2 cos(2k_y) P ⊗σ^x
+cos(2k_x)(χ(g) σ^+ + χ(g)σ^-) ⊗(P-σ^z),
which, combined with K^χ,g_1,0(k) given in (<ref>), yields the full Hamiltonian.
For any k∈^2, let R_λ(k) = 4 λ(|cos(2k_x)| + |cos(2k_y)|). Then
σ_ess(K^χ,g_λ,ρ(k)) = [-R_λ(k),R_λ(k)],
in particular, the essential spectrum is independent of ρ.
Since K^χ,g_λ,ρ(k) = K^χ,g_λ,0(k) + K^χ,g_0,ρ(k), the independence of the essential spectrum on the parameter ρ follows from the fact that K^χ,g_0,ρ(k) is a finite rank perturbation. It therefore suffices to consider (<ref>), which is the magnetic operator with a simple flux tube considered in Proposition <ref>. The claim follows from Section 2 of <cit.>: The vector potential given here is gauge equivalent to the Aharonov-Bohm gauge à and therefore K^χ,g_λ,0(k) is unitarily equivalent to the operator K̃^χ,g_λ,0(k) given by magnetic translations with à replacing A. If we now denote K_λ,0(k) the operator corresponding to A=0 (it does not depend on (χ,g) indeed), then K̃^χ,g_λ,0(k) - K_λ,0(k) is compact by Proposition 3 in <cit.>. Hence the essential spectrum of the full K^χ,g_λ,ρ(k) equals that of K_λ,0(k), which is a sum of two independent discrete Laplacians, concluding the proof.
We conclude with a proof that K^χ,g_λ,ρ(k) has bound states for a range of parameters λ,ρ. If λ>0 then in particular K^χ,g_λ,ρ(k) has a bound state for all ρ>0, in a neighbourhood of the two lines (k_x,π/4) and (π/4,k_y).
Let | 1+ρ/λ|>1 and let k_x≠π/4 (modπ/2). Then there is a neighbourhood of (k_x,π/4) such that if k∈, then K^χ,g_λ,ρ(k) has four possibly degenerate eigenvalues; The corresponding eigenstates are exponentially localized.
First of all,
K^χ,g_λ,ρ(k_x,π/4) = λcos(2k_x) { (χ(g) σ^+ + χ(g)σ^-)⊗(2Θ + ρ/λ(P-σ^z))
+ 2Δ⊗𝕀 + σ^x⊗(-2Θ+ ρ/λ(P+σ^z)) }.
As should be expected, this operator is diagonal in the second tensor factor. Therefore, it suffices to search for eigenstates of the form ψ⊗| j⟩ for any j∈ 2+1. Then K^χ,g_λ,ρ(k_x,π/4) ψ⊗| j⟩ = 2λcos(2k_x) (Δ_j^χ,gψ) ⊗|j⟩, where the matrix elements of Δ_j^χ,g are
(Δ_j^χ,g)_m,n =
1 if | m-n| = 2 and (| m|,| n| )≠ (1,1)
b_j if (m,n) = (-1,1)
b_j if (m,n) = (1,-1)
0 otherwise
and the values of b_j are given by
b_j = χ(g) if j<-1
χ(g)(1+ ρ/λ) if j=-1
(1+ ρ/λ) if j=1
1 otherwise
This is amenable to a transfer matrix analysis. If ψ is an eigenvector of Δ_j^χ,g for the eigenvalue E, then the vector ϕ given by ϕ_n = (ψ_2n+1,ψ_2n-1)^T solves
Tϕ_n = ϕ_n+1,
T = [ E -1; 1 0 ]
for all n∈∖{-1,0}, with boundary condition given by
ϕ_0 =
[ E/b_j -1/b_j; 1 0 ]ϕ_-1, ϕ_1 =
[ E -b_j; 1 0 ]ϕ_0,
namely
ϕ_1 = B_jϕ_-1,
B_j = [ (E^2-| b_j|^2)/b_j -E/b_j; E/b_j -1/b_j ].
The two eigenvalues of the transfer matrix are equal to τ_±=1/2(E±√(E^2-4)) with eigenvectors v_±= (
τ_±,1)^T. The eigenvector gives rise to a solution of the eigenvalue equation that decays exponentially at +∞, respectively -∞, if the corresponding eigenvalue has modulus <1, respectively >1. Both necessarily happen simultaneously since τ_+τ_- = 1. If | E|>2, then τ_± are real with τ_+>1. Otherwise τ_- = τ_+ and hence |τ_±| = 1. Therefore, a normalizable solution of the eigenvalue equation may only exist if | E|>2. In that case, we set ϕ_1 = α v_- for some α≠ 0 and ϕ_-1 = v_+ and the boundary condition (<ref>) reduces after elimination of α to an equation for the energy
(E^2 - | b_j|^2)τ_+^2 =2 Eτ_+ - 1
or equivalently
| b_j|^2 = τ_+^2.
Since |τ_+|>1, we conclude that a solution exists if and only if | b_j|>1, which in turn holds if and only if j=± 1 and | 1+ ρ/λ| >1. The eigenvalues are given by
E = τ_+ +τ_- = ±(B + B^-1), B = | 1+ ρ/λ|,
each of them being doubly degenerate since | b_1| = | b_-1|.
If | 1+ ρ/λ| >1, the rest of the spectrum of Δ_j^χ,g lies in [-2,2] and corresponds to oscillatory solutions. In particular, the spectrum of K^χ,g_λ,ρ(k_x,π/4) is characterized by a gap g(k_x) given by
g(k_x) = 2λ|cos(2k_x) |(B + B^-1 -2),
and g(k_x)>0 for all k_x≠π/4 (modπ/2). Since the operator-valued function k↦ K^(χ,g)_λ,ρ(k)∈(ℓ^2((2+1)^2)) is smooth, the existence of four branches of eigenstates in a neighbourhood of (k_x,π/4) away from the degenerate points k_x≠π/4 (modπ/2) is ensured by spectral perturbation theory.
A similar, and simpler, analysis can be carried out around (π/4,k_y). In that case, the Hamiltonian reduces to
K^χ,g_λ,ρ(π/4,k_y) =2 λcos(2k_y) ( ⊗Δ + ρ/λ P ⊗σ^x)
which is now diagonal with respect to the first factor. It is a simple Laplacian (and therefore has no bound state) on the range of - P, while
K^χ,g_λ,ρ(π/4,k_y)P⊗ = 2 λcos(2k_y) P⊗(Δ + ρ/λσ^x)
which is of the same form as above, with b_±1→ 1+ρ/λ. We conclude again that two bound states exist for any k_y provided | 1+ρ/λ|>1 and they are stable away from the degenerate points.
§.§ Acknowledgements
Based upon work supported by the National Science Foundation under grants DMS–1813149 and DMS–21083901 (B.N. & S.V.). S.B. was supported by NSERC of Canada. This work was initiated while B.N. and S.B. were attending the `Spectral Methods in Mathematical Physics' program held at the Institut Mittag-Leffler, April 2019. BN gratefully acknowledges kind hospitality at the Technical University Munich during the final stages of this work and the Alexander von Humboldt Foundation for support provided through a Carl Friedrich von Siemens Research Award.
unsrt
|
http://arxiv.org/abs/2303.06831v1
|
20230313032250
|
Fluctuations-Induced Quantum Radiation and Reaction from an Atom in a Squeezed Quantum Field
|
[
"Matthew Bravo",
"Jen-Tsung Hsiang",
"Bei-Lok Hu"
] |
quant-ph
|
[
"quant-ph",
"gr-qc",
"hep-th"
] |
[email protected]
Department of Physics, University of Maryland, College Park, Maryland 20742, USA
[email protected]
Center for High Energy and High Field Physics, National Central University, Taoyuan 320317, Taiwan, R.O.C.
[email protected]
Maryland Center for Fundamental Physics and Joint Quantum Institute, University of Maryland, College Park, Maryland 20742, USA
In this third of a series on quantum radiation, we further explore the feasibility of using the memories (nonMarkovianity) kept in a quantum field to decipher certain information about the early universe. As a model study, we let a massless quantum field be subjected to a parametric process for a finite time interval such that the mode frequency of the field transits from one constant value to another. This configuration thus mimics a statically-bounded universe, where there is an in and out state with the scale factor approaching constant, not a continuously evolving one. The field subjected to squeezing by this process should contain some information of the process itself. If an atom is coupled to the field after the parametric process, its response will depend on the squeezing, and any quantum radiation emitted by the atom will carry this information away so that an observer at a much later time may still identify it. Our analyses show that 1) a remote observer cannot measure the generated squeezing via the radiation energy flux from the atom because the net radiation energy flux is canceled due to the correlation between the radiation field from the atom and the free field at the observer's location. However, 2) there is a chance to identify squeezing by measuring the constant radiation energy density at late times. The only restriction is that this energy density is of the near-field nature and only an observer close to the atom can use it to unravel the information of squeezing. The second part of this paper focuses on 3) the dependence of squeezing on the functional form of the parametric process. By explicitly working out several examples we demonstrate that the behavior of
squeezing does reflect essential properties of the parametric process. In fact, striking features may show up in more complicated processes involving various scales. These analyses allow us to establish the connection between properties of a squeezed quantum field and details of the parametric process which does the squeezing. Therefore, 4) one can construct templates to reconstitute the unknown parametric processes from the data of measurable quantities subjected to squeezing. In a sequel paper these results will be applied to a study of quantum radiations in cosmology.
Fluctuations-Induced Quantum Radiation and Reaction
from an Atom in a Squeezed Quantum Field
Bei-Lok Hu0000-0003-2489-9914
March 30, 2023
===============================================================================================
=18pt
§ INTRODUCTION
This paper is the third of a series on quantum radiation, in the form of emitted radiation with an energy flux (distinct from thermal radiance felt by an accelerated atom, as in the Unruh effect <cit.>) from the internal degrees of freedom (idf) of an atom, tracing its origin to the vacuum fluctuations of a quantum field, including its back-reaction on the idf dynamics of the atom, in the form of quantum dissipation. In <cit.> two of us considered how vacuum fluctuations in the field act on the idf of an atom (we may call this the `emitter'), modeled by a harmonic oscillator. We first showed how a stochastic component of the internal dynamics of the atom arises from the vacuum fluctuations of the field, resulting in the emittance of quantum radiation. We then show how the back-reaction of this quantum radiation induces quantum dissipation in the atom's idf dynamics. We explicitly identified the different terms representing these processes in the Langevin equations of motion. Then, using the example of a stationary atom, we show how in this simple case the absence of radiation at a far away observation point where a probe (or detector – note the so-called Unruh-DeWitt `detector' <cit.> is an emitter in the present context) is located is actually a result of complex cancellations of the interference between emitted radiation from the atom's idf and the local fluctuations in the free field. In so doing we point out that the entity which enters into the duality relation with vacuum fluctuations is not radiation reaction[In the quantum optics literature, e.g., <cit.>, the relation between quantum fluctuations and radiation reaction is often mentioned without emphasizing the difference between classical radiation reaction <cit.> and quantum dissipation, which exist at two separate theoretical levels. Only quantum dissipation enters in the fluctuations-dissipation relation with quantum fluctuations, not classical radiation reaction.], which can exist as a classical entity, but quantum dissipation <cit.>. In the second paper <cit.> we considered the idf of the atom interacting with a quantum scalar field initially in a coherent state. We showed how the deterministic mean field drives the internal classical mean component to emit classical radiation and receive classical radiation reaction. Both components are statistically distinct and fully decoupled. It is clearly seen that the effects of the vacuum fluctuations of the field are matched with those of quantum radiation reaction, not with classical radiation reaction, as the folklore goes, even promulgated in some textbooks. Furthermore, we identified the reason why quantum radiation from a stationary emitter is not observed, and a probe located far away only sees classical radiation.
§.§ Quantum Radiation from an Atom in a Squeezed Quantum Field
In this paper we treat quantum radiation from an atom's idf interacting with a quantum field in a squeezed state. The squeezed state is probably the most important quantum state, next to the vacuum state, with both rich theoretical meanings and broad practical applications, as well-known in quantum optics. (See, e.g., <cit.>). We are particularly interested in its role in cosmology of the early universe.
Quantum field squeezed by an expanding universe
Squeezed states of a quantum field are naturally produced in an expanding universe in fundamental processes which involve the parametric amplification of quantum fluctuations, such as particle creation <cit.>, either spontaneous production from the vacuum or stimulated production from n-particle states, and structure formation <cit.> from quantum fluctuations of the inflaton field. From relics such as primordial radiation and matter contents observed today, with the help of theoretical models governing their evolution, one attempts to deduce the state of the early universe at different stages of development. In addition to particle creation and structure formation we add here another fundamental quantum process, namely, quantum radiation. One can ask questions like, if such radiation of a quantum nature is detected, how can one use it to reveal certain quantum aspects of the early universe? Revealing secrets of the early universe by digging out information stored in the quantum field is
in a similar spirit as the quest we initiated about the nonMarkovianity of the universe through the memory kept in the quantum field <cit.>.
§.§ Three components: Radiation, Squeeze, Drive
Towards such a goal we carry out this investigation which involves three components: 1) Quantum radiation 2) Squeezed state, 3) Driven dynamics, either under some external force or as provided by an expanding universe, which describes how the squeeze parameter changes in time. Part 1) was initiated in <cit.> and continued in <cit.>, where the required technical tools for the present investigation can be found.
Part 2) is performed here: we consider a quantum field in a squeezed state with a fixed squeeze parameter, regarded as the end state of the quantum field after being squeezed under some drive protocol or cosmological evolution. For the description of squeezed states we shall follow the descriptions in our earlier paper <cit.>. Under the classification of the three types of squeezing described there, we shall adhere to the first type, namely, with fixed squeezing. The second type of dynamical parametric squeezing will be treated in our sequel cosmological papers. We shall set aside the third type of squeezing due to finite coupling between the system (here the atom's idf) and the environment (here the quantum field) completely.
To see more explicitly what Part 3) entails, consider a situation where the atom at the initial time t_i is in a quantum field in a squeezed state with a fixed squeeze parameter ζ_i and the same atom at the final time t_f in a squeezed field with a different squeeze parameter ζ_f. If an atom emits quantum radiation at either or both the initial and the final times, comparing the signals from both should tell us something about how the drive had affected the atom through the quantum radiation emitted from the atom, or in cosmology, how the universe had evolved as measured by the parametric squeezing of the field. The more challenging situation is if it turns out that there is no emitted quantum radiation from an atom in a squeezed field. This is what our next work intends to find out.
§.§ Our objectives, in two stages
We wish to ask questions in the same spirit as in <cit.>: can we extract information about the history of the quantum field which had undergone a parametric process from the responses of an atom coupled to it in the epoch after the parametric process? In particular, for observers (receivers) situated far away from the atom (emitter) whether they can detect radiations emitted from the atom of a quantum nature. Quantum radiation is of special interest as it originates from the vacuum fluctuations of a quantum field, and is expected to keep some memories of the parametric process it went through. In a cosmological context it acts as a carrier of quantum information about the early universe.
We divide our program of quantum radiation in cosmology into two stages, phrased as two questions. A) Is there emitted quantum radiation from a stationary atom in a quantum field with a fixed squeeze parameter? If there is no emitted quantum radiation, then question B) Is there emitted quantum radiation from a stationary atom in a quantum field subjected to a changing squeeze parameter, such as in an expanding universe? If so, what kind of evolutionary dynamics would produce what types of emitted radiation and with what magnitudes? The first stage addresses components 1) and 2) listed above, the second stage, components 2) and 3), which will be continued in a follow-up paper.
Radiation pattern as template for squeezing
This paper operates in the first stage, with a set up meant for a statically-bounded universe, not the continuously evolving type such as in the Friedmann–Lemaître–Robertson–Walker (FLRW) or the inflationary universe. The first half answers the first question A),
and the second half of this paper examines the response of the atom coupled to a field that had undergone a parametric process earlier. This evokes the template idea, i.e., one can use the response of the atom, coupled to the field in the out-region, to identify the dependence of the squeeze parameter on the earlier parametric process before the out-region. In the cosmology context, this offers a way for a late time observer of such quantum phenomena to uncover how the universe had evolved in much earlier times.
Stress-energy tensor of squeezed field
To answer the central question A), we use a simplified model in which the quantum field undergoes a parametric process of finite duration, such as under an external drive for a definite period of time, or in an asymptotically stationary (statically bounded) universe. The field could be a quantized matter or graviton field, or an inflaton field whose quantum fluctuations engender cosmological structures.
Then we calculate the expectation value of the stress-energy tensor of the radiation field emitted by an atom coupled to a free field in a fixed two-mode squeeze state. In order to identify the unambiguous signals and conform to the typical settings, we focus on the late-time results. We learned from our earlier work <cit.> for a quantum field in the vacuum state that the procedure for checking this is quite involved, as it entails both the radiation flux emitted from the atom as detected at the spacetime point of the probe, and an incoming flux from infinity.
§.§ Key steps and major findings
The answer we found after calculating all relevant contributions for an atom in a quantum field in a squeezed state shows that there is no net radiation flux, same as in <cit.>. This is a consequence of relaxation dynamics of the atom's internal dynamics when it is coupled to the squeezed field <cit.>. However, if the probe can measure the radiation energy density, it should obtain a residual constant radiation energy density at late time. Its value will fall off like the inverse cubic power of the distance between the probe and the atom. Thus it is more like a near-field effect. Nonetheless this energy density has an interesting characteristic: it depends on the squeeze parameter, which is what we are after.
Thus, our investigation turns to whether and how the squeeze parameter of the field after the parametric process would depend on the details of the process. We first show that the squeeze parameter can formally be expressed by the fundamental solutions of the parametrically driven field, the latter contains useful information about the process. Then by working out several examples numerically we can make the following observations:
* For a monotonically varying process, the squeeze parameter has a monotonic dependence on the duration of this process; it does not depend on when the process starts, if we fix the duration.
* The magnitude of squeezing is related to the rate of change in the process. That is, large squeezing can be induced from a non-adiabatic transition. This is consistent with our understanding of spontaneous particle creation from parametric amplification of vacuum fluctuations <cit.> and that copious particles can be produced at the Planck time under rapid expansion of the universe <cit.>. Thus we expect that non-adiabatic processes may contribute to larger residual radiation energy density around the atom.
* For a non-monotonic parametric process, various scales in the process induces richer structure to the behavior of the squeeze parameter. In particular, if the parametric process changes with time sinusoidally at some frequency range, it may induce parametric resonance and yield exceptionally large squeezing in the out-region.
Similar considerations can likewise be applied to the frequency spectrum of the squeeze parameter of the field in the out-region. One can then examine its dependence on the parametric process which the field has gone through. This illustrates the way to obtain templates in how the squeeze parameter is related to the parametric process, and how certain information of the unknown parametric process can be inferred from these templates.
§.§ Organization
The paper is organized as follows. In Sec. <ref>, as a prerequisite, we briefly summarize our earlier results on the relaxation process of the atom-field interaction, and pose the questions we would like to answer in this paper. In Sec. <ref>, we lay out the formalism and the essential tools for detailing the nonequilibrium evolution of the atom's internal dynamics and the squeezed field when they are coupled together. In Sec. <ref> we study the general spatial-temporal behavior of the energy flux and the energy density of the radiation field and examine their late-time behaviors. In Sec. <ref> we turn to the functional dependence of the squeeze parameter on the functional form of the parametric process. Several examples are provided to illustrate the formal analysis. In Sec. <ref> we give some concluding remarks. Appendix <ref> offers a succinct summary of the two-mode squeezed state. In Appendices <ref> and <ref>, we offer more details on the late-time, large distance behaviors of the energy flux and the energy density of the radiation field. In Appendices <ref>, we discuss the time-translational invariance of the squeeze parameter in the out-region.
§ SCENARIO: QUANTUM RADIATION IN ATOM-FIELD SYSTEMS
Classical radiation is a familiar subject. But what is its quantum field origin? Can one trace back its link all the way to quantum fluctuations? We obtained partial answers in our last two papers to this question for a harmonic atom interacting with a quantum field in a vacuum and in a coherent states. This paper deals with a squeezed field, necessary for treating cosmological quantum processes. Since fluctuation-induced quantum radiation is not a household topic yet, it might be useful to first provide a physical picture of the global landscape of quantum radiation based on our understanding from previous works, setting the stage for the current work.
It has been shown that <cit.> when the internal degree of freedom, modeled as a harmonic oscillator, of an atom (called a harmonic atom) in any initial state, is linearly coupled to a massless linear scalar field in the stationary state, its motion will settle down to an equilibrium state. The presence of this equilibrium state, from the perspective of the atom, implies a balance of energy exchange between the atom and the environmental field. Expectantly, the radiation generated by the nonequilibrium motion of the atom's internal degree of freedom propagates outward to spatial infinity. It is lesser known whether and how, from the perspective of the field, the radiation energy from the atom is balanced. In our previous works <cit.>, we have demonstrated that the correlation between the outward radiation field and the local free field at spatial infinity constitutes an inward energy flow to balance the outward radiation energy flow. Furthermore this inward flux serves to supplement the needed energy around the atom for the field to drive the atom's internal motion. Thus we clearly see how energy flows from the atom to spatial infinity and then back-flows to the atom. This is a consequence of the nonequilibrium fluctuation-dissipation relations <cit.> for the atom's internal degree of freedom and the free field. This is a stronger condition than the conservation of energy. This point is better appreciated once we take the global view of the total system, composed of the atom and field. The entire system is closed and the total energy is conserved, but this does not guarantee the energy exchange between two subsystems is balanced unless the reduced dynamics is fully relaxed to an equilibrium state.
If, instead, the internal degree of freedom of the atom is initially coupled to the quantum field in a nonstationary state, like the squeezed state, then will the nonstationary nature of the field prevent the internal degree of freedom from approaching an equilibrium state? We have shown that <cit.> when the (mode-dependent) squeeze parameters is time-independent, the atom's internal degree of freedom still settles down to an equilibrium state in the long run. The stationary components of the covariance matrix elements or the energy flows decay exponentially fast to time-independent constants as in the previous case, but the additional nonstationary components fall off to zero. The mechanisms that account for the late-time behavior of the stationary and the nonstationary components seem to be quite distinct. For the stationary components, it is a consequence of dissipation dynamically adapting to the driving fluctuations from the environment, but for the nonstationary components, cancellation due to fast phase variations in the nonstationary terms plays the decisive role. In contrast, from the viewpoint of the squeezed field, what is the nature of radiation emitted from the atom, and can this outward energy flux at distances far away from the atom find a corresponding inward flux at late times such that there is no net energy output to spatial infinity, as proven for the case of a stationary field? If so, what makes it possible?
These questions are of particular interest in a cosmological setting for the consideration of fundamental issues described in the Introduction. There, evolution of the universe parametrically drives the ambient quantum field into a squeezed state. The extent of squeezing may depend on the characteristics of the parametric process actuated by the evolution of the background universe. When an atom is coupled to such a field, emitted radiation from the atom should carry the information of squeezing of the field, which in turn may reveal the evolution history of the universe.
As a prerequisite to addressing these issues, in this paper we will examine a simpler configuration that may cover the essential features. Consider in Minkowski spacetime, a massless scalar field undergoes a parametric process such that each mode frequency changes smoothly from one constant value, say ω_i, to another ω_f, for example, as shown in Fig. <ref>. The parametric process occurs during the time interval t_a≤ t≤ t_b. In the out-region (t≥ t_b) of the process, an atom is coupled to the squeezed field at time t_0. The nonequilibrium evolution of the internal degree of freedom of the atom then generates outward radiation, which after time r will reach a detector (like a satellite around the earth) far distance r away from the atom. The detector may measure the time variation of the energy flux. The corresponding signal will be extracted and amplified to sieve out the information regarding the parametric process of the field occurred earlier.
§ MASSLESS SCALAR FIELD INTERACTING WITH A HARMONIC ATOM
For the case of a massless scalar field ϕ coupled to a static atom, with its internal degree of freedom χ represented by a harmonic oscillator, we have the following Heisenberg equations of motion
χ̈̂̈(t) + ω_b^2 χ̂(t) = e/mϕ̂(0, t) ,
(∂_t^2 - ∇^2 )ϕ̂(x, t) =e δ^(3)(x) χ̂(t) ,
where the atom is located at the origin of the spatial coordinates x in a 3+1 Minkowski spacetime. The parameter e denotes the coupling strength between the internal degree of freedom of the atom and the field, and ω_b is the bare frequency of the oscillator. Solving the equation of motion of the field (<ref>) yields
ϕ̂(x, t) = ϕ̂_h(x, t) + e ∫_0^tds G^(ϕ)_R, 0(x, t ; 0, s) χ̂(s) ,
where the homogeneous part ϕ̂_h(x, t) gives the free field while the integral expression represents the radiation field emitted by the atom. The retarded Green's function G^(ϕ)_R, 0(x, x') of the free field is defined by
G^(ϕ)_R, 0(x, x') =i θ(t-t') [ϕ̂_h(x), ϕ̂_h(x')]=1/2πθ(τ) δ (τ^2 - R^2) ,
where x=(x,t), τ=t-t', R=|x-x'|, and θ(τ) is the Heaviside unit-step function. In the special case R → 0 which is met for a single Brownian oscillator, we instead have
G^(ϕ)_R, 0(t, t')= - 1/2πθ(τ) δ'(τ) .
Here we have suppressed the trivial spatial coordinates 0. The superscript of the Green's function indicates the operator by which the Green's function is constructed, while the 0 in the subscript reminds that the Green's function of interest is associated with a free operator; otherwise it is an interacting operator. For example, G^(ϕ)_R, 0(τ) refers to the retarded Green's function of the free field while G^(χ)_R(τ) is the retarded Green's function of the interacting χ.
Plugging Eq. (<ref>) into the equation of motion (<ref>) for the atom's internal degree of freedom, we get
χ̈̂̈(t) + ω_b^2 χ̂(t) - e^2/m∫_0^tds G^(ϕ)_R, 0(t, s) χ̂(s) = e/mϕ̂_h(0, t) .
This is the generalized quantum Langevin equation for χ̂(t) – it has included backreactions of the environmental field in terms of the noise force on the righthand side and the integral expression on the left hand side. As has been identified in (<ref>), the latter is the reaction force due to emitted radiation which retards the motion of the atom's internal degree of freedom.
Suppose the free field has a Markovian spectrum, we can reduce (<ref>) into a local form
χ̈̂̈(t) + 2γχ̇̂̇(t) + ω^2_r χ̂(t) = e/mϕ̂_h(0, t) ,
and the oscillation frequency is renormalized to a physical value ω_r. Since we want to examine the nature of radiation and its late time behavior in relation to the atom's internal dynamics in a self-consistent way, we need the field expression (<ref>) written in terms of the solution to the equation of the reduced dynamics (<ref>)
χ̂(t) = χ̂_h(t) + e∫_0^tds G^(χ)_R(t-s) ϕ̂_h(0, s) ,
where the retarded Green's function associated with χ̂ has the form
G^(χ)_R(τ)=1/mΩ e^-γτsinΩτ ,
with Ω=√(ω_r^2-γ^2), and χ̂_h(t) is the homogeneous part. Eq. (<ref>) always implies
d/dt[m/2⟨χ̇̂̇(t)⟩+mω_r/2⟨χ̂^2(t)⟩]=P_ξ(t)+P_γ(t) ,
where P_ξ(t) is the power delivered by the free field fluctuations
P_ξ(t)=e/2⟨{ϕ̂_h(0,t), χ̇(t)}⟩ ,
and P_γ(t) represents the rate of energy lost due to dissipation
P_γ(t)=-2mγ ⟨χ̇^2(t)⟩ .
We have shown <cit.> that even if the scalar field is initially in a nonstationary squeezed thermal state, the internal dynamics of the atom will still settle down to an asymptotic equilibrium state, where, in particular,
P_ξ(t)+P_γ(t)=0 .
This is a stronger condition than (<ref>), which reflects energy conservation of the reduced dynamics.
From (<ref>) and (<ref>), the full interacting field is then given by
ϕ̂(x) = ϕ̂_h(x) + e ∫_0^t dt' G^(ϕ)_R, 0(x, t ; 0, t')[χ̂_h(t') + e∫_0^t' ds G^(χ)_R(t'-s) ϕ̂_h(0, s) ] .
It will turn out convenient to split the full interacting field into three physically distinct components, ϕ̂(x)=ϕ̂_h(x)+ϕ̂_tr(x)+ϕ̂_br(x) with
ϕ̂_tr(x) =e ∫_0^t dt' G^(ϕ)_R, 0(x, t ; 0, t') χ̂_h(t') ,
ϕ̂_br(x) =e^2∫_0^t dt' G^(ϕ)_R, 0(x, t ; 0, t')∫_0^t' ds G^(χ)_R(t'-s) ϕ̂_h(0, s) ,
where ϕ̂_tr(x) is the transient term associated with the atom's transient internal dynamics and ϕ̂_br(x) is the backreaction field correlated with ϕ̂_h(x) everywhere.
§.§ Hadamard function
At this point, we have not specified the state of the field. For the reason that will be explained in Sec. <ref>, we assume the initial state of the field the atom interacts with is a time-independent two-mode squeezed thermal state, for which the field's density matrix has the form
ρ̂_tmst = ∏_kŜ_2^(ζ_k) ρ̂_βŜ^†_2(ζ_k)
where ρ̂_β is the thermal density matrix of the free field at temperature T_b=β^-1, and Ŝ_2(ζ_k) is the two-mode squeeze operator, with squeeze parameter ζ_k = η_k e^iθ_k, defined by
Ŝ_2(ζ_k)=exp[ζ^*_k â_+k^â_-k^-ζ_k â_+k^†a_-k^†] .
For the reader's convenience we have collected the essential properties of the two-mode squeezed state in Appendix <ref>. Here we will assume that the squeeze parameter is mode-independent to simplify the arguments.
If the free field has the plane-wave expansion
ϕ̂_h(x) = ∫d^3 k/(2π)^3/2 1/√(2ω)[â_k e^ik· x + â^†_k e^-ik· x] ,
with k· x = -ω t + k·x and ω=|k|, then the free field's Hadamard function for this two-mode squeezed thermal state has the form
G^(ϕ)_H, 0(x, x') = ∫d^3 k/(2π)^3 1/4ω βω/2 e^ik·(x-x') [cosh2η e^-iω(t-t') -sinh2η e^iθe^-iω(t+t')]+ C.C. .
After carrying out the angular integration, we arrive at the following decomposition
G^(ϕ)_H, 0(x, x') = G^(ϕ),st_H, 0(x, x') + G^(ϕ),ns_H, 0(x, x') ,
with
G^(ϕ),st_H, 0(x, x') = ∫_-∞^∞dω/2π cosh2η βω/2 sin(ω|x-x'|)/4π|x - x'| e^-iω(t-t') ,
G^(ϕ),ns_H, 0(x, x') =-∫_0^∞dω/2π sinh2η βω/2 sin(ω|x-x'|)/4 π|x-x'| e^-iω(t+t')+i θ + C.C. .
Observe that the Hadamard function has an extra component that is not invariant under time translation, so we call it the nonstationary component of the Hadamard function. This is distinct from the case we consider in <cit.>. The emergence of this component is a consequence of the field being squeezed. We shall discuss its dynamical origin in Sec. <ref>. This nonstationary nature of the free field's Hadamard function will impact on the dynamical evolution of the atom's internal dynamics because the Hadamard function governs the statistics of the noise force sourcing (<ref>), which naturally raises the concern whether the internal dynamics can ever equilibrate. As was mentioned earlier, it turns out the atom's internal motion can still relax to an equilibrium, meaning time-translation invariant, state. Details of derivations and discussions on this point can be found in Ref. <cit.>.
Eq. (<ref>) or (<ref>) is the essential ingredient used to express the Hadamard function G^(ϕ)_H(x, x') of the interacting field, which we will need to evaluate the stress-energy tensor. Following the decomposition laid out before (<ref>), the interacting field's Hadamard function is given by
G^(ϕ)_H (x,x') = 1/2⟨{ϕ̂_h(x), ϕ̂_h(x') }⟩ + 1/2[⟨{ϕ̂_h(x), ϕ̂_br(x')}⟩ + ⟨{ϕ̂_br(x), ϕ̂_h(x')}⟩]
+ 1/2⟨{ϕ̂_br(x), ϕ̂_br(x') }⟩ + 1/2⟨{ϕ̂_tr(x), ϕ̂_tr(x') }⟩ ,
where
1/2⟨{ϕ̂_h(x), ϕ̂_h(x') }⟩ = G^(ϕ)_H, 0(x,x') ,
1/2⟨{ϕ̂_h(x), ϕ̂_br(x')}⟩ =e^2∫_0^t' ds_1' G_R, 0^(ϕ)(x', t' ;0, s_1')∫_0^s_1' ds_2' G_R^(χ)(s_1' - s_2') G_H, 0^(ϕ) (x, t; 0, s_2') ,
1/2⟨{ϕ̂_br(x), ϕ̂_br(x') }⟩ =e^4∫_0^t ds_1∫_0^t'ds_1' G_R, 0^(ϕ)(x,t;0, s_1) G^(ϕ)_R, 0 (x', t'; 0, s_1')
×∫_0^s_1 ds_2∫_0^s_1' ds_2' G_R^(χ)(s_1 - s_2)G_R^(χ)(s_1' - s_2') G^(ϕ)_H, 0(0, s_2 ; 0, s_2') ,
1/2⟨{ϕ̂_tr(x), ϕ̂_tr(x') }⟩ =e^2/2∫_0^t ds∫_0^t' ds' G_R, 0^(ϕ)(x,t; 0 , s) G_R, 0^(ϕ)(x', t'; 0 , s') ⟨{χ̂_h(s) , χ̂_h (s') }⟩ .
The second group inside the square brackets is of special interest because it describes the correlation between the radiation field and the free field at any location outside the atom. We do not see such counterpart in classical electrodynamics because in classical field theory, there is no vacuum state to establish any correlation with the radiation field. Here the correlation must be present because 1) the internal dynamics of the atom, which emits the radiation, is driven by the free field at the atom's location and 2) the free field has nonvanishing correlation among any spacetime interval. Note that we are in the Heisenberg picture, so the expectation values are evaluated with respect to the initial state of both subsystems. The contribution in (<ref>) can be ignored at late times due to its transient nature. In addition, we also note that these four components are at most linearly proportional to G^(ϕ)_H, 0(x,x'). Thus, at least before t-r≫γ^-1, the interaction field is expected to behave like a squeezed field to some extent.
For later convenience, we introduce a shorthand notation for an expression which comes up frequently,
L_ω(x, t) = ∫_0^t ds_1 G^(ϕ)_R, 0(x, t-s_1)∫_0^s_1 ds_2 G^(χ)_R(s_1 - s_2) e^-iω s_2 .
After we carry out the integrations, we find its explicit form is given by
L_ω(x, t) =θ(t - r) G_R^(χ)(ω) {G_R, 0^(ϕ)(x; ω) e^-iω t - e^-γ(t - r)/4πΩ r[(ω+iγ) cosΩ(r-t) + i Ω sinΩ(r-t)] } ,
where we have used the identity for the Fourier transform of G_R, 0^(ϕ)(x,τ;0, 0)
G_R, 0^(ϕ)(x; ω)=e^iω r/4π r
with r=|x|. The convention of the Fourier transformation we adopt is
f(t)=∫_-∞^∞dω/2π f̃(ω) e^-iω t .
At times t≫ r, we find that the dominant term in (<ref>) is given by
L_ω(x, t) =θ(t - r) G_R^(χ)(ω) G_R, 0^(ϕ)(x; ω) e^-iω t .
These are convenient snippets that will greatly simplify the analysis of the late-time behavior of the expectation values of the energy-momentum stress tensor of the interacting field. Henceforth, we will proceed with the analysis separately for the contributions due to the stationary and the nonstationary components of G^(ϕ)_H, 0(x,x').
At late times, the explicit expressions for the stationary and nonstationary components of the Hadamard functions of the free field and the interacting field ϕ become relatively simple. The interacting field's Hadamard function can likewise be decomposed into a stationary and a nonstationary component, G^(ϕ)_H(x, x') = G^(ϕ),st_H(x, x') + G^(ϕ),ns_H(x, x'), and
G^(ϕ),st_H(x, x') = G^(ϕ),st_H, 0(x, x')+e^2∫_-∞^∞dω/2π {G^(ϕ),st_H, 0(x, 0;ω) G_R^(χ)*(ω) G_R, 0^(ϕ)*(x'; ω).
+. G^(ϕ),st_H, 0(x', 0;ω) G_R^(χ)(ω) G_R, 0^(ϕ)(x; ω)} e^-iω (t-t')+C.C.
+e^2∫_-∞^∞dω/2π cosh2η βω/2 G^(ϕ)_R, 0(x, ω) G^(ϕ) *_R, 0(x', ω) ImG^(χ)_R(ω) e^-iω(t-t')+C.C. ,and
G^(ϕ),ns_H(x, x') =G^(ϕ), ns_H, 0(x, x')-e^2∫_0^∞dω/2π sinh2η βω/2 G^(χ)_R(ω)
×{sin(ω|x|)/4 π|x| G^(ϕ)_R, 0(x'; ω)+sin(ω|x'|)/4 π|x'| G^(ϕ)_R, 0(x; ω)} e^-iω (t+t')+iθ+C.C.
-e^4∫_0^∞dω/2π ω/4π sinh2η βω/2 G^(χ) 2_R (ω) G^(ϕ)_R, 0(x; ω) G^(ϕ)_R, 0(x'; ω) e^ -i(ω(t+t')+iθ+C.C. ,
where
G^(ϕ),st_H, 0(x, 0;ω)≡G^(ϕ),st_H, 0(x;ω)=cosh2η βω/2 sin(ω|x|)/4π|x|=cosh2η βω/2 ImG_R, 0^(ϕ)(x; ω) .
The energy momentum stress tensor of the interacting field is then constructed via the Hadamard function G^(ϕ)_H(x, x'). Analyses of the late-time energy flow of the field at distances far away from the atom resulting from the atom-field interaction are contained in Appendices <ref> and <ref>. A general discussion of the spatial-temporal behavior of the stress-energy tensor due to the radiation field emitted from the atom follows in the next section.
§ STRESS-ENERGY TENSOR DUE TO THE RADIATION FIELD
The expectation value of the energy-momentum stress tensor due to the radiation field is defined by
⟨ΔT̂_μν(x)⟩ = lim_x'→ x{∂^2/∂ x^μ∂ x'^ν - 1/2g_μν g^αβ∂^2/∂ x^α∂ x'^β}[ G^(ϕ)_H (x,x') - G^(ϕ)_H, 0(x,x') ]
with the signature of g_μν being (-,+,+,+). Here we have subtracted off the contribution purely from the free field, which is irrelevant to the atom-field interaction. Due to symmetry, it has no dependence on the azimuthal angle ϑ and the polar angle φ of the spherical coordinate system, so the stress-energy tensor already reduces to
L1.0T⟨ΔT̂_μν⟩ =
⟨ΔT̂_tt⟩ ⟨ΔT̂_tr⟩ 0 0
⟨ΔT̂_rt⟩ ⟨ΔT̂_rr⟩ 0 0
0 0 0 0
0 0 0 0
.
Then we will focus on the components ⟨ΔT̂_tr⟩ and ⟨ΔT̂_tt⟩ that are relevant to our following discussions.
Here the analysis is not limited to the large-distance and the late-time limits, so that we can have a more complete, global view of the energy flow and energy density of the field caused by the atom-field interaction. We will put the analysis in those specific regimes in Appendices <ref> and <ref>.
Since in our configuration the coupling between the harmonic atom and the massless scalar field takes a different form from that between the point charge and the electromagnetic fields, it would be more illustrative if we first quickly go over the elementary derivations of the continuity equation and the total atom-field Hamiltonian in the classical regime to highlight their differences.
From the equation of motion of the scalar field (<ref>), if we multiply both sides by ∂_tϕ, we obtain a local form of the continuity equation
∂_tu_ϕ+∇·S_ϕ=𝗉 ∂_tϕ ,
where 𝗉(x,t)=e δ^(3)(x) χ(t) serves as the point dipole associated with the atom, and we identify the field energy density u_ϕ and the field momentum density S_ϕ respectively by
u_ϕ(x,t) =1/2[∂_tϕ(x,t)]^2+1/2[∇ϕ(x,t)]^2 , S_ϕ(x,t) =-∂_tϕ(x,t) ∇ϕ(x,t) .
The unusual issue with the right hand side of the continuity equation (<ref>) is best appreciated when we compare with the corresponding equation for the electromagnetic fields
∂_t u+∇·S =-J·E , with u =1/2E^2+1/2B^2 , S =E×B ,
where J is the current density and the corresponding current is equal to eẋ for a point charge at the location x. The electric field E field is defined by E=-∇A^0-∂_tA and the magnetic field B by B=∇×A. Here A^0 is the scalar potential and A is the vector potential. Thus the right hand side of (<ref>) should bear a similar interpretation as -J·E, which is usually understood as the dissipation of the field energy due to the work done by the field on the charge. That is, it is the opposite of the power delivered by the Lorentz force. However, there are a few subtle catches: 1) In classical field theory, we seldom consider the free field component of the field equation, and we never have vacuum field fluctuations, so the electromagnetic fields in (<ref>) are usually assumed to be the field generated by the charge. In contrast, the quantum scalar field ϕ under our consideration is a full interacting field, comprising of the free field and the radiation field emitted by the atom. Thus the right hand side of (<ref>) will contain an extra contribution associated with the free field fluctuations. 2) The right hand side of (<ref>) does not correspond to the net power delivered by the field to the internal degree of freedom of the atom, which is e ϕ(0,t) ∂_tχ(t), apart from a renormalization contribution, according to the right hand side of (<ref>). Then the interpretation of the right hand of (<ref>) is not so straightforward, even though it has a form of the dipole interaction, similar to the right hand side of (<ref>).
We may trace such a feature to the Hamiltonian. The Hamiltonian H_χϕ associated with the Lagrangian of the atom-field interacting system
L_χϕ=m/2 χ̇^2-mω_b^2/2 χ̇^2+∫_Vd𝒱 e δ(x)χ(t)ϕ(x,t)+∫_Vd𝒱 {1/2[∂_tϕ(x,t)]^2-1/2[∇ϕ(x,t)]^2} ,
under our consideration is given by
H_χϕ=m/2 χ̇^2+mω_b^2/2 χ̇^2-e χ(t)ϕ(0,t)+∫_Vd𝒱 {1/2[∂_tϕ(x,t)]^2+1/2[∇ϕ(x,t)]^2} ,
where we implicitly assume that χ̇(t) and ϕ̇(x,t) are functions of the respective canonical momenta, p(t) and π(x,t). The quantity V denotes the whole spatial volume on a fixed time slice. Since the whole atom-field system forms a closed system, the total energy is conserved, so we have dH/dt=0,
d/dtH_χϕ(t)=0 =χ̇(t){mχ̈(t)+mω_b^2χ(t)-e ϕ(x,0)}
+∫_Vd𝒱 [-e δ(x)χ(t) ∂_tϕ(x,t)+d/dt{1/2[∂_tϕ(x,t)]^2+1/2[∇ϕ(x,t)]^2}] .
Note how the derivative of the interaction term is distributed, and further observe that the contribution inside of the first pair of curly brackets gives zero, following the equation of motion (<ref>). It actually has a nice interpretation. Following the derivations of (<ref>) and (<ref>), it accounts for the reduced dynamics of the atom's internal degree of freedom, and, from the atom's perspective, describes the energy exchange between the atom and the surrounding quantum field.
The integral on the right hand side of (<ref>), on the other hand, describes the energy exchange from the field's perspective, and thus gives zero too. In the integrand, we see the presence of the same dipole interaction term e δ(x)χ(t) ∂_tϕ(x,t) that appears on the righthand side of (<ref>). At first sight it may seem odd that the dipole interaction term is solely responsible for the change of the field energy. However, we can further show
d/dtH_χϕ(t)=0=∫_Vd𝒱 ∇·[∇ϕ(x,t) ∂_tϕ(x,t)]=-∮_∂ Vd𝒜·S(x,t) .
It says that there is no flux entering from or leaving to spatial infinity because the boundary ∂ V of the space volume V is at spatial infinity. It is a rephrase of energy conservation in a closed system, so there is no inconsistency. On the other hand, Eq. (<ref>) is too restrictive because V is the total volume. The differential form of the continuity equation (<ref>) is more suitable to see the energy distribution in the field.
In contrast to (<ref>), the Hamiltonian for the interacting system of a point charge and the electromagnetic field is
H_xA=m_b/2 ẋ^2+m_bω^2/2 x^2+1/2∫_Vd𝒱 (E^2+B^2) .
It does not have the interaction term manifestly if the Hamiltonian is not expressed in terms of the canonical momentum of the charge. However, it is consistent with the observation that -J·E is opposite to the power delivered by the Lorentz force.
Now we discuss the general result of ⟨ΔT̂_μν⟩ that will be valid for t>r at any location distance r away from the atom, so we come back to the manipulation of quantum operators. We first compute ⟨ΔT̂_tr⟩.
§.§ General behavior of field energy flux
If we write ϕ̂_r(x,t) as
ϕ̂_r(x,t)=e∫_0^tds G_R,0^(ϕ)(x,t;0,s) χ̂(s)=e/4π r θ(t-r) χ̂(t-r) ,
which explicitly shows that the radiation field is a retarded Coulomb-like field emitted by a source at an earlier time t-r. Note that the simple expression of the radiation field like (<ref>) is not obtainable if the field has a non-Markovian spectrum.
With the help of (<ref>), we obtain
1/2⟨{∂_tϕ̂_r(x,t), ∂_rϕ̂_r(x,t)}⟩ =-(e/4π r)^2⟨χ̂'^2(t-r)⟩-(e/4π r)^21/2r⟨{χ̂'(t-r), χ̂(t-r)}⟩ ,
for t>r, where a prime denotes taking the derivative with respect to the function's argument. If we compute the energy flow associated (<ref>), across any spherical surface of radius r centered at the atom, we get
∫_∂ Vd𝒜 1/2⟨{∂_tϕ̂_r(x,t), ∂_rϕ̂_r(x,t)}⟩ =-2mγ ⟨χ̂'^2(t-r)⟩-mγ/r ⟨{χ̂'(t-r), χ̂(t-r)}⟩
=P_γ(t-r)-mγ/r ∂_t⟨χ̂^2(t-r)⟩ ,
where we have used the substitution e^2=8πγ m. The first term has a special significance. From <cit.>, we know that P_γ(t) is the energy the atom's internal degree of freedom loses to the surrounding field due to damping. Thus the first term tells that the energy lost by the atom at time t-r takes time r to propagate to a location at a distance r away from the atom. It is the only contribution in (<ref>) that may survive at spatial infinity.
The contribution from the cross terms need a little more algebraic manipulations, but it gives
1/2⟨{∂_tϕ̂_h(x,t), ∂_rϕ̂_r(x,t)}⟩+1/2⟨{∂_tϕ̂_r(x,t), ∂_rϕ̂_h(x,t)}⟩
=1/4π r^2 P_ξ(t-r)-e^2/4π r^2∂/∂ t∫_0^t-rds G_R^(χ)(t-r-s) G_H,0^(ϕ)(x,t;0,s) ,
in which the integral in the last expression is nothing but
e^2∫_0^t-rds G_R^(χ)(t-r-s) G_H,0^(ϕ)(x,t;0,s)=e/2⟨{χ̂(t-r), ϕ̂_h(x,t)}⟩ .
Here P_ξ(t) is the power the free quantum field fluctuations deliver to the atom's internal dynamics at time t at the atom's location. Then we find the incoming energy flow given by
∫_∂ Vd𝒜 [1/2⟨{∂_tϕ̂_h(x,t), ∂_rϕ̂_r(x,t)}⟩+1/2⟨{∂_tϕ̂_r(x,t), ∂_rϕ̂_h(x,t)}⟩]
=P_ξ(t-r)-∂/∂ t[e/2⟨{χ̂(t-r), ϕ̂_h(x,t)}⟩] .
Combining (<ref>) and (<ref>), we thus have
⟨ΔT̂_tr⟩=1/4π r^2{P_ξ(t-r)+P_γ(t-r)-∂/∂ t[mγ/r ⟨χ̂^2(t-r)⟩+e/2⟨{χ̂(t-r), ϕ̂_h(x,t)}⟩]} ,
From the relaxation of the reduced dynamics of the atom's internal degree of freedom, outlined in the beginning of Sec. <ref>, we learn that the internal dynamics will reach equilibrium, where P_ξ(t)+P_γ(t)=0 for t≫γ^-1. Hence, from (<ref>), we easily conclude that, for a fixed r, when t-r is much greater than the relaxation time scale, the sum of the dominant terms P_ξ(t-r)+P_γ(t-r) vanishes. At large distance away from the atom, the remaining terms are very small, decaying at least like 1/r^3. It is consistent with our results in Sec. <ref>, where we explicitly show that they actually give zero at late times. Alternatively we may deduce the same conclusion here, since 1) ⟨χ̂^2(t)⟩ will approach a constant at late times as the atom's internal dynamics asymptotically reaches an equilibrium, and 2) with the help of the explicit expression
e/2⟨{χ̂(t-r), ϕ̂_h(x,t)}⟩=-e^2/4π r∫_0^∞dω/2π βω/2 cosh2η∫_0^t-rds G_R^(χ)(t-r-s) sinω r/4π r^2 cosω(t-s) ,
it is not difficult to see that the time derivative of the last term inside the square brackets will vanish at late times.
Thus, the detector away from the atom will not measure any radiation energy flux from the stationary atom at late times even though the atom is coupled to a nonstationary squeezed state.
§.§ General behavior of field energy density
It is also of interest to examine the change of the field energy density at distances far away from the atom resulting from their mutual interactions. Conceptually, the atom's internal dynamics will send out to spatial infinity spherical waves centered at the location of the atom. Due to the quantum nature of the internal dynamics, this radiation wave in general has a random phase and its magnitude is inversely proportional to the distance to the atom. Following our previous discussion, a detector at large but fixed distance away from the atom will receive a net outward energy flux in the beginning, and then it will find the magnitude of the flux rapidly falls off to zero with time. After all these activities settle down, will the earlier energy flux leave any footprint in the space surrounding the atom, say, by shifting the local field energy density, albeit almost imperceptibly? This is what we try to find out in this section.
In the same manner, we will re-write ⟨Δ T_tt⟩, following (<ref>). Other than the overall factor 1/2, we first show
1/2⟨{∂_tϕ̂_r(x,t), ∂_tϕ̂_r(x,t)}⟩+1/2⟨{∂_rϕ̂_r(x,t), ∂_rϕ̂_r(x,t)}⟩=-2×1/4π r^2{P_γ(t-r)+∂/∂ r[mγ/r ⟨χ̂^2(t-r)⟩]} ,
where ∂_tχ(t-r)=-∂_rχ(t-r). Here due to the minus sign up front, this contribution tends to grow to a positive value at late times. We further note that the same expression P_γ(t-r) also appears in the component (<ref>) of ⟨ΔT̂_tr(t)⟩ that is purely caused by the radiation field. Thus, we see the outward energy flux due to (<ref>) imparts field energy into the space around the atom.
For the cross terms, we obtain
2×1/2 ⟨{∂_tϕ̂_h(x,t), ∂_tϕ̂_r(x,t)}⟩+2×1/2 ⟨{∂_rϕ̂_h(x,t), ∂_rϕ̂_r(x,t)}⟩
=-2×1/4π r^2{P_ξ(t-r)+∂/∂ r[e/2⟨{χ̂(t-r), ϕ̂_h(x,t)}⟩]} .
Following the same argument, the inward energy flux from (<ref>) on the other hand is prone to take away the field energy in the surrounding space.
Together we thus find that the net field energy density outside the atom is given by
⟨ΔT̂_tt⟩=-1/4π r^2{P_ξ(t-r)+P_γ(t-r)+∂/∂ r[mγ/r ⟨χ̂^2(t-r)⟩+e/2⟨{χ̂(t-r), ϕ̂_h(x,t)}⟩]} ,
for t>r>0. This looks very similar to (<ref>), and can be the consequence of the continuity equation. The dominant term in Eq. (<ref>) will vanish at late times, as a consequences of the relaxation of the internal dynamics of the atom, and the behavior of (<ref>) due to the appearance of t-r. Following our earlier arguments, the remaining term, ⟨{χ̂(t-r), ϕ̂_h(x,t)}⟩, on the other hand, becomes a constant at late times, which falls off at least like 1/r^3, as is explicitly shown in Sec. <ref>.
Indeed, Eqs. (<ref>) and (<ref>) enable us to verify the continuity equation
1/r^2∂/∂ r(r^2⟨ΔT̂_tr⟩) =1/4π r^2{∂_rP_ξ(t-r)+∂_rP_γ(t-r)-∂^2/∂ t∂ r[mγ/r ⟨χ̂^2(t-r)⟩+e/2⟨{χ̂(t-r), ϕ̂_h(x,t)}⟩]}
=1/4π r^2{-∂_tP_ξ(t-r)-∂_tP_γ(t-r)-∂^2/∂ t∂ r[mγ/r ⟨χ̂^2(t-r)⟩+e/2⟨{χ̂(t-r), ϕ̂_h(x,t)}⟩]}
=∂/∂ t⟨ΔT̂_tt⟩ ,
for r>0. To include r=0, the location of the atom, we need the form (<ref>) which also takes into account the energy flow into and out of the atom, from the scalar field perspective.
From the considerations presented so far we may now see better how the radiation flux, generated by the internal dynamics of the atom, propagates outward and at the same time intakes the field energy in space outside the atom. Meanwhile, due to the remarkable correlation between the quantum radiation field and the free quantum field, there exists an inward flux. On its way toward the atom, it pulls out field energy stored in the proximity of the atom. From this hindsight, it can be understood that the net power e ϕ(0,t)χ̇(t) delivered by the quantum field to the atom is not equal to the rate of work done to the field e ϕ̇(0,t)χ(t), as can be inferred from (<ref>). Otherwise ⟨ΔT̂_tr⟩ in (<ref>) will simply be proportional to P_ξ(t-r)+P_γ(t-r). Their difference accounts for the field energy density stored in the space for the configuration we have studied.
In summary, the results in this section tell us that at late times the observer will not measure any net energy flow associated with the radiation emitted from the atom driven by the squeezed quantum field, but the observer can still detect a constant radiation energy density, which is related to the squeeze parameter. However, a restrictive condition is that the residual radiation energy density is of the near-field nature, and it falls off with the distance to the atom like 1/r^3. Thus its detection can be difficult at large distances, unless the squeeze parameter is large.
Even with these difficulties, we can still locally identify the squeezing via the response of the atom interacting with the squeezed field.
In the next section we shall discuss how the squeeze parameter depends on the parametric process the quantum field has experienced, such that we may acquire certain information about the process once we have measured the squeeze parameter.
§ FUNCTIONAL DEPENDENCE OF THE SQUEEZE PARAMETER ON THE PARAMETRIC PROCESS
Now we turn to how we may possibly extract from the behavior of the squeeze parameter the information of the parametric process that occurs earlier. To be specific, consider the simple case that a massless quantum Klein-Gordon field in flat spacetime undergoes a parametric process such that the frequency of mode k transits smoothly from one constant value ω_i for 0≤ t≤ t_a to another constant ω_f for t≥ t_b>t_a.
We would like first to show that the quantum field in the out-region behaves as if it is in its squeezed thermal state with a time-independent squeeze parameter ζ_k if the initial state of the field at t=0 is a thermal state. Then we express the squeeze parameter in terms of the Bogoliubov coefficients, a common tool to treat the dynamics of the quantum field in a parametric (time-varying) process. We will also link the squeeze parameter to the fundamental solutions of the equation of motion of the field, in which information of the parametric process is embedded.
We work with the Heisenberg picture, so the field remains in its initial state at t=0. Formally we can expand the field operator ϕ̂(x) in terms of different sets of mode functions. In the out-region, two convenient choices are
u_k^in(x) =1/√(2ω_i) e^ik·x[d_k^(1)(t)-i ω_i d_k^(2)(t)] , u_k^out(x) =1/√(2ω_f) e^ik·xe^-iω_ft ,
where d_k^(i)(t) satisfies the equation d̈_k^(i)+ω^2(t) d_k^(i)(t)=0, and u_k^out(x) is the standard plane-wave mode function in the out-region, while u_k^in(x) represents the mode function which evolves from the plane-wave mode function in the in-region. Thus the field operator may have the expansion
ϕ̂(x) =∑_kâ_k^u_k^in(x)+â_k^†u_k^in*(x) ,
∑_kb̂_k^u_k^out(x)+b̂_k^†u_k^out*(x) , ∑_k =∫d^3k/(2π)^3/2 ,
in the out-region.
We further suppose (b̂_k^,b̂_k^†) are related to (â_k^,â_k^†) by
b̂_+k^=α_+k^ â_+k^+β_-k^* â_-k^† ,
whence the completeness condition implies that the Bogoliubov coefficients α_k, β_k can be parametrized by
α_k =coshη_k , β_-k^* =-e^iθ_k sinhη_k ,
such that
b̂_+k^=coshη_k â_+k^-e^iθ_k sinhη_k â_-k^†=Ŝ_2^†(ζ_k) â_+k^ Ŝ_2^(ζ_k) .
The parametrization (<ref>) can be alternatively implemented by the two-mode squeeze operator Ŝ_2^†(ζ_k). We summarize its properties in Appendix <ref>.
Then a quantity of the field like the Hadamard function in the out-region can be cast into
1/2⟨in|{ϕ̂(x), ϕ̂(x')}|in⟩
=∑_k1/2ω_f[ 1/2⟨in|{b̂_k^, b̂_k^}|in⟩ e^ik·(x+x')e^-iω_f(t+t')+1/2⟨in|{b̂_k^, b̂_-k^}|in⟩ e^ik·(x-x')e^-iω_f(t+t').
+.1/2⟨in|{b̂_k^, b̂_k^†}|in⟩ e^ik·(x-x')e^-iω_f(t-t')+1/2⟨in|{b̂_k^, b̂_-k^†}|in⟩ e^ik·(x+x')e^-iω_f(t-t')+C.C.]
=∑_k1/2ω_f e^ik·(x-x')[ 1/2⟨ζ_k,in^tmsq|{â_k^, â_-k^}|ζ_k,in^tmsq⟩ e^-iω_f(t+t')+1/2⟨ζ_k,in^tmsq|{â_k^, â_k^†}|ζ_k,in^tmsq⟩ e^-iω_f(t-t').
+.C.C.] ,
where |ζ_k,in^tmsq⟩=Ŝ_2^(ζ_k) |in⟩ is the two-mode squeezed state of the initial in-state |in⟩. Thus Eq. (<ref>) gives a Hadamard function in the two-mode squeezed in-state. Although here we use the pure state form, the result can be easily adapted for a mixed state.
On the other hand, the same Hadamard function can be expressed in terms of the in-mode functions, by the expansion
1/2⟨in|{ϕ̂(x), ϕ̂(x')}|in⟩
=∑_k1/2ω_ie^ik·(x-x')(N_k^(β)+1/2)[d_k^(1)(t)-i ω_i d_k^(2)(t)][d_k^(1)(t')+i ω_i d_k^(2)(t')]+C.C. .
If the in-state is a thermal state, then ⟨in|{â_k^, â_k^†}|in⟩ is understood in terms of the trace average, and gives 2N_k^(β)+1, with N_k^(β) being the average number density of the thermal state at temperature β^-1,
N_k^(β)=1/e^βω_i-1 .
Observe the structural similarities between (<ref>) and (<ref>).
To make them more revealing, we evaluate the expectation values on the righthand side of (<ref>),
⟨in|{b̂_+k^, b̂_+k^}|in⟩ =0 , ⟨in|{b̂_+k^, b̂_-k^}|in⟩ =(α_+k^β_+k^*+α_+k^β_-k^*)(2N_k^(β)+1) ,
⟨in|{b̂_+k^, b̂_-k^†}|in⟩ =0 , ⟨in|{b̂_+k^, b̂_+k^†}|in⟩ =(|α_+k^|^2+|β_-k^|^2)(2N_k^(β)+1) .
Thus, Eq. (<ref>) becomes
1/2⟨in|{ϕ̂(x), ϕ̂(x')}|in⟩
=∑_k1/2ω_f e^ik·(x-x')(N_k^(β)+1/2)[ 2α_k^β_k^* e^-iω_f(t+t')+(|α_k^|^2+|β_k^|) e^-iω_f(t-t')+C.C.] .
Comparing this equation with (<ref>) we find
|α_k^|^2+|β_k^|^2 =1/2 [ω_f/ω_i d_k^(1)2(t_f)+ω_fω_i d_k^(2)2(t_f)+1/ω_fω_i ḋ_k^(1)2(t_f)+ω_i/ω_f ḋ_k^(2)2(t_f)] ,
2α_k^β_k^* =1/2ω_iω_f [+i ω_f d_k^(1)(t_f)+ω_iω_f d_k^(2)(t_f)-ḋ_k^(1)(t_f)+i ω_i ḋ_k^(2)(t_f)]
×[-i ω_f d_k^(1)(t_f)+ω_iω_f d_k^(2)(t_f)+ḋ_k^(1)(t_f)+i ω_i ḋ_k^(2)(t_f)] .
These results easily enable us to find the Bogoliubov coefficients α_k, β_k once we have the fundamental solutions d_k^(i)(t) with i=1, 2.
Following the same arguments leading to (<ref>) and (<ref>), if we compute ⟨ϕ̂^2(x)⟩, ⟨π̂^2(x)⟩ and ⟨{ϕ̂(x), π̂(x)}⟩ in the out-region, we obtain that, for each mode
cosh2η_k =1/2[1/ω_fω_i ḋ_k^(1)2(t)+ω_i/ω_f ḋ_k^(2)2(t)+ω_f/ω_i d_k^(1)2(t)+ω_fω_i d_k^(2)2(t)] ,
cos(θ_k-2ω_ft) sinh2η_k =1/2[1/ω_fω_i ḋ_k^(1)2(t)+ω_i/ω_f ḋ_k^(2)2(t)-ω_f/ω_i d_k^(1)2(t)-ω_fω_i d_k^(2)2(t)] ,
sin(θ_k-2ω_ft) sinh2η_k =-[1/ω_i d_k^(1)(t)ḋ_k^(1)(t)+ω_i d_k^(2)(t)ḋ_k^(2)(t)] ,
explicit relations between the squeeze parameters and the fundamental solutions. Here π̂(x) is the canonical momentum conjugated to ϕ̂(x). Eqs. (<ref>)–(<ref>) clearly tell how squeezing may dynamically arise from the parametric process of the field.
As a consistency check, we substitute the coefficients α_k, β_k on the righthand side by (<ref>), and obtain
|α_k^|^2+|β_k^| =cosh2η_k , 2α_k^β_k^* =-e^iθ_ksinh2η_k .
In fact, (<ref>) and (<ref>) only determine α_k, β_k up to a phase factor or a rotation, which we have been ignoring. For example, from (<ref>), we may let
α_k =1/2√(ω_iω_f)[+i ω_f d_k^(1)(t_f)+ω_iω_f d_k^(2)(t_f)-ḋ_k^(1)(t_f)+i ω_i ḋ_k^(2)(t_f)] ,
β_k =1/2√(ω_iω_f)[-i ω_f d_k^(1)(t_f)+ω_iω_f d_k^(2)(t_f)+ḋ_k^(1)(t_f)+i ω_i ḋ_k^(2)(t_f)] ,
and then we can directly show that (<ref>) is recovered and
|α_k^|^2-|β_k^|^2=d_k^(1)(t_f) ḋ_k^(2)(t_f)-ḋ_k^(1)(t_f)d_k^(2)(t_f)=1 .
However, obviously in this case α_k is not real, as (<ref>) implies.
We may recover the missing phase by putting back the rotation operator we have ignored all along. To be more specific, for example, let the rotation operator R̂ be given by
R̂(Φ_i)=exp[iΦ_i(â_i^†â_i^+1/2)] .
We find R̂^†(Φ_i) â_1R̂(Φ_1)=â_1 e^iΦ_1. Then, depending on the order of the rotation operator and the squeeze operator, we may have either
Ŝ_2^†(ζ)R̂^†(Φ_i) â_1R̂(Φ_i)Ŝ_2^(ζ) =e^iΦ_1coshη â_1-e^iΦ_1e^iθsinhη â_2 ,
orR̂^†(Φ_i)Ŝ_2^†(ζ) â_1Ŝ_2^(ζ)R̂(Φ_i) =e^iΦ_1coshη â_1-e^iΦ_2e^iθsinhη â_2 .
We see that there is always a phase ambiguity. In both cases, from (<ref>) and (<ref>), we find α_k will be complex in general, but in principle, we may factor out the overall phase factor for each mode to render α_k real.
Before we proceed further with our analysis, let us examine a few illustrative examples.
Case 1
Consider the parametric process in which the squared frequency ω^2(t) varies with time according to
ω^2(t)=ω_i^2 , 0≤ t≤ t_a ,
ω_i^2+(ω_f^2-ω_i^2) t-t_at_b-t_a , t_a≤ t≤ t_b ,
ω_f^2 , t≥ t_b ,
That is, ω^2(t) is a piecewise-continuous function of time. The time evolution of d_k^(1)(t), d_k^(2)(t) are shown in Fig. <ref>-(b) and -(c), where we observe that the oscillation amplitudes of the two fundamental solutions change by different amounts, implying the occurrence of quantum squeezing. Notice in Fig. <ref>-(d), as t≥ t_b the squeeze parameter η_k becomes a constant, squeezing is very small because cosh2η_k∼1. This small squeezing results from the slow transition rate in the parametric process. The plots (e) and (f) show oscillations of frequency 2ω_f, consistent with expectation. However, from these plots it is hard to tell whether θ_k is time independent. We will take another approach to show it later.
Case 2 In the second example, we choose a non-monotonic parametric process,
ω^2(t)=ω_i^2 , 0≤ t≤ t_a ,
ω_i^2+(ω_f^2-ω_i^2) sin^2[t-t_at_b-t_anπ2] , t_a≤ t≤ t_b ,
ω_f^2 , t≥ t_b .
Here n, an odd integer, gives the number of oscillations of the transition process. Thus the frequency variation is not monotonic. The corresponding plots are shown in Fig. <ref>. Since both processes, though continuous, are not smooth, it allows us to clearly see when the transitions start and end. Compared with Case 1, the non-monotonic transition introduces tumultuous behavior in the fundamental solutions d_k^(i) during the transition, in Fig. <ref>-(b) and -(c), but right after t=t_b, the out mode immediately oscillates at frequency ω_f. Again, we can see the time-independence of η_k in the out-region.
For the simple case we consider here, let us carry out some analysis about the time dependence of the squeeze parameter in the out-region. We may write d_k^(i)(t) for t≥ t_b as
d_k^(1)(t)=d_k^(1)(t_b) cosω_f(t-t_b)+d_k^(2)(t_b) 1/ω_f sinω_f(t-t_b) ,
d_k^(2)(t)=d_k^(1)(t_b) 1/ω_f sinω_f(t-t_b)+d_k^(2)(t_b) cosω_f(t-t_b) .
The amplitudes of d_k^(i)(t) in the out-region are determined by
d_k^(1)(t): [d_k^(1)2(t_b)+d_k^(2)2(t_b)/ω_f^2]^1/2 , and d_k^(2)(t): [d_k^(1)2(t_b)/ω_f^2+d_k^(2)2(t_b)]^1/2 ,
which in turns are determined by the values of the fundamental solution at the end of the parametric process. We readily find that d_k^(1)(t)ḋ_k^(1)(t)-ḋ_k^(1)(t)d_k^(1)(t)=1 for all t even for the parametric process via the Wronskian of the differential equation the mode function satisfies.
According to Eqs. (<ref>), we can show
|α_k^(t)|^2+|β_k^(t)|^2=|α_k^(t_b)|^2+|β_k^(t_b)|^2
for all t≥ t_b. Since |α_k^|^2+|β_k^|^2 is proportional to cosh2η_k, Eq. (<ref>) then shows that η_k is a time-independent constant for all t≥ t_b. On the other hand, with the help of (<ref>) and (<ref>), we find
1/ω_fω_i ḋ_k^(1)2(t)+ω_i/ω_f ḋ_k^(2)2(t)-ω_f/ω_i d_k^(1)2(t)-ω_fω_i d_k^(2)2(t) =A_k sin(2ω_ft_b-2ω_ft)+B_k cos(2ω_ft_b-2ω_ft)
=√(A_k^2+B_k^2) cos(ϑ_k+2ω_ft_b-2ω_ft) ,
with
A_k =2[1/ω_i d_k^(1)(t_b) ḋ_k^(1)(t_b)+ω_i d_k^(2)(t) ḋ_k^(2)(t)] ,
B_k =[1/ω_fω_i ḋ_k^(1)2(t_b)+ω_i/ω_f ḋ_k^(2)2(t_b)-ω_f/ω_i d_k^(1)2(t_b)-ω_fω_i d_k^(2)2(t_b)] .
and
cosϑ_k =B_k/√(A_k^2+B_k^2) , sinϑ_k =-A_k/√(A_k^2+B_k^2) .
From (<ref>) and (<ref>), we see √(A_k^2+B_k^2) is proportional to sinh2η_k, and thus is a time-independent constant. We immediately can identify ϑ_k in Eqs. (<ref>)–(<ref>) to be the same θ_k in (<ref>)–(<ref>). Finally, we may note that (<ref>) still looks slightly different from the lefthand sides of (<ref>)–(<ref>) in the arguments of the trigonometric functions. It results from the choice of the out mode function in (<ref>). The reason for such a choice is that for an observer in the out-region, he has no reference to identify the origin of time coordinate. In addition, the choice of a fixed time origin at most amounts to an absolute phase, which in most cases is of no significance. However, in the current case we are comparing two formalisms. So for consistency's sake, we may define the origin of the time coordinate in the out-region at t_b rather than 0. Simply shifting t in (<ref>) to t→ t-t_b, then (<ref>) will look the same as those in (<ref>)–(<ref>). At this point, we have shown that in the out-region an observer may report on having experienced a quantum field in a squeezed thermal state, with a time-independent squeeze parameter.
The squeeze parameter η_k we showed earlier is quite small because cosh2η_k∼1. This results from the fact that the parametric processes in the previous cases vary mildly. Now we show a case similar to that in Fig. <ref> but with a much sharper transition with ω_i=1, ω_f=100, t_a=3π/2, t_b=3π/2+0.05 and n=1. The plot for cosh2η_k is shown in Fig. <ref>. We see in this case cosh2η_k=25.62206 in the out-region, much larger than the previous two cases. Therefore, it is consistent with the understanding that to generate large squeezing, the parametric process had better not be adiabatic. This is corroborated by our prior knowledge of cosmological particle production.
Finally, as a contrast to the previous piecewise-continuous parametric processes, we consider a sufficiently smooth ω^2(t), such as the thrice differentiable function ω^2(t)
ω^2(t)=-(t-t_a)^4/(t_b-t_a)^7[20t^3-10(7t_b^-t_a^) t^2+4(21t_b^2-7t_b^t_a^+t_a^2) t-(35t_b^3-21t_b^2t_a^+7t_b^t_a^2-t_a^3)] ,
between t=t_a and t=t_b. The corresponding results are shown in Fig. <ref>. We do not discern any difference in the generic behavior, so for the quantities of interest in our present study, the piecewise-continuous ω^2(t) suffices.
The fact that the squeeze parameter becomes time-independent in the out-region implies that this result is time-translation invariant. To be more precise, if we shift the parametric process along the time axis, then as long as the conditions that 1) the observation time t is still in the out-region of the shifted process and 2) the initial time t_i remains in the in-region of the shifted process, are satisfied, the observer at time t will still see the same squeeze parameter. In other words, the observer in the out-region cannot extract from the squeeze parameter any information about when the parametric process starts or ends. At first, it sounds odd that there exists such a time-translation invariance for a nonequilibrium, nonstationary process. We show this in Appendix <ref>; however, after seeing these examples, this result may not appear that dubious. The full evolution from the initial time t_i to the observation time t is not invariant under time translation, but after the parametric process has ended at t_b, the mode functions in the out-region reverts to a sinusoidal time dependence. The time translation in a sinusoidal function of time amounts to a phase shift. Thus, if the quantity of interest is independent of this phase shift, it appears to possess time-translation invariance.
Although in the current configuration the detector in the out-region will sense the same squeeze parameter when the parametric process is shifted along the time axis, the measured results in the detector still depend on the duration t_b-t_a and the functional form of the process. In fact this can be expected from (<ref>)–(<ref>), where the squeeze parameters are expressed in terms of the fundamental solutions, which in turn depend on the functional form of the parametric process in their equation of motion.
For illustrations, Fig. <ref>-(c) shows the dependence of the squeeze parameter η_k on the duration of the parametric process, given by Eq. (<ref>). We fix the starting time t_a of the parametric process and the moment t the measurement in the out-region is performed. We find that the squeeze parameter η_k, defined in (<ref>), is oscillatory but decreases with increasing ending time t_b. Except for the small oscillations, the curve in (c) gives the general trend that the squeezing (as manifested, e.g., in particle pair production), is subdued with a slower transition rate or longer transition duration t_b-t_a. This example shows that this kind of parametric process gives a lower production of particles as it moves toward the adiabatic regime. The mild oscillations may be related to the kinks at t_a and t_b due to the nonsmoothness of ω(t). This may be seen from the observation that the oscillations, as shown in the blow-ups in Fig. <ref>-(c), appear shallower with larger t_b-t_a because the kinks are less abrupt. This argument also find its support from Fig. <ref>-(b) and -(d).
In Fig. <ref>, the dependence of the squeeze parameter η_k on the functional form of the parametric process is shown. We choose three different parametric processes of ω^2(t) for examples. In Fig. <ref>-(a), the process has the piecewise-continuous form given by Eq. (<ref>), so it gives a same result as Fig. <ref>-(c). Fig. <ref>-(b) is described by the smooth transition, Eq. (<ref>). We have the same process, Eq. (<ref>), for Fig. <ref>-(c) and -(d) but with different choices of n. We choose n=11 for (c) and n=1 for (d). Thus in plot (c) the transition does not monotonically vary with time.
Since both Fig. <ref>-(b) and -(d) are associated with smooth parametric processes, when we prolong the duration of the parametric processes by fixing t_a and increasing t_b, we see that the value of η_k monotonically decreases without any ripples. Thus, together with the behavior of the curve in Fig. <ref>-(c), they imply that the ripples in Fig. <ref>-(a) may originate from the non-smoothness of the parametric process at the transition times t_a and t_b.
Among the plots in Fig. <ref>, Fig. <ref>-(c) shows a more interesting behavior. The transition described by (<ref>) with n=11 is sinusoidal, as shown in Fig. <ref>-(a). The squeeze parameter η_k in Fig. <ref>-(c) then reveals more structures, and may signify the presence of resonance, shown by a large peak. It seems to imply that the particle production can be greatly enhanced if the transition duration is tuned to the right value for fixed ω_i and ω_f, as in parametric resonance. This may constitute a mechanism to generate stronger squeezing, in addition to the common one in a runaway setting <cit.>. Another unusual feature is that η_k in Fig. <ref>-(c) is not significantly reduced when we have a larger t_b.
In fact, this resonance feature can be traced back to parametric instability. If we write the equation of motion for a parametric oscillator with the frequency given by (<ref>) into the canonical form
x”(τ)+[a-2q cos(2τ)] x(τ)=0 ,
where a prime represents taking the derivative with respect to τ, Ω t=2τ, and
a =4A^2/Ω^2 , q =2B^2/Ω^2 , Ω =nπ/t_b-t_a , A^2 =ω_f^2+ω_i^2/2 , B^2 =ω_f^2-ω_i^2/2 .
Now compare the stability diagram Fig. <ref>-(a) of (<ref>) with Fig. <ref>-(c). We immediately see that the portion of the curve in Fig. <ref>-(b) that corresponds to exceptionally high squeezing is essentially located within the unstable region (white area) of the stability diagram in Fig. <ref>-(a). Thus, the large squeezing in the mode driven by a non-monotonic ω(t) is caused by instability in parametric resonance.
The above simple examples illustrate a point that the dependence of the squeeze parameter η_k on the duration of the parametric process does reflect qualitative features of the parametric process. In fact, we can apply the same idea to the spectral dependence of the squeeze parameter for various functional forms of the parametric processes. These will serve as templates from which we may extract qualitative information about the parametric process the quantum field has experienced.
§ SUMMARY
A major task of theoretical cosmology is to find ways to deduce the state of the early universe from relics observed today such as features of primordial radiation and matter contents. In addition to particle creation at the Planck time and structure formation after the GUT (grand unified theory) time we add here another fundamental quantum process: quantum radiation from atoms induced by of quantum fields.
A massless quantum field in Minkowski space is subjected to a parametric process which varies the frequencies of the normal modes of the field from one constant value to another over a finite time interval. The initial (in-) state of the field will become squeezed after the process. In the out-region we couple an atom to this field in the out-state; the response of the atom certainly depends on this squeezing. Meanwhile, the radiation generated by the interacting atom will send out signals outwards, such that an observer or a probe at a much later time may still be able to identify the squeezing via the signatures in the radiation.
Once we have identified the squeezing, locally or remotely, we then ask how the squeezing may depend on the details of the parametric process the field had been subjected to. If we can work out templates that relate these quantities, then measurements of certain features of squeezing can tell us something about the parametric process.
The salient points in our results are summarized below. In the first part of this paper we show the following:
* The radiation field at a location far away from the atom looks stationary; its nonstationary component decays with time exponentially fast.
* The net energy flow cancels at late times like the case discussed in <cit.>. These features are of particular interest considering that the atom that emits this radiation is coupled to a squeezed field, which is nonstationary by nature. However they are consistent with the fact that the atom's internal dynamics relaxes in time.
* This implies that we are unable to measure the extent of squeezing by measuring the net radiation energy flow at a location far away from the atom.
* On the other hand, one can receive residual radiation energy density at late times, which is a time-independent constant and is related to the squeeze parameter. But it is of a near-field nature, so the observer cannot be located too far away from the atom.
Note that there is always an ambient free component of the same squeezed quantum field everywhere, in addition to the above radiation component generated by the atom's internal motion.
In the second part of this paper we focus on the dependence of the squeeze parameter on the parametric process and obtain these results:
* Formally it can be shown that the squeeze parameter depends on the evolution of the field in the parametric process.
* In the current configuration, for a given parametric process, the squeeze parameter depends only on the duration of the process, it does not depend on the starting or the ending time of the process.
* In general, for a monotonically varying process, the value of the squeeze parameter decreases with increasing duration of the process.
* This implies that, for an adiabatic parametric process, the squeezing tends to be very small, but it can be quite significant for non-adiabatic parametric processes. These results are consistent with studies of cosmological particle creation in the 70s as parametric amplification of vacuum fluctuations.
* If the parametric process changes with time sinusoidally, then the dependence of the squeeze parameter on the duration of the process shows interesting additional structures. For certain lengths of the process, the squeeze parameter can have unusually large values.
* This non-monotonic behavior turns out to be related to parametric instability. The resulting large squeeze parameter is caused by the choice of the parameter that falls within the unstable regime of the parametric process.
Our results in this second part indicate that not much information about a monotonic parametric process can be gleaned off from the squeeze parameter. On the other hand, for a non-monotonic parametric process, the squeeze parameter shows nontrivial dependence on the duration of the process. The latter is expected to be the typical case in nature in which various scales are involved in a transition. Moreover, to conform to realistic measurements, we can apply similar considerations to examine the mode dependence of the squeeze parameter. Thus the current scenario seems to offer a viable means to extract partial information about the parametric process a quantum field has undergone.
As a final remark, we comment on applying the discussions in Sec. <ref> to the case of the atom coupled to quantized electromagnetic fields. To begin with, in conventional sense, such a configuration has a supra-Ohmic, Markovian dynamics. It is inherently unstable, as discussed in <cit.>. It has runaway solutions, so it makes no sense to discuss the late time behavior, relaxation, energy balance or the fluctuation-dissipation relation of such a system. Although we may render such a system to have stable dynamics by resorting to order reduction <cit.> via the critical manifold argument, this approach is not very satisfactory from the viewpoint of open systems because order reduction only asymmetrically changes the behavior of the dissipation on the atom side; it does not accordingly modify the fluctuation noise force on the atom. Thus the resulting nonequilibrium fluctuation-dissipation relation associated with the atom's internal dynamics will not take the elegant form we usually see for the Ohmic, Markovian dynamics. Furthermore this relation will depend on the parameters of the reduced system, and thus loses its universality for interacting linear systems and for some nonlinear systems.
To restore the stable dynamics of the atom's internal dynamics <cit.> and the beauty of the associated nonequilibrium fluctuation-dissipation relation, it is probably easiest if we generalize the Markovian spectrum of the quantized electromagnetic field to the non-Markovian one. However this introduces additional complexity to the analysis presented in Sec. <ref> because the radiation field will not have a simple local (apart from retardation) form like (<ref>). Thus it is not clear yet whether the rather general properties we expounded in Sec. <ref> for a quantum scalar field also convey to a quantized electromagnetic field, a topic saved for future investigations.
Acknowledgment J.-T. Hsiang is supported by the Ministry of Science and Technology of Taiwan, R.O.C. under Grant No. MOST 111-2811-M-008-022. B.-L. Hu appreciates the kind hospitality of Prof. Chong-Sun Chu of the National Center for Theoretical Sciences and Prof. Hsiang-nan Li of the Academia Sinica, R.O.C. in the finishing stage of this paper.
§ TWO-MODE SQUEEZED STATE
Here we outline the properties of the two-mode squeezed operator Ŝ_2(ζ) associated mode 1 and 2,
Ŝ_2(ζ)=exp[ζ^*â_1^â_2^-ζ â_1^†â_2^†] ,
such that the two-mode squeezed thermal state is defined by
ρ̂_tmst=Ŝ_2^(ζ) ρ̂_β Ŝ_2^†(ζ) .
where ρ̂_β is a thermal state. The creation and annihilation operators satisfy the standard commutation relation [â,â^†]=1. It is convenient to put the squeeze parameter ζ into a polar form ζ=η e^iθ, with η∈ℝ^+ and 0≤θ<2π. We thus have
Ŝ_2^† â_1 Ŝ_2^ =coshη â_1^-e^+iθsinhη â_2^† , Ŝ_2^† â_2 Ŝ_2^ =coshη â_2^-e^+iθsinhη â_1^† .
so that
⟨â_i^2⟩_tmst =Tr{ρ_β Ŝ_2^† â_i^2 Ŝ_2^}=0 , ⟨â_i^†2⟩_tmst =0 ,
⟨â_1^â_1^†⟩_tmst =(n̅_1+1) cosh^2η+n̅_2 sinh^2η , ⟨â_1^†â_1^⟩_tmst =n̅_1 cosh^2η+(n̅_2+1) sinh^2η ,
⟨â_2^â_2^†⟩_tmst =(n̅_2+1) cosh^2η+n̅_1 sinh^2η , ⟨â_2^†a_2^⟩_tmst =n̅_2 cosh^2η+(n̅_1+1) sinh^2η ,
⟨â_̂1̂â_2⟩_tmst =-e^+iϕ/2(n̅_1+n̅_2+1) sinh2η , ⟨â_1^†a_2^†⟩_tmst =-e^-iϕ/2(n̅_1+n̅_2+1) sinh2η ,
where n̅_i is the mean particle number of the thermal state associated with mode i,
n̅_i=Tr{ρ̂_β â_i^†â_i^}
It is interesting to compare with the single-mode squeezed thermal state ρ̂_st, defined by
ρ̂_st=Ŝ(ζ) ρ̂_β Ŝ^†(ζ) .
Here Ŝ(ζ) is the squeezed operator
Ŝ(ζ)=exp[1/2 ζ^*â^2-1/2 ζ â^†2] .
We then find
⟨â⟩_st =0=⟨ a^†⟩_st ,
⟨â^2⟩_st =-e^+iθ sinh2η (n̅+1/2) , ⟨ a^†2⟩_st=-e^-iθ sinh2η (n̅+1/2) ,
⟨â^†â⟩_st =cosh2η (n̅+1/2)-1/2=cosh2η n̅+sinh^2η ,
where n̅ is the mean particle number of the thermal state. Both the two single-mode squeezed state and the two-squeezed state are connected. We first write two modes in terms of their normal modes i=±,
â_1 =â_++â_-/√(2) , â_2 =â_+-â_-/√(2) ,
with [â_+,â_-]=0. Then we can write the two-mode squeeze operator Ŝ_2, (<ref>), as
Ŝ_2 =exp[ζ^*/2(â_+^+â_-^)(â_+^-â_-^)-ζ/2 (â_+^†+â_-^†)(â_+^†-â_-^†)]
=exp[ζ^*/2 â_+^2-ζ/2 â_+^†2]×exp[-ζ^*/2 â_-^2+ζ/2 â_-^†2]
=Ŝ_â_+(ζ)×Ŝ_â_-(-ζ) .
That is, in terms of the normal modes, it can be decomposed into a product of two single-mode squeezed operators.
In the current setting the connection is even closer because the pair of modes in Ŝ_2 have the opposite momenta ±k. Since the two-mode squeeze operator Ŝ_2, (<ref>), symmetrically contains the annihilation and the creation operators of both modes, during the mode counting, contributions from each pair (k,-k) will appear twice, and the resulting expressions may look like that given by two single-mode squeezed state. For example, let us compute the Hadamard function of the scalar field ϕ in the two-mode squeezed thermal state in spatially isotropic spacetime,
G_H,0^(ϕ)(x,x') =∫d^3k/(2π)^3/21/√([b]2ω)∫d^3k'/(2π)^3/21/√(2ω')[ 1/2 ⟨{â_k^, â_k'^}⟩_tmst e^ik·x+ik'·x'e^-iω t-iω't'.
+.1/2 ⟨{â_k^, â_k'^†}⟩_tmst e^ik·x-ik'·x'e^-iω t+iω't'+H.C.]
=∫d^3k/(2π)^31/2ω [ 1/2 ⟨{â_k^, â_k^}⟩_tmst e^ik·(x+x')e^-iω(t+t')+1/2 ⟨{â_k^, â_-k^}⟩_tmst e^ik·(x-x')e^-iω (t+t').
+1/2 ⟨{â_k^, â_k^†}⟩_tmst e^ik·(x-x')e^-iω (t-t')+1/2 ⟨{â_k^, â_-k^†}⟩_tmst e^ik·(x+x')e^-iω (t-t')
+.H.C.]
=∫d^3k/(2π)^31/2ω e^ik·(x-x')[(n_ω+1/2) cosh2η_ω e^-iω(t-t')-e^iθ_ω(n_ω+1/2) sinh2η_ω e^-iω(t+t').
+.H.C.] ,
with ω=|k| and the help of (<ref>)–(<ref>). This is the same as the Hadamard function of the field in the squeezed thermal state, consistent with (<ref>).
§ LATE-TIME BEHAVIOR OF
§.§ Late-Time Energy Flux Density
Here we will examine the late-time net radiation flux of the field at distance r sufficiently far away from the atom, so that only the dominant contribution, independent r, will be of our interest. The energy flux density is given by
⟨ΔT̂_rt(x)⟩ = lim_x' → x∂^2/∂ r ∂ t'[ G^(ϕ)_H (x,x') - G^(ϕ)_H, 0(x,x') ] .
We first look at the stationary component.
§.§.§ stationary component
We will assume that t≫ r, but place no other restrictions on r for the moment. Following the decomposition in (<ref>), the stationary part of the contribution purely from the radiation field is given by
lim_x' → x∂^2/∂ r ∂ t'1/2⟨{ϕ̂_br(x), ϕ̂_br(x') }⟩_st= -e^2∫_-∞^∞dω/2π ω^2 G^(χ)_H(ω) |G^(ϕ)_R, 0(x; ω)|^2 ,
with the help of
∂/∂ rG^(ϕ)_R, 0(x; ω) =(iω-1/r) G^(ϕ)_R, 0(x; ω) ,
∂/∂ rG^(ϕ),st_H, 0(x; ω) =cosh2η βω/2[ω ReG^(ϕ)_R, 0(x; ω)-1/r ImG^(ϕ)_R, 0(x; ω)] ,
where the stationary part of the free-field Hadamard function is
G^(ϕ),st_H, 0(x,0; ω)≡G^(ϕ),st_H, 0(x; ω)=cosh2η βω/2 sinω r/4π r .
To arrive at Eq. (<ref>), we observe the term proportional to r^-1 is odd in ω, thus, vanishing, and that ReG^(χ)_R(ω) is an even function of ω. At time greater than the relaxation time scale we may make the identification
G^(χ)_H(ω)=cosh 2η βω/2 ImG^(χ)_R(ω) ,
by the nonequilibrium fluctuation-dissipation relation <cit.> of the internal dynamics of the atom if initially it is coupled to a squeezed thermal field.
On the other hand, for the cross-term, containing the correlation between the radiation field and the free field at large distance from the atom, its stationary part is
lim_x' → x∂^2/∂ r ∂ t'1/2[⟨{ϕ̂_h(x), ϕ̂_br(x')}⟩_st + ⟨{ϕ̂_br(x), ϕ̂_h(x')}⟩_st]
=-i e^2 ∫_-∞^∞dω/2π ω^2 ρ^(st)(ω) G^(χ)_R(ω) |G^(ϕ)_R, 0(x; ω)|^2 .
Hereafter it is convenient to introduce the shorthand notations
ρ^(st)(ω)=cosh2η βω/2 , and ρ^(ns)(ω)=sinh2η βω/2 .
Since the contribution from ReG^(χ)_R(ω) is an even function of ω, we immediately see it is the opposite of (<ref>) by (<ref>), and thus cancels with (<ref>). We already know from the case of the unsqueezed thermal state that the corresponding contributions of (<ref>) and (<ref>) cancel with one another. Therefore here we have shown that at late times the stationary part of the net energy flux density far away from the atom vanishes even though the field is initially in the squeezed thermal state, a nonstationary configuration.
Here it is worth emphasizing the significance of vanishing stationary component of the net radiation flux. This is a unique feature of self-consistent quantum dynamics. The cancellation between (<ref>) and (<ref>) is not possible if the radiated field ϕ_r(x) is not correlated with the free field ϕ_h(x). This correlation is established because the atom that sends out the radiation field is driven by a free field, as seen by the Langevin equation (<ref>). It still holds when the field state is a vacuum state <cit.>, so a pure classical system will not have such correlation. Secondly our system is distinct from the classical driven dipole because the latter has a net outward radiation flux supplied by the external driving agent and is then independent of the field state. This is best seen from the component (<ref>) of the flux that is solely composed of the radiation field. This flux is field-state dependent because the internal dynamics of the atom is driven by the quantum fluctuations of the field, rather than an external agent.
§.§.§ nonstationary component
Now we turn to the nonstationary contribution in ⟨ΔT̂_rt(x)⟩. The component purely from the radiation field is given by
lim_x' → x∂^2/∂ r ∂ t'1/2⟨{ϕ̂_br(x), ϕ̂_br(x') }⟩_ns
=i e^4∫_0^∞dω/2π ω^2/4π ρ^(ns)(ω) (iω-1/r)[G^(χ)_R(ω) G^(ϕ)_R, 0(x; ω)]^2e^-i2ω t+iθ+C.C. ,
while the counterpart from the cross term is
lim_x' → x∂^2/∂ r ∂ t'1/2[⟨{ϕ̂_h(x), ϕ̂_br(x')}⟩_ns+⟨{ϕ̂_br(x), ϕ̂_h(x')}⟩_ns]
=i e^2∫_0^∞dω/2π ω ρ^(ns)(ω) G_R^(χ)(ω) G_R,0^(ϕ)(x;ω)[ω G_R,0^(ϕ)(x;ω)-2/r ImG_R,0^(ϕ)(x;ω)] e^-i2ω t+iθ+C.C. .
Contrary to the stationary contribution, in general, (<ref>) does not cancel (<ref>). This can be explicitly shown by examining the sum of the expressions which are proportional to ω inside the curly brackets in both equations. We find these terms together give
i e^2∫_0^∞dω/2π ω^2ρ^(ns)(ω) G_R^(χ)(ω) [G_R,0^(ϕ)(x;ω)]^2[i e^2 ω/4πG_R^(χ)(ω)+1] e^-i2ω t+iθ+C.C.
=i e^2∫_0^∞dω/2π ω^2ρ^(ns)(ω) ReG_R^(χ)(ω) G_R^(χ)(ω)/G_R^(χ)*(ω)[G_R,0^(ϕ)(x;ω)]^2e^-i2ω t+iθ+C.C. ,
where we have used the fact that e^2=8πγ m and
ImG_R^(χ)(ω) =2mγω |G_R^(χ)(ω)|^2 .
Obviously (<ref>) does not vanish in general. If the squeeze angle θ is really a mode- and time-independent constant, we may set θ=0 without loss of generality and further simplify the nonstationary contribution, (<ref>), in ⟨ΔT̂_rt(x)⟩ to
i e^2∫_0^∞dω/2π ω^2ρ^(ns)(ω) [G_R,0^(ϕ)(x;ω)]^2 G_R^(χ)(ω)/G_R^(χ)*(ω) ReG_R^(χ)(ω) e^-i2ω t .
Eq. (<ref>), or the special case Eq. (<ref>), in general is time dependent and is not identically zero.
For completeness, let us write down the sum of the terms proportional to 1/r in the square brackets in (<ref>) and (<ref>), which is
-i e^2/r∫_0^∞dω/2π ω ρ^(ns)(ω) G_R^(χ)(ω) G_R,0^(ϕ)(x;ω)[e^2ω/4π G_R^(χ)(ω) G_R,0^(ϕ)(x;ω)+2ImG_R,0^(ϕ)(x;ω)] e^-i2ω t+iθ
=-e^2/r∫_0^∞dω/2π ω ρ^(ns)(ω) {[G_R,0^(ϕ)(x;ω)]^2G_R^(χ)(ω)/G_R^(χ)*(ω) ReG_R^(χ)(ω)+G_R^(χ)(ω) |G_R,0^(ϕ)(x;ω)|^2} e^-i2ω t+iθ ,
plus its complex conjugate. Here again we have used (<ref>) to recast the expression into a more compact form. This will be useful later to check the consistency via the continuity equation.
The sum of (<ref>) and (<ref>) gives the only contribution of the net radiation flux that is likely to survive after the relaxation time scale. However, in Appendix <ref>, we can argue that although Eqs. (<ref>) and (<ref>) do not cancel in general, their sum still decays with time and furthermore it actually falls off to zero exponentially fast, proportional to e^-2γ t.
Thus combining the discussions about the stationary component, we show that at late times no net radiation flux exudes to spatial infinity from a static atom even though the internal degree of freedom of the atom is driven by the quantum fluctuations of the squeezed field caused by its parametric process. At late times it leaves no trace of detectable signal to a detector at distance much greater than the typical scales in the atom's internal dynamics, except for the case of extremely large squeezing where we might have the chance to see a trace of the net flux since it will take a longer time to decay. However, the information of the squeeze parameter η can still be read out from the asymptotic equilibrium state of the atom's internal dynamics.
§.§ late-time field energy density
The energy density is given by
⟨ΔT̂_tt(x)⟩ = lim_x' → x1/2( ∂^2/∂ t ∂ t' + ∂^2/∂ r ∂ r') [ G^(ϕ)_H (x,x') - G^(ϕ)_H, 0(x,x') ] .
That is, we subtract off the energy density of the free field in the squeezed state, and Eq. (<ref>) tells us the change in energy density due to the atom-field interaction.
§.§.§ stationary component
We first consider the stationary component of (<ref>). Following the decomposition (<ref>), the part purely caused by the radiation field is given by
lim_x' → x1/2( ∂^2/∂ t ∂ t' + ∂^2/∂ r ∂ r') 1/2 ⟨{ϕ̂_br(x), ϕ̂_br(x')}⟩_st
=e^2∫_-∞^∞dω/2π ρ^(st)(ω) (ω^2+1/2r^2) ImG_R^(χ)(ω) |G_R,0^(ϕ)(x;ω)|^2 .
The contribution from the cross term is then
lim_x' → x1/2( ∂^2/∂ t ∂ t' + ∂^2/∂ r ∂ r') 1/2[⟨{ϕ̂_h(x), ϕ̂_br(x')}⟩_st+ ⟨{ϕ̂_br(x), ϕ̂_h(x')}⟩_st]
=-e^2∫_-∞^∞dω/2π ρ^(st)(ω) {(ω^2+1/2r^2) |G_R,0^(ϕ)(x;ω)|^2 ImG_R^(χ)(ω)+ω/r Re[G_R^(χ)(ω) G_R,0^(ϕ) 2(x;ω)].
-.1/2r^2 Im[G_R^(χ)(ω) G_R,0^(ϕ) 2(x;ω)]} ,
with the help of (<ref>) and (<ref>) to re-express the term
2Re[G_R^(χ)(ω) G_R,0^(ϕ)(x;ω)] ImG_R,0^(ϕ)(x;ω)=-|G_R,0^(ϕ)(x;ω)|^2 ImG_R^(χ)(ω)+Im[G_R^(χ)(ω) G_R,0^(ϕ) 2(x;ω)] .
Adding both contributions together gives
⟨ΔT̂_tt⟩_st=-e^2∫_-∞^∞dω/2π ρ^(st)(ω) {ω/r Re[G_R^(χ)(ω) G_R,0^(ϕ) 2(x;ω)]-1/2r^2Im[G_R^(χ)(ω) G_R,0^(ϕ) 2(x;ω)]} ,
at late times and at large distance away from the atom. The dominant contribution of the stationary component of the local field energy density vanishes, so Eq. (<ref>) is subdominant since it is proportional to 1/r^3. It comes from the correlation between the radiation field and the free field at the location far away from the atom, and it decays faster with r. Note that there are two type of 1/r^3 contributions in the cross terms (<ref>) but one of them cancels with its counterpart in (<ref>). The residual energy density (<ref>) has relatively short range by nature. We note it is proportional to e^2, which is proportional to the damping constant γ. Since this is a time-independent constant, it means that this may be an unambiguous aftereffect of the transient peregrinating radiation field.
Next we turn to the nonstationary component.
§.§.§ nonstationary component
We first examine the late-time contribution purely from the radiation field
lim_x' → x1/2( ∂^2/∂ t ∂ t' + ∂^2/∂ r ∂ r') 1/2 ⟨{ϕ̂_br(x), ϕ̂_br(x')}⟩_ns
=e^4∫_0^∞dω/2π ω/4π ρ^(ns)(ω) (ω^2+i ω/r-1/2r^2) [G_R^(χ)(ω) G_R,0^(ϕ)(x;ω)]^2e^-i2ω t+iθ+C.C. .
On the other hand, the corresponding contribution from the cross term gives
lim_x' → x1/2( ∂^2/∂ t ∂ t' + ∂^2/∂ r ∂ r') 1/2[⟨{ϕ̂_h(x), ϕ̂_br(x')}⟩_ns+ ⟨{ϕ̂_br(x), ϕ̂_h(x')}⟩_ns]
=-e^2∫_0^∞dω/2π ρ^(ns)(ω) {i (ω^2+i ω/r)G_R^(χ)(ω) [G_R,0^(ϕ)(x;ω)]^2.
+.1/r^2 G_R^(χ)(ω) G_R,0^(ϕ)(x;ω)ImG_R,0^(ϕ)(x;ω)} e^-i2ω t+iθ+C.C. ,
Now we will use the same trick (<ref>) to combine both contributions, and we obtain
⟨ΔT̂_tt⟩_ns =-i e^2∫_0^∞dω/2π ρ^(ns)(ω) {-i (ω^2+i ω/r-1/2r^2)[G_R,0^(ϕ)(x;ω)]^2G_R^(χ)(ω)/G_R^(χ)*(ω) ReG_R^(χ)(ω).
+.1/2r^2 G_R^(χ)(ω) |G_R,0^(ϕ)(x;ω)|^2} e^-i2ω t+iθ+C.C. .
The dominant term in (<ref>) has the same form as (<ref>), and thus will vanish at late times at distance far away from the atom.
Therefore at late times, ⟨ΔT̂_tt⟩ settles down to a constant value, whose value decays like 1/r^3 away from the atom.
§.§ continuity equation
Here in passing we would like to examine the consistency of our results of the nonstationary components of ⟨ΔT̂_μ t⟩ in terms of the continuity equation ∂^μT_μ t=0. It turns out convenient to list the previous results for the relevant components
⟨T̂_rt⟩^(rr)_ns =i e^4∫_0^∞dω/2π ω^2/4π ρ^(ns)(ω) (iω-1/r)[G^(χ)_R(ω) G^(ϕ)_R, 0(x; ω)]^2e^-i2ω t+iθ+C.C. ,
⟨T̂_rt⟩^(hr)_ns =i e^2∫_0^∞dω/2π ω ρ^(ns)(ω) G_R^(χ)(ω) G_R,0^(ϕ)(x;ω)[ω G_R,0^(ϕ)(x;ω)-2/r ImG_R,0^(ϕ)(x;ω)] e^-i2ω t+iθ+C.C. ,
⟨T̂_tt⟩^(rr)_ns =e^4∫_0^∞dω/2π ω/4π ρ^(ns)(ω) (ω^2+i ω/r-1/2r^2) [G_R^(χ)(ω) G_R,0^(ϕ)(x;ω)]^2e^-i2ω t+iθ+C.C. ,
⟨T̂_tt⟩^(hr)_ns =-e^2∫_0^∞dω/2π ρ^(ns)(ω) G_R^(χ)(ω) {i (ω^2+i ω/r)[G_R,0^(ϕ)(x;ω)]^2.
+.1/r^2 G_R,0^(ϕ)(x;ω)ImG_R,0^(ϕ)(x;ω)} e^-i2ω t+iθ+C.C. .
The superscript (RR) represents the contributions purely from the radiation field like (<ref>) and (<ref>) while the superscript (HR) denotes those from the cross terms like (<ref>) and (<ref>). For our configuration, we do not have T_ϑ t and T_φ t where ϑ and φ are respectively the polar angle, and azimuthal angle, so explicitly the continuity equation can be put in the form
∂^μT̂_μ t=0=∂_tT_tt-1/r^2 ∂_r(r^2T_rt) .
Thus we find
1/r^2 ∂_r(r^2⟨T̂_rt⟩^(rr)_ns) =-2i e^4∫_0^∞dω/2π ω^2/4π ρ^(ns)(ω)(ω^2+i ω/r-1/2r^2)[G^(χ)_R(ω) G^(ϕ)_R, 0(x; ω)]^2e^-i2ω t+iθ+C.C. ,
which is equal to ∂_t ⟨T̂_tt⟩^(rr)_ns, and1/r^2 ∂_r(r^2⟨T̂_rt⟩^(hr)_ns) =2e^2∫_0^∞dω/2π ρ^(ns)(ω) G_R^(χ)(ω) {i (ω^2+i ω/r)[G_R,0^(ϕ)(x;ω)]^2.
+.1/r^2 G_R,0^(ϕ)(x;ω)ImG_R,0^(ϕ)(x;ω)} e^-i2ω t+iθ+C.C. .
It is exactly ∂_t ⟨T̂_tt⟩^(hr)_ns. Thus the continuity equation is satisfied.
§ LATE-TIME BEHAVIOR OF THE NONSTATIONARY CONTRIBUTION IN
It turns out that the nonstationary contribution in ⟨ΔT̂_rt(x)⟩ still decays with time. To begin with, it proves useful to quote the late-time expressions of the energy exchange between the atom and the surrounding field <cit.>. For times greater than the relation time, the nonstationary contribution of the energy flow into the atom from field has the form
P_ξ^(ns)(t) =i e^2∫_0^∞dω/2π ω^2/4π sinh2η βω/2{G_R^(χ)(ω) e^-i2ω t+iθ-C.C.} ,and the corresponding contribution of the energy flow out of the atom due to friction is
P_γ^(ns)(t) =-e^4∫_0^∞dω/2π ω^3/(4π)^2 sinh2η βω/2 {[G_R^(χ)(ω)]^2 e^-i2ω t+iθ+C.C.} .
For comparison, let us put the terms proportional to ω inside of the curly brackets of (<ref>) and (<ref>) here,
(<ref>) : i e^2∫_0^∞dω/2π ω^2/(4π)^2r^2 sinh2η βω/2{G_R^(χ)(ω) e^-i2ω (t-r)+iθ-C.C.} ,
(<ref>) : -e^4∫_0^∞dω/2π ω^3/(4π)^3r^2 sinh2η βω/2{[G^(χ)_R(ω)]^2 e^-i2ω (t-r)+iθ+C.C.} .
We see correspondence between (<ref>) and (<ref>), as well as between (<ref>) and (<ref>). For example, the integrand of (<ref>) is e^i2ω r4π r^2 times the integrand of (<ref>). The same applies to the (<ref>)–(<ref>) pair. For a fix r and at times t≫ r, we may shift or re-define t in (<ref>) and (<ref>) by t-r→ t such that the integrals in both equations are essentially proportional to those in (<ref>) and (<ref>). We have numerically shown in <cit.> that (<ref>) and (<ref>) vanish as t→∞, so we conclude that the terms proportional to ω inside of the curly brackets of (<ref>) and (<ref>) will also vanish at late times. For example, as shown in Fig. <ref> generated by numerical calculations, the contribution in (<ref>) actually decays exponentially fast to zero.
For terms which are proportional to 1/r inside of the curly brackets of (<ref>) and (<ref>), we immediately see that if we take the time derivative of (<ref>), we obtain an expression which is 2/r times (<ref>). Likewise, the time derivative of (<ref>) gives,
2/r× i e^2∫_0^∞dω/2π ω^2/(4π)^2r^2 sinh2η βω/2{G_R^(χ)(ω) [e^-i2ω (t-r)+iθ-e^-i2ω t+iθ]-C.C.} .
Following the previous arguments, for a fixed r, it vanishes in the limit t→∞ too. Thus we have demonstrated that the time derivatives of the terms proportional to 1/r inside of the curly brackets of (<ref>) and (<ref>) vanishes, so these terms must be constants for sufficiently large time. On the other hand, these terms are time dependent and are not sign definite, so the asymptotic constants must be zero.
Putting these results together, we reach the conclusion that the nonstationary terms of the net radiation flux vanishes eventually at large distance away from the atom. However it does tell how slowly the nonstationary term decay. In fact, at least for the zero temperature limit β→∞, we can carry out the above integrals analytically, and the brute-force calculations show that for fixed r, these integrals give results that decay exponentially fast to zero in a form proportional to sinh 2η e^-2γ t. Thus at late times, no net radiation energy flux leaks to the spatial infinity from the atom even though the internal degree of freedom of the atom is coupled to a nonstationary squeezed quantum field.
§ TIME-TRANSLATIONAL INVARIANCE OF THE SQUEEZE PARAMETER IN THE OUT-REGION
Next we argue that if we shift the parametric process by Δ along the time axis, as shown in Fig. <ref>, then we will have
𝖽_i^(ii)(t+Δ,t_a+Δ)=d_i^(ii)(t,t_a)
where 𝖽_i^(ii)(t+Δ,t_a+Δ) on sans serif style is the fundamental solution in-region II for the shifted case described by the orange curve in Fig. <ref>.
Since the fundamental solutions 𝖽_i^(ii)(y,y_a) in-region II for the orange curve satisfies the equation of motion
𝖽̈_i^(ii)(y,y_a)+ω^2(y) 𝖽_i^(ii)(y,y_a)=0 ,
with the standard initial conditions given at y_a=t_a+Δ, while the fundamental solutions d_i^(ii)(y,y_a) in-region II for the blue curve satisfies the equation of motion
d̈_i^(ii)(t,t_a)+ω^2(t) d_i^(ii)(t,t_a)=0 ,
with the standard initial conditions given at t_a, we immediately see that both cases are related by y=t+Δ, and thus we arrive at (<ref>) and in particular,
𝖽_i^(ii)(t_b+Δ,t_a+Δ)=d_i^(ii)(t_b,t_a) .
Later we will need this result.
Now we would like to explicitly show that an detector, in the out-region with t>t_b+Δ, will find the same squeeze parameter for both cases described in Fig. <ref>, independent of the shift Δ, even if it carries out the measurement at the same time t. Note that in both cases the motion starts at the same t_i=0. Following the previous discussions on the construction of the fundamental solutions, we carry out a similar construction of the fundamental solution for the shifted process. At t>t_b+Δ. In particular, we focus on the moment t=t_b+Δ since afterward the squeeze parameter is a constant. Before we start, we first note that 𝖽_i^(i)(t) is essentially the same as d_i^(i)(t), except that the former applies to the time interval 0=t_i≤ t≤ t_a+Δ while the latter only to 0=t_i≤ t≤ t_a. With this recognition, we can write 𝖽_i^(i)(t_a+Δ) as
𝖽_i^(i)(t_a+Δ)=d_1^(i)(Δ) d_i^(i)(t_a)+d_2^(i)(Δ) ḋ_i^(i)(t_a) .
This will be convenient later. Now we will write 𝖽_i(t_b+Δ,0) in terms d_i^(x) with X=I, II, and III of the unshifted process. We show the calculations explicitly for 𝖽_1(t_b+Δ), and the result for 𝖽_2(t_b+Δ) will follow similarly. Pretty straightforwardly, we have
𝖽_1(t_b+Δ,0) =𝖽_1^(ii)(t_b+Δ,t_a+Δ) 𝖽_1^(i)(t_a+Δ)+𝖽_2^(ii)(t_b+Δ,t_a+Δ) 𝖽̇_1^(i)(t_a+Δ)
=d_1^(ii)(t_b,t_a)[d_1^(i)(Δ) d_1^(i)(t_a)+d_2^(i)(Δ) ḋ_1^(i)(t_a)]+d_2^(ii)(t_b,t_a)[ḋ_1^(i)(Δ) d_1^(i)(t_a)+ḋ_2^(i)(Δ) ḋ_1^(i)(t_a)]
with the help of (<ref>) and (<ref>). We use a trick that only applies to the undamped harmonic oscillator. in-region I, we have the identities
ḋ_2^(i)(t) =d_1^(i)(t) , ⇒ d_2^(i)(Δ) ḋ_1^(i)(t_a) =d_2^(i)(t_a) ḋ_1^(i)(Δ) ,
and it allows us to re-write (<ref>),
𝖽_1(t_b+Δ,0) =d_1^(ii)(t_b,t_a)[d_1^(i)(Δ) d_1^(i)(t_a)+ḋ_1^(i)(Δ) d_2^(i)(t_a)]+d_2^(ii)(t_b,t_a)[ḋ_1^(i)(Δ) d_1^(i)(t_a)+d_1^(i)(Δ) ḋ_1^(i)(t_a)]
=[d_1^(ii)(t_b,t_a) d_1^(i)(t_a)+d_2^(ii)(t_b,t_a) ḋ_1^(i)(t_a)] d_1^(i)(Δ)+[d_1^(ii)(t_b,t_a) d_2^(i)(t_a)+d_2^(ii)(t_b,t_a) d_1^(i)(t_a)] ḋ_1^(i)(Δ)
=d_1(t_b,0) d_1^(i)(Δ)+d_2(t_b,0) ḋ_1^(i)(Δ) .
Similarly for 𝖽_2(t_b+Δ,0), we have
𝖽_2(t_b+Δ,0)=d_1(t_b,0) d_2^(i)(Δ)+d_2(t_b,0) ḋ_2^(i)(Δ) .
Now we plug these results into the expressions in (<ref>)–(<ref>) to find the corresponding squeeze parameter in-region III,
1/ω_fω_i 𝖽̇_k^(1)2(t_b+Δ)+ω_i/ω_f 𝖽̇_k^(2)2(t_b+Δ)+ω_f/ω_i 𝖽_k^(1)2(t_b+Δ)+ω_fω_i 𝖽_k^(2)2(t_b+Δ)
=1/ω_fω_i ḋ_k^(1)2(t_b)+ω_i/ω_f ḋ_k^(2)2(t_b)+ω_f/ω_i d_k^(1)2(t_b)+ω_fω_i d_k^(2)2(t_b) ,
1/ω_fω_i 𝖽̇_k^(1)2(t_b+Δ)+ω_i/ω_f 𝖽̇_k^(2)2(t_b+Δ)-ω_f/ω_i 𝖽_k^(1)2(t_b+Δ)-ω_fω_i 𝖽_k^(2)2(t_b+Δ)
=1/ω_fω_i ḋ_k^(1)2(t_b)+ω_i/ω_f ḋ_k^(2)2(t_b)-ω_f/ω_i d_k^(1)2(t_b)-ω_fω_i d_k^(2)2(t_b) ,
1/ω_i 𝖽_k^(1)(t_b+Δ)𝖽̇_k^(1)(t_b+Δ)+ω_i 𝖽_k^(2)(t_b+Δ)𝖽̇_k^(2)(t_b+Δ)
=1/ω_i d_k^(1)(t_b)ḋ_k^(1)(t_b)+ω_i d_k^(2)(t_b)ḋ_k^(2)(t_b) ,
due to the facts that
d_1^(i)(Δ) ḋ_1^(i)(Δ) =-ω_i^2d_2^(i)(Δ) ḋ_2^(i)(Δ) , d_1^(i)2(Δ)+ω_i^2d_2^(i)2(Δ) =1 , 1/ω_i^2 ḋ_1^(i)2(Δ)+ḋ_2^(i)2(Δ) =1 .
The results for the shifted process are the same as those for un-shifted process. Thus both cases generate the same squeezing at t≥ t_b+Δ.
99
Unr76
W. G. Unruh, Notes on black-hole evaporation, Phys. Rev. D 14, 870 (1976).
QRadVac
J.-T. Hsiang, and B. L. Hu, Atom-field interaction: From vacuum fluctuations to quantum radiation and quantum dissipation or radiation reaction, Physics 1, 430 (2019).
DeW79
B. S. DeWitt, General Relativity: An Einstein Centenary Survey, Edited by S. W. Hawking and W. Israel (Cambridge Press, Cambridge, UK, 1979).
RadReact
J. R. Ackerhalt, P. L. Knight, and J. H. Eberly, Radiation reaction and radiative frequency shifts, Phys. Rev. Lett. 30, 456 (1973).
RadReact1
P. W. Milonni, and W. A. Smith, Radiation reaction and vacuum fluctuations in spontaneous emission, Phys. Rev. A 1975, 11, 814. [CrossRef]
RadReact2
J. Dalibard, J. Dupont-Roc, and C. Cohen-Tannodji, Vacuum fluctuations and radiation reaction: Identification of their respective contributions, J. Phys. (Paris) 43, 1617 (1982).
RadReact3
J. Dalibard, J. Dupont-Roc, and C. Cohen-Tannodji, Dynamics of a small system coupled to a reservoir: Reservoir fluctuations and self-reaction, J. Phys. (Paris) 45, 637 (1984).
Jackson
J. D. Jackson, Classical Electrodynamics, 2nd Ed. (Wiley, New York, 1975).
Rohrich
F. Rohrlich, Classical Charged Particles—Foundation of their Theories (Westview, Colorado, 1990).
JH1
P. R. Johnson, and B. L. Hu, Stochastic theory of relativistic particles moving in a quantum field: Scalar Abraham-Lorentz-Dirac-Langevin equation, radiation reaction, and vacuum fluctuations, Phys. Rev. D 65, 065015 (2002).
JHUnr
P. R. Johnson, and B. L. Hu, Unruh effect in a uniformly accelerated charge: From quantum fluctuations to classical radiation, Found. Phys. 35, 1117 (2005).
QRadCoh
J.-T. Hsiang, and B. L. Hu, Quantum radiation and dissipation in relation to classical radiation and radiation reaction, Phys. Rev. D 106, 045002 (2022).
SqBooks E.g.,
P. D. Drummond and Z. Ficek, Quantum Squeezing (Springer-Verlag, Berlin, Heidelberg, 2004).
GriSid
L. P. Grishchuk, and Y. V. Sidorov, Squeezed quantum states of relic gravitons and primordial density fluctuations. Phys. Rev. D 42, 3413 (1990).
HKM94
B. L. Hu, G. Kang and A. Matacz, Squeezed vacuua and the quantum statistics of cosmological particle creation, Int. J. Mod. Phys. A9, 991 (1994).
StrFor
S. Weinberg, Cosmology (Oxford University Press, 2008)
nMCos
J. T. Hsiang, and B. L. Hu, NonMarkovianity in Cosmology: Memories kept in a quantum field, Ann. Phys. 434, 168656 (2021).
FDRSq
J. T. Hsiang, and B. L. Hu, Fluctuation-dissipation relation for a quantum Brownian oscillator in a parametrically squeezed thermal field, Ann. Phys. 433, (2021).
Parker
L. Parker, Quantized fields and particle creation in expanding universes. I, Phys. Rev. 183, 1057 (1969).
Zeldovich
Ya B. Zel'dovich, Particle production in cosmology, JETP Lett. 12, 443 (1970).
AHH22
O. Arısoy, J. T. Hsiang, and B. L. Hu, Quantum-parametric-oscillator heat engines in squeezed thermal baths: foundational theoretical issues, Phys. Rev. E 105, 014108 (2022).
HCSH18
J. T. Hsiang, C. H. Chou, Y. Subaşı, and B. L. Hu, Quantum thermodynamics from the nonequilibrium dynamics of open systems: Energy, heat capacity, and the third law, Phys. Rev. E 97, 012135 (2018).
HH22
J. T. Hsiang, and B. L. Hu, Non-Markovian Abraham-Lorenz-Dirac equation: radiation reaction without pathology, Phys. Rev. D 106, 125108 (2022).
GP85
A. H. Guth, and S.-Y. Pi, Quantum mechanics of the scalar field in the new inflationary universe, Phys. Rev. D 32, 1899 (1985).
HH22a
J. T. Hsiang, and B. L. Hu, No intrinsic decoherence of inflationary cosmological perturbations, Universe 8, 27 (2022).
Sp00
H. Spohn, The critical manifold of the Lorentz–Dirac equation, Europhys. Lett. 49, 287 (2000).
|
http://arxiv.org/abs/2303.07064v1
|
20230313123807
|
A Generalized Multi-Modal Fusion Detection Framework
|
[
"Leichao Cui",
"Xiuxian Li",
"Min Meng",
"Xiaoyu Mo"
] |
cs.CV
|
[
"cs.CV",
"cs.AI"
] |
MSINet: Twins Contrastive Search of Multi-Scale Interaction for Object ReID
Jianyang Gu^1 Kai Wang^2 Hao Luo^3 Chen Chen^4 Wei Jiang^1*
Yuqiang Fang^5 Shanghang Zhang^6 Yang You^2 Jian Zhao^7Co-corresponding authors
^1Zhejiang University ^2National University of Singapore ^3Alibaba Group
^4OPPO Research Institute ^5Space Engineering University ^6Peking University
^7Institute of North Electronic Equipment
{gu_jianyang, jiangwei_zju}@zju.edu.cn [email protected]
March 30, 2023
=============================================================================================================================================================================================================================================================================================================================================================================================================================
empty
empty
LiDAR point clouds have become the most common data source in autonomous driving. However, due to the sparsity of point clouds, accurate and reliable detection cannot be achieved in specific scenarios. Because of their complementarity with point clouds, images are getting increasing attention. Although with some success, existing fusion methods either perform hard fusion or do not fuse in a direct manner. In this paper, we propose a generic 3D detection framework called MMFusion, using multi-modal features. The framework aims to achieve accurate fusion between LiDAR and images to improve 3D detection in complex scenes. Our framework consists of two separate streams: the LiDAR stream and the camera stream, which can be compatible with any single-modal feature extraction network. The Voxel Local Perception Module in the LiDAR stream enhances local feature representation, and then the Multi-modal Feature Fusion Module selectively combines feature output from different streams to achieve better fusion. Extensive experiments have shown that our framework not only outperforms existing benchmarks but also improves their detection, especially for detecting cyclists and pedestrians on KITTI benchmarks, with strong robustness and generalization capabilities. Hopefully, our work will stimulate more research into multi-modal fusion for autonomous driving tasks. https://github.com/achao-c/MMFusionCode.
§ INTRODUCTION
With the development of autonomous driving, 3D object detection is getting more and more attention. Its goal is to classify and locate objects in 3D space accurately. Recently, LiDAR and cameras have been the primary sources of information for 3D object detection.
As point clouds can provide accurate depth information about objects, in the beginning, researchers mainly used LiDAR-based methods <cit.> for object detection. However, point clouds have less color or semantic information due to sparsity. As a result, small, distant, or obscured objects are challenging to detect in the single LiDAR mode because of the lack of sufficient points.
Images, on the other hand, can be a powerful addition to LiDAR information because they have a lot of semantic information but no depth information. Therefore, multi-modal fusion is of great importance for accurate and reliable perception.
As shown in Fig <ref>, existing LiDAR-camera fusion methods can be broadly classified into result-level, feature-level, and point-level fusion. Result-level fusion methods <cit.> fuse the results of different detectors. Having been constrained by the results of each sensor, they are relatively ineffective in terms of detection and, therefore, rarely used nowadays. This paper focuses on illustrating the other two categories.
Point-level fusion methods <cit.> establish links between point clouds and pixels, primarily through calibration matrices, so that data of one kind can be projected into another space, enhancing the data representation. Although some success has been achieved, the coarse mapping relationships inevitably introduce a degree of interference into the network. Also, due to the difference between point clouds' sparsity and pixels' density, only a little information will complete the matching fusion, resulting in a severe loss of information. Feature-level fusion methods use different modal networks to obtain the corresponding modal data features and subsequently fuse them. Effectively combining the features of other modalities is a crucial factor limiting detection performance. Specifically, Chen et al. <cit.> utilize coarse geometric relationships to fuse features, obtaining suboptimal fusion features. Liu et al. <cit.> exploit a transformation network to construct 3D features of multi-view images. Although effective, these methods can only be applied to vehicles with both LiDAR and multi-view cameras. Also, the 3D information constructed using the multi-view map has some duplication with the information contained in the point clouds.
To address the above issues, we propose a generic multi-modal 3D detection framework, i.e., MMFusion, in this paper. It contains two separate data streams: the LiDAR and Camera streams. To improve the LiDAR stream's performance, a plug-and-play module called the Voxel Local Perception Module (VLPM) has been designed so that voxels can fully express internal local information. Furthermore, the feature output from both streams is fused by the Multi-modal Feature Fusion Module (MFFM), and the output is then obtained using the detection head.
Specifically, the detection framework proposed here employs different data streams to encode the raw inputs into features within their respective feature spaces. As our framework is a generic approach, it can incorporate the current single-modal models of LiDAR and cameras into its respective streams. We also find that the voxel features previously obtained using local averages <cit.> do not accurately reflect the actual voxel features. This motivates us to design a dynamic selection module for local features based on the attention mechanism, which can autonomously select the features of interest to enhance the representation of the model. In order to find precise connections between point cloud features and image features, we introduce MFFM to fuse features of different modalities. It avoids the direct use of hard or coarse fusion using geometric relations in previous approaches, and adaptively selects the desired part for fusion. Extensive experiments on the KITTI open dataset have shown that our approach can perform better than current state-of-the-art methods. Our contributions are summarized as follows:
* A generic detection network framework for multi-modal data fusion (i.e., LiDAR-camera fusion) is proposed that can leverage multiple existing network architectures.
* A plug-and-play module VLPM is proposed for fully acquiring local features during voxelization, which enhances the representability of voxel grids.
* We propose a multi-modal fusion module MFFM to adaptively select different parts of different modal features for fine-grained fusion, which can make full use of the complementary properties of multi-modal features.
* Our framework MMFusion outperforms existing benchmarks and improves their detection on the KITTI dataset, especially for small objects.
§ RELATED WORKS
§.§ LiDAR-based 3D Object Detection
There are two categories based on how the point clouds are handled: voxel-based and point-based methods.
Voxel-based methods. Voxel-based methods first voxelize the original point clouds using local averages <cit.>, then utilize 3D convolution kernel <cit.> to extract voxel features into the bird's eye view (BEV), and finally use a one-stage detection head <cit.> to detect objects on projected BEV plane. Some other works add a refinement network <cit.> to the existing one-stage detection network. Recent works <cit.> employ the attention mechanism for feature extraction and target detection, and Deng et al. <cit.> use the range view (RV) features to augment the BEV features. These methods are faster but do not exploit all the original information because of voxelization.
Point-based methods. Point-based methods take the original point clouds directly as input, then apply the point cloud encoder <cit.> for feature extraction to feed into the detection network <cit.>. Point-based approaches are usually computationally expensive as the encoder directly processes the original point clouds.
§.§ Image-based 3D Object Detection
LiDAR sensors are expensive compared to cameras, which are easily available and inexpensive. In recent years, image-based 3D object detection has been considerably explored. Wang et al. <cit.> extend image detectors with additional 3D branches using monocular images. With the advent of autonomous driving datasets <cit.> and more camera sensors, works <cit.> with multi-view images are gradually emerging. Due to the lack of direct depth information in the images, researchers have found that accurately predicting object depth from object and scene cues becomes a key constraint on detection capabilities. The methods <cit.> rely on a depth estimation network to extract implicit depth information and thus improve the network's effectiveness.
§.§ Multi-modal 3D Object Detection
Due to the complementary nature of the information in point clouds and images, multi-sensor fusion methods are gradually gaining attention. Current methods are divided into result-level, point-level, and feature-level fusion shown in Fig <ref>. The latter two fusion methods are currently used primarily due to limitations in the performance of individual detectors.
Point-level fusion methods. Methods <cit.> typically combine LiDAR points with image features at the corresponding location and apply LiDAR-based detection to the decorated point clouds. This fusion relies on coarse positional correspondence and has a high information loss <cit.> due to the sparsity of the point clouds.
Feature-level fusion methods. These methods first exploit different networks to obtain features of different modal data and then use the fusion network to obtain fused features for detection. Specifically, the works <cit.> perform a coarse fusion of features based on geometric relationships at corresponding locations. In <cit.>, a transformation network is leveraged to transfer image features to the 3D space before fusing them with point-level element features. However, the switching network has additional computing costs. Wu et al. <cit.> converts the image into pseudo point clouds to extract features and then fuses them with the point cloud features. Furthermore, an attention mechanism is employed in <cit.> to get different weights for features to be fused.
§ METHOD
In this section, we will detail the overall structure of our network, which is a framework for 3D target detection based on multi-modal data fusion. As shown in Fig <ref>, the network mainly consists of independent point clouds and image data streams, a multi-modal fusion module, and a 3D object detection head. Given data input from different modalities, we design specific encoders to extract features separately. Then we use the Multi-modal Data Fusion Module to dynamically extract different modal features, which can alleviate the misalignment problem of different modal features. Rather than using deep building networks, the network can achieve faster detection speeds. More details are elaborated in the following subsections.
§.§ Voxel Local Perception Module
Due to the sparse characteristic of point clouds, extracting features directly from point clouds is computationally intensive. Therefore, methods <cit.> first voxelize point clouds and then extract features from them. The details are as follows:
The point clouds in the range (W, H, D) are first divided into voxel meshes of the same size, each with a size of (w, h, d). To facilitate processing, set the number of point clouds sampled in each voxel grid as N. Finally, a maximum pooling operation or an average pooling operation is performed for each voxel grid.
Although effective, direct pooling of voxel grids inevitably results in a significant loss of local information. Using only one pooling operation is not enough to accurately obtain the local features within a voxel grid, and the weight of each point within the voxel grid is also an important aspect to think about. As a result, in order to retain as much of the required point information as possible, we propose the Voxel Local Perception Module (VLPM), as shown in Fig <ref>. Our Voxel Local Perception Module consists of Point Attention Module and Dynamic Weights Module.
Point Attention Module. To adaptively obtain local information from other points in the same voxel grid, we design a simple but effective module inspired by <cit.>.
As shown in Fig <ref>, an FC block contains two linear layers and a ReLU non-linear layer. For each voxel grid V_k∈ℝ^N × 4, we use FC blocks α and β that act on the spatial coordinates c_i=[x_i, y_i, z_i] of each point to obtain Query Q_i and Key K_i of the self-attention mechanism. At the same time, point features v_i∈ V_k are fed into another FC block γ to obtain Value V_i, which is
Q_i = α(c_i), K_i = β(c_i), V_i = γ(p_i). (1)
Afterward, we use an FC block ϵ to establish the similarity link between the points p_i and p_j under the same voxel grid (i.e., using additive attention to obtain the correlation coefficient):
w_ij = ϵ(Q_i - K_j + p_ij), (2)
where p_ij represents the position encoding between p_i and p_j from an FC block δ:
p_ij = δ(c_i - c_j). (3)
Consequently, for points in the same voxel grid V_k, one can get the new features of point p_i:
f_i = ∑_p_j ∈𝒱_k w_ij⊙ V_j. (4)
Dynamic Weights Module. Different points within the same pixel grid usually have different weights (e.g., object edge points require a higher weight than background points). Inspired by this observation, we dynamically obtain the corresponding weights based on the point's coordinate values, as shown in Fig <ref>.
Unlike Point Attention Module, we use the average point p̅=[x̅, y̅, z̅, ...] of the current voxel grid V_k as the initial source of the Query. Then we regard the point p_j within the same voxel grid as Key and Value, thus obtaining the features of the current voxel grid f_V. That is,
f_V = ∑_p_j ∈𝒱_k (θ(ζ(c̅) - η(c_j))) ⊙ p_j. (5)
Here, the Dynamic Weights Module does not utilize the position coding information since, generally speaking, the Point Attention Module has already given the point clouds location information.
§.§ Data Streams
Different data stream architectures extract data features from different modalities separately.
LiDAR Stream. LiDAR point clouds can provide accurate spatial information. Objects on the road do not generally overlap vertically, so the projection of features onto the BEV plane does not cause interference. The methods <cit.> of extracting voxel features to obtain BEV features have become the de-facto standard.
Our framework can incorporate any feature extraction network to map the 3D features onto a BEV 2D space. We follow the design of <cit.> to build our backbone networks.
Camera Stream. Camera images can provide high-resolution information on shapes and textures. For example, distant and small objects are difficult to detect due to the sparseness of the point clouds, but they are still clear and distinguishable in images.
Like the LiDAR stream, any 2D feature extraction network can be added to our framework to extract images' rich semantic and textural information. Instead of the widely used convolutional neural network ResNet <cit.>, we use an attention-based representative network called Swin Transformer <cit.> as the backbone of the camera stream. Following <cit.>, we then use a standard Feature Pyramid Network (FPN) to obtain multi-scale features.
§.§ Multi-modal Feature Fusion Module
Different sensors acquire data from different views; therefore, different modal features are in different feature spaces. For instance, LiDAR stream features are in BEV space, and camera stream features are in RV space (i.e., front, back, left, right).
In this case, the same element in different modal features might correspond to entirely different spatial locations. So we cannot use element-level operations (like element-wise sum) to directly combine feature maps from different modalities. As such, a Multi-modal Feature Fusion Module is proposed here that transforms different features into a unified feature space.
Overall Architecture.
As shown in Fig <ref>, we make the LiDAR features dynamically fuse different regional features of interest in the image so that the LiDAR and image features are in the same feature space. Specifically, we use the attention mechanism to construct a correlation of regional features across modalities.
After the pooling and adding the position encoding p_Le and p_Ie, LiDAR features f_L∈ℝ^C × H_1 × W_1 and image features f_I∈ℝ^C × H_2 × W_2 will become the Query Q∈ℝ^n × C and Key K∈ℝ^m × C by passing convolution layers ϕ and ψ as below.
Q = ϕ(Pool(f_L)+p_Le), K = ψ(Pool(f_I)+p_Ie). (6)
Because of the large size of the feature map, we use scaled dot-product attention presented in <cit.> instead of additive attention to calculate the correlation coefficient matrix W∈ [0, 1]^n × m and speed up the computation, as:
W = softmax(QK^T/√(C)). (7)
At this step, we can obtain the corresponding image features f_I^' of LiDAR features by a convolution layer γ and fuse them with an upsampling layer ϵ and simple addition for fusion features f_F, i.e.,
f_F = f_L + ϵ(f_I^'), f_I^' = γ(Wf_I + f_I). (8)
Pooling Operation.
Usually, the product of H_1W_1 and H_2W_2 is large, causing the network's training to be prolonged. It is also found that too many feature sequences are not conducive to extracting key features, as shown in Sec <ref>.
Hence, we first pool the features f_L, f_I to smaller sizes (H_1^', W_1^'), (H_2^', W_2^'). The fused features f_F are then scaled to their original size (H_1, W_1) and then added to LiDAR features f_L.
§.§ Detection Head and Loss Function
After the series of operations mentioned above, we can obtain the fused feature map. The network generates results through the downstream task-specific heads. In the field of 3D target detection, we use the detection head of <cit.> to verify the validity of our network.
For the one-stage detection head, inspired by <cit.>, we adopt the Region Proposal Network (RPN) loss ℒ_RPN, which consists of anchor classification loss ℒ_cls, regression loss ℒ_reg, and direction classification loss ℒ_dir. In short,
ℒ_total = ℒ_RPN = ℒ_cls + αℒ_reg + βℒ_dir,
(9)
where α is set to 2.0 and β is set to 0.2.
For the two-stage detection head, Proposal Refinement Network (PRN) loss ℒ_PRN will be part of the loss function following <cit.>. In brief,
ℒ_total = ℒ_RPN + ℒ_PRN. (10)
§ EXPERIMENTS
§.§ Dataset
KITTI <cit.> has now been widely used as a benchmark for autonomous driving datasets. It contains three categories in total: cars, cyclists, and pedestrians. Each category is divided into three difficulty levels: easy, medium, and hard, based on the size, occlusion level, and truncation level of the objects. The total dataset contains 7481 training samples and 7518 test samples. For validation purposes, the training samples are typically divided into a training set of 3712 and a validation set of 3769. We use the training set for the experimental study of the validation test and test set.
§.§ Setup Details
Data augmentation.
Data augmentation is performed to improve the generalization performance of the network. Following <cit.>, we first extract some ground truth boxes and place them at random locations. Then, the point clouds are randomly flipped along the x-axis, rotated along the z-axis in the range [-π/4, π/4], and scaled in the range [0.95, 1.05].
Input Parameters.
Since KITTI only provides annotations in the front camera's field of view. We set the range of point clouds to [0, 70.4m], [-40m, 40m], [-3m, 1m] in the (x, y, z) axis following <cit.>. The input voxel size is set to (0.05m, 0.05m, 0.1m). So the size of the whole 3D space after voxelization is 1600 × 1408 × 40. The maximum number of non-empty voxels is
set to 16,000 in training and 40,000 in testing. We reshape the dimensions of the images to 3 × 1216 × 352 and take them as the input to the image stream.
Network Architecture. The backbone of LiDAR Stream is based on SECOND <cit.>. We add the Voxel Local Perception Module with two stages before the backbone network to acquire voxel features. The 3D backbone has four stages with filter numbers of 16, 32, 48, and 64. We then utilize two 2D network blocks to process the features. The first block has the same X and Y resolution as the 3D backbone output, while the second block has half the resolution of the first. Moreover, the LiDAR Stream features have a size of 256 × 200 × 176.
We employ Swin Transformer <cit.> with four blocks as the backbone of the Camera Stream. The window size is changed to M=5, and the channel number of the first stage's hidden layers is changed to C=32. The feature dimension of each block of output is 32, 64, 128, and 256, and the size becomes one-half of its original size with each passing block. After that, we leverage a Feature Pyramid Network <cit.> to assemble them and grab the image features with a size of 256 × 39 × 11.
Data from different modalities is fed into the MFFM for fusion. Finally, downsampling and upsampling 2D networks are employed with feature dimensions (128, 256) to obtain fusion features whose size is 256 × 200 × 176.
To verify the validity and generality of our framework, different detection heads <cit.> are used in the experiments.
Training.
OpenPCDet <cit.> is adopted as our codebase. All the models are trained on two 3090Ti GPU cards with a batch size of 4 and 80 epochs. We keep the same training settings as for the baseline detector. Specifically, the Adam optimizer is applied with a learning rate of 0.003 for <cit.> and 0.01 for <cit.>. The weight decay parameter of 0.01 is the same for all models.
§.§ Comparison with the State of the Art
We evaluate our detection network on the KITTI test set and then submit the results to the official online benchmark server. As shown in Table <ref>,
our MMFusion outperforms PointRCNN <cit.>, PV-RCNN <cit.>, and EPNet++ <cit.> with 5.09%, 0.51%, and 1.19% AP|_R_40 respectively on the mean average precision (mAP). As a two-stage detection network, it not only shows good performance in detecting cars, but also performs well in small target detection, which usually needs improvement in LiDAR measurements. In particular, benefiting from the complementary multi-modal information, our network has significantly better detection of cyclists than other competitors.
In addition, we show the detection results on the KITTI validation set in Table <ref>. On the mAP, our MMFusion outperforms the baseline SECOND <cit.>, PDV <cit.>, and Voxel-RCNN <cit.> by 1.42%, 0.35%, and 0.65% AP|_R_40, respectively. Notably, our MMFusion improves the cyclists' detection performance by 1.34%, 0.55% and 2.06%, respectively, further illustrating the effectiveness of information fusion. Some detection results are shown in Fig <ref>, where the network also maintains good detection results in complex environments.
§.§ Ablation Studies
Components. By setting SECOND <cit.> as the baseline model, we examine the impact of each component of MMFusion on the network performance. Table <ref> shows that both VLPM and MFFM have a remarkable promotion effect on the model.
Pooling Sizes. We set different pooling sizes of LiDAR features in the MFFM, and Table <ref> shows that the smaller pooling size helps to obtain a better performance of the model.
§ CONCLUSIONS
In this paper, we propose a generic 3D detection framework (MMFusion) using multi-modal features. The framework aims to achieve accurate fusion between LiDAR and images to improve 3D detection. We created a voxel local perception module to better preserve internal information during voxelization. Benefiting from the decoupling of data streams, our framework can take full advantage of existing feature extraction and detection networks. A Multi-modal Feature Fusion Module is subsequently designed to selectively combine feature output from different streams to achieve accurate fusion. Extensive experiments have demonstrated that our framework not only achieves superior performance but also improves the detection of existing benchmarks, especially bicycle and pedestrian detection on KITTI benchmarks, with strong robustness and generalization capabilities. We plan to use the framework to adapt to more types of data and downstream tasks in the future. Hopefully, our work will stimulate more research into multi-modal fusion for autonomous driving tasks.
-2cm
IEEEtran
|
http://arxiv.org/abs/2303.07270v1
|
20230313164723
|
Spherical harmonics representation of the gravitational phase shift
|
[
"Slava G. Turyshev",
"Viktor T. Toth"
] |
gr-qc
|
[
"gr-qc",
"astro-ph.EP",
"math-ph",
"math.MP",
"physics.geo-ph",
"physics.optics"
] |
3pt^1Jet Propulsion Laboratory, California Institute of Technology,
4800 Oak Grove Drive, Pasadena, CA 91109-0899, USA
3pt^2Ottawa, Ontario K1N 9H5, Canada
We investigate the evolution of the general relativistic phase of an electromagnetic (EM) wave as it propagates in a weak gravitational field. For that, we introduce coordinate systems used in the Earth's vicinity, the relevant coordinate transformations, and discuss the transformations between proper and coordinate times. Then, by treating the source as an isolated, weakly aspherical gravitating body, we represent its external gravitational field using Cartesian symmetric trace-free (STF) mass multipole moments. The light propagation equation is solvable along the trajectory of a light ray to all STF orders ℓ. We express the STF moments via spherical harmonic coefficients of various degree and order, C_ℓ k, S_ℓ k. Although we focus primarily on the quadrupole (ℓ=2), octupole (ℓ=3), and hexadecapole (ℓ=4) cases, our approach is valid to all orders. The result is the gravitational phase shift expressed in terms of the spherical harmonics. These results are new, useful, and important as increasingly accurate clocks are used for many practical and scientific applications, including space-based time and frequency transfers, relativistic geodesy, and navigation. We also consider tidal contributions and contributions due to the Earth's rotation. We estimate the characteristic numerical magnitudes of each term of the resulting overall gravitational phase shift.
03.30.+p, 04.25.Nx, 04.80.-y, 06.30.Gv, 95.10.Eg, 95.10.Jk, 95.55.Pe
Spherical harmonics representation of the gravitational phase shift
Slava G. Turyshev^1, Viktor T. Toth^2
March 30, 2023
===================================================================
§ INTRODUCTION
The accuracy of time and frequency measurements improved significantly in the recent past. Presently, atomic frequency standards play a vital part in a growing number of technological and scientific endeavors. Atomic clocks based on microwave transitions currently define the Système Internationale (the International System of Units, or SI) second and are used extensively for network synchronization and satellite-based navigation systems, such as the Global Positioning System (GPS). Performance of the onboard clocks on global navigational satellite system (GNSS) satellites is improving. The frequency stability of the current generation of GPS clocks is now better than 10^-14 <cit.>.
Optical frequency references based on Doppler-free spectroscopy of molecular iodine are seen as a promising candidate for a future GNSS optical clock <cit.>. Compact and ruggedized setups have been developed, showing frequency instabilities at the 10^-15 level for averaging times between 1 s and 10^4 s. Optical atomic clocks have demonstrated stability of 4.8× 10^-17/√(τ), for an averaging time τ (in seconds). The ability to resolve frequency shifts below 10^-18 over such short timescales will affect a wide range of applications for clocks in quantum sensing and fundamental physics <cit.>.
As a result, future generations of GNSS will benefit from optical technologies. Especially optical clocks could provide backup or completely replace the currently used microwave clocks, potentially improving GNSS position determination thanks to their greater frequency stability. Furthermore, optical clock technologies, in combination with
optical intersatellite links, enable new GNSS architectures, e.g., by the synchronization of distant optical frequency references within the constellation using time and frequency transfer.
As a result, future time and frequency transfer links based on the new generations of clocks will require a general relativistic description of the light propagation in the gravitational field of the extended Earth. For practical reasons, the description of the Earth external gravity field is given in terms of spherical harmonics. Until recently, it was sufficient to include the contribution of the gravitational mass monopole represented by the well-known Shapiro time delay. However, with the increased accuracy of modern measurements, accounting for the Earth's quadrupole moment, J_2, became important <cit.>. This was accomplished by treating the Earth as a rotating axisymmetric body characterized only by zonal harmonics of even order, yielding the quadrupole phase shift <cit.>.
If greater accuracy is required, accounting for the quadrupole contribution is not sufficient <cit.>. It is necessary to account for additional spherical harmonics. For some applications, in addition to J_2, the tesseral harmonics of order ℓ=2 must also be considered, along with additional low-order zonal harmonics of the Earth's gravitational field. Accurate estimates of these quantities are available to high degree and order in the form of modern models of the Earth's gravitational field. For instance, the EGM2008 Earth gravitational model is complete to degree and order 2159 <cit.>. However, due to technical reasons, a description of gravitational phase shift in terms of spherical harmonics is not available. This represents an interesting challenge that must be addressed.
Motivated by this challenge, in the present paper we develop a model for proper time to coordinate time transformations and the gravitational phase shift in terms of spherical harmonics that offer the advanced representation of the Earth gravitational field. We focus on the formulation of a relativistic model for the gravitational phase delay, accurate to 1× 10^-16 in frequency stability and 1 picosecond (ps) in time resolution. We rely on a previously developed theory of relativistic proper reference frames for a system of extended gravitating bodies and the motion of light and test particles in the vicinity of an extended body <cit.>. We use methods and tools developed for the GRAIL, GRACE-FO and ACES missions <cit.> as well as the techniques that we recently developed for treating gravitational lensing phenomena by arbitrarily shaped weakly aspherical gravitating bodes <cit.>.
This paper is organized as follows: In Sec. <ref> we introduce coordinate systems, coordinate transformations between various coordinates used for GPS and discuss the transformations between proper time and coordinate time. In Sec. <ref> we discuss light propagation in the vicinity of the extended Earth and derive a general relativistic solution for the phase of an EM wave. For that we represent the Earth's external gravitational field using as set of Cartesian symmetric trace-free (STF) mass multipole moments T^a_1...a_ℓ of various orders ℓ. In Sec. <ref>, we study the phase shift introduced by the lowest-order multipole moments, including quadrupole (ℓ=2), octupole (ℓ=3), and hexadecapole (ℓ=4).
We also express the obtained results in terms of the spherical harmonics of the appropriate degree and order, C_ℓ k, S_ℓ k. We conclude with a set of recommendations and an outlook in Sec. <ref>.
For convenience, we put some additional details in appendices: In Appendix <ref> we discuss the correspondence between the STF mass moments, T^<ab>, and spherical harmonics, {C_2k,S_2k}, and present a practical way to establish the correspondence between them. In Appendix <ref>, we compute useful relations for deriving contributions from low STF mass moments, including quadrupole, octupole, and hexadecapole. Finally, in Appendix <ref>, we derive gravitational phase shift for the same orders, but in the specific case of an axisymmetric gravitational field.
§ COORDINATE SYSTEMS AND PROPER-TO-COORDINATE TIME TRANSFORMATIONS
GPS relies on three standard coordinate systems: the GCRS, which is centered at the Earth's center of mass and is used to track orbits in the vicinity of the Earth; the Topocentric Coordinate Reference System (TCRS), which is used to provide the positions of objects on the surface of the Earth, such as DSN ground stations; and the Satellite Coordinate Reference System (SCRS), which is needed for proper-to-coordinate time transformations. Definition and properties of TCRS together with useful details on relativistic time-keeping in the solar system are given in <cit.>. The SCRS was discussed in <cit.> in the context of the GRAIL mission. Here we investigate a need for an update for the standard general relativistic models for spacetime coordinates and equations of motion <cit.>.
We begin our discussion by describing the Geocentric Coordinate Reference System (GCRS), the reference system in which the gravitational field of the Earth is presented using measured spherical harmonic coefficients.
§.§ Geocentric Coordinate Reference System
In the vicinity of the Earth, we utilize the standard non-rotating coordinate system known as the Geocentric Coordinate Reference System (GCRS). Centered at the Earth's center of mass, the GCRS is used to track orbits in the vicinity of the Earth <cit.>. It is also called the Earth-Centered Earth-Fixed (ECEF) coordinate system <cit.>. We denote the coordinates in this reference frame as {x^m_ E}≡(x^0=ct, x⃗) and present the metric tensor g^ E_mn in the following form[The notational conventions employed in this paper are those used in <cit.>. Letters from the second half of the Latin alphabet, m, n,...=0...3 denote spacetime indices. Greek letters α, β,...=1...3 denote spatial indices. The metric γ_mn is that of Minkowski spacetime with γ_mn= diag(+1,-1,-1,-1) in the Cartesian representation. We employ the Einstein summation convention with indices being lowered or raised using γ_mn. We use powers of G and negative powers of c as bookkeeping devices for order terms. Other notations are explained as they occur.]:
g^ E_00 = 1-2/c^2w_ E+2/c^4w^2_ E+O(c^-6),
g^ E_0α= -γ_αλ4/c^3w^λ_ E+O(c^-5),
g^ E_αβ= γ_αβ+γ_αβ2/c^2 w_ E+O(c^-4),
where the scalar gravitational potential w_ E is formed as a linear superposition of the gravitational potential U_ E of the isolated Earth and the tidal potential u^ tidal_ E produced by all the solar system bodies (excluding the Earth itself), evaluated at the origin of the GCRS:
w_ E(x⃗) = U_ E(x⃗)+ u^ tidal_ E(x⃗)+ O(c^-3).
The Earth's gravitational potential is well known and determined by the relativistic mass density inside the Earth, σ(t,x⃗') (see discussion in <cit.>). With G being the universal gravitational constant this potential has the form
U_ E(x⃗) = G∫σ(t,x⃗')d^3x'/|x⃗-x⃗'|+ O(c^-4).
Outside the Earth (r>R_⊕), the planet's gravitational potential U_ E may be expanded in terms of spherical harmonics. In this case, at a particular location with spherical coordinates (r≡|x⃗|,ϕ,θ) (where ϕ is the longitude and θ is the colatitude, which is 0 at the pole and π/2 at the equator) the Earth's potential U_ E in (<ref>) is given as
U_ E(x⃗) = GM_⊕/r{1+∑_ℓ=2^∞∑_k=0^+ℓ(R_⊕/r)^ℓ P_ℓ k(cosθ)(C_ℓ kcos kψ+S_ℓ ksin kψ)}=
= GM_⊕/r_{1-∑_ℓ=2^∞(R_⊕/r_)^ℓ J_ℓ P_ℓ0(cosθ)+∑_ℓ=2^∞∑_k=1^+ℓ(R_⊕/r)^ℓ P_ℓ k(cosθ)(C_ℓ kcos kψ+S_ℓ ksin kψ)},
where M_⊕ and R_⊕ are the Earth's mass and equatorial radius, respectively, while P_ℓ k are the associated Legendre-polynomials <cit.>. The values C_ℓ k and S_ℓ k are the spherical harmonic coefficients that characterize contributions of the gravitational field of the Earth beyond the monopole potential. Of these, J_ℓ=-C_ℓ 0 are the zonal harmonic coefficients. Largest among these is J_2=1.082635854× 10^-3, with all other spherical harmonic coefficients at least a factor of ∼10^3 times smaller <cit.> (see Table <ref> for details).
Insofar as the tidal potential u^ tidal_ E is concerned, for GPS observables it is sufficient to keep only its Newtonian contribution (primarily due to the Sun and the Moon) which can be given as usual:
u^ tidal_ E(x⃗) = ∑_b≠ E(U_b(r⃗^_b E+x⃗)-U_b(r⃗^_b E) - x⃗·∇⃗ U_b (r⃗^_b E))≃∑_b≠ EGM_b/2r^3_b E(3(n⃗^_b E·x⃗)^2-x⃗^2)+
O(r^-4_b E,c^-2),
where U_b is the Newtonian gravitational potential of body b, r⃗_b E is the vector connecting the center of mass of body b with that of the Earth, and ∇⃗U_b denotes the gradient of the potential. We present only the largest term in the tidal potential, which is of O(r^-3_b E); however, using the explicit form of this potential on the left side of Eq. (<ref>), one can easily evaluate this expression to any order needed to solve a particular problem.
Finally, the contribution of the Earth's rotation is captured by the vector harmonic potential, w^α_ E, defined as:
w^α_ E(x⃗)
= G∫σ^α(t,x⃗')d^3x'/|x⃗-x⃗'|+ O(c^-2)=-GM_ E/2r^3[x⃗×S⃗_⊕]^α+ O(r^-4, c^-2),
where σ^α(t,x⃗') is the relativistic current density of the matter distribution inside the rotating Earth. Also, in (<ref>) we explicitly account only for the largest rotational moment, S⃗_⊕, which is the Earth's spin moment (angular momentum per unit of mass), S⃗_⊕≃ 9.8× 10^8 m^2/s. Contributions of other vector harmonics due to the rotating Earth are negligible (however, if needed, they may be easily incorporated using the approach developed in this paper).
The metric tensor (<ref>) with the gravitational potentials (<ref>)–(<ref>) represents spacetime in the GCRS, which we choose to formulate the relativistic model for timing and frequency observables. Further technical details on the formulation of the GCRS are in <cit.>.
Refs. <cit.>, show that the proper time, τ, read by a clock in harmonic coordinates of the SCRS denoted here by {y^m}={cy^0, y⃗}, and coordinates of GCRS {x^m}={ct, x⃗}, to sufficient accuracy, are given by
dτ/dt = 1-c^-2[1/2v⃗^2+
U_ E+u^ tidal_ E]+ O(c^-4),
where v⃗ is the velocity of the transmitter (or receiver) in GCRS and U_ E is the Newtonian gravitational potential of the Earth (<ref>), evaluated at that location. Contribution of the tidal potential, u^ tidal_ E, varies depending on the distance from the Earth; it reaches the value above ∼ 1.71× 10^-15 for geostationary orbits. The c^-4 terms in Eq. (<ref>) are of O(v^4/c^4)≃ 10^-19 and are negligible for our purposes. For a complete post-Newtonian form of these transformations, including c^-4 terms, and their explicit derivation, consult Ref. <cit.>.
The numerical applications made in here concern time and frequency transfer from between a GPS (designated here by `A') and LEO (designated here by `B') spacecraft orbiting the Earth at the altitudes h_ GPS = 20,200 km and h_ LEO = 200 km to a ground station located at `C'. As mentioned earlier, we consider experimental uncertainties 1 × 10^-16 for frequency transfer and at the level of 1 ps for time transfer.
§.§ Topocentric Coordinate Reference System (TCRS): proper and coordinate times
First, we consider a ground-based receiver located at GCRS coordinates
{x^m_C}≡(cx^0_ C,x⃗_ C).
The proper time τ_ C, kept by a clock located at the GCRS coordinate position R⃗_ C(t), and moving with the coordinate velocity v⃗_ C = dx⃗_ C/dt=[ω^_ E×R⃗_ C], where ω_ E is the angular rotational velocity of the Earth at C, is determined by
dτ_ C/dt= 1-1/c^2[1/2v⃗_ C^2+U_ E(x⃗_ C)+ ∑_b≠ EGM_b/2r^3_b E(3(n⃗_b E·x⃗_ C)^2-x⃗_ C^2)]+ O(x^3_ C,c^-4),
where n⃗_b E is a unit spatial vector in the body-Earth direction, i.e., n⃗_b E=r⃗_b E/|r⃗_b E|, where r⃗_b E is the vector connecting body b with the Earth.
The first two terms in (<ref>) are due to the geocentric velocity of a ground station and the Newtonian potential at its location.
Assuming a uniform diurnal rotation of the Earth, so that 1/2v⃗_ C^2=1/2ω_⊕^2 R^2_ C(θ)sin^2θ, we evaluate the magnitudes of the largest contributions produced by these terms, evaluated at the Earth's equator R_ C(π/2)=R_⊕:
c^-21/2v⃗_ C^2 = 1/2c^2ω_⊕^2 R^2_⊕≲
1.20 × 10^-12,
c^-2U_ E = 1/c^2GM_⊕/R_⊕≲
6.95 × 10^-10.
Thus, both of these terms are very large and must be kept in the model. In addition, as we will see below, one would have to account for several terms in the spherical harmonics expansion of the Earth gravity potential.
The last term within the square brackets in Eq. (<ref>) is the sum of the Newtonian tides due to other bodies (mainly the Sun and the Moon) at the clock location x⃗_ C. These terms are small for the ground station, being of order
c^-2u^ tidal_ E⊙ ≃ GM_⊙ R_⊕^2/2 AU^3c^2(3(n⃗_⊙ E·n⃗_ C)^2-1)≲
1.79 × 10^-17,
c^-2u^ tidal_ E ≃ Gm_ R_⊕^2/2 r^3_ -1pt Ec^2(3(n⃗_ -1pt E·n⃗_ C)^2-1)≲
4.90 × 10^-17,
where for the Moon we used its distance from the Earth at the perigee[<https://en.wikipedia.org/wiki/Lunar_distance_(astronomy)>] of r_ -1pt E=356,500 km.
Thus, both largest tidal contributions are currently negligible as far as the definition of the TCRS for GPS is concerned.
Therefore, at the accuracy required for GPS, it is sufficient to keep only the first two terms in Eq. (<ref>) when defining the relationship between the proper time τ_ C and the coordinate time TCG=t (Temps-coordonnée géocentrique). In other words, Eq. (<ref>) yields the differential equation that relates the rate of the proper τ_ C time, as measured by an receiver's clock on the surface of the Earth, so that 1/2v⃗_ C^2=1/2ω_⊕^2 R^2_ C(θ)sin^2θ, to the time in GCRS, t.
dτ_ C/dt = 1 -1/c^2[
1/2v⃗_ C^2
+ U_ E(x⃗_ C)]+ O(c^-4).
At the level of accuracy required for GPS, it is important to account in Eq. (<ref>) for the oblateness (nonsphericity) of the Earth's Newtonian potential, which is given in the form of Eq. (<ref>). In fact, when we model the Earth's gravity potential, we need to take into account quadrupole and higher moments, time-dependent terms due to tides, as well as the tidal displacement of the ground-based receiver. Substituting in Eq. (<ref>) potential U_ E from (<ref>), evaluated at the Earth's equator r=R_ C(π/2)=R_⊕, we have:
dτ_ C/dt =
1-1/c^2[1/2ω_⊕^2 R^2_⊕+
GM_⊕/R_⊕(1-∑_ℓ=2^∞ J_ℓ P_ℓ0(0)+∑_ℓ=2^∞∑_k=1^+ℓP_ℓ k(0)(C_ℓ kcos kϕ+S_ℓ ksin kϕ))
].
The largest contribution to dτ_ C/dt, of course, comes from the velocity and mass monopole terms, which are estimated to produce an effect of the order of c^-2(1/2ω_⊕^2 R^2_⊕+G M_⊕/R_⊕)∼ 6.97× 10^-10. The quadrupole term produces a contribution of the order of c^-2G M_⊕ J_2/(2R_⊕)∼ 3.76× 10^-13.
Contributions of other zonal harmonics ranging from -c^-23G M_⊕ J_4/(8R_⊕)∼ 4.22× 10^-16 (from J_4) to c^-25G M_⊕ J_6/(16R_⊕)∼ 1.04× 10^-16 (from J_6) and to c^-235G M_⊕ J_8/(128R_⊕)∼ 1.01× 10^-16 (from J_8).
We also need to include contributions from the leading ℓ=2 coefficients C_22 and S_22, which are of order c^-2(G M_⊕ /R_⊕)P_22(0)C_22cos 2ϕ∼ 3.28× 10^-15cos 2ϕ and c^-2(G M_⊕ /R_⊕)P_22(0)S_22sin 2ϕ∼ 1.89× 10^-15cos 2ϕ. Some of the low-order tesseral harmonics, C_ℓ k and S_ℓ k, are also responsible for the terms of the order of ∼10^-16, and thus, they should also be included, up to at least ℓ=8.
Although individual contributions of these and other terms are quite small, their cumulative effect may be noticeable even at the level of up to 1× 10^-15. (This is especially important for the ACES mission on the ISS, which will operate clocks accurate to 1× 10^-16 in low Earth's orbit with altitude of ∼400 km.) However, the constant rate is typically absorbed for each clock during its synchronization with the network of clocks, leaving only periodic terms, which are uncertain at the level of ∼10^-17. Therefore, keeping only the leading terms, Eq. (<ref>) takes the form:
dτ_ C/dt=
1-1/c^2[1/2ω_⊕^2 R^2_⊕ + GM_⊕/R_⊕(1+1/2J_2-3/8J_4+5/16J_6-35/128J_8+P_22(0)(C_22cos 2ϕ+S_22sin 2ϕ)+
+ ∑_ℓ=3^8∑_k=1^+ℓP_ℓ k(0)(C_ℓ kcos kϕ+S_ℓ ksin kϕ))
]+ O(5.83× 10^-17),
where the error bound is set by the contribution from J_10 and some of the low-order tesseral harmonics. Keeping only the ℓ=2 terms, this expression can be truncated to
dτ_ C/dt =
1-1/c^2[1/2ω_⊕^2 R^2_⊕+
GM_⊕/R_⊕(1+1/2J_2+3(C_22cos 2ϕ+S_22sin 2ϕ))
]+ O(2.28× 10^-15cosϕ),
where the error bound is set by the contribution from C_31 coefficient (see Table <ref>).
In the past, clock synchronization relied on a definition of Earth's geoid. In this case, for a clock situated on the surface of the Earth, the relativistic correction term appearing in Eq. (<ref>) is given at the needed precision by
v⃗^2_ C/2 + U_ E(x⃗_ C)= W_0-∫_0^h_ C -7pt g dh,
where W_0 = 6.2636856× 10^7 m^2/s^2 is the Earth's potential at the reference geoid while g denotes the Earth's acceleration (gravitational plus centrifugal), and where h_ C is the clock's altitude above the reference geoid. However, as we mention above, this definition of terrestrial time is problematic when considering accuracies below 10^-17 because of the uncertainties in the realization of the geoid at this level.
In practice, time measurements are based on averages of clock and frequency measurements on the Earth surface <cit.>. Therefore it was decided to dissociate the definition of TT from the geoid while maintaining continuity with the previous definition. For this purpose, the time coordinate called Terrestrial Time (TT) is defined. TT is related to TCG=t linearly by definition:
dt_ TT/dt=1-L_ G.
IAU Resolution B1.9 (2000) turned L_G into a defining constant with its value fixed to L_ G=6.969290134× 10^-10.
This definition accounts for the secular term due to the Earth's potential when converting between TCG and the time measured by an idealized clock on the Earth geoid <cit.>. Using Eq. (<ref>), we also have
dτ_ C/dt_ TT=dτ_ C/dtdt/dt_ TT=1+L_ G-1/c^2[1/2v⃗^2_ C
+ U_ E(x⃗_ C)]+ O(c^-4).
Clearly, if the target clock synchronization is of the order of ∼ 10^-15, the definition (<ref>) is rather clean with just a few terms given by (<ref>). This expression quickly becomes rather messy if a more precise synchronization is desired.
§.§ Satellite Coordinate Reference System (SCRS)
We can also determine the differential equation that relates the rate of the spacecraft proper τ_ A time, as measured by an on-board clock in Earth orbit with GCRS coordinates {y^m_ A}={cy^0_ A, y⃗_ A}, to the time in GCRS, TCG=t. Substituting in (<ref>) potential U_ E from (<ref>) and largest term for the tidael potential u^ tidal_ E from (<ref>), we have:
dτ_ A/dt=
1-1/c^2[1/2v⃗^2_ A + GM_ E/r_ A(1-∑_ℓ=2^∞(R_ E/r_ A)^ℓ J_ℓ P_ℓ0(cosθ) + ∑_ℓ=2^∞∑_k=1^+ℓ(R_ E/r_ A)^ℓ P_ℓ k(cosθ)(C_ℓ kcos kϕ+S_ℓ ksin kϕ))+
+ ∑_b≠ EGM_b/2r^3_b E(3(n⃗_b E·y⃗_ A)^2-y⃗_ A^2)]+ O(y^3_ A,c^-4).
We will evaluate the magnitude of the terms in this equations for two different orbits - LEO with altitude 200 km and GPS with altitude 20,200 km. We will keep in mind the anticipated frequency stability of Δ f/f= 1× 10^-15. We will use these numbers to evaluate the terms in (<ref>).
§.§.§ LEO clock: proper-to-coordinate time transformation
In the case of the LEO orbit with altitude of h_A=200 km, the largest contribution to (dτ_ A/dt)_ LEO, of course, comes from the velocity and mass monopole terms, which are estimated to produce an effect of the order of c^-2(1/2v⃗^2_ A+G M_ E/(R_⊕ +h_ LEO)=c^-23G M_ E/2(R_⊕ +h_ LEO)∼ 1.01× 10^-9. Because of the larger contribution, this term is 1.45 times larger than for a receiver on the ground (see estimated presented above, just after Eq. (<ref>).)
For the chosen LEO orbit, the quadrupole term produces contribution of the order of
G M_⊕ R_⊕^2/c^2 (R_⊕+h_ LEO)^3J_2P_20(cosθ)≲ 6.86× 10^-13,
which is large enough to be included in the model.
Contributions of other zonal harmonics are estimated as
G M_⊕ R_⊕^3/c^2 (R_⊕+h_ LEO)^4J_3 P_30(cosθ)≲ 1.56× 10^-15, G M_⊕ R_⊕^4/c^2 (R_⊕+h_ LEO)^5J_4P_40(cosθ)≲ 9.65× 10^-16,
G M_⊕ R_⊕^5/c^2 (R_⊕+h_ LEO)^6J_5 P_50(cosθ)≲ 1.21× 10^-16, G M_⊕ R_⊕^6/c^2 (R_⊕+h_ LEO)^7J_6P_40(cosθ)≲ 3.03× 10^-16,
G M_⊕ R_⊕^7/c^2 (R_⊕+h_ LEO)^8J_7 P_70(cosθ)≲ 2.71× 10^-16, G M_⊕ R_⊕^8/c^2 (R_⊕+h_ LEO)^9J_8P_80(cosθ)≲ 1.51× 10^-16,
G M_⊕ R_⊕^9/c^2 (R_⊕+h_ LEO)^10J_9 P_90(cosθ)≲ 8.04× 10^-17, G M_⊕ R_⊕^10/c^2 (R_⊕+h_ LEO)^11J_10P_10 0(cosθ)≲ 2.28× 10^-16.
Note that to develop the estimates above we used approximated P_ℓ0 by their largest value at θ=0. In reality, these polynomials rarely take that value and thus P_ℓ0 are much less than 1. On the other hand, although the contributions from J_7,J_8,J_9,J_10 are all on the order of 1 to 2 parts in 10^-16, their cumulative effect may exceed the threshold of 10^-16. Nevertheless, we recommend keeping only the contributions from J_2,J_3 and J_4.
The situation with tesseral harmonics is a bit more complicated as many of them produce contributions on the order of a few parts in 10^-16. The largest among these are those due to C_22 and S_22:
G M_⊕ R_⊕^2/c^2 (R_⊕+h_ LEO)^3P_22(cosθ){C_22cos 2ϕ, S_22sin 2ϕ} ≲ {9.98× 10^-16cos 2ϕ, 5.73× 10^-16sin 2ϕ}.
The contributions from the terms of ℓ=3 are
G M_⊕ R_⊕^3/c^2 (R_⊕+h_ LEO)^4P_31(cosθ){C_31cosϕ,
S_31sinϕ} ≲ {1.35× 10^-15cosϕ, 1.65× 10^-16sinϕ},
G M_⊕ R_⊕^3/c^2 (R_⊕+h_ LEO)^4P_32(cosθ){C_32cos 2ϕ,
S_32sin 2ϕ} ≲ {1.90× 10^-16cos2 ϕ, 1.30× 10^-16sin 2ϕ},
G M_⊕ R_⊕^3/c^2 (R_⊕+h_ LEO)^4P_33(cosθ){C_33cos 3ϕ, S_33sin 3ϕ} ≲ {6.10× 10^-17cos 3ϕ, 1.21× 10^-16sin 3ϕ}.
The contributions from the terms of ℓ=4 are
G M_⊕ R_⊕^4/c^2 (R_⊕+h_ LEO)^5P_41(cosθ){C_41cosϕ, S_41sinϕ} ≲ {3.03× 10^-16cosϕ, 2.67× 10^-16sinϕ},
G M_⊕ R_⊕^4/c^2 (R_⊕+h_ LEO)^5P_42(cosθ){C_42cos 2ϕ, S_42sin 2ϕ} ≲ {4.66× 10^-17cos2 ϕ, 8.82× 10^-17sin 2ϕ},
G M_⊕ R_⊕^4/c^2 (R_⊕+h_ LEO)^5P_43(cosθ){C_43cos 3ϕ, S_43sin 3ϕ} ≲ {3.53× 10^-17cos 3ϕ, 7.16× 10^-18sin 3ϕ},
G M_⊕ R_⊕^4/c^2 (R_⊕+h_ LEO)^5P_44(cosθ){C_44cos 4ϕ, S_44sin 4ϕ} ≲ {2.37× 10^-18cos 4ϕ, 3.88× 10^-18sin 4ϕ}.
Although their individual contributions are quite small, the cumulative effect of these terms may easily reach the level of ϵ_ LEO0≈ 1.33× 10^-15. The constant rate ϵ_ LEO0 would likely be absorbed in other terms during clock synchronization. What is important is the variability in the entire error term ϵ_ LEO(t)=ϵ_ LEO0+δϵ_ LEO(t), where the amplitude of the variable term δϵ_ LEO(t) is due to seasonal changes in the Earth hydrosphere, crust, etc. and is expected to be of the order of δϵ_ LEO(t)∼ 3× 10^-17, resulting in the ultimate uncertainty in dτ_ A/dt at that level.
The last term within the square brackets in Eq. (<ref>) is the sum of the Newtonian tides due to the Sun and the Moon at the location of a clock in an Earth orbit. For a chosen LEO orbit, these terms are small:
c^-2u^ tidal_ E⊙ ≃ GM_⊙ (R_⊕+h_ LEO)^2/2 AU^3c^2(3(n⃗_⊙ E·n⃗_ C)^2-1)≲
1.91 × 10^-17,
c^-2u^ tidal_ E ≃ Gm_ (R_⊕+h_ LEO)^2/2 r^3_ -1pt Ec^2(3(n⃗_ -1pt E·n⃗_ C)^2-1)≲
5.21 × 10^-17,
and, thus, may be neglected.
Therefore, for LEO in equation (<ref>) we must keep the following terms:
dτ_ A/dt =
1-1/c^2[v⃗^2_ A/2+
GM_ E/r_ A(1-∑_ℓ=2^4(R_ E/r_ A)^ℓ J_ℓ P_ℓ0(cosθ)+
(R_ E/r_ A)^2 P_22(cosθ)(C_22cos 2ϕ+S_22sin 2ϕ)+
53pt + (R_ E/r_ A)^3 P_31(cosθ)(C_31cosϕ+S_31sinϕ)
)]+
O(3.03× 10^-16),
where the size of the error term is set by J_6 and cumulative contribution of higher ℓ≥ 3 gravitational harmonics.
Clearly, such a modeling accuracy is at the limit anticipated for the Deep Space Atomic Clocks (DSAC) with frequency stability at the level of 1× 10^-16 at 1 day (if DSAC is placed on a LEO). However, it is already insufficient for ESA's ACES mission on the International Space Station and DSAC, where clock accuracy is expected to be at the level of 1× 10^-16 at 1 day. Furthermore, there are plans to fly an optical interferometer and highly-stable optical link as a part of the STE-QUEST mission <cit.> and also a Space Optical Clock (SOC) mission <cit.> with frequency stability below 1× 10^-17, for which a new and more detailed model may be required.
§.§.§ GPS clock: proper-to-coordinate time transformation
Now we consider GPS orbit with h_ GPS=22,200 km and estimate the sizes of all the terms entering (<ref>). Clearly, the largest contribution to (dτ_ A/dt)_ GPS, of course, comes from the velocity and mass monopole terms, which are estimated to produce an effect of the order of
1/c^2(1/2v⃗^2_ GPS+G M_⊕/R_⊕+h_ GPS)=3G M_⊕/2c^2(R_⊕+h_ GPS)∼ 2.50× 10^-10,
or almost 4 times smaller than for LEO, but still providing a rather large contribution.
The quadrupole term produces contribution of the order of
G M_⊕ R_⊕^2/c^2 (R_⊕+h_ GPS)^3J_2 P_20(cosθ) ≲ 1.04× 10^-14,
which is significant. Contributions of tesseral harmonics with ℓ=2 are estimated as
G M_⊕ R_⊕^2/c^2 (R_⊕+h_ GPS)^3P_22(cosθ){C_22cos 2ϕ , S_22sin 2ϕ} ≲ {1.51× 10^-17cos 2ϕ, 8.69× 10^-18cos 2ϕ},
and are small to provide a measurable contribution.
Contributions of other zonal harmonics ranging from ≲ 5.85× 10^-18 (from J_3), to ≲ 9.08× 10^-19 (from J_4),
to ≲ 2.79× 10^-20 (from J_5),
to ∼ 1.72× 10^-20 (from J_6), which are clearly negligible and may be omitted.
Evaluating the contribution due to Newtonian tides in Eq. (<ref>) for a GPS orbit, we find the following
c^-2u^ tidal_ E⊙ ≃ GM_⊙ (R_⊕+h_ GPS)^2/2 AU^3c^2(3(n⃗_⊙ E·n⃗_ C)^2-1)≲
3.11 × 10^-16,
c^-2u^ tidal_ E ≃ Gm_ (R_⊕+h_ GPS)^2/2 r^3_ -1pt Ec^2(3(n⃗_ -1pt E·n⃗_ C)^2-1)≲
8.50 × 10^-16,
and, thus, these terms must be kept in any model that aims for to offer frequency stability of O(10^-16).
Therefore, for the case of atomic clocks on GPS spacecraft in the (<ref>) we must keep only the quadrupole term as well as the two tidal terms:
dτ_ A/dt =
1-1/c^2[v⃗^2_ A/2+
GM_⊕/r_ A(1-J_2(R_ E/r_ A)^2
P_20(cosθ))+
∑^ S, m_b≠ EGM_b/2r^3_b E(3(n⃗_b E·y⃗_ A)^2-y⃗_ A^2)]+ O(6.34× 10^-17),
where the size of the error term is set by the magnitude of the next term in lunar tide, which is of the order of (R_⊕+h_ GPS)/r_ -1pt E∼ 0.075 times smaller compared to the first term of lunar tide <cit.>. Also, we used a convenient notation for Legendre polynomial P_20(cosθ)=(3z^2_ A-r^2_ A)/2r^2_ A.
As a result, the expression for proper to coordinate time transformation for LEO, (<ref>), and GPS, (<ref>), satellites explicitly includes the effects of the Earth's oblateness, J_2. The presence of this term in the equations of motion will lead to a perturbation of a Keplerian orbit. The effect of the quadrupole is large. Computing the perturbations to Keplerian orbital elements, we see that for the semi-major axis, r_ A=a, if the eccentricity is very small, the dominant contribution has a period twice the orbital period and has amplitude 3J_2 R^2_ Esin^2 i/(2a)≃ 1665 m, assuming an orbital inclination of i=55^∘. The effect of J_2 is significant and should be modeled for satellite clocks in low Earth orbit.
§.§.§ Accounting for orbital perturbations due to Earth's oblateness J_2
The presence of the J_2 term in (<ref>) and (<ref>) may be accounted for within a perturbation theory. Perturbations of GPS orbits due to Earth's quadrupole mass distribution are a significant fraction of the change in semi-major axis associated with the corresponding orbit change. One needs to estimate the effect of Earth's quadrupole moment on
the orbital elements of a Keplerian orbit and thence on the change in frequency induced by an orbit change.
Accounting for the perturbation in Keplerian orbital elements including the semi-major axis, a, eccentric anomaly, E= M+esin E (with M being the mean anomaly), eccentricity, e, orbital radius, r=a(1-ecos E), we can compute perturbations to each of the terms v_ A^2, in GM_ E/r_ A and the quadrupole term in (<ref>) and (<ref>), namely those is. The corresponding calculations are lengthy, but straightforward and are well-known. Here we present only the final relevant result:
-v⃗^2_ A/2c^2 - GM_⊕/c^2r_ A(1-J_2[R_⊕/r_ A]^23z^2_ A-r^2_ A/2r^2_ A)=
= 3GM_⊕/2c^2a_0-2GM_⊕/c^2a_0e_0cos E_0-
7GM_⊕ R^2_⊕ J_2/2c^2a^3_0(1-3/2sin^2 i_0)-
GM_⊕ R^2_⊕ J_2sin^2 i_0/c^2a^3_0cos2(ω_0+u),
where i_0 is the inclination, ω is the altitude of perigee and u is the true anomaly. Also, subscript ()_0 refers to an unperturbed quantity.
The first term, when combined with the reference potential at Earth's geoid, gives rise to the “factory frequency offset” estimated to be 3GM_⊕/2c^2a_0∼ 2.50× 10^-10. The second term gives rise to the eccentricity effect. The third term is estimated to be
7G M_⊕ R_⊕^2 J_2/2c^2 (R_⊕+h_ GPS)^3(1-3/2sin^2 i_0) ∼ 2.37× 10^-16,
and at the limit of the anticpated accuracy.
This is for the nominal inclination of GPS orbits of i_0=55^∘ such that the factor (1 - 3/2sin^2 i_0)=-6.52× 10^-3. The near vanishing of this factor is pure coincidence in the GPS. The last term has an amplitude
GM_⊕ R^2_⊕ J_2sin^2 i_0/c^2a^3_0=6.98×10^-15,
which may be large enough to consider when calculating frequency shifts produced by orbit changes. Therefore, this contribution may have to be considered in the determination of the
semi-major axis, but for now we neglect it.
The last periodic term in Eq. (<ref>) is of a form similar to that which gives rise to the eccentricity correction, which is applied by GPS receivers. Considering only the last periodic term, the
additional time elapsed on the orbiting clock will be given by
Δ t_J_2=-∫_ pathdt[
GM_⊕ R^2_⊕ J_2sin^2 i_0/c^2a^3_0cos2(ω_0+nt)],
where to a sufficient approximation we have replaced the quantity u in the integrand by n=√(GM_⊕/a^3_0) is the approximate mean motion of GPS satellites. Integrating and dropping the constant of integration (assuming as usual that such constant time offsets are lumped with other contributions) gives the periodic relativistic effect on the elapsed time of a clock on a GPS spacecraft due to Earth's
quadrupole moment:
Δ t_J_2=-√(GM_⊕/a^3_0)R^2_⊕ J_2sin^2 i_0/2c^2sin2(ω_0+nt).
The phase of this effect is zero when the satellite passes through Earth's equatorial plane going northwards. If not accounted for, this effect on a LEO clock time has the magnitude of Δ t_J_2 LEO = 1.95× 10^-10 s, giving rise to a peak-to-peak periodic navigational error in position of approximately 2c×Δ t_J_2 LEO = 11.67 cm. The same effect on GPS clock has the magnitude of Δ t_J_2 GPS = 2.40× 10^-11 s and is responsible for a peak-to-peak periodic navigational error in position of about 2c×Δ t_J_2 GPS = 1.44 cm. Therefore, these effects must be included in the model for high-accuracy orbit determination, especially for supporting for DSAC, ACES, STE-QUEST, and SOC missions in the near future.
§.§.§ Accounting for tidal perturbations due to Sun and the Moon
As we saw before, the tidal perturbations of the GPS orbit give rise of the sizable effects given by (<ref>)–(<ref>). We observe that (n⃗_⊙ E·n⃗_ C)=cos(ϕ_⊙ 0+(n_⊕ +n_ GPS)t), where n_⊕ and n_ GPS are the orbital frequency of the Earth's sidereal motion and GPS spacecraft in orbit about Earth, correspondingly. Similarly, (n⃗_ -1pt E·n⃗_ C)=cos(ϕ_ -1pt 0+(n_ +n_ GPS)t), where n_ is the orbital frequency of the Moon around the Earth.
With these defintions, we evaluate (<ref>) as
c^-2u^ tidal_ E⊙ ≃ GM_⊙ (R_⊕+h_ GPS)^2/4 c^2 AU^3(3cos[2ϕ_⊙ 0+2(n_⊕ +n_ GPS)t]+1).
The constant term here has the magnitude
GM_⊙ (R_⊕+h_ GPS)^2/4 c^2 AU^3≃
7.79 × 10^-17,
and may be neglected. Considering the periodic term in the expression (<ref>), the additional time elapsed on the orbiting clock will be given by
Δ t^ tidal_⊙ = -∫_ pathdt(
3GM_⊙ (R_⊕+h_ GPS)^2/4 c^2 AU^3cos[2ϕ_⊙ 0+2(n_⊕ +n_ GPS)t])=
= -3GM_⊙ (R_⊕+h_ GPS)^2/8 c^2 AU^3(n_⊕ +n_ GPS)sin[
2ϕ_⊙ 0+2(n_⊕ +n_ GPS)t].
If not accounted for, this effect on a GPS clock time has the magnitude of Δ t^ tidal_⊙ = 8.01× 10^-13 s, giving rise to a peak-to-peak periodic navigational error in position of approximately 2c×Δ t^ tidal_⊙ = 0.48 mm, which is negligible.
Similarly, using (<ref>) we evaluate the tidal contribution from the Moon:
c^-2u^ tidal_ E ≃ Gm_ (R_⊕+h_ GPS)^2/4c^2r^3_ -1pt E(3cos[2ϕ_ -1pt 0+2(n_ +n_ GPS)t]+1).
The constant term here has the magnitude
Gm_ (R_⊕+h_ GPS)^2/4c^2r^3_ -1pt E≃
2.13 × 10^-16,
and is at the anticipated frequency stability limit. Considering the periodic term in expression (<ref>), the
additional time elapsed on the orbiting clock will be given by
Δ t^ tidal_ = -∫_ pathdt(
3Gm_ (R_⊕+h_ GPS)^2/4c^2r^3_ -1pt Ecos[2ϕ_ -1pt 0+2(n_ +n_ GPS)t])=
= -3Gm_ (R_⊕+h_ GPS)^2/8c^2r^3_ -1pt E(n_ +n_ GPS)sin[2ϕ_ -1pt 0+2(n_ +n_ GPS)t].
If not accounted for, this effect on a GPS clock time has the magnitude of Δ t^ tidal_ = 2.14× 10^-12 s, giving rise to a peak-to-peak periodic navigational error in position of approximately 2c×Δ t^ tidal_= 1.29 mm, which is right at the limit of the anticipated GPS timing precision.
§.§.§ GPS clock: proper-to-coordinate time transformation: recommended formulation
As a result of the analysis presented above, the recommended expression for the differential equation that relates the rate of the spacecraft proper τ_ A time, as measured by an on-board clock on a GPS spacecraft to the time in GCRS, TCG=t that was derived as (<ref>), should have only the quadrupole term as well as the lunar tidal terms:
dτ_ A/dt =
1-1/c^2[v⃗^2_ A/2+
GM_⊕/r_ A(1-J_2(R_ E/r_ A)^2
P_20(cosθ))+
Gm_/r^3_ -1pt Er_ A^2 P_20(cosβ_ -1pt GPS(t))
]+ O(7.78× 10^-17),
where β_ -1pt GPS(t)=∠ (n⃗_ -1pt E,n⃗_ GPS)=ϕ_ -1pt 0+(n_ +n_ GPS)t, and r_ A=|x⃗_ GPS|≃ R_⊕+h_ GPS, the orbital radius of the GPS spacecraft. The size of the error term in (<ref>) is set by the magnitude of the constant term due to the solar tide (<ref>).
Near the surface of the Earth, the expression beyond the monopole term is dominated by the quadrupole moment characterized by J_2. At higher orbits, however, as the effect of J_2 diminishes, contributions due to lunar tides become more significant. For spacecraft going beyond geostationary orbits, e.g., spacecraft in lunar transfer orbits carrying accurate clocks, eventually it becomes necessary to switch to a more accurate representation of the lunar gravitational field, such as the representation in <cit.>.
§ LIGHT PROPAGATION IN THE VICINITY OF THE EARTH
Key to our understanding of the problem of EM wave propagation in the vicinity of a gravitating body is the realization that the body's gravitational field is usually presented in a body-centric reference frame. In contrast, signal propagation is best analyzed in a signal-centric reference frame.
§.§ Gravitational phase shift of an EM wave
The phase of an EM wave is a scalar function that is invariant under a set of general coordinate transformations. In the geometric optics approximation, the phase φ is found as a solution to the eikonal equation <cit.>,
g^mn∂_mφ∂_nφ=0,
which is a direct consequence of Maxwell's equations. Its solution describes the wavefront of an EM wave propagating in curved spacetime. The solution's geometric properties are defined by the metric tensor g_mn, which is derived from Einstein's field equations. In the vicinity of the Earth, this tensor is given by Eqs. (<ref>)–(<ref>).
To solve Eq. (<ref>), we introduce a covector of the electromagnetic wavefront in curved spacetime, K_m = ∂_mφ. We use λ to denote an affine parameter along the trajectory of a light ray, which is orthogonal to the wavefront φ. The vector K^m = dx^m/dλ = g^mn∂_nφ is tangent to the light ray. Equation (<ref>) states that K^m is null: g_mnK^mK^n = 0.
To find a solution of Eq. (<ref>), we expand the eikonal φ with respect to the gravitational constant G, assuming that the unperturbed solution is a plane wave. The expansion may be given as
φ(t,x⃗) = φ_0+∫ k_m dx^m+φ_G (t,x⃗)+ O(G^2),
where φ_0 is an integration constant and k_m = k(1, k⃗) is a constant (with respect to the Minkowski metric) null vector (i.e., γ_mnk^mk^n=0) along the direction of propagation of the unperturbed EM plane wave. The wave direction is given by the vector k⃗≡ k^ϵ, which is the unit vector along the ray's path, |k⃗|=1. Furthermore, k=ω/c, where ω is the constant angular frequency of the unperturbed wave, and φ_G is the perturbation of the eikonal of first order in G, which is yet to be determined. Also, as a consequence of Eq. (<ref>), the wave vector of an electromagnetic wave in curved spacetime, K^m(t,x⃗), admits a series expansion with respect to G in the form
K^m(t,x⃗)=dx^m/dλ= g^mn∂_nφ=k^m+k_G^m(t,x⃗)+ O(G^2),
where k^m_G(t,x⃗)=γ^mn∂_nφ_G(t,x⃗) is the first order perturbation of the wave vector with respect to G.
To solve Eqs. (<ref>) and (<ref>) for φ_G in the GCRS, we first substitute (<ref>) into (<ref>).
Then, defining h^mn=g^mn-γ^mn and keeping only first order terms in G, we obtain an ordinary differential equation to determine φ_G:
dφ_G/dλ= -1/2h^mnk_mk_n + O(G^2),
where dφ_G/dλ= k_m∂^mφ_G+ O(G^2). (Note, that Eq. (<ref>) alternatively can also be obtained by integrating the null geodesic equation <cit.>).
With g_mn given by (<ref>), the equation to determine the phase of the EM wave as it propagates in the vicinity of the Earth takes the following form:
dφ_G/dλ=
-k^2{2/c^2w_ E+2/c^2w^ tidal_ E+ 4/c^3(k_ϵ w^ϵ_ E)+ O(G^2)}.
This equation describes the gravitational phase shift introduced by various contributions to the effective gravity field of the GCRS (<ref>) with the potentials (<ref>)–(<ref>). Below, we will integrate it along the light ray's trajectory.
§.§ Parameterizing the light ray's trajectory
To solve (<ref>), we need to present the geometry of the problem and introduce our basic notations. Following <cit.>, we represent the light ray's trajectory, correct to the Newtonian order, as
{x^m}≡(x^0=ct, x⃗(t)≡r⃗(t)=r⃗_ 0+k⃗ c(t-t_0))+ O(G),
where k⃗ is a unit vector in the incident direction of the light ray's propagation path and r⃗_0 represents the point of emission that may be expressed as k⃗=(r⃗-r⃗_0)/|r⃗-r⃗_0|. Next, we define the impact parameter of the unperturbed trajectory of the light ray parameter b⃗ as
b⃗=[[k⃗×r⃗_0]×k⃗].
Next, we introduce the parameter τ=τ(t) along the path of the light ray (see details in Appendix B in <cit.>):
τ = (k⃗·r⃗)=(k⃗·r⃗_0)+c(t-t_0),
which may be positive or negative. The parameter τ allows us to rewrite (<ref>) as
r⃗(τ) = b⃗+k⃗τ+ O(G),
with r(τ) ≡ |x⃗(τ)|=√(b^2+τ^2)+ O(G).
Using the result (<ref>) we determine that the following relations are valid to O (r_g):
r = √(b^2+τ^2), r+(k⃗·r⃗) =√(b^2+τ^2) +τ.
Based on these results, we present a useful relationship:
b^2=(r+(k⃗·r⃗))(r-(k⃗·r⃗)) + O(G).
This representation allows us to express the Newtonian part of the wave vector K^m presented by Eq. (<ref>) as follows:
k^m= dx^m/dλ =k(1, k⃗)+ O(G), where the wave number k is immediately derived as k=dτ/dλ+ O(G) and |k⃗|=1. Keeping in mind that k^m is constant, we establish an important relationship:
dλ= dτ/k^0+ O(G),
which we use to integrate (<ref>). This expression allows including contributions from all multipoles of the Earth's mass distribution, as given in Eq. (<ref>).
With these definitions, we may now present the solution to (<ref>) (see relevant discussion in <cit.>). The gravitational phase shift, φ_G, that is acquired by the EM wave as it propagates along its geodesic path from the point of emission at τ_0 to the point of reception at τ on the background of the gravitational field (<ref>)–(<ref>) has the form:
φ_G(x⃗) =
-k∫^τ_τ_0{2/c^2(U_ E(τ')+ u^ tidal_ E(τ'))+ 4/c^3(k_ϵ w^ϵ_ E(τ'))
+ O(G^2)
}dτ'
≡φ_G^ E(x⃗)+φ_G^ tidal(x⃗)+φ_G^ S(x⃗)+ O(G^2).
We may now integrate (<ref>) for each of the relativistic terms with the terms describing contributions from the Earth's gravitational potential, tidal gravity (primarily due to the Sun and the Moon), and Earth's rotation, correspondingly.
§.§ The STF representation of the Earth's gravitational potential
Although the form of the Earth gravitational potential (<ref>) is effective for many applications in geodesy, it is not technically convenient when light propagation in a gravitational field in concerned. No closed form expressions are known for the integral (<ref>) are known for a potential in the form (<ref>), expressed in terms of spherical harmonics; indeed, no useful semi-analytical approximations exist in the general case either. Thus, alternative representations of U(x⃗) are needed. In <cit.>, we considered the case of axisymmetric bodies. In <cit.>, we considered a generic potential, expanding U(x⃗) in terms of STF mass-moment tensors. Below, we discuss the the STF mass moment representation, which allows us to fully benefit from the spherical harmonics representation in the most general case. (In Appendix <ref>, we discuss the less general axisymmetric case, using it as a limiting case to verify our results.)
Considering a generic case, it was discussed in <cit.> that the scalar gravitational potential (<ref>) may equivalently be given in terms of Cartesian spatial trace-free (STF) tensor moments in the following form:
U = GM{1/r+∑_ℓ=2^∞(-1)^ℓ/ℓ! T^<a_1...a_ℓ>∂^ℓ/∂ x^<a_1...∂ x^a_ℓ>(1/r)}+
O(c^-4),
where r=|x⃗|, M is the mass and T^<a_1...a_ℓ> are the STF mass multipole moments of the body, defined as
M = ∫_ V d^3x⃗ ρ(x⃗), T^<a_1...a_ℓ>=1/M∫_ V d^3x⃗ ρ(x⃗) x^<a_1...a_ℓ>,
where x^<a_1...a_ℓ>=x^<a_1x^a_2...x^a_ℓ>, the angle brackets <...> denote the STF operator, and V means the total volume of the isolated gravitating body under consideration. The dipole moment T^a is absent from this expansion (<ref>), by virtue of the fact that the origin of the coordinates is assumed to coincide with the body's barycenter.
Using the identity <cit.>,
∂^ℓ/∂ x^<a_1...∂ x^a_ℓ>(1/r) = (-1)^ℓ(2ℓ-1)!!n̂_<a_1...a_ℓ>/r^ℓ+1,
the potential (<ref>) may be given in the following form:
U(r⃗) = GM∑_ℓ≥ 0(2ℓ-1)!!/ℓ ! T_Ln̂_L/r^ℓ+1.
The first few terms of (<ref>) or, equivalently, (<ref>), are given as
U(r⃗) = GM{1/r+ 3 T^<ab>/2r^5x^ax^b +5 T^<abc>/2r^7x^ax^bx^c+35 T^<abcd>/8r^9x^ax^bx^cx^d+ O(r^-6)}.
This Cartesian multipole expansion of the Newtonian gravitational potential is equivalent to expansion in terms of spherical harmonics (<ref>) <cit.>. In fact, this expression may be used to establish the correspondence between T^<a_1...a_ℓ> and C_ℓ k and S_ℓ k from (<ref>) (see Appending <ref> for details on how to establish this correspondence).
§.§ Expressing the gravitational phase shift via STF mass moments
Using the representations (<ref>), (<ref>) or (<ref>), it is convenient to present the U_ E-dependent term that yields φ_G^ E(x⃗) in the total gravitational phase shift in (<ref>) as
2U/c^2 =
r_g{1/r+ ∑_ℓ=2^∞(-1)^ℓ/ℓ! T^<a_1...a_ℓ>∂^ℓ/∂ x^<a_1...∂ x^a_ℓ>(1/r)},
where r_g=2GM/c^2 is the Schwarzschild radius of the body (in our case this is the Earth, but our discussion is generic.) As such, this form is valid for any deviation from spherical symmetry in the gravitational field.
We may then generalize expression ∇⃗=∇_b+k⃗ d/dτ + O(r_g) and write
∂^ℓ/∂ x^<a_1...∂ x^a_ℓ> ≡ ∇⃗^<a_1....∇⃗^a_ℓ>=∑_p=0^ℓℓ!/p!(ℓ-p)!k_<a_1...k_a_p∂_a_p+1... ∂_a_ℓ>∂^p/∂τ^p+ O(r_g),
where a new shorthand notation ∂_a≡∂/∂b⃗^a has been used and τ is defined by (<ref>).
Using this representation (<ref>), we can compute the relevant integral (with r=√(b^2+τ^2) and r_0=√(b^2+τ_0^2), as discussed in Sec. <ref>):
∫^τ_τ_0∂^ℓ/∂ x^<a_1...∂ x^a_ℓ>(1/r) dτ' = ∑_p=0^ℓℓ!/p!(ℓ-p)!k_<a_1...k_a_p∂_a_p+1... ∂_a_ℓ>{∂^p/∂τ^pln(√(b^2+τ^2)+τ/b)
}|^τ_τ_0 =
-140pt =
∂_<a_1... ∂_a_ℓ>ln√(b^2+τ^2)+τ/√(b^2+τ^2)+τ_0+
∑_p=1^ℓℓ!/p!(ℓ-p)!k_<a_1...k_a_p∂_a_p+1... ∂_a_ℓ>{∂^p-1/∂τ^p-11/√(b^2+τ^2)-∂^p-1/∂τ_0^p-11/√(b^2+τ_0^2)}.
As a result, the gravitational eikonal phase shift φ^ E_G from (<ref>) takes the form[Result (<ref>) was independently derived in <cit.> where one can also find the phase contribution due to vector spherical harmonics. In the Earth's gravity field such harmonics are small, providing contributions below the expected level of the measurement accuracy (Sec. <ref>). Thus, beyond the spin term with ℓ=1 (<ref>), higher order contributions of the vector harmonics were not considered in this paper.]:
φ^ E_G(r⃗)
= -kr_g{ln√(b^2+τ^2)+τ/√(b^2+τ_0^2)+τ_0+
∑_ℓ=2^∞(-1)^ℓ/ℓ! T^<a_1...a_ℓ>{∂_<a_1... ∂_a_ℓ>ln√(b^2+τ^2)+τ/√(b^2+τ_0^2)+τ_0+
20pt +
∑_p=1^ℓℓ!/p!(ℓ-p)!k_<a_1...k_a_p∂_a_p+1... ∂_a_ℓ>{∂^p-1/∂τ^p-11/√(b^2+τ^2)-∂^p-1/∂τ_0^p-11/√(b^2+τ_0^2)}}},
or, equivalently, using (<ref>) we have
φ^ E_G(r⃗,r⃗_0)
= -kr_g (ln[r+(k⃗·r⃗)/r_0+(k⃗·r⃗_0)]+∑_ℓ=2^∞(-1)^ℓ/ℓ! T^<a_1...a_ℓ> I_a_1... a_ℓ(r⃗,r⃗_0))+ O(r^2_g).
The first term in this expression is the well-known Shapiro phase shift. The next term is the contribution to the gravitational phase delay from the STF gravitational multipoles to any order ℓ. The quantity I_a_1... a_ℓ(r⃗,r⃗_0)= I_a_1... a_ℓ(r⃗)- I_a_1... a_ℓ(r⃗_0) is the projection operator of the ℓ-th order along the light ray's trajectory:
I_a_1... a_ℓ(r⃗,r⃗_0)
= {∂_<a_1... ∂_a_ℓ>ln k(√(b^2+τ^2)+τ)+ ∑_p=1^ℓℓ!/p!(ℓ-p)!k_<a_1...k_a_p∂_a_p+1... ∂_a_ℓ>∂^p-1/∂τ^p-11/√(b^2+τ^2)}|^τ_τ_0.
Expression (<ref>) together with (<ref>) is a key result. It demonstrates that with the help of the STF tensor formalism, it is possible to evaluate contributions to the gravitational phase shift, to all orders beyond the Shapiro phase shift, due to the mass multipole moment contributions of the gravitating body.
§.§ Rotation to the STF moments to the light ray coordinate system
The main objective of this manuscript is to develop the functional form of the gravitational phase shift φ^ E_G in terms of the spherical harmonics. As (<ref>) suggests, the total gravitational phase shift induced by all the multipoles ℓ≥2 is a sum of the individual shifts φ_ℓ inducted by multipoles at each particular order ℓ, where φ_ℓ have the form
φ_ℓ(r⃗, r⃗_0)
= -kr_g (-1)^ℓ/ℓ! T ^<a_1...a_ℓ> I_a_1... a_ℓ(r⃗,r⃗_0).
In what follows we will demonstrate how to compute individual terms in this sum.
First, we recognize that the GCRS is defined by the unit basis vectors e⃗_x (the prime meridian) and e⃗_z≡s⃗ (the Earth's rotation axis), yielding the following set of base vectors:
e⃗_x, e⃗_y=[e⃗_z×e⃗_x], e⃗_z≡s⃗.
Next, the propagation direction of the EM wave is defined by k⃗ and the relationship between the EM wave's trajectory and the Earth is given by the vector impact parameter b⃗ (introduced by (<ref>)):
k⃗=r⃗-r⃗_0/|r⃗-r⃗_0|, b⃗=[[k⃗×r⃗_0]×k⃗]≡ b m⃗ ⇒ m⃗=[[k⃗×r⃗_0]×k⃗]/|[[k⃗×r⃗_0]×k⃗]|.
Thus, once the GCRS positions of the emitter, r⃗_0, and receiver, r⃗, are known, everything else is computable.
To simplify the computations, we introduce a coordinate system associated with the propagating ray of light. Reading off figure <ref>, with knowledge of k⃗, we obtain the unit vectors defining a coordinate system associated with the direction of transmission:
e⃗'_x = [e⃗_z×e⃗'_z]/|[e⃗_z×e⃗'_z]|,
e⃗'_y= [e⃗'_z×e⃗'_x],
e⃗'_z ≡k⃗.
Together, the vectors k⃗ and b⃗ allow us to define a rotated coordinate system, where the z-axis is aligned with the direction of propagation of the EM wave given by vector k⃗, while the xy-plane is perpendicular to it (see Fig. <ref>). In this coordinate system, the vectors k⃗', b⃗',
are given as below
k⃗' = (0,0,1),
b⃗'=b(cosϕ_ξ,sinϕ_ξ,0)=b m⃗',
where b=|b⃗| from (<ref>) and
the orientation angle of the impact parameter, ϕ_ξ, is given by
cosϕ_ξ = (m⃗·e⃗'_x), sinϕ_ξ = (m⃗·e⃗'_y).
The two coordinate systems are related by a rotation where R_a^b is the rotation matrix, given as
R(θ,ψ)=R_3(ψ)R_1(θ)=
[ cosψ sinψ 0; -sinψ cosψ 0; 0 0 1 ][ 1 0 0; 0 cosθ sinθ; 0 -sinθ cosθ ]
= R_a^b,
where R_z(ψ) is a right-handed rotation by ψ around the z-axis (e⃗_z-axis), R_1(θ) is a right-handed rotation by θ about the x-axis (e⃗'_x-axis) of a Cartesian coordinate frame; see Fig. <ref>. The angles θ and ψ are determined from the following equations:
cosθ = (e⃗'_z·e⃗_z), sinθ = (e⃗'_y·e⃗_z), cosψ = (e⃗'_x·e⃗_x), sinψ = (e⃗'_x·e⃗_y).
With the introduction of these rotation matrices (<ref>), the geometry of the problem is fully defined. Technically, it is easier to compute the components of the projection operator in (<ref>) in the primed coordinate system that is aligned with the light ray, yielding I'_a_1... a_ℓ. Two representations of this operator, in the GCRS, I_a_1... a_ℓ, and its counterpart in the light ray coordinates, I'_a_1... a_ℓ, are related by a simple rotation with the rotation matrix R_a^b from (<ref>):
I_<b_1...b_ℓ>= I'_<a_1...a_ℓ>R^a_1_b_1... R^a_ℓ_b_ℓ,
where I_a_1... a_ℓ is expressed in terms of k⃗ and m⃗ defined in GCRS by (<ref>) and I'_a_1... a_ℓ depends on k⃗' and m⃗' defined in the light ray coordinate system that was introduced by (<ref>).
Expression (<ref>) allows us to write the term with tensorial inner product in (<ref>) as
T ^<a_1...a_ℓ> I_a_1... a_ℓ=
T^<a_1...a_ℓ> R^b_1_a_1... R^b_ℓ_a_ℓ I'_b_1... b_ℓ≡ T '^<a_1...a_ℓ> I'_a_1... a_ℓ,
where T'^<a_l...a_ℓ> are the components of the STF mass moment tensor projected on the light ray trajectory
T'^<a_1...a_ℓ>= T^<b_1...b_ℓ> R^a_1_b_1... R^a_ℓ_b_ℓ.
Typically, the STF tensor mass moments T^<a_1...a_ℓ> are expressed in terms of the spherical harmonic coefficients that, in turn, are expressed using the Cartesian ECEF coordinates of the GCRS. Expression (<ref>) allows us to compute the components of I_a_1... a_ℓ in the rotated coordinate system that is aligned with the direction of propagation.
Through this rotation procedure with matrix (<ref>) and angles (<ref>), we are able to express the STF mass moments with respect to a cylindrical coordinate system in which the z-axis coincides with the direction of signal propagation. Moreover, as a non-degenerate linear relationship exists between STF tensor components and spherical harmonic coefficients (see Appendix <ref>) for details), this procedure also allows us to directly compute spherical harmonic coefficients with respect to this new coordinate system in a three-step process:
[1)]
* Convert spherical harmonics to the STF representation;
* Rotate the STF tensor using (<ref>),
* Invert the equation relating STF tensor components and spherical harmonics and solve for the latter.
This procedure is powerful and straightforward, also computationally inexpensive, allowing us to express the multipole mass moments of the gravitating body in a coordinate reference frame of arbitrary orientation, including the orientation defined by the direction of signal transmission.
§ PHASE SHIFT INTRODUCED BY THE LOWEST ORDER MULTIPOLE MOMENTS
To demonstrate the practical utility of our results, we now compute several low-order terms in (<ref>), for ℓ=2,3,4. In Appendix <ref>, we compute the corresponding derivatives with respect to the vector impact parameter, which are present in (<ref>). Below, we present the results for the eikonal phase shift for the quadrupole (ℓ=2), octupole (ℓ=3) and hexadecapole (ℓ=4) STF multipole moments.
§.§ Quadrupole moment
§.§.§ The structure of the quadrupole phase shift
In the ℓ=2 quadrupole case, applying (<ref>) leads to the following expression for the gravitational eikonal phase shift φ_2(r⃗,r⃗_0) induced by the quadrupole STF mass moment, T^<ab>:
φ_2(r⃗,r⃗_0)
= -1/2 kr_g
T^<ab> I_ab(r⃗,r⃗_0),
where I_ab(r⃗,r⃗_0) is the ℓ=2 light ray trajectory projection operator given by (<ref>), that is,
I_ab(r⃗,r⃗_0) = -
{(2m_am_b+k_ak_b)
1/r(r+(k⃗·r⃗))
+
(k_ak_b-m_am_b)
(k⃗·r⃗)/r^3+
(k_am_b+k_bm_a)
b/r^3}|^r_r_0,
where we used the derivatives (<ref>) and (<ref>) and k⃗ and m⃗ are defined by (<ref>). After some rearrangement, expression (<ref>) may be presented is the following equivalent form:
I_ab(r⃗,r⃗_0) = {(2m_am_b+k_ak_b)(
1/r(r+(k⃗·r⃗))-(k⃗·r⃗)/2r^3)
+
(k_am_b+k_bm_a)
b/r^3+
3/2k_ak_b
(k⃗·r⃗)/r^3}|^r_r_0.
The convenience of the form (<ref>) is due to the fact that in the light ray's coordinate system that we use, k⃗ is a unit vector in the e'_z-axis direction, whereas m⃗ is a unit vector in the perpendicular e'_xe'_y-plane. This simplifies various inner products in (<ref>) which, relying on (<ref>)–(<ref>) with parameterization (<ref>) take the form:
T^<ab>(2m_am_b+k_ak_b)
= T'^<ab>(2m'_am'_b+k'_ak'_b)
= ( T'_11- T'_22)cos2ϕ_ξ+2 T'_12sin2ϕ_ξ,
where k⃗' and m⃗' are from (<ref>) and we specifically emphasized the use of (<ref>), a reminder to the reader that this scalar-valued tensor product is not dependent on the choice of coordinate system in which it is calculated, allowing us to express the product in this simple form, using the values of the STF tensor and the projection operator in the rotated light-ray coordinate system. Similarly,
T^<ab>(k_am_b+k_bm_a) = 2 T'_13cosϕ_ξ+2 T'_23sinϕ_ξ,
T^<ab>
k_ak_b = T'_33,
where we relied on the trace-free nature of T^<ab>, valid in any representation, hence T'_11+ T'_22+ T'_33=0.
As a result, using these expressions (<ref>)–(<ref>) and representing m⃗ using from (<ref>), expression (<ref>)
takes the form
φ_2(r⃗,r⃗_0)
= 1/2kr_g
{{( T'_11- T'_22)cos2ϕ_ξ+
2 T'_12sin2ϕ_ξ}(
1/r(r+(k⃗·r⃗))-(k⃗·r⃗)/2r^3)
+
14pt+
2{ T'_13 cosϕ_ξ+
T'_23 sinϕ_ξ}b/r^3+3 T'_33(k⃗·r⃗)/2r^3}|^r_r_0.
Thus, as the light travels from a transmitter to a receiver, it samples the gravitational filed along its path. That field is represented by the STF mass moments T'^<ab> that are related to their GCRS values via (<ref>) .
§.§.§ Rotating the quadrupole mass moment
What is left is to express T'^<ab> in accordance with (<ref>) for ℓ=2 that has the from
T'^<ab> = T^<ij> R^a_i R^b_j,
where the relationship between T^<ab> and spherical harmonic coefficients expressed in the same coordinate reference frame are given by comparing (<ref>) against (<ref>). We work this out explicitly for ℓ=2 in Appendix <ref>, yielding the matrix components of T^<ab> in the GCRS reference frame in the form (<ref>):
T_11 = (-1/3C_20+2C_22)R^2, T_12=2S_22R^2,
T_22 = (-1/3C_20-2C_22)R^2, T_13=C_21R^2,
T_33 = 2/3 C_20 R^2, T_23=S_21R^2,
or, using the relations between T^<ab> and C_2k, S_2k from (<ref>), we may express T'^<ab> as
R^-2 T'_11 = -1/3 C_20+2(C_22cos2ψ-S_22sin2ψ),
R^-2 T'_22 = 1/3(3sin^2θ-1) C_20-sin2θ(C_21sinψ+S_21cosψ)+2cos^2θ(S_22sin2ψ-C_22cos2ψ),
R^-2 T'_33 = 1/3(3cos^2θ-1)C_20+sin2θ(C_21sinψ+S_21cosψ)+2sin^2θ(S_22sin2ψ-C_22cos2ψ),
R^-2 T'_12 = -
sinθ(C_21cosψ-S_21sinψ)+2cosθ(S_22cos2ψ+C_22sin2ψ),
R^-2 T'_13 = cosθ(C_21cosψ-S_21sinψ)+2sinθ(S_22cos2ψ+C_22sin2ψ),
R^-2 T'_23 = -
1/2sin2θ
C_20+cos2θ(C_21sinψ+S_21cosψ)-sin2θ(C_22cos2ψ-S_22sin2ψ),
where angles θ and ψ are fixed for each transmitter-receiver configuration and are given by (<ref>).
We define the rotated spherical harmonic coefficients {C'_2k,S'_2k} by substituting primed in place of unprimed terms in (<ref>) and then solving the resulting system of equations. For ℓ=2, this results in the following relations between {C'_2k,S'_2k} and T'^<ab>:
C'_20 = 3/2 R^-2 T'_33,
C'_21 = R^-2 T'_13,
C'_22 = 1/4 R^-2( T'_11- T'_22),
S'_21 = R^-2 T'_23,
S'_22 = 1/2 R^-2 T'_12.
Due to the tensorial nature of (<ref>), both expressions (<ref>) and (<ref>) demonstrate the form invariance of the gravitational phase (<ref>)–(<ref>). The structure of the expression for the gravitational phase is the same in any new rotated coordinates, thus for any direction of signal propagation. Furthermore, the relationship between the STF tensor mass moments and spherical harmonics, T^<ab>⇔{C_2k,S_2k}, given by (<ref>), is also the same in any new coordinates, T'^<ab>⇔{C'_2k,S'_2k}. This form invariance of the phase and relevant relations between the moments and harmonics exist at any STF order ℓ. This property may be used to establish expressions for the spherical harmonics C'_ℓ k,S'_ℓ k at any order ℓ and will be demonstrated below for ℓ=2,3,4.
§.§.§ Quadrupole phase in terms of spherical harmonics
Results (<ref>) and (<ref>) allow us to express (<ref>)
in terms of the rotated spherical harmonic coefficients C'_2k,S'_2k. Using n⃗=r⃗/r, this expression has the form
φ_2(r⃗,r⃗_0)
= kr_g(R_⊕/b)^2 {2{C'_22cos2ϕ_ξ+ S'_22sin2ϕ_ξ}{
1-(k⃗·n⃗)(1+1/2b^2/r^2)}
+
51pt+ {C'_21cosϕ_ξ+
S'_21sinϕ_ξ}b^3/r^3+
1/2 C'_20b^2/r^2(k⃗·n⃗)}|^r_r_0,
where the relationship between the spherical harmonic coefficients in the GCRS reference frame vs. their value at the OCS which is associated with the light ray,
yield the following form for C'_2k and S'_2k:
C'_20 = 1/4(1 + 3 cos 2 θ)C_20 + 3/2sin 2θ(C_21sinψ + S_21cosψ) - 3 sin^2θ(C_22cos2 ψ - S_22sin2 ψ),
C'_21 = cosθ(C_21cosψ - S_21sinψ) + 2 sinθ(S_22cos 2 ψ + C_22sin2 ψ),
C'_22 = -1/4sin^2θ C_20 + 1/4sin2θ(C_21sinψ+S_21cosψ) + 1/4(3 + cos2 θ) (C_22cos2 ψ - S_22sin2 ψ),
S'_21 = - 1/2sin2θ C_20+
cos2θ( C_21sinψ+S_21cosψ) - sin2θ(C_22cos2 ψ-S_22sin2 ψ),
S'_22 = -1/2sinθ(C_21cosψ-S_21sinψ) + cosθ(S_22cos 2 ψ + C_22sin2 ψ).
Equation (<ref>), together with (<ref>) is the most general form of eikonal phase shift induced by a mass quadrupole moment, ℓ=2. Following the same procedure, we can obtain similar expressions for higher orders of spherical harmonics with ℓ≥ 3. Some of the relevant expressions for the STF tensors and its relations to harmonic coefficients C_ℓ k, S_ℓ k in (<ref>) for orders ℓ=3,4 are given in <cit.>. These results may be extended to arbitrary orders ℓ.
Expressions (<ref>) relate the values of the spherical harmonics coefficients that are sampled by the propagating EM wave, C'_ℓ k, S'_ℓ k, to those that are typically reported in in the standard GCRS coordinates, C_ℓ k, S_ℓ k. For that we performed the rotation of the standard harmonics onto the direction of the light propagation given by k⃗.
We note that the change of spherical harmonics under a linear transformation of coordinates has been studied in the past, with a rich history (see, e.g., <cit.>). In our case, the transformation rules that correspond to rotating the north pole axis to coincide with k⃗ were accomplished with relative ease as an additional benefit of the use of the STF tensor formalism, which we invoked primarily in order to integrate the eikonal equation. The process, as we shall see below, is easily generalized to higher order harmonics.
§.§.§ The case of an axisymmetric body
We know that, in the case of an axisymmetric gravitating body, all of the spherical harmonic coefficients accept for C_20 vanish, namely C_21=C_22=S_21=S_22=0. In this case, Eq. (<ref>), with the help of (<ref>), takes the familiar form:
φ_2(r⃗,r⃗_0)
= 1/2kr_gC_20R^2_⊕{-sin^2θcos2ϕ_ξ1/r(r+(k⃗·r⃗))+
55pt+ (cos^2θ-
sin^2θsin^2ϕ_ξ)
(k⃗·r⃗)/r^3-
sin2θsinϕ_ξb/r^3}|^r_r_0.
Alternatively, using J_2=-C_20 and relying on the definitions of the unit vectors b⃗, k⃗ and m⃗, we present (<ref>) as
φ^ E_2(r⃗,r⃗_0)
= -1/2kr_gJ_2R_⊕^2 {(2(s⃗·m⃗)^2+(s⃗·k⃗)^2-1)
1/r(r+(k⃗·r⃗))+
((s⃗·k⃗)^2-(s⃗·m⃗)^2)(k⃗·r⃗)/r^3+
2(s⃗·m⃗) (s⃗·k⃗) b/r^3}|^r_r_0.
§.§ Octupole moment
§.§.§ The structure of the octupole phase shift
Setting ℓ=3 in (<ref>) and (<ref>), we use the result for the two types of derivatives (<ref>) and (<ref>). We derive the eikonal phase shift, φ_3(r⃗,r⃗_0), introduced by the octupole STF mass moment, T^<abc>, which may be given as
φ_3(r⃗,r⃗_0)
= 1/6 kr_g
T^<abc> I_abc(r⃗,r⃗_0),
where I_abc(r⃗,r⃗_0) is light ray trajectory projection operator of the order of ℓ=3 that is given as
I_abc(r⃗,r⃗_0) = {(4m_am_bm_c+3k_ak_bm_c) 1/b(2/r(r+(k⃗·r⃗) )-(k⃗·r⃗)/r^3)+
+ 3(3k_ak_bm_c-m_am_bm_c)b(k⃗·r⃗)/r^5+
3(3k_am_bm_c-k_ak_bk_c)b^2/r^5+
5k_ak_bk_c/r^3}|^r_r_0.
Similarly to (<ref>), we re-arrange (<ref>) to separate individual projection operators
I_abc(r⃗,r⃗_0) = 2{(4m_am_bm_c+3k_ak_bm_c) {1/b(1/r(r+(k⃗·r⃗) )-(k⃗·r⃗)/2r^3)-
3/8b(k⃗·r⃗)/r^5}+
+ 9/2(k_am_bm_c+1/2k_ak_bk_c)
b^2/r^5+45/8k_ak_bm_c b(k⃗·r⃗)/r^5+
5/2k_ak_bk_c1/r^3(1-3/2b^2/r^2)
}|^r_r_0,
where, again, k⃗, m⃗ are given by (<ref>). Note that there is no need to explicitly STF this quantity as it will be acting on the STF tensor T^<abc> in (<ref>).
Again, the form (<ref>) is convenient because it simplifies various inner products in (<ref>) when expressed in the light ray's coordinate system:
T^<abc>(4m_am_bm_c+3k_ak_bm_c) = ( T'_111-3 T'_122)cos3ϕ_ξ+(3 T'_112- T'_222)sin3ϕ_ξ,
T^<abc>(k_am_bm_c+1/2k_ak_bk_c) = 1/2( T'_113- T'_223)cos2ϕ_ξ+ T'_123sin2ϕ_ξ,
T^<abc>k_ak_bm_c = T'_133cosϕ_ξ+ T'_233sinϕ_ξ,
T^<abc> k_ak_bk_c = T'_333.
As a result, the octupole gravitational phase shift corresponding to ℓ=3 from (<ref>) takes the following form:
φ_3(r⃗,r⃗_0)
= 1/3 kr_g
{{( T'_111-3 T'_122)cos3ϕ_ξ+(3 T'_112- T'_222)sin3ϕ_ξ}{1/b(1/r(r+(k⃗·r⃗) )-(k⃗·r⃗)/2r^3)-3/8 b(k⃗·r⃗)/r^5}+
+ 9/4{( T'_113- T'_223)cos2ϕ_ξ+2 T'_123sin2ϕ_ξ}b^2/r^5+
45/8{ T'_133cosϕ_ξ+ T'_233sinϕ_ξ}b(k⃗·r⃗)/r^5
+
+ 5/2 T'_3331/r^3(
1-3/2b^2/r^2)
}|^r_r_0.
§.§.§ Rotating the octupole mass moment
The next step is to express T'^<abc> present in (<ref>) in terms of the spherical harmonics coefficients. For that, we implement the rotation of T^<abc> in accordance with (<ref>):
T'^<abc> = T^<ijk> R^a_i R^b_j R^c_k,
where T^<ijk> are the components of the Cartesian representation of the octupole mass tensor in the GCRS. These components are known and are related to the spherical harmonics C_3k,S_3k. In Appendix <ref>, we established the relationship between STF moments and spherical harmonics for ℓ=2. The same approach may be used for ℓ=3 to establish the the correspondence between T^<abc> from (<ref>) and the spherical harmonics from (<ref>) and (<ref>). The result given by
T_111 = (3/5C_31-6C_33)R^3, T_112=(1/5S_31-6S_33)R^3,
T_113=(-1/5C_30+2C_32)R^3,
T_122 = (1/5C_31+6C_33)R^3, T_222=(3/5S_31+6S_33)R^3,
T_223=(-1/5C_30-2C_32)R^3,
T_123 = 2S_32R^3, T_133=-4/5C_31R^3, T_233=-4/5S_31R^3, T_333=2/5C_30R^3.
It is easy to check that the rank-3 STF tensor T^<abc> has seven independent components; the values of the remaining 20 components are determined by its symmetries and vanishing trace. The system of equations (<ref>) is redundant, with only seven independent equations relating the components of T^<abc> to the seven spherical harmonic coefficients in the case ℓ=3.
We can now implement the rotation (<ref>) that in accordance with (<ref>) and obtain the following components of the STF mass moments T'^<abc> expressed via spherical harmonics of GCRS system:
R^-3 T'_111 = 3/5(C_31cosψ - S_31sinψ) +
6 (S_33sin3 ψ - C_33cos3 ψ),
R^-3 T'_112 = 1/5sinθ C_30 +
1/5cosθ(S_31cosψ + C_31sinψ) +
2 sinθ(S_32sin2 ψ - C_32cos2 ψ) -
-
6 cosθ(S_33cos3 ψ + C_33sin3 ψ),
R^-3 T'_113 = -1/5cosθ C_30 +
1/5sinθ(S_31cosψ + C_31sinψ) +
2 cosθ( C_32cos2 ψ - S_32sin2 ψ) -
-
6 sinθ(S_33cos3 ψ + C_33sin3 ψ),
R^-3 T'_122 = 4/5sin^2θ(S_31sinψ - C_31cosψ) - 2 sin2 θ(S_32cos2 ψ + C_32sin2 ψ) +
+ 1/5cos^2θ(C_31cosψ - S_31sinψ) +
6 cos^2θ(C_33cos3 ψ - S_33sin3 ψ),
R^-3 T'_222 = 1/10(1 + 5 cos2 θ) sinθ C_30 + 3/10(-3 + 5 cos2 θ) cosθ(S_31cosψ + C_31sinψ) +
+
3 cosθsin2 θ(C_32cos2 ψ - S_32sin2 ψ) +
6 cos^3θ( S_33cos3 ψ + C_33sin3 ψ),
R^-3 T'_223 = 1/10 C_30cosθ(3 - 5 cos2 θ) +
1/10(7 + 15 cos2 θ) sinθ (S_31cosψ + C_31sinψ) -
- 1/2 (cosθ + 3 cos3 θ) (C_32cos2 ψ -
S_32sin2 ψ) +
6 cos^2θsinθ(S_33cos3 ψ + C_33sin3 ψ),
R^-3 T'_123 = sinθcosθ(C_31cosψ - S_31sinψ) +
2 cos2 θ(C_32sin2 ψ + S_32cos2 ψ) +
3 sin2 θ(C_33cos3 ψ - S_33sin3 ψ),
R^-3 T'_133 = 1/10(3 + 5 cos2 θ) (S_31sinψ - C_31cosψ) + 2 sin2 θ(S_32cos2 ψ + C_32sin2 ψ) +
+
6 sin^2θ(C_33cos3 ψ - S_33sin3 ψ),
R^-3 T'_233 = -1/20 C_30(sinθ + 5 sin3 θ) + 1/10cosθ(7 - 15 cos2 θ) (S_31cosψ + C_31sinψ) -
- (1 + 3 cos2 θ) sinθ(C_32cos2 ψ - S_32sin2 ψ) +
6 cosθsin^2θ(S_33cos3 ψ + C_33sin3 ψ),
R^-3 T'_333 = 1/20 C_30 (3 cosθ + 5 cos 3 θ) -
3/10(3 + 5 cos2 θ) sinθ(S_31cosψ + C_31sinψ) -
-
6 cosθsin^2θ(C_32cos2 ψ - S_32sin2 ψ) +
6 sin^3θ(S_33cos3 ψ + C_33sin3 ψ).
The relations between {C'_3k,S'_3k} and T'^<abc> have the same structure as in (<ref>) and thus are given as
C'_30 = 5/2 R^-3 T'_333,
C'_31 = -5/4 R^-3 T'_133,
C'_32 = 1/4 R^-3( T'_113- T'_223),
C'_33 = 1/24 R^-3(3 T'_122- T'_111),
S'_31 = -5/4 R^-3 T'_233,
S'_32 = 1/2 R^-3 T'_123,
S'_33 = 1/24 R^-3( T'_222-3 T'_112).
§.§.§ Octupole phase in terms of spherical harmonics
The expressions developed in the precessing section allow us to write (<ref>) in terms of the spherical harmonic coefficients C'_3k,S'_3k as below
φ_3(r⃗,r⃗_0)
=
-kr_g (R_⊕/b)^3 {8{
C'_33cos3ϕ_ξ+S'_33sin3ϕ_ξ}{1-
(k⃗·n⃗)(1+
1/2b^2/r^2+3/8b^4/r^4)}-
-
3{C'_32cos2ϕ_ξ+S'_32sin2ϕ_ξ}b^5/r^5+
3/2{C'_31cosϕ_ξ+S'_31sinϕ_ξ}b^4/r^4(k⃗·n⃗)- 1/3 C'_30b^3/r^3(
1-3/2b^2/r^2)
}|^r_r_0,
where, using (<ref>) and (<ref>), we find that C'_3 k and S'_3 k are related to their unrotated GCRS counterparts as
C'_30 = 1/8(3 cosθ + 5 cos3 θ) C_30 - 3/4(3 + 5 cos2 θ) sinθ(S_31cosψ +
C_31sinψ) -
-
15 cosθsin^2θ(C_32cos2 ψ -
S_32sin2 ψ) +
15 sin^3θ(S_33cos3 ψ + C_33sin3 ψ),
C'_31 = 1/8(3 + 5 cos2 θ) (C_31cosψ - S_31sinψ) -
5/2sin2 θ(S_32cos2 ψ + C_32sin2 ψ) -
- 15/2sin^2θ(C_33cos3 ψ - S_33sin3 ψ),
C'_32 = -1/4cosθsin^2θ C_30 -
1/8(1 + 3 cos2 θ) sinθ(S_31cosψ +
C_31sinψ) +
+ 1/8(5 cosθ + 3 cos3 θ) (C_32cos2 ψ -
S_32sin2 ψ) -
3/8 (5 sinθ + sin3 θ) (C_33sin3 ψ+S_33cos3 ψ),
C'_33 = - 1/8sin^2θ(C_31cosψ - S_31sinψ) - 1/4sin2 θ(C_32sin2 ψ+S_32cos2 ψ) +
+ 1/8(5 + 3 cos2 θ) (C_33cos3 ψ - S_33sin3 ψ),
S'_31 = 1/8sinθ(3 + 5cos2 θ)C_30 +
1/8cosθ(15 cos2 θ-7) (C_31sinψ+S_31cosψ) -
- 5/8(sinθ - 3 sin3 θ) (C_32cos2 ψ -
S_32sin2 ψ) -
15/2cosθsin^2θ(S_33cos3 ψ +
C_33sin3 ψ),
S'_32 = cos2 θ(C_32sin2 ψ+S_32cos2 ψ) +
1/4sin2 θ(C_31cosψ - S_31sinψ) +
3/2sin2 θ(C_33cos3 ψ - S_33sin3 ψ),
S'_33 = - 1/24sin^3θ C_30 - 1/8cosθsin^2θ(C_31sinψ+S_31cosψ) + 1/16(5 sinθ + sin3 θ) (C_32cos2 ψ -S_32sin2 ψ) +
+ 1/16(15 cosθ + cos3 θ) (C_33sin3 ψ+S_33cos3 ψ).
§.§.§ The case of an axisymmetric body
We know that, in the case of an axisymmetric gravitating body, all the spherical harmonic coefficients except C_30 vanish: C_31=C_32=C_33=S_21=S_22=S_33=0. In this case, expression (<ref>) with (<ref>) takes the form
φ_3(r⃗,r⃗_0)
= 1/3 kr_g C_30R^3_⊕{
-sinθsinϕ_ξ(4sin^2θsin^2ϕ_ξ -3sin^2θ){1/b(1/r(r+(k⃗·r⃗) )-(k⃗·r⃗)/2r^3)}+
+ 3/2sinθsinϕ_ξ(sin^2θsin^2ϕ_ξ-3cos^2θ)b(k⃗·r⃗)/r^5-
- 3/2cosθ(cos^2θ-3sin^2θsin^2ϕ_ξ)b^2/2r^5-
1/2cosθ(3-5cos^2θ)
1/r^3}|^r_r_0.
Again, relying on the definitions of the unit vectors m⃗,k⃗,s⃗ and using J_3=-C_30, we present (<ref>) as
φ_3(r⃗,r⃗_0)
= -1/3kr_gJ_3R_⊕^3{
(s⃗·m⃗)(4(s⃗·m⃗)^2+3(s⃗·k⃗)^2-3)
(1/b(1/r(r+(k⃗·r⃗))-(k⃗·r⃗)/2r^3)-
-40pt - 3/2(s⃗·m⃗)
((s⃗·m⃗)^2-3(s⃗·k⃗)^2)b(k⃗·r⃗)/r^5-
3/2(s⃗·k⃗)((s⃗·k⃗)^2-3(s⃗·m⃗)^2)b^2/r^5-1/2(s⃗·k⃗)(3-5(s⃗·k⃗)^2)1/r^3}|^r_r_0,
which checks out nicely with the relevant J_3-part of (<ref>).
§.§ Hexadecapole moment
§.§.§ The structure of the hexadecapole phase shift
In the case when ℓ=4, we use the derivatives (<ref>), (<ref>) and derive the eikonal phase shift, φ_4(r⃗,r⃗_0) from (<ref>), introduced by the hexadecapole STF moment, T^<abcd>, in the form
φ_4(r⃗,r⃗_0)
= -1/24 kr_g
T^<ijkl> I_abcd(r⃗,r⃗_0),
where I_abcd(r⃗,r⃗_0) is the ℓ=4 ligh ray's trajectory projection operator that is given as
I_abcd(r⃗,r⃗_0) =
-3{(8m_am_bm_cm_d+8k_ak_bm_cm_d+k_ak_bk_ck_d)1/b^2(2/r(r+(k⃗·r⃗))-(k⃗·r⃗)/r^3)+
-60pt +
2(4k_ak_bk_ck_d-3k_ak_bm_cm_d-3m_am_bm_cm_d) (k⃗·r⃗)/r^5+
5(6k_ak_bm_cm_d-k_ak_bk_ck_d-m_am_bm_cm_d) b^2(k⃗·r⃗)/r^7+
+
20(k_am_bm_cm_d-k_ak_bk_cm_d)b^3/r^7 +28 k_ak_bk_cm_d b/r^5)
}|^r_r_0.
As we did for (<ref>) and (<ref>), we identically re-arrange the terms in (<ref>) to make it more convenient for calculations
I_abcd(r⃗,r⃗_0) =
-6{(8m_am_bm_cm_d+8k_ak_bm_cm_d+k_ak_bk_ck_d)×
60pt × {1/b^2(1/r(r+(k⃗·r⃗))-(k⃗·r⃗)/2r^3)-3/8(k⃗·r⃗)/r^5-
5/16b^2(k⃗·r⃗)/r^7}+
+
10(k_am_bm_cm_d+3/4 k_ak_bk_cm_d)b^3/r^7 +
35/2(k_ak_bm_cm_d +1/2 k_ak_bk_ck_d)b^2(k⃗·r⃗)/r^7+
+
14 k_ak_bk_cm_d b/r^5(1-5/4b^2/r^2)+
35/8 k_ak_bk_ck_d (k⃗·r⃗)/r^5(1-
5/2b^2/r^2)
}|^r_r_0.
Similarly to (<ref>), there is no need to make I_abcd(r⃗,r⃗_0) to be an STF quantity as it will be acting on the STF tensor T^<abcd> in (<ref>), so that the presence of delta Kronecker symbols will not change the overall result.
The form (<ref>) is convenient as it allows to express various inner products in (<ref>) in the light ray's system of coordinates and using (<ref>), yielding remarkably structured results:
T^<abcd>(8m_am_bm_cm_d+8k_ak_bm_cm_d+k_ak_bk_ck_d) =
-80pt = ( T'_1111+ T'_2222-6 T'_1122)cos4ϕ_ξ+4( T'_1112- T'_1222)sin4ϕ_ξ,
T^<abcd>(k_am_bm_cm_d+3/4 k_ak_bk_cm_d) = 1/4( T'_1113-3 T'_1223)cos3ϕ_ξ+
1/4(3 T'_1123- T'_2223)sin3ϕ_ξ,
T^<abcd>(k_ak_bm_cm_d +1/2 k_ak_bk_ck_d) = 1/2( T'_1133- T'_2233)cos2ϕ_ξ+
T'_1223sin2ϕ_ξ,
T^<abcd> k_ak_bk_cm_d = T'_1333cosϕ_ξ+ T'_2333sinϕ_ξ,
T^<abcd> k_ak_bk_ck_d = T'_3333.
Using the expressions (<ref>)–(<ref>), as a result, we obtain the following compact form for the hexadecapole gravitational phase shift expressed via rotated ℓ=4 STM mass moments:
φ_4(r⃗,r⃗_0)
= 1/4 kr_g
{{( T'_1111+ T'_2222-6 T'_1122)cos4ϕ_ξ+
4( T'_1112- T'_1222)sin4ϕ_ξ}×
70pt
× {1/b^2(1/r(r+(k⃗·r⃗))-(k⃗·r⃗)/2r^3)-3/8(k⃗·r⃗)/r^5-5/16 b^2(k⃗·r⃗)/r^7}+
-60pt+ 5/2{( T'_1113-3 T'_1223)cos3ϕ_ξ+(3 T'_1123- T'_2223)sin3ϕ_ξ}b^3/r^7 -
35/2{1/2( T'_1133- T'_2233)cos2ϕ_ξ+
T'_1223sin2ϕ_ξ} b^2(k⃗·r⃗)/r^7+
+
14 { T'_1333cosϕ_ξ+ T'_2333sinϕ_ξ}b/r^5(1-
5/4b^2/r^2)+
35/8 T'_3333(k⃗·r⃗)/r^5(1-5/2b^2/r^2)
}|^r_r_0.
§.§.§ Rotating the hexadecapole mass moment
We now need to establish the relationships between T^<abcd> and the spherical harmonics, C_4k, S_k, k=0...4, that are given with respect to the GCRS.
For that, as we did for the cases with ℓ=2,3, we establish a correspondence between T^<abcd> from (<ref>) and the spherical harmonics coefficients for ℓ=4 that are present in (<ref>) (i.e., using the same procedure demonstrated in Appendix <ref>):
T_1111 = (3/35C_40- 12/7C_42+24C_44)R^4, T_2222=(3/35C_40+12/7C_42+24C_44)R^4,
T_1112 = (-6/7S_42+ 24S_44)R^4, T_1113=(3/7C_41-60/7C_43)R^4,
T_2223=(3/7S_41+60/7S_43)R^4,
T_1122 = (1/35C_40- 24C_44)R^4,
T_1123=(1/7S_41-60/7S_43)R^4,
T_1133=(-4/35C_40+12/7C_42)R^4,
T_2233 = (-4/35C_40-12/7C_42)R^4, T_1222=(-6/7S_42- 24S_44)R^4,
T_1223=(1/7C_41+60/7C_43)R^4,
T_3333 = 8/35C_40R^4, T_1233=12/7S_42R^4, T_1333=-4/7C_41R^4, T_2333=-4/7S_41R^4.
As these quantities are the non-vanishing components of the hexadecapole STF mass moment tensor, out of the fifteen terms T^<abcd> in (<ref>), only nine are independent.
We can now rotate T^<abcd> and obtain T'^<abcd> in the light ray's system of coordinates, using in (<ref>):
T'^<abcd> = T^<ijkl> R^a_i R^b_j R^c_k R^d_l.
This allows us to derive the following components of the STF mass moments in the rotated coordinate system:
R^-4 T'_1111 = 3/35
C_40 + 12/7(S_42sin2 ψ - C_42cos 2 ψ) +
24 (C_44cos4ψ - S_44sin4 ψ),
R^-4 T'_1112 = 3/7sinθ(S_41sinψ - C_41cosψ) +
60/7sinθ(C_43cos 3 ψ - S_43sin3 ψ) -
6/7cosθ(C_42sin2 ψ + S_42cos 2 ψ) +
+
24 cosθ(S_44cos4ψ + C_44sin4 ψ),
R^-4 T'_1113 = 6/7cosθ(C_41cosψ - S_41sinψ) +
60/7cosθ(S_43sin3 ψ - C_43cos 3 ψ) -
6/7sinθ(C_42sin2 ψ + S_42cos 2 ψ) +
+
24 sinθ(S_44cos4ψ + C_44sin4 ψ),
R^-4 T'_1122 = 1/70 C_40(-3 + 5cos 2 θ) -
1/7sin2 θ(C_41sinψ + S_41cosψ) +
12/7sin^2θ(C_42cos 2 ψ - S_42sin2 ψ) +
+ 60/7sin2 θ(C_43sin3 ψ + S_43cos 3 ψ) -
24 cos^2θ(C_44cos4ψ - S_44sin4 ψ),
R^-4 T'_1123 = 1/7 C_40cosθsinθ+
1/7cos 2 θ(S_41cosψ + C_41sinψ) -
6/7sin2 θ(C_42cos 2 ψ - S_42sin2 ψ) -
- 60/7cos 2 θ(S_43cos 3 ψ + C_43sin3 ψ) +
12 sin2 θ(-C_44cos4ψ + S_44sin4 ψ),
R^-4 T'_1133 = -1/70 C_40(3 + 5cos 2 θ) +
1/7sin2 θ(S_41cosψ + C_41sinψ) +
12/7cos^2θ(C_42cos 2 ψ - S_42sin2 ψ) -
- 60/7sin2 θ(S_43cos 3 ψ + C_43sin3 ψ) -
24 sin^2θ(C_44cos4ψ - S_44sin4 ψ),
R^-4 T'_2222 = 1/280 C_40(9 - 20cos 2 θ+ 35 cos 4 θ) +
1/14(2 sin2 θ- 7 sin4 θ) (S_41cosψ +
C_41sinψ) +
+ 6/7cos^2θ(-5 + 7cos 2 θ) (C_42cos 2 ψ -
S_42sin2 ψ) -
240/7cos^3θsinθ(S_43cos 3 ψ +
C_43sin3 ψ) +
+
24 cos^4θ(C_44cos4ψ - S_44sin4 ψ),
R^-4 T'_2223 = 1/56 C_40(-2 sin2 θ+ 7 sin4 θ) - 1/14(cos2 θ- 7 cos 4 θ) (S_41cosψ + C_41sinψ) +
+ 3/14(2 sin2 θ+ 7 sin4 θ) (C_42cos 2 ψ -
S_42sin2 ψ) +
+ 60/7cos^2θ(-1 + 2cos 2 θ) (S_43cos 3 ψ +
C_43sin3 ψ) +
24 cosθ^3 sinθ(C_44cos4ψ - S_44sin4 ψ),
R^-4 T'_2233 = 1/280 C_40(3 - 35 cos 4 θ) +
1/2sin4 θ(S_41cosψ + C_41sinψ) - 3/14(1 + 7 cos 4 θ) (C_42cos 2 ψ - S_42sin2 ψ) +
+ 30/7sin4 θ(S_43cos 3 ψ + C_43sin3 ψ) +
6 sin^22 θ(C_44cos4ψ - S_44sin4 ψ),
R^-4 T'_1222 = 1/14(1- 7cos 2 θ) sinθ(C_41cosψ - S_41sinψ) +
3/14(3 cosθ - 7 cos3 θ) (S_42cos 2 ψ +
C_42sin2 ψ) -
- 180/7cos^2θsinθ(C_43cos 3 ψ - S_43sin3 ψ) -
24 cos^3θ(S_44cos4ψ + C_44sin4 ψ),
R^-4 T'_1223 = 1/28(-3 cosθ + 7 cos3 θ) (C_41cosψ -
S_41sinψ) +
3/14(sinθ- 7 sin3 θ) (S_42cos 2 ψ +
C_42sin2 ψ) +
+ 15/7(cosθ + 3 cos3 θ) (C_43cos 3 ψ -
S_43sin3 ψ) -
24 cos^2θsinθ(S_44cos4ψ + C_44sin4 ψ),
R^-4 T'_1233 = 1/28(3 sinθ+ 7 sin3 θ) (C_41cosψ -
S_41sinψ) +
3/14(cosθ + 7 cos3 θ) (S_42cos 2 ψ +
C_42sin2 ψ) -
- 15/7(sinθ- 3 sin3 θ) (C_43cos 3 ψ -
S_43sin3 ψ) -
24 cosθsin^2θ(S_44cos4ψ + C_44sin4 ψ),
R^-4 T'_2333 = -1/56 C_40 (2 sin2 θ+ 7 sin4 θ) -
1/14(cos2 θ+ 7 cos 4 θ)(S_41cosψ +
C_41sinψ) +
+ 3/14(2 sin2 θ- 7 sin4 θ) (C_42cos 2 ψ -
S_42sin2 ψ) +
+ 60/7(1 + 2cos 2 θ) sin^2θ(S_43cos 3 ψ +
C_43sin3 ψ) +
24 cosθsin^3θ(C_44cos4ψ - S_44sin4 ψ),
R^-4 T'_1333 = -1/14cosθ(1 + 7cos 2 θ) (C_41cosψ -
S_41sinψ) +
3/14(3 sinθ+ 7 sin3 θ) (S_42cos 2 ψ +
C_42sin2 ψ) +
+ 180/7cosθsin^2θ(C_43cos 3 ψ -
S_43sin3 ψ) -
24 sin^3θ(S_44cos4ψ + C_44sin4 ψ),
R^-4 T'_3333 = 1/280 C_40(9 + 20cos 2 θ+ 35 cos 4 θ) -
1/14(2 sin2 θ+ 7 sin4 θ) (C_41sinψ +
S_41cosψ) +
+ 6/7(5 + 7cos 2 θ) sin^2θ(S_42sin2 ψ - C_42cos 2 ψ) +
240/7cosθsin^3θ(C_43sin3 ψ +
S_43cos 3 ψ) +
+
24 sin^4θ(C_44cos4ψ - S_44sin4 ψ).
As a result, the relations between
{C'_4k,S'_4k} and T'^<abcd> are established to be
C'_40 = 35/8 T'_3333R^-4,
C'_41 = -7/4 T'_1333R^-4,
C'_42 = 7/48( T'_1133- T'_2233)R^-4,
C'_43 = -7/240( T'_1113-3 T'_1223)R^-4,
C'_44 = 1/96( T'_1111+ T'_2222-6 T'_1122)R^-4,
S'_41 =-7/4 T'_2333R^-4
S'_42 = 7/12 T'_1223R^-4,
S'_43 = -7/240(3 T'_1123- T'_2223)R^-4,
S'_44 = 1/48( T'_1112- T'_1222)R^-4.
§.§.§ Hexadecapole phase in terms of spherical harmonics
Relationships (<ref>)–(<ref>) allow us to express (<ref>) in terms of the spherical harmonics coefficients C'_4k,S'_4k as
φ_4(r⃗,r⃗_0)
= kr_g(R_⊕/b)^4
{48{C'_44cos4ϕ_ξ+S'_44sin4ϕ_ξ}{1-(k⃗·n⃗)(1+1/2b^2/r^2+3/8b^4/r^4+5/16b^6/r^6)}-
25pt - 150/7{C'_43cos3ϕ_ξ+S'_43sin3ϕ_ξ}b^7/r^7 +
15/2{C'_42cos2ϕ_ξ+S'_42sin2ϕ_ξ}b^6/r^6-
34pt -
2{ C'_41cosϕ_ξ+S'_41sinϕ_ξ}b^5/r^5(1-
5/4b^2/r^2)+1/4 C'_40b^4/r^4(k⃗·n⃗)(1-5/2b^2/r^2)
}|^r_r_0,
where C'_4 k and S'_4 k in the rotated coordinate system using (<ref>) and (<ref>) are given by[Note that the form of Eq. (<ref>) may be generalized to any order ℓ. Here we present the result that captures the contribution of the sectoral spherical harmonics C'_ℓℓ,S'_ℓℓ that has the form:
φ_ℓ(r⃗,r⃗_0)
= kr_g(R_⊕/b)^ℓ{(-1)^ℓ(2ℓ-2)!!{C'_ℓℓcosℓϕ_ξ+S'_ℓℓsinℓϕ_ξ}{1-(k⃗·n⃗)(∑_k=0^ℓ-1(2k)!/4^k(k!)^2(b/r)^2k)}}|^r_r_0,
which extends our results from <cit.> (that were developed for the case when b≪ r) on the case with any relations between b and r. The relevant work is currently underway; results, when available, will be reported.
]
C'_40 = 1/64(9 + 20 cos 2θ + 35 cos 4 θ)C_40 -
5/16(2 sin2θ + 7 sin4 θ) (C_41sinψ+S_41cosψ) -
- 15/4(5 + 7 cos 2 θ) sin^2θ(C_42cos 2 ψ - S_42sin2 ψ) +
150 cosθsin^3θ(C_43sin3 ψ+S_43cos 3 ψ) +
+
105 sin^4θ(C_44cos 4 ψ - S_44sin4 ψ),
C'_41 = 1/8cosθ(1 + 7 cos 2 θ) (C_41cosψ - S_41sinψ) -
3/8(3 sinθ + 7 sin3 θ) (C_42sin2 ψ+S_42cos 2 ψ) -
- 45 cosθsin^2θ(C_43cos 3 ψ - S_43sin3 ψ) + 42 sin^3θ(C_44sin4 ψ+S_44cos 4 ψ),
C'_42 = -1/48sin^2θ(5 + 7 cos 2 θ) C_40 +
1/48(2 sin2θ - 7 sin4 θ) (C_41sinψ+S_41cosψ) +
+ 1/16(5 + 4 cos 2θ +
7 cos 4 θ) (C_42cos 2 ψ - S_42sin2 ψ) -
10 cos^3θsinθ(C_43sin3 ψ+S_43cos 3 ψ) -
- 7/2(3 + cos 2 θ)sin^2θ(C_44cos 4 ψ - S_44sin4 ψ),
C'_43 = -7/80cosθsin^2θ(C_41cosψ - S_41sinψ) -
7/80(1 + 3 cos 2 θ) sinθ(C_42sin2 ψ+S_42cos 2 ψ) +
+ 1/16(7 cosθ + 9 cos 3 θ) (C_43cos 3 ψ -
S_43sin3 ψ) -
7/40(7 sinθ + 3 sin3 θ) (C_44sin4 ψ+S_44cos 4 ψ),
C'_44 = 1/192sin^4θ C_40 +
1/48cosθsin^3θ(C_41sinψ+S_41cosψ) -
1/32(3 + cos 2 θ) sin^2θ(C_42cos 2 ψ - S_42sin2 ψ) -
- 5/224(14 sin2θ + sin4 θ) (C_43sin3 ψ+S_43cos 3 ψ) +
1/64(35 + 28 cos 2θ + cos 4 θ) (C_44cos 4 ψ - S_44sin4 ψ),
S'_41 = 1/32(2 sin2θ + 7 sin4 θ)C_40 +
1/8(cos 2θ + 7 cos 4 θ)(C_41sinψ+S_41cosψ) -
- 3/8(2 sin2θ - 7 sin4 θ) (C_42cos 2 ψ -
S_42sin2 ψ) -
15 (1 + 2 cos 2 θ) sin^2θ(C_43sin3 ψ+S_43cos 3 ψ) -
-
42 cosθsin^3θ(C_44cos 4 ψ - S_44sin4 ψ),
S'_42 = 1/48(3 sinθ + 7 sin3 θ) (C_41cosψ - S_41sinψ) +
1/8(cosθ + 7 cos 3 θ) (C_42sin2 ψ+S_42cos 2 ψ) -
- 5/4(sinθ - 3 sin3 θ) (C_43cos 3 ψ - S_43sin3 ψ) -
14 cosθsin^2θ(C_44sin4 ψ+S_44cos 4 ψ),
S'_43 = -7/240cosθsin^3θ C_40 - 7/240(1 + 2 cos 2 θ) sin^2θ(C_41sinψ+S_41cosψ) +
+ 7/20cos^3θsinθ(C_42cos 2 ψ - S_42sin2 ψ) +
1/8(7 cos 2θ + cos 4 θ) (C_43sin3 ψ+S_43cos 3 ψ) +
+ 7/80(14 sin2θ + sin4 θ) (C_44cos 4 ψ -
S_44sin4 ψ),
S'_44 = -1/48sin^3θ(C_41cosψ - S_41sinψ) - 1/8cosθsin^2θ(C_42sin2 ψ+S_42cos 2 ψ) +
+ 5/112(7 sinθ + 3 sin3 θ)(C_43cos 3 ψ - S_43sin3 ψ) + 1/8(7 cosθ + cos 3 θ) (C_44sin4 ψ+S_44cos 4 ψ).
§.§.§ The case of an axisymmetric body
For an axisymmetric body, all the spherical harmonic coefficients except for C_40 vanish, namely: C_41=C_42=C_43=C_41=S_41=S_42=S_43=S_43=0. In this case, expressions (<ref>)–(<ref>) take the form
φ_4(r⃗,r⃗_0)
= 1/4 kr_gC_40R_⊕^4
{cos 4ϕ_ξsin^4θ{1/b^2(1/r(r+(k⃗·r⃗))-(k⃗·r⃗)/2r^3)-3/8(k⃗·r⃗)/r^5}-
- 5/2(
sin^4θsin^4 ϕ_ξ -6
sin^2θcos^2θsin^2 ϕ_ξ + cos^4 θ)
b^2(k⃗·r⃗)/r^7+
-40pt +
10sinθcosθsinϕ_ξ(cos^2θ-sin^2θsin^2ϕ_ξ)
b^3/r^7+
2sinθcosθsinϕ_ξ(3 - 7 cos^2 θ)b/r^5}|^r_r_0.
Again, using J_4=-C_40 and relying on the definitions of the unit vectors m⃗,k⃗,s⃗, we present (<ref>) as
φ_4(r⃗,r⃗_0)
= 1/4kr_gJ_4R_⊕^4 {(8(s⃗·m⃗)^2((s⃗·m⃗)^2+(s⃗·k⃗)^2-1)+((s⃗·k⃗)^2-1)
^2)1/b^2((k⃗·r⃗)/2r^3-1/r(r+(k⃗·r⃗)))+
+ (3(s⃗·m⃗)^2
((s⃗·m⃗)^2+(s⃗·k⃗)^2-1)+(s⃗·k⃗)^2
(3-4(s⃗·k⃗)^2))(k⃗·r⃗)/r^5+
+ 5/2(((s⃗·m⃗)^2-(s⃗·k⃗)^2)^2-4(s⃗·m⃗)^2(s⃗·k⃗)^2)b^2(k⃗·r⃗)/r^7+
+
10(s⃗·m⃗)(s⃗·k⃗)((s⃗·k⃗)^2-(s⃗·m⃗)^2)b^3/r^7+2(s⃗·m⃗)(s⃗·k⃗)(3-7(s⃗·k⃗)^2)b/r^5}|^r_r_0,
which agrees with the relevant J_4-part of (<ref>).
§.§ Tidal and spin contributions
Considering signal propagation in the vicinity of the Earth, we can now integrate the contributions to the total phase shift from the remaining two terms present in (<ref>), namely the tidal terms and the Earth's vector potential (<ref>), that are given by (<ref>) and (<ref>), correspondingly. Integration of these terms along the light path is straightforward, yielding the following result for the tidal term:
φ_G^ tidal(x⃗) =
-k∫^τ_τ_02/c^2u^ tidal_ E(τ')dτ' ≃-
k ∑_b≠ EGM_b/c^2r^3_b E∫^τ_τ_0(3(n⃗^_b E·x⃗)^2-x⃗^2)
dτ'≃
-55pt ≃
k ∑_b≠ EGM_b/c^2r^3_b E{(3(n⃗^_b E·m⃗)^2-1)b^2(k⃗·r⃗)
+3(n⃗^_b E·m⃗)(n⃗^_b E·k⃗)b(k⃗·r⃗)^2+
1/3(3(n⃗^_b E·k⃗)^2-1)(k⃗·r⃗)^3}|^r_r_0≈
-55pt ≈
k ∑_b≠ EGM_b/c^2r^3_b E1/3(3(n⃗^_b E·k⃗)^2-1)((k⃗·r⃗)^3-(k⃗·r⃗_0)^3).
Similarly, we integrate the phase term due to the Earth's rotation:
φ_G^ S(x⃗) =
-k∫^τ_τ_04/c^3(k_ϵ w^ϵ_ E(τ'))dτ' =-
k2GM_⊕/c^3
(S⃗_⊕·[k⃗×b⃗])∫^τ_τ_0dτ'/r^3 =
- k 2GM_⊕/c^3(S⃗_⊕·[k⃗×m⃗])/b(k⃗·(n⃗-n⃗_0)).
We can now evaluate these terms for a typical GPS orbit with altitude of d_ GPS=20,000 km, so that r_0=R_⊕+d_ GPS. The tidal term from (<ref>) is
φ_G^ tidal(x⃗) ≈
k ∑_b≠ EGM_b/c^2r^3_b E1/3(3(n⃗^_b E·k⃗)^2-1)((k⃗·r⃗)^3-(k⃗·r⃗_0)^3)=
-50pt=
k ∑_b≠ EGM_b/3c^2r^3_0/r^3_b E(3(n⃗^_b E·k⃗)^2-1)(r^3/r^3_0(k⃗·n⃗)^3-(k⃗·n⃗_0)^3)≈
kc(4.01× 10^-17 s+1.84× 10^-17 s),
where the two numerical contributions are from the Moon and the Sun, respectively. Along similar lines, the phase contribution from the Earth's rotation (<ref>) may be at most
φ_G^ S(x⃗) =
- k 2GM_⊕/c^3(S⃗_⊕·[k⃗×m⃗])/b(k⃗·(n⃗-n⃗_0))
≈ kc(R_⊕/b)(k⃗·(n⃗-n⃗_0))(1.52× 10^-17 s),
which may be insignificant in many scenarios, though its magnitude can be non-negligible for vertical transmissions.
§.§ Evaluating the magnitudes of the various multipole terms
Although we were able to develop analytical expressions for the gravitational phase shifts induced by the ℓ=2, 3, 4 spherical harmonics (<ref>), (<ref>) and (<ref>), correspondingly, we recognize that based on the values of the spherical harmonic coefficients shown in Table <ref>, their individual contributions will be very different.
The relative magnitudes of individual terms depend significantly on the location of the transmitter and receiver and the direction of transmission. The significance of these terms and their contributions to the phase shift is application-dependent. As a general observation, we note that the contributions of all but the quadrupole zonal harmonic C_20=-J_2 are small, with typical magnitudes of kc O(10^-14 s) or less. Therefore, for many applications accounting only for J_2 and C_22, S_22 may be sufficient, ignoring most of the tesseral, sectoral, and higher-order terms.
Evaluating the phase delay using a ground-based transmitter for a variety of scenarios yielded the results shown in Fig. <ref>. As expected, the largest contribution is due to the quadrupole moment, but it remains small, never exceeding ∼ 0.01 ps in magnitude. The contributions of the octupole and hexadecapole moments are much less, measured in hundredths of femtoseconds. For consistency, the cases depicted in Fig. <ref> all involve ground-based transmitters. To assess the delay between two distant stations in space, the phase delays shown in the top row of images of Fig. <ref> must be multiplied by two, to account for the incoming and outgoing leg of a transmission grazing the Earth's surface (similar to the situation discussed in <cit.>). For signal paths with a larger impact parameter, the phase delay decreases, so the curves in the top row of Fig. <ref> represent upper limits for such transmissions.
We may wonder why even the quadrupole contribution remains small, perhaps surprisingly small, in all the cases considered. When we look at Eqs. (<ref>), (<ref>) and (<ref>), there are three competing factors at work, which are best understood if we recall that ultimately, all variable terms in these expressions, including the impact parameter b defined in (<ref>), are functions of the vector quantities r⃗_0 and r⃗, and that moreover, these expressions, developed by integrating the eikonal equation, are themselves differences of values evaluated at r⃗ and r⃗_0.
To wit, when b is small, it implies a near vertical transmission. In these cases, terms with b in the numerator become insignificant, whereas k⃗·n⃗≃ 1. Looking at, e.g., (<ref>), we can see how as a result, all terms vanish, or nearly vanish from the result. Conversely, a large b implies transmission in the horizontal direction. Again looking at (<ref>), this implies that k⃗·n⃗≪ 1. Of the remaining terms, the coefficient 1 in the first term of (<ref>) does not depend on r⃗ so it is canceled when we compute the difference between r⃗ and r⃗_0. What remains, the namely the C'_21 and S'_21 terms, are small to begin with as these are the terms that include no contribution from the largest spherical harmonic coefficient C_20.
As a result of this interplay between the value of b, the value of k⃗·n⃗, and the differencing between r⃗ and r⃗_0, the magnitude of Eq. (<ref>) remains small. Similar behavior is exhibited by the octupole and hexadecapole expressions (<ref>) and (<ref>).
While these contributions are much too small to affect time synchronization with present-generation clocks, they will likely become significant in the near future, as clocks of even greater accuracy are deployed. Furthermore, while these phase shifts are insignificant for time synchronization, they represent a substantial contribution for phase-coherent transmissions and as such, they will have to be accounted for in any implementations or experiments that use phase coherent infrared or shorter wavelength signals. This includes experiments that rely on optical interferometry with signal paths in the gravitational field of the Earth.
Although the formalism that we introduced on these pages is aimed primarily at estimating the gravitational phase delay in the vicinity of the Earth, the methods are generic and can be readily applied to other gravitating bodies. We looked, in particular, at the quadrupole contribution to the Shapiro delay for a signal grazing the Sun. We found that if such a signal travels in the solar equatorial plane, the maximum phase delay due to the solar quadrupole moment (which is very small, J_2≃ -2.3× 10^-7 only) is less than 1.1 ps. The Sun has no measured octupole moment (it is “north-south symmetric” in addition to axisymmetry) and its hexadecapole moment contributes even less, at the sub-femtosecond level.
Finally, we looked at Jupiter, anticipating the possibility that future orbiters at Jupiter or one of its moons will utilize precision signals grazing the Jovian surface. Jupiter is not only massive but has substantial oblateness (J_2=-1.474× 10^-2) and although it, too, is “north-south symmetric”, its hexadecapole moment remains substantial as well. Indeed, we find that for a transmission grazing Jupiter's surface in its equatorial plane, the cumulative phase delay due to the planet's quadrupole moment can reach 70 ps, and even the hexadecapole moment can contribute more than 2 ps.
Coming back to the Earth, we also assessed the magnitudes of contributions due to spin and solar and lunar tides. For realistic signal paths within the vicinity of the Earth, these contributions remain very small: tidal contributions are of O(0.01 ps), whereas the spin contribution is less than 0.1 femptoseconds (fs). Comparatively, tidal contributions are approximately of the same magnitude as the contribution of the Earth's quadrupole moment, whereas the spin contribution is on the level of the octupole or hexadecapole moments.
§.§ Relativistic gravitational phase shift
Based on the analysis in the earlier sections, we can now write the post-Minkowskian expresison for the phase of an EM wave that propagates in the vicinity of the extended and rotating gravitating body, such as the Earth. In the body's proper reference frame (a formulation that accounts for the presence of the external gravity field produced by the external bodies of the N-body system <cit.>), collecting all the appropriate contributions coming from the Earth's mass distribution φ^ E_G, Earth's rotation φ^ S_G, and external gravity φ^ tidal_G, the total phase Eq. (<ref>) has the form:
φ(t,x⃗) = φ_0+∫ k_m dx^m+φ^ E_G(t,x⃗)+φ^ S_G(t,x⃗)+φ^ tidal_G(t,x⃗)+ O(G^2).
We now have the ability to evaluate this expression at previously unavailable levels of accuracy using expressions for the quadrupole term, φ^ E_2, from (<ref>)–(<ref>), for the octupole term φ_3, from (<ref>)–(<ref>), for the hexadecapole term, φ_4, from (<ref>)–(<ref>), and expressions (<ref>) and (<ref>) for the tidal, φ^ tidal_G, and rotational, φ^ S_G, terms, correspondingly. This level of accuracy, however, may be excessive in practical cases. For instance, if a time transfer accuracy of 10^-12 s, is acceptable, for some GPS applications, the result can be given as
φ(t,x⃗) = φ_0+k{c(t-t_0)-k⃗· (x⃗-x⃗_0)-r_gln[r+(k⃗·r⃗)/r_0+(k⃗·r⃗_0)]+
+ 1/2r_g(R_⊕/b)^2
{cos2ϕ_ξ[C_20sin^2θ
+2(1+cos^2θ)(S_22sin2ψ-C_22cos2ψ)]-
42pt-
4sin2ϕ_ξ[
cosθ(S_22cos2ψ+C_22sin2ψ)]}(k⃗·(n⃗-n⃗_0))}+
kc O(≪ 0.01 ps).
As discussed in Sec <ref>, the angles θ, ψ and ϕ_ξ are uniquely defined in terms of the GCRS positions of the transmitter, r⃗_0, and the receiver, r⃗. The order terms are due to the omitted quadrupole and higher-order multipole contributions. We included the dominant quadrupole contribution but we note that it, too, is very small, O(0.01 ps), so if only picosecond accuracy is required, the quadrupole term can also be dropped.
Eq. (<ref>) extends the well-known expression for relativistic delay. In addition to the classic Shapiro gravitational time delay due to a mass monopole (represented by the logarithmic term), it also includes contributions due to quadrupole moment of the extended Earth, C_20=-J_2 and C_22,S_22 spherical harmonics (see Table <ref>). Additional terms may be included from the preceding derivation if greater accuracy is required.
§ CONCLUSIONS AND RECOMMENDATIONS
Satellites in low-Earth orbit are affected by a broad spectrum of perturbations due to the Earth's gravity field. The largest of these perturbations are produced by the Earth's oblateness, J_2. Beyond the oblateness, there exist much smaller undulations of higher order in the gravity field. These variations produce lesser, but certainly observable effects on low-Earth orbiters <cit.>. The same gravity perturbations affect clocks and light propagation in the Earth's vicinity. However, most of the models capture only relativistic corrections due to the Earth's monopole potential, such as the Shapiro phase delay term – the largest among the relevant gravitational effects. Beyond that, only the contribution of the Earth's oblateness, characterized by J_2=-C_20, was accounted for (e.g. <cit.>). No models capturing the contributions of other multipole moments present in the Earth's gravity potential were available.
In this paper, we addressed this challenge with the aim to obtain results in terms of the spherical harmonics. We studied the transformation between proper and coordinate time and the propagation of an EM wave in the vicinity of a gravitating body with a gravitational potential that deviates from a perfect monopole, such as the Earth. We found that at the present level of accuracy, more and more terms from the Earth's gravitational potential must be included in the model formulations. In fact, the lower the orbit of a satellite, more terms are needed. Also, for high orbits, tidal gravity from the moon (and soon, that of the Sun) becomes significant and needs to be accounted for.
To study the light propagation in the vicinity fo the Earth, we represented the gravitational potential in terms of the symmetric trace-free (STF) Cartesian tensor mass multipole moments. The multipole expansion is one of the most useful tools of physics, but its use in general relativity is difficult because of the nonlinearity of the theory and the tensorial character of the gravitational interaction <cit.>.
STF tensors offer a mathematically equivalent representation of the multipole mass moments of a gravitating body, but with significant practical advantages over spherical harmonics. First, the tensorial nature of the STF representation makes it possible to express relationships in a coordinate system independent fashion, leading to a remarkable form invariance that is preserved even in coordinate representations that are rotated relative to each other. Second, the relationship between the spherical harmonic coefficients and the STF tensor components expressed in a Cartesian coordinate system is linear and nondegenerate, which means it is always invertible. Finally, and perhaps most significantly, utilizing the STF tensor representation of the mass multipole moments allowed us to integrate the eikonal equation to all STF orders ℓ.
With the solution of the eikonal equation at hand, we demonstrated a straightforward procedure to obtain the Cartesian STF components from spherical harmonic coefficients. We explicitly carried out this procedure in the cases of the quadrupole, octupole, and hexadecapole (ℓ=2,3,4) cases. In all these cases, the form invariance of the result made it possible to express the corresponding phase shift in a remarkably simple, elegant form in terms of rotated spherical harmonic coefficients. The mechanics of the rotation, in turn, can be carried out by first obtaining STF tensor components in the original coordinate system, performing the rotation next, and finally by solving a linear system of equations that has the same form in the unrotated and rotated coordinate frames. Clearly, the same approach may be used to extend our results to any order ℓ. The resulting equations are compact even for higher values of ℓ, and are directly actionable.
Note that in this paper we dealt only with the STF mass moments that are used to represent the scalar external gravitational potential (<ref>) and the relevant scalar spherical harmonics. The same approach may be used to consider the contributions from the vector potential due to body's rotation (<ref>), and the relevant STF current moments and vector spherical harmonics. As our objective was to consider measurements in the Earth's vicinity, any contribution from the Earth's vector potential is currently negligible, but may be addressed with the same tools presented here.
The numerical magnitudes of these corrections are small. Considering present-generation clocks, only the quadrupole term offers a significant contribution and only insofar as proper time to coordinate time conversions are concerned. However, the gravitational phase delay due to the quadrupole and higher order terms may become relevant with next generation clocks. These terms can also be very significant for phase coherent signaling at infrared or shorter wavelengths. We also applied our formalism for signals traversing in the vicinity of the Sun and, especially, Jupiter, and found more significant contributions, which may in the foreseeable future become relevant for deep space precision navigation and observations in the solar system.
The results presented here are new. They offer a comprehensive model for the gravitational phase shift of a EM wave as it propagates in the gravitational field of the extended Earth. As the performance of new generation of precision clocks increases, such results may have a wide range of practical applications, including clock synchronization, frequency transfer and interferometry. They may also lead to new uses including relativistic geodesy <cit.>. These and other possibilities are currently being investigated. Results, when available, will be reported elsewhere.
We thank Yoaz E. Bar-Sever and William I. Bertiger of JPL who provided us with motivation, encouragement, and valuable comments of various topics discussed in this document. The work described here, in part, was carried out at the Jet Propulsion Laboratory, California Institute of Technology, under a contract with the National Aeronautics and Space Administration. VTT acknowledges the generous support of Plamen Vasilev and other Patreon patrons.
52
natexlab#1#1bibnamefont#1#1bibfnamefont#1#1citenamefont#1#1url<#>1urlprefixURL
[Ai et al.(2021)Ai, Maciuk,
Lewinska, and Borowski]Ai-etal:2021
authorQ. Ai,
authorK. Maciuk,
authorP. Lewinska,
and
authorL. Borowski,
journalSensors volume21,
pages2396 (year2021).
[Chen et al.(2021)Chen, Zhao, Hu,
Ya, and Zhu]Chen-etal:2021
authorJ. Chen,
authorX. Zhao,
authorH. Hu,
authorS. Ya, and
authorS. Zhu,
journalMeasurement Science and Technology
volume32, eid115021 (year2021).
[Schuldt et al.(2021)Schuldt, Gohlke,
Oswald, Wüst, Blomberg, Döringshoff, Bawamia, Wicht, Lezius, Voss
et al.]Schuldt-etal:2021
authorT. Schuldt,
authorM. Gohlke,
authorM. Oswald,
authorJ. Wüst,
authorT. Blomberg,
authorK. Döringshoff,
authorA. Bawamia,
authorA. Wicht,
authorM. Lezius,
authorK. Voss, et al.,
journalGPS Solut. volume25
(year2021).
[Oelker et al.(2019)Oelker, Hutson,
Kennedy, Sonderhouse, Bothwell, Goban, Kedar, Sanner, Robinson,
Marti et al.]Oelker-etal:2019
authorE. Oelker,
authorR. B. Hutson,
authorC. J. Kennedy,
authorL. Sonderhouse,
authorT. Bothwell,
authorA. Goban,
authorD. Kedar,
authorC. Sanner,
authorJ. M. Robinson,
authorG. E. Marti,
et al., journalNature Photonics
volume13, pages714 (year2019).
[Schkolnik et al.(2023)Schkolnik,
Budker, Fartmann, Flambaum, Hollberg, Kalaydzhyan, Kolkowitz,
Krutzik, Ludlow, Newbury et al.]Schkolnik-etal:2023
authorV. Schkolnik,
authorD. Budker,
authorO. Fartmann,
authorV. Flambaum,
authorL. Hollberg,
authorT. Kalaydzhyan,
authorS. Kolkowitz,
authorM. Krutzik,
authorA. Ludlow,
authorN. Newbury,
et al., journalQuant. Sci. Tech.
volume8, eid014003 (year2023).
[Turyshev et al.(2014)Turyshev, Sazhin,
and Toth]Turyshev:2014dea
authorS. G. Turyshev,
authorM. V. Sazhin,
and authorV. T. Toth,
journalPhys.Rev. volumeD89,
pages105029 (year2014), arXiv:1402.7111
[gr-qc].
[Klioner(1991)]Klioner:1991SvA
authorS. A. Klioner,
journalSov. Astron. volume35,
pages523 (year1991).
[Turyshev et al.(2013)Turyshev, Toth, and
Sazhin]Turyshev:2012nw
authorS. G. Turyshev,
authorV. T. Toth, and
authorM. V. Sazhin,
journalPhys. Rev. volumeD87,
pages024020 (year2013), arXiv:1212.0232
[gr-qc].
[Pavlis et al.(2012)Pavlis, Holmes,
Kenyon, and Factor]Pavlis-etal:2012
authorN. K. Pavlis,
authorS. A. Holmes,
authorS. C. Kenyon,
and authorJ. K.
Factor, journalJ. Geophys. Res.: Solid Earth
volume117 (year2012).
[Turyshev and Toth(2015)]Turyshev-Toth:2013
authorS. G. Turyshev and
authorV. T. Toth,
journalInt. J. Mod. Phys. D volume24,
pages1550039 (year2015), arXiv:1304.8122
[gr-qc].
[Turyshev et al.(2016)Turyshev, Yu,
and Toth]Turyshev-Toth:2016
authorS. G. Turyshev,
authorN. Yu, and
authorV. T. Toth,
journal volume93, eid045027
(year2016), arXiv:1512.09019 [gr-qc].
[Turyshev and
Toth(2022)]Turyshev-Toth:2021-STF-moments
authorS. G. Turyshev and
authorV. T. Toth,
journalPhys. Rev. D volume105,
pages024022 (year2022),
notearXiv:2107.13126 [gr-qc].
[Turyshev and
Toth(2022)]Turyshev-Toth:2022-platonic
authorS. G. Turyshev
and authorV. T.
Toth, journalMNRAS
volume513, pages5355 (year2022),
notearXiv:2108.07172 [gr-qc].
[Turyshev et al.(2012)Turyshev,
Minazzoli, and Toth]Turyshev-etal:2012
authorS. G. Turyshev,
authorO. L. Minazzoli,
and authorV. T. Toth,
journalJ. Math. Phys. volume53,
pages032501 (year2012), arXiv:1109.1796
[gr-qc].
[Petit and Luzum (eds.)(2010)]Petit-Luzum:2010
authorG. Petit and
authorB. Luzum (eds.),
titleIERS Technical Note #36 (publisher“IERS
Conventions (2010)”, Frankfurt am Main: Verlag des Bundesamts für
Kartographie und Geodäsie, 2010. 179 pp., ISBN 3-89888-989-6”,
year2010),
<http://www.iers.org/IERS/EN/Publications/TechnicalNotes/tn36.html>.
[Ashby(2003)]Ashby-2003
authorN. Ashby,
journalLiving Rev. Relativity volume6
(year2003),
<https://link.springer.com/article/10.12942/lrr-2003-1>.
[Landau and Lifshitz(1988)]Landau-Lifshitz:1988
authorL. D. Landau and
authorE. M. Lifshitz,
titleThe Classical Theory of Fields (in Russian)
(publisherNauka, Moscow, year1988),
edition7th ed.
[Abramowitz and
Stegun(1965)]Abramovitz-Stegun:1965
authorM. Abramowitz
and authorI. A.
Stegun, titleHandbook of Mathematical
Functions: with Formulas, Graphs, and Mathematical Tables.
(publisherDover Publications, New York; revised edition,
year1965).
[Kozai(1966)]Kozai:1966
authorY. Kozai,
journalSpace Sci. Rev. volume5,
pages818 (year1966).
[Gasposchkin(1977)]Gasposchkin:1977
authorE. Gasposchkin,
journalPhilos. Trans. Royal Soc. London. Ser. A, Math. Phys. Sci.
volume284, pages515 (year1977).
[Lambeck(1988)]Lambeck:1988
authorK. Lambeck,
titleGeophysical Geodesy: The Slow Deformations of the
Earth (publisherOxford University Press, New York,
year1988).
[NASA/JPL, a project file
depository(2001)]JPL-EarthGrav:2021
authorNASA/JPL, a project file depository
(year2001), noteSpherical Harmonic Representation of
the Gravity Field Potential,
<https://spsweb.fltops.jpl.nasa.gov/portaldataops/mpg/MPG_Docs/Source
Docs/gravity-SphericalHarmonics.pdf>.
[Tapley et al.(1996)Tapley, Watkins,
Ries, Davis, Eanes, Poole, Rim, Schutz, Shum, Nerem et al.]Tapley-1996
authorB. D. Tapley,
authorM. M. Watkins,
authorJ. C. Ries,
authorG. W. Davis,
authorR. J. Eanes,
authorS. R. Poole,
authorH. J. Rim,
authorB. E. Schutz,
authorC. K. Shum,
authorR. S. Nerem,
et al., journalJ. Geophys. Res.: Solid Earth
volume101, pages28029
(year1996).
[Montenbruck and Gill(2012)]Montenbruck-Gill:2012
authorO. Montenbruck and
authorE. Gill,
titleSatellite Orbits (publisherSpringer
Berlin, Heidelberg, year2012).
[Soffel et al.(2003)Soffel,
Klioner, Petit, Wolf, Kopeikin, Bretagnon, Brumberg, Capitaine,
Damour, Fukushima et al.]Soffel:2003cr
authorM. Soffel,
authorS. A. Klioner,
authorG. Petit,
authorP. Wolf,
authorS. M. Kopeikin,
authorP. Bretagnon,
authorV. A. Brumberg,
authorN. Capitaine,
authorT. Damour,
authorT. Fukushima,
et al., journalAstron. J.
volume126, pages2687 (year2003),
astro-ph/0303376.
[Moyer(2003)]Moyer:2003
authorT. D. Moyer,
titleFormulation for Observed and Computed Values of Deep
Space Network Data Types for Navigation, JPL Deep-Space Communications and
Navigation Series (publisherWiley-Interscience,
year2003).
[Klioner(2008)]Klioner:2008
authorS. A. Klioner,
journalAstron. Astrophys. volume478,
pages951 (year2008).
[Klioner et al.(2010)Klioner, Capitaine,
Folkner, Guinot, Huang, Kopeikin, Petit, Pitjeva, Seidelmann, and
Soffel]Klioner-etal:2010
authorS. A. Klioner,
authorN. Capitaine,
authorW. Folkner,
authorB. Guinot,
authorT. Y. Huang,
authorS. Kopeikin,
authorG. Petit,
authorE. Pitjeva,
authorP. K. Seidelmann,
and authorM. Soffel,
in booktitleRelativity in Fundamental Astronomy: Dynamics,
Reference Frames, and Data Analysis, edited by
editorS. Klioner,
editorP. K. Seidelmann,
and editorM. Soffel
(publisherCambridge University Press, year2010).
[Kopeikin et al.(2011)Kopeikin,
Efroimsky, and Kaplan]Kopeikin-book-2011
authorS. M. Kopeikin,
authorM. Efroimsky,
and authorG. Kaplan,
titleRelativistic Celestial Mechanics of the Solar
System (publisherWiley-VCH, year2011).
[Ahlers et al.(2022)Ahlers,
Badurina, Bassi, Battelier, Beaufils, Bongs, Bouyer, Braxmaier,
Buchmueller, Carlesso et al.]Ahlers-etal:2022
authorH. Ahlers,
authorL. Badurina,
authorA. Bassi,
authorB. Battelier,
authorQ. Beaufils,
authorK. Bongs,
authorP. Bouyer,
authorC. Braxmaier,
authorO. Buchmueller,
authorM. Carlesso,
et al. (year2022), notearXiv:2211.15412
[physics.space-ph].
[Origlia et al.(2016)Origlia,
Schiller, Pramod, Smith, Singh, He, Viswam, Świerad,
Hughes, Bongs et al.]Origlia-etal:2016
authorS. Origlia,
authorS. Schiller,
authorM. S. Pramod,
authorL. Smith,
authorY. Singh,
authorW. He,
authorS. Viswam,
authorD. Świerad,
authorJ. Hughes,
authorK. Bongs,
et al., in booktitleQuantum Optics, edited
by editorJ. Stuhler
and editorA. J.
Shields (year2016), vol. volume9900
of seriesSociety of Photo-Optical Instrumentation Engineers
(SPIE) Conference Series, p. pages990003,
notearXiv:1603.06062 [physics.atom-ph].
[Kozai(1965)]Kozai:1965
authorY. Kozai,
journalPub. Astron. Soc. Japan p. pages385
(year1965).
[Fock(1959)]Fock-book:1959
authorV. A. Fock,
titleThe Theory of Space, Time and Gravitation
(publisherFizmatgiz, addressMoscow (in Russian),
year1959), note[English translation, Pergamon Press
Ltd., Oxford (1964)].
[Sazhin(1998)]Sazhin:1998
authorM. V. Sazhin,
journalJ. Exp. Theor. Phys. volume86,
pages220 (year1998).
[Kopeikin(2009)]Kopeikin:2009
authorS. M. Kopeikin,
journalMon. Not. R. Astron. Soc. volume399,
pages1539 (year2009).
[Turyshev and Toth(2017)]Turyshev-Toth:2017
authorS. G. Turyshev
and authorV. T.
Toth, journalPhys. Rev. D
volume96, pages024008
(year2017), arXiv:1704.06824 [gr-qc].
[Turyshev and
Toth(2021)]Turyshev-Toth:2021-multipoles
authorS. G. Turyshev
and authorV. T.
Toth, journalPhys. Rev. D
volume103, pages064076
(year2021), notearXiv:2102.03891 [gr-qc].
[Thorne(1980)]Thorne:1980
authorK. S. Thorne,
journalRev. Mod. Phys. volume52,
pages299 (year1980).
[Blanchet and Damour(1986)]Blanchet-Damour:1986
authorL. Blanchet and
authorT. Damour,
journalPhilos. Trans. R. Soc. London Ser. A
volume320, pages379 (year1986).
[Blanchet and Damour(1989)]Blanchet-Damour:1989
authorL. Blanchet and
authorT. Damour,
journalAnn. Inst. Henri Poincaré volume50,
pages377 (year1989).
[Kopeikin(1997)]Kopeikin:1997
authorS. M. Kopeikin,
journalJ. Math. Phys. volume38,
pages2587 (year1997).
[Poisson and Will(2014)]Poisson-Will:2014
authorE. Poisson and
authorC. M. Will,
titleGravity: Newtonian, Post-Newtonian, Relativistic
(publisherCambridge University Press, year2014).
[Soffel and Han(2019)]Soffel-Han:2019
authorM. H. Soffel and
authorW.-B. Han,
titleApplied General Relativity: Theory and Applications in
Astronomy, Celestial Mechanics and Metrology (publisherSpringer,
Cham, Switzerland, year2019).
[Mathis and Le
Poncin-Lafitte(2007)]Mathis-LePoncinLafitte:2007
authorS. Mathis and
authorC. Le Poncin-Lafitte,
journalAstron. & Astrophys. volume497,
pages889 (year2007).
[Schmidt(1899)]Schmidt1899
authorA. Schmidt,
journalZeitschrift für Mathematik und Physik
volume44, pages327 (year1899).
[Klioner and
Kopeikin(1992)]Klioner-Kopeikin:1992
authorS. A. Klioner
and authorS. M.
Kopeikin, journalAstron. J.
volume104, pages897 (year1992).
[Zschocke and
Klioner(2010)]Zschocke-Klioner:2010
authorS. Zschocke and
authorS. A. Klioner,
journalCQG volume28, pages015009
(year2010).
[Blanchet(2002)]Blanchet:2002
authorL. Blanchet,
journalLiving Rev Relativ. volume5,
pages3 (year2002).
[Svehla(2018)]Svehla-book:2018
authorD. Svehla,
titleGeometrical Theory of Satellite Orbits and Gravity
Field (publisherSpringer, addressCham, Switzerland,
year2018).
[Roxburgh(2001)]Roxburgh:2001
authorI. W. Roxburgh,
journalAstron. Astrophys. volume377,
pages688 (year2001).
[Le Poncin-Lafitte and
Teyssandier(2008)]LePoncinLafitte:2007tx
authorC. Le Poncin-Lafitte
and
authorP. Teyssandier,
journalPhys.Rev. volumeD77,
pages044029 (year2008), 0711.4292.
[Linet and Teyssandier(2002)]Linet_2002
authorB. Linet and
authorP. Teyssandier,
journalPhys. Rev. D volume66,
pages024045 (year2002).
§ CORRESPONDENCE BETWEEN THE STF MASS MOMENTS AND SPHERICAL HARMONICS
For practical applications, the potential U(r⃗) is typically expanded in terms of spherical harmonics:
U(r⃗) = GM/r(1+∑_ℓ=2^∞∑_k=0^+ℓ(R/r)^ℓ P_ℓ k(cosθ)(C_ℓ kcos kψ+S_ℓ ksin kψ))+
O(c^-4),
where P_ℓ k are the associated Legendre polynomials <cit.>, while C_ℓ k and S_ℓ k are the normalized spherical harmonic coefficients that characterize nonspherical contributions to the gravitational field.
To derive the relations between the Cartesian and spherical quadrupole (ℓ = 2) moments explicitly, we can express the spherical harmonics in terms of Cartesian coordinates. For that we use (<ref>) and write
U^[2](r⃗) = G/r^3(P_20C_20 + P_21(C_21cosψ + S_21sinψ) + P_22(C_22cos 2ψ + S_22sin 2ψ)).
Using a spherical coordinate system (x = r sinθcosψ, y = r sinθsinψ, z = r cosθ), we have
r^2P_20 = (2z^2 -x^2 -y^2)/2,
r^2P_21cosψ = 3xz,
r^2P_21sinψ = 3yz,
r^2P_22cos 2ψ = 3(x^2 - y^2),
r^2P_22sin 2ψ = 6xy. Substituting these expressions in (<ref>), we get
U^[2](r⃗) = GM/r^5(C_201/2(2z^2 - x^2- y^2) + 3C_21 xz+ 3S_21yz + 3C_22(x^2-y^2)+6S_22 xy).
From (<ref>), we have the same quantity expressed via the components of the STF quadrupole moment T_<ab>:
U^[2](r⃗) = GM 3 T^<ab>/2r^5x^ax^b=
GM 3/2r^5( T_11x^2+2 T_12xy+2 T_13xz+2 T_23yz+ T_22y^2+ T_33z^2).
Equating the terms with the same powers of x,y,z between the from of the potential in terms of spherical harmonics present in (<ref>) and that expressed via the STF mass quadrupole in (<ref>) yields the following relations:
T_11 = (-1/3C_20+2C_22)R^2, T_12=2S_22R^2,
T_22 = (-1/3C_20-2C_22)R^2, T_13=C_21R^2,
T_33 = 2/3 C_20 R^2, T_23=S_21R^2.
Following the same approach, we can establish the corresponding relationships between STF multipole moments at any order ℓ and the appropriate spherical harmonics coefficients, see (<ref>), (<ref>), and the relevant discussion in <cit.>.
§ USEFUL RELATIONS FOR SOME STF ORDERS
We derive several low order terms in (<ref>). First, we recognize that with k⃗ being constant, the two-dimensional vector b⃗ and the one-dimensional quantity τ, from (<ref>)–(<ref>), may be treated as two independent variables, yielding dx^a=db^a+k^adτ and also ∂/∂ x^a=∂/∂ b^a+k^a ∂/∂τ, where differentiation with respect to b⃗ is carried out in two dimensions only, which is indicated by the hatted notation. Then, to compute the needed partial derivatives in (<ref>), with respect to the vector of the impact parameter, ∂̂_a≡∂/∂ b^a≡(∂/∂ b^x,∂/∂ b^y,0) in our chosen Cartesian coordinate system, we may formally write
∂ x^a/∂ x^b= δ^a_b= {∂̂_b+k_b ∂/∂τ}{b^a+k^a τ + O(r_g)}=∂̂_b b^a+k^a k_b+ O(r_g).
By re-arranging the terms in this identity, we obtain the following useful expression (see also <cit.>):
∂̂_b b^a = δ^a_b -k^a k_b.
This result essentially is the projection operator onto the plane perpendicular to k⃗, namely P^ab=δ^ab-k^ak^b; this plane, given either GCRS (<ref>) or light ray (<ref>) parameterizations, is the plane of the impact parameter b⃗ and where b^a is the a-th component of the vector impact parameter.
To evaluate (<ref>), we need to compute the following sets of derivatives:
∂_<a_1... ∂_a_ℓ>ln k(√(b^2+τ^2)+τ)
and ∑_p=1^ℓℓ!/p!(ℓ-p)!k_<a_1...k_a_p∂_a_p+1... ∂_a_ℓ>{∂^p-1/∂τ^p-11/√(b^2+τ^2)}.
The first type of the derivatives needed to compute the terms with ℓ=1,2,3,4 are
∂̂_a ln k(√(b^2+τ^2)+τ) = 1/√(b^2+τ^2)+τb_a/√(b^2+τ^2),
∂̂^2_abln k(√(b^2+τ^2)+τ) = 1/√(b^2+τ^2)+τ1/√(b^2+τ^2){P_ab-1/√(b^2+τ^2)(1/√(b^2+τ^2)+τ+1/√(b^2+τ^2))b_ab_b},
∂̂^3_abcln k(√(b^2+τ^2)+τ) = -P_abb_c+P_acb_b+P_bcb_a/(√(b^2+τ^2)+τ)(b^2+τ^2)/(1/√(b^2+τ^2)+τ+1/√(b^2+τ^2))+
-50pt + b_ab_bb_c/(√(b^2+τ^2)+τ)(b^2+τ^2)^3/2{2/(√(b^2+τ^2)+τ)^2+3/(√(b^2+τ^2)+τ)√(b^2+τ^2)+3/b^2+τ^2},
∂̂^4_abcdln k(√(b^2+τ^2)+τ) = -(P_abP_cd+P_acP_bd+P_adP_bc)/(√(b^2+τ^2)+τ)(b^2+τ^2)/(1/√(b^2+τ^2)+τ+1/√(b^2+τ^2))+
-100pt + (P_abb_cb_d+P_acb_bb_d+P_bcb_ab_d+P_adb_bb_c+P_bdb_ab_c+P_cdb_ab_b)×
-50pt × 1/(√(b^2+τ^2)+τ)(b^2+τ^2)^3/2{2/(√(b^2+τ^2)+τ)^2+3/(√(b^2+τ^2)+τ)√(b^2+τ^2)+3/b^2+τ^2}-
-100pt - b_ab_bb_cb_d/(√(b^2+τ^2)+τ)(b^2+τ^2)^2{6/(√(b^2+τ^2)+τ)^3+12/(√(b^2+τ^2)+τ)^2√(b^2+τ^2)+
20pt + 15/(√(b^2+τ^2)+τ)(b^2+τ^2)+
15/(b^2+τ^2)^3/2}.
We also need the following derivatives for ℓ=2,3,4:
-12pt
∑_p=1^2 2!/p!(2-p)!k_<a_1...k_a_p∂̂_a_p+1... ∂̂_a_2>∂^p-1/∂τ^p-11/√(b^2+τ^2) =
-2k_ab_b+τ k_ak_b/(b^2+τ^2)^3/2,
∑_p=1^3 3!/p!(3-p)!k_<a_1...k_a_p∂̂_a_p+1... ∂̂_a_3>∂^p-1/∂τ^p-11/√(b^2+τ^2) =
-170pt =
3k_a(3b_bb_c/(b^2+τ^2)^5/2-P_bc/(b^2+τ^2)^3/2)+9k_ak_bb_c τ/(b^2+τ^2)^5/2+k_ak_bk_c(3τ^2/(b^2+τ^2)^5/2-1/(b^2+τ^2)^3/2),
∑_p=1^4 4!/p!(4-p)!k_<a_1...k_a_p∂̂_a_p+1... ∂̂_a_4>∂^p-1/∂τ^p-11/√(b^2+τ^2) =
-200pt =
4k_a(3/(b^2+τ^2)^5/2(P_dcb_b+P_bdb_c+P_bcb_d)-15b_bb_cb_d/(b^2+τ^2)^7/2)+18k_ak_b τ(P_cd/(b^2+τ^2)^5/2 -5b_cb_d/(b^2+τ^2)^7/2)+
-170pt +
4k_ak_bk_c(3b_d/(b^2+τ^2)^5/2-15τ^2 b_d/(b^2+τ^2)^7/2)+
k_ak_bk_ck_d(9τ/(b^2+τ^2)^5/2-15τ^3/(b^2+τ^2)^7/2).
Clearly, the same expressions may be used to describe the terms that depend on τ_0.
§ GRAVITATIONAL PHASE DELAY FOR AN AXISYMMETRIC BODY
In the case of an axisymmetric body (i.e., the Sun), its external gravitational potential is reduced to the k=0 zonal harmonics, where we keep on the the terms of J_ℓ=-C_ℓ 0 with all other terms in the expression for the potential (<ref>) vanish, i.e., C_ℓ k=S_ℓ k=0. As a result, the gravitational potential of an axisymmetric body may be expressed in terms of the usual dimensionless multipole moments J_ℓ (see discussion in <cit.>):
U(x⃗) = GM/r{1-∑_ℓ=2^∞ J_ℓ(R/r)^ℓ P_ℓ(k⃗_3·x⃗/r)}+
O(c^-4),
where k⃗_3 denotes the unit vector along the x^3-axis, P_ℓ are the Legendre polynomials. Furthermore, in the case of an axisymmetric and rotating body with “north-south symmetry”, the expression (<ref>) contains only the even moments or ℓ=2,4,6,8... <cit.>. Below, we will not impose the “north-south symmetry” restriction and will keep the terms of all the orders ℓ.
Following <cit.>, we take into account the identity
∂^ℓ/∂ z^ℓ(1/r) = (-1)^ℓℓ!/r^1+ℓ P_ℓ(k⃗_3·x⃗/r), z=x^3,
and present U as the following expansion in a series of derivatives of 1/r:
U(x⃗) = GM{1/r-∑_ℓ=2^∞(-1)^ℓ/ℓ! J_ℓ R^ℓ∂^ℓ/∂ z^ℓ(1/r)}+
O(c^-4).
As we shall see below, this form is much more convenient for the computation of integrals involving U.
Here we develop an expression for the eikonal phase in the case of an axisymmetric body, with its potential given by (<ref>).
In this case, the decomposition of the post-Newtonian potential takes the from
2U/c^2 =
r_g{1/r-∑_ℓ=2^∞(-1)^ℓ/ℓ! J_ℓ R^ℓ∂^ℓ/∂ s^ℓ(1/r)}+ O(r_g^2).
Following the approach demonstrated in <cit.> (see Appendix therein), we compute the leading term of this expansion. For that, we define the vector s⃗ to be a unit vector in the direction of the axis of rotation. Remembering that r=√(b^2+τ^2)+ O(r_g) from (<ref>), we evaluate directional derivatives ∂/∂ s along s⃗= k⃗_3, which have the form
∂/∂ s=(s⃗·∇⃗)=(s⃗·∂/∂r⃗).
This relation allows us to compute the relevant partial derivatives for the leading terms in (<ref>):
∂/∂ s 1/r = -(s⃗·r⃗)/r^3, ∂^2/∂ s^2 1/r=3(s⃗·r⃗)^2/r^5-1/r^3,
∂^3/∂ s^3 1/r=-3(5(s⃗·r⃗)^3/r^7-3(s⃗·r⃗)/r^5),
∂^4/∂ s^4 1/r = 3(35(s⃗·r⃗)^4/r^9-30(s⃗·r⃗)^2/r^7+3/r^5).
Using these expressions in (<ref>) and defining r_g=2G M_⊕/c^2, we have
2U_ E(b⃗,τ)/c^2 =
r_g {1/r-{J_2R^2_⊕1/2(3(s⃗·r⃗)^2/r^5-1/r^3)+
J_3R^3_⊕1/2(5(s⃗·r⃗)^3/r^7-3(s⃗·r⃗)/r^5)+
+
J_4R^4_⊕1/8(35(s⃗·r⃗)^4/r^9-30(s⃗·r⃗)^2/r^7+3/r^5)+
∑_ℓ=5^∞(-1)^ℓ/ℓ! J_ℓ R^ℓ_⊕∂^ℓ/∂ s^ℓ(1/r)}}.
This expression represents the gravitational potential in terms of the zonal harmonics projected on the trajectory of the photon propagation. We substitute (<ref>) into expression (<ref>) and integrate it. As a result, we have the following expression for the gravitational phase shift induced by the lowest order gravitational multipoles, i.e., ℓ=0, 2,3,4:
φ_G^ E(r⃗,r⃗_0) =
-k∫^τ_τ_02/c^2U_ E(τ')dτ' = -
kr_g {ln[r+(k⃗·r⃗)/r_0+(k⃗·r⃗_0)]+
-50pt + 1/2J_2R_⊕^2 {(2(s⃗·m⃗)^2+(s⃗·k⃗)^2-1)
(1/r(r+(k⃗·r⃗))-1/b^2)+
((s⃗·k⃗)^2-(s⃗·m⃗)^2)(k⃗·r⃗)/r^3+
2(s⃗·m⃗) (s⃗·k⃗)b/r^3}|^r_r_0-
-50pt - 1/3J_3R_⊕^3 {
(s⃗·m⃗)(4(s⃗·m⃗)^2+3(s⃗·k⃗)^2-3)
(1/b^3-1/br(r+(k⃗·r⃗))+1/2b(k⃗·r⃗)/r^3)+
-10pt + 3/2(s⃗·m⃗)
((s⃗·m⃗)^2-3(s⃗·k⃗)^2)b(k⃗·r⃗)/r^5+
3/2(s⃗·k⃗)((s⃗·k⃗)^2-3(s⃗·m⃗)^2)b^2/r^5+1/2(s⃗·k⃗)(3-5(s⃗·k⃗)^2)1/r^3}|^r_r_0
-
-50pt - 1/4J_4R_⊕^4 {(8(s⃗·m⃗)^2((s⃗·m⃗)^2+(s⃗·k⃗)^2-1)+((s⃗·k⃗)^2-1)
^2)(1/b^4-1/b^2r(r+(k⃗·r⃗))+1/2b^2(k⃗·r⃗)/r^3)+
-10pt + (3(s⃗·m⃗)^2
((s⃗·m⃗)^2+(s⃗·k⃗)^2-1)+(s⃗·k⃗)^2
(3-4(s⃗·k⃗)^2))(k⃗·r⃗)/r^5+
-10pt + 5/2(((s⃗·m⃗)^2-(s⃗·k⃗)^2)^2-4(s⃗·m⃗)^2(s⃗·k⃗)^2)b^2(k⃗·r⃗)/r^7+
-10pt +
10(s⃗·m⃗)(s⃗·k⃗)((s⃗·k⃗)^2-(s⃗·m⃗)^2)b^3/r^7+2(s⃗·m⃗)(s⃗·k⃗)(3-7(s⃗·k⃗)^2)b/r^5}|^r_r_0
+ O(J_5) }.
Note that a similar result for the quadrupole J_2 term was obtained in <cit.>. Expression (<ref>) extends all the previous computations to the higher order terms including J_4. In fact, this result is new. It generalizes a similar result obtained in <cit.> (see Appendix therein) that was derived for all orders of the zonal harmonics, ℓ, in the case when the transmitter and receiver are a very larger distance from the gravitating body, b≪ r.
|
http://arxiv.org/abs/2303.09401v1
|
20230312171425
|
Heterogeneous Unlabeled and Labeled RFS Filter Fusion for Scalable Multisensor Multitarget Tracking
|
[
"Tiancheng Li"
] |
eess.SY
|
[
"eess.SY",
"cs.SY",
"eess.SP"
] |
theoremTheorem
lemmaLemma
corollaryCorollary
definitionDefinition
remarkRemark
|
http://arxiv.org/abs/2303.06853v1
|
20230313044906
|
Representation Learning for Stack Overflow Posts: How Far are We?
|
[
"Junda He",
"Zhou Xin",
"Bowen Xu",
"Ting Zhang",
"Kisub Kim",
"Zhou Yang",
"Ferdian Thung",
"Ivana Irsan",
"David Lo"
] |
cs.SE
|
[
"cs.SE"
] |
[email protected]
Singapore Management University
Singapore
Singapore
[email protected]
Singapore Management University
Singapore
Singapore
[email protected]
Singapore Management University
Singapore
Singapore
[email protected]
Singapore Management University
Singapore
Singapore
[email protected]
Singapore Management University
Singapore
Singapore
[email protected]
Singapore Management University
Singapore
Singapore
[email protected]
Singapore Management University
Singapore
Singapore
[email protected]
Singapore Management University
Singapore
Singapore
[email protected]
Singapore Management University
Singapore
Singapore
<ccs2012>
<concept>
<concept_id>10010147.10010178.10010187</concept_id>
<concept_desc>Computing methodologies Knowledge representation and reasoning</concept_desc>
<concept_significance>300</concept_significance>
</concept>
<concept>
<concept_id>10011007.10011074.10011099.10011693</concept_id>
<concept_desc>Software and its engineering Empirical software validation</concept_desc>
<concept_significance>500</concept_significance>
</concept>
</ccs2012>
[300]Computing methodologies Knowledge representation and reasoning
[500]Software and its engineering Empirical software validation
The tremendous success of Stack Overflow has accumulated an extensive corpus of software engineering knowledge, thus motivating researchers to propose various solutions for analyzing its content.
The performance of such solutions hinges significantly on the selection of representation model for Stack Overflow posts.
As the volume of literature on Stack Overflow continues to burgeon, it highlights the need for a powerful Stack Overflow post representation model and drives researchers' interest in developing specialized representation models that can adeptly capture the intricacies of Stack Overflow posts.
The state-of-the-art (SOTA) Stack Overflow post representation models are Post2Vec and BERTOverflow, which are built upon trendy neural networks such as convolutional neural network (CNN) and Transformer architecture (e.g., BERT).
Despite their promising results, these representation methods have not been evaluated in the same experimental setting. To fill the research gap, we first empirically compare the performance of the representation models designed specifically for Stack Overflow posts (Post2Vec and BERTOverflow) in a wide range of related tasks, i.e., tag recommendation, relatedness prediction, and API recommendation.
The results show that the Post2Vec cannot further improve each state-of-the-art technique of downstream tasks, and BERTOverflow shows surprisingly poor effectiveness.
To find more suitable representation models for the posts, we further explore a diverse set of BERT-based models, including (1) general domain language models (RoBERTa and Longformer) and (2) language models built with software engineering-related textual artifacts (CodeBERT, GraphCodeBERT, and seBERT).
This exploration shows that CodeBERT and RoBERTa are generally the most suitable for representing Stack Overflow posts.
However, it also illustrates the “No Silver Bullet” concept, as none of the models consistently wins against all the others.
Inspired by the findings, we propose SOBERT, which employs a simple-yet-effective strategy to improve the best-performing model by continuing the pre-training phase with the textual artifact from Stack Overflow.
The overall experimental results demonstrate that SOBERT can consistently outperform the considered models and increase the state-of-the-art performance by a significant margin for all the downstream tasks.
Representation Learning for Stack Overflow Posts: How Far are We?
David Lo
Received: date / Accepted: date
=================================================================
§ INTRODUCTION
Serving as the most popular software question and answer (SQA) forum, (SO) has dramatically influenced modern software development practice. As of March 2023, the forum has accumulated more than 24 million questions and 35 million answers[<https://stackexchange.com/sites?view=list#traffic>]. is broadly recognized as an invaluable knowledge base and supplemental resource for the software engineering (SE) domain <cit.>, which triggered the increased interest of researchers and software developers in a wide range of post-related tasks, for example, recommendation of post tags (aka. tag recommendation) <cit.>, recommendation of APIs according to a natural language query (aka. API recommendation) <cit.>, and the identification of related posts (aka. relatedness prediction) <cit.>.
An essential step in yielding promising results for these -related tasks is to obtain suitable representations of the posts. A beneficial representation model can capture the semantic concept of the posts and reveal more explanatory features from the hidden dimensions. As the volume of SE literature on solving -related tasks <cit.> cotinues to burgeon, it has underscored the demand for a quality representation.
Over the years, numerous representation models have been specifically proposed for modeling posts.
Xu et al. proposed Post2Vec <cit.>, a CNN-based <cit.> representation model that leverages the tags of a post to guide the learning process and models the post as the combination of three complementary components (i.e., title, description, and code snippet). Their experimental results demonstrate that it can substantially boost the performance for a wide range of posts-related tasks <cit.>. Tabassum et al. <cit.> leveraged the more advanced BERT-based architecture and pre-trained BERTOverflow based on 152 million sentences from . Results showed that the embedding generated by BERTOverflow led to a significant improvement over other off-the-shelf models (e.g., ELMo <cit.> and BERT <cit.>) in the software named entity recognition (NER) task.
Although these existing -specific methods have been proven to be beneficial, the effectiveness of Post2Vec is only evaluated
on limited solutions (i.e., Support Vector Machine <cit.> and Random Forest <cit.>) and BERTOverflow only experimented for the NER task. These motivate us to further study the performance of existing -specific representation models on a diverse set of tasks. Unexpectedly, we found that both Post2Vec and BERTOverflow perform poorly. Such findings motivate us to explore the effectiveness of a larger array of representation techniques in modeling posts.
In addition to the aforementioned -specific representation models, we further consider five BERT-based language models which could be potentially suitable for post representation learning. They are CodeBERT <cit.>, GraphCodeBERT <cit.>, seBERT <cit.>, RoBERTa <cit.>, and Longformer <cit.>. CodeBERT is a SE knowledge-enriched BERT-based language model that utilizes CodeSearchNet <cit.> dataset at the pre-training stage. GraphCodeBERT further incorporates data flow graphs and structure-aware pre-training (i.e., edge prediction and node alignment) and it outperforms CodeBERT in various code-related tasks. Different from the previous models which are based on a BERT_Base architecture, seBERT is a BERT_Large model and is pre-trained with data from GitHub commit messages and issues, Jira issues, and posts.
CodeBERT, GraphCodeBERT, and seBERT are considered to be better at capturing the semantics of technical jargon of the SE domain. Finally, we also include models from the general domain as they are usually trained with a more diverse amount of data than domain-specific models. RoBERTa is one of the most popular BERT-based language models. It is trained with larger batch size and learning rates compared with the original BERT. Longformer is also considered as it overcomes the input length limit of conventional BERT-based language models. While BERT-based language models could maximumly accept an input length of 512 tokens, more than 50% of the posts have the surpass 512 limit <cit.>. In contrast, Longformer could accept a maximum of 4,096 tokens as its input.
We evaluate the performance of the aforementioned representation models on multiple -related downstream tasks (i.e., tag recommendation, API recommendation, and relatedness prediction). Furthermore, we build SOBERT, a stronger BERT-based language model for modeling posts.
Our experimental results reveal several interesting findings:
* Existing post representation techniques fail to improve the SOTA performance of considered tasks. Xu et al. demonstrated that the addition of the feature vectors generated by Post2Vec is beneficial for improving the post representation for traditional machine learning techniques. However, we discover that appending the feature vectors from Post2Vec <cit.> does not derive a beneficial effect on considered deep neural networks.
Furthermore, we reveal that the embedding generated by BERTOverflow could only achieve reasonable performance in the API recommendation task and give surprisingly poor performance in the tag recommendation task.
* Among all the considered models, none of them can always perform the best. According to our experiment results, although the newly considered models can outperform the SOTA approaches, none of them can always perform the best. It motivates us to build an extensive model.
Overall, CodeBERT produces the most promising representation among the considered models, and Longformer fails to beat conventional BERT-based language models, although it is expected to be capable of accepting a longer input.
* Continued pre-training based on textual artifact develops a consistently better model. We propose SOBERT by further pre-training with data. The overall results show that SOBERT consistently boosts the performance in all three considered tasks, implying a better representation.
Overall, we summarize the contributions of our empirical study as follows:
* We comprehensively evaluate the effectiveness of seven representation models for posts in three downstream tasks.
* We propose SOBERT by pre-training based on 20 million posts from and show that SOBERT consistently outperforms other representation models in multiple downstream tasks.
* We derive several insightful lessons from the experimental results to the software engineering community.
The rest of the paper is organized as follows. Section <ref> categorizes representation learning models into three groups and briefly describes them.
We formulate the downstream tasks (i.e., tag recommendation, API recommendation, relatedness prediction) and their corresponding state-of-the-art method in Section <ref>.
Section <ref> introduces our research questions and the experiment settings.
In Section <ref>, we answer the research question and report the experiment results.
Section <ref> further analyzes the result and elaborates the insights with evidence.
Section <ref> describes related works, and Section <ref> summarizes this study.
§ REPRESENTATION LEARNING MODELS
In this section, we summarize the considered representation models for this paper. We explore a wide range of techniques across the spectrum of representing posts, including two Transformer-based Pre-trained Models (PTM) from the general domain (RoBERTa <cit.> and Longformer <cit.>), three SE-domain specific PTMs (CodeBERT <cit.>, GraphCodeBERT <cit.>, and seBERT <cit.>) and two -specific post representation models (BERTOverflow <cit.> and Post2Vec <cit.>).
§.§ BERT-based Language Models
BERT (Bidirectional Encoder Representations from Transformers) <cit.> based language models have revolutionized the representation learning of natural language <cit.> by achieving phenomenal performance in a wide range of natural language processing (NLP) tasks, such as sentiment analysis <cit.>, POS tagging <cit.>, question answering <cit.>. BERT-based language models inherit the Transformer <cit.> architecture, whose self-attention mechanism can learn a bidirectional contextual representation of text.
These models usually perform the Masked Language Modeling (MLM) task in the pre-training phase. It initially corrupts the input data by randomly masking 15% of the tokens, and then it teaches the model to reconstruct the original data by predicting the masked words. BERT-based models are extensively pre-trained on large-scale datasets, which learn a meaningful representation that is reusable for various tasks, thus eliminating the process of training language models from scratch and saving a drastic amount of time and resources.
§.§ Existing Models for Posts
BERTOverflow <cit.>
keeps the original BERT_base architecture, and it leverages 152 million sentences and 2.3 billion tokens from to pre-train -specific word embeddings. The authors have leveraged the embedding generated by BERTOverflow to implement a software-related named entity recognizer (SoftNER). The performance of SoftNER is experimented with the name entity recognition (NER) task for the software engineering domain, focusing on identifying code tokens or programming-related named entities that appear within SQA sites like . The results show that BERTOverflow outperforms all other models in the proposed task.
<cit.>
is the latest approach proposed specifically for post representation learning <cit.>. Unlike the existing models, is designed with a triplet architecture. leverages CNNs as feature extractors for each post to encode three components (i.e., title, text, and code snippets) separately from the post.
The corresponding three output feature vectors are then fed to a feature fusion layer to produce the representation of the post.
In the end, uses tag information of the post, which is considered as the post's general semantic meaning to supervise the representation learning process.
The representation learned by is then leveraged by enhancing the feature vectors in -related downstream tasks (e.g., relatedness prediction and API recommendation).
For each downstream task, in <cit.>, the vector representation learned by is combined with the feature vector produced by the corresponding state-of-the-art approach to form a new feature vector.
Finally, the new feature vector is used to boost the performance of the corresponding model for the task.
Following the experiment settings of Xu et al., we use Post2Vec as a complementary feature vector to the state-of-the-art approach in this paper. We concatenate the post representation generated by Post2Vec to the original feature vector of the state-of-the-art approach. We then leverage the concatenated feature vector in further training.
§.§ Models from General Domain
RoBERTa <cit.>
is a replication study on the pre-training objectives, along with the impact of several key hyper-parameters of BERT <cit.>. They then proposed their improved model on BERT, namely RoBERTa. In comparison with BERT, RoBERTa has made several modifications to the pre-training stage, including: (1) training with larger batch size, more data, and longer training time; (2) abandoning the next sentence prediction (NSP) task of BERT and showed that removal of NSP slightly improves the model efficiency; (3) training with longer sequences; (4) masking the training data dynamically rather than statically.
Pre-trained models like BERT <cit.> and RoBERTa <cit.> only accept a maximum input of 512 tokens. However, according to the statistics conducted by He et al. <cit.>, more than half of the questions have more tokens than the given 512 limit. A simple workaround is to truncate the given input sequence to the acceptable length restriction. However, it increases the risk of losing vital information. The self-attention mechanism suffers from the O(n^2) quadratic computational complexity problem, which restricts the ability of Transformer-based models to model long sequences.
Longformer <cit.>
aims to alleviate the limitation in processing long sequences. It leverages a combination of sliding window attention and global attention mechanism such that the computational memory consumption scales linearly as the sequence becomes longer. In contrast to models like RoBERTa and CodeBERT, which could only accept a maximum of 512 tokens as input, Longformer supports sequences of length up to 4,096. Similar to CNN <cit.>, Longformer lets each input token only attends to surrounding neighbors that are within a fixed window size. Denoting the window size as w, each token could only attend to 1/2w tokens on both sides, thus decreasing the computation complexity to O(n × w).
However, the sliding window may compromise the performance as it cannot capture the whole context. To compensate for the side-effect, global tokens are selected. Such tokens are implemented with global attention, which attends to all other tokens, and other tokens also attend to the global tokens. As previous work showed that more than 50% of the posts exceed the size limit of conventional BERT-based models (512), it motivates us to explore whether Longformer is better at representing posts.
§.§ Models from SE domain
CodeBERT <cit.>
The strong versatility and capability of Transformer-based representational models drive researchers' interest in adopting them to the SE domain. CodeBERT <cit.> is a SE knowledge-enriched bi-modal pre-trained model, which is capable of modeling both natural languages (NL) and programming languages (PL). CodeBERT inherits the architecture of BERT <cit.>, and it continues pre-training based on the checkpoint of RoBERTa <cit.> with the NL-PL data pairs obtained from the CodeSearchNet dataset <cit.>.
It has two pre-training objectives: Masked Language Modeling (MLM) and Replaced Token Detection (RTD). The eventual loss function for CodeBERT at the pre-training stage is the combination of both MLM and RTD objectives, where θ denotes the model parameters:
θmini( ℒ_RTD(θ)+ℒ_MLM(θ))
The CodeBERT model has shown great effectiveness in a diverse range of SE domain-specific activities, for example, code search <cit.>, traceability prediction <cit.>, and code translation <cit.>.
GraphCodeBERT <cit.>
incorporates a hybrid representation in source code modeling. Apart from addressing the pre-training process over NL and PL, GraphCodeBERT utilizes the data flow graph of source code as additional inputs and considers two structure-aware pre-training tasks (i.e., Edge Prediction and Node Alignment) aside from the MLM prediction task. GraphCodeBERT is evaluated in code search <cit.>, clone detection <cit.>, code translation <cit.>, and code refinement <cit.>,respectively. It outperforms CodeBERT and all the other baselines, including RoBERTa (code version) <cit.>, Transformer <cit.>, LSTM <cit.>, under their experimental setting.
seBERT <cit.> aims to advance the previous PTMs in the SE context with a larger model architecture and more diverse pre-training data. The authors pre-trained seBERT with the BERT_large architecture, i.e., with 24 layers, a hidden layer size of 1024, and 16 self-attention heads, with a total of 340 million parameters. seBERT is pre-trained with more than 119GB of data from four data sources, i.e., posts, Github issues, Jira issues, and Github commit messages. The model's effectiveness is verified in three classification tasks, i.e., issue type prediction, commit intent prediction, and sentiment mining. Results showed that seBERT is significantly better than BERToverflow in these tasks.
§ DOWNSTREAM TASKS
In this section, we formulate the target problems that are used to measure the effectiveness of the representation models and then describe the corresponding state-of-the-art solution. We select multiple -related downstream tasks, which have been popular research topics for posts.
To be more specific, we consider: Tag Recommendation <cit.>, API Recommendation <cit.> and Relatedness Prediction <cit.>, covering a multi-label classification problem, a multi-class classification problem, and a ranking problem. All selected tasks operate on the abstraction of a post, which could be benefited from a high-quality post representation.
§.§ Tag Recommendation
The user-annotated tags of a post serve as helpful metadata and have a critical role in organizing the contents of posts across different topics. Suitable tags precisely summarize the message of a post, while redundant tags and synonym tags make it more difficult in maintaining the content of the site.
A tag recommendation system could effectively simplify the tagging process and minimize the effect of manual errors, therefore, avoiding problems like tag synonyms and tag redundancy.
§.§.§ Task Formulation
We formulate the tag recommendation task as a multi-label classification problem. Given 𝒳 as a corpus of posts, and 𝒴 denotes the total collection of tags, we represent each post as x_i, where 0 ≤ i ≤ |X|, i ∈ℕ and the tag of each post as y_i ⊂𝒴. The goal is to recommend the most relevant set of tags y_i to x_i.
§.§.§ State-of-the-art technique
PTM4Tag <cit.> leverages three pre-trained models to solve the tag recommendation problem. PTM4Tag leverages three pre-trained models, which are responsible for modeling the title, description, and code snippet, independently.
§.§ API Recommendation
Questions related to Application Programming Interfaces (APIs) are one of the most viewed topics on <cit.>. consists of an enormous amount of discussion about API usage. Developers are more intended to search for relevant posts and pick out the APIs that seem useful in the discussions <cit.> rather than checking API documentation, which makes the primary source for building a dataset of the API recommendation task.
The modern software development process heavily relies on third-party APIs, which leads to the research of an automated API recommendation approach that is intended to simplify API search <cit.>.
§.§.§ Task Formulation
We follow the exact task definition as the previous literature <cit.>, with the goal of recommending relevant APIs that answer the question or implement the function for a given NL query.
§.§.§ State-of-the-art technique
Wei et al. <cit.> proposed CLEAR, an automated approach that recommends API by embedding queries and posts with a BERT-based PTM (distilled version of the RoBERTa[<https://huggingface.co/distilroberta-base>]). To be more specific, given a natural language query, CLEAR initially picks a sub-set of candidate posts based on the embedding similarity to reduce the search space. Then, CLEAR ranks the candidate posts and recommends the APIs from the top-ranked posts.
§.§ Relatedness Prediction
The notion of a Knowledge Unit (KU) is defined as a set containing a question along with all its answers <cit.>. To find a comprehensive technical solution for a given problem, developers usually need to summarize the information from multiple related KUs. However, searching for related KUs can be time-consuming as the same question can be rephrased in many different ways. Thus, researchers have proposed several techniques to automate the process of identifying the related KUs <cit.>, which could significantly improve the efficiency of the software development cycle.
§.§.§ Task Formulation
The task is commonly formulated as a multi-class classification problem <cit.>. The relatedness between questions is classified into four classes, from the most relevant to irrelevant, which are:
* Duplicate: The Two KUs correspond to a pair of semantically equivalent questions. The answer of one KU can also be used to answer another KU.
* Direct: One KU is beneficial in answering the question in another KU, for example, by explaining certain concepts and giving examples.
* Indirect: One KU provides relevant information but does not directly answer the questions of another KU.
* Isolated: The two KUs are semantically uncorrelated.
§.§.§ State-of-the-art technique
Recently, Pei et al. introduced ASIM <cit.>, which yielded state-of-the-art performance in the relatedness prediction task. Pei et al. pre-trained word embeddings specialized to model posts with a corpus collected from the data dump. Then ASIM uses BiLSTM <cit.> to extract features from posts and implements the attention mechanism to capture the semantic interaction among the KUs.
§ RESEARCH QUESTIONS AND EXPERIMENTAL SETTINGS
In this section, we first introduce our research questions and then describe the corresponding experiment settings.
§.§ Research Questions
§.§.§ RQ1. How effective are the existing post representation models?
Various methods have been proposed in modeling posts. However, there is still a lack of analysis of the existing -specific representation methods. For instance, Xu et al. <cit.> have demonstrated that Post2Vec is effective in boosting the performance of traditional machine learning algorithms, i.e., support vector machine (SVM) and Random Forest. However, the efficacy of Post2Vec in facilitating deep learning-based models has not yet been investigated. Moreover, Tabassum et al. <cit.> only leveraged the embeddings from BERTOverflow in the software-related NER task, but not for other popular -related tasks. In light of this research gap, we aim to evaluate the current -specific representation methods for popular -related tasks under the same setting for this research question.
§.§.§ RQ2. How effective are the popular BERT-based language models for the targeted downstream tasks?
In addition to the existing representation models, we explore the effectiveness of a wider spectrum of representation models.
BERT-based language models have shown great performance and generalizability in representation learning.
Representations generated by such models have demonstrated promising performance in a broad range of tasks with datasets of varying sizes and origins.
Borrowing the best-performing representation models from various domains and investigating their performance can derive interesting results, as recent literature <cit.> have revealed that they are potentially great candidates for representing posts as well.
This motivates us to employ RoBERTa <cit.> and Longformer <cit.> from the general domain and CodeBERT <cit.>, GraphCodeBERT <cit.>, and seBERT <cit.> from the SE domain.
We set up the exact same experimental settings for each model.
§.§.§ RQ3. Is further pre-training on data helpful in building a better model?
Further pre-trained models with domain-specific corpus have been common practice in the NLP domain, however, their effectiveness is not verified for representing posts.
In this RQ, we introduce SOBERT, which is obtained by continuing the pre-training process on CodeBERT with data, and we aim to investigate whether further pre-training with data improves the performance.
§.§ Experimental Settings
§.§.§ Tag Recommendation
§.§.§ Dataset
The dataset used by He et al. <cit.> in the training of PTM4Tag only includes the posts dated before September 5, 2018.
To address this limitation, we use the data dump released in August of 2022 to construct a new dataset for our experiment. Idealy, a tag recommendation approach should only learn from high-quality questions. Therefore, we remove the low-quality questions when constructing the dataset.
According to the classificaition of question quality defined by Ponzanelli et al. <cit.>, we first filter out the questions which do not have an accepted answer and further removed the questions with a score of less than 10.
Moreover, we remove the rare tags and rare posts. Previous literature in tag recommendation <cit.> has defined a tag as rare if it occurs less than 50 times within the dataset, and a post is considered rare if all of its tags are rare tags. The usage of rare tags is discouraged since it implies the unawareness of the tag among developers. We follow the same definition as the previous literature and set the frequency threshold for rare tags as 50.
In the end, we obtain a dataset of 527,717 posts and 3,207 tags. We split the dataset into a training set, a validation set, and a test set according to the 8:1:1 ratio, which corresponds to 422,173, 52,772, and 52,772 posts, respectively.
§.§.§ Evaluation Metrics
We report the performance for this task using Precision@k, Recall@k, and F1-score@k, where k indicates the top-k recommendations. Such metrics are extensively used in previous works <cit.>, and we calculate the average score for each of them. Mathematically speaking, the evaluation metrics are computed as follows:
Precision@k =
|Tag_True∩Tag_Predict|/k
Recall@k_i = | Tag_True∩Tag_Predict/k| if | Tag_True| >
k
| Tag_True∩Tag_Predict | /|Tag_True| if |Tag_True| ≤ k
F1-score@k = 2 × Precision@k × Recall@k / Precision@k + Recall@k
In the above formulas, Tag_True refers to the ground truth tags and Tag_Predict refers to the predicted tags.
Notice that the above formula of Recall@k is determined by conditions since Recall@k naturally disfavors small k. The revisited Recall@k has been widely adopted in previous experiments of tag recommendation <cit.>. Since posts cannot have more than 5 tags, we report the results by setting the k as 1,3,and 5.
§.§.§ Implementation Details
For Longformer, we set the maximum accepted input sequence as 1,024, and for other BERT-based language models (i.e., RoBERTa, CodeBERT, BERTOverflow, and SOBERT) the maximum input sequence is set as 512.
We set the learning rate as 5e-5, batch size as 512, epoch number as 30, and use the Adam optimizer to update the parameters. We save the model at the end of each epoch and select the model with the smallest validation loss to run the evaluation.
§.§.§ API Recommendation
§.§.§ Dataset
We reuse the BIKER dataset leveraged by Wei et al. <cit.>. The training dataset contains 33K questions with corresponding relevant APIs in the accepted answers.
The test dataset contains 413 manually labeled questions from , which are looking for API to solve programming problems, and labeled the ground-truth API for these questions based on their accepted answers. The dataset is constructed by selecting posts satisfying three criteria: (1) the question has a positive score, (2) at least one answer to the question contains API entities (3) the answer has a positive score.
§.§.§ Evaluation Metrics
We use the same evaluation metrics as previous literature <cit.> for the API recommendation task. The metrics are: Mean Reciprocal Rank (MRR), Mean Average Precision (MAP), Precision@k and Recall@k.
Different from tag recommendation, the API recommendation task is not a multi-label classification task, and the Recall@k metrics used in this task follow the conventional definition, which is:
Recall@k = |API_True∩API_Predict|/|API_True|
To be consistent with Wei et al. <cit.>, we use k ∈1,3,5.
§.§.§ Implementation Details
CLEAR shows state-of-the-art performance in the API recommendation task by leveraging BERT sentence embedding and contrastive learning. The original architecture of CLEAR is implemented based on DistilRoBERTa [<https://huggingface.co/distilroberta-base>] during the training process.
In this study, we also explore the effectiveness of other representation methods by replacing the embedding of DistilRoBERTa in CLEAR.
For Post2Vec, we concatenate the post representation from Post2Vec to the original implementation of CLEAR.
For this task, we set the batch size as 256, and the epoch number as 30. Same to the description in Sec <ref>, we select the model with the smallest validation loss to run the test set.
§.§.§ Relatedness Prediction
§.§.§ Dataset
The experiments are conducted based on the KUs dataset provided by Shirani et al. <cit.>. This dataset contains 347,372 pairs of KUs. To ensure a fair comparison with the prior work <cit.>, we use the same data for training, validation, and testing, containing
208,423, 347,37, and 104,211 pairs of KU, respectively.
§.§.§ Evaluation Metrics
Following prior work <cit.>,
we adopt the micro-averaging method to calculate Micro-precision, Micro-recall, and Micro-F1 as evaluation metrics.
§.§.§ Implementation Details
We concatenate a pair of posts as the input to train a multi-class classifier. We fine-tuned Longformer on a sequence length of 1,024 and fine-tuned other pre-trained models on a sequence length of 512.
For all experiments, we set the batch size as 32 and the epoch number as 5. We select the model with the smallest validation loss to run the evaluation.
§ EXPERIMENTAL RESULTS
This section describes the experiment results and answers our research questions. The experimental results are summarized in Table <ref>, <ref>, and <ref> respectively.
§.§ RQ1: How effective are the existing post representation models?
The experimental results for the tag recommendation task are summarized in Table <ref>. PTM4Tag originally achieves a performance of 0.417, 0.805, and 0.526 in terms of Precision@5, Recall@5, and F1-score@5. However, the extra inclusion of Post2Vec lowers the performance to 0.416, 0.804, and 0.525, respectively. BERTOverflow struggles in the task with scores of 0.083, 0.163, and 0.105.
For API recommendation (Table <ref>), combining Post2Vec with the state-of-the-art approach CLEAR also fails to boost the performance. CLEAR itself could obtain a score of 0.739 and 0.753 in MRR and MAP, while the performance drop to 0.735 and 0.745 when Post2Vec is added. BERTOverflow obtained a performance of 0.753 and 0.778.
In the relatedness prediction task (Table <ref>), the integration of Post2Vec with ASIM slightly lowers the performance from 0.785 to 0.768 in F1-score. BERTOverflow fails to beat ASIM with an F1-score of 0.697.
Overall, Post2Vec can not improve the performance of the state-of-the-art solutions in our downstream tasks. BERTOverflow performs poorly in classification tasks and only achieves comparable performance with the state-of-the-art solution in API recommendation.
Answer to RQ1: The existing representation methods fail to improve state-of-the-art performance from the three targeted downstream tasks.
§.§ RQ2: How effective are the popular BERT-based language models for the
targeted downstream tasks?
For tag recommendation (Table <ref>), the F1-score@5 for state-of-the-art approach PTM4Tag is 0.526. CodeBERT and RoBERTa can both achieve a higher F1-score@5 of 0.527. For Longformer and GraphCodeBERT, their F1-score@5 are 0.502 and 0.517, respectively. Like BERTOverflow, seBERT struggles in this task with an F1-score@5 of 0.105.
Table <ref> shows that CLEAR is no longer the best-performing method in API recommendation. Replacing the embedding of Distilled RoBERTa in the original design of CLEAR with other BERT-based language models increases the performance. In terms of MRR and MAP, seBERT scores 0.754 and 0.777. In contrast, CodeBERT, RoBERTa, GraphCodeBERT, and Longformer are all able to achieve higher scores than 0.767 and 0.782. In particular, GraphCodeBERT boosts the performance of CLEAR by 3.8% and 5.0% in terms of MRR and MAP. For Precision@1,3,5 and Recall@1,3,5, GraphCodeBERT outperforms CLEAR by 6.7% 22.0%.
From Table <ref>, we observe that ASIM, the state-of-the-art technique in relatedness prediction, is outperformed by other BERT-based language models. While ASIM achieves a score of 0.785 in F1-score, CodeBERT drives forward the state-of-the-art performance by 2.3% with an F1-score of 0.803. Moreover, RoBERTa, GraphCodeBERT, Longformer, and seBERT have an F1-score of 0.787, 0.801, 0.786, and 0.799.
Overall, models like CodeBERT can consistently give promising representations in all three tasks, proving its generalizability and effectiveness in a wide range of SE-related tasks.
Answer to RQ2: Representations generated by CodeBERT and RoBERTa consistently outperform each state-of-the-art technique from the targeted downstream tasks.
However, none of the models can always be the best performer. Overall, CodeBERT is the most promising representation model.
§.§ RQ3: Is further pre-training on data helpful in building a better model?
Our experimental results show that there is no "one-size-fits-all" model in representing posts, which could consistently outperform others in the considered tasks. Such a phenomenon delivers an intuition that there is an improvement opportunity in the representation technique for .
Based on such intuition and common practice that a second phase of in-domain pre-training leads to performance gains <cit.>, we conduct additional pre-training for a BERT-based model (i.e., CodeBERT) with the dataset. We name it SOBERT.
Pre-training Details We have leveraged the dump dated August 2022 (which includes posts from July 2008 to August 2022) and selected 22 million question posts as the training corpus.
The raw dataset has a size of approximately 67G. Many previous works have removed the code snippets of a post during pre-processing stage <cit.>.
According to the statistics conducted by Xu et al. <cit.>, more than 70% of the contains at least one code snippet. As a result, the removal of code snippets would result in losing a significant of information, and they should be considered to learn an effective post representation. As the code snippets within the body of a post are enclosed in HTML tags pre code and \code\pre, we cleaned the redundant HTML tags with regular expression
pre code([\ s\ S]*?)\\code\\pre.
We have initialized SOBERT based on the checkpoint of the CodeBERT model and pre-trained SOBERT using the MLM objective with a standard masking rate of 15%. The batch size is set as 256, and the learning rate is 1e-4. The training process takes 100 hours for eight Nvidia V100 GPUs with 16 GB of memory to complete. The detailed code used is included in the replication package provided.
The experimental results show that SOBERT achieves the best performance for every downstream task.
For tag recommendation, SOBERT achieves an F1-score@5 of 0.544 and beats the CodeBERT and RoBERTa by 3.2%; for API recommendation, SOBERT performs with 0.809 in terms of MRR and outperforms GraphCodeBERT by 3.2%.; and for relatedness prediction, it accomplishes an F1-score of 0.824 and outperforms CodeBERT by 2.6%.
We conduct the Wilcoxon Signed Rank at a 95% significance level (i.e., p-value < 0.05) on the paired data corresponding to SOBERT and the best-performing representation model in each task (i.e., CodeBERT and RoBERTa in tag recommendation, GraphCodeBERT in API recommendation, and CodeBERT in relatedness prediction).
The significance test has been conducted on the values of evaluation metrics.
We observe that SOBERT significantly outperforms the comparing model.
Answer to RQ3: Further pre-training of CodeBERT with the data improves the original performance and consistently outperforms state-of-the-art performance in all the targeted downstream tasks.
§ DISCUSSION
§.§ Lessons Learned
§.§.§ Lesson #1
Incorporating post embeddings from an external approach does not boost the performance of neural network models.
Xu et al. <cit.> demonstrated that appending the distributed post representation learned by Post2Vec to the manually crafted feature vector can increase the performance of traditional machine learning algorithms, for example, Support Vector Machine <cit.> and Random Forest <cit.>, in a set of -related tasks.
However, these benefits are not observed for the state-of-the-art techniques that are based on deep neural networks.
This is potentially caused by the design of neural networks that automatically extract feature vectors and continuously optimize the representations.
It indicates that deep neural networks may lose the effectiveness of external embeddings while optimizing the parameters of the feature extractor.
§.§.§ Lesson #2
Models with broader background knowledge derive better results than those with specific knowledge.
Textual artifacts from different domains follow dissimilar word distributions. BERTOverflow is expected to produce the desired post representation as it is specifically designed for data.
A major difference between the models for post representation and others is the vocabulary.
As BERTOverflow is pre-trained from scratch with the data, its vocabulary should be more suitable than general domain models.
Notice that since CodeBERT, GraphCodeBERT, and Longformer are initialized on the checkpoint of RoBERTa, these models inherit the same vocabulary as RoBERTa. Table <ref> presents five examples of the tokenization result of BERTOverflow and RoBERTa. “MongoDB” is separated into three sub-words (“M”, “ongo”, and “DB”) by RoBERTa, but BERTOverflow is capable of representing as a whole word. It confirms our hypothesis that BERTOverflow has a more suitable vocabulary for representing the SE domain technical terms.
Surprisingly, our experiment results show that other BERT-based language models outperform BERTOverflow by a substantial margin across all three tasks. It gives an extremely poor performance in the tag recommendation task. By inspecting the prediction results of BERTOverflow in the tag prediction task, we notice that the top-5 predictions made by BERTOverflow are always the most frequent tags (`python', `java', `c#', `java-script', and `android') from the dataset.
We observe seBERT has similar performance as BERTOverflow in the tag recommendation task.
We perceive that it is potentially because these models lack a sufficient amount of pre-training to perform well. Beause seBERT and BERTOverflow are trained from scratch and requires much more pre-training effort than continued pre-training with extant models.
To prove this concept, we performed additional pre-training on BERTOverflow with the same pre-training corpus as SOBERT.
The further training was with the same hyper-parameters as SOBERT, and it took 23 hours for us to finish with 4 GPUs containing 16GB Nvidia V100 each.
We demote this new model as BERTOverflow_NEW, and we notice its notable performance improvements compared to BERTOverflow.
The results are reported in Table <ref>.[Please note that we could not apply further pre-training to seBERT due to the constraints of limited resources to handle BERT_Large architecture.]
Overall, our experiments have shown that, in all three tasks, vocabulary has a subdued effect, and the more important factor tends to be the scale for pre-training.
Also, pre-training from scratch is commonly considered as an expensive process. Initializing new representation models based on the checkpoint of an existing decent model lowers the risk and the tag recommendation task is a good indicator to demonstrate the generalizability and the sufficiency of pre-training for pre-trained models.
§.§.§ Lesson #3
Despite considering a longer input length, Longformer does not produce better representations for posts.
Conventional BERT-based models like CodeBERT and RoBERTa are unable to handle long sequences due to the quadratic complexity of the self-attention mechanism <cit.> and accept a maximum of 512 sub-token as the input.
However, more than 50% of posts are longer than this given limit <cit.>. Truncation is normally employed to deal with this limitation; however, applying truncation increases the risk of losing information. It motivates us to investigate Longformer as it is designed to handle long-length input with a maximum size of 4,096 tokens.
As all of our evaluations demonstrated, Longformer fails to perform better than the other model that belongs to the general domain (i.e., RoBERTa) as well as models from the SE domain, even though it takes more time and resources for training.
We further compare the performance of Longformer by varying the input size considering the first 512 and 1,024 tokens.
The additional experimental results are shown in Table <ref>.
These additional settings do not differ in performance.
It indicates that diversifying the input size does not affect Longformer's performance on post representation.
A potential interpretation would be the important features for representing posts lie in the first part of each post (e.g., Title serves as a succinct summary of the post).
It is not worth trying Longformer unless one strictly needs the entire content of posts.
§.§.§ Lesson #4
We advocate future studies related to consider the SOBERT as the underlying baseline.
Our experiment results demonstrate that further pre-training based on in-domain data leads to better post representation. By initializing SOBERT with the CodeBERT checkpoint and performing further pre-training on data, we have noticed that SOBERT consistently outperforms the original CodeBERT and produces new state-of-the-art performance for all three tasks.
In Table <ref>, we present three examples of the prediction results of CodeBERT and SOBERT for the tag recommendation task. We observe that CodeBERT is making wrong predictions like “.net” and “c#” when the question is about “haskell” while SOBERT is capable of making the correct predictions. CodeBERT may lack knowledge of programming languages like Haskell and Lua since it is pre-trained on artifacts from Python, Java, JavaScript, PHP, Ruby and Go. Taking the post with ID 13202867 as another example, the question is about Flexslider, a jQuery slider plugin. In the given example, SOBERT could successfully make connections to tags like `jQuery' and `css' while CodeBERT struggles to give meaningful predictions.
Overall, by continuing the pre-training process on data, SOBERT outperforms CodeBERT in three popular -related tasks.
Furthermore, Figure <ref> shows the learning curve of different representation models in the tag recommendation task (i.e., evaluated on the test data) by varying the number of epochs. SOBERT not only achieves state-of-the-art effectiveness, but it also converges faster than the other models. The same pattern is observed in the API recommendation and the relatedness prediction tasks. In practice, a model with a faster convergence speed is preferred as the fine-tuning stage would require less amount of resources, and it implies that the model provides a good initialization for the learning tasks. We advocate future studies to consider SOBERT as their underlying baseline. To facilitate the usage of the enhanced CodeBERT model proposed in this work, we plan to release it to HuggingFace[<https://huggingface.co/>] so that it can be used by simply calling the interface.
§.§ Threats to Validity
Threats to internal validity. To ensure the correct implementation of the baseline methods (i.e., Post2Vec, PTM4Tag, CLEAR, and ASIM), we reused the replication package released by the original authors.[<https://github.com/maxxbw54/Post2Vec>][<https://github.com/soarsmu/PTM4Tag>][<https://github.com/Moshiii/CLEAR-replication>][<https://github.com/Anonymousmsr/ASIM>]
When investigating the effectiveness of various pre-trained models, we used the implementation of each from the popular open-source community HuggingFace.
Threats to external validity.
One threat to external validity relates our results may not generalize to those newly emerging topics or other -related downstream tasks. We have minimized this threat by considering multiple downstream tasks.
Threats to construct validity. We reuse the same evaluation metrics in our baseline methods <cit.>. To further reduce the risk, we conduct the Wilcoxon signed-rank statistical hypothesis test to check whether the output between the two competing approaches is significant.
§ RELATED WORK
In this section, we review two lines of research that most relate to our work: pre-trained models for SE and mining Stack Overflow posts.
§.§ Pre-trained Models for Software Engineering
Inspired by the success of pre-trained models achieved in the field of artificial intelligence, there is emerging research interest in exploring pre-training tasks and applying pre-trained models in SE <cit.>.
One set of research focuses on learning semantic and contextual representations of source code; after pre-training, these models can be fine-tuned to solve SE downstream tasks.
Note that the three Stack Overflow tasks considered in our work are understanding tasks. Thus, we focus on the encoder-based models (i.e., the Transformer Encoder component).
In the literature, there are other types of PTMs that can be used for generation tasks.
They are based on the Transformer decoder component (e.g., CodeGPT <cit.>) or encoder-decoder architecture (e.g., CodeT5 <cit.>).
In this part, we review one model from each category.
ContraCode <cit.> is another encoder-based model, which adopts a contrastive pre-training task to learn code functionality.
They organize programs into positive pairs (i.e., functionally similar) and negative pairs (i.e., functionally dissimilar).
During contrastive pre-training, query programs are used to retrieve positive programs.
Positive programs are pushed together, while negative ones have been pushed away.
CodeGPT <cit.> pre-trains a Transformer-decoder-based language model GPT <cit.> on program languages.
It consists of 12 layers of Transformer decoders.
CodeGPT has been pre-trained in Python and Java corpora from the CodeSearchNet dataset, which contains 1.1M Python functions and 1.6M Java methods.
It can be used for code completion and code generation tasks <cit.>.
Wang et al. <cit.> present CodeT5, a pre-trained encoder-decoder Transformer model that better leverages the code semantics conveyed from the developer-assigned identifiers.
Similar to T5, CodeT5 pre-trains on the masking span prediction task, which randomly masks spans with arbitrary length in the source sequence and then predicts the masked spans.
In addition, CodeT5 also pre-trains with two tasks to fuse code-specific structural information into the model, i.e., identifier tagging and masked identifier prediction.
The other set of research focuses on fine-tuning the pre-trained models to tackle SE challenges <cit.>.
Zhang et al. <cit.> conduct a comparative study on PTM with prior SE-specific tools in sentiment analysis for SE.
The experimental results show that PTM is more ready for real use than the prior tools.
Lin et al. <cit.> find that BERT can boost the performance of traceability tasks in open-source projects.
They investigate three BERT architectures, i.e., Single-BERT, Siamese-BERT, and Twin-BERT.
The results indicate that the single-BERT can generate the most accurate links, while a Siamese-BERT architecture produced comparable effectiveness with significantly better efficiency.
In this paper, we conducted a comprehensive study on multiple SOTA PTMs for mining Stack Overflow tasks.
Different from these works, ours is more comprehensive and covers several common tasks other than focusing on one specific task.
Except for fine-tuning PTMs, we also further pre-trained CodeBERT on Stack Overflow data.
§.§ Mining Stack Overflow Posts
We address tag recommendation <cit.>, API recommendation <cit.>, and relatedness prediction <cit.> in this work.
Others also explored other tasks for mining Stack Overflow posts to support software developers, such as post recommendation <cit.>, multi-answer summarization <cit.>, and controversial discussions <cit.>.
Rubei et al. <cit.> propose an approach named PostFinder, which aims to retrieve Stack Overflow posts that are relevant to API function calls that have been invoked.
They make use of Apache Lucene to index the textual content and code in Stack Overflow to improve efficiency.
In both the data collection and query phase, they make use of the data available at hand to optimize the search process.
Specifically, they retrieve and augment posts with additional data to make them more exposed to queries.
Besides, they boost the context code to construct a query that contains the essential information to match the stored indexes.
Xu et al. <cit.> investigate the multi-answer posts summarization task for a given input question, which aims to help developers get the key points of several answer posts before they dive into the details of the results.
They propose an approach AnswerBot, which contains three main steps, i.e., relevant question retrieval, useful answer paragraph selection, and diverse answer summary generation.
Ren et al. <cit.> investigate the controversial discussions in Stack Overflow.
They find that there is a large scale of controversies in Stack Overflow, which indicates that many answers are wrong, less optimal, and out-of-date.
Our work and their work are complementary to each other, and all aim to boost automation in understanding and utilizing Stack Overflow contents.
§ CONCLUSION AND FUTURE WORK
In this paper, we empirically study the effectiveness of varying techniques for modeling posts, including approaches that are specially designed for posts (i.e., Post2Vec and BERTOverflow),
SE domain representation models (i.e., CodeBERT, GraphCodeBERT, and seBERT) and general domain representation models (i.e., RoBERTa, and LongFormer). We evaluate the performance of these representation models on three popular and representative -related tasks, which are tag recommendation, API recommendation, and relatedness prediction.
Our experimental results show that
Post2Vec is unable to enhance the representations that are automatically extracted by deep learning-based methods and BERTOverflow performs surprisingly worse than other BERT-based language models. Furthermore, there does not exist one representation technique that could consistently outperform other representation models. Our findings indicate the current research gap in representing posts. Thus, we propose SOBERT with a simple-yet-effective strategy. We initialize SOBERT with the checkpoint of CodeBERT and continue the pre-training process with 22 million posts from . As a result, SOBERT improves the performance of the original CodeBERT and consistently outperforms other models on all three tasks, confirming that further pre-training on data is helpful for building representation.
In the future, we would also extend our research to other SQA sites, such as AskUbuntu[<https://askubuntu.com/>]. Moreover, we show that Longformer and BERTOverflow do not generate better representations for posts, therefore exploring better representation models which could handle noise in a longer input and
with a vocabulary is still a possible direction to explore.
§ DATA AVAILABILITY
The replication package of the data and code used in this paper is available at <https://figshare.com/s/7f80db836305607b89f3>.
ACM-Reference-Format
|
http://arxiv.org/abs/2303.07073v2
|
20230313125202
|
Can spoofing countermeasure and speaker verification systems be jointly optimised?
|
[
"Wanying Ge",
"Hemlata Tak",
"Massimiliano Todisco",
"Nicholas Evans"
] |
eess.AS
|
[
"eess.AS"
] |
© 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Spatial Attention and Syntax Rule Enhanced Tree Decoder for Offline Handwritten Mathematical Expression Recognition
Zihao Lin1 Jinrong Li2 Fan Yang1Shuangping Huang13Xu Yang4
Jianmin Lin2Ming Yang2
March 30, 2023
===================================================================================================================
Spoofing countermeasure (CM) and automatic speaker verification (ASV) sub-systems can be used in tandem with a backend classifier as a solution to the spoofing aware speaker verification (SASV) task. The two sub-systems are typically trained independently to solve different tasks. While our previous work demonstrated the potential of joint optimisation, it also showed a tendency to over-fit to speakers and a lack of sub-system complementarity. Using only a modest quantity of auxiliary data collected from new speakers, we show that joint optimisation degrades the performance of separate CM and ASV sub-systems, but that it nonetheless improves complementarity, thereby delivering superior SASV performance. Using standard SASV evaluation data and protocols, joint optimisation reduces the equal error rate by 27% relative to performance obtained using fixed, independently-optimised sub-systems under like-for-like training conditions.
spoofing detection, spoofing countermeasures, speaker verification, joint optimisation
§ INTRODUCTION
Solutions to spoofing aware speaker verification (SASV) <cit.> typically comprise a pair of essentially-independent sub-systems operating in tandem: a spoofing countermeasure (CM) to verify that the test utterance is bona fide rather than spoofed; an automatic speaker verification (ASV) system to verify whether enrolment and test utterances correspond to the same speaker. Even so, ASV also has potential to detect spoofing attacks. In support of this claim, one can imagine the presentation of poor-quality spoofing attacks, namely artificially generated or manipulated utterances which do not represent well the characteristics of the target speaker. Such poor-quality spoofs may not fool the ASV sub-system and hence be rejected even without an auxiliary CM.
ASV and CM sub-systems are therefore not independent and there is hence potential for joint optimisation to exploit their complementarity. The CM can be optimised to detect spoofing attacks which will fool the ASV system, thereby avoiding the unnecessary waste of CM classifier capacity. Despite the appeal of joint optimisation, to the best of our knowledge, no successful solutions have been reported thus far, with all leading solutions combining independently-optimised sub-systems with a backend classifier, e.g. using score <cit.> or embedding <cit.> fusion techniques.
Our previous work <cit.> showed that jointly-optimised SASV solutions can succeed in improving robustness to spoofing but that they have also a tendency to over-fit to the speakers of data used for training. This is hardly surprising; state-of-the-art ASV systems are nowadays trained using data collected from many hundreds of speakers <cit.> whereas the training partition of the SASV database <cit.> contains data collected from only 20 speakers. We showed the number of speakers whose data is used for training is a bottleneck and that progress is unlikely to be made without using additional, auxiliary data collected from a larger pool of speakers.
The work reported in this paper aims to establish the potential and determine whether spoofing countermeasures and speaker verification systems can be jointly optimised. Our hypothesis is that, with data collected from a sufficient speaker population, joint optimisation can deliver superior SASV performance to that obtained using fixed, independently-optimised systems trained under like-for-like training conditions. While joint optimisation might even degrade CM and/or ASV performance, our expectation is that improvements will emerge from more complementary CM and ASV sub-systems that work in synergy to provide more reliable SASV solutions.
§ SASV FRAMEWORK
All work reported in this paper was performed using the same SASV framework used in our previous work <cit.>. While the framework is the same, there are differences in the training policy in terms of data and trial types. A summary of the framework is presented in this section. The new training policy is described in Section <ref>.
The architecture is illustrated in Fig. <ref> and consists of an ASV sub-system, a CM sub-system and a backend classifier. The ASV sub-system is a ResNet34 model with squeeze-and-excitation (SE) blocks <cit.>, namely the ResNetSE34 model reported in <cit.>. The input waveform is first decomposed into log Mel-filterbank features. Four convolutional layers with SE blocks and attentive statistics pooling <cit.> are used for deep feature extraction and to project the variable length input to a fixed-length embedding vector. A combination of softmax and angular prototypical loss <cit.> is used for optimisation. The ASV sub-system extracts both an enrolment embedding e^ASV_enr and test embedding e^ASV_tst from corresponding utterances.
The CM sub-system is the SASV 2022 AASIST <cit.> baseline. Raw waveforms are decomposed using a RawNet2-based encoder <cit.>. Extracted features are integrated using a graph attention network <cit.> before a readout operation and a hidden linear layer are used to generate output scores. Optimisation is performed using a weighted cross-entropy loss function. A linear layer is used to transform representations extracted from the penultimate layer to CM embeddings e^CM_tst of the same dimension as ASV embeddings.
The backend classifier is a convolutional neural network with an adaptive average pooling layer <cit.>. It operates upon the pair of ASV embeddings and the single CM embedding. These are first stacked along a new dimension so that three 1D convolutional layers can be used to capture the variance between speaker representations of both enrolment and test utterances, and also the variance between the ASV and CM embeddings. Deep representations are aggregated using a 1D adaptive average pooling layer and are then mapped to a bona fide, target class score using a pair of linear layers and a one class (OC) softmax layer <cit.>. A OC-softmax loss function is used to learn higher output scores for the target class.
§ EXPERIMENTAL SETUP
We describe the set of databases, protocols, assessment and metrics used in this work, together with specific implementation details.
§.§ Databases
Experimental work was performed using three databases. The VoxCeleb2 <cit.> database is used for ASV pre-training. The CM is pre-trained using the training partition of the ASVspoof 2019 Logical Access (LA) database <cit.>, referred to in the remainder of this paper simply as ASVspoof. The key characteristics of the ASVspoof training partition are detailed in the top half of Table <ref>. It contains data collected from 20 speakers, a number far less than databases typically used for ASV research <cit.> and, as we found in previous work <cit.>, a number that is insufficient to support joint optimisation. All development and evaluation experiments are performed using the corresponding partitions of the ASVspoof database.
The Fake Audio Detection (FAD) database <cit.> contains bona fide and spoofed Madarin-language utterances generated using TTS algorithms. It is used optionally for training the backend classifier or, in the case of joint optimisation, the backend classifier and both CM and ASV sub-systems. The FAD database is sourced from 6 different public databases <cit.>. Its non-homogeneous nature makes it ideal as a source of speaker augmentation. To be consistent with the ASVspoof database, we used the data collected from speakers for whom there is both bona fide and spoofed data. The key characteristics of the resulting training partition used in this work are detailed in the lower half of Table <ref>. It contains data collected from 40 speakers, a number twice that of the ASVspoof training partition.
§.§ Protocols
We used SASV <cit.> protocols for the ASVspoof database for all work reported in this paper, modifying only the training protocol to incorporate optional FAD data. For fixed optimisation, pre-trained sub-systems are used without additional optimisation. The backend is optimised according to one of three different training conditions using either: ASVspoof data alone; ASVspoof + FAD data; ASVspoof + FAD bona fide data only. The last training condition is included since we aim to reduce the over-fitting of the ASV sub-system which is usually trained with bona fide data only. In doing so we avoid, to the extent possible, domain mismatch in terms of spoofing attacks (which is not the goal of this work); domain mismatch in the bona fide data nonetheless remains. Only for the jointly-optimised system are all three components trained simultaneously through back propagation.
Training is performed using different combinations of trial pairs including a bona fide target enrolment utterance in addition to a test utterance. The latter can be: 1 a bona fide target speaker utterance; 2 a bona fide non-target speaker utterance; 3 a spoofed target speaker utterance. The proportion of each trial type for fixed and jointly-optimised systems is illustrated in Table <ref>. For joint optimisation we found the use of a fourth trial type involving 4 a spoofed non-target speaker utterance to be beneficial, but found no improvement for our fixed system. The full SASV system should accept only type 1 trials. All others should be rejected, even though type 2 trials are within the positive class for the CM.[By convention, the CM produces higher scores for bona fide inputs and lower scores for spoofed inputs.] The conflict between SASV and CM classes then results in degraded CM performance through back propagation. The introduction of type 4 trials acts to compensate for this behaviour since they are among the negative class for SASV and both sub-systems. Finally, the development and evaluation protocols are the standard SASV protocols reported in <cit.>.
§.§ Assessment and metrics
We use the output scores from the backend OC-softmax layer to assess the performance of both fixed and jointly-optimised systems. In order to analyse impacts of joint optimisation and complementarity, we also assess performance at the sub-system level. ASV sub-system scores are the cosine distance between enrolment and test utterance embeddings. CM sub-system scores are the AASIST outputs for the bona fide class and test utterance only. Three different SASV metrics, all equal error rate (EER) estimates, are used to assess speaker verification performance (SV-EER) involving a set of 1 and 2 trials, spoofing detection performance (SPF-EER) involving a set of 1 and 3 trials and spoofing-aware speaker verification (SASV-EER) performance involving the full set of 1, 2 and 3 trials. The remaining trial type 4 is not used for assessment, neither for development, nor for evaluation.
§.§ Implementation
All trainable network parameters are updated for 20 epochs with an initial learning rate of 5e-5. The batch size is set to 20 for both systems. Model selection is made according to the lowest SASV-EER estimate for the development partition. Systems performance is estimated from the average of 5 independent runs each with a different random seed. All experiments were performed on a single NVIDIA GeForce RTX 3090 GPU. Results are reproducible with the same set of random seeds and GPU environment using the implementation available online.[<https://github.com/eurecom-asp/sasv-joint-optimisation>]
§ RESULTS
Results are shown in Table <ref>. It shows SASV-EER, SV-EER, and SPF-EER estimates for the full system (left), the ASV sub-system (middle) and CM sub-system (right) when training is performed using ASVspoof data alone (top), ASVspoof and FAD data (middle) and then ASVspoof and only FAD bona fide data (bottom). In the following we outline a number of principle observations and supporting results.
CM performance – SPF-EER estimates for the CM sub-system in the last column of Table <ref> show that the lowest SPF-EER (0.65%) is obtained using a fixed system trained using only ASVspoof data. The degradations in CM performance (1.02%, 1.81% and 1.35%) stem from the CM being optimised to detect only attacks that are successful in fooling the ASV system. While there is no need for the CM to detect less potent attacks, but since performance estimates are still made using the full set, the SPF-EER increases. The worst result is for the ASVspoof + FAD training condition, and is the result of differences between spoofing attacks in the ASVspoof and FAD databases. SPF-EER estimates for the ASV sub-system (25.75%) show that even the fixed system can detect spoofing attacks, but that joint optimisation acts to improve performance (17.43%, 10.82% and 10.60%). SPF-EER results for the full system show the complementarity of the ASV and CM sub-systems in improving overall robustness to spoofing for all three training conditions.
ASV performance – SV-EER estimates for the CM sub-system shown in the penultimate column of Table <ref> show evidence of speaker-awareness. Without over-fitting to speakers, the CM sub-system should achieve an SV-EER of 50%. Results for jointly-optimised systems (46.8%, 46.37% and 47.99%) deviate further than the result for the fixed system (49.01%). Corresponding SV-EER results for the ASV sub-system show that joint optimisation acts to degrade performance, with the best result being achieved using the fixed system (1.27%). This translates to worse ASV performance for the full system; SV-EER results for all jointly-optimised systems (2.34%, 2.66% and 1.77%) are all worse than those for fixed systems (1.27%, 1.85% and 1.47%). Again, the worst result is for the ASVspoof + FAD training condition.
SASV performance – Joint optimisation makes little difference to the SASV-EER for the CM sub-system (24.5% vs. 23.65%, 22.83% and 24.66%). This is not surprising, since the CM sub-system operates only upon the test utterance. Nonetheless, joint optimisation improves ASV sub-system performance, with results for all jointly-optimised systems (13.47%, 8.57% and 8.58%) being better than the fixed system (19.7%). Even if there is little difference in CM results, but substantial improvements to ASV results, this does not translate to better performance for the full system in the case of the ASVspoof (1.15% vs. 1.49%) and ASVspoof + FAD (1.52% vs. 1.74%) training conditions. Only for the ASVspoof + FAD bona fide condition is joint optimisation beneficial (1.72% vs. 1.26%).
§ DISCUSSION
The lowest SASV-EER comes from the fixed system trained using ASVspoof data alone. This result may cast doubt upon the claimed merit since, even with more training data, the jointly-optimised system does not outperform the fixed counterpart. However, while the jointly-optimised system trained using ASVspoof + FAD bona fide only data does give performance that is behind that of the fixed system trained with ASVspoof data only, the use of different training data makes for an unfair comparison. The FAD training data is out-of-domain in the form of speech data in a different language and recording conditions, among other differences. In this sense, comparisons should be made only between results for the same training conditions, i.e. results for ASVspoof or ASVspoof + FAD bona fide only training conditions. In this sense, lower EERs observed across different training conditions are not an indication of joint optimisation not working, but are the result of domain mismatch which is not tackled in this work. Domain mismatch is a penalty which likely degrades results for training conditions that use FAD data. The use of domain-matched training data, or domain adaptation, may than show the full potential and even better results.
Results for the ASVspoof and FAD bona fide only training condition show a 27% relative reduction in the SASV-EER under like-for-like training conditions. It comes as a result of using data collected from a greater number of speakers and jointly-optimised CM and ASV sub-systems with worse performance than their independently-optimised counterparts. Even so, the resulting sub-systems are more complementary leading to better overall reliability (SASV-EER).
§ CONCLUSIONS AND FURTHER WORK
Results presented in this paper add to the evidence that joint optimisation has potential to better exploit the synergy between spoofing countermeasures and speaker verification sub-systems so that they function cooperatively as a more reliable solution to spoofing aware speaker verification (SASV). Interestingly, results show that joint optimisation degrades the performance of each sub-system but that it improves their complementarity. Joint optimisation improves SASV performance by 27% relative to its fixed, independently-optimised counterpart under like-for-like training conditions. This result is obtained despite using a training database of the same size to jointly-optimise a considerably more complex system.
While other approaches to joint optimisation might make better use of data collected from fewer speakers, our solution is only successful when using a modest quantity of auxiliary data collected from new speakers. Given that state-of-the-art ASV solutions are trained with data collected from many hundreds of speakers, it seems wise for future ASVspoof and SASV challenges to collect and make available training data collected from far more speakers than in past editions. The domain robustness problem persists; even if we can learn speaker variation in a joint optimisation framework using bona fide data sourced from a different database, it does not translate to reliable detection for spoofing attacks in the same database. Research in domain robustness is hence a priority. Other directions include the investigation of joint optimisation strategies to reduce CM over-fitting; the CM shows signs of speaker awareness. Speaker-dependent spoofing detection might also be an interesting avenue for future research.
IEEEbib
|
http://arxiv.org/abs/2303.07365v1
|
20230313180002
|
Gravitational Blocks: Symplectic Covariance Unveiled
|
[
"Seyed Morteza Hosseini"
] |
hep-th
|
[
"hep-th"
] |
=1
table
decorations.pathmorphing
decorations.markings
quotes,arrows.meta
arrows,decorations.markings,calc,fadings,decorations.pathreplacing,patterns,decorations.pathmorphing,positioning
|
http://arxiv.org/abs/2303.06653v1
|
20230312125755
|
A computational approach to exponential-type variable-order fractional differential equations
|
[
"Roberto Garrappa",
"Andrea Giusti"
] |
math.NA
|
[
"math.NA",
"cs.NA",
"26A33, 46F12, 65R10"
] | |
http://arxiv.org/abs/2303.07082v1
|
20230313130727
|
Optimal Parameter Configurations for Sequential Optimization of Variational Quantum Eigensolver
|
[
"Katsuhiro Endo",
"Yuki Sato",
"Rudy Raymond",
"Kaito Wada",
"Naoki Yamamoto",
"Hiroshi C. Watanabe"
] |
quant-ph
|
[
"quant-ph"
] |
Research Center for Computational Design of Advanced Functional Materials, National Institute of Advanced Industrial Science and Technology (AIST), 1-1-1 Umezono, Tsukuba, Ibaraki, 305-8568, Japan
Quantum Computing Center, Keio University, Hiyoshi 3-14-1, Kohoku-ku, Yokohama 223-8522, Japan
Toyota Central R & D Labs., Inc., Koraku Mori Building 10F, 1-4-14 Koraku, Bunkyo-ku, Tokyo 112-0004, Japan
Quantum Computing Center, Keio University, Hiyoshi 3-14-1, Kohoku-ku, Yokohama 223-8522, Japan
IBM Quantum, IBM Japan, 19-21 Nihonbashi Hakozaki-cho, Chuo-ku, Tokyo 103-8510, Japan
Quantum Computing Center, Keio University, Hiyoshi 3-14-1, Kohoku-ku, Yokohama 223-8522, Japan
Department of Computer Science, The University of Tokyo, 7-3-1, Hongo, Bunkyo-ku, Tokyo 113-0033, Japan
Department of Applied Physics and Physico-Informatics, Keio University, Hiyoshi 3-14-1, Kohoku-ku, Yokohama 223-8522, Japan
Quantum Computing Center, Keio University, Hiyoshi 3-14-1, Kohoku-ku, Yokohama 223-8522, Japan
Department of Applied Physics and Physico-Informatics, Keio University, Hiyoshi 3-14-1, Kohoku-ku, Yokohama 223-8522, Japan
Quantum Computing Center, Keio University, Hiyoshi 3-14-1, Kohoku-ku, Yokohama 223-8522, Japan
Variational Quantum Eigensolver (VQE) is a hybrid algorithm for finding the minimum eigenvalue/vector of a given Hamiltonian by optimizing a parametrized quantum circuit (PQC) using a classical computer.
Sequential optimization methods, which are often used in quantum circuit tensor networks, are popular for optimizing the parametrized gates of PQCs.
This paper focuses on the case where the components to be optimized are single-qubit gates, in which the analytic optimization of a single-qubit gate is sequentially performed.
The analytical solution is given by diagonalization of a matrix whose elements are computed from the expectation values of observables specified by a set of predetermined parameters which we call the parameter configurations.
In this study, we first show that the optimization accuracy significantly depends on the choice of parameter configurations due to the statistical errors in the expectation values.
We then identify a metric that quantifies the optimization accuracy of a parameter configuration for all possible statistical errors, named configuration overhead/cost or C-cost.
We theoretically provide the lower bound of C-cost and show that, for the minimum size of parameter configurations, the lower bound is achieved if and only if the parameter configuration satisfies the so-called equiangular line condition.
Finally, we provide numerical experiments demonstrating that the optimal parameter configuration exhibits the best result in several VQE problems.
We hope that this general statistical methodology will enhance the efficacy of sequential optimization of PQCs for solving practical problems with near-term quantum devices.
Optimal Parameter Configurations for Sequential Optimization of Variational Quantum Eigensolver
Hiroshi C. Watanabe
March 30, 2023
=================================================================================================
§ INTRODUCTION
Variational Quantum Eigensolver (VQE) <cit.>
is a classical-quantum hybrid algorithm implementable on near-term quantum devices,
for finding the minimum eigenvalue/vector of a given Hamiltonian;
the recipe is simply to prepare a parametrized quantum circuit (PQC) U(θ), also called ansatz,
and then find a parameter θ that minimizes
⟨ H ⟩ =
⟨ψ|U(θ)^† H U(θ)|ψ⟩ with some initial
state |ψ⟩.
Note that VQE is a class of the variational quantum algorithms (VQAs)
<cit.>, where in general the cost is a non-linear
function of the expectation values of some Hamiltonians.
VQA has a wide range of applications, such as quantum chemical calculations <cit.>, combinatorial optimization <cit.>, and linear equation solvers <cit.>.
The core question is how to model the PQC U(θ) and how to minimize
⟨ H ⟩ with some classical optimizer.
There have been extensive investigation on this problem <cit.>.
In particular, the sequential optimization method have been used in a variety
of settings such as quantum circuit tensor-networks
<cit.>,
where θ corresponds to a set of local unitaries and they are sequentually
optimized one by one.
In this paper, we focus on the special type of sequential optimization method developed
in Refs. <cit.>.
In this framework, θ are the parameters characterizing the set of single-qubit
rotation gates such as R_y(θ) = e^iθ Y (Y is the Pauli y
matrix) in the case of Rotosolve <cit.>.
Then the sequential optimization method takes the strategy to exactly optimize
the single rotation gates one by one.
For example, consider the step where we optimize the R_y(θ) gate contained
in the PQC shown in Fig. <ref> by minimizing the cost ⟨ H ⟩
as a function of θ.
The point is that, in this case, ⟨ H ⟩ must be of the form of a sinusoidal
function with respect to θ, and thus the optimal θ_ opt can be exactly
determined once we identify the sinusoidal function shown by the black curve in the figure.
In particular, as a nature of sinusoidal function, specifying the mean values of three
observables corresponding to the three points of θ allows us to exactly identify
⟨ H ⟩;
we call the alignment of these three points of θ the parameter configuration.
Note that, in the case of Free axis selection (Fraxis) <cit.> where the freedom of a single-qubit
rotation gate is served by the rotation axis with fixed rotation angle in the Bloch sphere,
⟨ H ⟩ takes the form of a quadratic function of a real normalized vector
n=(x,y,z)^T, which can also be exactly minimized.
This setup was further generalized to Free Quaternion Selection (FQS)
<cit.> so that the rotation angle can also be tuned;
then ⟨ H ⟩ takes the form of a quadratic function of a real normalized
vector q=(w,x,y,z)^T.
In this case, as shown later, the mean values of 10 observables corresponding to 10 points
of q identify ⟨ H ⟩; we also call this {q_1, …, q_10}
the parameter configuration.
However, this optimization strategy relies on the critical assumption that the mean
values of observables and accordingly ⟨ H ⟩ are exactly identified.
In reality, those mean values can only be approximately obtained as the average of
a finite number of measurement results; that is, practically there is always a
statistical error in ⟨ H ⟩.
In the above one-dimensional case, as illustrated in Fig. <ref>, the energy
curve, θ_opt, and consequently the minimum value of ⟨ H ⟩ may
all largely fluctuate depending on the parameter configuration.
Hence the question is what is the best parameter configuration for achieving a small
fluctuation of min⟨ H ⟩.
In the above one-dimensional case, we have an intuition that the best configuration might
be such that the three parameters are equally spaced (i.e., equidistant), as shown in the
left bottom of Fig. <ref>, which is indeed true as proven later.
However, the general case is of course nontrivial; will we have such equidistant
configuration in some sense, or some biased configuration would be the best?
In this paper, we develop the theory for determining the optimal parameter configuration.
As a preliminary result, in Sec. <ref>, we prove that, if the exact
expectation values are available without any statistical error, then we have analytical
solution of the best parameters achieving min⟨ H ⟩ (almost) without
respect to the parameter configuration for every method of
<cit.>.
Then, in Sec. <ref>, we give the most essential result providing the basis
of the theory; that is, we derive the explicit form of the fluctuation of
min⟨ H ⟩ under statistical errors, with respect to the parameter
configuration.
This enables us to introduce the C-cost (configuration cost/overhead), a useful metric for
determining min⟨ H ⟩ and thereby providing us with the optimal
parameter configuration.
Actually, Sec. <ref> gives numerical experiments to demonstrate that
the optimal parameter configurations obtained using C-cost yield the best result in
the sense of the statistical error of estimating ⟨ H ⟩.
Notably, beyond such utilization for numerically determining the configuration, the
C-cost satisfies several interesting mathematical properties, suggesting the relevance
of this metric.
The first is that the lower bound of C-cost is 1; moreover, we prove that, for the
minimum size of the parameter set, this bound is achievable if and only if the parameter
configuration satisfies a geometric condition called the equiangular line condition,
an important and beautiful mathematical concept in algebraic graph theory. Here, each parameter q corresponds to a line that passes the origin and q.
This condition rigorously supports our above-described intuition that it would be desirable
for the parameters to be equally spaced for the Rotosolve case shown in
Fig. <ref> or Fig. <ref>A;
this intuition holds for the case of Fraxis, showing that there is a unique parameter
configuration (up to the global rotation) satisfying the equiangular line condition,
as displayed in Fig. <ref>B.
But interestingly, this intuition does not apply to the most general FQS case due to the
non-existence of 10 equiangular lines in ℝ^4.
That is, the so-called Gerzon bounds <cit.>, Neumann theorem <cit.>
and Haantjes bound <cit.> prove that
there does not exist a set of 10 lines satisfying the equiangular line condition in ℝ^4; the maximum number of such lines is 6.
Nevertheless, the C-cost is still useful in this case, as it gives us a means to numerically obtain
the optimal parameter configuration, which is displayed in Fig. <ref>C.
Furthermore, if redundant measurements are allowed, there exists
parameter configurations that achieves the theoretical lower bound of the C-cost,
one of which is illustrated in Fig. <ref>D.
Finally, we note that equiangular lines in complex spaces are equivalent to symmetric, informationally complete (SIC) POVMs <cit.> whose properties have been much studied, e.g., it is conjectured that there is always a set of d^2 equiangular lines in ℂ^d <cit.> (it has been proven up to some large d theoretically and numerically). The SIC POVMs defined from such lines are informationally complete because the results of other measurements can be computed from those of the SIC POVMs. In this study, we obtain similar results connecting equiangular lines in real spaces with the variational quantum circuits using parametrized single-qubit gates.
§ ENERGY MINIMIZATION WITH MATRIX FACTORIZATION
§.§ Brief review of Rotosolve, Fraxis, and FQS
FQS method <cit.> describes the procedure to completely characterize the energy landscape with respect to a single-qubit gate in a PQC.
The parametrized single-qubit gate, which we call FQS gate, is none other than the general single-qubit gate U^(4) expressed as <cit.>
U^(4)(q) = wI - xiX - yiY - ziZ =q·ς⃗,
where the superscipt indicates the number of parameters: q=(w,x,y,z)^T∈ℝ^4 satisfying q^2=1.
Here, i is the imaginary unit, I is the 2×2 identity matrix, and X, Y, Z are the Pauli matrices.
ς⃗=(ς_I,ς_X,ς_Y,ς_Z)^T denotes an extension of the Pauli matrices defined as
ς⃗=(I,-iX,-iY,-iZ)^T.
The dimension of the parameter q is four, but since the parameter q is constrained on the unit hyper-sphere, the degree of freedom of the parameter is three.
In Fraxis, the rotation angle is constrained to π, which corresponds to the case
w=0 of Eq. (<ref>) as
U^(3)(n) = -xiX -yiY - ziZ,
where the parameter of the gate is n=(x,y,z)^T such that n^2=1.
We term this U^(3) as Fraxis gate.
Thus, the Fraxis gate has two degrees of freedom.
In Rotosolve, the rotation axis is fixed and the rotation angle serves as the parameter.
In particular, Rx gate fixes the rotation axis to the x-axis; in the form
of Eq. (<ref>), this corresponds to y=z=0 and thus
U^(2)(r) = wI - xiX,
where the parameter of the gate is r=(w,x)^T such that r^2=1.
Thus, the degree of freedom of Rx gate is one.
Similarly, Ry and Rz gates are obtained by replacing X in Eq. (<ref>)
with Y and Z, respectively.
In what follows we use the most general FQS gate to describe the optimization
algorithm.
The sequential optimization method takes the strategy to update respective FQS gates
in a coordinate-wise manner, where all parameters are fixed except for the focused FQS
gate U^(4)( q).
The entire quantum circuit containing FQS gates is supposed to be the PQC
V=∏_i U^(4)_i( q_i) W_i on the n-qubit system, where U^(4)_i is the ith FQS gate and W_i is a fixed multi-qubit gate.
Now, let V_1 and V_2 be the gates placed before and after the focused FQS gate U^(4)( q).
Then, a density matrix ρ prepared by the PQC is expressed as
ρ = V_2 U^(4)(q) V_1ρ_ in V_1^†(U^(4)(q) )^† V_2^†,
where ρ_ in is an input density matrix.
Thus, the expectation value ⟨ H ⟩ of given Hamiltonian H with respect
to ρ is then
⟨ H ⟩ = HV_2 U^(4)(q) V_1ρ_ in V_1^†(U^(4)(q))^† V_2^†
= H' U^(4)(q) ρ'_ in(U^(4)(q))^†,
where
H' = V_2^† H V_2 and ρ'_ in = V_1 ρ_ in V_1^†.
Substituting Eq. (<ref>) into Eq. (<ref>) yields
⟨H|=⟩q^T G^(4)q,
where G^(4) is a 4× 4 real-symmetric matrix:
G^(4) = [ G_II G_IX G_IY G_IZ; G_IX G_XX G_XY G_XZ; G_IY G_XY G_YY G_YZ; G_IZ G_XZ G_YZ G_ZZ ],
and each element, G_μν (μ,ν=I,X,Y,Z), is defined by
G_μν=1/2ρ'_ in(ς_μ^† H'ς_ν+ς_ν^† H'ς_μ).
Thus the energy landscape with respect to the FQS gate is completely characterized by the matrix G^(4).
Because Eq. (<ref>) is a quadratic form with respect to the parameter q
with the constraint q^2=1, the eigenvector
p_1 associated with the lowest eigenvalue λ_1 of the matrix G^(4) minimizes the energy (<ref>); see Appendix <ref> for the details.
In the following, we call the matrix G^(4) FQS matrix.
Note that the above result can be directly extended to the case of Fraxis and Rotosolve, in which case Eq. (<ref>) is replaced by
G^(3) = [ G_XX G_XY G_XZ; G_XY G_YY G_YZ; G_XZ G_YZ G_ZZ ],
and
G^(2) = [ G_II G_IX; G_IX G_XX ],
respectively.
§.§ FQS with arbitrary parameter configurations
Since G^(4) is a real-symmetric matrix, we can expand Eq. (<ref>) as the following form:
⟨ H ⟩ = G_II w^2
+ G_XX x^2
+ G_YY y^2
+ G_ZZ z^2
+ 2 G_IX wx
+ 2 G_IY wy
+ 2 G_IZ wz
+ 2 G_XY xy
+ 2 G_XZ xz
+ 2 G_YZ yz.
Eq. (<ref>) indicates that, if we know all the 10 coefficients
(G_II,...,G_YZ), we can exactly estimate the expectation ⟨ H ⟩
for any parameter q.
In other words, only algebraic calculations on classical computers are required to find the parameters achieving the minimum expectation value for the target gate.
Therefore, it is important to obtain the coefficients with as few measurements as
possible.
To consider this problem, we define the function h^(4)(q) that outputs the
normalized vector (h^(4)(q)=1):
h^(4)(q)
=
(w^2, x^2, y^2, z^2, √(2)wx, √(2)wy, √(2)wz, √(2)xy, √(2)xz, √(2)yz)^T,
and the vector g^(4)
g^(4) =(
G_II,G_XX,G_YY,G_ZZ,
√(2)G_IX,
√(2)G_IY,
√(2)G_IZ,
√(2)G_XY,
√(2)G_XZ,
√(2)G_YZ)^T.
Then, the relation between the parameter q and the expectation
⟨ H ⟩ is expressed as
⟨ H ⟩ = h^(4)(q)^T g^(4).
Suppose measurements with different parameters {q_1, ..., q_N} and the N expectation values of the measurement results b=(b_1, ..., b_N)^T were obtained,
we can also write the relations between the expectation values b and the coefficient vector g^(4) as
b = A^(4)g^(4),
where the matrix A^(4)∈ℝ^N × 10 is
A^(4) = ( h^(4)(q_1), ..., h^(4)(q_N) )^T,
that encodes the information of the parameter configurations {q_1, ..., q_N}.
It is obvious, if N<10, g^(4) is not uniquely determined.
Hence, we suppose N≥ 10 throughout this paper.
If rank(A)=10, A^TA is invertible and there exists the generalized inverse of A^+:=(A^TA)^-1A^T <cit.>.
Accordingly, we can obtain the vector g^(4) by exactly solving linear equations as
g^(4) = A^+b.
In other words, a single execution of FQS requires at least ten sets of the parameters and the corresponding observables.
However, it may not necessarily be the case when input states and/or Hamiltonian has symmetry, which reduces the number of required measurements to construct G^(4) in Eq. (<ref>).
We also note that it is possible that rank(A)<10 if the rows of A are dependent on each other.
However, it is plausible to exclude such situation, because the input parameters are controllable.
Hereafter, we suppose that all columns of A are independent of each other, equivalently, rank(A)=10.
The same argument is applicable to the Fraxis gate as
⟨ H ⟩ = G_XX x^2
+ G_YY y^2
+ G_ZZ z^2
+ 2 G_XY xy
+ 2 G_XZ xz
+ 2 G_YZ yz,
h^(3)(n)
= (x^2, y^2, z^2, √(2)xy, √(2)xz, √(2)yz)^T,
g^(3) = (G_XX,G_YY, G_ZZ,
√(2)G_XY, √(2)G_XZ, √(2)G_YZ)^T.
Likewise, for Rx gates
⟨ H ⟩ = G_II w^2
+ G_XX x^2
+ 2 G_IX wx,
h^(2)(r)
= (w^2, x^2, √(2)wx)^T,
g^(2) = (G_II, G_XX, √(2)G_IX)^T.
The minimum sizes of the parameter configuration required to construct G^(d) are d(d+1)/2, i.e., 6 in Fraxis (d=3) and 3 in Rotosolve (d=2).
For simplicity, we omit superscript d from G^(d), h^(d), and g^(d) for d=2,3,4 in the following sections and formulate them based on the FQS framework unless otherwise noted.
§ CONFIGURATION COST WITH FINITE RUNS OF QUANTUM CIRCUITS
§.§ Evaluation of the Parameter Configurations
If infinite number of measurements were allowed, there would be no estimation errors in the expectation values b, and the resulting vector g is exactly obtained as long as the matrix A is invertible. This allows for the exact evaluation of the optimal solution of the FQS matrix.
In this section, we quantitatively evaluate the error propagation from the shot noise in the expectation values b to the estimation of the minimum solution.
Although we focus on the FQS for generality, it can be easily applied to other sequential quantum optimizers, Rotosolve and Fraxis.
Suppose a FQS matrix is estimated from N expectation values of an observable, which are obtained by independent measurements with different parameters {q_1, ..., q_N} assigned to the gate of interest.
Due to the finite number of shots, the expectation values are no longer deterministic, but randomly distribute around the true values b^* obtained with infinite shots as
b = b^* + ϵ,
where ϵ is the random variables reflecting the errors on the measurements.
Note that the relation between b and g is no longer valid under the finite measurement condition.
Alternatively, we employed the least-square solution g
g = g̃minb-Ag̃^2 = (A^TA)^-1A^T b = A^+b,
as a plausible estimate of g^*.
Apparently, Eq. (<ref>) has the same form as Eq. (<ref>), but the resulting vector g is an estimate of the true vector g^* in the context of maximum likelihood <cit.> and deviates from the ideal vector g^* due to errors for finite measurement.
Substituting Eq. (<ref>) into Eq. (<ref>), we get
g = A^+ b
=A^+(b^*+ϵ)
=g^* + A^+ϵ,
where the third equality follows g^*=A^+b^*.
Eq. (<ref>) implies the errors of the estimated coefficient vector g-g^*=A^+ϵ is amplified by the linear transformation A^+ from the shot errors ϵ.
Let G be a FQS matrix generated from the estimated vector g with finite number of measurements.
In the below, we focus on the FQS procedure to estimate the minimum eigenvalue of G.
Here, for convenience, we define the half-vectorization function vech: ℝ^4×4→ℝ^10
such that
vech(G) =
(
G_II,
G_XX,
G_YY,
G_ZZ,
G_IX,
G_IY,
G_IZ,
G_XY,
G_XZ,
G_YZ)^T,
where the order of elements corresponds to g.
In addition, the scaling matrix D is defined as
D = diag(1,1,1,1,√(2),√(2),√(2),√(2),√(2),√(2)).
Using these notations,
we have the following relations,
g=D vech(G)
⇔
G=vech^-1(D^-1g),
where the function vech^-1 is a linear mapping as vech^-1(s+t)=vech^-1(s)+vech^-1(t) for s,t∈ℝ^10.
Accordingly, G is expressed as
G = vech^-1(D^-1g)
= G^* +vech^-1(D^-1A^+ϵ),
which implies that the ideal FQS matrix G^*= vech^-1(D^-1A^+b^*) is perturbed by vech^-1(D^-1A^+ϵ).
In the following part, we quantitatively evaluate the matrix perturbation effect on the optimization result.
Let λ_i^* and p_i^* be the ith lowest eigenvalue and the corresponding eigenvector of G^*.
Likewise, λ_i(ϵ) and p_i(ϵ) are the ith lowest eigenvalue and its corresponding eigenvector of the estimated matrix G.
For quantitative evaluation of the perturbation, we suppose two metrics: (1) Var[λ_1(ϵ)], the variance of the estimated minimum value, and (2) 𝔼[Δ E], the mean error of the minimum expectation value using the estimated optimal parameters with infinite shot.
Here, Δ E is the deviation of the expectation value with the estimated parameter set p_1 from the true minimum expectation value, defined as
Δ E = p_1^T G^* p_1^ - p_1^*T G^* p_1^*≥ 0,
where the positivity of Δ E comes from the fact that the true parameter set p^*_1 gives the minimum value of the quadratic form.
We suppose that Var[λ_1(ϵ)] is a measure to verify the estimated energy λ_1 by one-time execution of FQS, while 𝔼[Δ E] is a measure to qualify the estimated parameter p_1.
Throughout the following parts, for simplicity, we employed Var[λ_1] as the indicator of shot errors.
(See Appendix <ref> for 𝔼[Δ E ])
Since G is a 4× 4 symmetric matrix, it is represented by eigendecomposition as
G=P Λ P^T,
where P=(p_1,...,p_4)^T and Λ = diag(λ_1,...,λ_4).
From the first-order perturbation theory <cit.>, the minimum eigenvalue λ_1 of G is approximated as
λ_1 = λ_1^* + p_1^*Tvech^-1(D^-1A^+ϵ) p^*_1.
Then, Var[λ_1] is evaluated as
Var[λ_1] = Var[p_1^*Tvech^-1(D^-1A^+ϵ) p^*_1].
To deal with Eq. (<ref>), we apply a simple model to the measurement errors ϵ satisfying as
𝔼[ϵ]=0,
𝔼 [ϵ_i ϵ_j] =
{[ 0 for i≠ j; σ^2/s for i=j ]. ,
where s denotes the number of measurement shots to evaluate an expectation value of observables and σ^2 is a part to specific to observables.
In addition, we assume the first eigenvector p_1 follows a uniform distribution on the unit sphere.
Based on the models, Eq. (<ref>) can be further calculated as
Var[λ_1] = σ^2/sd(d+2) Tr[ (A^TA)^-1(1_d1_d^T+2I)],
where d=dim(q) (4 for FQS, 3 for Fraxis and 2 for Rx) and 1_d∈ℝ^d(d+1)/2 is the vector that the first d elements are unity and the others are zero (e.g. 1_d=(1,1,1,1,0,0,0,0,0,0)^T for FQS).
Derivation of Eq. (<ref>) is detailed in Appendix <ref>.
Since we focus on the optimization performance,
it is convenient to discuss the total number of shots required for an one-time optimization rather than the cost for evaluating an expectation value.
Suppose the total shots for an one-time optimization is constant.
Let s_min be the number of measurement shots to estimate an expectation value of the observable when N=N_min, where N_min:=d(d+1)/2 is the minimum size of the parameter configuration.
For a redundant parameter configuration N>N_min, the number of shots for evaluating an expectation value is s_minN_min/N.
As a result,
Var[λ_1]
= σ^2/s_min C(A),
where we define the C-cost (Configuration cost), C(A), as
C(A):= N/N_mind(d+2) Tr[ (A^TA)^-1(1_d1_d^T+2I)].
Equation (<ref>) indicates that Var[λ_1] is separable into the number of shots (s_min) dependent part and the parameter configuration dependent part i.e. a 50% reduction of C(A) is equivalent to doubling the number of shots.
The C-cost is a metric to estimate Var[λ_1] under the condition that the number of shots to optimize a single-qubit gate is constant.
Now, the conditions for the minimum C(A) are of interest to minimize the estimation error. We rigorously give the lower bound of the C-cost as the following theorem (See Appendix <ref> for the proof of this theorem):
For the C-cost C(A) in Eq. (<ref>), C(A) ≥ 1 holds with equality if and only if the parameter configurations {q_i }_i=1^N satisfy
A^TA = N/d(d+2) (1_d1_d^T + 2I).
In other words, the parameter configurations that satisfies Eq. (<ref>) is optimal with respect to efficiency.
Although it may not be straightforward to find the optimal parameter sets that satisfy Eq. (<ref>), in the case of minimum parameter set (N=N_min) a useful formula is available as the following corollary of Theorem <ref>.
(See Appendix <ref> for the proof.)
For the minimum number of parameters (N=N_min), the C-cost C(A) in Eq. (<ref>) is always C(A) ≥ 1 with equality if and only if the parameter configurations {q_i}_i=1^N satisfy
|q_i·q_j| = 1/√(d+2) (for all i≠ j).
The equality condition in Corollary <ref> tells us that the parameters must be equiangular unit vectors.
This equiangular property is known as equiangular lines in real spaces <cit.>, which is equivalent to the algebraic graph theory of two-graphs <cit.>. The existence of N_min = d(d+1)/2 equiangular lines in ℝ^d is known as the Gerzon bounds, and so far only shown to hold for d = 2, 3, 7, 23. For our optimal parameter configurations, only the cases of Rx and Fraxis gates (d=2, 3), there exists a unique set of N_min equiangular unit vectors (up to rotation) and such parameter configuration uniquely achieves the minimum value of C-cost C(A). The non-existence of such optimal parameter configuration for FQS gate (d = 4) is due to the non-existence of equiangular lines satisfying the condition of Corollary <ref>, which is attributed to Haantjes <cit.> and Neumann in <cit.> (see also <cit.>).
§.§ The Rotation Invariance of C-cost.
The C-cost C(A) in Eq. (<ref>) is invariant to rotation of all the parameter configurations.
In other words, a parameter configuration ( q_1,..., q_K) and its rotated configuration (R q_1,..., R q_K) have the same value of the C-cost, where R is a rotation matrix ∈ℝ^d× d (R^TR=I).
See Appendix <ref> for the proof of rotation invariance.
This implies that, for any parameter q of a single-qubit gate of interest, there exists the optimal parameter configuration {q_i} such that q∈{q_i}.
This property allows for one reduction of the total number of measurements required in the matrix construction, i.e. reduced to two for Rotosolve, five for Fraxis, and nine for FQS by diverting the previous results to the subsequent gate update. The reduction for Rotosolve has been known before <cit.> but not for Fraxis and FQS. In each step of the sequential optimizations, the resulting cost value after the parameter update can be estimated without additional measurement.
Since all parameters are fixed except for that of the target gate, this estimated cost can be regarded as one of the observable expectation value b_1 in the subsequent application, where the parameter q_1 of the next gate of interest is diverted from the previous application.
The detailed procedure is as follows; (1) Prepare an optimal parameter configuration {q^*}, the gate parameter set {q^(m)} for m = 1,⋯,M, and the temporal cost value ⟨H|(⟩{q^(m)}) where m and M denote the gate index and the total number of parametrized gates, respectively.
(2) Finds a rotation matrix R such that q_1^*=R^Tq^(m) where the mth gate is of interest and sets b_1=⟨H|$⟩.
(3) Measure the cost values with the parameter{R q_i^*}fori=2,⋯N_minsettingb_i=⟨H|(⟩Rq_i^*).
(4) Construct the matrixGfromband{R q_i^*}(5) Diagonalise the matrix to estimate the new parameterq^(m)and the new cost⟨H|$⟩, which can be reused in the next iteration and go back to (2) until convergence.
The pseudo-code of this procedure is given in Algorithm <ref>.
§.§ Optimal configurations
The minimum size of parameter configuration (N_min) for Rx, Fraxis, and FQS are 3, 6, and 10, respectively.
According to Corollary <ref>
in the case of the Rx gate,
the three equiangular vectors on a unit circle are trivially represented by q = [cos2/3π nθ, sin2/3π nθ]^T for n=0,± 1, that is, the vector angle Δθ=2π/3 (equivalently π/3)
as shown in Figure <ref>A.
In contrast, the original parameter configuration proposed in Rotosolve <cit.> was Δθ=π/2, which resulted in C(A)=3/2.
(It is worth noting that in <cit.> it is argued that arbitrary parameter configurations can be used due to the sine property of the expectation value but did not discuss the estimation accuracy dependent on the parameter configurations under the finite measurements.)
To achieve the same estimation accuracy, our optimal parameter configuration (Δθ= 2π/3) requires two-thirds as many shots as the original parameter configuration (Δθ=π/2).
Corollary <ref> is also instrumental for Fraxis with d=3. It is also possible to find the equiangular formation of six unit vectors in 3D space.
Figure <ref>B shows the unique optimal parameter configuration except for the rotational degrees of freedom, where they form a regular icosahedron.
The original parameter configuration of Fraxis has C(A) = 1.8 <cit.> (See Appendix <ref>).
Thus, the optimal configuration improves the estimation accuracy 1.8 times with the consistent number of shots.
In contrast, it was proved that N_min (=10) equiangular unit vectors cannot be placed in d (=4) dimensional Euclidean space.
Namely, Corollary <ref> tells that there is no parameter configuration that satisfies C(A)=1 for N=10.
In addition, Corollary <ref> also implies that the minimum size of the parameter configuration (N=10) may not be the most efficient if the total number of shots are limited for a single FQS execution, although it is not straightforward to know the analytical minimum value and the corresponding parameter configurations.
Instead, we searched the numerical solution by classical optimization, where C(A) is minimized based on the gradient descent method.
Since the algorithm may lead to a local minimum solution, we repeated the algorithm independently 10^5 times starting from random initial configurations.
For N=10, we have obtained the same optimized C-cost value (C(A)≈ 1.033172) from all the initial configurations as far as our experimental trials, which implies that all simulations presumably reached to the global minimum.
Although the obtained configurations were not numerically identical,
we found that they were attributed to a unique configuration just by reversal and rotational operations.
Since the reversal of each parameter does not affect the expectation value (i.e., h(q)=h(-q)) and the uniform rotation of the parameter configuration gives the indentical value of the C-cost (See Sec. <ref>),
all the configurations were equivalent, which seem to be optimal.
Figure <ref>C shows the unique optimal parameter configurations for the FQS case.
In this figure, the parameter configurations are projected into 3-dimensional space by a stereographic projection. It means that extra 1D components that cannot be displayed are projected in the radial direction.
See Appendix <ref> for the parameter values of the optimal and other parameter configurations.
From the parameter values of the (numerically obtained) optimal parameter configurations (Eq. (<ref>)), we can see the optimal parameter configurations has highly symmetrical structure; the first four parameters {q_1, ..., q_4} and its opposite {-q_1, ..., -q_4} constitute a regular cube in a hyperplane and the last six parameters {q_5, ..., q_10} constitute a regular octahedron in a hyperplane (its opposite also constitute another regular octahedron) as shown in Fig. <ref>.
For FQS, the original parameter configuration has C(A) = 3.0 and the optimal parameter configurations estimated with numerical experiments is approximately C(A)≈ 1.033172.
And thus, to achieve a certain accuracy, the optimal parameter configuration reduces the number of required shots 3 times than that of the original.
Likewise, we also conducted the numerical optimization to find the optimal parameter configuration for redundant measurements with N=11, 12.
As a result, all the optimizations converged to a consistent value of C(A) within computational precision, which is consistent with the case of N=N_min.
However, the optimal configurations are not necessarily unique, which is in contrast to N=N_min.
While the obtained C(A) was ≈ 1.005390 for N=11, C(A) was exactly converged to unity for N=12.
It is also notable that the optimal configurations of C(A)=1 for N=12 include the regular 24-cell polytope in 4-dimensional space as shown in Fig. <ref>D.
Therefore, If the total number of shots for A matrix construction is constant, the optimal sizes of N are three for Rotosolve, six for Fraxis, and twelve for FQS.
Next, we focus on the optimal N allowing the reduction of measurements exploiting the rotation invariance as mentioned in Sec. <ref>.
Assuming a constant number of shots per gate, the measurement reduction modifies the relation between C(A) and s_min as
Var[λ_1^*] = σ^2/s_minN-1/NC(A).
where the C-cost is apparently scaled by (N-1)/N.
Note that this factor does not change the optimal N for Rotosolve and Fraxis.
Thus,
it is most efficient to revert the estimated value in previous optimization to construct A and additionally execute two and five measurements for Rotosolve and Fraxis, respectively.
It is worth noting that Table. <ref> shows that
the optimal N for FQS is shifted from twelve to eleven by measurement reduction, although the difference is smaller than 1 %.
Altogether, under limitation of the total number of shots, it is most efficient to construct the matrix A by three-, six-, and twelve-type measurements for the expectation values
in the beginning of Rotosolve, Fraxis, and FQS optimizations, respectively.
In contrast, during the sequential optimization, matrix A should be made by one estimation value from the previous step and two, five, and ten values from subsequent measurements of Rotosolve, Fraxis, and FQS, respectively.
It should be also noted that this optimal condition may differ depending on the supposed condition of real devices.
For instance, if parallel computation is allowed, where a constant number of shots are available for evaluating an expectation value even though when N varies, C(A) would not be an appropriate metric because the assumption about the number of shot is not valid, and thus one should trivially employ as large N as as possible.
§ EXPERIMENTS
In the following, we provide several experiments to numerically verify our proposed method on the condition of N=N_min.
§.§ Estimation Accuracy of One-time Optimization with Different Parameter Configurations
We focused on the one-time optimization rather than an entire VQE processes.
To this end, we examined the averaged error of FQS between the exact minimum and the estimated minimum energies with limited number of shots for several parameter configurations.
We used the 2-qubit Hydrogen molecule-like Hamiltonian <cit.> defined as
H = I⊗ Z + Z⊗ I + X⊗ X
in this experiment.
We use the 2-qubit ansatz in Fig. <ref>, where we applied the corresponding single-qubit gate representation of Rotosolve (=RzRy), Fraxis, and FQS methods to U_i.
Here, the target gate to be optimized is U_2 for the FQS and Fraxis and the Ry gate in U_2 for the Rotosolve case.
The experiments were performed as the following procedure.
(1) prepare 100 independent parameter configurations, where the parameters of all the gates were randomly initialized with uniform probability distribution, which was followed by 50 iterations of the steepest decent optimization using C(A) as a cost function.
(2) evaluate A^+ and C(A) of the 100 parameter configurations.
(3) randomly initialize the PQC in the state-random manner for the respective single-qubit gates <cit.>.
(4) obtain b (and b^*) by the observable measurements based on the 100 parameter configurations,
and evaluate FQS matrices G (and G^*) using the respective sets of A^+, b (and b^*).
(5) execute FQS (Fraxis/Rotosolve) for G (and G^*) to obtain p (and p^*).
We repeat the procedure (3)–(5) 10^4 times and evaluate the averaged error ⟨Δ E ⟩ in Eq. (<ref>) for each parameter configuration.
Note that we optimized the parameter configuration in process (1) above because the raw values of C(A) distributed beyond 10^4 otherwise.
In Fig. <ref>, we plotted 100 independent parameter configurations in C(A) vs. ⟨Δ E|$⟩ graph.
By definition,C(A)and⟨ΔE|$⟩ are metrics to qualify the estimated energy and the estimated parameter, respectively.
Although both the metrics are linked through the following equation,
N_min d/NC(A) + sd(d-1) /kσ^2𝔼[Δ E] = Tr[(A^TA)^-1],
the concrete behaviors are not necessarily trivial because of dependency on A and the observable.
Here, we confirmed that the energy errors ⟨Δ E|$⟩ are roughly proportional toC(A)for all the cases, and⟨ΔE|$⟩ is inversely proportional to the number of shots approximately.
We also found that the optimal parameter configuration (red) achieves the lowest error⟨Δ E|$⟩, indicating that the optimal parameter configurations are actually effective to minimize the estimation error.
Although the magnitude of⟨ΔE|$⟩ in FQS is seemingly larger than that of Rotosolve, we note that it does not necessarily indicate the advantage of Rotosolve with respect to error suppression because the single gate expressibility is not comparable among the respective methods.
For instance, sequential Rotosolve applications of a series of three single-qubit gates are comparable to one-time FQS application.
In this case, however, it is not straightforward to compare them because of error propagation, which is beyond the present framework.
In the next section, instead, we examine the effect of the parameter configuration on the entire performance in comparison with the optimization methods.
§.§ The Influence of the C-cost on VQE Performances
We investigate the effect of different parameter configurations on the results of VQE when we sequentially optimize single-qubit gates in quantum circuits by the framework of FQS <cit.>.
We employed the 5-qubit quantum Heisenberg model <cit.> defined as
H = J∑_i=1^5∑_σ=X,Y,Zσ_i σ_i+1
+ h∑_i=1^5 Z_i
where σ_i=I^⊗ i-1⊗σ⊗ I^⊗ 5-i(1≤ i≤ 5), σ_6=σ_1.
We herein set J=h=1.
We used a Cascading-block ansatz shown in Fig. <ref>, where the gates within the dashed lines are repeated L times.
We set L=1, 3, 5 in this experiment.
According to the optimization method, we applied the respective single-qubit representations to U_i in the PQC.
We begin VQE with randomly initialize PQC in the state-random manner for respective single-qubit gates in the PQC.
In VQE, we sequentially applied Rotosolve/Fraxis/FQS to U_i in the order of subscripts in Fig. <ref>, i.e., from the top-left to the right bottom.
We term this procedure to update all gates in the PQC once as sweep.
In a single VQE run, we carried out 100 sweeps to obtained the estimated minimum eigenvalue E of the Hamiltonian.
We performed independent 100 VQE runs and plotted the error distribution Δ E := E - E^* for respective 100 trials in Fig. <ref>, where E^* is the exact minimum eigenvalue of the Hamiltonian.
We evaluated the resulting distributions using the number of shots to 100, 1000, 10000, and ∞ for two or three different parameter configurations (See Appendix <ref> for the specific parameter values).
Note that we used a statevector for VQE with an infinite number of shots.
Figure <ref> suggests that parameter configurations strongly affect the entire VQE performance and shows that the optimized parameter configuration (C(A)≃1) achieves the smallest errors on all the conditions with the finite numbers of shots.
The optimal parameter configuration works more effectively
as the number of shots is smaller, which is in line with the analysis of the one-time application to a single-qubit gate in Fig. <ref>.
In addition, the impact of the parameter configuration on the VQE performance is not visible on shallow circuit and more distinct as the number of the layer increases.
In general, more expressive ansatz can potentially approximate the state of interest with higher precision.
Correspondingly, one has to increase the number of shots, because for accuracy ϵ, the number of required shots scales in 𝒪(1/ϵ^2).
Otherwise, the enhanced expressibility by the circuit extension may not be highlighted.
Since the gain of C(A) is equivalent to the increase of measurements, the optimal parameter configuration will be more beneficial as desired accuracy in VQE becomes higher.
In fact, FQS is superior to Rotosolve and Fraxis and the statevector simulation implies that FQS with ansatz of L=5 can potentially achieve the accuracy ϵ < 10^-2.
However, it is less likely to reach this energy level with the 10000 shots which is a practical standard for the present quantum devices, i.e. IBM-Q device.
There, the parameter optimization assists VQE lowering the reachable energy level distinctively, although it is not the case for Rotosolve and Fraxis because the number of shots available are sufficient relative to their expressibility.
§ CONCLUSIONS
In this work, we showed that the parameter configuration affects the performance of analytical optimization of a single-qubit gate.
This estimation error was quantified by the C-cost C(A), the variance of the estimated value of the cost function.
We theoretically proved that the lower bound of C(A) is unity.
We also showed that when the size of the parameter configuration is minimal, the C-cost becomes unity if and only if the parameter configuration satisfies the equiangular condition.
Exploiting this property, we found the optimal parameter configuration for Rotosolve and Fraxis.
Although we revealed no parameter configuration of minimum size for FQS achieves C(A)=1, it turned out the parameter configuration of N=12 corresponding to the regular 24-cell polytope in the 4-dimensional space satisfies C(A)=1.
In addition, we also demonstrated how to reduce the number of measurements for matrix construction by making use of the rotation invariance of C(A).
Then, the optimal parameter configurations exhibited the best results improving efficiency 1.5 times for Rotosolve, 1.8 times for Fraxis, and 3.0 times for FQS, when compared to the original parameters.
Additional numerical experiments showed that the parameter configuration affects the performance of not only the one-time optimization but also the entire VQE.
We also found that the parameter configuration is more instrumental to elicit the VQE performance as the ansatz becomes more expressive.
§ ACKNOWLEDGEMENTS
R.R. would like to thank Prof. David Avis of Kyoto University for the discussion on equiangular lines.
H.C.W. was supported by JSPS Grant Numbers 20K03885.
N.Y. and H.C.W were supported by the MEXT Quantum Leap Flagship Program Grant Number JPMXS0118067285 and JPMXS0120319794.
§ APPENDIX
§.§ Free Quaternion Selection
We show the minimum value of Eq. (<ref>) is the minimum eigenvalue λ_1 of G achieved when q = p_1 for the corresponding eigenvector p_1 of G.
For the Lagrange multiplier method, we first define a function, l(q,λ), corresponding the above optimization problem as
l(q,λ) = q^T G q - λ ( q^2 -1 ),
where λ is a Lagrange multiplier.
Taking the partial derivatives for l(q,λ) and setting them to zero, we can obtain
Gq = λq.
Thus, the candidates for the local minimum/maximum value of l(q,λ) and the solutions are the eigenvalues λ_i and its normalized eigenvectors p_i, respectively.
Substituting the normalized eigenvectors p_i into Eq. (<ref>), we get
⟨ H ⟩
=p^T_i G p_i
=p^T_i (λ_i p_i)
=λ_i,
this means the global minimum value of Eq. (<ref>) and its solution are given by the minimum eigenvalue λ_1 and the corresponding normalized eigenvector p_1.
§.§ A proof on the sufficiency of independent unitary matrices for energy estimation
In Section <ref> we showed that exactly three, six, and ten circuit evaluations of linearly independent single-qubit gates at a particular single-qubit gate of a PQC to be optimized by, respectively, NFT/Rotosolve, Fraxis, and FQS, are sufficient to determine the energy landscape of the PQC with respect to the given Hamiltonian H.
In the case of NFT/Rotosolve, such circuit evaluations at arbitrary configurations are known from the sine property of the energy function but how to select the best parameter configurations was not discussed.
On the other hand, Fraxis and FQS require the single-qubit gate to be replaced by a fixed set of gates.
For example, using the FQS framework to optimize the gates of NFT/Rotosolve optimizing the R_X gate, the gate set is {I, X, 1/√(2)(I+X)} and the resulting expectation values are the elements of the matrix in Eq. (<ref>), i.e., G_II, G_XX, G_IX.
Similarly, in the case of Fraxis, the gate set is {X, Y, Z, 1/√(2)(X+Y), 1/√(2)(X+Z), 1/√(2)(Y+Z)} and the expectation values are those in Eq. (<ref>).
In the case of FQS, the gate set is the union of that of Fraxis with {I, 1/√(2)(I+X), 1/√(2)(I+Y), 1/√(2)(I+Z)} and the expectation values are those in Eq. (<ref>).
Here, we provide a proof of the sufficiency by showing that we can uniquely identify the matrix in Eq. (<ref>) from running the PQC by replacing the single-qubit gate with ten arbitrary independent single-qubit gates parametrized by unit vectors q_1, …, q_10. The term independent will be explained later.
For simplicity, we only describe the proof for FQS but it should be clear that similar arguments can be used to prove the cases for NFT/Rotosolve and Fraxis.
From Eq. (<ref>) and (<ref>), we know that with respect to the single-qubit gate parametrized by q_i ∈ℝ^k it holds that
<H>_i ≡ b_i = q_i^T G q_i
= (q_i^T ⊗ q_i^T) (G),
for i = 1, …, m, where the second equality holds due to the “vec-trick” while (G) is the vectorization of the matrix G.
Because G is a symmetric k × k matrix, we can conclude that the degree of freedom of (G) ∈ℝ^k^2 is at most k(k+1)/2, i.e., 10 for FQS(k=4), 6 for Fraxis (k=3), and 3 for NFT/Rotosolve (k=2). In fact, there is one-to-one correspondence (linear transformations) between (G) and g in Eq. (<ref>).
Similarly, we can also confirm that the degree of freedom of q_i^T⊗q_i^T is also k(k+1)/2.
Let Q be the matrix whose i-th row is q_i^T⊗q_i^T. We then obtain the following linear equality.
b = Q (G),
where b∈ℝ^m for Q ∈ℝ^m× k^2. Due to its construction, the rank of Q is at most min(m, k(k+1)/2). For m ≤ k(k+1)/2, the rank of Q is exactly m if and only if q_i^T⊗q_i^T are linearly independent for i = 1,… m. Namely, the following equality holds if and only if α_i = 0 for all i.
∑_i = 1^m α_i q_i^T⊗q_i^T = 0.
We call such q_i's as independent.
Now, we can argue that (G) is uniquely determined if (Q) is at least the degree of freedom of (G), which is at most k(k+1)/2. Such Q can be realized by selecting up to k(k+1)/2 independent q_i's. Suppose that (G) is of maximum degree of freedom but (Q) < k(k+1)/2. Then, there exists G' ≠0 such that Q (G') = 0. In such case, (G) is not uniquely determined because
Q (G) = Q ((G) + (G')) = 𝐛.
Thus, by selecting k(k+1)/2 independent unit vectors q_i ∈ℝ^k, we can uniquely determine (G) which then enables us to evaluate the expectation value of the given Hamiltonian when the corresponding single-qubit gate is replaced by arbitrary unitary gate. This implies that k(k+1)/2 arbitrary independent single-qubit gates are sufficient for FQS, Fraxis, and NFT/Rotosolve, each for k=4,3,2 respectively. When the dimension of (G) is exactly k(k+1)/2, as happened for some PQCs, the number k(k+1)/2 of arbitrary independent single-qubit gates is also a necessary condition.
§.§ Derivation of Analytical form of the Measures
§.§.§ Expectation value over an orthogonal basis
We show several equations that are useful for derivation of analytical form of the measures.
Let Z ∈ℝ^d× d be a random symmetric matrix which
satisfies 𝔼[Z_ij] = 0 for all i,j.
Independently, let P=(p_1,...,p_d)^T ∈ℝ^d× d be a random orthogonal matrix (i.e., the matrix is uniformly sampled from the orthogonal group O(4)).
Then, the following equations holds:
𝔼[p_i^*T Z p_j^*]
= ∑_k,l𝔼[ (p_i^*)_k (p^*_j)_l Z_kl ]
= ∑_k,l𝔼[ (p_i^*)_k (p^*_j)_l ] 𝔼[ Z_kl ]
= 0,
and so,
Var[p_i^*T Z p_j^*]
= 𝔼[(p_i^*T Z p^*_j)^2]
- 𝔼[p_i^*T Z p^*_j]^2
= 𝔼[(p_i^*T Z p^*_j)^2].
For i=j,
Var[p_i^*T Z p_i^*]
= 𝔼[(∑_k,l (p_i)_k Z_kl (p_j)_l)^2]
= ∑_k,l,m,n𝔼[ (p_i)_k (p_i)_l (p_i)_m (p_i)_n ]𝔼[ Z_kl Z_mn ]
= ∑_k(=l)∑_m(=n≠ k)𝔼[ (p_i)_k^2 (p_i)_m^2]
𝔼[ Z_kk Z_mm ]
+ ∑_k(=m)∑_l(=n≠ k)𝔼[ (p_i)_k^2 (p_i)_l^2]
𝔼[ Z_kl^2 ]
+ ∑_k(=n)∑_l(=m≠ k)𝔼[ (p_i)_k^2 (p_i)_l^2]
𝔼[ Z_kl Z_lk ]
+ ∑_k𝔼[ (p_i)_k^4]
𝔼[ Z_kk^2]
= ∑_k,l𝔼[ Z_kk Z_ll]+ 𝔼[ Z_kl^2] + 𝔼[ Z_kl Z_lk ]/d(d+2)
= ∑_k,l𝔼[ Z_kk Z_ll ]+ 2𝔼[ Z_kl^2]/d(d+2).
For the fourth equality, we employed the following relation.
𝔼[(x^T Z x)^2]
= d(d+2) 𝔼 [ ( x^T/x Z x/x )^2 ],
where x is a random vector in ℝ^d, which follows the d-dimensional multivariate standard normal distributions 𝒩(0,I), and x, Z are independent each other.
To evaluate Eq. (<ref>) for i j, we suppose another random vector y as x, but independent of x and Z.
𝔼[(x^T Z y)^2]
= 𝔼[(∑_i,j(x)_i Z_ij (y)_j)^2]
= 𝔼[∑_i,j,s,t (x)_i (x)_s Z_ij Z_st (y)_j (y)_t]
= ∑_i,j,s,t𝔼[ (x)_i (x)_s ]𝔼[ (y)_j (y)_t ]𝔼[ Z_ij Z_st ]
= ∑_i,j,s,tδ_j,sδ_i,t𝔼[ Z_ij Z_st ]
= ∑_i,j𝔼[ Z_ij^2 ].
Here, we introduce two vectors as
y_∥ = (y·x) /x^2 x, y_⊥ = y - y_∥.
Using these vectors, we obtained the following relation,
𝔼[(x^T Z y)^2]
= 𝔼[(x^T Z (y_∥+y_⊥))^2]
= 𝔼[(x^T Z y_∥)^2] +
𝔼[(x^T Z y_⊥)^2]
+
2𝔼[(x^T Z y_∥)(x^T Z y_⊥)]
= 𝔼[(x^T Z y_∥)^2] +
𝔼[(x^T Z y_⊥)^2].
For the third equality, we use the probability distribution f satisfies
f(x,y_∥,y_⊥)=f(x,y_∥,-y_⊥),
and thus
𝔼[(x^T Z y_∥)(x^T Z y_⊥)] =
𝔼[(x^T Z y_∥)(x^T Z (-y_⊥))],
equivalently,
𝔼[(x^T Z y_∥)(x^T Z y_⊥)]
= 0.
On the other hand,
𝔼[(p^*T_i Z p^*_j(≠ i))^2]
= 𝔼[(
x^T/x Z y_⊥/y_⊥)^2]
= 1/𝔼[x^2]
𝔼[y_⊥^2]𝔼[(x^T Z y_⊥)^2]
= 1/d(d-1)𝔼[(x^T Z y_⊥)^2]
where we suppose that the probability distribution f satisfies f(x/x,y_⊥/y_⊥ )=f(p_i,p_j(≠ i)), a.e., 𝔼[x^2]=d and 𝔼[y_⊥^2]=d-1.
In addition the first term in Eq. (<ref>)
𝔼[(x^T Z y_∥)^2]
= 𝔼[x^2 y_∥^2(
x^T/x Z y_∥/y_∥)^2]
= 𝔼[x^2]𝔼[y_∥^2]
𝔼[(
x^T/x Z y_∥/y_∥)^2]
= d 𝔼[(p^*T_i Z p^*_i)^2 ]
= ∑_k,l𝔼[ Z_kk Z_ll ]+ 2𝔼[ Z_kl^2]/d+2.
where the second equality arises from the independence of the random variables, and the third equality is based on
x/x=y_∥/y_∥, f(x/x)
= f(p_i), a.e., 𝔼[x^2]=d and 𝔼[y_∥^2]=1.
From Eq. (<ref>)(<ref>)(<ref>)(<ref>), we finally obtain
Var[p_i^*T Z p^*_j(≠ i)]
=E[(p_i^*T Z p^*_j(≠ i))^2]
=∑_k,ld 𝔼[Z_kl^2]-𝔼[Z_kkZ_ll]/d(d-1)(d+2).
§.§.§ Derivation of analytical form of Var[λ(ε)]
Using the noise model ⟨ϵ_i ⟩ = 0, ⟨ϵ_i ϵ_j ⟩ = σ^2 δ_i,j/s and the uniformly distributed model of the first eigenvector p_1^*. We show the analytical form of Var[λ_1(ϵ)] in Eq. (<ref>):
Var[λ_1(ϵ)] = Var[p_1^*Tvech^-1(D^-1A^+ϵ) p_1^*] .
For simplicity, we write Z=vech^-1(D^-1A^+ϵ).
Note that Z is a symmetric matrix and satisfies 𝔼[Z]=O because 𝔼[D^-1A^+ϵ]=D^-1A^+𝔼[ϵ]=0.
Thus, using Appendix <ref>,
Var[p_1^*T Z p_1^*] =
∑_i,j𝔼[ Z_ii Z_jj ]
+ 2 𝔼[ Z_ij^2]
/d(d+2).
Then, we deal with the first term ∑_i,j𝔼[ Z_ii Z_jj ] and the second term ∑_i,j𝔼[ Z_ij^2 ], separately.
To this end, we introduce some useful representations.
We note
Eq. (<ref>) can be rewritten as
<H>
= h(q)^T g
= (q^T⊗q^T) (G).
Here q is the parameter of the target single-qubit gate, G is the FQS matrix, and : ℝ^d× d→ℝ^d^2 is the vectorization operator for matrices.
Next, we introduce a linear transformation L∈ℝ^d^2 × d(d+1)/2 between the vector g and (G) in the Rx, the Fraxis, and the FQS gates as
L =[ 1 0 0; 0 0 c; 0 0 c; 0 1 0 ] , [ 1 0 0 0 0 0; 0 0 0 c 0 0; 0 0 0 0 c 0; 0 0 0 c 0 0; 0 1 0 0 0 0; 0 0 0 0 0 c; 0 0 0 0 c 0; 0 0 0 0 0 c; 0 0 1 0 0 0 ] , [ 1 0 0 0 0 0 0 0 0 0; 0 0 0 0 c 0 0 0 0 0; 0 0 0 0 0 c 0 0 0 0; 0 0 0 0 0 0 c 0 0 0; 0 0 0 0 c 0 0 0 0 0; 0 1 0 0 0 0 0 0 0 0; 0 0 0 0 0 0 0 c 0 0; 0 0 0 0 0 0 0 0 c 0; 0 0 0 0 0 c 0 0 0 0; 0 0 0 0 0 0 0 c 0 0; 0 0 1 0 0 0 0 0 0 0; 0 0 0 0 0 0 0 0 0 c; 0 0 0 0 0 0 c 0 0 0; 0 0 0 0 0 0 0 0 c 0; 0 0 0 0 0 0 0 0 0 c; 0 0 0 1 0 0 0 0 0 0 ],
respectively, where c=1/√(2).
Note that the transformation satisfies
L^T L
= I,
(G)
= L g,
And so,
(q^T⊗q^T) L
= h(q)^T.
We may also consider the inverse transformation of vectorization vec^-1: ℝ^d^2→ℝ^d× d as
^-1(Lg)
= G ∀g∈ℝ^d(d+1)/2,
and vech^-1: ℝ^d^2→ℝ^d× d,
vech^-1(D^-1g)=G ∀g∈ℝ^d(d+1)/2.
This leads to
Z = vech^-1(D^-1A^+ϵ) = vec^-1(LA^+ϵ).
Then, the first term in Eq. (<ref>) is rewritten as
∑_i,j𝔼[ Z_ii Z_jj ]
= 𝔼[ ∑_i,jvec^-1(LA^+ϵ)_iivec^-1(LA^+ϵ)_jj ]
= 𝔼[ ((I)^T LA^+ϵ)((I)^T LA^+ϵ)]
= σ^2/s ((I)^T LA^+ ·(I)^T LA^+)
= σ^2 /s(I)^T LA^+ (A^+)^T L^T (I)
= σ^2/s1_d^T A^+ (A^+)^T1_d
= σ^2/s1_d^T (A^TA)^-11_d
where I is the identity matrix, and 1_d:=L^T (I) is the vector in ℝ^d(d+1)/2 whose first d elements is unity and the rest are zero.
For the sixth equality, we used the folloing relation,
A^+(A^+)^T = ((A^TA)^-1A^T)((A^TA)^-1A^T)^T
= (A^TA)^-1 A^TA (A^TA)^-1
= (A^TA)^-1.
The second term in Eq. (<ref>) is also rewritten as
∑_i,j𝔼[Z_ij^2 ]
= 𝔼[ ∑_i,jvec^-1(LA^+ϵ)_ijvec^-1(LA^+ϵ)_ij ]
= 𝔼[ (LA^+ϵ)^T(LA^+ϵ)]
= σ^2/sTr[(LA^+)^T(LA^+) ]
= σ^2/sTr [A^+(A^+)^TL^TL]
= σ^2/sTr [(A^TA)^-1],
Summarizing Eqs. (<ref>),(<ref>),and (<ref>),
Var[λ_1(ϵ)] is expressed as
Var[λ_1]
=σ^2/s d(d+2)(
1_d^T (A^TA)^-11_d +
2Tr[ (A^TA)^-1 ])
= σ^2/sd(d+2)Tr[ (A^TA)^-1( 1_d 1_d^T + 2I)],
where the following identity:
1_d^T (A^TA)^-11_d = Tr[(A^TA)^-11_d 1_d^T]
is employed for the last equality.
§.§.§ Discussion of for the perturbation effect
Using the second-order perturbation theory of matrix <cit.>, the energy error Δ E is approximated as
Δ E = ∑_i>1^d (p_i^*Tvech^-1(D^-1A^+ϵ) p_1^* )^2 /λ_i^* - λ_1^* .
Note that Eq. (<ref>) is not applicable when the lowest-energy eigenstate is degenerated.
However, the following argument has been found to hold well experimentally.
This equation leads to:
𝔼[Δ E ] = 𝔼[
∑_i>1^d (p_i^*Tvech^-1(D^-1A^+ϵ) p_1^* )^2 /λ_i^* - λ_1^* ].
However, unlike Var[p_1(ϵ)],
this measure also depends on the probability distribution f(λ_1^*,...,λ_d^*) of the eigenvalues of the matrix G.
Assuming these eigenvalues are independent of each other, that is,
f(λ_1^*,...,λ_M^*) = ∏_i=1^d f(λ_i^*),
and the matrix of the eigenvectors P=(p_1,...,p_d)^T is a random orthogonal,
Eq. (<ref>) can be written as
𝔼[Δ E ]
= ∑_i>1^d
𝔼[
1/λ_i^* - λ_1^* ]
𝔼[
(p_i^*Tvech^-1(D^-1A^+ϵ) p_1^* )^2
]
= k𝔼[
(p_2^*Tvech^-1(D^-1A^+ϵ) p_1^* )^2
],
where k := ∑_i>1^d 𝔼[ (λ_i^* - λ_1^*)^-1].
This means the measure 𝔼[Δ E ] can be evaluated with some modeling of the true FQS matrix G and the measurement errors ϵ.
For simplicity, we now write Z=vech^-1(D^-1A^+ϵ).
From Eq.(<ref>) in Appendix <ref>
,
𝔼[Δ E ]
=k∑_i,jd 𝔼[Z_ij^2]-𝔼[Z_iiZ_jj]/d(d-1)(d+2)
= kσ^2/sd(d-1)(d+2)
×(d Tr[(A^TA)^-1] -1_d^T (A^TA)^-11_d)
= kσ^2/sd(d-1)(d+2)
×Tr[(A^TA)^-1(dI -1_d1_d^T)]
In addition, if C(A)=1, i.e. the case of theoretical lower bound, A^TA=N/d(d+2)(2I+1_d1_d^T) holds from Theorem <ref>.
As a result, we obtain
𝔼[Δ E ] =
kσ^2/s d(d+2) /4N,
where we used the following relation,
Tr[(A^TA)^-1(dI -1_d1_d^T)]
= d(d+2)/NTr[(2I+1_d1_d^T)^-1(dI -1_d1_d^T)]
= d(d+2)/NTr[(1/2I-1/2(d+2)1_d1_d^T)(dI -1_d1_d^T)]
= d(d+2)/NTr[d/2I-1/21_d1_d^T]
= d(d+2)/Nd/2 (N_min-1)
= d^2(d+2)^2 (d-1) /4N.
§.§ Proof of Theorem <ref> and Corollary <ref>
lemmaLemma
In this section, we first present useful lemmas to prove Theorem <ref> and its Corollary <ref> that allow for analytical calculation of the optimal bound of the C-cost.
The first lemma is trivial from the singular-value decomposition of a matrix A = UΣ V^T, where U, V are orthogonal matrices, and Σ is the diagonal matrix that contains the singular values of A.
Let A be a real matrix. The multiset of non-zero eigenvalues of AA^T is the same as the multiset of non-zero eigenvalues of A^TA.
Let A be a real symmetric matrix such that one of its eigenvalues is a and the rest are b's. Then, it holds that A = (a-b) uu^T + b I where u is the (normalized) eigenvector corresponding to the eigenvalue a.
Easy by seeing that Au = a u, and Av = b v hold for every v which is orthogonal to u, i.e., v^T u = 0.
Let A be an n× n positive definite matrix with the largest eigenvalue λ_max and the smallest eigenvalue λ_min such that κ = λ_max / λ_min. It is known that n^2/κ≤(A) (A^-1) ≤ n^2 κ holds with equality if and only if κ = 1, i.e., A = λ I for some λ > 0. We formalize this in the following lemma.
Any positive-definite real symmetric matrix A∈ℝ^n× n satisfies A^-1≥ n^2A^-1 with equality if and only if A= λ I for λ > 0.
We now prove Theorem <ref> and its Corollary <ref> concerning lower bounds and its equality conditions for C-cost.
Here we revisit Theorem <ref> for convenience.
Suppose a single-qubit gate expressed by a parameter q in ℝ^d where |q|=1.
Let {q_1, ⋯, q_N } be a parameter configuration and let A be the corresponding matrix A=[h(q_1),⋯,h(q_N)]^T in ℝ^N× N_min where N≥ N_ min≡ d(d+1)/2.
The C-cost C(A) defined as
C(A)
=N/N_mind(d+2) Tr[ (A^TA)^-1(1_d1_d^T+2I)]
satisfies C(A) ≥ 1
with equality if and only if the parameter configuration {q_i } and A satisfy
A^TA = N/d(d+2) (1_d1_d^T + 2I).
Using the Woodbury matrix identity giving
( 1_d 1_d^T + 2I )^-1 = ( 1/2I - 1/2(d+2)1_d 1_d^T ),
we obtain the lower bound of Eq. (<ref>) as
(A^T A)^-1(1_d1_d^T + 2I)
= ( (1_d1_d^T + 2I )^-1 (A^T A))^-1
= ( 1/2A^T A - 1/2(d+2)1_d 1_d^T A^T A)^-1
≥ N_min^2 1/2A^T A - 1/2(d+2)1_d 1_d^T A^T A^-1
= N_min d(d+2)/N
where the inequality in the fourth line is derived by Lemma <ref>.
To obtain the last line, we use A^T A = A A^T = N and 1_d 1_d^T A^T A = N as well as
N_min = d(d+1)/2.
Therefore, C(A)≥ 1.
According to Lemma <ref>, the equality in the fourth line in Eq. (<ref>) is given as
1/2A^T A - 1/2(d+2)1_d 1_d^T A^T A
= λ I,
where λ is a constant.
Tracing over both sides of Eq. (<ref>), we have
λ
= N/d(d+2).
Therefore, C(A)=1 if and only if
A^T A = N/d(d+2)(1_d 1_d^T + 2I ).
For the minimum number of parameters (N=N_min),
it holds that C(A) ≥ 1 with equality if and only if the parameter configurations {q_i}_i=1^N satisfy
|q_i·q_j| = 1/√(d+2) (for all i≠ j).
We show
Eq. (<ref>) is equivalent to Eq.(<ref>) if N=N_min.
We first show
A^T A = N_min/d(d+2)(1_d 1_d^T + 2I )
⟹
|q_i·q_j| = 1/√((d+2)) (for all i≠ j) .
Recall that
A = [h(q_1), ⋯, h(q_N) ]^T.
If N=N_min, both AA^T and A^TA lie in ℝ^N_min× N_min,
A^TA=∑_i^N_minh(q_i) h(q_i)^T
and so
∑_i=1^N_minh(q_i) h(q_i)^T =N_min/d(d+2)(1_d 1_d^T + 2I )
Multiplying both sides by 1_d from the right, we obtain
∑_i=1^N_minh(q_i) = N_min/d1_d,
According to Lemma <ref>, A^T A and AA^T have the identical set of non-zero eigenvalues, i.e. one of eigenvalues is d+2 and the rest are 2.
Then, using Lemma <ref>,
A A^T can be expressed as
A A^T = N_min/d(d+2)(d vv^T + 2I ),
where v∈ℝ^N_min is a unit vector.
On the other hand,
the (i,j)-component of AA^T has a relation
(AA^T)_ij=h(q_i)^T h(q_j)
= N_min/d(d+2)(d v_i v_j + 2 δ_ij).
Summing Eq. (<ref>) over j from 1 to N_min and using h(q)^T 1_d=1 and Eq. (<ref>), we obtain
v_j = 1/∑_i^N_min v_i.
Since v is a unit vector, v = ±1_N_min / √(N_min), where 1_N_min∈ℝ^N_min is a vector whose all elements are 1.
Therefore,
h(q_i)^T h(q_j) = 1/d+2, for i ≠ j.
Using the relation h(q_i)^T h(q_j) = (q_i ·q_j)^2, we obtain
| q_i ·q_j(≠ i) | = 1/√(d+2).
Next, we prove that
|q_i·q_j|
= 1/√((d+2)) (for all i≠ j)
⟹
A^T A =
N/d(d+2)(1_d 1_d^T + 2I ) .
Using the relation h(q_i)^T h(q_j) = (q_i ·q_j)^2 and |q_i|^2=1 again, we obtain
h(q_i)^T h(q_j) = 1/d+2 + d+1/d+2δ_ij.
Since h(q_i)^T h(q_j) is the (i, j)-component of A A^T, we can write
A A^T = N_min/d(d+2)( d/N_min1_N_min1_N_min^T + 2I ),
because of N_min = d(d+1)/2.
Using Eq. (<ref>), Lemmas <ref> and <ref>, we can write A^T A as
A^T A = N_min/d(d+2)(d v' v'^T + 2I ),
where v'=[v'_1, …, v'_N_min]^T is a unit vector.
Since A^T A = ∑_i h(q_i) h(q_i)^T and ∀ i, h(q_i)^T 1_d = 1, multiplying Eq. (<ref>) by 1_d from the right side yields
∑_i h(q_i) = N_min/d(d+2)( d v' v'^T 1_d + 2 1_d ).
Summing Eq. (<ref>) over i and j from 1 to N_min, we obtain
∑_i, jh(q_i)^T h(q_j) = N_min^2/d,
which further yields
(1_d^T v')^2 = d,
by substituting Eq. (<ref>) into Eq. (<ref>) and rearranging the resultant equation.
Since 1_d = √(d), Eq. (<ref>) means v' = ±1_d / √(d).
Therefore, Eq. (<ref>) becomes
A^T A = N_min/d(d+2)( 1_d 1_d^T + 2I ),
which is just the equality conditon of C(A) = 1.
§.§ Proof of rotation invariance of C-cost
Here, we prove the C-cost C(A) is invariant with respect to the parameter rotations as
C(A) = C(A_R),
where the subscript R stands for the rotated parameter set.
Let {q_1, q_2, ..., q_N } be the original parameter configuration.
Then, a rotation matrix R ∈ SO(d) gives another parameter configutation { Rq_1, Rq_2, ..., Rq_N }.
For convenience, we define a matrix Q as
Q = ( q_1 ⊗q_1, q_2 ⊗q_2, ..., q_N ⊗q_N )^T.
Likewise,
Q_R = ( (Rq_1) ⊗ (Rq_1), ..., (Rq_N) ⊗ (Rq_N) )^T
= Q (R^T ⊗ R^T).
Using Eq. (<ref>) in Appendix <ref>, Q is linked to A as
AL^T = Q and A=QL.
which implies Q encodes the parameter configurations as well as A.
Thus, the matrix A for the rotated parameter set is given as
A_R L^T = Q(R^T ⊗ R^T) and A_R=Q(R^T ⊗ R^T)L.
From Eq. (<ref>) and (<ref>), the C-cost contains the Gram matrix A^TA.
For the rotated parameter set, the corresponding Gram matrix is given as
A_R^TA_R = L^T (R⊗ R) Q^T Q (R^T⊗ R^T) L
= L^T (R⊗ R) L A^T A L^T (R^T⊗ R^T) L
= R_L A^TA R_L^T,
where we denote R_L:=L^T (R⊗ R) L.
In fact, the first and second terms of Eq. (<ref>) are independently invariant for parameter rotations as follows.
For the first term 1_d (A^TA)^-11_d^T (Eq. (<ref>)), the rotated version of the first term is expanded as
1_d^T (A^T_RA_R)^-11_d
= 1_d^T (R_L A^TA R_L^T)^-11_d
= (R_L^-11_d)^T (A^TA)^-1 R_L^-11_d
= 1_d^T (A^TA)^-11_d,
where we use the fact R_L^-11_d = 1_d, which is easily derived as
R_L1_d
= L^T(R⊗ R) LL^T (I)
= L^T LL^T (R⊗ R) (I)
= L^T (R⊗ R) (I)
= L^T (R I R^T)
= L^T (I)
= 1_d,
where we employed LL^T(R⊗ R)=(R⊗ R)LL^T and L^TL=I.
This equations implies the first term is rotation invariant.
For the second term Tr[ (A^TA)^-1 ] (Eq. (<ref>)), the rotated version of the second term is expanded as
Tr[ (A^T_RA_R)^-1 ]
= Tr[ (R_L A^TA R_L^T)^-1 ]
= Tr[ (A^TAR_L^TR_L)^-1 ]
= Tr[ (A^TA)^-1 ]
where for the second equality I = R_L^TR_L is employed, which is derived as
R_L^TR_L
= L (R^T⊗ R^T) L L^T (R ⊗ R) L
= L^T L L^T(R⊗ R)(R^T ⊗ R^T) L
= L^T L L^T((RR^T)⊗ (RR^T)) L
= L^T L L^T L
= I,
where we employed LL^T(R⊗ R)=(R⊗ R)LL^T and L^TL=I.
This equations implies the second term is rotation invariant.
Consequently, the C-cost is rotation invariant, because both the two terms in the C-cost are rotation invariant. (𝔼[Δ E] is also rotation invariant, because it is the weighted sum of these two terms.) □
§.§ Comparison of our Parameters with the original methods.
We show the parameter values used as a sequential optimization in the main text as follows. The parameters are in no particular order.
§.§.§ Rx gate
The original parameter configuration for Rx gate
r_1, r_2, r_3 proposed in <cit.> is represented as
[ r^T_1; r^T_2; r^T_3 ]
=
[ 1 0; cos(π/4) sin(π/4); cos(π/4) -sin(π/4) ].
The unique optimal parameter configuration for Rx gate with minimum number parameter set r_1, r_2, r_3 is analytically derived as
[ r^T_1; r^T_2; r^T_3 ]
=
[ 1 0; cos(π/3) sin(π/3); cos(π/3) -sin(π/3) ]
and its arbitrary rotation and (individual) reversal.
§.§.§ Fraxis gate
The original parameter configuration for Fraxis gate
n_1, n_2, ..., n_6 proposed in <cit.> is represented as
[ n^T_1; n^T_2; n^T_3; n^T_4; n^T_5; n^T_6 ]
= 1/√(2)[ √(2) 0 0; 0 √(2) 0; 0 0 √(2); 1 1 0; 1 0 1; 0 1 1 ].
The unique (up to arbitrary rotation and individual reversal) optimal parameter configuration for Fraxis gate with minimum number parameter set n_1, n_2, ..., n_6 is analytically derived as the vertices of icosahedron
[ n^T_1; n^T_2; n^T_3; n^T_4; n^T_5; n^T_6 ]
=
1/√(1+φ^2)[ 0 1 φ; 0 1 -φ; 1 φ 0; 1 -φ 0; φ 0 1; -φ 0 1 ],
where φ = 1+√(5)/2 is the golden ratio.
§.§.§ FQS gate
The original parameter configuration for FQS
q_1, q_2, ..., q_10 proposed in <cit.> is represented as
[ q^T_1; q^T_2; q^T_3; q^T_4; q^T_5; q^T_6; q^T_7; q^T_8; q^T_9; q^T_10 ]
=
1/√(2)[ √(2) 0 0 0; 1 -1 0 0; 1 0 -1 0; 1 0 0 -1; 1 1 0 0; 1 0 1 0; 1 0 0 1; 0 1 1 0; 0 1 0 1; 0 0 1 1; ].
The symmetric parameter configuration for FQS gate
q_1, q_2, ..., q_10 which is only used for the experimental results in main text is represented as
[ q^T_1; q^T_2; q^T_3; q^T_4; q^T_5; q^T_6; q^T_7; q^T_8; q^T_9; q^T_10 ]
=
1/√(2)[ √(2) 0 0 0; 0 √(2) 0 0; 0 0 √(2) 0; 0 0 0 √(2); 1 1 0 0; 1 0 1 0; 1 0 0 1; 0 1 1 0; 0 1 0 1; 0 0 1 1; ].
The unique optimal parameter configuration for FQS gate with minimum number parameter set q_1, q_2, ..., q_10 is numerically derived as
[ q^T_1; q^T_2; q^T_3; q^T_4; q^T_5; q^T_6; q^T_7; q^T_8; q^T_9; q^T_10 ]
=
[ a b b b; b a b b; b b a b; b b b a; c c d d; c d c d; c d d c; d c c d; d c d c; d d c c ]
and its arbitrary rotation and (individual) reversal, where a=√(3)/2, b=-1/(2√(3)), and c^2 + d^2 = 1/2, where c ≈ 0.7049, d ≈ -0.0561.
§.§ ΔE Distributions sampled with various parameter configurations
In the experiment in Sec. <ref>, we performed optimization of only one gate to investigate the estimation error of the target gate.
In the main text we shows only the case of U_2 (Ry gate in U_2 for Rotosolve case) as the target gate.
In this section we show another case, that is the case of the target gate is U_0 for the FQS and Fraxis case and the Ry gate of U_0 for the Rotosolve case.
Note that the number of shot per circuit S is set to 10, 100, 1000 and the parameters of all the gates are initialized to random values and only the target gate is optimized.
Fig. <ref> shows the results of all the additional experiments. The title of each subplot tells the target gate and other settings.
|
http://arxiv.org/abs/2303.06893v1
|
20230313064312
|
On proximal augmented Lagrangian based decomposition methods for dual block-angular convex composite programming problems
|
[
"Kuang-Yu Ding",
"Xin-Yee Lam",
"Kim-Chuan Toh"
] |
math.OC
|
[
"math.OC"
] |
2022
thmstyleone
theoremTheorem
proposition[theorem]Proposition
thmstyletwo
exampleExample
remarkRemark
thmstylethree
definitionDefinition
assumptionAssumption
lemmaLemma
corollaryCorollary
|
http://arxiv.org/abs/2303.07005v1
|
20230313110134
|
Real-Time Audio-Visual End-to-End Speech Enhancement
|
[
"Zirun Zhu",
"Hemin Yang",
"Min Tang",
"Ziyi Yang",
"Sefik Emre Eskimez",
"Huaming Wang"
] |
eess.AS
|
[
"eess.AS"
] |
Appendix
Mengchao He
March 30, 2023
==================
Audio-visual speech enhancement (AV-SE) methods utilize auxiliary visual cues to enhance speakers' voices. Therefore, technically they should be able to outperform the audio-only speech enhancement (SE) methods. However, there are few works in the literature on an AV-SE system that can work in real time on a CPU. In this paper, we propose a low-latency real-time audio-visual end-to-end enhancement (AV-E3Net) model based on the recently proposed end-to-end enhancement network (E3Net). Our main contribution includes two aspects: 1) We employ a dense connection module to solve the performance degradation caused by the deep model structure. This module significantly improves the model's performance on the AV-SE task. 2) We propose a multi-stage gating-and-summation (GS) fusion module to merge audio and visual cues. Our results show that the proposed model provides better perceptual quality and intelligibility than the baseline E3net model with a negligible computational cost increase.
speech enhancement, audio-visual, real-time, low-latency, dense connection
§ INTRODUCTION
Video communications have been universally applied for both business and personal connections due to the COVID-19 pandemic. Since numerous people have shifted to online communication, the request for better perceptual quality and intelligibility of audio has become increasingly crucial. However, some factors, such as background noise, reverberation, and interfering (background) speakers, can degrade the quality of the call. The leakage of interfering speakers can significantly degrade the intelligibility of the main speaker and potentially cause privacy issues. Unfortunately, unconditional audio-only speech enhancement models cannot remove interfering speakers since they are usually trained to preserve all human speech <cit.>.
Personalized speech enhancement (PSE) models were proposed to enhance target speakers by adding target speakers' voice profiles <cit.> for suppressing the interfering speakers and environmental noises. They utilized the speaker embeddings extracted by a pre-trained speaker encoder on enrollment audios <cit.>. Alternatively, video can assist in speech enhancement from different aspects without the need for enrollment. First, the face of the speaker reveals the speaker's identity <cit.>. Second, lip motion is highly correlated with the phonetic information of the target speech <cit.>.
It is essential to limit the latency and computational complexity of the model to make audio-visual speech enhancement (AV-SE) models suitable for real-time communication. Although many works employed causal designs, only a few reported the computational complexity of their methods <cit.>. This paper focuses on optimizing intelligibility and perceptual quality for real-time processing on the CPU (i.e., the inference time on the CPU is shorter than the audio time with low latency). Specifically, we propose a low-latency real-time AV-SE system, namely AV-E3Net, based on the recently proposed end-to-end enhancement network (E3Net) <cit.>. AV-E3Net takes pixels of the mouth region of interest (ROI) and the noisy audio signal as inputs and produces the enhanced audio signal. We employ a dense connection module in AV-E3Net, which helps with better gradient flow for deeper networks. We propose a novel multi-stage gating-and-summation (GS) fusion module for merging audio and video features. We evaluate our proposed models in different application scenarios. Our results suggest that AV-E3Net yields significantly better results for the AV-SE task than the baselines.
§ RELATED WORK
Recently, multiple personalized speech enhancement (PSE) systems were proposed and proven computationally efficient to work in real time. Personalized PercepNet <cit.> utilized the target speaker's voice embeddings to improve the speech enhancement capabilities of original PercepNet <cit.>. Thakker et al. <cit.> proposed a real-time causal PSE model named end-to-end enhancement network (E3Net). Compared with other bigger PSE models such as pDCCRN <cit.>, E3Net provided better perceptual and transcription quality with much smaller computational complexity. PSE models are conditional models that utilize speaker embeddings, and their success can be extended to other conditional models, such as AV-SE models.
Traditionally, an AV-SE network comprises four components: audio encoder, video encoder, enhancement network, and audio decoder <cit.>. The audio/video encoder extracts audio/video features, and the enhancement network combines two features to produce enhanced audio embedding. The audio decoder decodes enhanced audio embedding to recover the audio. The video encoder can be pre-trained or jointly trained with the other modules. In <cit.>, the video encoder was trained jointly with the rest of the network, whereas <cit.> and <cit.> employed a pre-trained video encoder. Joint training of the video encoder with the rest of the network is somewhat challenging because of the deeper model architecture. However, there are some techniques to alleviate this problem. ResNet <cit.> and DenseNet <cit.> proposed dense shortcuts to address the training issue caused by the deep structures. Zhang et al. <cit.> also proposed a unified perspective of the dense shortcut in ResNet and DenseNet. Motivated by these works, this paper employs a dense connection module to tackle the performance issue caused by the deep architecture of AV-E3Net.
Audio and video fusion is an important research direction for AV-SE <cit.> and multimodal learning <cit.>. The most common fusion method is concatenation, which is easy to implement, but one modality often tends to dominate the other <cit.>. Xu et al. <cit.> proposed an attention-based fusion method. However, this method considerably increased the computational cost. Joze et al. <cit.>, and Iuzzolino and Koishida <cit.> proposed a squeeze-excite (SE) fusion that employs a gating module to recalibrate the modality. Additionally, their work integrated slow fusion <cit.> with the gating module and proved that slow fusion is more effective. Wang et al.<cit.> also employed a gating network to perform a product-based fusion, ensuring the performance of the model lower-bounded by an audio-based system. Inspired by <cit.>, we propose a multi-stage gating-and-summation (GS) module, which integrates slow fusion and provides a lightweight and efficient approach to fuse audio and video features.
An essential requirement for AV-SE systems to be adopted in practical scenarios is to make them work in real time with low computational costs. Unfortunately, only a few existing works focused on this scenario. Gu et al. <cit.> proposed a real-time audio-visual speech separation and provided the real-time factor (RTF) measured on a GPU as the metric for computational costs. Gogate et al.<cit.> also proposed a real-time audio-visual speech enhancement model, whereas no computational complexity metric was provided. In contrast, we propose an AV-SE system that can work in real time on the CPU by utilizing computationally efficient E3Net as our backbone, using lightweight ShufflNetV2 as the video encoder, and using only mouth ROI as the visual input.
§ METHODOLOGY
The overview of AV-E3Net architecture is shown in Figure <ref>. In this section, we introduce each module of the proposed model.
§.§ Audio network
The audio network comprises an audio encoder, a masking network, and an audio decoder. The audio encoder processes the input audio to generate audio features; subsequently, they are fed into the masking network to produce a mask, which is applied to the audio features. Within the masking network, the audio features are fused with video features generated by the video encoder. At last, the audio decoder reconstructs the audio from suppressed audio features. We follow the design of E3Net <cit.>. The audio encoder and audio decoders are 1D convolution and 1D transposed convolution layers, respectively. The masking network linearly stacks a ReLU activation, a layer normalization, a projection block, a fusion module, multiple LSTM blocks, and a mask prediction module. Please refer to <cit.> for the detailed description of the LSTM block and the mask prediction. In addition, we employ the dense connection module to tackle performance issues caused by a deep model structure. A dense connection replaces the original skip connection of E3Net in each LSTM block. The dense connection also exists in the fusion module. Generally, a module with a skip connection can be expressed as:
Y_n=θ(f_n(x_n)+x_n)
where n is the index of the module, θ is a layer normalization, x_n is the input of the module f_n, and Y_n is the output. As an alternative, the dense connection is defined as:
X_n=Σ_i=0^nx_i,
Y_n=θ(f_n(x_n)+X_n)
or
X_n=X_n-1+x_n,
Y_n=θ(f_n(x_n)+X_n)
Therefore, X_n is a dense summation variable that is updated from X_n-1 to X_n through all dense connection blocks. Note that a dense connection requires each x_n to have the same shape. In this way, the dense connection provides shortcuts across all LSTM blocks and fusion modules.
§.§ Video encoder
In a recent lipreading study, Ma et al. <cit.> employed a lightweight ShuffleNetV2 <cit.> as the video encoder to extract visual features. This work verified that ShuffleNetV2 could provide satisfactory performance with much efficient computational complexity in lipreading tasks. Motivated by its success in lipreading, we also employ ShuffleNetV2, followed by a projection block, as the video encoder. The projection block changes the dimension of video features. It comprises a fully connected layer, a PReLU activation, and a layer normalization. Afterward, we optionally employ video LSTM blocks to capture the speaker's lip motions. Video LSTM blocks share the same structure as those in the audio network.
§.§ Audio-Visual fusion
Next, we describe our proposed multi-stage gating-and-summation (GS) fusion module. For the multi-stage fusion, the video LSTM blocks are forced to be paired with the audio LSTM blocks in the masking network. The fusion blocks are placed at the beginning of each pair of LSTM blocks and after the last pair of LSTM blocks, as shown in Figure <ref>.
Figure <ref> presents the detailed architecture of the GS fusion block.
The block takes audio features F_a,n∈ R^d_a and video features F_v,n∈ R^d_v from the n^th pair of LSTM blocks as inputs. Two operations are included in this fusion block. First, a gating module is employed to calculate the importance of channels and recalibrate the original audio features by the importance,
G_n = σ(g(δ(h([F_a,n;F_v,n])))),
H_a,n = G_n ⊙ F_a,n
where [F_a,n;F_v,n] concatenates audio features and video features, G_n ∈ R^d_a, σ is the sigmoid activation, h and g are fully connected layers, and δ is a ReLU activation. Second, a dense summation module is defined as,
X_a,n=X_n+F_a,n
Y_a,n = θ(proj(H_a,n)+X_a,n)
where proj is a projection block, θ is the layer normalization, X_n is the dense summation variable from the n^th audio LSTM block. Updated by adding F_a,n, the new dense summation variable becomes X_a,n. <cit.> observed serious performance degradation of other AV-SE models <cit.> in less noisy scenarios. Therefore, they suggested that AV-SE systems should be mainly audio-based, and video cues should provide only additional contributions. The design of GS fusion follows this idea: the gating module and the summation module make fused features closer to the space of audio features. The dense summation also provides shortcuts across all LSTM blocks and fusion modules and helps with better gradient flow for AV-E3Net.
Note that, due to the mismatch of frame rates for the video and audio, we up-sample the video frames to match them with the audio frames by replicating them.
§ EXPERIMENTAL RESULTS
§.§ Training and validation data
This work followed the data simulation pipeline of <cit.>. We utilized clean speech samples from AVSpeech <cit.>, VoxCeleb2 <cit.>, and LRS3 <cit.> datasets. By filtering the samples according to the Mean Opinion Score (MOS) of the audio quality, we selected 214, 170, and 30 hours of video samples from these datasets, respectively. Furthermore, we used a face detector for each frame of the video samples, and if the number of frames with a face detected divided by the total number of frames was less than 0.95, we discarded that video sample.
For creating the noisy mixtures, we convolved clean speech samples with simulated room impulse response (RIR) using the image method. We employed noise clips from Audioset <cit.> and Freesound <cit.>, which were also convolved with RIRs. The clean speech, noise clips, and RIR files were split exclusively to simulate train, validation, and test sets. 20% of simulated samples contained only the target speaker, and 80% of them contained both the target and interference speakers. In <cit.>, there was a restriction that the target speaker should be closer to the microphone than the interference speaker. However, in this work, we relieved this restriction. Our system assumes that the target speaker's face is the only face captured by the camera. We simulated 20,000 hours of training data and 10 hours of validation data. The average length of simulated mixture samples was around 10 seconds. We used the video frames unaltered along with simulated noisy audio samples. For video frames where the face detector did not capture the target speaker's face, we filled in the video frame input with zero tensors.
§.§ Test sets and evaluation metrics
Test sets followed the same simulation approach as train/validation sets, in which the source data were mutually exclusive. Only LRS3 <cit.> data was used in test sets, and the average length of simulated mixture samples was 6 seconds. We simulated test sets for two target scenarios: 1) the mixture comprises the target speaker, the interference speaker, and noise. 2) the mixture comprises the target speaker and noise. Following <cit.>, we named these two scenarios TS1 and TS2, respectively. TS1 and TS2 included 10 hours and 1 hour of data, respectively. To measure the perceptual quality and the intelligibility of processed audio, we utilized word error rate (WER), perceptual evaluation of speech quality (PESQ), and Signal-to-distortion ratio (SDR). We also measured the real-time factor (RTF) on an Intel(R) Xeon(R) W-2133 CPU @ 3.60GHz. Since the inference speed of the model changed from time to time on a CPU, we ran the same model 100 times on a 3 seconds input to reduce the variance of observations.
§.§ Implementation Details
Audio and video samples were re-sampled in 16KHz, 25 fps, and 360p, respectively. We followed video pre-processing of lipreading <cit.>. Each video frame was processed by 1) face and landmarks detection, 2) similarity transformation based on landmarks, and 3) cropping in a size of 50x50 on the mouth ROI. Small sizes for cropping can further reduce the video encoder's computational cost, which contributed most of the computational cost in AV-E3Net. We used Microsoft's internal face detection tool for face and landmarks detection. During training, the noisy mixtures were chunked into 3 seconds of audio batches aligned with 75 video frames. We used the power-law compressed phase-aware (PLCPA) loss function <cit.>.
Regarding the audio encoder and decoder, we set window and hop sizes to 320 (20 ms) and 160 (10 ms), respectively. The theoretical latency of AV-E3Net was 20ms. The number of features used in the audio encoder was 2048. Within the masking network, the projection block projected features from R^2048 to R^512. The number of audio LSTM blocks was 4. Within the LSTM block, the input and output dimensions of the fully connected block were 512, and the intermediate dimension of the fully connected block was 1024. The input and output dimensions of LSTM were 512. Regarding the video encoder, we used ShuffleNetV2 0.5x <cit.> to encode video frames to 1024-dimension features. Then a projection block was employed to project video features to 512-dimension. Afterward, video LSTM blocks for lip motion capture shared the same configuration as audio LSTM blocks. GS fusion's audio and video input dimensions were 512, and the first fully connected layer projected concatenated features from R^1024 to R^512. We set the optimizer as AdamW <cit.> and the learning rate scheduler to be a step decay scheduler with a gradual warm-up mechanism. The peak learning rate was 0.001.
§.§ Baseline Systems
We employed the following baseline models for comparison with our proposed models:
AO-E3Net: An audio-only E3Net model. It is an unconditional model and not capable of removing the interfering speaker.
AV-DCATTUNET: A variant of pDCATTUNET, introduced in <cit.>, in which the speaker embedding was replaced by the video frame embedding extracted by a pre-trained face recognition model (ShuffleNetV2 0.5x). The face recognition model takes the whole face of each video frame as the input. We set the number of encoder/decoder blocks to 6 and the number of bottleneck blocks to 4. The STFT window and hop sizes were 512 and 256 samples, respectively.
Naive AV-E3Net: The AV-E3Net without dense connection and multi-stage GS fusion. It combined the video encoder (ShuffleNetV2 0.5x) with E3Net and employed a single concatenation block to merge late video features from the video encoder with intermediate audio features before the first audio LSTM block. A single concatenation block comprises a concatenation layer, a projection block, a dense connection or a skip connection, and a layer normalization. Particularly, only skip connection was used in Naive AV-E3Net's LSTM block and single concatenation block.
§.§ Results
Table <ref> shows the computational complexity of different model configurations and the corresponding perceptual quality and intelligibility results on TS1 and TS2 test sets. According to the results, AO-E3Net performs poorly on TS1 since it cannot remove the interfering speaker. In contrast, AV-DCATTUNET provides much better results on both TS1 and TS2 than the AO-E3Net in terms of speech and transcription quality. Naive AV-E3Net without video LSTM yields worse WER results than AV-DCATTUNET but provides better SDR. Adding a single video LSTM to the Naive AV-E3Net yields similar results; However, increasing it to 4 LSTM blocks degrades speech and transcription quality, indicating training difficulty. By adding the dense connection to AV-E3Net, we observe significant speech and transcription quality improvement with a negligible computational cost increase. With the dense connection, adding more video LSTM layers improves the transcription quality while yielding similar speech quality. AV-E3Net models with dense connection outperform AV-DCATTUNET on TS1 and achieve comparable performance on TS2 with a much lower computational cost. Next, the results show that AV-E3Net with multi-stage training further improves speech and transcription quality. The best AV-E3Net results are obtained using multi-stage fusion with the GS fusion. The GS fusion helps with substantially better performance on TS2, which is for the less noisy scenario. The computational cost increase for multi-stage GS fusion is minor.
It should be noted that the AV-DCATTUNET model cannot be used for real-time processing because of the model's dependency on a pre-trained video encoder. Although the face recognition model employs the efficient ShuffleNetV2, it takes the whole face rather than the mouth ROI as the input. Therefore, the RTF on the video encoder reaches 1.442. However, since AV-E3Net uses only mouth ROI as the input, it can work in real time. These results suggest that AV-E3Net performs better than the bigger model (AV-DCATTUNET) with a lower computational cost.
§ CONCLUSIONS
We proposed a low-latency real-time audio-visual end-to-end speech enhancement model AV-E3Net. We employed a dense connection module, which significantly improved both perceptual quality and intelligibility with minimal increase in computational costs. Furthermore, we proposed a novel multi-stage gating-and-summation (GS) fusion module that dynamically and effectively fuses speech and vision modalities. We showed that our proposed model performed much better than the baseline systems. Furthermore, the ablation study showed the impact of adding dense connection and multi-stage GS modules. The computational cost of our system is much lower than the baseline AV-SE system and can work in real time on the CPU. Therefore, the proposed AV-E3Net has excellent potential in real-world video communication applications as a low-latency and real-time model.[Samples available at <https://github.com/zzrdwj/AVSE>]
IEEEtran
|
http://arxiv.org/abs/2303.06744v1
|
20230312201614
|
Ensemble Learning of Myocardial Displacements for Myocardial Infarction Detection in Echocardiography
|
[
"Nguyen Tuan",
"Phi Nguyen",
"Dai Tran",
"Hung Pham",
"Quang Nguyen",
"Thanh Le",
"Hanh Van",
"Bach Do",
"Phuong Tran",
"Vinh Le",
"Thuy Nguyen",
"Long Tran",
"Hieu Pham"
] |
cs.CV
|
[
"cs.CV"
] |
DTT: An Example-Driven Tabular Transformer by Leveraging Large Language Models
Davood Rafiei
March 30, 2023
===============================================================================
Background: Early detection and localization of myocardial infarction (MI) can reduce the severity of cardiac damage through timely treatment interventions. In recent years, deep learning techniques have shown promise for detecting MI in echocardiographic images. Existing attempts typically formulate this task as classification and rely on a single segmentation model to estimate myocardial segment displacements. However, there has been no examination of how segmentation accuracy affects MI classification performance and the potential benefits of using ensemble learning approaches. Our study investigates this relationship and introduces a robust method that combines features from multiple segmentation models to improve MI classification performance by leveraging ensemble learning.
Materials and Methods: Our method combines myocardial segment displacement features from multiple segmentation models, which are then input into a typical classifier to estimate the risk of MI. We validated the proposed approach on two datasets: the public HMC-QU dataset (109 echocardiograms) for training and validation, and an E-Hospital dataset (60 echocardiograms) from a local clinical site in Vietnam for independent testing. Model performance was evaluated based on accuracy, sensitivity, and specificity.
Results: The proposed approach demonstrated excellent performance in detecting MI. It achieved an F1 score of 0.942, corresponding to an accuracy of 91.4%, a sensitivity of 94.1%, and a specificity of 88.3%. The results showed that the proposed approach outperformed the state-of-the-art feature-based method, which had a precision of 85.2%, a specificity of 70.1%, a sensitivity of 85.9%, an accuracy of 85.5%, and an accuracy of 80.2% on the HMC-QU dataset. On the external validation set, the proposed model still performed well, with an F1 score of 0.8, an accuracy of 76.7%, a sensitivity of 77.8%, and a specificity of 75.0%.
Conclusions: Our study demonstrated the ability to accurately predict MI in echocardiograms by combining information from several segmentation models. Further research is necessary to determine its potential use in clinical settings as a tool to assist cardiologists and technicians with objective assessments and reduce dependence on operator subjectivity. Our research codes are available on GitHub at <https://github.com/vinuni-vishc/mi-detection-echo>.
Keywords: Echocardiography, Image Segmentation, Deep Learning, Machine Learning, Myocardical Infarction, Motion Estimation, Regional Wall Motion Abnormality, Diagnostic Ability
§ INTRODUCTION
A myocardial infarction (MI), which is also called a heart attack, happens when blood flow to part of the heart is cut off due to a clot <cit.> and severely damage the heart tissue. Most of the time, this happens because one or more of the coronary arteries, which bring blood to the heart, are blocked.
MI is a serious and potentially life-threatening condition that is the leading cause of death worldwide, affecting 32.4 million people each year <cit.>. In the US solely, about 4 million people visit the emergency room each year with heart symptoms <cit.>.
According to a study undertaken by the World Health Organization <cit.>, cardiologists use multiple diagnostic indicators such as pathology outcomes, biochemical marker values, electrocardiography (ECG) findings, and other imaging modalities to diagnose patients with MI <cit.>. However, pathology can only detect dead cells in the heart muscle <cit.>. ECG cannot distinguish between MI and myocardial ischemia symptoms <cit.>, and the specificity of biochemical marker values (cardiac enzymes) is quite low <cit.>. Due to these limitations, none of these techniques are adequate for early MI detection. Therefore, the most valuable tool for early diagnosis is an imaging technique known as echocardiography, which is applicable for both clinical and research applications. Echocardiography (ECHO) is a pivotal tool for a safe and real-time functional assessment of the cardiovascular system <cit.>. It is based on ultrasonography, a noninvasive imaging technique that is incredibly valuable for monitoring and diagnosing patients who are exceedingly vulnerable. Moreover, echocardiography is fast, inexpensive, accessible, portable, and carries the lowest risk among imaging techniques <cit.>.
With the availability of the MI datasets on echocardiography, machine learning (ML) algorithms have been used to detect MI by extracting features from echocardiography <cit.>. Although they showed promising results, previous studies have largely focused on using features from segmentation models, but the assumption that good segmentation equates to strong classification has yet to be fully substantiated. In addition, current methods are still limited by using only features from a single model, which is a common problem in MI classification and can lead to poor performance on unseen data <cit.>. We conducted experiments to determine the relationship between strong segmentation models and precise MI classification. Our results showed that utilizing the predictions from multiple models through ensemble methods can better identify the patterns and features from echocardiography, resulting in more trustworthy and accurate predictions. Therefore, in this work, we propose a new approach to MI classification by incorporating multiple segmentation models and ensemble learning techniques. Our main contributions are summarized as follows:
* Our experiment results showed that there is no strong correlation between good segmentation models and accurate MI classifiers. The finding indicates that highly accurate segmentation of the left ventricle (LV) is not a key condition for accurate MI detection.
* We proposed an ensemble method to combine multiple features produced by different LV wall segmentation models. The experimental results show that the proposed ensemble method consistently outperformed the state-of-the-art methods based on single models across all metrics on both the public and external test sets. This result suggests that ensemble learning is successful at complementing the features of multiple feature extractors in a way that a single feature model could not.
* The effectiveness of our method was tested on an external dataset obtained from a local clinical source. The results revealed a decline in the model's performance compared to public data test sets. Possible reasons for the decrease in performance are presented, along with an examination of the implications of these results. Recommendations are also given for enhancing the model's performance in a clinical environment.
* The proposed method showed a higher agreement score (Cohen's kappa value) than single-feature methods, regardless of whether they used different sets of features. This high level of agreement is an important advantage of the proposed approach as it suggests that the model predictions are subject to variation due to different feature extractors. The high Cohen's kappa value indicates that our proposed method is reliable and well-suited for use in the classification of MI.
§ RELATED WORK
MI detection has been a focus of research in the field of medical imaging, with various techniques being proposed to detect abnormalities in LV wall motion <cit.>. With the aim to reduce the cost and time of diagnosis, computer-assisted diagnostic techniques have been developed in recent decades that aim to automate the detection of MI by using image processing and ML techniques <cit.>. Very first studies use active contour-based models, such as <cit.> the snake technique introduced by Kass <cit.>, which uses an elastic curve to detect lines, boundaries, and edges in an image. However, these methods can be impractical or even impossible to use in cases where the LV wall is not visible due to low contrast or a portion of the wall is missing <cit.>. Other MI detection techniques include motion estimation methods <cit.>, which track the displacement of the LV wall, but the accuracy of these methods can depend on the performance of speckle tracking and can lead to unreliable results <cit.>.
Due to limitations in extracting features while using solely image processing techniques, recent studies shift to deep learning to extract hidden features from echocardiography images and detect MI. Neural networks such as U-Net <cit.> and U-Net++ <cit.> have been widely used for semantic segmentation. <cit.> presented a large dataset of 2D echocardiography images and proposed a U-Net-based model to accurate segmentation of LV wall. <cit.> utilized the accurate segmentation of LV wall to detect MI. While studies have shown that deep learning models can be used to detect MI, to the best of our knowledge, no work has explored the direct correlation between a strong segmentation of the LV wall and MI detection.
In addition to developing individual deep learning models, ensemble techniques, which combine the predictions of multiple models, have been explored as a way to improve performance and robustness in the analysis of cardiac functions. For example, <cit.> improved the performance of heart's morphological and functional assessments by using majority vote from three ML models: support vector machine, random forest, and deep learning. <cit.> also increased the diagnostic performance of coronary heart disease screening by stacking ML models. While these studies have shown that ensemble techniques can improve the performance of medical problems, there is still no work that has explored the use of ensemble techniques for MI detection in echocardiography images.
Another major concern while using deep learning models for MI detection is the inconsistency of the results <cit.>. The performance of deep learning models is highly dependent on the quality of the training data, which can be difficult to obtain<cit.>. In addition, the performance of deep learning models can be affected by the choice of the model's architecture and hyperparameters, which can be difficult to determine <cit.>. To address these issues, we propose a strategy for combining features from different models in order to improve the diagnostic performance of MI detection. The proposed approach is based on the idea that by combining the strengths of various techniques, we can overcome their individual limitations and achieve more accurate and reliable results. We believe that this approach has the potential to significantly advance the field of MI detection and improve patient care.
The remainder of this paper is organized as follows. Section <ref> introduces the benchmark HMC-QU dataset, our in-house dataset from E-Hospital, and the framework for determining LV wall motion for MI identification. We will also describe in this section the experimental setting used in this study. Next, Section <ref> presents the quantitative and qualitative evaluations of the proposed approach on the HMC-QU dataset and the E-Hospital dataset. We analyze the MI detection performance using various segmentation architectures and classifiers. Finally, Section <ref> discusses the experimental results and concludes the paper with some potential research directions.
§ MATERIALS AND METHODS
In this section, we introduce the proposed ensemble learning framework that addresses the challenge of MI detection. Figure <ref> illustrates the overall architecture, consisting of three main phases: LV wall segmentation, feature engineering from myocardial segmentation displacement, and MI detection by traditional classification ML methods from ensemble models by weighting features from different segmentation models. Below we explain each phase in detail.
* Phase 1 - LV wall segmentation: The goal of the first phase is to identify the myocardial boundary, which is a key indicator of heart function. Previous works often used only a single segmentation model to contour the LV. We further use multiple segmentation models and assess the accuracy of each segmentation model on each segment and on the whole LV.
* Phase 2 - Feature engineering from myocardial segmentation displacement: In this phase, we extract features from the segmented myocardial regions based on displacement over time. These features include measures such as strain, strain rate, and torsion, which are important indicators of myocardial function and can provide insight into the presence of MI. Because we used multiple segmentation models in Phase 1, we proposed a method to combine features from multiple segmentation results.
* Phase 3 - MI classification: In the final phase, traditional classification ML methods such as support vector machines, random forests, and logistic regression, are explored to detect MI from the extracted features. To further improve the performance of the proposed model, we also implement an ensemble learning approach by weighting the features from the different segmentation models. The weighting step takes into account the segmentation accuracy of each segmentation model. The performance of the proposed framework will be evaluated using common metrics, including sensitivity, specificity, precision, F1 score, and accuracy.
§.§ DATASET
In this study, we used the public HMC-QU dataset <cit.> as the training and validation sets. The HMC-QU dataset 2D echocardiography recordings for the detection of MI and was established by cardiologists from the Hamad Medical Corporation, researchers from Qatar University and Tampere University. The ultrasound machines used to acquire the data were made by GE Healthcare, and the recordings have spatial and temporal resolutions that vary from 422×636 to 768×1024 and 25 frames per second, respectively. The collection includes 162 Apical Four Chambers (A4C) echos acquired between 2018 and 2019, but for the purposes of this study, a subset of 109 echos was used, resulting in a total of 2,349 images from 72 MI patients and 37 non-MI subjects. The remaining 53 echos were excluded because they did not include the entire LV wall, which was necessary for cardiologists to evaluate. As depicted in Figure <ref>a, the non-MI and MI cases have two frames: end-systolic and end-diastolic. The MI case has a significantly larger overlap region compared to the non-MI sample.
To evaluate the effectiveness of our proposed method, we collected a dataset of patient records from E-Hospital, a local clinical site in Vietnam. The institutional review board at the clinical site approved the study, and we followed ethical guidelines in collecting and processing the data. We obtained 200 patient records from E-Hospital for this study, without specific selection criteria, covering the period from 2020 to 2021. The data were acquired using the Philip Affiniti 70G ultrasound imaging system, and we carefully examined all the data to ensure high-quality and visible anatomy structures. Only 60 data samples met our standards and were retained for further analysis. Three experienced doctors annotated the MI region in each sample, and another group of three doctors checked the annotations for accuracy and consistency. We used the annotated data for training and validation of our proposed model, which we stored in the Digital Imaging and Communications in Medicine (DICOM) format. The dataset includes only MI annotations and was used as a separate test set for evaluating the performance of our model.
§.§ FEATURE ENGINEERING
Similar to <cit.>, we extract the motion feature by performing two consecutive steps: LV (LV) segmentation and feature calculation. Below we explain these two steps in detail.
LV segmentation. We use a U-Net inspired convolutional network that consists of an encoding and down-sampling path, followed by a decoding and up-sampling path with skip links <cit.>. The model's output is a mask of the LV obtained through the Softmax function. During the training phase, we use cross-entropy as the loss function to optimize the model's parameters. Cross-entropy, which is defined as a measure of the difference between two probability distributions for a given random variable or set of events, is widely used for classification objectives. The binary cross-entropy is defined as
L_BCE(y, ŷ)=-(y log (ŷ)+(1-y) log (1-ŷ)),
where ŷ is the predicted value by the prediction model.
Feature calculation. We analyze the segments of the LV wall to detect possible MI signatures. A standardized model <cit.> recommends dividing the LV wall into seven segments, as depicted in Figure <ref>b. However, in our analysis, we only consider six of them, as the apical cap does not exhibit inward motion activity and should be skipped for the A4C view. For MI detection, we extract the displacement of the endocardial boundary points from the six segments. By evaluating the rate of displacement from the captured global motion of the LV wall, we aim to mimic the typical diagnosis of cardiologists, who assess segments that show a lack of motion as abnormal.
After segmenting the LV wall, we further extract its inner border to define the endocardial boundary, which is then divided into standardized six segments. The boundary segment displacements are calculated using the L_1 norm as follows
d_L1 = |x^t - x^t_r| + |y^t - y^t_r|,
where x and y are the pixel coordinates of the current frame t and the reference frame t_r (the first frame of one cycle). In order to capture the boundary segment motion more precisely, we take N uniformly sampled pixels p ∈(x_1, y_1), (x_2, y_2),..., (x_N, y_N) on each frame t for each segment s, and calculate the pair-wise distances d_s_t between t_r and t. The segment displacement for each frame is then calculated as
d_s_t = 1/N∑_n=1^N |x_n^t_r-x_n^t|+|y_n^t_r-y_n^t|.
Finally, we take the maximum pixel displacement of each segment, d_s^max = max(d_s_t), from the displacement curves, and normalize it to unity. The motion feature, MF, is then calculated as
MF=d_s^max.
§.§ ENSEMBLE OF FEATURES
Ensemble learning, which involves training a group of different classifiers and combining their predictions, has been shown to improve model performance and robustness <cit.>. During the process of feature engineering, we discovered that different segmentation models perform better on different segments (as shown in Table <ref>). This meant that the performance of the classifier was limited by the performance of the segmentation model. To enable the classifier to benefit from multiple features, we calculated the accumulated vector by summing multiple feature vectors based on the accuracy of the segmentation models on the validation set. This approach has several benefits: 1) the weighting method does not require any training, so it can be used universally with different classifiers; 2) conventionally, stacking multiple feature vectors can increase the dimensionality of the accumulated feature vector, making it harder to train the classifier and limiting the number of features that can be used. In contrast, the weighted sum vector has a fixed dimension regardless of the number of segmentation models used.
Formally, given n motion features vector MF ∈ℝ^6 extracted from n segmentation model with an objective metric for different segments 𝕄∈ℝ^6. The weighted coefficient 𝕎 is calculated as
𝕎_i = 𝕄_i/∑_i=i^n𝕄_i.
Accumulated feature vector MF_acc∈ℝ^6 is calculated as
MF_acc = ∑_i=i^n MF_i ⊙𝕎_i.
§.§ MI DETECTION
In the final step of the pipeline, we use ML to detect MI in an echocardiogram. To do this, we employ a variety of conventional supervised ML techniques, including
support vector machine <cit.>, logistic regression <cit.>, decision trees <cit.>, and k-nearest neighbor <cit.>. These techniques were chosen over more complex deep learning methods due to the small and imbalanced nature of our dataset, as well as the fact that the extracted features are more suited to simpler analysis. To fairly evaluate the performance of these classifiers, we use a stratified 5-fold cross-validation scheme. The details of their configuration, training, and testing are discussed in the following section.
§.§ EVALUATION METRICS
LV Segmentation. The Intersection over Union (IoU) metric, also known as the Jaccard index, is used to measure the overlap between the target mask and the prediction output. This metric is similar to the Dice coefficient, which is frequently used as a loss function during training. The IoU is calculated by dividing the intersection of the target and prediction by their union. It is written as
IoU=target∩prediction/target∪prediction.
MI Detection. For the MI detection, we classify infarcted subjects as class-positive (MI) and normal, non-MI subjects as class-negative. In this case, the confusion matrix is formed as follows: TN is the number of correctly predicted non-MI subjects, TP is the number of correctly predicted MI patients, FN is the number of incorrectly detected MI patients as non-MI subjects, and FP is the number of incorrectly detected non-MI subjects as MI patients. The elements of the confusion matrix are calculated per video for MI detection. The standard performance evaluation metrics are defined as
Sensitivity =TP/TP + FN,
Specificity =TN/TN + FP,
Accuracy =TP + TN/TP + TN + FP + FN,
Precision =TP/TP + FP,
F(β)=(1+β^2) Precision × Sensitivity /β^2× Precision + Sensitivity ,
where TP, FP, TN, and FN denote the numbers of true positive, false positive, true negative, and false negative cases, respectively. Sensitivity (also known as recall) is the ratio of correctly detected MI patients to all MI patients. Specificity is the ratio of correctly classified non-MI subjects to all non-MI subjects. Precision refers to the number of correctly detected MI patients over the total number of correctly detected samples. Accuracy is the ratio of correctly detected samples. F1 score is calculated as the harmonic average of precision and sensitivity, with a weighting of β=1 in the dataset.
Prediction Reliability. In addition to the performance of the prediction model, the reliability of the model is a crucial criterion for ML models used in medical applications. In this case, reliability can be interpreted as the consistency of the classifier's output regardless of the use of different feature extractors or combinations of feature extractors. We quantify this criterion by calculating the Cohen's Kappa <cit.> coefficient of the model's output based on the feature extractor. In this work, the Cohen's Kappa coefficient is calculated for three scenarios:
* Agreement score between different predictors that use a single feature extractor.
* Agreement score between ensemble model using a different set of feature extractors.
* Agreement score between cardiologist experts on single echo.
§.§ EXPERIMENTAL SETTINGS
LV wall segemtation. To evaluate the model, we employed a stratified 5-fold cross-validation scheme, in which we used 80% of the available echos in the dataset to train the model and tested it on the remaining 20% holdout (unseen) echos. During the training process, we trained all parameters in the network for 50 epochs using a learning rate of 1e-4. The model was implemented in Pytorch and optimized using the Adam optimizer with parameters β_1 = 0.9 and β_2 = 0.999. The training and testing were conducted on a GTX 3090 GPU, and the number of total parameters ranged from 1 million to 23 million.
In our experiments, we explored a variety of architectures, including UNet <cit.>, UNet++ <cit.>, LinkNet <cit.>, DeepLabV3 <cit.>, and PAN <cit.>, as well as several encoder architectures, including resnet18 <cit.>, vgg11 <cit.>, densenet121 <cit.>, efficientnet-b0 <cit.>, and inceptionv4 <cit.>. The segmentation performance was evaluated on a pixel-level using the IoU score metric described in Section <ref>.
MI detection.
In this experiment, we applied various supervised ML techniques for binary classification, including support vector machine (SVM), logistic regression (LR), decision trees (DT), and k-nearest neighbor (KNN). To begin, we collected a dataset consisting of input ensemble features and corresponding binary labels. Next, we split the dataset into a training set and a test set. The training set was used to train the different classification models, while the test set was used to evaluate their performance.
For each of the models, we first fitted the model to the training data using default hyperparameter values. We then used the trained model to predict the labels for the instances in the test set. The performance of each model was evaluated using a variety of metrics, such as accuracy, precision, and recall.
Finally, we compared the performance of the different models to determine which one achieved the best results. For models used in our experiments, we used the default hyperparameters provided by the scikit-learn <cit.> library, which is a widely used ML library in Python. This decision was made to ensure that our model could be easily reproduced and to facilitate comparisons with other studies that used similar methods.
Model reliability analysis. To evaluate the reliability of the predictions made by the different classification methods, we first randomly selected 20 examples from the test set. We then calculated the agreement score within each classification method (SVM, LR, DT, and KNN) that used only features derived from a single segmentation model. Each classification method was trained using four different sets of features. For the ensemble methods, we also calculated the agreement score between the four models, each of which was created using a different pair of features. Finally, we computed the human expert agreement score using the labels provided by three experts on the same echo samples. This allowed us to measure the similarity of the output of the feature extractors and classifiers on the same input.
§ RESULTS
In this section, we present the results of our experiments on LV wall segmentation and MI classification using our proposed method on the HMC-QU validation test and a separate E-Hospital test set, respectively. We also evaluate the performance of our method through various metrics and techniques. First, we report the performance of our model on LV wall segmentation on the HMC-QU validation test on different LV wall segments, where we compare the state-of-the-art methods in the field. Next, we present the MI classification results on the HMC-QU and E-Hospital datasets and compare our model's performance against the baseline and other existing approaches. Finally, we discuss the reliability of our model by analyzing its agreement scores compared to existing methods and human experts.
§.§ LV WALL SEGMENTATION ON HMC-QU VALIDATION TEST
Table <ref> shows the LV wall segmentation averages (mean) results for 5-fold CV with different network architectures and encoders. The results indicate a stable IoU score between various types of architectures and encoders. The maximum IoU score can get is 0.876% when using UNet architecture and resnet18 encoder. Despite the fact that there is no significant variation in segmentation performance during validation, the segmentation models have different scores on different heart segments, as we have discussed in section <ref>.
§.§ MI CLASSIFICATION ON TEST SET
Table <ref> demonstrates that the performance of concatenated features from multiple segmentation models is superior compared to a single segmentation model and the performance across several classifications is consistent. Overall, the model achieved better performance by using ensemble features.
* Models with the same classifier performed similarly when using only one feature, on the other hand, ensemble models show better performance. Using SVM models, for instance, PAN or UNet segmentation features yielded comparable F1 scores of 0.829 for PAN and 0.831 for UNet. In contrast, the ensemble SVM model performed better with F1 score of 0.925. This improvement is rather uniform across classifiers by a substantial margin.
* Upon comparing the performance of several classifiers, we found that there exist discrepancies in the approaches employed. Using an ensemble of two or three features, LR provided the best performance with F1 score of 0.942, while SVM, DT, and KNN only achieved F1 scores of 0.925, 0.910, and 0.894, respectively. When more features are added to the ensemble, however, this result becomes inconsistent, with LR's F1 score dropping to 0.905 and DT's F1 score reaching 0.931. This finding suggests that classifier selection should be based on experimentation with all classifiers.
* Regarding the number of features used to construct the model ensemble. We have experimented with combining two and three features. We discovered that combining additional features does not produce better results. In reality, adding more features to a model might diminish its performance. In the case of the SVM classifier, adding three features decreased the F1 score from 0.925 to 0.903. This could indicate that adding more features to an ensemble could eventually increase the noise to the final features, eradicating the effectiveness of the advantage segment.
* Our ensemble method showed significantly better performance compared to the average ensemble approach. our method achieved an F1 score of 0.925, while the average ensemble approach only achieved an F1 score of 0.806. This demonstrates the effectiveness of choosing the right regions from the LV wall, rather than average regions altogether.
Correlation between good segmentation models and
accurate MI classifications. In our experiment, we evaluated the performance of four different MI detection algorithms. Each algorithm used features from a weaker segmentation approach (PAN), and more accurate segmentation techniques (UNet and LinkNet). As shown in the table <ref>, While LinkNet and UNet achieved higher IoU scores of 0.871 and 0.867, respectively, algorithms that use PAN features still performs better than LinkNet and UNet with F1 score of 0.836 for DT-PAN and 0.788 DT-LinkNet. These results suggest that, while good segmentation is important for MI detection, it is not the only factor that determines the overall performance of the algorithm. In this case, the combination of advanced segmentation and effective feature extraction/classification techniques appears to be crucial for achieving optimal results.
Comparison with previous state-of-the-art method. Table <ref> shows the performance of our ensemble models and the previous state-of-the-art method from <cit.>. In general, our ensemble LR model with two PAN features outperforms the state-of-the-art model presented in <cit.> by a significant margin. The F1 score for our model is 0.09 higher than the previous model, indicating that it is able to more accurately predict the outcome of interest. Additionally, when considering other evaluation metrics such as sensitivity, specificity, precision, and accuracy, our model consistently outperforms the model from <cit.>. This suggests that using a larger number of features can be beneficial for improving the performance of a ML model.
Performance of classification models on external test set. Table <ref> shows the result of our ensemble model in comparison with the single-feature model on the local clinical site, E-Hospital. The performance of the ensemble model on the external local clinical test set was found to be highly correlated with the results obtained on the public data test set. In terms of F1 score, the ensemble model achieved a score of 0.824 on the local clinical test set, which was significantly higher than the score from single-feature and average ensemble models. This demonstrates the consistant of our methods on different dataset. Additionally, the best ensemble model had a sensitivity, of 0.806 on the local clinical test set, which was again higher than single feature model and average ensemble model. Overall, these results suggest that the MI classification model is reliable and effective in identifying MI events in both familiar and novel datasets.
We also discovered that the external test on the local clinical dataset yielded lower scores compared to the public test set. Specifically, the model performed with F1 score of 0.824 on the local clinical dataset, while it achieved F1 score of 0.942 on the public test set. This suggests that the model may not generalize as well to the local clinical dataset, possibly due to differences in the distribution of the data or the specific characteristics of the patient population represented in the dataset. Solving this problem may be a task for future work. There are several potential approaches that could be pursued in order to address this issue, some possible approaches could include using different types of ML algorithms, collecting additional data, or fine-tuning the model parameters in order to improve performance. Ultimately, it will be important to carefully evaluate the strengths and limitations of different approaches in order to identify the most promising direction for future work.
§.§ MODEL RELIABILITY
Table <ref> shows the agreement scores between the single-feature model and ensemble-feature models for different classifiers and a human expert. A comparison between the single-feature model and ensemble-feature models shows that the prediction of ensemble-feature models is more consistent than that of the single-feature model. For example, the agreement score of the model's predictions by SVM single-feature models is 0.74, which is not so consistent with the human expert (0.96). The agreement score of ensemble models ranges from 0.79 to 0.82, the prediction by ensemble models is more similar to that of a human expert than that of a single-feature model, but still not consistent enough to replace a human expert.
We observed no significant difference in consistency among single-model classifiers using SVM, LR, and DT. The same is true when we used ensembles, but we found that the DT ensemble had slightly better performance than the SVM and LR ensembles, as reflected in agreement scores of 0.82 for LR, and 0.81 and 0.79 for SVM and LR, respectively.
The above assessment show that ensemble models can be more accurate than a single model because it can capture a wider range of patterns and relationships in the data. In this case, it appears that the ensemble model has a higher agreement score than the single-feature model, which suggests that it is making more accurate predictions. This could also be due to the fact that the ensemble model is able to consider multiple features, rather than just one, which allows it to better capture the complexity of the data. Overall, the higher agreement score of the ensemble model indicates that it is a more effective model for MI classification problem.
§ CONCLUSION
We proposed an accurate and robust deep learning-based approach for the MI detection on echocardiograms. We showed that accurate segmentation models are not fully correlated with accurate MI classifiers, indicating that highly accurate segmentation of the LV is not a key factor for building an accurate MI detection system. We then proposed an ensemble method for combining multiple features provided by different LV segmentation models, which outperformed both single models and state-of-the-art methods on two echocardiogram datasets. Compared to these existing approaches, the proposed method demonstrated significant improvement across all evaluation metrics. We further illustrated that the proposed method shows a higher agreement score (Cohen's kappa value) than single-feature methods, regardless of the features used. This high level of agreement suggests that our predictions are subject to less variation due to different feature extractors, making our method reliable and well-suited for use in the classification of MI.
Our work opens up several potential directions for further exploration. First, an end-to-end system for MI detection, rather than the current three-stage approach, should be developed. Second, further studies can be conducted to investigate the causes of performance drop on the external dataset and implement methods for addressing these issues. Third, it might be interesting to extend our training method into the pretraining stage to produce better pre-trained models. Additionally, further exploration of the factors that contribute to the success of ensemble learning in MI detection could be beneficial for improving the performance of future models.
§ CONFLICT OF INTEREST STATEMENT
TN, and HP were employed by VinUni-Illinois Smart Health Center, VinUniversity. PN, VL, TN, and LT were employed by VNU University of Engineering and Technology. DT was employed by E Hospital. HP, QN, TL, BD, and PT were employed by Bach Mai Hospital. The authors declare that this research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.
§ AUTHOR CONTRIBUTIONS
TN, LT and HP designed the research. TN and PN drafted the manuscript. TN, PN, LT, VL, TN and HP revised the manuscript. DT, HP, QN, TL, BD, and PT collected and annotated the data. All authors have approved the final version.
§ FUNDING
The research is supported by the Vingroup Innovation Foundation (VINIF) under project code VINIF.2019.DA02, and it is also supported by the VinUni-Illinois Smart Health Center at VinUniversity.
§ DATA AVAILABILITY STATEMENT
The HMC-QU dataset used in this study can be found and freely downloaded on Kaggle at <https://www.kaggle.com/datasets/aysendegerli/hmcqu-dataset>.
§ ETHICS STATEMENT
In the handling and use of medical data, we are committed to upholding the ethical principles of respect for persons, beneficence, and non-maleficence. We recognize that medical data is highly sensitive and personal, and we will take all necessary measures to protect the confidentiality and privacy of individuals. We will only use medical data for the purposes for which it was collected, and we will obtain informed consent from individuals before collecting or using their data. We will also ensure that the use of medical data is necessary and justified, and we will take steps to minimize any potential harm to individuals. Overall, our aim is to use medical data in a responsible and ethical manner that respects the rights and dignity of individuals.
abbrv
|
http://arxiv.org/abs/2303.07300v1
|
20230313172435
|
Improvement of Geant4 Neutron-HP package: Doppler broadening of the neutron elastic scattering kernel and cross sections
|
[
"M. Zmeškal",
"L. Thulliez",
"E. Dumonteil"
] |
physics.comp-ph
|
[
"physics.comp-ph",
"nucl-ex"
] |
1,2]M. Zmeškalcor1
[email protected]
3]L. Thulliez
[email protected]
3]E. Dumonteil
[1]Dept. of Nuclear Reactors, Faculty of Nuclear Sciences and Physical Engineering, Czech Technical University in Prague, V Holesovickach 2, Prague, 180 00, Czech Republic
[2]Research Centre Rez, Hlavni 130, Husinec-Rez, 250 68, Czech Republic
[3]Université Paris-Saclay, CEA, Institut de Recherche sur les Lois Fondamentales de l'Univers, 91191, Gif-sur-Yvette, France
[cor1]Corresponding author
Whether it is for shielding applications or for safety criticality studies, numerically solving the neutron transport equation with a good accuracy requires to precisely estimate the Doppler broadened elastic scattering kernel in the thermal and epithermal energy range of neutrons travelling in a free gas. In , low energy neutrons are transported using evaluated data libraries handled by the Neutron High-Precision (Neutron-HP) package. Version 11.00.p03 of the code features in particular the Doppler broadened elastic scattering kernel, provided by the so-called 'Sampling of the Velocity of the Target' (SVT) method. However this latter fails for resonant heavy nuclei such as ^238U and can severely impact the solving of the Boltzmann equation in fissile media. To overcome this shortcoming, the Doppler Broadened Rejection Correction (DBRC) method has been implemented in and successfully validated with the reference Monte Carlo neutron transport code (version 11). This development will be taken into account in the next release of the code. The cross section Doppler broadening process, which is performed on-the-fly, is also carefully investigated and ways to improve it on a simulation-by-simulation basis are presented. All the validations have been performed with an automated benchmark tool which has been designed to support the quality assurance of the Neutron-HP package. This tool is currently available on an ad hoc Gitlab repository and will be included in .
Neutron-HP Neutron elastic scattering kernel Doppler broadening DBRC
§ INTRODUCTION
Monte Carlo codes are routinely used for particle transport applications since they allow to track particles individually and eventually to keep correlations between them. To this aim the open-source toolkit has been developed by an international collaboration with the aim of supporting high-energy physics applications, as well as other domains, like space science, medical physics, engineering and nuclear physics.<cit.>. In the past decades, the physics range has been extended to lower energies, including low energy neutron transport (i.e. below 20 MeV) through the development of the Neutron High-Precision (Neutron-HP) package which is mainly based on evaluated nuclear data libraries to accurately describe neutron-matter interactions. During the last years in particular, the Neutron-HP package has been graduously improved <cit.>, due to the increasing need for neutron transport capabilities in the broader context of multi-particle transport codes required by applications such as accelerator physics, medical imaging and radiotherapy, fundamental physics, nuclear industry, etc. These latest developments place the code close to be on-par with reference neutron transport codes such as <cit.> or <cit.>.
Neutron transport simulations heavily rely on an accurate description of neutron-matter interactions and more specifically on a proper handling of the temperature of the material in which the neutron propagate because low energy neutrons (thermal and epithermal) are sensitive to molecular and atomic thermal motions. This latter cannot usually be neglected during neutron transport since it affects both the cross section and the final state of the reactions. Indeed the available energy in the centre of mass of the system depends on the relative velocity between the neutron and the moving target nucleus. This effect gives rise to the Doppler broadening process which can be written as:
σ_T(v_n)=1/v_n∫ v_r σ_T=0 K(v_r) ℳ(𝐕_t,T) d𝐕_t
with σ_T the Doppler broadened cross section at temperature T, ℳ(𝐕_t,T) the target velocity distribution, v_r=𝐯_n-𝐕_t the relative velocity between the neutron, 𝐯_n, and the target nucleus, 𝐕_t.
The cross section Doppler broadening can be performed exactly for example with the algorithm <cit.>. The definition of the final state of the reaction has to be coherent with the Doppler broadened cross section value. Often in Monte Carlo neutron transport codes the final state definition is divided in three domains depending on the neutron energy E_n, as sketched in Figure <ref>. For E_n>SVT_E_max, with SVT_E_max=400k_B T (∼10.5 eV at 300 K) and k_B the Boltzmann constant, the target nuclei are considered at rest, leading to the use of the so-called 0 K asymptotic elastic scattering kernel. For E_n<SVT_E_max, the target nuclei are assumed to behave as a free gas, i.e. moving freely relative to each other, and are described by a Maxwellian velocity distribution which is a valid approximation for many targets (in particular metallic), therefore in the following ℳ(𝐕_t,T) is set to be a Maxwell-Boltzmann distribution. The final state is then derived from Equation <ref> assuming a constant cross section over the relative velocity range leading to the so called 'Sampling of the Velocity of the Target' (SVT) method. Furthermore if the molecular and atomic bonds have a significant impact, i.e. for E_n<S(α,β)_E_max with S(α,β)_E_max=4 eV in , the free gas model does not hold true anymore and S(α,β) tables grasping the complex underlying physics of neutron-molecule or neutron-atom interactions have to be used to compute both the cross sections and scattering kernels. These tables are available for most materials used in nuclear reactor physics such as light water or uranium dioxide, since it can significantly impact the simulation predictions.
The SVT assumption used to compute the final state for E_n<SVT_E_max is not valid for resonant heavy nuclei since their cross sections vary rapidly by a few orders of magnitude over a narrow energy range. To overcome this shortcoming, after a presentation in Section <ref> of the tools used in this work, in Section <ref> the Doppler Broadening Rejection Correction (DBRC) algorithm implementation and validation in are presented. Then in Section <ref> the on-the-fly cross section Doppler broadening process in is carefully studied and improvements are suggested.
§ BENCHMARK METHODOLOGY AND TOOLS
The developments performed in this work have been done with version 11.00.p03. The results are compared to the reference neutron transport codes (version 11) and (version 6.2). is developed since the mid-1990s at CEA-Saclay (France) and is used as a reference code by the main French nuclear companies <cit.>. is developed at Los Alamos National Laboratory (United States) and is used worldwide as a reference neutron transport code for many applications involving neutrons. Both codes are used for criticality-safety system studies, depletion calculations and shielding applications. They benefit from a very large verification and validation database gathering more than 1000 experimental benchmarks and are regularly validated/qualified using inter-code comparisons <cit.>.
The evaluated data library ENDF/B-VII.1 <cit.> is used in this work through the G4NDL4.5 library in .
In the following, the developments performed in are validated with a differential-microscopic benchmark referred to as the thin-cylinder benchmark <cit.>. Its geometry is a thin cylinder with a radius r=1 μm and a length L=2 m. Mono-energetic neutrons, with a mean free path λ_n, are shot along the cylinder axis. The cylinder dimensions are chosen to have at least one collision (λ_n<<L) and to ensure that only one collision will occur in the cylinder (r<<λ_n). The neutron characteristics after the collision are tallied such as energy, angle, etc. It has to be mentioned that this thin-cylinder benchmark is a part of a broader set of automated benchmarks, which also includes an integral-macroscopic benchmark called the sphere benchmark in which the neutron flux is tallied within a 30 cm radius sphere having a mono-energetic and isotropic source at its center <cit.>. These automated benchmarks have been developed to test and assess the quality of new releases with respect to its Neutron-HP package. In this framework, once the simulations are performed, this tool compares the results to or results aggregated in a database and tests the statistical significance of the results to alert on potential problems. Finally it outputs a report summarising the results. This code is made available to the community on the following Gitlab repository <cit.> and will be included to .
In this work, the thin-cylinder material is set to ^238U because it has low energy resonances in its cross sections. The primary neutron energies are chosen to be below the first three resonances, i.e. at 6.52 eV, 20.2 eV and 36.25 eV. The temperature effects on the elastic scattering kernels have been investigated with the ^238U material set at 300 K, 600 K and 1000 K. For each temperature-energy combination 10^8 neutrons are simulated.
§ DOPPLER BROADENED NEUTRON ELASTIC SCATTERING KERNEL
§.§ Study of the SVT algorithm for heavy nuclei
The effect of thermal motion on the final state definition is mainly important for elastic scattering, because it is a non-threshold and non-absorbing reaction. Therefore in many neutron transport codes the SVT algorithm is just applied to elastic scattering whereas in it is applied to all reaction channels (elastic, capture, etc). In the following only the elastic scattering reaction is considered.
The target nucleus thermal motion changes the outgoing neutron energy and scattering angle probabilities. To take it into account, the sampling of the velocity of the target nucleus 𝐕_t has to be done in a way that preserves the reaction rate given by Equation <ref> <cit.>. This sampling can be transformed into a selection of the pair (μ,V_t), where μ is the cosine of the angle between the neutron and target nucleus velocities. By introducing the exact form of ℳ(𝐕_t,T) into Equation <ref> and integrating it over the azimuthal angle, the following joint probability distribution can be written:
p(V_t,μ) dV_t dμ=v_rσ_0(v_r) β^3/π^3/2 V_t^2 e^-β^2V_t^2 2π/v_nσ_T(v_n)dV_t dμ
with β=√(M/2k_BT) and M the target mass. In this distribution μ and V_t are correlated and cannot be sampled independently. When the assumption is made that σ_0(v_r)/σ_T(v_n) is constant over the relative velocity range v_r, the SVT joint probability distribution is obtained:
p_SVT(V_t,μ) dV_t dμ = C dμ/2_(A)(v_n+V_t)4β^3/√(π)V_t^2 e^-β^2 V_t^2dV_t _(B)(v_r/v_n+V_t)_(C)
In the SVT algorithm, μ is firstly sampled uniformly between [-1,1].
Then in sampling V_t from (B), V_t is sampled from 4β^3/√(π)V_t^2e^-β^2V_t^2dV_t with probability P_1=v_n/v_n+2/√(π)β and then from 2β^4 V_t^3e^-β^2V_t^2dV_t with probability P_2=1-P_1 <cit.>. Finally the pair (μ,V_t) is accepted with the probability given by (C) where v_r=√(v_n^2+V_t^2-2v_nV_tμ).
The SVT method in has been recently revised and successfully benchmarked against <cit.>. In this work it has been again benchmarked with an emphasis on resonant heavy nuclei, here on ^238U, to validate the SVT algorithm which is the building block of the DBRC method. The default value of SVT_E_max has been increased from 400 k_BT (∼10.5 eV at 300 K) to 50 eV to use the SVT algorithm for the first three ^238U resonances. The Figures - left column - <ref>, <ref> and <ref> show that the energy of secondary neutrons calculated with agree well with within the statistical uncertainties. There is also an overall good agreement with for the energy-temperature combination for which the SVT algorithm is used in . In fact the default energy threshold SVT_E_max=400k_BT in could not have been changed in this work.
Theses comparisons ensure that the SVT method is well implemented in and allows to validate once again the building block of the DBRC algorithm for resonant heavy nuclei that is now studied.
§.§ DBRC method for resonant heavy nuclei
The assumption of the constant cross section leading to the SVT method is valid for light and medium nuclei since often their cross sections are constant at low energies. In the past it was assumed to be valid because it was thought that heavy nuclei do not significantly take part in the neutron slowing-down process. However it was shown <cit.> that the effect of low energy resonances should not be overlooked in resonant heavy nuclei especially for shielding and nuclear reactor applications. In fact, for example, have demonstrated that treating exactly the elastic scattering kernel for the ^238U resonances with DBRC instead of using the SVT assumption leads to a change of the k_eff value by as much as 350 pcm and Doppler coefficients by 16 % for an infinite array of identical fuel pin cells based on a PWR subassembly. It can also impact the extraction of resonance parameters from experimental data such as in <cit.>.
To overcome the SVT approximation shortcoming, in the mid-1990s, Rothenstein and Dagan <cit.> successfully developed scattering kernels for resonant nuclei in the epithermal region through the extension of S(α, β) tables to higher energy. The DBRC algorithm that is now considered has been firstly proposed by Rothenstein <cit.> and put again into light recently by Becker et al. <cit.>. To exactly sample the (μ, V_t) pair from Equation <ref> on top of the SVT algorithm (Equation <ref>) another rejection loop/criterion (D) is added to get the exact Doppler Broadened elastic scattering kernel <cit.>:
p_DBRC(V_t,μ)=C' p_SVT(V_t,μ) ( σ_0(v_r)/σ_0^max(v_ξ))_(D)
with C' a normalisation constant and σ_0^max(v_ξ) the maximum 0 K cross section in the range v_n± 4√(2k_BT/M). This range is chosen to be in accordance with the integral limits of the algorithm used for an exact Doppler broadening process <cit.>.
From the rejection term (D), it can be seen, that the acceptance probability can be small near a resonance. Therefore this additional term increases the probability of selecting a velocity V_t that makes the neutron scattered at the resonance energy. This leads to a computation time increase because of the low acceptance probability.
The DBRC method has been implemented in G4ParticleHPElasticFS::GetBiasedThermalNucleus on top of the existing SVT algorithm as in previous works <cit.>. To use and modify the behaviour of the DBRC algorithm in , the users have access to five new commands allowing to modify its behaviour as sketched in Figure <ref>:
* /process/had/particle_hp/use_DBRC
to enable (true) / disable (false) the DBRC algorithm. By default it is disabled.
* /process/had/particle_hp/DBRC_A_min
to set the minimum atomic mass in neutron masses for which the DBRC algorithm is applied. The default value is set to 200 amu.
* /process/had/particle_hp/SVT_E_max
to set the maximum energy up to which the SVT algorithm is used. The default value is set to 400 k_BT. The 0 K scattering kernel is used above the user defined value.
* /process/had/particle_hp/DBRC_E_min(max)
to set the minimum (maximum) energy between which the DBRC algorithm is applied. The default value of E_DBRC_min is set to 0.1 eV, below the SVT algorithm is used. This value should corresponds to an energy below which there is no nuclear resonance for the considered isotopes. The default value of E_DBRC_max is set to 210 eV. These values are set in accordance with <cit.>.
The DBRC method being not implemented in the current release, the DBRC results are only compared to . This latter has been validated by Zoia et al. <cit.> who have performed an exhaustive validation of its implementation against other ways to compute the Doppler broadening elastic scattering kernel such as the use of S(α,β) tables extended to higher energies <cit.>, the Weight Correction Method (WCM) <cit.>, or direct computation of the integral given by <cit.> in <cit.>.
The thin-cylinder benchmark has been performed in the same conditions as for the SVT benchmark. The DBRC results presented in the right columns of Figures <ref>, <ref> and <ref> show a very good agreement between and inside the statistical uncertainties. As can be seen, the secondary neutron energy distributions changes significantly compared to those obtained with the SVT method. Table <ref>, presenting the average scattered neutron energy, shows that the average energy with the SVT method remains the same for the different temperatures while with the DBRC method it increases with the temperature. and agree well with each other since the relative errors are around 10^-3 % for both SVT and DBRC methods. The average neutron energy increase agrees with the increase of the up-scattering probability (i.e. ratio of neutrons undergoing scattering with a higher energy than the initial neutron) as shown in Table <ref>. Again, here, the results between and are in good agreement since the relative differences are less than 1 %.
All these results validate the DBRC algorithm implementation in .
§ ON-THE-FLY CROSS SECTION DOPPLER BROADENING IN
In Monte Carlo neutron transport codes, cross sections can be Doppler broadened mainly with two methods. The first method consists in performing exactly the Doppler broadening (given by Equation <ref>) before the simulation for example with the algorithm implemented in a pre-processing tool such as <cit.>. Therefore no additional computation time is spent during the simulation for this. The drawbacks of this approach lies in the limited number of available temperatures for the simulation and the need to have a large computer memory size to store these data. It is mainly used in reference neutron transport codes such as and . The second method is more demanding in terms of computational time since the Doppler broadening is done during the simulation, i.e. on-the-fly (OTF), but can be made at any temperature required by the user. This latter has been chosen in for its versatility allowing to suit any needs from users coming from very different physics communities.
In comparing the thin-cylinder benchmark results from and , it was found that the total reaction rate from was different from , while relative values (such as the up-scattering probability) agree well between the two codes. This discrepancy arises because of the stochastic OTF Doppler broadening method implemented in . Its implementation can be seen, for example, in the G4ParticleHPElasticData::GetCrossSection method for elastic scattering and can be summarised as followed:
[mathescape=true, language=C++, basicstyle=,label=lst:DBGeant4_OTF, caption=Pseudo-code of the implemented on-the-fly stochastic integral of the Doppler broadened cross section in . ]
///Initialization
size=max(10, T/60)
///On-the-fly stochastic integral computation
while (|σ_T^old(v_n)-σ_T^new(v_n)| > ϵ_xs·σ_T^old(v_n))
σ_T^old(v_n)=σ_T^new(v_n)
while (counter<size)
sample 𝐕_𝐭 from Maxwell-Boltzmann distribution
get σ(v_r)
σ_T^new(v_n)σ(v_r)·|𝐕_𝐭-𝐯_𝐧|/v_n
counter
σ_T^new(v_n)=σ_T^new(v_n)/counter
size size
return σ_T^new(v_n)
with counter the total number of loops performed by the algorithm and size the number of loops for each batch. At each step, the Doppler broadened cross section is computed and compared with its previous value. The algorithm stops when a convergence criterion ϵ_xs is met.
By default ϵ_xs are set to 0.03 and 0.01 respectively for capture and elastic reactions and for fission and inelastic reactions. However, these criteria do not guarantee sufficient cross section convergence as already pointed out in <cit.> and as can be seen in Figures <ref> and <ref>. Therefore the impact of ϵ_xs on the capture and elastic scattering has been studied with the thin-cylinder benchmark at 300 K and with 6.52 eV neutrons. The quantities of interest are the mean cross section, its standard deviation and its most probable value (MPV) since the distributions are not symmetric as can be seen in Figures <ref> and <ref>. The OTF algorithm has been performed 8000 times to get statistical significant results for each convergence criterion. The results are compared to cross sections which have been computed exactly in using the algorithm with .
The Figures <ref> and <ref>, presenting the mean and MPV cross sections, show that the mean cross section converges when ϵ_xs decreases and that the MPV is always approximately the same for all convergence criterion values and is equal to the converged mean cross section value.
With the default value ϵ_xs=0.03, the mean capture and elastic cross sections are respectively around 2 % and 10 % lower than ones. For ϵ_xs<0.001, the elastic and capture mean cross sections are converged to a value 1 % higher than ones as shown in Figures <ref> and <ref>. This 1 % discrepancy could be caused by interpolation errors since results are compatible with cross sections taken at 6.520 eV± 1 meV. This discrepancy is therefore not investigated further.
The evolution of the cross section standard deviation is also quantified in Figure <ref> as a function of ϵ_xs and shows a decrease from 23 % for elastic cross section (9 % for capture) at ϵ_xs=0.03 to less than 1 % for both cross sections for convergence criterion at ϵ_xs=10^-4. With these results, one can be tempted to change the default ϵ_xs value to a lower one, however a lower convergence criterion leads to a higher number of loops and therefore a higher computation time. In fact the computation time rises drastically as a function of ϵ_xs and then its increase starts to slow down from ϵ_xs=10^-4. In the future it could be worth to evaluate how this OTF algorithm performs compared to other algorithms such as the regression method <cit.>, the multipole representation of the cross section <cit.> or methods based on explicit treatment of target motion at collision sites <cit.>.
It has to be pointed out that all the results presented in Section <ref> have been computed with a convergence criterion set to ϵ_xs=10^-4 which is a trade-off between the cross section precision and computation time. Unfortunately this only can be done for benchmarking purposes, because of the prohibitive computation time for one OTF Doppler broadening algorithm call. However this problem would not be so important for integral studies since the Doppler broadening will be performed many times (at different energies) and so in average will give the right result.
It finally has to be recalled that this behaviour arises because the resonant part of the cross section is investigated. In fact for non-resonant cross sections, such as for ^1H, Figure <ref> shows that the cross section mean and MPV are approximately the same for all convergence criteria and agree with cross sections. The capture cross section is again around 1 % higher, which could be caused by interpolation errors because the 0 K cross section for elastic scattering is almost constant at 6.52 eV, whereas the capture cross section significantly decreases. The standard deviation is under 1 % for elastic and 0.2 % for capture for the default convergence criteria as can be seen in Figures <ref> and <ref>.
§ CONCLUSION
The Doppler Broadening Rejection Correction algorithm used to describe accurately the elastic scattering kernel of resonant heavy nuclei has been successfully implemented into . The validation performed with the reference Monte Carlo neutron transport code showed a very good agreement between the two codes within the statistical uncertainties. The DBRC algorithm will be implemented in the next release. This work makes the Neutron-HP package at the state-of-the-art regarding the description of Doppler broadened elastic scattering kernels. The importance of the convergence criterion for the on-the-fly Doppler broadening routine has also been investigated and showed that the default convergence criterion values should be adapted on a simulation-by-simulation basis depending on the observable under study. With the developments performed in this work, the last missing feature in compared to reference neutron transport codes is the description of the unresolved resonance region with probability tables. This last point will be addressed soon in a dedicated paper.
§ ACKNOWLEDGEMENT
This work could be done thanks to the IAEA´s technical cooperation programme, which supported a fellowship of Marek Zmeskal at IRFU, CEA in the framework of national project CZR0011 - Strengthening Human Resources Capacity in Nuclear Science and Technology.
The authors wish to sincerely thank Cédric Jouanne and Alberto Ribon head of the Hadronic Working Group for fruitful discussions respectively regarding and .
is a registered trademark of CEA.
unsrtnat
|
http://arxiv.org/abs/2303.07225v1
|
20230313155846
|
On the cyclotron absorption line and evidence of the spectral transition in SMC X-2 during 2022 giant outburst
|
[
"G. K. Jaisawal",
"G. Vasilopoulos",
"S. Naik",
"C. Maitra",
"C. Malacaria",
"B. Chhotaray",
"K. C. Gendreau",
"S. Guillot",
"M. Ng",
"A. Sanna"
] |
astro-ph.HE
|
[
"astro-ph.HE",
"astro-ph.SR"
] |
firstpage–lastpage
Estimate distillable entanglement and quantum capacity by squeezing useless entanglement
Xin Wang
March 30, 2023
========================================================================================
We report comprehensive spectral and temporal properties of the Be/X-ray binary pulsar SMC X-2 using X-ray observations during the 2015 and 2022 outbursts. The pulse profile of the pulsar is unique and strongly luminosity dependent. It evolves from a broad-humped into a double-peaked profile above luminosity 3×10^38 ergs s^-1. The pulse fraction of the pulsar is found to be a linear function of luminosity as well as energy. We also studied the spectral evolution of the source during the latest 2022 outburst with NICER. The observed photon index shows a negative and positive correlation below and above the critical luminosity, respectively, suggesting evidence of spectral transition from the sub-critical to super-critical regime. The broadband spectroscopy of four sets of NuSTAR and XRT/NICER data from both outbursts can be described using a cutoff power-law model with a blackbody component. In addition to the 6.4 keV iron fluorescence line, an absorption-like feature is clearly detected in the spectra. The cyclotron line energy observed during the 2015 outburst is below 29.5 keV, however latest estimates in the 2022 outburst suggest a value of 31.5 keV. Moreover, an increase of 3.4 keV is detected in the cyclotron line energy at equal levels of luminosity observed in 2022 with respect to 2015. The observed cyclotron line energy variation is explored in terms of accretion induced screening mechanism or geometrical variation in line forming region.
stars: neutron – pulsars: individual: SMC X-2 – X-rays: stars.
§ INTRODUCTION
Be/X-ray binaries (BeXRBs) represent two-thirds of the population of high mass X-ray binaries (HMXBs). These systems consist of a massive (>10) optical companion and a compact object (usually a neutron star) in a binary system. The optical companion in BeXRBs is a non-supergiant OB spectral type star that shows Balmer series emission lines and infrared excess at a point in its life <cit.>. The above characteristics originate from an equatorial circumstellar disk that is formed around the Be star due to its rapid rotation at velocities of more than 75% of Keplerian limit <cit.>. The compact object in the system, on the other hand, accretes directly from the Be-circumstellar disk. Two kinds of X-ray outbursts are observed from BeXRBs. First, Type-I outbursts are short (only a few weeks long), (quasi-)periodic events that reach a peak luminosity
of ≤10^37and occur close to the periastron passage of the binary system.
The second category of outbursts is giant in nature, where the peak luminosity reaches ≥10^37-38. The latter usually lasts for a multiple or significant portion of the orbit and does not follow any orbital dependencies.
A significant population of BeXRBs is found in the Milky Way and the Magellanic Clouds with luminosities in the range of 10^34-38<cit.>. Our Galaxy hosts about 60–70 such systems <cit.>. The Small Magellanic Cloud (SMC; a neighboring irregular dwarf galaxy), however, contains about 68 pulsars (and a total of 122 sources including candidates) despite being only a few percent of the mass of the Milky Way Galaxy <cit.>.
SMC X-2 is a 2.37 s pulsating source in a BeXRB system located inside SMC <cit.> at a distance of 62 kpc <cit.>. It was the second brightest X-ray source in the galaxy when SAS 3 discovered it in October 1977. The recorded luminosity was 8.4×10^37 ergs s^-1 (assuming a distance of 65 kpc) in the 2–11 keV energy band <cit.>. Later observations with the HEAO, Einstein and ROSAT missions demonstrated the X-ray transient nature of the source <cit.>. Thanks to (Rossi X-ray Timing Explorer) and ASCA (Advanced Satellite for Cosmology and Astrophysics), coherent X-ray pulsations from SMC X-2 were detected for the first time during the 2000 January-April outburst <cit.>. This discovery made it possible to identify the accreting object as a neutron star. The optical observations of the system, on the other hand, suggested two possible early-type stars at an angular separation of 2.5 arcsec as the potential counterparts of the pulsar. The Optical Gravitational Lensing Experiment (OGLE) I-band photometric studies found variability at a period of 18.62±0.02 d from one of the stars (northern star) <cit.>. This periodicity closely matched the orbital period of ≈18.4 days measured by studying the X-ray pulse-period modulation during the 2002 and 2015 outbursts <cit.>. The optical counterpart (northern star) is identified to be an O9.5 III-V emission star <cit.>.
The system displayed major outbursts during 1977 October <cit.>, 2002 January-April <cit.>, 2015 August-November <cit.>, and 2022 June-August <cit.>.
Detailed studies with XMM-Newton, Swift/XRT, and NuSTAR were performed during the 2015 outburst when the pulsar was accreting in the super-Eddington regime with a peak outburst luminosity of 6×10^38 ergs s^-1 <cit.>. Ionized emission lines from N, O, Ne, Si, and Fe were detected in the data from the XMM-Newton observation <cit.>. Moreover, with broadband coverage of in the range of 3-79 keV, the neutron star magnetic field was estimated for the first time to be ≈3×10^12 G based on the discovery of a cyclotron resonance scattering feature (CRSF) at around 27 keV <cit.>. A negative correlation between the luminosity and cyclotron line energy was also reported in the study. In addition to this, the pulsar is known to show luminosity-dependent pulse profiles evolving from single to double-peaked <cit.>. The onset of the propeller regime observed in late 2015 also provided a measurement of the magnetic field to be ≈3×10^12 G <cit.>, in agreement with the estimation through CRSF detection.
After seven years of X-ray quiescence, SMC X-2 became active on 2022 June <cit.>. The pulsar reached a peak luminosity of 1×10^38 ergs s^-1, three weeks after its detection in the soft X-ray band <cit.>. Unlike the 2015 outburst, the /GSC <cit.> did not detect any significant outburst peak in 2–20 keV band due to the relatively moderate nature of the outburst in addition to the observational coverage gap (see, e.g., Figure <ref>). We monitored the target closely with and to understand the spectral and temporal evolution during the 2022 outburst. We also analyzed three observations from the 2015 outburst to examine the cyclotron line and its evolution and also studied the broadband temporal and spectral properties of the source. Section 2 reports the details of the observations and data analysis methods. The timing and spectral results are presented in Section 3, followed by a discussion and conclusion in Section 4.
§ OBSERVATIONS AND DATA ANALYSIS
§.§
Launched in 2017 June, the X-ray timing instrument (XTI, ) is a soft X-ray telescope (0.2–12 keV) attached to the International Space Station. The XTI consists of a total of 56 co-aligned concentrator optics. Each optics collimates the soft X-ray photons onto a silicon drift detector at the focus <cit.>. A high time resolution of ∼100 ns (rms) and spectral resolution of ≈85 eV at 1 keV are achieved by . The effective area of the instrument is ≈1900 cm^2 at 1.5 keV, with 52 active detectors. The total field of view of is ≈30 arcmin^2.
monitored after the onset of the 2022 outburst in June.
We used a total of 37 observations under the ObsIDs 52028301xx with a net exposure time of ≈ 39.6 ks for studying the pulsar emission during the outburst between 2022 June 20 and August 17. We reduced the data using the nicerl2 [<https://heasarc.gsfc.nasa.gov/docs/nicer/analysis_threads/nicerl2/>] script available under HEASoft version 6.30. The reprocessing is done in the presence of the gain and calibration database files of version 20200722. The cleaned events obtained from the pipeline are used in our further analysis. In the beginning, the events from the South Atlantic Anomaly region were filtered out. We further applied standard filtering criteria based on the elevation angle from the Earth limb, pointing offset, and the offset from the bright Earth. Good time intervals were produced using the nimaketime task. Final spectra and light curves were created with the XSELECT package of FTOOLS. The spectral background corresponding to each observation is generated using the nibackgen3C50[<https://heasarc.gsfc.nasa.gov/docs/nicer/toolsnicer_bkg_est_tools.html>] tool <cit.>. The response matrix and ancillary response files of version 20200722 are applied in our spectral analysis.
§.§
is the first hard X-ray focusing observatory launched in 2012 June <cit.>. It consists of two co-aligned grazing angle incidence telescopes. The mirrors in each optic are coated with multilayers of Pt/SiC and W/Si that reflect the soft to hard X-ray photons. A Cadmium-Zinc-Telluride detector at the focal point of each unit is sensitive to the 3–79 keV photons. Following the recent outburst of SMC X-2, we requested a ToO observation. The target was observed for an effective exposure of 42.7 ks on 2022 July 13-14 (Table <ref>). Standard analysis procedures were followed for data reduction with NuSTARDAS 1.9.7 software. Unfiltered events were processed in the presence of the CALDB of version 20220802 using nupipeline task. Source products are extracted from a circular region of 120 arcsec radius around the central coordinates on each detector using the nuproducts task. The background products are also accumulated in a similar manner from a source-free circular region of 120 arcsec radius. The background-subtracted light curves from both detector modules of were combined for our timing studies.
We also reduced the data from the observations of SMC X-2 during its 2015 major outburst (Table <ref>) by following the above procedure. The first observation was close to the peak of the outburst in 2015 September, while the other two were in the declining phase. Corresponding /XRT observations are analyzed to perform broadband spectroscopy (see also for XRT data analysis and descriptions; ). All four observations in the 2015-2022 timeline are simply referred to as Obs-I, Obs-II, Obs-III, and Obs-IV in the paper. For spectroscopy, we have grouped each , , and XRT spectra for a minimum of 32 counts per channel bin to achieve a good signal-to-noise ratio using grppha.
§ RESULTS
§.§ Timing analysis
We searched for X-ray pulsations in the 3–79 keV light curves of using the χ^2-maximization technique <cit.>. The barycentric corrected pulse period of the neutron star was estimated to be 2.37197(2), 2.37141(2), 2.37257(2), and 2.37283(1) s during Obs-I, Obs-II, Obs-III, and Obs-IV, respectively. The light curves from all the observations are folded with the corresponding pulse period to obtain pulse profiles in the 3–79 keV band, which are shown in Figure <ref>. A double-peaked profile is clearly evident at a luminosity[The 0.5–100 keV unabsorbed luminosity is calculated at a distance of 62 kpc after broadband spectroscopy that is presented in Section 3.2.] of 6×10^38 ergs s^-1 (top panel of Figure <ref>). The shape of the pulse profile changes as luminosity decreases to <3×10^38 ergs s^-1 where a hump-like structure appears in the profile between 0.5–1.5 pulse phase. The pulse profiles exhibit similar morphology at an equal level of luminosities observed during the 2015 (Obs-II) and 2022 (Obs-IV) outbursts.
We adopted the following definition to evaluate the pulse fraction (PF) of the pulsar, i.e., the relative amplitude of pulsed modulation:
PF = F_max - F_min/F_max + F_min,
where, F_max and F_min are the maximum and minimum intensities observed in the pulse profile, respectively. The estimated PFs during Obs-I, Obs-II, Obs-III, and Obs-IV are ≈45.7±0.4, 29.2±0.4, 17.6±0.2, and 26.2±0.3%, respectively. The observed PF is correlated with luminosity. This means that the pulsed emission from the accretion column or the hot spot contributes more than the unpulsed radiation (originating from accretion flow or from the surface) when the source luminosity increases.
To examine the evolution of pulsed beam geometry of the source, we folded the energy-resolved light curves in 3–7, 7–15, 15–25, 25–40, and 40–79 keV from the observations (Figure <ref>). Doubled peaked profiles are observed throughout soft to hard X-ray energy ranges during Obs-I. The emission from both poles is clearly apparent at this stage. As the luminosity decreases to a level of ∼3×10^38 ergs s^-1, the pulse profiles below 15 keV (Obs-II and Obs-IV) appear with a hump-like structure that further evolves into a double-peak at higher energies. The Obs-III is at around the Eddington limit of a classical neutron star. At this point, the soft to hard pulse profiles are single-peaked with a hump in the middle. We further studied the energy evolution of the PF from the pulse profiles. Figure <ref> shows positive dependencies between the energy and the PF. An extremely low PF of about 11% is found during Obs-III in the 3–7 keV band.
§.§ Spin evolution
We used the barycentric corrected data to investigate the evolution of the temporal properties with the outburst and in particular, the spin evolution.
To search for a periodic signal, we followed the same methodology adopted for monitoring of SXP 15.6 <cit.>.
First we adopted the epoch folding Z-search test implemented through HENdrics and Stingray <cit.>.
Then we refined the temporal solution and its uncertainty based on the ToA of individual pulses by using PINT[<https://github.com/nanograv/pint/>] <cit.>.
For some snapshot phases connecting the ToAs was challenging to impossible due to multiple peaks in the periodogram with similar intensity, a problem often encountered in slow pulsars observed with gaps <cit.>.
The resulting period measurements are shown in Fig. <ref>, In the same plot, we mark the measurement. We note that observations where a defined period was not obtained are marked as `bad` and no error is given as their uncertainty is similar to the range of the plot.
In the spin evolution, we see clear signatures of orbital motion, consistent with the 18.38 d period reported in the literature based on data <cit.>, while a similar periodicity is also seen in optical data of the system <cit.>.
Modeling of the archival data has revealed an almost circular orbit with an eccentricity of about 0.07. The sampling of the data was sparse and in similar orbital phases. In contrast, the new data cover a smaller baseline but better sample the orbital cycle near the peak of the outburst. Thus their study could help improve the old orbital solution.
To model the orbital evolution, we used a model composed of the orbital signature and the first derivative of the frequency similar to <cit.>.
Moreover, we followed a Bayesian approach to effectively sample the whole parameter space of the underline model <cit.>.
We applied the same method to the data, and the measurements[Data points were extracted from <cit.>].
Given the issues with the period determination at the later stages of the 2022 monitoring, we constrained our fit within MJD 59750-59790.
We find that the 2022 monitoring data yield a somehow eccentric orbit (e=0.27), while the period is better constrained by the data. Interestingly, if we maintain no priors for the eccentricity the fit to the data yields a lower eccentricity consistent with the one reported by <cit.>. For comparison, we plotted both solutions to the newly obtained and archival data shown in Figure <ref>.
§.§ The continuum emission during 2022 outburst
The soft X-ray energy spectrum of is studied to understand the emission at different phases of the 2022 outburst. We used observations at multiple epochs of the outburst in this study. Each 0.5–10 keV spectrum can be fitted statistically well with an absorbed cutoff power-law model in XSPEC (). Figure <ref> shows the energy spectra from these observations together. We considered TBabs model at Wilm abundance <cit.> and Verner cross-section <cit.> to account for the local and interstellar medium absorptions along the source direction in our spectral fit. We found that the equivalent hydrogen column density (N_ H) varies in the range of (1–3)×10^21 atoms cm^-2 during these observations. To reduce the spectral fitting degeneracy in the soft X-ray band, the column density is fixed at an average value of 1.43×10^21 cm^-2, which is consistent with the value observed with XMM-Newton in 2015 within error bars <cit.>. We then fitted each individual spectrum with an absorbed cutoff power-law model at the above-fixed column density. No signature of iron fluorescence line is detected in the spectra. The 0.5–10 keV unabsorbed flux is estimated using the cflux convolution model. The parameter errors are estimated for the 90% confidence interval in this paper.
The evolution of the spectral parameters during the outburst is shown in Figure <ref>. The power-law photon index and cutoff energy are variable across the rise (blue) and decay (red) phases of the outburst. The peak luminosity in the 0.5–10 keV range is found to be 1.3×10^38 ergs s^-1 (for a source distance of 62 kpc) around the outburst peak. To examine the spectral changes and associated spectral transition, the parameters are studied with respect to the 0.5–10 keV unabsorbed luminosity in Figure <ref>. The photon index and cutoff energy follow a positive correlation (with a Pearson correlation coefficient of 0.61 and 0.66, respectively) with luminosity above 9×10^37 ergs s^-1. The index stays close to a value of 0.35 at luminosity in the range of (6-9)×10^37 ergs s^-1. This could be identified as a critical limit of the pulsar where the spectral shape changes. Below this limit, the source shows a negative correlation (with a Pearson correlation coefficient of –0.57) between luminosity and the photon index. Similar behavior is observed between luminosity and the cutoff energy (with a Pearson correlation coefficient of –0.54).
We also fitted each spectrum with two absorption components together with a cutoff power-law model. One of the column densities was fixed at a foreground value 4×10^20 cm^-2 <cit.> at the Solar abundance. Another column density was free in our study at the SMC abundance of 0.2 Solar <cit.> to incorporate the local absorption. The SMC column density changes in the range (0.5–3)×10^21 cm^-2 during the outburst. All the fitted parameters, such as SMC column density, photon index, and the cutoff energy, however, were found to decrease with luminosity. A gradual decline may be because of spectral degeneracy among these parameters in the soft X-ray band. This is similar to the findings discussed above in this section. Though we can not totally disentangle the variation of the local absorption during the outburst, therefore, to reduce the degeneracy among the parameters, we fixed the SMC column density to an average value of 1.25×10^21 cm^-2. This resulted in similar kinds of parameter variations as reported in Figures <ref> & <ref>.
§.§ Broadband spectroscopy of the pulsar during 2015 and 2022 giant outbursts
We further performed broadband spectroscopy of in the 1–70 keV range to investigate the continuum as well as the nature of the cyclotron absorption line and its evolution. Three sets of XRT and quasi-simultaneous data from the 2015 outburst are used along with the 2022 July and pointed observations (Figure <ref>). These spectra are additionally binned for representation purposes using setplot rebin command of XSPEC. The pulsar spectrum can be described by standard models such as the Fermi-Dirac cutoff power-law, the Negative and Positive power-law with Exponential cutoff (NPEX; ), and the cutoff power-law with a blackbody component (see also ). In our study, we used an absorbed cutoff power-law model with a blackbody component (bbodyrad in XSPEC) to study all four data sets. The column density was pegged at a lower limit of 1×10^20 cm^-2 in the fit. A 6.4 keV Gaussian component for an iron fluorescence line is also needed. In addition to the emission, a cyclotron absorption feature appears in the data and is fitted with a Gaussian absorption line. The cyclotron lines are detected at <30 keV and at 31.5 keV in the 2015 and 2022 data sets, respectively (Table <ref>). We used the Markov chain Monte Carlo (MCMC) model in XSPEC for error estimation on the spectral parameters. The Goodman–Weare algorithm with 20 walkers and a total length of 200000 is considered in our study. The spectral parameters at a 90% confidence interval are presented in Table <ref>. We also show the 68, 90, 95, and 99.7% confidence level contour maps for cyclotron line energy and width for second and fourth observations in Figure <ref>.
The cyclotron line energy, width, and line strength decreased with the luminosity during the 2015 outburst (Figure <ref>). The second and fourth observations (see Table <ref>) are at almost the same luminosity level. However, the cyclotron line parameters, especially the cyclotron line energies, are found to be marginally higher (within 90% level) in 2022 July. The magnetic field of the neutron star can be estimated to be 3.5×10^12 G based on this recent detection.
Moreover, to study the model-independency of the cyclotron line, we show the parameter evolution using an absorbed NPEX model with a GABS component. The cyclotron parameters are consistent between both models (Figure <ref>).
Following the broadband fit, we found that the 0.5–10 keV luminosity represents about 40% of the total pulsar emission in a 0.5–100 keV band. Therefore, an average bolometric correction of 2.5 can be applied to the outburst emission measured by . This is consistent with the typical estimates where the soft band mostly contributes around 30–40% of the pulsar emission <cit.>.
The 2022 outburst of peaked at around MJD 59769.4 with a bolometric corrected luminosity of 3.2×10^38 ergs s^-1. This is close to half of the peak value the pulsar attained in the 2015 outburst.
Other parameters in Table <ref> such as the blackbody temperature was found to be in a narrow range of (0.85–1.1) keV during both outbursts. We also measured the corresponding emission radius (Radius_ bb) to examine the possible origin and location of thermal emission. The observed Radius_ bb is estimated to be in the range of (14–22) km (see Table <ref>), which is close to the size of a neutron star. This suggests that the thermal component may originate from the neutron star surface or from the accretion column during the 2015 and 2022 outbursts.
§ DISCUSSION AND CONCLUSIONS
The broadband emission from the accreting X-ray pulsars is understood to be due to thermal and bulk Comptonizations of seed photons from the hot spots within the accretion column mounted on the magnetic poles of the neutron star <cit.>. The underlying physical phenomena of these sources can be understood by studying the pulse emission geometry and the spectral evolution of the pulsar during X-ray outbursts. At lower luminosities such as 10^34-35 erg s^-1, the accreted material falls freely until it gets halted and settled by Coulomb interactions in a hydrodynamical shock near the surface <cit.>. This leads to a simplistic pulsed emission geometry in the form of a pencil beam where the X-ray photons propagate along the magnetic field lines. At this stage, the radiation is mostly dominated by bulk Comptonization <cit.>. When the accretion rate increases, a radiation-dominated shock is expected to be formed in the accretion column at a critical luminosity that leads to geometrical changes or spectral transition in the emission <cit.>. The infalling material interacts closely with the shock and gets decelerated through it before settling down onto the neutron star. The photons below the shock region diffuse through the column side-wall in the form of a fan beam pattern. The anticipated emission geometry is a mixture of fan and pencil beam patterns at a luminosity of ∼10^36-37 erg s^-1. The thermal as well as bulk Comptonization processes contribute significantly to the observed broadband emission at this stage. In the super-critical luminosity regime (>10^37 erg s^-1), a pure fan beam pattern is expected because of a strong radiative shock that makes the accretion column optically thick for photons propagating along the magnetic field lines.
was observed with at luminosities above the Eddington limit of a classical neutron star during the 2015 and 2022 outbursts. The pulse profiles are found to be luminosity dependent. At a luminosity of 6.1×10^38 ergs s^-1 (Obs-I), a doubled peaked profile appears throughout soft to hard X-rays suggesting the emission from both the poles of the neutron star as the observed peaks are separated by 0.5 phase in the pulse profile. The emission geometry, however, evolves below this luminosity, where the soft X-ray profiles are mainly broad or contain a hump-like structure. The emission from both poles is clearly apparent in the hard X-rays in the case of Obs-II and IV. The pulse fraction of the pulsar increases with energy clearly up to 40 keV, indicating an increase in the pulsating photons contributing to emission at higher luminosities. This suggests the rising height of the accretion column or mound. The profile changes with luminosity can be understood in terms of evolving emission geometry, where the significant contribution of the fan beam is anticipated in the super-critical regime.
We also detected a spectral transition in during the 2022 outburst with . The photon index shows a positive and negative dependency on luminosity below and above a range of value in the range of (6–8)×10^37 ergs s^-1 in 0.5–10 keV range. Considering a bolometric correction factor of 2.5, we expect a critical luminosity of (1.5–2)×10^38 ergs s^-1 at which the emission pattern is expected to change. According to <cit.>, the critical luminosity depends on the magnetic field assuming disk accretion onto a classical neutron star with a 1.4mass and a 10 km radius.
L_ crit = 1.49 × 10^37( B/10^12 G)^16/15 erg s^-1
Using equation <ref>, the magnetic field B can be estimated to be in the range of (8.7–11.4)× 10^12 G for the above range of luminosity values. The estimated magnetic field differs by a factor of 3 to 4 from the measurement based on the detection of a cyclotron line in the spectrum <cit.>.
In case no bolometric correction is applied, the magnetic field from equation <ref> turns out to be (3.7–4.8)× 10^12 G i.e., much closer to the estimates based on cyclotron line energy.
§.§ The evolution of cyclotron absorption line and its implication on the magnetic field
Both the 2015 and 2022 X-ray outbursts of lasted for more than 2 months with peak bolometric luminosities of 6×10^38 ergs s^-1 and 3×10^38 ergs s^-1, respectively (see Figure <ref>). We report broadband spectral properties of the pulsar during the latest giant outburst using data from and observations. The 2015 and Swift/XRT observations are also used to study the cyclotron absorption line and its long-term evolution. We found relatively higher cyclotron line energy (with an increase of 3.4 keV) during the current outburst in comparison to the 2015 measurement made around a similar luminosity. In addition, the line energy is anti-correlated with luminosity in the 2015 outburst. The cyclotron line is a unique absorption-like feature that is observed in the 10-100 keV spectrum of X-ray pulsars <cit.>. They appear due to a resonance scattering of photons with electrons in quantized Landau energy states in the presence of a strong magnetic field. The field strength can be estimated directly using a 12-B-12 rule depending on the line energy since it is expressed as E_cyc=11.6B_12×(1+z)^-1 keV, where B_12 is the magnetic field in 10^12 G unit, and z is the gravitational red-shift.
The centroid energy of the cyclotron line in principle measures the field strength at the line-forming region. A change in line energy with luminosity is observed in several accretion-powered X-ray pulsars during outbursts <cit.>. In some cases like Her X-1 <cit.>, the cyclotron energy and luminosity are positively correlated, whereas there are pulsars such as 4U 0115+63 <cit.> and V 0332+53 <cit.> that show a negative correlation between these parameters <cit.>. The positive correlation is expected in the sub-critical region (below the critical luminosity) when the pressure of the accreting plasma pushes the hydrodynamical shock or line-forming region closer to the neutron star surface with an increasing accretion rate (luminosity). On the other hand, a formation of radiation-dominated shock is expected in the accretion column at higher accretion rates. The shock drifts upwards in the column due to strong radiation pressure with increasing mass accretion rate in the super-critical regime <cit.>. Therefore, a negative correlation between the cyclotron line energy and luminosity is expected at this phase. This is observed in SMC X-2 when the pulsar was accreting in the super-critical regime during the 2015 outburst. Alternatively, the formation of a cyclotron line and its observed negative correlation can be understood by the reflection of accretion column photons onto the neutron star surface <cit.>. The hypothesis suggests that the cyclotron line gets formed on the surface rather than in the accretion column where the gradient is high to explain the observed changes in the line energy. As the accretion rate increases, a larger accretion column covers a substantial portion of the atmosphere from the pole to the equator (high to low magnetic field regions). This can also explain the origin of the observed negative correlation between the cyclotron energy and luminosity in SMC X-2 resulted due to a change in illumination pattern.
It is important to note that the cyclotron line energy of is different at a given luminosity observed at Obs-II and Obs-IV during different outbursts. The /GSC light curves in Figure <ref> show a clear rise in the source intensity after MJD 57259 and 59738 during the 2015 and 2022 outbursts, respectively. The source reached a luminosity of (2–3)×10^38 ergs s^-1 (Obs-II and IV) after 49 and 36 days since the onset of respective outbursts. Our measurements suggest an increase of 3.4 keV in the cyclotron line energy between these data sets at comparable luminosities. This difference in the cyclotron line energy corresponds to a change in the magnetic field of 3.8×10^11 G, assuming a classical neutron star and gravitational redshift of 0.3. Such an enhancement in the cyclotron energy can be understood by an accretion-induced screening of the magnetic field or geometrical changes in the line-forming region. Theoretical studies suggest that the accretion flow distribution from poles to lower latitudes may drag the field lines ( and references therein). This mechanism could effectively lower down the original field strength even on a shorter time scale in the top layer of the distributed material, considering no effect of magnetic buoyancy. However, in reality, the screening mechanism depends on the ratio of timescales for field burial by the advection mechanism and the re-emerging of the field through magnetic buoyancy and Ohmic rediffusion <cit.>. An increase of 3.4 keV in cyclotron line energy in the latest modest outburst suggests that the screening mechanism is not effective as it is in the case of the 2015 giant outburst, where a similar luminosity is achieved in the decay phase almost 49 days after the onset. The neutron star by this point would accumulate a factor of two or more mass with an integrated value of 3.5×10^24 g in 2015.
A similar possibility is discussed for V 0332+53 during its 2004/05 outburst where the cyclotron line energy at a given luminosity in the decay got reduced by ≈1.5 keV with respect to the rising phase of the outburst <cit.>. However, <cit.> argued that the expected time scales for field burring/reemerging are significantly shorter than those observed in the case of Vela X-1 and Her X-1. They also noticed discrepancies between the spin rates in rising and declining parts of the outburst that could explain the difference in the magnetic field based on the accretion-torque theory. In addition, they suggested that the change in the accretion disk and effective magnetospheric radius in different phases of the outburst lead to a variable column height, resulting in an evolving cyclotron line through X-ray reflection on the surface <cit.>. In the case of , however, we observe the increase in cyclotron line energy in the decay phase of two outbursts at a comparable luminosity. This is important to recall that the pulse profile observed during Obs-II and IV appears identical, suggesting similar accretion geometry of the pulsar. The accretion-induced screening mechanism, thus, seems a possible explanation for the observed behavior over the geometrical change in the line-forming region.
The long term evolution of the cyclotron line is well studied for two sources, Her X-1 and Vela X-1 <cit.>. The cyclotron centroid energy of Her X-1 has shown a secular decay of ≈5 keV in 20 years before stabilizing between 2012 and 2019. There was also a period in 1993-1996 when the line energy was increased by a few keV. The time evolution of the cyclotron line energy is still a matter of study. It is believed that the observed decay/increase in line energy represents a geometrical change within the emission region or in the configuration of the local magnetic field rather than a change in the global dipolar magnetic field of the neutron star <cit.>. This could be further understood in terms of a marginal imbalance between the accretion rate and the losing or settling rate of the accreted material on the accretion mound. If the settling rate is slightly higher than the leakage of the material from the bottom of the mound, this may lead to an increase in the column height as well as a change in the local magnetic field configuration of the line forming region. A line decay is expected naturally in this case. Over time, the excessive accumulation of the material and its pressure on the mound may result in a forced redistribution of the material across the surface. This would adjust the accretion mount to its unperturbed configuration where higher line energy would be expected. The time scale for such redistribution is unclear. But, it may happen after continuous accumulation of matter over a long period or (multiple) strong outbursts like those observed in 2002 and 2015 of . Future observations of the source during outbursts will allow understanding the behavior of the cyclotron line better.
§.§ ACKNOWLEDGMENTS
We thank the referee for constructive suggestions on the paper.
This research has made use of data obtained through
HEASARC Online Service, provided by the NASA/GSFC, in support of NASA
High Energy Astrophysics Programs. This work used the NuSTAR Data Analysis
Software (NuSTARDAS) jointly developed by the ASI
Science Data Center (ASDC, Italy) and the California Institute of Technology (USA).
SG acknowledges the support of the CNES. GV acknowledges support by
H.F.R.I. through the project ASTRAPE (Project ID 7802).
§ DATA AVAILABILITY
We used archival data of NICER, NuSTAR, Swift, and MAXI observatories for this work.
mnras
|
http://arxiv.org/abs/2303.07045v1
|
20230313121222
|
Bayesian Approach to Micromechanical Parameter Identification Using Integrated Digital Image Correlation
|
[
"Liya Gaynutdinova",
"Ondřej Rokoš",
"Jan Havelka",
"Ivana Pultarová",
"Jan Zeman"
] |
math.AP
|
[
"math.AP"
] |
CTU]L. Gaynutdinova
[email protected]
TUe]O. Rokoš
[email protected]
CTU]J. Havelka
[email protected]
CTU]I. Pultarová
[email protected]
CTU]J. Zemancorrespondingauthor
[email protected]
[CTU]Czech Technical University in Prague, 166 29 Prague 6, Thákurova 2077/7, Czech Republic
[TUe]Eindhoven University of Technology, 5600 MB Eindhoven, P.O. Box 513, The Netherlands
[correspondingauthor]Corresponding author.
Micromechanical parameters are essential in understanding the behaviour of materials with a heterogeneous structure, which helps to predict complex physical processes such as delamination, cracks, and plasticity. However, identifying these parameters is challenging due to micro-macro length scale differences, required high resolution, and ambiguity in boundary conditions, among others. The Integrated Digital Image Correlation (IDIC) method, a state-of-the-art full-field deterministic approach to parameter identification, is widely used but suffers from high sensitivity to boundary data errors and is limited to identification of parameters within well-posed problems. This article proposes a Bayesian approach to micromechanical parameter identification which can resolve these issues, enabling the estimation of all micromechanical parameters and robust handling of boundary noise. To this end, the Metropolis–Hastings Algorithm (MHA) is employed to estimate probability distributions of bulk and shear moduli and boundary condition parameters using the Digital Image Correlation (DIC) method, considering a fibre-reinforced composite sample under plane strain assumption. The performance and robustness of the MHA are compared to two versions of deterministic IDIC method, under artificially introduced random and systematic errors in kinematic boundary conditions. Although MHA is shown to be computationally more expensive and in certain cases less accurate than BE-IDIC, it offers significant advantages, in particular being able to optimize a large number of parameters while obtaining statistical characterization as well as insights into individual parameter relationships. The paper furthermore highlights the benefits of the non-normalised approach to parameter identification with MHA (leading, within deterministic IDIC, to an ill-posed formulation), which significantly improves the robustness in handling the boundary noise.
Integrated Digital Image Correlation, Virtual experiment, Micromechanics, Inverse methods, Metropolis–Hastings algorithm, Boundary Enriched IDIC
§ INTRODUCTION
Often the only way of correctly interpreting the behavior of real materials with a heterogeneous structure is by observing them on a microscopic level, so we can account for strain localization, plasticity, delamination and cracks. The spatially heterogeneous character of these phenomena prompts the need for non-intrusive full-field measurement techniques in experimental mechanics. Digital imaging enabled the development of a highly accurate method called Digital Image Correlation (DIC) <cit.>, which is used to assess the spatial transformation between two images. In practice, DIC is implemented as a computer program that automatically tracks regions of an object from one configuration to another, from which displacements can be inferred. Affordability and availability of the equipment and computer programs contributed to the popularity of this method <cit.>.
DIC technique is often used as an input for identifying model parameters, typically material, leading to methods such as Integrated DIC (IDIC) <cit.>. The method relies on deterministic optimization of the least square difference between two or more images of a sample captured during an experiment, i.e., in the reference and a deformed configuration. This approach minimizes information losses and provides highly accurate results.
IDIC, however, comes with a set of challenges, particularly when used in a multi-scale setting. First of all, it requires a mechanical model with suitable constitutive relations and boundary conditions. Because producing a test specimen on a sufficiently small scale is involved, and the manufacturing process itself may influence the microscopic parameters, it is highly preferential to use the actual (macro-scale) product in the measuring process. To capture the microstructural displacements, the size of a digital pixel associated with DIC must be sufficiently small, as well as of the applied speckle pattern <cit.>. While modern commercially available optical microscopes are able to provide high resolution, the problem lies in the fact that it is too time-consuming to scan the whole specimen with sufficient detail and then simulate it. For these reasons, only a subdomain of the specimen is typically scanned within a microscopic Field Of View (FOV), Ω_fov^m, see Fig. <ref>, within which a Microstructural Volume Element (MVE), Ω_mve^m, is considered and a microstructural IDIC
model is constructed and correlated inside a microscopic Region Of Interest (ROI), Ω_roi^m. Although beneficial, this reduction brings a two-fold complication: (i) only material parameter ratios can be identified, because only Dirichlet boundary conditions are applied, and (ii) those boundary conditions are not know and have to be identified (from local deformations at the boundary of Ω_mve^m), since macroscopically applied boundary conditions (which are known) fall outside of the microscopic FOV, Ω_fov^m. A potential solution are “virtual boundaries” <cit.>, which, however, may not be suitable for highly heterogeneous microstructures. On the other hand, high accuracy in boundary conditions prescribed to the MVE model is crucial <cit.>, as even small errors may significantly deteriorate accuracy of the identified parameters.
The most accurate way to establish MVE boundary conditions, according to <cit.>, is to employ Global DIC (GDIC) <cit.>. In this method, the displacements are identified on the whole specimen and are subsequently interpolated as boundary conditions for the microstructural IDIC. In general, GDIC introduces: (i) kinematic smoothing effects when large elements or globally supported interpolation functions are used, and (ii) random errors when relatively small elements or locally supported interpolation functions are used. Because boundary conditions of the microstructure are kept fixed during the IDIC parameter identification procedure, the microstructural model has to compensate by adjusting its material parameters, causing the inaccurate identification of these parameters <cit.>. The approach proposed by <cit.>, referred to as the Boundary-Enriched IDIC (BE-IDIC), incorporates all Degrees Of Freedom (DOFs) associated with the virtual boundaries as IDIC DOFs. The method significantly improves accuracy of the identified parameters while maintaining robustness with respect to the image noise. Although the improved accuracy comes with a price of higher computational and memory requirements, the main weak point of microstructural IDIC/BE-IDIC is in dealing with the possible ill-posedness of the identification problem. For example, the choice of Dirichlet boundary conditions leads to infinite linearly dependent solutions for the material parameters. Because the aforementioned techniques rely on deterministic optimization methods, such as the Gauss–Newton algorithm, only material parameter ratios can be identified. This can typically be done by fixing one of the parameters to a predetermined value, which subsequently needs to be normalized <cit.>.
This article proposes a stochastic method for the parameter identification, namely the Metropolis–Hastings Algorithm (MHA), for the minimization process, while using the DIC as the measurement technique. In contrast to the described deterministic methods, stochastic inversion allows to infer probability distributions of the unknown model parameters instead of single values, treating each iteration as an experimental measurement. The Markov chain based method is also fit to overcome the ill-posedness of the inverse problem, because the sampling depends only on the prior distribution and the previous state.
In the next section the relevant background on DIC and deterministic approaches is given, followed by the description of the stochastic method in Section <ref>. Section <ref> describes the underlying mechanical model and employed virtual experiments. In Section <ref>, the MHA's sensitivity with respect to random and systematic errors in the boundary conditions are quantified and compared to IDIC. The following Section <ref> introduces the parametrization of applied boundary conditions, and the resulting MHA with boundary DOFs is compared to BE-IDIC. Section <ref> studies the behavior of the non-normalized MHA and compares it to the normalised version. The effect of the normalization choice in the BE-IDIC and the post-processing of the non-normalized MHA are also examined. The takeaways from the numerical experiments are finally summarized in the last section with the outlook on further research.
Throughout this article, scalar variables are denoted using italic font, a, array variables using sans serif font, 𝗎, vectors and tensors are rendered in a boldface font, v or A, single contraction is denoted A·v = A_ijv_j, for a second-order tensor A and vector v, while ∇_0 denotes the gradient operator with respect to the reference configuration, ∇_0 v = ∂ v_j/∂ X_ie_ie_j, where e_i is a set of coordinate basis vectors. The hat (∙) denotes arbitrary admissible values, whereas the absence of hats indicates corresponding minimizers.
§ DETERMINISTIC APPROACH TO PARAMETER IDENTIFICATION
A mechanical test is considered, as outlined in Fig. <ref>. DIC is used to assess spatial transformations before and after the specimen is deformed. A region of a photographed domain is tracked between the images, which allows to infer the displacement field upon proper regularization <cit.>. A camera has a static FOV, Ω_fov^m, that contains the MVE, Ω_mve^m,—the sub-domain modelled with FEM—which in turn contains the Region of Interest (ROI), Ω_roi^m, which is used for correlating the images before and after deformation. Although the MVE and ROI may coincide, the camera's FOV is chosen such that the ROI (or MVE, if necessary) remains within it even after deformation. The images are stored as integer-valued arrays for both initial and deformed configuration, where each integer is associated with a pixel and denotes its brightness.
The goal is to identify the set of micromechanical material parameters, i.e., to find a vector λ∈ℝ^n_λ that minimizes the difference between the values in the reference image and in the corresponding material points in the deformed image in the least squares sense, i.e.,
λ∈λ∈ℝ^n_λmin R_dic(λ).
In Eq. (<ref>), λ is a column matrix that stores the sought material parameters or kinematic DOFs at the boundary of MVE, ℝ^n_λ denotes an n_λ-dimensional real space, and R_dic is a non-convex cost function given as
R_dic(λ) = 1/2∫_Ω_roi[f(X) - g(X+u(X,λ))]^2
dX,
assuming that the brightness is conserved under this transformation. Here, u(X,λ) = [u_1(X,λ),u_2(X,λ)]^ T is an approximate displacement field depending on the set of parameters λ, X=[X_1,X_2]^ T∈ Ω_mve⊂ℝ^2 stores the material coordinates in the reference configuration, f(X) represents the initial image, whereas g(X+u(X,λ)) the deformed image mapped onto the initial configuration.
§.§ Integrated Digital Image Correlation
IDIC is a method initially proposed by <cit.> for experimental identification of parameters based on Eq. (<ref>). The displacement field u(X,λ) is obtained by solving the response of the underlying mechanical system governed by
∇_0 · P^ T( u( X,λ),λ) = 0, X∈Ω_mve,
u(X) = u_∂Ω_mve(X), X∈∂Ω_mve,
where ∇_0 denotes the gradient operator in the reference configuration, P is the first Piola–Kirchhoff stress tensor, and u_∂Ω_mve is a prescribed displacement on the boundary ∂Ω_mve, see, e.g., <cit.> for more details on continuum mechanics. The solution is typically discretized with the Finite Element Method (FEM). To minimize the objective in Eq. (<ref>), the standard Gauss–Newton algorithm is used, requiring the sensitivity fields ∂ u( X,λ) / ∂λ_i, often obtained numerically through finite differentiation.
§.§ Boundary Enriched Integrated Digital Image Correlation
BE-IDIC is an IDIC methodology that considers material parameters λ_mat and the boundary displacements λ_kin as unknowns <cit.>, i.e.,
λ= [λ_mat^ T,λ_kin^ T]^ T,
where
λ_mat = [G_1, K_1, …, G_N_mat, K_N_mat]^ T∈ℝ^2N_mat,
λ_kin = u_∂Ω_mve∈ℝ^N_kin,
and where G_i, K_i are micromechanical constitutive parameters of the i-th phase of a herein assumed hyperelastic material model (cf. Section <ref> below), and u_∂Ω_mve is an array storing displacements of boundary nodes corresponding to chosen discretization of the boundary. The number of kinematic parameters can be very large, depending on the coarseness of this discretization. The cost functional R_dic(λ) of Eq. (<ref>) is then minimized following the standard procedure, i.e., using the Gauss-Newton method. Note that the number of required sensitivity fields has to be expanded according to the number of kinematic parameters, so the computational cost increases significantly. On the other hand, this method allows for a higher precision, especially when the boundary data is noisy <cit.>.
§ STOCHASTIC APPROACH TO PARAMETER IDENTIFICATION
The deterministic IDIC approach is a relatively computationally inexpensive method that provides a single value for identified parameters, i.e., it is a deterministic method. On the other hand, obtaining precise enough MVE boundary conditions is a challenge on its own, and the method using GDIC to first identify boundary conditions with subsequent IDIC step <cit.> hence may be overly sensitive to the accuracy of the boundary conditions. This is mainly because the errors that occur during GDIC phase become fixed and cannot be corrected for in the subsequent IDIC step.
For successful identification, one should separate uncertainties into two basic groups <cit.>. The first group, called epistemic uncertainty, derives from lack of knowledge of the system or the environment. Material parameters and boundary conditions fall into this category in our case. This type of uncertainty is reducible by adding new information. That is, by performing more tests with parameters λ, one can obtain better estimates. The second group is called aleatory uncertainty, or simply variability, and is irreducible. It represents an inherent variation associated with the physical system or the environment under consideration. In our particular case, it corresponds to the image noise. It is important to distinguish both classes of uncertainties from errors—modelling inaccuracies stemming, e.g., from the assumed material models, identified geometry, FEM discretization, solution approximation, or GDIC interpolation.
Bayesian probability has been used for epistemic uncertainty, and it takes a subjective view of probability as a measure of degree of belief in a hypothesis. Bayesian methods allow us to update the probabilities as we gather more data (Bayesian inference). The final answer to the parameter identification problem is then a posterior distribution, as opposed to a single value obtained from the deterministic methods. Additionally, working with prior parameter distributions regularizes ill-posed problems. This is why employing a stochastic method to the problem of parameter identification is potentially beneficial and has been already used in parameter identification of mechanical models, see, e.g., <cit.>.
§.§ Parameter Estimation in Bayesian Statistics
In the Bayesian statistics, parameter estimation is done by testing numerous hypotheses. The data set will then consist of individual tests that result in images f( X) and g( X) ∈ [0, 255] observed in (virtual) experiments. Assuming that the brightness is conserved between two images and omitting the interpolation error, the following relation (called brightness conservation, or optical flow equation) holds
f(X) ≅ g(X+u(X,λ)),
recall also Eq. (<ref>) for the deterministic approach. In practice, we work with the discretized version of f and g,
which we denote as real arrays f and g of N_p elements, representing individual pixels. Accounting for the measurement error (i.e., image noise) we have
f + η≅ g(λ) + ζ,
where η and ζ are random vectors representing measurement errors, normally distributed with zero mean and variance σ_η^2, i.e., η, ζ∈ N(0,σ_η^2).
Eq. (<ref>) can be rewritten as
f≅ g(λ) + ξ, ξ∈ N(0, 2σ_η^2).
Because the measurement errors mostly stem from the image noise, we set σ_η to be 1% of the dynamic range of f, g ∈ [0, 255] <cit.>.
According to the Bayes' theorem, the posterior distribution π(λ) is proportional to
π(λ| f, g) ∝π(λ_mat)π(λ_kin) π( f, g|λ),
where π(λ_mat) and π(λ_kin) are the prior distributions of the material and kinematic parameters, and π( f, g|λ) is the likelihood function. We choose the prior distribution for material parameters as a normal distribution N(λ̃_mat^1, σ^2_prior), i.e.,
π(λ_mat) = 1/σ_prior^N_mat√((2π)^2N_mat)exp(-1/2·||λ_mat - λ̃_mat^1||_2^2/σ^2_prior),
where λ̃_mat^1 is the initial guess and σ^2_prior represents our confidence in it. Note that this distribution can be adopted since the probability p(λ_mat < 0) is sufficiently small to not cause any numerical issues. For the kinematic parameters, we choose uniform prior distributions with the mean of λ̃_kin^1, λ̃_kin,n^1 ∈𝒰(λ̃^1_kin,n-e_bc, λ̃^1_kin,n+e_bc), i.e.,
π(λ_kin)=∏_n=1^N_kinπ(λ_kin,n),
π(λ_kin,n)=1/2e_bc if |λ_kin,n-λ̃_kin,n^1|≤ e_bc,
0 otherwise,
where e_bc is the assumed amplitude of the noise in the boundary conditions.
The likelihood π( f, g|λ) is then computed using the probability density function of the noise ξ from Eq. (<ref>) as
π( f, g|λ)
= 1/(2σ_η)^N_p√(π^N_p)exp(-1/2·|| f - g(λ)||_2^2/2σ_η^2),
where N_p is the total number of pixels within ROI. Substituting Eqs. (<ref>)–(<ref>) into Eq. (<ref>) leads to the approximate posterior probability
π(λ| f, g) = C π(λ_mat)π(λ_kin)π( f, g|λ),
where C is a suitable normalization constant.
§.§ Metropolis–Hastings Algorithm
The problem (<ref>) has two distinctive sets of parameters: the material parameters λ_mat and boundary conditions λ_kin, recall Eq. (<ref>). We are primarily interested in the estimation of λ_mat, although λ_kin is important for the accuracy. To derive the marginal posterior distribution π(λ_mat| f, g), and not the joint distribution π(λ_mat,λ_kin| f, g), the Markov Chain Monte Carlo (MCMC) sampling is employed. The marginalization is performed as
π(λ_mat| f, g)=∫_𝒟_kinπ(λ_mat,λ_kin| f, g) dλ_kin,
where 𝒟_kin is the domain of integration for λ_kin. To evaluate this integral, the Metropolis–Hastings Algorithm (MHA) is used.
In MHA, see <cit.> and Alg. 1, we start with an initial sample λ̃^i and set it as the current state λ^i=λ̃^i. Then each new proposal λ̃^i+1 is generated based on the proposal distribution q, which must be symmetric in the sense that q(λ^i|λ̃^i+1) = q(λ̃^i+1|λ^i) for all λ^i, λ̃^i+1∈ℝ^M=2N_mat+N_kin. Typically, q is chosen as Gaussian, i.e., q ∈𝒩(λ^i, σ_q^2)^2N_mat+N_kin. Its variance σ_q^2, often referred to as the step size of the random walk, is chosen empirically such that the acceptance rate is around 30%. The newly proposed state λ̃^i+1 is accepted with the probability of min(1, p), where
p = π(λ̃^i+1| f, g)/π(λ^i| f, g).
This procedure
is usually implemented by generating a uniformly distributed random variable κ∈𝒰(0,1). If κ<p, then λ̃^i+1 is accepted, i.e., λ^i+1=λ̃^i+1, otherwise λ̃^i+1 is rejected, i.e., λ^i+1=λ^i.
Continuing this way, one obtains a sequence λ^j, j=1,2,…,N. After discarding the first N_0 elements (the so-called burn-in), we finally obtain approximation of the marginal (using Eq. (<ref>)) or joint posterior distributions of identified parameters λ as distributions of λ^j_m, j=N_0+1,…,N, for m=1,…,M = 2N_mat+N_kin.
§ UNDERLYING MECHANICAL MODEL
§.§ Geometry
To compare performance of the deterministic and stochastic identification procedures, a virtual experiment is performed on a specimen with prescribed material parameters λ_mat,ref. The specimen is assumed to occupy a full-scale domain Ω_dns, having the size of a 20×20 units of length, with a heterogeneous structure shown in Fig. <ref>. The microstructure consists of randomly distributed non-intersecting stiff circular inclusions with a diameter d=1 unit of length, and a surrounding compliant matrix. Although all geometric units and properties are dimensionless, they can be scaled to μm.
§.§ Constitutive Model and Governing Equations
The material of the specimen is assumed to be nonlinear elastic. In particular, a compressible Neo–Hookean hyperelastic material is adopted, specified by the following elastic energy density
W_α(F) = 1/2G_α(I_1(F)-3)+1/2K_α(ln J(F))^2,
where F = [I+∇_0 u(X)]^𝖳 is the deformation gradient tensor, ∇_0 u(X) is the gradient of the displacement field, J(F) = F, and I_1(F) = J^-2/3(C) is the first modified invariant of the right Cauchy–Green deformation tensor C = F^TF. Individual materials are distinguished by the subscript α, where α=1 corresponds to the matrix and α=2 to the inclusions. The prescribed values of the material parameters λ_mat, ref = [G_1, K_1, G_2, K_2] are presented in Tab. <ref>. Because Dirichlet boundary conditions are applied on the entire boundary of the MVE, ∂Ω_mve, the problem is ill-posed, and only material parameter ratios can be obtained. In the IDIC procedure, one of the material parameters therefore needs to be fixed to an arbitrary value (exact, in our case of virtual experiments) for normalization purposes. The remaining parameters can be identified relative to that reference value. The fixed material parameter can be estimated by other means, i.e., using a force-based mechanical test or reliable experimental sources. Note that such a normalization can be performed in multiple ways, influencing the resulting accuracy of the identification. In contrast to IDIC, MHA does not require such normalization, as will be discussed more extensively below in Section <ref>.
The first Piola–Kirchhoff stress tensor P, introduced in the considered governing Eq. (<ref>) of solid mechanical systems, now attains the form
P( u(X))=(1-χ(X)) ∂ W_1 ( F)/∂ F [I+∇_0 u(X)]^𝖳+χ(X) ∂ W_2 ( F)/∂ F [I+∇_0 u(X)]^𝖳,
where χ(X) is an indicator function of the inclusions, i.e., χ=1 inside all inclusions and χ=0 inside the matrix. Note that the explicit dependence on the identified parameters λ has been dropped for brevity.
§.§ Applied Boundary Conditions
Let us denote each side of the boundary of Ω_dns, ∂Ω_dns =Γ, as Γ_i, i=1,…,4, see Fig. <ref>. Two virtual mechanical tests are considered, one to introduce tension and another to introduce shear. Both are referred to as Direct Numerical Simulations (DNS) and provide the reference for the mechanical behavior of the system. The displacements prescribed at the specimen’s boundary are
u(X) = (F-I)X, X∈Γ_2 ∪Γ_4,
F = I + 0.1 e_1 ⊗e_1, for tension,
F = I + 0.1 e_2 ⊗e_1, for shear,
where e_1=[1,0]^ T and e_2=[0,1]^ T, while Γ_1, Γ_3 are left as free edges.
§.§ Numerical Solution and Discretization
The solution of the mechanical problem in Eq. (<ref>) is determined using the standard non-linear FEM, adopting the Total Lagrangian formulation <cit.>. The evolution of the system is solved incrementally, using the Newton–Raphson algorithm.
The displacement field u(X,λ) is hence discretized as
u(X,λ) ≈∑_i=1^n_ u/2N_i( X) u_i(λ),
where n_ u denotes the total number of DOFs, N_i(X) are the standard FE shape functions, and u_i (λ) = [ u_1^i (λ), u_2^i (λ)]^ T∈ℝ^2 stores the horizontal and vertical displacements of an i-th node associated with a FE mesh. For later reference, these are stored in the array u = [ u^ T_1,…, u^ T_n_ u/2]^ T∈ℝ^n_ u.
For the FE solution, both Ω_dns and Ω_mve domains are discretized with the Gmsh mesh generator <cit.>, using quadratic isoparametric triangular elements with the three-point Gauss quadrature rule to approximate the integrals appearing in the weak form. All calculations were programmed and performed in MATLAB <cit.>, using an in-house FEM library for hyperelastic materials with computationally heavy parts implemented in external C/C++ mex files for efficiency reasons. For the DNS, the fine mesh shown in Fig. <ref> is used, whereas a coarser MVE triangulation is shown in Fig. <ref>. Because the reference Poisson’s ratios for both materials are significantly smaller than 0.5 (recall Tab. <ref>), and because deformations in the simulations are moderate, incompressibility issues do not occur.
To track the deformation in a real life experiment, a speckle pattern needs to be applied on the specimen <cit.>. The reference image f, representing the applied speckle pattern, has been adopted from <cit.>, shown in Fig. <ref>. Its resolution is 512×512 pixels inside FOV, which corresponds approximately to 340×340 pixels inside ROI, when ROI is set equal to MVE. The DNS displacements obtained from all mechanical tests are interpolated from the FE mesh to the regular image mesh by inversion of the elements' isoparametric maps, and the resulting displacement fields are used to map the deformed image g back into the reference configuration. The deformed image is then interpolated at the pixel positions using the bi-cubic polynomial interpolation <cit.>.
§ ROBUSTNESS OF MHA WITH RESPECT TO FIXED ERRORS IN APPLIED BOUNDARY CONDITIONS
This section presents several experiments that quantify the robustness of the proposed MHA in comparison with the IDIC method <cit.> with respect to errors in the applied boundary conditions. The kinematic degrees of freedom λ_kin are fixed with an error, so the effect of the error on the material parameter identification can be directly observed. The systematic errors, like the smoothing of kinematic fields by the GDIC, are studied first, followed by the effect of the uncorrelated random noise, which is typically observed in the local DIC or the global DIC with a very fine discretization <cit.>.
§.§ Sensitivity with Respect to Systematic Errors
The GDIC with a coarse interpolation can have a smoothing effect on the boundary conditions <cit.>. To quantify the effect of smoothed boundary conditions on the identification of the material parameters, the Dirichlet boundary conditions used in the identification are obtained by interpolating the DNS displacements at the nodal positions of the MVE boundary ∂Ω_mve, and the resulting exact displacement field is smoothed with a pillbox-shaped kernel h_ε as
ũ_dns(X) = ∫_Ω_dns u_dns(Y)h_ε(Y-X) dY,
where ε≥ 0 is a dimension-less diameter (normalized by the inclusion’s diameter d=1). The smoothing effect for the extreme kernel ε = 5 can be observed in Fig. <ref>. The smoothed data are then prescribed as the boundary conditions to the FEM MVE model, i.e.,
u_mve(X) = ũ_dns(X), X∈∂Ω_mve.
In Eq. (<ref>), ũ_dns(X),X∈∂Ω_mve, is a column of displacements of ũ_dns evaluated at the MVE boundary nodes. For easier implementation, the integral in Eq. (<ref>) is calculated at discrete pixel positions numerically, while the corresponding displacements at the MVE boundary are linearly interpolated.
The bulk modulus of the matrix K_1 is chosen as the normalization parameter in both IDIC as well as MHA, so it is fixed at its reference value. Therefore, the dimension of the MHA sampling is reduced only to the remaining material parameters λ_mat, so the sampling is performed in a three-dimensional space. The maximum number of steps for the MHA was set to N = 8 000 with 75% burn-in. The prior distributions for the material parameters were chosen as normal with mean values set to the initial guess 0.9λ_ref,i and variances σ_mat,prior^2 = 1. The step size σ_q was set as 1% of λ_ref,i/∑_j=1^Nλ_ref,jσ_mat,prior.
Fig. <ref> shows obtained results for the tension and shear tests from 50 Monte Carlo (MC) runs, and compares them to the IDIC method. Here we first observe that the MHA with fixed boundary conditions performs almost identically to the IDIC, when the modes of the resulting posterior distributions are compared with the IDIC values. A slight difference between the MHA and IDIC can be observed in the bulk modulus of the inclusions K_2 in the shear test. The resulting MHA intervals within one standard deviation from the mean are invisible in the scale of the figure, their widths ranging from 5 ‰ to 1% of the identified value. Next, in accordance with previous observations, see <cit.>, smoothing of the boundary conditions has a considerable negative impact on the identification accuracy. We can therefore conclude that both approaches provide practically identical results for this particular test and show comparable accuracy and robustness.
§.§ Random Errors in Applied Boundary Conditions
The GDIC can also introduce random errors to the boundary conditions, for too fine meshes. To quantify the effect of random noise in boundary conditions, the following test is performed. Uncorrelated random noise is superimposed on the exact boundary displacement, i.e.,
u_mve(X) = u_dns( X) + σ_bc Y∈∂Ω_dnsmax (|| u_dns(Y) ||_2) 𝒰(-0.5, 0.5), X∈∂Ω_mve,
where u_mve(X) is a vector that stores nodal displacements of the MVE boundary nodes, u_dns(Y) does the same for the DNS boundary nodes, 𝒰(-0.5, 0.5) is the corresponding column of independent and identically distributed random variables with a uniform distribution over [-0.5,0.5], and σ_bc∈ [0, 0.1] is the standard deviation of the prescribed random noise.
All three material parameters are identified again for both the tensile and shear tests, using 50 MC realizations of the noise for each value of σ_bc. An example of boundary data with σ_bc=0.1 is shown in Fig. <ref>. The number of steps for the MHA is set to N = 8 000 with 75% burn-in, with the rest of hyper-parameters and prior parameter distributions set the same as in the previous example. The boundary conditions are kept fixed with K_1 used as the normalization parameter again.
For each of the resulting posterior distributions, the mode was again taken as the measure of the identified parameters and then averaged across all 50 realizations with the same noise amplitude. The derived mean values for all the material parameters are shown in Fig. <ref> with thick lines, while the standard deviations are superimposed over the mean values (dashed lines). Similarly to the previous example the confidence intervals for each iteration are negligible.
Fig. <ref> shows that the MHA (color lines) and the IDIC (black lines) again deliver almost identical results. The slight deviation for the values of σ_bc > 0.05 in the shear test can be explained by the insufficient convergence of the MHA for the given number of steps.
We conclude that the MHA with fixed errors in boundary conditions has the same robustness as the IDIC method, and that the error in boundary conditions has a significant effect on the values of the identified material parameters, especially in the shear test.
§ MHA WITH RELAXED BOUNDARY CONDITIONS
One of the benefits of the MHA is that the number of sampled parameters can be increased to include boundary conditions with no direct additional computational effort, as compared to the case with fixed boundary conditions. A straightforward way to implement new DOFs is to set the boundary condition parameters λ_kin as displacements in the FE nodes along ∂Ω_mve. For the configuration described in Section <ref> (and used for all numerical experiments), this would mean adding extra 2 × 244 parameters, considering that 244 FE nodes (on a randomly generated domain) store displacements along the horizontal and vertical directions. We expect this approach to provide more accurate estimates for the material parameters, since it also minimizes the error in the boundary conditions. On the other hand, this approach is generally expected to introduce the so-called “curse of dimensionality” <cit.>. Even though calculating the solution of the mechanical system for each new sample requires the same computational effort for any number of the employed DOFs, the algorithm might require more steps to find the high probability region, as the number of sampled parameters grows. One way to address this problem is to reduce MHA sampling to manageable dimensions by approximating boundary conditions with some basis functions, e.g., using Fourier transform or Karhunen–Loève expansion, both widely used in signal enhancement <cit.>. However, the MHA sampling in the resulting spaces is not uniform and thus requires substantial additional tuning. That is why, for the purpose of this paper, a simple reduction of nodes in the FE basis was ultimately chosen, where only some of the existing DOFs on the boundary ∂Ω_mve were used to reduce the parameters' dimension. The rest of the parameters are dependent on those parameters (by interpolation). The initial MVE boundary mesh was constructed by assigning nodes at equal intervals with displacements interpolated from the DNS, and every n-th node is then used for the boundary approximation. The displacement error of the boundary condition is quantified as
ϵ^bc_rel = || u_mve^t(X)- u_dns(X)||_2/|| u_dns(X)||_2, X∈∂Ω_mve,
where u_mve^t(X) is the boundary approximation with 2× t DOFs, and u_dns(X) is the exact boundary displacement obtained by the DNS.
The boundary condition parameter λ_kin can be accordingly relaxed in the MHA sampling. The number of total employed kinematic DOFs was 2×61 (25%), 2×122 (50%), 2×183 (75%), and 2×244 (100%). To examine the MHA's robustness with respect to the noise in the initial applied boundary conditions, the initial guess of the kinematic parameter λ̃_kin^1 was assumed with an increasing noise amplitude σ̃_bc. The starting point for the material parameter λ_mat^1 was assumed as λ_ref,i, i=1,…,4, so the influence of the relaxed boundary conditions can be assessed. The bulk modulus of the matrix K_1 was used as the normalization parameter. The prior distributions for the material parameters were again chosen as normal, with the mean values set to their reference value as the initial guess λ_ref,i, with the variances σ_mat,prior^2 = 1. The material parameter step size σ_q, i was set as 5‰ of λ_ref,i/∑_j=1^Nλ_ref,jσ_mat,prior. The prior distributions for the kinematic parameters were set as uniform according to Eq. (<ref>), where e_bc = 0.1 Y∈∂Ω_mvemax (|| u_dns(Y) ||_2) is the maximum possible error of the initial guess for the boundary node coordinate. The kinematic parameter step size was then chosen relative to the material parameter step size as 0.4% of ∑_i=1^Nσ_q, i. The total number of steps was set as N = 24 000 with 92% burn-in (chosen during post-processing) in all experiments for practicality.
§.§ Tensile Test
In the tensile test (Fig. <ref>) the resulting error in the material parameters was decreased at least twofold for all the considered numbers of the kinematic DOFs, compared to the fixed boundary MHA (cf. Fig. <ref>; note also the difference in scale between the two figures). The starting boundary error still has a considerable negative impact on the overall accuracy. It should be noted that the chosen fixed number of steps of MHA, although relatively high, was insufficient, as the convergence was not reached in most of the random chains for the starting noise amplitude σ̃_bc≥ 0.04 in the experiments with the number of kinematic DOFs equal to 50, 75, and 100% of the total, and σ̃_bc≥ 0.06 for the 25% of the total kinematic DOFs.
To better illustrate the mutual influence of the material and kinematic parameters, each parameter's average relative error for a given step across all iterations is shown in Fig. <ref>. For brevity, we focus only on the cases with either minimum or maximum noise, with the relative number of kinematic nodes equal to 100% and 25%. For the material parameters the error is calculated as
ϵ^n,i_rel = λ_n^i-λ_n, ref/λ_n,ref, n=1,…,n_mat,
while for the kinematic DOFs as
ϵ^bc,i_rel = ||λ_kin^i-λ_kin,ref||_2/||λ_kin,ref||_2,
where the hatted variables with index i denote i-th accepted sample.
For the zero starting noise in the boundary conditions, the material parameters in the experiment with the full number of DOFs converge very fast to a high-likelihood region close to the initialization point (i.e., to the reference material values, see Figs. <ref>, <ref>). The average error in the boundary conditions slightly grows throughout the experiment. This is caused by the numerical errors in the process, such as image interpolation.
The experiment with the reduced number of DOFs starts with a higher error in the boundary conditions due to the interpolation error, and after a period of linear growth stabilizes. The growth of the average error in the boundary conditions in this experiment coincides with the rapid spread in the material parameters that stabilize in local optima around the same time as the kinematic parameters.
In the experiment with the highest starting noise, σ̃_bc = 0.1, shown in Figs. <ref> and <ref>, the initial average boundary condition error is roughly the same in both cases with full and reduced number of kinematic DOFs. The higher regularity of the boundary, that results from the interpolation, has a different effect on each material parameter: while the highly correlated matrix and inclusions shear moduli G_1 and G_2 reach a higher interim error in the experiment with the full number of kinematic DOFs, the parameter K_2 on average stabilizes faster than for the reduced number of kinematic DOFs, although with a high variance between the chains. At first, the boundary error decreases faster for the reduced number of DOFs, but it starts increasing around the halfway of the total running time. The boundary error in the experiment with full boundary DOFs decreases linearly. It is unclear if it would show a similar behavior as its counterpart, as the error at the final (25 000th) step of the non-reduced problem was comparable to the one observed for the reduced system around the 12 500th step.
Finally, all the converged chains from the above experiments (those with a lower amount of initial noise) are congregated to estimate the posterior probability density functions for the material parameters. Those, in turn, can be compared with the results obtained by the deterministic BE-IDIC method. In Figs. <ref> and <ref> it is shown that all the resulting posterior distributions are approximately normal, with the experiments with reduced number of boundary nodes resulting in a slightly narrower confidence intervals. Solutions provided by the deterministic method (denoted by black dots) tend to coincide with the modes of the histograms (or means of the estimated PDFs), except for the parameter K_2, where the average of the stochastic method is slightly closer to the true parameter value in both cases.
§.§ Shear Test
The shear test behaves quite differently from the tensile test for all numbers of the kinematic DOFs, see Fig. <ref>. This test seems to have an overall low sensitivity to the bulk modulus of the inclusions K_2. The accuracy decreases for the rest of the material parameters as well. Nevertheless, Fig. <ref> shows that the average relative error in boundary conditions decreases at the same rate as for the analogous tensile experiments.
For the shear test, the histograms and estimated uni- and multi-variate posterior probability distributions obtained from the converged chains are shown in Figs. <ref> and <ref>. The reduced number of kinematic DOFs results in a higher systematic error than for the tensile test, as well as wider confidence intervals. The means of the posterior distributions are less accurate as the estimators of the material parameters than the solution obtained by the deterministic BE-IDIC method.
§ APPLICATION IN ILL-POSED PROBLEMS
As was discussed earlier, the inverse problem with the Dirichlet boundary conditions requires one of the parameters to be fixed at its reference value, so the deterministic optimizers can only find the correct ratios of the material parameters. The choice of such normalization parameter influences the final accuracy of the identification <cit.>. This, however, is not necessary for the MHA, and the normalization can be done in the post-processing step.
The sampling can be performed in all four material parameter dimensions instead of three, with the same kinematic parameters if needed. To compare the accuracy of the identification between the ill-posed and the normalized problems, the results from the non-normalized MHA are also normalized in the post-processing step by the parameter K_1, which is not fixed at a given value this time, but is updated concurrently with the other parameters. All the other hyper-parameters remain the same, such as material and kinematic parameter step sizes and the prior distributions. After the same number of steps (24 000) and burn-in (92%), the identification accuracy of material parameters is generally much higher for the non-normalized MHA, see Figs. <ref> and <ref>, where convergence of all material parameters is achieved for a much higher starting noise in the same number of steps.
§.§ Tensile Test
The convergence speed is higher for all the considered parameters, including the boundary conditions, where the minimum achieved average error is roughly two times smaller than in the normalized version of MHA, see Fig. <ref>.
The most interesting feature of the non-normalized MHA is that the posterior distributions can be obtained for all the parameters by choosing any of the remaining parameters as the normalization factor, as shown in Fig. <ref>, where the estimated posterior probability distribution resulting from the chosen normalization parameter is color-coded, as well as the points given by the deterministic BE-IDIC with the same choice for the fixed parameter. The probability density estimations for each of the parameters differ in bias and variance, based on the choice of the normalization parameter. Similarly to the normalized MHA, a relationship between the results of the deterministic method and the modes of the probability distributions can be observed, as they generally appear in the same order. Indeed, in practical applications, one might not have estimates for all the material parameters beforehand to be as free in the choice of the normalization. However, the parameter ratios can still be effectively established with the non-normalized MHA.
§.§ Shear Test
The shear test continues to be not sensitive enough to correctly establish the parameter K_2 (see Fig. <ref>), even though the identification accuracy in other material parameters and boundary conditions increased significantly compared to the normalized version, as shown in Fig. <ref>. The resulting material parameter estimates have a wider confidence interval than in the tensile test, and at the same time the biases remain comparable to those of BE-IDIC, see Fig. <ref>. The distributions of the parameter K_2 are omitted because of the low sensitivity.
§ SUMMARY AND CONCLUSIONS
In this contribution, the performance and the probabilistic robustness of the Metropolis–Hastings algorithm (MHA) is compared to the deterministic Integrated Digital Image Correlation (IDIC) method. To this end, a heterogeneous microstructural specimen with a random distribution of circular inclusions have been subjected to two virtual mechanical tests under plane strain conditions, one to primarily introduce tension, the other to introduce shear. The goal was to identify parameters of two distinct groups: materials and applied boundary conditions. The effect of errors in the applied boundary conditions was studied. First, the MHA that only identifies the material parameters with fixed boundary conditions was considered, and its sensitivity with respect to random and systematic errors in the boundary conditions was quantified and compared to the IDIC. MHA's parameter field was then expanded with two different ways of approximating the boundary conditions, and the method was compared to the Boundary Enriched IDIC (BE-IDIC). The experiments have shown a similar behavior of MHA with fixed boundary conditions to IDIC for both the systematic as well as random error in the applied boundary conditions.
A possible way of reducing the dimensionality of the boundary condition parameters were suggested: substituting the employed discretization mesh on the boundary with a coarser one. The robustness test for the random error in the boundary conditions shown a higher convergence rate for the price of introducing a small systematic error in the material parameters.
The deterministic approach requires one of the material parameters to be fixed at the exact value, because the inverse problem with Dirichlet boundary conditions is inherently ill-posed. The benefit of the stochastic approach, on the other hand, is that this normalization, while possible, is unnecessary. It was shown that the non-normalized approach to the parameter identification, where none of the material parameters is fixed, converges faster and is more robust with respect to the initial boundary noise. As a result, this version of the algorithm was able to handle high-fidelity boundary conditions burdened with noise more efficiently than the normalized version. The material parameter estimates can then be obtained in the post-processing step from the material ratios established by MHA, which allows solving ill-posed or weakly conditioned structural optimization problems such as parameter identification in laminates <cit.>, where deterministic methods are not applicable.
Overall, MHA with relaxed boundary conditions proved to be slightly less accurate and more computationally costly than BE-IDIC in finding the high probability region. However, both normalized and non-normalized versions of MHA can identify the material parameters with the accuracy similar to the deterministic methods in the tensile test. The irreducible errors in both the stochastic and deterministic method stem from the same source and affect the results almost equivalently. The stochastic approach was shown to have a few advantages: the relative ease of implementation (low number of hyper-parameters, usually set according to a rule-of-thumb), ability to optimize a large number of parameters that can also be dependent, as well as statistical data allowing more insight in the relationships between the parameters. The main downside is the high computational cost and lower precision than for the existing deterministic methods, which can be potentially remedied with an adaptive approach and the use of surrogate models.
§ CREDIT AUTHOR STATEMENT
LG: Methodology, Software, Investigation, Writing – Original Draft, Visualization; OR: Conceptualization, Methodology, Software, Resources, Writing – Review & Editing, Supervision; IP: Methodology, Writing – Review & Editing, Supervision; JH: Methodology, Software, Investigation, Writing – Review & Editing; JZ: Methodology, Writing – Review & Editing, Funding acquisition.
§ ACKNOWLEDGEMENTS
This work received the support from the European Regional Development Fund (Center of Advanced Applied Sciences – CAAS, CZ 02.1.01/0.0/0.0/16 019/0000778 (I. Pultarová and L. Gaynutdinova)), the Czech Science Foundation (projects No. 22-35755K (L. Gaynutdinova) and No. 19-26143X (O. Rokoš, J. Havelka, and J. Zeman)), and the Student Grant Competition of CTU (projects No. SGS21/004/OHK1/1T/11 (I. Pultarová) and No. SGS23/002/OHK1/1T/11 (L. Gaynutdinova)).
|
http://arxiv.org/abs/2303.06800v1
|
20230313011050
|
Object-Centric Multi-Task Learning for Human Instances
|
[
"Hyeongseok Son",
"Sangil Jung",
"Solae Lee",
"Seongeun Kim",
"Seung-In Park",
"ByungIn Yoo"
] |
cs.CV
|
[
"cs.CV"
] |
Object-Centric Multi-Task Learning for Human Instances
Hyeongseok Son, Sangil Jung, Solae Lee, Seongeun Kim, Seung-In Park, ByungIn Yoo
Samsung Advanced Institute of Technology
{hs1.son, sang-il.jung, solae913.lee, se91.kim, si14.park, byungin.yoo}@samsung.com
March 30, 2023
==============================================================================================================================================================================================================================
Human is one of the most essential classes in visual recognition tasks such as detection, segmentation, and pose estimation. Although much effort has been put into individual tasks, multi-task learning for these three tasks has been rarely studied. In this paper, we explore a compact multi-task network architecture that maximally shares the parameters of the multiple tasks via object-centric learning. To this end, we propose a novel query design to encode the human instance information effectively, called human-centric query (HCQ). HCQ enables for the query to learn explicit and structural information of human as well such as keypoints. Besides, we utilize HCQ in prediction heads of the target tasks directly and also interweave HCQ with the deformable attention in Transformer decoders to exploit a well-learned object-centric representation. Experimental results show that the proposed multi-task network achieves comparable accuracy to state-of-the-art task-specific models in human detection, segmentation, and pose estimation task, while it consumes less computational costs.
§ INTRODUCTION
Core tasks of visual recognition are detection, segmentation, and pose estimation in scenes for the various vision applications such as video surveillance and human computer interaction.
Instead of training an individual model for each task, multi-task learning strategy using an unified architecture is beneficial in terms of cost-efficiency and inter-task synergy. In this paper, we focus on designing an effective unified architecture for the human-related multi-tasks.
Recently, object-centric learning <cit.> was introduced benefiting from Transformer architecture. Object-centric learning enables to encode per-instance representations by mapping queries in Transformer to corresponding object instances in an image.
Due to the per-instance representation, object-centric learning is well-suited with human instance-level recognition tasks.
Although the object-centric learning has been applied in some studies on multi-task learning for detection and segmentation <cit.>, few attempts have been made to apply the concept to human recognition problems.
Furthermore, unlike general object recognition, human recognition needs to estimate poses that imply the structural information of the human instances. Thus, a naïve introduction of object-centric learning would lead to performance degradation because different types of information are implicitly encoded in a mixed way, preventing each query from having tailored information for each task.
To tackle this problem, we propose a novel human-centric query (HCQ) design to extract more representative information of human instances. We segregate the structural information from the decoder embedding and represent it in explicit forms called learnable keypoints (<ref>d). The learnable keypoints contain the bounding box and the body joints of a human while the decoder embedding encodes the general representation of an instance. This separation enables different pieces of information of a human instance to be encoded in a decoupled way, allowing multiple target tasks to effectively utilize useful information from the query for their own purposes.
Thanks to the decoupled design of HCQ, only the light-weight prediction heads are needed because the information is already disentangled enough for each task. In addition, using both information in the prediction heads further improve the performance because it gives extra information that the other query does not have. For example, human pose can help segmentation <cit.> and vice versa. Even though some previous methods (e.g., DAB-DETR <cit.>) represent coarse information explicitly such as bounding boxes, but it does not give enough information to help other tasks (e.g., segmentation). Thus, most previous methods feed only decoder embeddings to the prediction heads to perform target tasks even though they have explicit box coordinates.
Furthermore, our learnable keypoints can be interweaved with deformable cross-attention seamlessly. The deforamable attention <cit.> predicts the sample locations from the decoder embedding directly instead of computing similarity between the query and the image features. We can just apply our learnable keypoints to the deformable cross-attention as the sampling locations.
It reduces computation for predicting the sampling locations and also the high-quality keypoints give extra structural information to be attended compared to the direct prediction from the decoder embeddings.
We demonstrate our method on the COCO dataset <cit.> with various ablation studies. To our best knowledge, our method is the first Transformer-based unified architecture for human-related multi-tasks, and achieves the comparable accuracy with the state-of-the-art task-specific models while having compact design.
To summarize, our contributions are as follows:
* We present a unified network architecture performing multiple human instance-level vision tasks with minimal task overheads.
* We propose a new object-centric query design to effectively represent the structural information of human instances. With the object-centric query, our model can leverage the disentangled high-level information directly in the prediction head.
In addition to that, the query design allows to interweave the structural information with deformation attention seamlessly.
* We experimentally show that our method achieves the comparable accuracy with the state-of-the-art task-specific models while having cost-efficient architecture.
§ RELATED WORK
Object-centric learning
The concept of object-centric representation learning is presented in Locatello <cit.> where they focus on learning object representations in order to segregate information in an image according to the individual object entities. A set of object representations, called slots, are mapped to object instances in an image using slot attention.
With the help of set prediction formulation, DETR <cit.> proposed to learn object-centric representations with the Transformer architecture for object detection. They used a fixed-size set of learnable queries, called object queries, to infer the relations of the objects and the image feature (<ref>(a)).
Object query design
Many follow-up approaches <cit.> have tackled the object detection task based on DETR.
Among them, we focus representative methods in perspective of object query designs.
In Deformable DETR <cit.>, queries are formulated as 2D reference points simply obtained by learned linear projection (<ref>(b)). By leveraging 2D reference points as anchor points, it allows faster convergence and better performance in object detection. DAB-DETR <cit.> replaced the query formulation with dynamic anchor boxes containing both position and size information (<ref>(c)), hence each query conveys stronger positional priors to let decoders focus on a regions of interest.
Distinct from the previous works, our learnable query explicitly and compactly carries the structural information of an object as the form of keypoints (<ref>(d)). Furthermore, we present effective ways to exploit the high-level information learned in the query for performing deformable attention and task-specific heads.
Object-centric multi-task learning
Object-centric representation has been applied to general object multi-task learning of detection and segmentation.
DETR <cit.> is an object detector benefiting from the object queries communicating with image features, can be easily adapted to segmentation task by attaching mask heads.
Recently proposed Mask-DINO <cit.> further improved performance of the target tasks simultaneously by utilizing anchor box-guided cross-attention and denoising training scheme. In the segmentation point of view, three segmentation tasks including semantic segmentation, instance segmentation and panoptic segmentation <cit.> can be regarded as different tasks, and some work <cit.> conducted all these tasks in an unified architecture. Mask2Former <cit.> attended only the masked regions in cross-attention for fast convergence and K-net <cit.> introduced learnable kernels with update strategy where each kernel is in charge of each mask.
Multi-task learning for human instances
Human instance segmentation and pose estimation <cit.> of multi-person are the key tasks for human-related visual tasks.
PersonLab <cit.> adopted bottom-up approach, which first extracts multiple intermediate feature maps and associates those features to get instance-wise segmentation and pose. Pose2seg <cit.> used the human poses instead of the bounding boxes to normalize the interest regions for better alignment and performed the target task for each proposal. PosePlusSeg <cit.> used a shared backbone to get intermediate maps for each task and each task pipeline combines those maps to get the results. Unlike all these convolution-based methods mentioned above, we use Transformer decoder architecture with human-centric queries to perform these tasks simultaneously.
§ METHOD
We propose a novel human-centric query design which allows to contain various information of humans so that the human-related tasks such as detection, segmentation and pose estimation are jointly performed. It allows a light-weightened computational model with a multi-task manner, while achieving comparable accuracy in each task. The human-centric query is employed for the prediction of each task and the structural information is transferred into deformable attention module seamlessly. We first overview our unified network architecture for human-centric multi-task learning (<ref>), and then present our human-centric query design (<ref>) and its utilization in detail (<ref> and <ref>).
§.§ Overall architecture
The overall architecture (<ref>) consists of three components: image feature extractor, Transformer decoder and task-specific heads. The image feature extractor takes an image as input and produces multi-resolution features as output. The features are fed into the Transformer decoder to be attended. The Transformer decoder processes the human-centric queries to have various information of human instances, and the queries are fed into each light-weight task-specific head for final prediction.
§.§ Human-centric query design
Since a single query vector for training multi-tasks represents tangled information and usually causes performance degradation, we design a novel human-centric query to decouple the structural information from the tangled embedding vector.
The proposed human-centric query consists of two distinct parts, decoder embeddings and learnable keypoints (<ref>).
The decoder embedding _q^l∈^1 × D is the representation vector for each human instance where q and l are indices for query and layer, respectively, and D is the hidden dimension for each query.
The learnable keypoints _q^l∈^1 × 2(n+1) are the decoupled positional and structural information of a human instance and defined as
_q^l =[ x_q,0^l, y_q,0^l, ⋯, x_q,n^l, y_q,n^l]
=[ _q,0^l, ⋯, _q,n^l] ,
where _q,i^l := (x_q,i^l, y_q,i^l) is a 2D coordinate of the ith keypoint.
Emphasizing that the formulation is identical for all queries and layers, we omit the indices q and l without loss of generalities.
The learnable keypoints contains two different types of information; a bbox part (_0, _1) and a pose part (_2, …, _n). Keypoints _0 and _1 in the bbox part give xy-coordinates of left-top and right-bottom of the bounding box, respectively. These two diagonal points are sufficient to represent a given bounding box and we define the center and side lengths of the bounding box using these two points:
_c = _0 + _1/2 and 𝐝 = _1 - _0 .
Unlike the bbox part, keypoints in the pose part are regarded as coordinates in a canonical space defined by the bounding box, i.e., the set of xy-coordinates of joints in the human pose are computed as
= {_0 + _i T | i=2, …, n} ,
where T:=diag(𝐝) is a dilation operator. We represent the joint cooridnates of pose in the canonical space which is normalized by the box. It reduces the pose variance according to the size of the human so that it lessens the burden of the network. The effectiveness of the canonical space can be found in the supplementary material.
Inspired by the DAB-DETR <cit.>, the corresponding structural embedding ∈^1 × D is obtained by successive operations over . First, a sine encoding σ→^1 × D' maps each element of to a vector and then, a multi-layer perceptron MLP is applied. In other words,
= MLP( σ() )
= MLP(Cat( σ(x_0), σ(y_0), …, σ(x_n), σ(y_n))) ,
where Cat is a concatenation operator along with the last dimension. Here, MLP is a three-layer perceptron:
MLP(𝐱) = ReLU(ReLU(𝐱W_1 + 𝐛_1)W_2 + 𝐛_2)W_3 + 𝐛_3 ,
where W_1∈ℝ^2(n+1)D'×D, W_2, W_3∈ℝ^D×D, and 𝐛_1, 𝐛_2, 𝐛_3∈ℝ^1 × D are learnable weights and biases.
One notable point is that our learnable keypoints carries salient coordinates for not only bounding box but also joints of human pose. This allows each human-centric query to become an expert on position and structure of the corresponding human object.
§.§ Query utilization in task-specific heads
Previous works do not use a learnable query as an input of task-specific head networks, even though the query contains high-level information pre-computed from previous layers, such as the coordinates of a bounding box (and also the joints of a pose in our approach).
We simply feed the concatenation of the coordinates along with decoder embeddings into task-specific heads as the form of conditional information. By doing so, each task head can consider useful information in other tasks for improving its accuracy.
In <ref>, regarding object detection and pose estimation tasks, as learnable keypoints themselves are the results of the tasks, their task heads perform in every layer in the transformer decoder. Other task heads perform only once, after the transformer decoder.
For all these task heads, we provide the information of learnable keypoints.
Pose estimation head
While other task-specific heads have conventional structures similar to DETR <cit.> and MaskFormer <cit.>, our pose estimation head network has a simple architecture, distinguished from previous pose estimation methods. Our head network receives object queries and produces the coordinates of pose joints directly. Off-the-shelf pose estimation methodologies <cit.> used auxiliary expedients such as bounding box cropping & resizing or heat map extraction. Although these methods has advantages in terms of model performance, it has limitations in reducing computational cost. On the other hand, thanks to the advantages inherited from object-centric queries, the proposed method uses a vector-to-vector head network which directly regresses joints of pose from the human-centric query. This makes the computational cost of the head network small compared to the conventional task head receiving a cropped image and producing a heat map (304-to-34 in our head and 256×256×3-to-56×56×17 in <cit.> for each instance).
§.§ Query utilization in deformable attentions
Our learnable query carries keypoint coordinates with high accuracy for a bounding box and a pose, and keypoints refer to salient points by definition. If we reuse such information as the sampling points in an attention module, we can reduce redundant computations for computing attention.
From this perspective, we directly use our learnable keypoints as sampling locations in a deformable attention layer.
To handle potential regions that cannot be covered by the keypoints, we also use original sampling locations together, predicted by an MLP as done in Deformable DETR <cit.>.
Deformable Attention with Keypoints
Let m be an attention head index and let Q∈^1× D be the query vector which is sum of and an output of self-attention module. The set of proposed sampling locations _m is a union of two subsets; the set 𝒟_m of Deformable DETR sampling locations and the set _m of joint coordinates for pose (Fig. <ref>). The sampling locations in 𝒟_m are decided by sampling offsets Δ_m which are generated by MLP over the query vertor Q:
𝒟_m = {_c + Δ_m|∀generated Δ_m} .
Note that the center of the bounding box _c in Eq. (<ref>) plays role of the reference point. The joint coordinates for each head _m are equally split from in Eq. (<ref>). For the number of attention heads and the number of all sampling locations in each head, let x∈^H × W × D be an image feature map, and let W_m∈^D× D/ be a learnable weight. The value V_m∈^× D/ is defined as a stack of sampled features at x W_m:
V_m = Cat( (x W_m())^T )^T ,
where the concatenation is applied across for all ∈_m. From this, the output of the deformable attention with keypoints can be represented as
DeformAttKey(Q, V, ) = Cat(A_1 V_1, …, A_ V_) W ,
where A_m∈^1× is an attention coefficient obtained by linear operator over Q and W∈^D × D is a learnable weight.
Multi-Scale Attention with Keypoints
Eq. (<ref>) can naturally be used to the case of multi-scale attention module. Assume that there are image feature maps x_s∈^H_s × W_s × D for scale index s. By repeatedly applying the sampling process of Eq. (<ref>) for each x_s, sampled feature V_m,s is obtained for each scale s. The multi-scale attention value V_m∈^× D/ is defined as
V_m = Cat( V_m,1^T, …, V_m,^T )^T .
Now, the multi-scale attention output can be obtained by the same Eq. (<ref>) if one assumes the attention coefficient having wider dimension: A_m∈^1×.
Specifically, regarding 32 sampling locations per an object query, we obtain 16 locations from the keypoints and the remaining 16 locations following Eq. (<ref>).
§ EXPERIMENTAL RESULTS
§.§ Settings
We use MS COCO 2017 dataset <cit.> for network training and validation as all labels for human pose estimation, detection, and segmentation tasks are provided.
There might be a task-specific augmentation technique to obtain the best performance for each task. However, we applied one common data augmentation technique in <cit.> because the results of three tasks are obtained from a single image and we need to train all tasks at the same time.
We use the AdamW <cit.> optimizer with the initial learning rate of 10^-4 and the batch size of 16. We train each model for 368,750 iterations, and apply a learning rate decay at the two iterations of 327,778 and 355,092 with the decay value of 0.1.
Loss function
We use a binary cross-entropy loss for human classification. For the segmentation, we use a binary cross-entropy and the dice loss <cit.> as was done in <cit.>. For the regression of the bounding box and joint positions, we use a RLE loss function <cit.> because RLE is known to be better than L_1 loss for regression problems.
We train multiple tasks together with our unified architecture. To this end, a total training loss is defined with the weighted summation of multiple loss functions for the tasks.
Regarding bipartite matching, we use the classification and the mask loss <cit.> instead of using all the task losses.
We empirically found that it is sufficient for matching.
More details of the experimental setting can be found in the supplementary material.
§.§ Component analysis
Ablation study
Our baseline network architecture is based on Mask2Former <cit.> for segmentation using the Swin-B <cit.> backbone, and we replace their cross-attention layers with deformable attention layers. To predict reference points for deformable attention, we replace learnable query with the bbox part of learnable keypoints.
We define two models BaseNet-DS and BaseNet-DPS as baseline (<Ref>). The BaseNet-DS conducts only detection and segmentation tasks with above settings.
In addition to BaseNet-DS, we consider naïve multi-tasking with an additional human pose estimation task. We add a head network and a RLE loss fucntion for human pose estimation to the baseline model, and we consider this model as a baseline multi-tasking model (BaseNet-DPS).
In this ablation study (<Ref>), from the baseline models, we add our components of 1) learnable keypoints including also the joint coordinates of a pose, 2) query utilization in task-specific heads (Query util. in T.H.), and 3) query utilization in deformable attentions (Query util. in D.A.) one by one, and analyze their performance.
Simply adding a task causes the degradation of overall performance showing a difficulty of learning shared representation for multi-tasking (BaseNet-DS vs. BaseNet-DPS).
When we employ our query design, the accuracy of detection and segmentation increase (BaseNet-DPS vs. HCQNet-α). It shows that explicit separation of mixed information can improve accuracies.
However, in this case, the accuracy of human pose estimation drops significantly, because decoder embeddings now do not contain pose information sufficiently.
When we provide learnable keypoints to task-specific heads, the accuracies of all tasks increase because the positional and structural information in the learnable keypoints can complement each other of the tasks (HCQNet-α vs. HCQNet-β).
We found that this component is more effective in pose estimation than detection even though they have a similar prediction process using regression and iterative refinement.
We guess that, in detection, a bounding box has simpler representation so that the prediction head can estimate a proper displacement without the bounding box predicted in the previous layer, but not vice versa in pose estimation.
By using the learnable keypoints in deformable attentions, we can expect additional performance gain (HCQNet-β vs. HCQNet).
In our experiment, this component significantly improves the accuracy of human pose estimation,
but the gain in segmentation is smaller and it slightly decreases the accuracy of detection.
Overall, our all components (HCQNet) bring significant performance improvement for all target tasks, compared to the baseline multi-tasking model (BaseNet-DPS).
Training speed
In addition to improvement of overall accuracy in all tasks, we found that the training speed of our approach is much faster than the baseline multi-tasking model (<ref>). Specifically, HCQNet trained for 100k iterations shows higher average accuracy than BaseNet-DPS trained for 300k iterations, showing more than three times faster training speed. It implies that our approach can be useful for training a larger multi-task model.
Qualitative comparison
The effects of our proposed approach can be also found in qualitative results (<ref>).
As shown in the second column of <ref>, while task-specific method (Mask2Former) and naïve multi-tasking model (BaseNet-DPS) suffer from segmenting an occluded object, our model (HCQNet) can produce better segmentation result by jointly utilizing the information of other tasks encoded in our HCQ.
Variants of the learnable keypoints
In the previous experiment, our proposed components successfully improve learnable keypoints and the performance of various tasks.
Meanwhile, different forms of learnable keypoints as conditional information may lead more performance improvement because there can be a suitable form of the conditional information for each task.
In this experiment, we explore the possibility.
We empirically found that the current form using the coordinates of pose joints in the canonical space is suitable for learning pose estimation.
Therefore, we test different forms for only object detection and segmentation tasks.
For the tasks, we test other forms such as the joint coordinates in the image space or keypoint embedding instead of coordinate. For keypoint embedding, we use the same process of obtaining structural embedding used in (<ref>).
The canonical space coordinate has better accuracy in pose estimation compared to the other variants while having the comparable accuracy on detection and segmentation tasks (<Ref>). This implies that our coordinate information in learnable keypoints can be generally applied to various tasks.
§.§ Comparison
To show the effectiveness of our approach, we compare our method with various task-specific models <cit.> and multi-task models <cit.> handling a part of object dectection, instance segmentation, and human pose estimation tasks.
We use a residual network <cit.> (R-50 and R-152), a feature pyramid network <cit.> (fpn), and Swin-Transformer <cit.> (Swin-B) as backbone models, pretrained on the ImageNet-1K dataset <cit.>.
As there is no approach to handle three tasks together, we divide the tasks into two groups in terms of evaluation protocol for fair comparison. Specifically, when we evaluate tasks including pose estimation, the instances with a small size (< 32×32 pixels) are excluded in computing mAP, as was done in <cit.>.
Note that once we trained our HCQNet jointly for all tasks, we use it to evaluate with two types of protocals.
In <Ref>, we compare our HCQNet with detection and segmentation models <cit.>.
For a fair comparison, we retrain state-of-the-art task specific models with the Swin-B backbone for a human class only; DAB-DETR <cit.> in object detection and Mask2Former <cit.> in instance segmentation.
<Ref> shows that, even though our model runs three tasks simultaneously, it achieves comparable performance to task-specific state-of-the-art models.
In <Ref>, we compare models handling tasks including pose estimation <cit.>.
In this experiment, we exclude small-sized human instances in the validation set as mentioned above.
Our model shows a significantly higher segmentation accuracy than them (<Ref>).
The pose estimation accuracy is lower than previous methods, because our models consider small objects in data augmentation, while poes estimation methods do not.
When we finetune our model on the training set focusing on larger instances, our overall performance further improves.
As our model uses the simpler architecture of our pose-specific head compared to other pose-specific approaches and is not specialized for a human pose estimation task, the accuracy of our model in pose estimation is still inferior to those of state-of-the-art pose estimation methods <cit.>.
Our model is a simple combination of multiple tasks, and not currently optimized in terms of loss balancing, inter-task-correlated loss, and other task-specific designs.
Nonetheless, our model shows comparable performance to task-specific models.
We believe that exploring them would lead to the performance improvement of our approach.
We refer the reader to our supplementary material for results on the OCHuman dataset <cit.>.
§.§ Computational cost analysis
In previous experiments, we show that our query design enables a unified network to perform multiple task harmoniously in terms of accuracy.
In this section, we validate that the cost effectiveness of our multi-task network.
The computational costs of comparing methods are computed on an input image of 1024×1024.
In our network, multiple tasks share most computations in backbone, pixel decoder (corresponding transformer encoder), and transformer decoder (<Ref>).
The overhead of each task head is negligible, showing the scalability of our approach in terms of increasing the number of target tasks.
In addition, it is noteworthy that performing our model alone is more cost-efficient than performing task-specific state-of-the-art models separately.
§ CONCLUSION
We present a novel human-centric representation for multi-task learning. To this end, a novel query is designed that carries positional coordinates of key points and represents structural information of human instances effectively. In order to exploit the queries with pre-computed, high-level information in task-specific heads, we use the learnable keypoints as conditional input for the task heads and combine the learnable keypoints with deformable attention. As the results, our proposed model shows comparable performance to individual state-of-the art models for multiple human recognition tasks such as pose estimation, segmentation, and detection, while it consumes a significantly small computational cost.
We refer the reader to our supplementary material for discussion about the limitation and potential negative social impact of our approach.
ieee_fullname
§ DETAILS ABOUT EXPERIMENTAL SETTING
§.§ Network architecture
As described in Sec. 3.1 in the main paper, our network consists of image feature extractor, transformer decoder, and task-specific modules.
Our main difference in the architecture is to concentrate on the transformer decoder.
The image feature extractor is based on the Mask2Former <cit.>, which consists of a backbone network and a pixel decoder. We can select various backbone models such as residual network <cit.> and Swin-transformer <cit.>. Following <cit.>, we use multi-scale deformable attention Transformer (MSDeformAttn) <cit.> as the pixel decoder.
Regarding the transformer decoder, each individual human in the given image corresponds to each of proposed human-centric queries, and we use 100 queries for all experiments. The decoder consists of 8 decoder layers.
Distinct form <cit.>, in each decoder layer, we use a deformable attention layer <cit.> as a cross-attention layer, and a self-attention layer is placed before the deformable attention layer.
Each deformable attention layer receives 3 scales of image feature (1/32, 1/16, 1/8 of the feature resolution) from the pixel decoder.
§.§ Loss function
As described in Sec 4.1 in the main paper, we use four types of loss functions according to the target tasks: classification, segmentation, bbox, and pose.
We denote these loss functions as L_c, L_s, L_b, and L_p, respectively.
Then, the total training loss is defined as
L_total = λ_c L_c + λ_s L_s +λ_b L_b + λ_p L_p.
where λ_c, λ_s, λ_b and λ_p are the mixing weights and are set to 2, 5, 0.2, and 0.2, respectively, in our experiment.
Because there are many possible combinations of mixing weights for multiple tasks, another best combination would exist.
Still, our models with these weights show practically reasonable performance in the target tasks without sophisticated tuning to search the best hyper-parameters.
The training loss is applied to the matched pairs of instances between the prediction and the ground-truth.
We also use an auxiliary training loss by attaching the prediction layer to each transformer decoder layer, similar to <cit.>.
The auxiliary loss is same with L_total.
§.§ Data augmentation
As described in Sec .4.1 in the main paper, we follow a data augmentation scheme used in <cit.>.
Specifically, for each image, we apply random scaling to the image with the range [0.1, 2.0] and crop the scaled image with the fixed size of 1024 × 1024. If the scaled image is smaller than the cropping size, we apply zero-padding to right- and bottom-side of the image to produce the result image of 1024 × 1024.
§ ADDITIONAL EXPERIMENTS
§.§ Canonical space of the pose part of learnable keypoints
As described in Sec. 3.2 in the main paper,
we normalized the coordinates of the pose part in our learnable keypoints by the box coordinate of the bbox part; we refer it as the canonical space.
We can also define the coordinates of pose part in the image space instead of canonical space.
We empirically found that representing the pose part in the image space causes a large performance drop in pose estimation and it also degrades the accuracy of two other tasks (<Ref>).
§.§ OCHuman dataset
In Fig. 6 in the main paper, we present several qualitative results on the OCHuman dataset <cit.>.
In this section, we present quantitative results on the dataset.
Compared to Pose2Seg <cit.>, our method achieves better performance in both detection and segmentation tasks (<Ref>).
Compared to a state-of-the-art segmentation method (Mask2Former <cit.>), our method shows a comparable accuracy in segmentation.
Compared to our baseline multi-tasking model (BaseNet-DPS), our approach still induces significant improvements in pose estimation and segmentation on this different dataset.
We show additional visual results of our methods on the COCO and OCHuman datasets.
§ ADDITIONAL DISCUSSION
Limitation
While pose estimation, detection, and segmentation tasks share a common high-level perception and can help each other intuitively,
a mismatch in current task-wise objectives may make an ambiguity in the multi-task learning of them.
For example, human pose estimation should handle occluded regions while segmentation and detection only handle visible areas.
As shown in <ref>, some pose joints in an occluded region make the bounding box expanded, and this eventually degrades the quantitative accuracy of object detection because the ground-truth bounding box is defined by the enclosing box of the visible segments of the instance.
Also, all pose joints are computed for any partial human instance (the rightmost column in <ref>). In this case, even though the corresponding bbox and mask of the instance do not always cover the pose, the pose may still affect other tasks negatively.
Considering the visibility of pose joints may alleviate this problem.
Exploring this potential mismatch can be a clue to improve overall performance of multi-task learning with a unified architecture.
While we focus on handling the human class only in this paper, our query design is not limited to a human class. Learnable keypoints are currently trained in a supervised manner. To deal with more general classes, we can consider manual labeling or unsupervised keypoint learning as future work.
Potential negative social impact
We use multiple GPUs for several days for training a model, and it induces a significant energy consumption.
While we use the public dataset (MS COCO 2017), there can be a privacy-related problem when collecting an additional dataset.
Also, our approach and its extension can be utilized in developing recognition models used in surveillance cameras, having the risk of a detrimental effect on people's privacy.
|
http://arxiv.org/abs/2303.06702v1
|
20230312164407
|
Existence proof of librational invariant tori in an averaged model of HD60532 planetary system
|
[
"Veronica Danesi",
"Ugo Locatelli",
"Marco Sansottera"
] |
math-ph
|
[
"math-ph",
"math.MP"
] |
Near-field imaging of domain switching in in-operando VO_2 devices
Erik van Heumen
March 30, 2023
==================================================================
Existence proof of librational invariant tori in an averaged model of HD60532V. Danesi, U. Locatelli, M. Sansottera
We investigate the
long-term dynamics of HD60532, an extrasolar system hosting two giant planets orbiting in a 3:1 mean motion resonance. We consider an average approximation at order one in the masses which results
(after the reduction of the constants of motion) in a resonant
Hamiltonian with two libration angles. In this framework, the usual
algorithms constructing the Kolmogorov normal form approach do not
easily apply and we need to perform some untrivial preliminary
operations, in order to adapt the method to this kind of
problems. First, we perform an average over the
fast angle of libration which provides an integrable approximation
of the Hamiltonian. Then, we introduce action-angle variables
that are adapted to such an integrable approximation. This sequence
of preliminary operations brings the Hamiltonian in a suitable form
to successfully start the Kolmogorov normalization scheme. The
convergence of the KAM algorithm is proved by applying a technique
based on a computer-assisted proof. This allows us to reconstruct
the quasi-periodic motion of the system, with initial conditions
that are compatible with the observations.
Near-field imaging of domain switching in in-operando VO_2 devices
Erik van Heumen
March 30, 2023
==================================================================
§ INTRODUCTION
The discovery of the first multiple-planet extrasolar
system, υ Andromedæ (see <cit.>),
immediately raised the question of its stability, notably from a
dynamical system point of view. Nowadays more than 800
multiple-planet extrasolar systems have been discovered, making the
question even more relevant.
Typically, these systems have been numerically investigated as a
sort of inverse problem, prescribing their stability in order
to determine ranges of possible values of a few orbital elements
which are unknown or poorly known (e.g., inclinations and longitudes
of the nodes). The numerical investigations of the dynamical
behavior of many interesting extrasolar planetary systems have been
done complementing long-term integrations (see,
e.g., <cit.> and <cit.>) with
refined numerical techniques, like for instance the frequency
analysis method or the MEGNO chaos indicator (see,
e.g., <cit.> and <cit.>,
respectively).
Perturbation theory allows to complement the numerical investigations
with rigorous analytic results. Normal form methods have a
long-standing tradition and their applications to problems that are
relevant in Celestial Mechanics have grown more and more with the
development of the algebraic manipulators (for an introduction to the
main concepts of this kind of software see,
e.g., <cit.>). Therefore, in such a framework the
study of extrasolar planetary systems (in particular, of their secular
dynamics) started very soon (see, e.g., <cit.>). The
analytic investigation via computer algebra complements the knowledge
provided by long-term numerical integrations. In particular, we think
that the modern Hamiltonian perturbation theory gives a proper
framework, where it is possible to naturally explain why a
planetary configuration is stable and answer this question also
with quantitative arguments. In this respect, such a goal of the
normal form approaches is somehow reminiscent of the aims of other
recent works about the planetary system dynamics, which are not
limited just to detection of chaos, but they succeed in
explaining which is the source of instability in terms of
superposition of a few resonances that are properly determined
(see <cit.>).
According to the main results for quasi-integrable systems that have
been obtained in the last decades, effective stability[A
dynamical system is said to be effectively stable when the
time needed to eventually escape from a small region of the phase
space is proved to largely exceed the expected life-time of such a
system.] is ensured in the vicinity of an invariant torus by
applying the KAM theorem jointly with the Birkhoff normal form and,
eventually, the Nekhoroshev theorem (see <cit.> for a
complete discussion of this strategy, while applications to
planetary dynamical models are described in <cit.>
and <cit.>).
In turn, the construction of the invariant torus
through Kolmogorov normal form is more effective if the starting
Hamiltonian is close to a suitable normal form designed to locate
another invariant object. For instance,
a preliminar (partial) construction of the Birkhoff normal form
allows one to prove the existence of invariant tori which are in the
neighborhood of a stable equilibrium point and are well
approximating the orbits of celestial objects for both the secular dynamics of the
Sun-Jupiter-Saturn system and the Trojan asteroids
(see <cit.> and <cit.>, respectively).
In the former case, the equilibrium solution corresponds to orbits
which are both circular and coplanar in the approximation provided
by the average over the fast angles (up to order two in the masses)
of the planetary three-body model; such an approach has been used to
study the inverse problem concerning the stability of a few
extrasolar systems in the framework we have sketched above
(see <cit.>). In the latter case, the stationary
solution is represented by one of the equilateral Lagrangian points,
that are commonly denoted with L_4, L_5; moreover, here it
has been necessary to preliminarly perform also the construction of
an intermediate invariant torus well approximating each sought
torus, by using a variant of the Kolmogorov normalization algorithm
that avoids small translations on the actions at every step of such
a computational procedure (which is detailed in
Section <ref>). In all these works, the rate of convergence
of the normalization algorithm is as faster as the final invariant
torus is closer to the equilibrium solution, this distance being
proportional to the norm of the actions, which are properly defined
with respect to action-angle canonical coordinates that are
preliminarly introduced in a suitable way. Therefore, these examples
highlight that there are regions of the phase space which are
dynamically stable because they are surrounding KAM tori that, in
turn, are persistent to perturbations due to their vicinity to
an elliptic equilibrium point.
A strategy that is similar to the previous one (except for some further
refinement) has made possible to fully develop an application of the
KAM theory to the secular dynamics of a three-body model of the
υ Andromedæ planetary system
(see <cit.>). For that problem, first the normal form for
an elliptic torus has been constructed. Afterwards, an intermediate
invariant torus is constructed by performing the already mentioned
variant of the Kolmogorov algorithm designed so as to skip the small
translations at each normalization step (as it is described in
Section <ref>). Finally, the classical Kolmogorov algorithm is
proved to converge to the normal form corresponding to the desired
torus. This result can be explained as follows: the secular dynamics
of the three main bodies of the υ Andromedæ planetary
system is stable because it is strictly winding around a linearly
stable periodic orbit (i.e., a one-dimensional elliptic torus). The
distance from the elliptic torus to the orbit under consideration
(which is measured with respect to the value of a suitable action
coordinate) has been translated in an easy-to-use numerical
criterion evaluating the robustness of planetary configurations. Such
a numerical indicator has been successfully applied to the study of
the inverse problem concerning the stability of the
υ Andromedæ planetary system
(see <cit.>). This kind of numerical exploration
looks to be very suitable for applications to several (similar)
exoplanetary systems and it is subject of some works in progress.[M. Volpi,
U. Locatelli, C.Caracciolo, M. Sansottera. In preparation.]
As far as we know, an application of KAM theory to
realistic models of planetary systems in Mean Motion Resonance
(hereafter often replaced with its acronym MMR) is still lacking;
filling this gap is the main motivation of the present work. Let us
recall that a non-negligible fraction of the multiple-planet
extrasolar systems which have been recently discovered are expected to
be in MMR (see “The Extrasolar Planet Encyclopedia”, http://exoplanet.eu). A few of them are hosting exoplanets that
move on rather eccentric orbits; usually they have been detected by
using the Radial Velocity method. We focus our attention on the two
exoplanets orbiting around the HD60532 star. We consider their orbital
dynamics in the framework of the same planar model already considered
in <cit.> and <cit.>, where the existence of
quasi-periodic stable motions is shown by applying the methods of
frequency analysis and a basic normal form approach jointly with
numerical integrations, respectively. In both the papers we have just
mentioned, the model is unambiguously shown to be locked in a 3:1
MMR, which is double in the sense that there are two independent
combinations of angles (including the mean anomalies) which are in a
libration regime. After having performed an average over a fast
revolution angle and the reduction of the angular momentum, the
problem is described by a two degrees of freedom Hamiltonian. Since
the orbits of those exoplanets are rather far from being circular, we
think that it is not appropriate to limit us to an approach based on
expansions up to the second order in the eccentricities (as it has
been successfully done, with different purposes, in <cit.>
and <cit.>). Therefore, in the present work we study an
Hamiltonian model which is defined by suitable expansions in the
canonical coordinates up to a larger order in the eccentricities
(i.e., 6; see Section <ref> for the proper definitions of
these rather standard expansions). At the end of this paper, in
Section <ref> we prove the existence of an invariant KAM torus
carrying quasi-periodic motions which are consistent with the orbits
generated by the numerical integrations starting with initial
conditions compatible with the observations. This result of ours is
fully rigorous in the sense that it is completely demonstrated by
using a computer-assisted proof, based on a normal
form approach (for an introduction to this method see, e.g., the
Appendixes of <cit.>). Let us recall that this is not
the only viable technique in this context; in particular, a careful
application of the so called a posteriori approach has been
able to prove the existence of KAM tori for values of the small
parameter ϵ extremely close to the breakdown threshold in
the famous case of the standard map[So
remarkable performances are also due to the fact that the
a posteriori method tries to determine just the
parameterization of the invariant torus, whose existence proof is
aimed at. Therefore, this approach takes profit of the fact that
the dimension of the problem is reduced, because the equivalent
of Taylor expansions with respect to the actions in the phase
space is not considered (see <cit.> for a
description of this computer-assisted technique).] (see
<cit.>). In the framework of the computer-assisted
approach we work with, we emphasize that the preliminary
approximation of the Kolmogorov normal form is fundamental for the
eventual success of the application of KAM theory. Indeed, the
convergence to the final sought KAM torus strongly depends on the
accuracy given by the intermediate normal forms. We emphasize that
none of the strategies we have previously sketched (even if they are
used in junction each other) is sufficient to perform the preliminary
operations in such a way to allow the final constructive algorithm to
be convergent. Therefore, in
Sections <ref>–<ref> we need to
carefully describe that part of our approach that is new and so
crucial. We stress that the intermediate Hamiltonian acting as a
keystone for our approach is provided by a further average with
respect to one of the librational angles; this is done so as to
produce an integrable approximation of the final Kolmogorov normal
form, after having performed some further (and suitable) canonical
transformations. Let us also recall that an integrable model for the
dynamics of planetary systems in MMR has been derived in another way
in <cit.> and it is used for a different analysis with
respect to ours.
We do believe that the whole computational procedure we describe in
the present paper can apply also to extrasolar planetary systems that
are similar to the one orbiting around HD60532. Nevertheless, the
discussion of the generality of the approach goes beyond our scope
and it is deferred to future investigations.
§ RESONANT HAMILTONIAN MODEL AT ORDER ONE IN THE MASSES
We consider a planar planetary three-body problem, consisting of a
central star having mass m_0 and two coplanar planets having masses
m_1 and m_2. The problem has 6 degrees of freedom, which can be
reduced to 4 due to the conservation of the linear momentum.
Introducing the canonical astrocentric variables
(𝐫̃_1 , 𝐫̃_2 , 𝐫_1 , 𝐫_2),
𝐫_j being the coordinates and 𝐫̃_j the
conjugate momenta, the Hamiltonian reads
H(𝐫̃,𝐫)=T^(0)(𝐫̃)+U^(0)(𝐫)+T^(1)(𝐫̃)+U^(1)(𝐫) ,
where
T^(0)(𝐫̃)=1/2∑_j=1^2𝐫̃_j^2
(1/m_0+1/m_j) ,
U^(0)(𝐫) =-∑_j=1^2m_0 m_j/𝐫_j ,
T^(1)(𝐫̃)=𝐫̃_1 ·𝐫̃_2/m_0 ,
U^(1)(𝐫) =-m_1 m_2/𝐫_1-𝐫_2
and is the gravitational constant (see,
e.g., <cit.>). It is convenient to introduce the
Poincaré canonical variables
Λ_j = m_0 m_j/m_0+m_j√( (m_0 + m_j) a_j) ,
λ_j =M_j + ω_j ,
ξ_j =√(2Λ_j)√(1-√(1-e_j^2))cos(ω_j) ,
η_j = -√(2Λ_j)√(1-√(1-e_j^2))sin(ω_j) ,
where a_j, e_j, M_j and ω_j are the semi-major axis, the
eccentricity, the mean anomaly and the argument of the pericenter of
the j-th planet, respectively. In addition, we also introduce the
translations L_j=Λ_j-Λ_j^* where Λ_j^* is
defined taking into account the corresponding value a_j^* of the
semi-axis which is compatible with the observations. Expanding the
Hamiltonian in Taylor-Fourier series around the origin of the
variables (L,ξ,η), we get
1# # #
H(L,λ,ξ,η) =K(L)+μ P(L,λ,ξ,η) =n^*·L+∑_j_1=2^∞h_j_1,0^(Kep)( L)+μ∑_j_1=0^∞∑_j_2=0^∞h_j_1,j_2^(P)(L,λ,ξ,η) ,
where n_j^*=√((m_0+m_j)/(a_j^*)^3), for j=1,2, and
μ=max{m_1/m_0,m_2/m_0 }. The action-angle variables (
L,λ) are referred to as the fast variables and the cartesian
variables (ξ,η) as the secular ones. In particular,
the functions h_j_1,0^(Kep) of the Keplerian part K(L)
are homogeneous polynomials of degree j_1 in the actions L,
while the terms h_j_1,j_2^(P) of the perturbation
P(L,λ,ξ,η) are homogeneous
polynomials of degree j_1 in L, degree j_2 in
the secular variables (ξ,η) and trigonometric
polynomials in the angles λ.
Of course, in practical applications a finite truncation of the
Hamiltonian above is in order. The truncation rules adopted in the present work will be detailed in the
following.
§ THE CASE STUDY OF THE HD60532 EXTRA-SOLAR SYSTEM
Let us focus on the planar three-body problem for the HD60532
extra-solar system. The orbital parameters and the initial conditions
are fixed as in Table <ref>, according to the values
given in <cit.>. This
system consists of two giant planets in a 3:1 MMR, orbiting around
the star named HD60532. The motion is assumed to be co-planar with an
inclination i (with respect to the plane that is normal to the line
of sight) which is fixed at 20^∘. As a consequence, the initial
masses of the planets are increased by the factor 1/sin(i) with
respect to the minimum ones detected by means of the radial velocity
method. The presence of the mean motion resonance is confirmed by the
evolution of the resonant angle λ_1-3λ_2+2ω_1,
which librates around 180^∘. Moreover, the system also exhibits
a second libration angle given by the difference of the arguments of
the pericenters ω_2-ω_1, as it has been remarked
in <cit.>. Therefore, also the
average of λ̇_1-3λ̇_2+2ω̇_2 is equal to
zero. The evolutions of the resonant angles are reported in
Fig. <ref>; they have been produced by running a
symplectic integrator of type _3, which is
described in <cit.>. The plots of the resonant angles
highlight that the amplitudes of libration are wide, in particular for the resonant angle λ_1-3λ_2+2ω_1,
which has a width of about 280^∘. This makes the study of the
long-term dynamics much more tricky, making it necessary to develop a
suitable approach in order to reconstruct the quasi-periodic motion
pointed out by the numerical integrations of the system. This is the
reason why it is natural to expect that it is convenient to consider
λ_1-3λ_2+2ω_1 as resonant angle
instead of λ_1-3λ_2+2ω_2, the libration amplitude
of the latter being larger than 360^∘.
For what concerns the eccentricities, looking at
Fig. <ref> one can easily remark that the one of the
inner planet can also exceed the value 0.3, during its dynamical
evolution. This makes evident that the orbital configuration of these
exoplanets is quite different with respect to that of the biggest
planets of our Solar System, whose orbits are nearly
circular. Therefore, it is natural to expect that a remarkable effort
will be needed to adapt normal forms algorithms which worked
efficiently to construct quasi-periodic approximations of the orbital
motions of the major planets in our Solar System
(see <cit.> and <cit.>). In order to
efficiently implement a normal form approach to the HD60532
extra-solar system, we will need to design a few modifications to that
basic scheme. This has to be done in such a way to make it more
similar to the approach that successfully worked in the case of the
υ Andromedæ planetary system (see <cit.>),
which also shows the phenomenon of the librations of the difference of
the pericenters arguments (i.e., the so called apsidal locking) as in
the case under study of HD60532.
§.§ The resonant model
Being interested in the long-term dynamics of a system
that is in MMR, we consider a resonant approximation of the
Hamiltonian that allows to reduce the number of degrees of freedom
to 2. Hence, we
now consider a set of coordinates which allows to better highlight
this point. First of all, let us introduce the action-angle variables
( I,ω) which replace the secular variables (ξ,η) by means of the following canonical transformation:
ξ_j= √(2I_j)cos(ω_j) ,
η_j=-√(2I_j)sin(ω_j) ,
for j=1,2 .
Now, we also introduce the resonant variables related to the two
libration angles,
{ p_δ=I_1+2L_1
p_σ=L_1
p_ϕ=I_1+I_2+2L_1
p_θ=L_2+3L_1
.
{ δ=ω_2-ω_1
σ=λ_1-3λ_2+2ω_1
ϕ=-ω_2
θ=λ_2
.
.
In this new set of action-angle coordinates, we consider the average
of the Hamiltonian over the (unique) non-resonant revolution angle
θ, i.e.,
H̅ = 1/2π∫_0^2π
H(p_δ , p_σ , p_ϕ , p_θ , δ , σ , ϕ , θ) dθ .
Therefore, the angles ϕ and θ turn out to be cyclic
variables for the Hamiltonian H̅. Indeed, the action
p_ϕ is exactly the total angular momentum, which is a constant of
motion for the whole three-body planetary system. Since we perform
an average of the Hamiltonian with respect to a fast angle of orbital
revolution, then it is usual to refer to H̅ as a resonant
approximation at order one in the masses. Such an averaged model shows
two first integrals and can be reduced to two degrees of freedom.
The accuracy of the approximation at order one in the masses is discussed in <cit.> and <cit.>, for
general 2D three-body models of exoplanetary systems and for particular cases in mean-motion resonance, respectively. This is made by means of comparisons with the results provided by both the approximation at order two in the masses and the numerical integrations of the non-averaged system.
The center of the librations of the resonant angles δ and
σ corresponds to an equilibrium point of the angle variables of
the resonant Hamiltonian H̅. With the aim of expanding
the Hamiltonian H̅ around its equilibrium point, we also
look for the values, say (p_δ^*,p_σ^*), of the conjugate
momenta p_δ and p_σ such that the Jacobian of the
Hamiltonian H̅ is equal zero. Once we have determined
the equilibrium point[For the problem we are considering, we have found the following values: p_δ^*=0.0227533, p_σ^*=-0.00128589.] (p_δ^*,p_σ^*,π,π), we can
translate the origin of the canonical variables, by defining
y_1=p_δ-p_δ^* , y_2=p_σ-p_σ^* ,
x_1=δ-π , x_2=σ-π ,
and expand the Hamiltonian in Taylor series around the origin. We
also proceed with a diagonalization of the quadratic part of the
Hamiltonian. Indeed, there is a linear canonical
transformation[A procedure which allows to determine such a
canonical transformation 𝒞 can be found in Section 7 of
<cit.>. In order to avoid ambiguities, here the linear transformation C is chosen in such a way that |ω_1| <|ω_2|.]
(y_1,y_2,x_1,x_2)=𝒞(Y_1,Y_2,X_1,X_2) conjugating the
quadratic approximation to a couple of harmonic oscillators. As a
result, the Hamiltonian in the new polynomial variables ( Y,
X) reads
H( Y, X)=
ω_1/2(Y_1^2+X_1^2) + ω_2/2(Y_2^2+X_2^2) +
∑_ℓ≥ 1 h_ℓ ( Y, X) ,
where the functions h_ℓ are homogeneous polynomials of degree
ℓ+2 in the variables ( Y, X). Let us remark that,
according to a standard notation in the context of the KAM theory,
hereafter, ω_1 and ω_2 are used to denote the
frequencies (while they have been used before to refer to the
arguments of the pericenters).
The main goal of this work is to investigate the stability of the
Hamiltonian model given by (<ref>) and to reconstruct its
quasi-periodic motion, starting from initial conditions corresponding
to the data reported in Table <ref>. First of all, let
us stress that the Hamiltonian (<ref>) has an elliptic
equilibrium point at the origin and, in addition, in the case of the
extra-solar system HD60532, the two frequencies ω_1 and
ω_2 also have the same sign. Hence, it would be quite natural
to try to deal with the problem using a Lyapunov confinement argument
about the values of the actions after having performed a few steps of
the Birkhoff normalization algorithm. However, this approach fails because the initial conditions (expressed in the polynomial variables ( Y, X)) are too far from the equilibrium point situated at the origin.
Hence, we need a less naif method in order to tackle the problem under
study. Therefore, one could try another constructive procedure that
has shown to be successful in a similar context, i.e., for models of
the secular planetary dynamics (see <cit.>,
<cit.> and <cit.>). Indeed, it could
be convenient to first introduce action-angle variables, with the aim
of performing a translation of the actions and then applying the
standard Kolmogorov normalization algorithm. Nevertheless, also this
attempt fails, because it is not enough to achieve the convergence of
the final procedure, even if preceded by a finite number of steps of
the Birkhoff normalization algorithm.
We are then led to develop a different approach which is adapted to
the special kind of problem we are considering. Let us remark that in
this model a slow dynamics can be distinguished from a faster one, as
we can see from the plots of the two libration angles that are
reported in the first panel of Fig. <ref> and the
third one. In particular, the difference of the argument of the
pericenters points out the slow period, that is (1/μ), while
the mean motion resonant angle σ also highlights the presence
of a faster period. Therefore, the key strategy to face the problem
is to preliminarly average the Hamiltonian with respect to the faster
libration angle, namely over an angle related to the MMR. Let us recall that, by applying the procedure mentioned in
footnote<ref>1, it can be
easily shown that the period of such a (so called) fast libration
angle is (1/√(μ)). Therefore, it is somehow
intermediate between the secular angles and the orbital revolution
ones. This justifies the name we have decided to adopt, in order to
refer to it.
§ AVERAGE OVER THE FAST LIBRATION ANGLE
In this section we describe the algorithm which allows to perform the
average of the Hamiltonian with respect to the fast libration angle.
We introduce the action-angle variables ( J,ϑ)
via the canonical transformation ( Y, X)=( J,ϑ), namely
Y_j= √(2J_j)cos(ϑ_j) ,
X_j=√(2J_j)sin(ϑ_j) , for j=1,2 .
After this canonical change of coordinates the Hamiltonian
(<ref>) reads
^(0)( J,ϑ)=ω· J
+∑_ℓ≥ 1 h^(0)_ℓ( J,ϑ) ,
with ( J,ϑ)∈^2×^2 ,
where the functions h^(0)_ℓ are homogeneous polynomials of
degree ℓ+2 in the square root of the actions J and
trigonometric polynomials in the angles ϑ. The
superscript refers to the normalization step of the averaging
algorithm we are going to describe in detail.
§.§ Formal algorithm for the construction of a resonant Birkhoff normal form
As usual, this normal form is constructed by using the Lie series
formalism, with the Lie series operator exp( χ)
defined as follows:
exp( χ)=
∑_s≥ 01s!χ^s
and χ·={·,χ} .
Moreover, we denote by _s the class of functions depending
on the action-angle variables ( J,ϑ) in such a way
that, ∀ g∈_s, g∘^-1 is an homogeneous
polynomial of degree s in the cartesian canonical variables (
Y, X). In more detail, the Taylor-Fourier expansion of a
generic function g∈_s can be written as
g( J, ϑ) =∑_ℓ∈^2ℓ_1+ℓ_2=s ∑_k_1=-ℓ_1, -ℓ_1+2,…, ℓ_1k_2=-ℓ_2, -ℓ_2+2,…, ℓ_2c_ℓ, k (√(J_1))^ℓ_1 (√(J_2))^ℓ_2exp[ (k_1ϑ_1+k_2ϑ_2)] ,
where the complex coefficients are such that c_ℓ,-
k=c̅_ℓ, k. For the sake of brevity, in the
following we will adopt the usual multi-index notation for the powers
in the square roots of the actions, i.e, the product
(√(J_1))^ℓ_1 (√(J_2))^ℓ_2 will be denoted as
(√( J))^ℓ; moreover, they will be subject to the
restriction |ℓ|=s for every term appearing in the expansion
of a function g∈_s, being |ℓ|:=ℓ_1+ℓ_2.
In the following Lemma[Its easy
proof is sketched (for a wider type of classes of functions) in
Subsection 3.1 of <cit.>.], we are going to
describe the behaviour of such a class of functions with respect to
the Poisson brackets.
Let f∈_s_1+2 and g∈_s_2+2, then {f, g}∈_s_1+s_2+2 ∀ s_1∈∖{0},
s_2∈∖{0}.
Proceeding in a perturbative way, we want to remove step by step the
dependence on the fast angle ϑ_2 (which is related to the
fast libration angle σ) from the perturbative part of the
Hamiltonian. Hence, after having performed r-1 canonical changes of
coordinates defined by the Lie series operator, the
Hamiltonian (<ref>) is brought to the following form:
^(r-1)( J,ϑ)=
ω· J+∑_ℓ= 1^r-1Z_ℓ( J,ϑ_1)
+ ∑_ℓ≥ r h_ℓ^(r-1)( J,ϑ) ,
where Z_ℓ∈_ℓ+2 and h_ℓ^(r-1)∈_ℓ+2.
Let us remark that, with abuse of notation, we are denoting the new
action-angle variables (that are introduced by the canonical
transformation defined by any normalization step) with the same pair
of symbols ( J,ϑ), which has been used to denote the
arguments of ^(0). As it is usual for the Lie series formalism,
this is done in order to contain the proliferation of the symbols.
The Hamiltonian in normal form up to order r is obtained as
^(r)=exp(χ_r)^(r-1), where the generating
function χ_r is determined by solving the homological equation
χ_r(ω· J) +
h_r^(r-1)( J,ϑ)= Z_r( J,ϑ_1) ,
with Z_r( J,ϑ_1):=⟨
h^(r-1)_r⟩_ϑ_2 where as usual
⟨·⟩_ψ denotes the angular average with respect
to ψ. In order to solve such an equation, let us first write the
Taylor-Fourier expansion of the perturbative term as
h_r^(r-1)( J,ϑ)=
∑_ℓ∈^2|ℓ|=r+2 ∑_k_1=-ℓ_1, -ℓ_1+2,…, ℓ_1k_2=-ℓ_2, -ℓ_2+2,…, ℓ_2
c_ℓ, k^(r) (√( J))^ℓexp( k·ϑ) .
Therefore, the r-th generating function writes as
χ_r( J,ϑ)=
∑_ℓ∈^2|ℓ|=r+2 ∑_k_1=-ℓ_1, -ℓ_1+2,…, ℓ_1k_2=-ℓ_2, -ℓ_2+2,…, ℓ_2 ; k_2≠ 0c_ℓ, k^(r)/ k ·ω (√( J))^ℓexp( k·ϑ) .
Clearly, the generating function can be properly defined if and only
if the frequency vector ω is non-resonant up to the order
r+2. This means that k ·ω≠ 0
∀ 0<| k|≤ r+2. Such a property is certainly satisfied if
we assume that ω satisfies the Diophantine condition, namely
| k ·ω|≥γ/| k|^τ ,
∀ k∈^2∖{0} ,
for some fixed values of γ>0 and τ≥ 1. Let us also
recall that almost all the vectors in ^2 are Diophantine with
respect to the Lebesgue measure.
The transformed functions h_ℓ^(r) appearing in the expansion of
the new Hamiltonian
^(r)( J,ϑ) =
𝒵^(r)( J,ϑ_1)+ℛ^(r+1)( J,ϑ)
=
ω· J+∑_ℓ= 1^rZ_ℓ( J,ϑ_1)
+ ∑_ℓ≥ r+1 h_ℓ^(r)( J,ϑ) ,
are defined as follows
h_ℓ^(r)= ∑_j=0^⌊ℓ/r ⌋1/j!χ_r^j h^(r-1)_ℓ-jr ,
for ℓ≥ r+1 .
A simple induction argument, which is based on the application
of Lemma <ref>, allows us to verify that
h^(r)_ℓ∈_ℓ+2 ∀ ℓ.
Hence, after a finite number r of normalization steps, we get the
Hamiltonian ^(r), which is the sum of a normal form part
𝒵^(r)( J,ϑ_1)=ω·
J+∑_ℓ= 1^rZ_ℓ( J,ϑ_1), which is integrable,
and a remainder ℛ^(r+1)( J,ϑ)=∑_ℓ≥ r+1 h_ℓ^(r)( J,ϑ).
Indeed, the averaged part 𝒵^(r)( J,ϑ_1) is
independent of the fast angle ϑ_2. Therefore, the action
J_2 is constant along the flow induced by 𝒵^(r),
because {J_2 , 𝒵^(r)}=0. Moreover, the
averaged part 𝒵^(r) results in an integrable
approximation, because it can be reduced to an Hamiltonian having just
one degree of freedom.
For later convenience, it is also worth to recall that the canonical
transformation 𝒞^(r) defining the resonant Birkhoff
normal form up to the r-th step of the constructive algorithm is
explicitly given by
𝒞^(r)( J,ϑ)=
expχ_r ∘ expχ_r-1 ∘ … expχ_1 ( J,ϑ) .
In fact, the exchange theorem for Lie series ensures us that
^(r)( J,ϑ)=^(0)(𝒞^(r)( J,ϑ))
∀ ( J,ϑ)∈( 0)×^2,
being ( 0) a suitable open ball centered
around the origin of ^2 (see <cit.>
and <cit.>).
§.§ Comparison between numerical integrations and semi-analytic solutions
In this subsection, we are going to check the validity of the averaged
Hamiltonian up to a finite order r̃ (namely the integrable
approximation 𝒵^(r̃)) in describing the orbital
motions induced by the Hamiltonian (<ref>) which describes the slow dynamics of a planetary system in MMR. For what
concerns our extra-solar model, this latter Hamiltonian, expressed in
action-angle variables as in (<ref>), has been expanded
up to order 6 in the square root of the actions. We perform 6
normalization steps and our goal is to compare numerical
integrations[All the computations discussed in the present
Section and in the following one, which are both of symbolic type and
of purely numerical kind, have been performed by using Mathematica.] of the Hamiltonian in MMR (<ref>) with the
semi-analytic solution of the averaged Hamiltonian up to order 6,
both described in the cartesian variables Y_j=
√(2J_j)cos(ϑ_j) and X_j=√(2J_j)sin(ϑ_j),
for j=1,2. The choice r̃=6 allows to obtain
a reasonable balance between the accuracy and the needed
computational time.
Let us recall that the averaged Hamiltonian 𝒵^(6) is
integrable according to the
Liouville-Arnold-Jost theorem (for a complete proof, see,
e.g., <cit.>). Therefore, there exists an
analytic expression (eventually involving also the computation of
integrals and the inversion of some functions) which defines a
canonical transformation ( J,ϑ)=Ψ( P,φ),
such that the averaged approximation 𝒵^(6) depends on
the actions P only, when it is transformed according to the
change of variables Ψ, i.e.,
∂ 𝒵^(6)(Ψ( P,φ))/∂φ_j=0
∀ j=1, 2 .
Thus, in the new set of action-angle variables ( P,φ) the equations of motion related to the averaged Hamiltonian
𝒵^(6)∘Ψ can be solved very easily. Moreover, we
can also evaluate the composition 𝒞^(6) of canonical
transformations introduced in the previous Subsection in order to
define the action-angle variables ( P,φ) and to
obtain the Hamiltonian in normal form up to order 6. The normal form
algorithm can be finally translated in a so called semi-analytic
procedure which allows to determine the motion law t↦(
Y(t), X(t)) that is defined by the flow induced by the averaged
Hamiltonian 𝒵^(6). Such a computational procedure is
summarized (∀ t∈) by the following scheme:
[row sep=5em, column sep=9em,every label/.append style = font = ]
( Y(0), X(0)) [r, "(∘𝒞^(6)∘Ψ)^-1",shorten <=1em,shorten >=1em] ( P(0),φ(0)) [d, "Φ_𝒵^(6)∘Ψ^t",shorten <=0.5em,shorten >=0.5em]
( Y(t), X(t)) [r,leftarrow,"∘𝒞^(6)∘Ψ",shorten <=0.5em,shorten >=0.5em] ( P(t)= P(0),φ(t)=β t+φ(0))
where Φ_𝒵^(6)∘Ψ^t is nothing but the flow at
time t induced by the Hamiltonian 𝒵^(6)∘Ψ and
the angular velocity is given by β_j=∂/∂
P_j(𝒵^(6)∘Ψ), while and
𝒞^(6) are defined in (<ref>)
and (<ref>), respectively. Let us stress that the
initial conditions ( P(0),φ(0)) can be obtained by
inverting the composition of the canonical transformations previously
described, while the initial conditions ( Y(0), X(0)) are the
ones derived from the observations. This semi-analytic solution could
be compared with the one obtained by a direct integration of the
Hamiltonian (<ref>). For the sake of simplicity, we do not
perform the last canonical transformation Ψ, which is essential
to properly define the semi-analytic
scheme (<ref>), but it would require to perform
some operations (e.g., the aforementioned integrals and the inversions
of functions) that can be hard to implement in a fully explicit way.
We just exploit the uniqueness of the solution of the corresponding
Cauchy problem and we approximate it numerically, by directly
integrating the equations of motion of the averaged Hamiltonian
𝒵^(6). Afterwards, we use the canonical
transformations (<ref>)
and (<ref>) to express the solution in the
variables ( Y(t), X(t)) and we compare it with the numerical
integration of the Hamiltonian (<ref>).
As we can see from the plots in Fig. <ref>, for the
relatively faster pair of variables (Y_2,X_2) we have a good
agreement between the two solutions, both in terms of amplitude and in
terms of frequency. Instead, as regards the slow variables
(Y_1,X_1), there is a remarkable error concerning the frequency.
In principle, this discrepancy might be amended with an approximation
at order two in the masses (which can be adapted to planetary systems in MMR, as explained in <cit.>), but this goes beyond the scope of the present paper.
§ ACTION-ANGLE VARIABLES ADAPTED TO THE INTEGRABLE APPROXIMATION
Before showing that KAM theorem applies in the present context, we
need another preliminary essential step in order to make the algorithm
convergent. Specifically, we have to introduce a set of action-angle
variables, that are more suitable to describe the integrable
approximation of the Hamiltonian (<ref>) than the pair
( J,ϑ) as it is defined after having performed the
canonical transformation 𝒞^(6). Indeed, the ideal
action-angle coordinates would be ( P,φ), the
ones we avoided to compute, because of the technical difficulties due
to an eventual application of the Liouville-Arnold-Jost theorem. Let us
recall that P_1 and P_2 would be constant of motion for the
integrable approximation 𝒵^(6) and the same holds true
also for the action J_2.
Hence, if we consider the orbit of the fast motion of the integrable
approximation 𝒵^(6) in the cartesian
variables[Let us remark that, once again, with a little abuse
of notation, we are denoting the variables used before and after the
averaging normalization algorithm with the same name.]
(Y_2,X_2)=(√(2J_2)cos(ϑ_2),√(2J_2)sin(ϑ_2)),
we get a circular orbit, as it is shown in the right panel of
Fig. <ref>. Instead, looking at the orbit of the
slow motion in the cartesian variables
(Y_1,X_1)=(√(2J_1)cos(ϑ_1),√(2J_1)sin(ϑ_1)),
that are related to the secular dynamics, we can observe that such an
orbit is far from being circular. Therefore, at this stage we aim at
introducing a second action which is closer than J_1 to be a
constant of motion. In other words, our approach consists in the
construction of action-angle variables with the aim of trying to
circularize (at least partially) the orbit describing the slow
dynamics in the integrable approximation. Thus, trying to introduce
an action which depends only on the distance from the origin in the
cartesian plane endowed with coordinates (Y_1,X_1), we are dealing
with a quasi-constant of motion and we approach better the sought
(final) KAM torus. From a practical point of view, our approach is
translated in an explicit computational procedure, by suitably
applying the frequency analysis method to the flow induced by the
integrable approximation 𝒵^(6) (see <cit.>
for an introduction to such a numerical technique). This can be done
by studying the Fourier decomposition of the signal Y_1(t)+
X_1(t)≃∑_j=1^𝒩_cA_1,j e^(k_jν_1
t+φ_1,j), where 𝒩_c is the number of
components considered, A_1,j>0, k_j∈,
φ_1,j∈(-π,π] and 2π/ν_1 is the period of such a
motion law. By taking into consideration only the 𝒩_c=3
components of the signal which correspond to k_j=0,± 1 for
j=1,2,3, it is easy to show that the corresponding approximation of
the orbit which describes the secular dynamics is an ellipse.
Therefore, in order to give a circular shape to such an approximation
of the orbit it is necessary to perform two changes of coordinates: a
shift on the variable X_1 of a translation value X_1^* and a
dilatation/contraction with coefficient α. The value X_1^*
of the translation is determined by exploiting the constant component
(because for j=1 we have k_1=0 and φ_1,1=-π/2, then
A_1,j e^φ_1,1 is purely imaginary and so is
aligned with the X_1 axis), while the coefficient α is
defined as follows
α=√(c_- -c_+/c_- +c_+) ,
where c_- and c_+ are the absolute values of the complex
coefficients of the components with k_2=-1 and k_3=1,
respectively. In more detail, we define c_-=A_1,2 and
c_+=A_1,3 for j=2,3; indeed, the easy computation of the
suitable coefficient α of dilatation/contraction takes
profit of the values of the corresponding angles, which are
such that φ_1,2=-φ_1,3. Therefore, we
introduce the new variables
v_1=α· Y_1 , u_1=X_1-X_1^*/α .
The new orbit of the slow motion in the variables (v_1,u_1) is
represented in Fig. <ref>. Let us remark that this plot
does not represent exactly a circular orbit; this was somehow expected
since we have considered only a limited number of Fourier components
in the computational method we have introduced in the present Section
with the aim of trying to circularize the orbit itself. However, by
looking at the scales reported on the vertical axes of the two panels
included in Fig. <ref>, one can appreciate that the
canonical change of coordinates (<ref>) allows
us to reduce the oscillations of the value of the action involved in
the description of the slow dynamics. In fact, when the plot of the
motion law t↦(Y_1^2(t)+X_1^2(t))/2 is compared to the
one of t↦(v_1^2(t)+u_1^2(t))/2, the gain of about 30%
in the circularization of the orbit is highlighted. This is enough
for the purpose of obtaining a Kolmogorov normalization algorithm
which is convergent to the normal form related to the desired final
invariant torus.
We can now introduce the action-angle variables that are more
suitably adapted to the integrable approximation, i.e.,
v_1 =√(2(p_1+p_1^*))cos(q_1) ,
Y_2 =√(2J_2)cos(ϑ_2) ,
u_1 =√(2(p_1+p_1^*))sin(q_1) ,
X_2 =√(2J_2)sin(ϑ_2) ,
where p_1^* is the value of the area enclosed by the orbit that
describes the secular dynamics in the phase plane (v_1,u_1) (or in
the one endowed with coordinates (Y_1,X_1), since canonical
transformations preserve the areas) multiplied by the factor
1/(2π). Therefore, we are imposing that the value p_1^*, which
corresponds to the closed curve {(p_1,q_1) : p_1=0 ,
q_1∈}, is equal to the usual definition of the action for
Hamiltonian systems with one degree of freedom (see, e.g., Chap. 3
of <cit.>).
§ CONSTRUCTION OF THE KAM TORUS
We can now start the construction of the KAM torus for the averaged dynamics of HD60532. First, we perform a
translation of the fast action and we rename the fast angle, i.e.
p_2=J_2-J_2^* , q_2=ϑ_2 ,
where J_2^* is the mean value of the action J_2. In the new
action-angle variables ( p, q) the Hamiltonian
(<ref>) can be expanded as follows
1# # #
H^(0)( p, q) =
E^(0)+ω^(0)· p
+∑_s≥ 0∑_ℓ≥ 2 f_ℓ^(0,s)( p, q)
+∑_s≥ 1( f_0^(0,s)( q) + f_1^(0,s)( p, q)) ,
where f_ℓ^(0,s) is a homogeneous polynomial of degree ℓ in
p and a trigonometric polynomial of degree[More
generically, the functions f_ℓ^(0,s) are usually defined as
trigonometric polynomials of degree sK (for some positive fixed
value of the parameter K∈) in q. We choose to set
K=2, accordingly to what is usually done for quasi-integrable
Hamiltonian system that are in the vicinity of an elliptic
equilibrium point as it is in the model we are studying (see,
e.g., <cit.> and recall the discussion in
Section <ref>).] 2s in q. The first
superscript of the functions f_ℓ^(0,s) denotes the
normalization step. Furthermore, E^(0) is the constant of the
energy level of p=0 when f_ℓ^(0,s)=0 ∀ ℓ
and s=0, 1. The goal is to construct the Kolmogorov normal form
H^(∞)( p, q)=ω^*· p +( p^2) ,
where ω^* is the angular velocity vector characterizing the
quasi-periodic motion on the invariant (KAM) torus corresponding to
p= 0. In other words, the Kolmogorov normalization algorithm
is designed in such a way to remove the terms appearing in the second
row of formula (<ref>) by a sequence of canonical
transformations. Here, it is convenient to adopt a different version
of the classical Kolmogorov normalization algorithm, which is slightly
modified in such a way to not keep fixed the angular velocity vector
ω^(r), that is defined at the r-th step of the
procedure and corresponds to the quasi-periodic approximation of the
motion on the final sought KAM torus. We basically follow the approach
described in <cit.>, where the normalization procedure introduced by Kolmogorov is adapted in such a way to skip the small translation of the actions performed at every step of that algorithm. This modification allows to make the computational procedure more stable; such an improvement can play a crucial role when the action–frequency map is (close to be) degenerate (see <cit.>). Moreover, in order to improve its efficiency, this small adaptation of the Kolmogorov normalization algorithm has to be formulated so as to suitably determine the preliminary translation in (<ref>). All this computational procedure is summarized in the
following in order to make our discussion rather
self-consistent.
As in Section <ref>, it is convenient to introduce suitable
classes of functions; here, we are going to say that g∈_ℓ,sK
if its Taylor-Fourier expansion writes as
g( p, q) =
∑_ j∈^n| j|=ℓ∑_ k∈^n| k|≤ sK
c_ j, k p^ jexp( k· q) ,
for some fixed values of the non-negative integer parameters
ℓ, s and K. The following statement allows us to describe the
behaviour of such a class of functions with respect to the Poisson
brackets.
Let us consider two generic functions g∈_ℓ,sK and
h∈_m,rK, where K is a fixed positive integer
number. Then, the following inclusion property holds
true:
{g,h} = h g ∈_ℓ+m-1,(r+s)K ∀ℓ, m, r, s∈ with ℓ+m≥ 1 ,
while {g,h} = 0 when ℓ=m=0.
Let us imagine to have already performed r-1 normalization steps by
using, once again, the Lie series formalism; then, we have to
deal with an Hamiltonian of the following type:
1# # #
H^(r-1)( p, q) =
E^(r-1)+ω^(r-1)· p
+∑_s≥ 0∑_ℓ≥ 2 f_ℓ^(r-1,s)( p, q)
+∑_s≥ r( f_0^(r-1,s)( q) + f_1^(r-1,s)( p, q))
,
where f_ℓ^(r-1,s)∈_ℓ,2s
∀ ℓ, s ∈, while E^(r-1)∈. Let us
remark that the expansion of H^(0), which is reported
in (<ref>), agrees with the more general one, that is written
just above in (<ref>), in the case with r=1. The Kolmogorov
normalization algorithm at step r is aimed to remove the main
perturbing terms (that are the functions f_0^(r-1,r) and
f_1^(r-1,r)), which are independent of and linear in the actions,
respectively.
In order to perform the r-th normalization step, first we need to
determine the generating function χ_0^(r) in such a way to
solve the following homological equation:
χ_0^(r)(ω^(r-1)· p) +f_0^(r-1,r)=
⟨ f_0^(r-1,r)⟩_ q .
As a matter of fact,
⟨ f_0^(r-1,r)⟩_ q∈_0,0 is nothing but a
constant term. Therefore, it can be added to E^(r-1), in order
to update the energy level, whose new value is denoted with E^(r).
By considering the Taylor-Fourier expansion of the perturbing term we
aim to remove, i.e.,
f_0^(r-1,r)( q)=
∑_0<| k|≤ 2r c_ 0, k^(r-1,r)exp( k· q) ,
we obtain the following expression for the generating function:
χ_0^(r)( q) = ∑_0<| k|≤ 2rc_ 0, k^(r-1,r)/ k·ω^(r-1)exp( k· q) .
Let us remark that the homological equation can be solved provided
that the following non-resonance condition holds true
k·ω^(r-1)≠ 0 , ∀ k∈^2∖{0} ,
with | k|≤ 2r .
We then introduce the transformed Hamiltonian
Ĥ^(r)=exp(χ_0^(r))H^(r-1),
whose expansion
1# # #Ĥ^(r)( p, q) =
Ê^(r)+ω^(r-1)· p
+∑_s≥ 0∑_ℓ≥ 2f̂_ℓ^(r,s)( p, q)
+∑_s≥ r( f̂_0^(r,s)( q) +
f̂_1^(r,s)( p, q))
is such that the new Hamiltonian terms f̂_ℓ^(r,s) are defined
so that
f̂_0^(r,r) = 0 ,
f̂_ℓ^(r,s) = ∑_j=0^⌊ s/r ⌋1/j!χ^(r)_0^j f^(r-1,s-jr)_ℓ+j ,
for ℓ=0, s≠ r ,-2pt-14pt or ℓ≠0 s≥ 0 .
By applying repeatedly Lemma <ref>, one
can easily verify that f̂_ℓ^(r,s)∈_ℓ,2s
∀ ℓ, s.
The second generating function χ_1^(r) is determined by solving
the following homological equation:
χ_1^(r)(ω^(r-1)· p )+
f̂_1^(r,r)=⟨f̂_1^(r,r)⟩_ q .
The term ⟨f̂_1^(r,r)⟩_ q∈_1,0. This
means that it is not dependent on the angles q and is linear in
the actions p; thus, it gives a contribution to the definition
of the value of the angular velocity vector ω^(r), which
in principle should converge to its limit ω^* (if the
normalization algorithm is convergent) and is defined so that
ω^(r)· p=
ω^(r-1)· p +⟨f̂_1^(r,r)⟩_ q .
By considering the following Taylor-Fourier expansion of the new
perturbing term we aim to remove, i.e.
f̂_1^(r,r)( q) - ⟨f̂_1^(r,r)⟩_ q =
∑_|ℓ|=1 ∑_0<| k|≤ 2rĉ_ℓ, k^(r,r) p^ℓexp( k· q) ,
then we easily determine the new generating function as
χ_1^(r)( q)= ∑_|ℓ|=1 ∑_0<| k|≤ 2rĉ_ℓ, k^(r,r)/ k·ω^(r-1) p^ℓexp( k· q) .
Once again, the homological equation can be solved provided that the
frequencies satisfy the non resonance condition (<ref>).
The new Hamiltonian is defined as
H^(r)=exp(χ_1^(r))Ĥ^(r-1). Its
expansion is completely analogous to the one reported
in (<ref>). Moreover,
the terms f_ℓ^(r,s)∈_ℓ,2s appearing in the
expansion of H^(r) are defined in the following way:
f_1^(r,r) = 0 ,
f_1^(r,ir) =
i-1/i!χ^(r)_1^i-1f̂^(r,r)_1+
∑_j=0^i-21/j!χ^(r)_1^jf̂^(r,(i-j)r)_1 ,
for i≥ 2 ,
f_ℓ^(r,s) =
∑_j=0^⌊ s/r ⌋1/j!χ^(r)_1^jf̂^(r,s-jr)_ℓ ,
for ℓ=1, s≠ ir ,-2pt-14pt or ℓ≠1, s≥ 0 ,
where we have exploited the second homological
equation (<ref>).
From a practical point of view, we can iterate the algorithm only up
to a finite number of steps, say, r. This allows us to
determine
H^(r)( p, q)=E^(r)
+ω^(r)· p
+∑_s≥ 0∑_ℓ≥ 2 f_ℓ^(r,s)( p, q)
+∑_s≥r+1( f_0^(r,s)( q) + f_1^(r,s)( p, q))
.
Hence, we obtain an approximation of the final invariant torus which
is characterized by an angular velocity vector
ω^(r). If the value (say) I_1^* of the
initial shift on the first action, which has been preliminarly fixed
equal to p_1^* in formula (<ref>), is accurate
enough, then the slow frequency ω^(r)_1 is close
to the one we are aiming at, which is numerically determined by
applying the frequency analysis method, namely
ω^(r)_1≃ω_1^*. We then calibrate the
initial translation of the first action I_1^*=p_1^* by means of a
Newton method. The goal is to solve the implicit equation
ω_1(Ĩ_1)=ω_1^* with respect to the initial
shift Ĩ_1. The value Ĩ_1 is iteratively
computed using the formula
Ĩ_1^(n)=Ĩ_1^(n-1)+
ω_1^*-ω_1^(r)(Ĩ_1^(n-1))/ω_1^'(Ĩ_1^(n-1)) ,
where Ĩ_1^(0)=I_1^* and the value of the derivative
ω_1^'(Ĩ_1^(n-1)) is numerically
approximated by using the finite difference method. Let us recall
that, after having performed the average with respect to the fast
angle of libration as it has been described in the previous section,
we are mainly focusing on the study of the secular dynamics. In
addition, for what concerns the (relatively) faster frequency
ω_2^(r)/(2π) we automatically have a good enough
approximation of both the frequencies of the averaged Hamiltonian, as
it can be appreciated looking at the comparison between the
semi-analytic solutions showed in Fig. <ref>, which will
be widely commented in the next subsection.
By supposing to iterate the normalization algorithm ad infinitum, one
would get the Hamiltonian (<ref>), which admits the
invariant torus p=0 with frequency ω^*.
From a practical point of view, we are able to explicitly iterate the
algorithm only up to a finite normalization step r and we
can numerically check the convergence of the procedure by controlling
the decrease of the norms of the generating functions. Hereafter, we
define the norm of any generic function g∈_ℓ,sK as
g( p, q) =
∑_ j∈^n| j|=ℓ∑_ k∈^n| k|≤ sK|c_ j, k| ,
∀ ℓ, s, K ∈, where the Taylor-Fourier
expansion of g is written
in (<ref>). The behavior of χ_0^(r) and
χ_1^(r) for values of the normalization step r up to 9
are reported in Fig. <ref>.
§.§ Comparison between two different kinds of semi-analytic solutions
In this subsection we check the accuracy of the
Hamiltonian (<ref>) in Kolmogorov normal form up to a
finite order r in describing the motion of the averaged
integrable Hamiltonian 𝒵^(r̃) up to order r̃. For what concerns our model of the librational dynamics of the
extrasolar system HD60532, we consider the Hamiltonian H^(5),
expanded as in (<ref>) and truncated up to degree 2
in the actions and to trigonometrical degree 12 in the angles. The
aim is to make a comparison with the solution associated to the
averaged integrable Hamiltonian 𝒵^(6), computed in
Subsection <ref>. The semi-analytic solution of
the equations of motion which is related to the Hamiltonian H^(5)
can be obtained with a procedure similar to the one previously
described and represented in (<ref>).
Moreover, as we can see in Fig. <ref>, we compare the
motion laws induced by two different Hamiltonians by considering in
both cases the cartesian variables Y_j=√(2J_j)cos(ϑ_j)
and X_j=√(2J_j)sin(ϑ_j), for j=1, 2, that were
adopted as canonical coordinates before starting the averaging
procedure which constructs the resonant Birkhoff normal form. In more
detail, we can determine the expansions of all the canonical
transformations introduced in Sections <ref>,
<ref> and <ref> with the aim of constructing
a Hamiltonian in Kolmogorov normal form up to order 5. Let us denote
with the symbol 𝒦^(5) the composition of the canonical
transformations introduced by the Kolmogorov algorithm (described in
the previous Subsection) up to the 5-th normalization step, i.e.,
𝒦^(5)( p, q)=
expχ_1^(5) ∘ expχ_0^(5) ∘ … ∘expχ_1^(1) ∘ expχ_0^(1) ( p, q) .
Therefore, ∀ t∈, we can compute the values of the
canonical variables ( Y(t), X(t)) corresponding to the (
p(t), q(t))=(0,ω^(5) t+ q(0)), which describe the
quasi-periodic motion of the final KAM torus as it is approximately reproduced by the Kolmogorov normalization algorithm,
when it is iterated up to the 5-th step. This computation is
performed according to the following scheme:
[row sep=5em, column sep=10em,every label/.append style = font = ]
( Y(0), X(0)) [r, "(∘𝒞^(5)∘𝒯_Ĩ_1∘𝒦^(5))^-1",shorten <=1em,shorten >=1em] ( 0, q(0)) [d, "Φ_ω^(5)· p^t",shorten <=0.5em,shorten >=0.5em]
( Y(t), X(t)) [r,leftarrow,"∘𝒞^(5)∘𝒯_Ĩ_1∘𝒦^(5)",shorten <=0.5em,shorten >=0.5em] ( p(t)= 0, q(t)=ω^(5) t+ q(0))
Here a few further explanations are in order. We denote with (
J,ϑ)=𝒯_Ĩ_1( p, q) the canonical
transformation that is obtained by making the composition of all the
canonical transformations described in Section <ref>
and in formula (<ref>); moreover, one has to
take care of slightly modifying (<ref>) in
such a way to replace p_1^* with the value of Ĩ_1 (i.e.,
the solution of equation ω_1(Ĩ_1)=ω_1^*
numerically obtained by applying the Newton method). In the
scheme (<ref>) we have also decided to
consider 𝒞^(5) instead of 𝒞^(6), because
otherwise with the adopted rules of truncation the Hamiltonian would
be integrable already before the Kolmogorov normalization; this would
make trivial the application of such an algorithm. Finally, let us
recall that H^(5)( p, q)≃ω^(5)· p
+( p^2) and ω^(5)≃ω^*; this allows us
to put the flow of ω^(5)· p in order to
approximate (in the semi-analytical scheme above) the solution of the
equations of motion related to H^(5) and with initial conditions
p(0)= 0.
The plots in Fig. <ref> show an excellent
superimposition between the two solutions, with respect to both the
amplitudes and the frequencies. This makes evident the effectiveness
of our computational algorithm. Let us also recall that the initial
conditions ( Y(0), X(0)) are the ones compatible with the
observations.
§.§ Computer-assisted proof
By looking at the plots in Fig. <ref>, it can be
noticed that the decrease of the norms of the generating functions, in
particular for what concerns the finite sequence of the second
generating function χ_1^(r), is not so regular and the
convergence of the algorithm looks doubtful. In order to rigorously
prove that the KAM algorithm is convergent, we adopt a rigorous
approach based on a computer-assisted proof. For this purpose, we
follow the method which has been described in <cit.> and
further developed in <cit.>, where a publicly available
software package[That software package can be freely
downloaded from the web address <http://dx.doi.org/10.17632/jdx22ysh2s.1>] is provided as
supplementary material. Such a package is designed for doing just this
kind of computer-assisted proof for Hamiltonian systems having two
degrees of freedom. In order to use this software so as to apply it to
the problem under consideration, it is just matter to prepare some
input files, which basically describe the starting Hamiltonian; in
principle, this can allow us to prove the existence of the KAM torus
we are aiming at, if the corresponding Kolmogorov normal form is close
enough to such an initial Hamiltonian. More precisely, we consider
H^(5) as the starting Hamiltonian. It is fully determined at the
end of the application of the Newton method, which has been described
in the previous Section; in terms of a single mathematical formula, it
can be written as
H∘∘𝒞^(5)∘𝒯_Ĩ_1∘𝒦^(5)
where H, , 𝒞^(5),
𝒯_Ĩ_1 and 𝒦^(5) are defined
in (<ref>), (<ref>),
(<ref>), just below
formula (<ref>)
and (<ref>), respectively. Moreover, the expansion
of H^(5) can be written as in (<ref>) and is
truncated up to degree 2 in the actions and to trigonometrical
degree 12 in the angles, while the expansion (<ref>)
of the intermediate Hamiltonian
^(5)=H∘∘𝒞^(5) has been preliminarly
truncated so as to exclude the sum of terms ∑_ℓ>6
h_ℓ^(r)( J,ϑ)=( J^7/2).
Therefore, H^(5) is not in Kolmogorov normal form because of a few
(small) Hamiltonian terms that are either dependent on the angles q only or linearly dependent on the actions p.
During the initial stage of the computer-assisted proof, a first code
explicitly performs a (possibly large) number R_ I of
normalization steps of a classical formulation of the Kolmogorov
algorithm, which includes also small translations of the actions that
aim at keeping fixed the desired angular velocity vector of the
quasi-periodic motion on the final torus, i.e.,
ω^*. Afterwards, the size of the perturbation is further
reduced (although in a less efficient way) by another code which just
iterates the estimates of the norms of the terms of order r with
R_ I<r≤ R_ II. In the case of the model we are
studying, in order to achieve the convergence of the algorithm, we
have found convenient to set R_ I=200 and R_ II=20 000.
The whole computer-assisted proof[The
software package allowing to perform the computer-assisted proof
of theorem <ref> is available at https://www.mat.uniroma2.it/~locatell/CAPs/CAP4KAM-HD60532.zip
As
a matter of fact, the codes included in this software package are
exactly the same as the ones which can be downloaded from the
website mentioned in
footnote<ref>1. The
differences between the two packages just concern the files
defining the expansions of the initial Hamiltonians to which the
computer-assisted proofs are applied.] required a total
computational time of about 52.5 hours on a
workstation equipped with CPUs of type
(2.2 GHz) and 384 GB of RAM. Nearly all the time (i.e., more than
50 hours) has been requested by the first explicit
computation of the (truncated) expansions of the Hamiltonians
H^(r) for r=1 , … , R_I=200.
The plot of the norms of the generating functions χ_1^(r) (in
semi-log scale) is reported in Fig. <ref>, where
the occurrence of a regular decrease is clearly highlighted. In
particular, looking at the panel on the right, we can appreciate that
the decrease is sharper for the first R_ I normalization steps,
where the expansions of the generating functions are computed
explicitly. Afterwards, there is a transition to the regime of the
iteration of the norms and, after some initially periodic jumps, the
decrease becomes more regular.
At the end of the running of the codes which make part of the software
package designed to perform this kind of computer-assisted proofs,
upper bounds for all the terms appearing in the expansion of
H^(R_ II), which is written as in (<ref>),
are available. Therefore, one can check in an automatic way the
applicability of the KAM theorem (e.g., in the version proved
in <cit.>, which fits perfectly in this framework). The
application of all this computational procedure allows us to prove our
final result, that is summarized in the following statement.
Let us consider the Hamiltonian H^(5), expanded as
in (<ref>) and truncated up to degree 2 in the
actions and to trigonometrical degree 12 in the angles. Let
ω^*∈^2 be such that
ω_1^*∈( -2.72805620345077182 × 10^-2,
-2.72805620345057182× 10^-2)
ω_2^*∈( -3.0574227066998818 × 10^-1,
-3.0574227066978818 × 10^-1)
and it satisfies the Diophantine condition
| k·ω^*|≥γ/| k|^τ ,
∀ k∈^2∖{0} ,
with γ=2.7280562034505684× 10^-2 and τ=1.
Therefore, there exists an analytic canonical transformation which
transforms the Hamiltonian H^(5) in the Kolmogorov normal
form (<ref>). In the new action-angle coordinates, the
torus { p= 0 , q∈^2} is invariant and carries
quasi-periodic orbits whose corresponding angular velocity vector is
ω^*.
§ ACKNOWLEDGMENTS
This work was partially supported by the MIUR-PRIN 20178CJA2B “New
Frontiers of Celestial Mechanics: theory and Applications”, by the
MIUR Excellence Department Project awarded to the Department of
Mathematics of the University of Rome “Tor Vergata” (CUP
E83C18000100006) and by the National Group of Mathematical
Physics (GNFM-INdAM).
10
Alv-Mich-Mal-2016
A.J. Alves, T.A. Michtchenko, M. Tadeu dos Santos.
Dynamics of the 3/1 planetary mean-motion resonance: an application to the HD60532 b-c planetary system.
Cel. Mech. & Dyn. Astr., 124, 311–334 (2016).
BatMor-2013K. Batygin, A. Morbidelli.
Analytical treatment of planetary resonances
A&A, 556, A28 (2013).
Butler-et-al-1999R.P. Butler, G.W. Marcy, D.A. Fischer,
T.M. Brown, A.R. Contos, S.G. Korzennik, P. Nisenson, R.W. Noyes.
Evidence for Multiple Companions to υ Andromedæ.
Astroph. Jour., 526, 916–927 (1999).
Car-Loc-2020C. Caracciolo, U. Locatelli.
Computer-assisted estimates for Birkhoff normal forms.
Journal of Computational Dynamics, 7, 425–460 (2020).
CarLSV-2022C. Caracciolo, U. Locatelli, M. Sansottera, M. Volpi.
Librational KAM tori in the secular dynamics of the
υ Andromedæ planetary system.
MNRAS, 510, 2147–2166 (2022).
CelGL-2000A. Celletti, A. Giorgilli, U. Locatelli.
Improved estimates on the existence of invariant tori
for Hamiltonian systems.
Nonlinearity, 13, 397–412 (2000).
Deitrick-et-al-2015R. Deitrick, R. Barnes, B.E. McArthur,
T.R. Quinn, R. Luger, A. Antonsen, G.F. Benedict.
The Three–Dimensional Architecture of the
υ Andromedæ.
Astroph. Jour., 798:46 (2015).
Fig-Har-Luq-2017J.-Ll. Figueras, A. Haro and A. Luque.
Rigorous computer-assisted application of KAM theory: a modern
approach.
Found. Comput. Math., 17 (2017), 1123–1193.
Gab-Jor-Loc-2005F. Gabern, A. Jorba, U. Locatelli.
On the construction of the Kolmogorov normal form for the
Trojan asteroids.
Nonlinearity, 18, 1705–1734 (2005).
Giorgilli-Libro-2022
A. Giorgilli.
Notes on Hamiltonian Dynamical Systems.
London Mathematical Society Student Texts,
102, ISBN: 9781009151139 (2022).
GioDFGS-1989A. Giorgilli, A. Delshams, E. Fontich,
L. Galgani, C. Simó.
Effective stability for a Hamiltonian system near an
elliptic equilibrium point, with an application to the restricted
three–body problem.
J. Differential Equations, 77, 167–198 (1989).
Gio-Loc-San-2009A. Giorgilli, U. Locatelli, M. Sansottera.
Kolmogorov and Nekhoroshev theory for the
problem of three bodies.
Cel. Mech. & Dyn. Astr., 104, 159–173 (2009).
Gio-Loc-San-2017A. Giorgilli, U. Locatelli, M. Sansottera.
Secular dynamics of a planar model of the
Sun-Jupiter-Saturn-Uranus system; effective stability in the light
of Kolmogorov and Nekhoroshev theories.
Reg. & Chaotic Dyn., 22, 54–77 (2017).
Gio-San-Chronos-2012A. Giorgilli, M. Sansottera.
Methods of algebraic manipulation in perturbation theory.
In P.M. Cincotta, C.M. Giordano, C. Efthymiopoulos (eds.):
“Chaos, Diffusion and Non-integrability in Hamiltonian Systems –
Applications to Astronomy”, Proceedings of the Third La Plata
International School on Astronomy and Geophysics, Universidad
Nacional de La Plata and Asociación Argentina de Astronomía
Publishers, La Plata (2012).
Grobner-60W. Gröbner.
Die Lie-Reihen und Ihre
Anwendungen.
Springer Verlag, Berlin (1960).
Italian transl. in Le
serie di Lie e le loro applicazioni. Cremonese, Roma (1973).
Hadden-2019
S. Hadden.
An Integrable Model for the Dynamics of Planetary
Mean-motion Resonances.
Astron. Jour., 158:238 (2019).
Haro-et-al_book_2016
A. Haro, M. Canadell, J-LL. Figueras, A. Luque, J-M. Mondelo.
The parameterization method for invariant manifolds.
Applied Mathematical Sciences, vol. 195, Springer (2016).
Laskar-1989J. Laskar.
Les variables de Poincaré et le
développement de la fonction perturbatrice. Groupe de travail
sur la lecture des Méthodes nouvelles de la Mécanique
Céleste.
Notes scientifiques et techniques du Bureau des
Longitudes, S026
(1989).
https://www.imcce.fr/content/medias/publications/publications
-recherche/nst/docs/S026.pdf
Laskar-2003J. Laskar.
Frequency map analysis and quasi periodic decompositions.
In D. Benest, C. Froeschlé, & E. Lega E. (eds.),
Hamiltonian systems and Fourier analysis,
Taylor and Francis, Cambridge (2003)
Las-Cor-2009
J. Laskar, A. C. M. Correia.
HD 60532, a planetary system in a 3:1 mean motion resonance.
Astron. & Astroph., 496, L5–L8 (2009).
Las-Rob-2001J. Laskar, P. Robutel.
High order symplectic integrators for perturbed Hamiltonian
systems.
Cel. Mech. & Dyn. Astr., 80, 39–62 (2001).
Lib-San-2013A.-S. Libert, M. Sansottera. On the extension of the Laplace-Lagrange secular theory to order two in the masses for extrasolar systems. Cel. Mech. & Dyn. Astr., 117, 149–168 (2013).
Loc-Car-San-Vol-2021U. Locatelli, C. Caracciolo, M. Sansottera, M. Volpi. A numerical criterion evaluating the robustness of planetary architectures; applications to the υ Andromedæ system In A. Celletti, C. Galeş, C. Beaugé, A. Lemaitre, eds., Multi-scale (time and mass) dynamics of space objects, Proceedings of the International Astronomical Union Symposium No. 364, Book Series, Volume 15, Pages 65-84, DOI 10.1017/S1743921322000461 (2021).
Loc-Car-San-Vol-2022U. Locatelli, C. Caracciolo, M. Sansottera,
M. Volpi.
Invariant KAM tori: from theory to applications to exoplanetary systems
In G. Baù,
S. Di Ruzza, R.I. Páez, T. Penati & M. Sansottera (eds.),
I-CELMECH Training School — New frontiers of Celestial
Mechanics: theory and applications, Springer PROMS, volume 399, eBook ISBN 978-3-031-13115-8 (2022).
Loc-Gio-2000U. Locatelli, A. Giorgilli.
Invariant tori in the secular motions of the three–body
planetary systems.
Cel. Mech. & Dyn. Astr., 78, 47–74 (2000).
Loc-Gio-2005U. Locatelli, A. Giorgilli.
Construction of the Kolmogorov's normal form for a
planetary system.
Reg. & Chaot. Dyn., 10, 153–171 (2005).
Loc-Gio-2007U. Locatelli, A. Giorgilli.
Invariant tori in the Sun–Jupiter–Saturn system.
Discr. & Cont. Dyn. Sys. — B, 7, 377–398 (2007).
McArt-et-al-2010B.E. McArthur, G.F. Benedict, R. Barnes,
E. Martioli, S. Korzennik, E. Nelan, R.P. Butler.
New observational constraints on the
υ Andromedæ system with data from the Hubble Space
telescope and Hobby-Eberly telescope.
Astroph. Jour., 715, 1203–1220 (2010).
Mich-Mal-2004T.A. Michtchenko, R. Malhotra.
Secular Dynamics of the Three-Body Problem:
Application to the υ Andromedæ Planetary System.
Icarus, 168, 237–248 (2004).
Mog-Las-2022
F. Mogavero, J. Laskar.
The origin of chaos in the Solar System through
computer algebra
Astron. & Astroph., 662, L3 (2022).
Mor-Gio-1995A. Morbidelli, A. Giorgilli.
Superexponential stability of KAM tori.
J. Stat. Phys., 78, 1607–1617 (1995).
Pucacco-2021G. Pucacco.
Normal forms for the Laplace resonance.
Cel. Mech. & Dyn. Astr., 133:3 (2021).
SanLib-2019M. Sansottera, A.-S. Libert.
Resonant Laplace-Lagrange theory for extrasolar systems
in mean-motion resonance.
Cel. Mech. & Dyn. Astr., 131:38 (2019).
SteLoc-2012L. Stefanelli , U. Locatelli.
Kolmogorov's normal form for equations of motion with
dissipative effects.
Discr. & Cont. Dyn. Sys. — B, 17, 2561–2593
(2012).
ValLoc-2021
L. Valvo, U. Locatelli.
Hamiltonian control of magnetic field lines: Computer assisted
results proving the existence of KAM barriers.
Journal of Computational Dynamics, 9, 505–527 (2022).
Vol-Loc-San-2018M. Volpi, U. Locatelli, M. Sansottera.
A reverse KAM method to estimate unknown mutual
inclinations in exoplanetary systems. Cel. Mech. &
Dyn. Astr., 130:36 (2018).
Vol-Roi-Lib-2019M. Volpi, A. Roisin, A.-S. Libert.
On the 3D secular dynamics of radial-velocity-detected
planetary systems.
Astron. & Astroph., 626, A74 (2019).
|
http://arxiv.org/abs/2303.07138v1
|
20230313140518
|
Transferable Deep Learning Power System Short-Term Voltage Stability Assessment with Physics-Informed Topological Feature Engineering
|
[
"Zijian Feng",
"Xin Chen",
"Zijian Lv",
"Peiyuan Sun",
"Kai Wu"
] |
eess.SY
|
[
"eess.SY",
"cs.LG",
"cs.SY",
"eess.SP"
] |
Transferable Deep Learning Power System Short-Term Voltage Stability Assessment with Physics-Informed Topological Feature Engineering
Zijian Feng, Xin Chen*, Zijian Lv, Peiyuan Sun, Kai Wu,
This work was supported in part by the National Natural Science Foundation of China (Grant No.21773182 (B030103)) and the HPC Platform, Xi'an Jiaotong University.
Zijian Feng (e-mail: [email protected]), Xin Chen (Corresponding author, e-mail: [email protected]), and Zijian Lv (e-mail: [email protected]) are with the School of Electrical Engineering and the Center of Nanomaterials for Renewable Energy, State Key Laboratory of Electrical Insulation and Power Equipment, School of Electrical Engineering, Xi'an Jiaotong University, Xi'an, Shaanxi, China.
Peiyuan Sun (e-mail:[email protected]) is with the School of Electrical Engineering, Xi'an Jiaotong University, Xi'an, Shaanxi, China.
Kai Wu (e-mail: [email protected].) is with State Key Laboratory of Electrical Insulation and Power Equipment, School of Electrical Engineering, Xi'an Jiaotong University, Xi'an, Shaanxi, China.
March 30, 2023
=========================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================================
Deep learning (DL) algorithms have been widely applied to short-term voltage stability (STVS) assessment in power systems. However, transferring the knowledge learned in one power grid to other power grids with topology changes is still a challenging task. This paper proposed a transferable DL-based model for STVS assessment by constructing the topology-aware voltage dynamic features from raw PMU data. Since the reactive power flow and grid topology are essential to voltage stability, the topology-aware and physics-informed voltage dynamic features are utilized to effectively represent the topological and temporal patterns from post-disturbance system dynamic trajectories.
The proposed DL-based STVS assessment model is tested under random operating conditions on the New England 39-bus system. It has 99.99% classification accuracy of the short-term voltage stability status using the topology-aware and physics-informed voltage dynamic features. In addition to high accuracy, the experiments show good adaptability to PMU errors. Moreover, The proposed STVS assessment method has outstanding performance on new grid topologies after fine-tuning. In particular, the highest accuracy reaches 99.68% in evaluation, which demonstrates a good knowledge transfer ability of the proposed model for power grid topology change.
Feature engineering, short-term voltage stability (STVS), topology-aware, transfer learning.
§ INTRODUCTION
Short-term voltage stability (STVS) refers to the ability of bus voltages to recover rapidly to an acceptable level after a large disturbance<cit.>. The leading cause of power system STVS is the fast-restoring dynamic load components, most typically induction motors (IMs), which would draw a high current in quick power demand recovery after the voltage drop<cit.>. On the other hand, the low-voltage-ride-through capability is becoming more demanding with more inverter-interface renewable energy sources (RES) in modern power grids, leading to a more severe STVS problem. The blackout event in South Australia in 2016 reflected the vulnerability of STVS in power system and substantial economic losses resulting from short-term voltage instability<cit.>. To avoid large-scale power outages and losses caused by short-term voltage instability, a real-time, accurate, and reliable STVS assessment model is necessary.
In the past, efforts have been devoted to accurate STVS assessment methods. However, the employment of various electronic components and the diversity and uncertainty of dynamic loads increase the complexity of the STVS problem. Due to the high computational burden, traditional methods, including time-domain simulation (TDS) and energy function methods, are not applicable for real-time stability assessment of the complex power system.
With the development of advanced information and communication technologies, online monitoring system has been widely employed in power systems. The wide area measurement systems (WAMS) with phasor measurement units (PMUs) can capture the system-wide dynamic behavior of the power system and gain a large amount of high-resolution data <cit.>. In recent years, numerous studies have been developed to realize reliable STVS assessment with data-driven methods owing to massive PMU data. A diversity of machine learning (ML) algorithms has been used in data-driven STVS assessment, including decision tree (DT), support vector machine (SVM), and extreme learning machine (ELM). DTs classify the system dynamic time series subsequences (shapelets) <cit.> for STVS assessment, which is more interpretable for more straightforward rules. SVM model is utilized to extract the key features of anticipated faults of the power system and predict STVS status <cit.>. ELM and random vector functional link (RVFL) units are utilized to construct an ensemble-based randomized learning model for STVS assessment with snapshots as input features <cit.>. Deep learning (DL) has recently attracted more attention since it can effectively extract features in data. Two DL algorithms, temporal convolutional neural network (TCN) and long short-term memory network (LSTM), are combined for real-time and accurate STVS assessment <cit.>. Attention mechanisms are also employed to improve the feature extraction ability and capture the temporal dependence in time series by the BiGRU-attention-based model <cit.>.
Meanwhile, with appropriate feature construction methods, the potential stability information in the time series can be fully represented in the form of feature matrices or heatmaps. These feature construction methods are an effective way to enhance the accuracy of dynamic stability assessment (DSA). Thus, various feature construction methods, wavelet transform (WT), symbolic Fourier approximation (SFA), and Gramian Angular Field (GAF) are used to covert the one-dimensional time series into two-dimensional feature images, and further cooperate with DL algorithms to realize real-time DSA <cit.>.
However, the ignorance of topology information of the power grid is a common limitation in most of the existing data-driven STVS assessment methods. In a practical power grid, the potential topological correlation coupling among different buses would determine the trigger and spread of short-term voltage instability. Nevertheless, most of the studies still need to include these critical issues in constructing STVS assessment models. By incorporating geospatial information with shapelets, a spatial-temporal feature learning STVS model is established to enhance the effect of assessment <cit.>. But it is not applicable to large-scale power grids due to its reliance on detailed geographic information of substations. Also, LSTM and Graph neural network (GNN) are employed to grasp spatial–temporal correlations behind voltage dynamics considering system structural and operational complexities <cit.>.
Moreover, another major limitation of the current data-driven online DSA arises from the requirement of applying the existing assessment models to a new power grid topology. Topological changes caused by significant disturbances, such as N-k (k >1) accidents, scheduled maintenance, etc., constitute the challenge for STVS assessment. Once there are any topology changes, the original data-driven model is not applicable. It is time-consuming to recollect the massive training dataset for rebuilding the model <cit.>. Thus, inspired by transfer learning, an assessment model with good scalability that can perform in the different topologies of power systems is essential.
There are a few studies based on transfer learning in DSA. Transfer learning aims to propagate knowledge from the source domain to the target domain <cit.>. Recently, some methods have been proposed to realize transferable transient stability assessment, but few focus on the STVS assessment. Orthogonal weight modification (OWN) and convolutional neural network (CNN) model are used to establish the model with continuous learning ability, which can update the model quickly and continuously <cit.>. A deep belief network (DBN) is used to realize transfer learning between different operating conditions and topology <cit.>. The dominant instability mode (DIM) identification models under base power grid topology are transferred to the N-1 topology scenarios <cit.> through active transfer learning and unsupervised transfer learning.
Aiming at the STVS assessment, this article proposes a DL-based power system STVS assessment model with topology-aware physics-informed feature engineering and knowledge transfer for power grid topology change. By extracting the physical features of the data, this paper aims to realize real-time STVS assessment at high accuracy. At the same time, this method extracts the power grid topological features related to STVS, which not only improves the model's performance but also helps to realize the transfer application among the power systems with different topologies. The main contributions of this article include the following:
* The topology-aware and physics-informed voltage dynamic features are constructed from the raw PMU data, which are based on the grid topology and real-time reactive power demands on loads. The features contain both topological information and temporal information from voltage dynamics.
* With the PMU dataset generated with the New England 39-bus system, the DL-based STVS assessment model shows highly accurate and robust performance with the topology-aware and physics-informed voltage dynamic features.
* The topological-temporal information in voltage dynamic features enhances the knowledge transfer ability of the DL-based STVS assessment model for power grids with new topology. The proposed STVS assessment model demonstrates accurate STVS assessment with direct transfer learning and fine-tuning in the dataset of new power grids.
§ TOPOLOGY-AWARE DYNAMIC FEATURES
Voltage stability is the ability that a power system maintains the voltages at all buses after being subjected to a disturbance. The topology of the power system is critical to voltage stability. The reactive power flow can determine the voltage adjustment. The reactive power Q_i of node i,
Q_i≜-∑_j=1^n+mV_iV_jB_ij
where B_ij=b_ijcos(θ_i-θ_j), and b_ij is the susceptance between nodes i and j; V_i and θ_i are the voltage magnitude and rotor angle of node i.
The voltage stability in the power system is strongly associated with the reactive power flow since the driving force of instability is the power consumed by loads. The stress on loads by high reactive power consumption can cause voltage reduction. To produce a measure of stress on each load in a power system at steady state, a load matrix 𝐋_𝐬 <cit.> can be defined as,
𝐋_𝐬≜1/4 diag (𝐁_𝐋𝐋^-1𝐁_𝐋𝐆𝐕_𝐆) 𝐁_𝐋𝐋 diag (𝐁_𝐋𝐋^-1𝐁_𝐋𝐆𝐕_𝐆)
where diag(·) is a matrix on the main diagonal. 𝐁_𝐋𝐋 is the susceptance matrix among loads, 𝐁_𝐋𝐆 is the susceptance matrix between loads and generators, 𝐕_𝐆 is the vector of generator voltages. Since steady-state voltage instability occurs over minutes and the generator swing dynamic occurs on the order of seconds, the generator voltages can be assumed as constant. 𝐁_𝐋𝐋^-1𝐁_𝐋𝐆𝐕_𝐆 is the open-circuit voltage on loads, when 𝐕_𝐆 stays unchanged. The load matrix 𝐋_𝐬 is based on the grid topology to indicate the sensitivity of the increasing stress on nodes. Moreover, to produce a node-by-node measure of grid stress and estimate the distance to voltage collapse, a voltage stability index <cit.> Δ is defined as,
Δ≜‖𝐋_𝐬^-1𝐪_𝐋‖_∞,
where 𝐪_𝐋 denotes reactive power demands of loads at steady state, which can be calculated as <cit.>,
𝐪_𝐋=-[𝐕_𝐋](𝐁_𝐋𝐋𝐕_𝐋+𝐁_𝐋𝐆𝐕_𝐆),
where [𝐕_𝐋] is the diagonal matrix of load voltages.
With Δ as an indicator of steady-state voltage stability, there is a fixed bound that when Δ=1, the network's guaranteed stability margin has been depleted. Thus, the voltage stability index Δ can be used to assess the stability margin.
At the steady state, the voltage stability index Δ is a load-weighted reactive power demand adopted to assess the power system's stability status and quantify the voltage stability margin. With the data provided by synchrophasor measurements, the steady-state voltage stability of each operation point is represented by Δ.
However, in the broad field of STVS, the voltage stability index Δ is not applicable anymore to voltage dynamics. The STVS of the power system cannot be assessed simply by comparing it with the constant threshold as in the steady state. Nevertheless, the stress on each load changes continuously when the power system suffers from a large disturbance. Thus, there should be a time-dependent load-weighted reactive power demand for STVS assessment.
Therefore, the voltage dynamic features ℱ_T from 0 to T can be defined as,
ℱ_T≜ (Δ_0, Δ_1, ⋯, Δ_t, ⋯, Δ_T), t = 0, 1, ⋯, T
where Δ_t≜𝐋_𝐬^-1(𝐪_𝐋)_t is the snapshot of the voltage dynamic feature of STVS at t-time. (𝐪_𝐋)_t is the real-time reactive power demands of loads. The voltage dynamic features ℱ_T are constructed by stacking the snapshots Δ_t from 0 to T, respectively, the beginning and end of the voltage trajectory V_t. The voltage dynamic features are the low-dimensional topology-aware feature for the DL-based STVS assessment.
The topological information of power grid has a significant impact on the accuracy and efficiency of stability assessment. In the practical power system, the STVS problem easily spreads from vulnerable load buses. The feature extraction of the grid topology helps to assess the extent of disturbances propagation and capture the dynamic interactions between different nodes. The proposed feature construction method generates topology-aware voltage dynamic features with the load matrix 𝐋_𝐬. The susceptance matrix in the load matrix contains the topological information and power system parameters. The elements in the load matrix reflect the mutual connection relationship between the corresponding nodes. Constructed with the raw PMU data with the load matrix and real-time power demands of loads, the voltage dynamic features preserve the topological information of the power grid as well as the temporal voltage dynamics in the STVS assessment.
§ DL-BASED STVS ASSESSMENT AND TRANSFER LEARNING
§.§ Framework of DL-based STVS Assessment
Based on the voltage dynamic features, the DL-based STVS assessment consists of two parts, the dynamic feature construction and the DL-based STVS assessment, as shown in Fig. <ref>. The voltage dynamic features, constructed with the grid topology and voltage dynamics, can enhance the knowledge transfer ability to the new grid topology.
The STVS assessment is a binary classification problem. Therefore, DL algorithms are widely used for classification, particularly a CNN that is used for visual recognition and image classification. As shown in Fig. <ref>, the PMU data are converted into two-dimensional voltage dynamic features. Then, the voltage dynamic features are segmented by the moving windows as the input for the CNN network.
The CNN network consists of four CNN layers, four batch normalization layers, and one output layer. The output layer includes a fully-connected layer and a SoftMax layer. The classifier's output is a binary vector representing the predicted stability status of the power system.
In the CNN layer, units are organized in the feature map, and each unit is connected to the local patch of the feature map of the previous layer through a filter blank. Mathematically, this transformation operation is a process of discrete convolution. The calculation of a CNN layer H_1 is defined as:
h_1,α=f(x*W^1,α+b^1,α)
where, h_1,α is the output matrix of the α^th convolution of H_1. W^1,α and b^1,α are the weight matrix and bias matrix of the α^th convolution of H_1. f is the activation function.
§.§ Transfer Learning with Fine-tuning
The DL model, which is trained on one power system, could not be applied to other power systems with different grid topologies.
The transfer learning is to realize the transfer of the knowledge of a trained model from a domain (the source domain) to another domain (the target domain).
The power system with the particular grid topology is used as the source domain. The power systems with new grid topology are used as the target source.
The knowledge transfer ability can be strongly enhanced across different power grids with topology-aware dynamic features.
The framework of the knowledge transfer is shown in Fig. <ref>.
Applying the pre-trained model to other power grids is equivalent to transferring the model trained in the source domain to the target domain. Moreover, by transfer learning, it is possible to apply the optimized STVS assessment model to power systems with different topologies without collecting a large amount of data for repetitive training.
Fine-tuning is widely used for transfer learning<cit.> to train further the pre-trained source domain model for the target domain. The STVS assessment model is pre-trained with dynamic features in the source domain. Then, after fine-tuning with the target domain's dynamic features, the pre-trained STVS assessment model from the source task is transferred to the target task.
§ CASE STUDY
The DL-based STVS assessment is tested in the New England 39-bus system shown in Fig. <ref>.
The impact of load dynamics on the STVS performance of various power systems is examined following the short-circuit disturbances with different severity degrees.
The voltage trajectories are obtained by the TDS with Power System Toolbox<cit.>. The dynamic feature construction and STVS assessment are implemented in Python, and the framework of CNN is implemented in PyTorch. All the loads are modeled as composite loads with IMs and constant power loads to simulate the STVS dynamic. In a power system with m loads, the voltage trajectories V_t have the length of T. Given the time step of dt, the size of the voltage trajectory is N=T/dt.
The voltage trajectory is separated into moving windows to construct the voltage dynamic features. The moving window has the T_w length, and the window size is n=T_w/dt.
The Δ_t is calculated for each load at each snapshot in the moving window. And the voltage dynamic features ℱ_T_w are generated by stacking.
In Fig. <ref>, the upper plot shows the voltage trajectory under the large disturbance, and the lower right plot shows the corresponding voltage dynamic feature of the voltage dynamics at t-time snapshot. The lower left plot shows the voltage dynamic features in a moving window.
Figs. <ref> and <ref> show the voltage trajectories and corresponding voltage dynamic features for the stable and unstable status. And the trajectories of voltage amplitude V_m and voltage phase angle θ are obtained. The heatmap visualization of the voltage dynamic features clearly show that the stable and unstable status have different patterns. The pattern in the topology-aware voltage dynamic features enhances the ability of DL classification.
§.§ Pre-trained DL Classifier
The source-domain dataset is used to pre-train the DL classifier. In the source-domain dataset, varied operating conditions and contingencies, including the load level and fault clearing time, cover typical STVS scenarios. The source-domain dataset G_0 contain 100,000 samples. The load level varies between 0.8 and 1.2 of its base values in data generation. Each sample has a three-phase fault with a random fault duration between 0.1 and 0.4s and a randomly selected fault location. The label in the dataset is determined by whether the nodal voltage magnitude is lower than 0.8 p.u. for more than 1s in the simulation process <cit.>. To sufficiently describe the voltage dynamics by voltage dynamic features, the length of the moving window T_w is set to 0.8s. The decision of the beginning of the moving window depends on when the fault occurs. The source-domain dataset is split into the training and validation sets with 60000 and 20000 samples, respectively, via random sampling, and the testing dataset with 20000 samples. The proposed STVS assessment model is pre-trained by offline learning.
The accuracy (ACC), Precision, Recall, and F1-score are used for the performance evaluation.
To assess the generalization ability of the proposed model, the cross-validation method is used. Cross-validation is one of the most popular data resampling methods to estimate the true prediction error of the models <cit.>. During the offline training of the STVS assessment model, the training, validation, and test dataset are generated by k-fold random subsampling, where k=10. Any set of the dataset is disjoint and in the same proportion. The performance is estimated as the average over all k-test datasets. This approach makes the evaluation results of the model more reliable.
The proposed STVS assessment model's accuracy reaches 99.99%. Compared with the existing methods<cit.>, the proposed model achieves the best overall STVS performance on the New England 39-bus system.
To examine the dependence of the pre-trained model on the dataset size, training datasets of different sizes, ranging from 1000 to 50000, are used for the training. When the training dataset has 10000 samples, the pre-trained model still reaches good accuracy at 99.63%. However, when the size of the training dataset drops to 2000, the accuracy declines to 97.75%. The sufficiently large training dataset guarantees the performance of the pre-trained model.
Samples in moving windows of different lengths from 0.1 to 0.8s were used to compare the size effect on the performance of the pre-trained model. The models' performances trained with different lengths of moving windows are shown in Table <ref>. When the length is not less than 0.4s, the accuracy of the models is not less than 99.61%, which is still an outstanding result. Meanwhile, when the length is smaller, the models' performances decrease due to the insufficient temporal information of the sample. In this case, the length of the moving window T_w is set to 0.8s in order to obtain better STVS assessment performance.
Due to possible errors caused by phasor measurement, the performance of the proposed assessment model was further tested on voltage data with PMU error. Based on the previous experiment, measurement errors were added to the voltage trajectory dataset. In particular, errors were simulated by white noise following Gaussian distribution N(0,σ) to voltage magnitudes (σ=0.3p.u) and angles (σ=1.5^∘) <cit.>. Accordingly, the voltage dynamic features were calculated using voltage data with PMU error.
Compared with the error-free performances, the proposed model's STVS assessment with PMU errors still has excellent performances, with accuracy at 99.52%, precision at 99.70%, recall at 99.69%, and F1-score at 99.70%. The results imply that the proposed assessment model remains robust to the PMU error. This effect benefits from the proposed feature construction method that extracts voltage dynamic voltage features from voltage trajectories and acts as the filter of noise. Even if noises contaminate the acquired voltage trajectories, the patterns in voltage dynamic features are still preserved behind them.
§.§ Transfer Learning Classifier
Unexpected overloading operation or maintenance scheduling processes of transmission lines will cause topology changes in the power system. In the experiment, the single-line diagram of the standard New England 39-bus system is adjusted for different scenarios of topology changes for data generation. The new power grids are selected to evaluate the transfer learning performance. The target-domain datasets of transfer learning are generated based on two power grid topology change scenarios. The new two scenarios are as follows:
Scenario A: One edge of the standard New England 39-bus system is disconnected, and the load level is unchanged. Six target domain datasets G_1 to G_6 are generated.
Scenario B: Two edges of the standard New England 39-bus system are disconnected, and the load level is unchanged. Six target domain datasets G_7 to G_12 are generated.
The detailed setup of target power grid topology changes is shown in Table <ref>.
Firstly, without further processing, the pre-trained classification model is directly applied to the target-domain datasets G_1 to G_12. The direct transfer learning performance is shown in Table <ref>. Direct transfer learning has relatively good performance on the target datasets. Dataset G_1 to G_6 reach the accuracy from 94.60% to 98.64% whereas G_7 to G_12 from 88.76% to 94.18%.
However, fine-tuning the pre-trained model with samples in the target-domain dataset can enhance knowledge transfer performance. In the 12 target-domain datasets, G_1 to G_12, 1000 samples are used for the fine-tuning. The test results on the 5000 testing dataset are shown in Table <ref>.
In Table <ref>, it can be seen that the transfer learning STVS assessment model achieves better performance on the 12 target-domain datasets after fine-tuning. The best accuracy can reach 99.68%. With more edges disconnected in the new grid topology, the transfer performance declines due to the more significant power grid topology change. However, the lowest accuracy still reaches 97.1%. It shows that the pre-trained model has a superior transfer ability to power systems with new grid topology.
§ CONCLUSION
The DL-based power system STVS assessment model is proposed with topology-aware and physics-informed feature engineering and knowledge transfer for power grid topology change. After research, it is found that more than the existing methods are needed to improve the model to adapt to the new power grid topology. With transfer learning as a promising method for this problem, this paper proposed a novel dynamic feature construction method. It used fine-tuning to adapt the pre-trained model to a new grid topology. The feature construction method generates topology-aware voltage dynamic features from PMU data, with CNN as a classifier to fit the relationship between the voltage dynamic features and STVS status. Case studies were carried out on the New England 39-bus system, and the results show that the proposed assessment achieves good performances and adaptability on the robustness to PMU error. Moreover, the pre-trained model can significantly ensure knowledge transfer ability to new grid topology.
It is very promising to further explore the applications of the STVS assessment with voltage dynamic features on voltage stability emergency control.
IEEEtran
|
http://arxiv.org/abs/2303.06939v1
|
20230313091456
|
Topological and disorder corrections to the transverse Wiedemann-Franz law and Mott relation in kagome magnets
|
[
"Xiao-Bin Qiang",
"Z. Z. Du",
"Hai-Zhou Lu",
"X. C. Xie"
] |
cond-mat.mes-hall
|
[
"cond-mat.mes-hall"
] |
Shenzhen Institute for Quantum Science and Engineering and Department of Physics, Southern University of Science and Technology (SUSTech), Shenzhen 518055, China
Quantum Science Center of Guangdong-Hong Kong-Macao Greater Bay Area (Guangdong), Shenzhen 518045, China
Shenzhen Key Laboratory of Quantum Science and Engineering, Shenzhen 518055, China
International Quantum Academy, Shenzhen 518048, China
Shenzhen Institute for Quantum Science and Engineering and Department of Physics, Southern University of Science and Technology (SUSTech), Shenzhen 518055, China
Shenzhen Key Laboratory of Quantum Science and Engineering, Shenzhen 518055, China
International Quantum Academy, Shenzhen 518048, China
Corresponding author: [email protected]
Shenzhen Institute for Quantum Science and Engineering and Department of Physics, Southern University of Science and Technology (SUSTech), Shenzhen 518055, China
Quantum Science Center of Guangdong-Hong Kong-Macao Greater Bay Area (Guangdong), Shenzhen 518045, China
Shenzhen Key Laboratory of Quantum Science and Engineering, Shenzhen 518055, China
International Quantum Academy, Shenzhen 518048, China
International Center for Quantum Materials, School of Physics, Peking University, Beijing 100871, China
Collaborative Innovation Center of Quantum Matter, Beijing 100871, China
CAS Center for Excellence in Topological Quantum Computation,
University of Chinese Academy of Sciences, Beijing 100190, China
The Wiedemann-Franz law and Mott relation are textbook paradigms on the ratios of the thermal and thermoelectric conductivities to electrical conductivity, respectively. Deviations from them usually reveal insights for intriguing phases of matter. The recent topological kagome magnets TbMn_6Sn_6 and Mn_3Ge show confusingly opposite derivations in the Hall measurement. We calculate the topological and disorder corrections to the Wiedemann-Franz law and Mott relation for the Hall responses in topological kagome magnets. The calculation indicates the dominance of the topological correction in the experiments. More importantly, we derive analytic correction formulas, which can universally capture the two opposite experiments with the chemical potential as the only parameter and will be a powerful guidance for future explorations on the magnetic topological matter.
Topological and disorder corrections to the transverse Wiedemann-Franz law and Mott relation in kagome magnets
X. C. Xie
March 30, 2023
==============================================================================================================
In most metals, the ratio between the thermal conductivity κ and electric conductivity σ is characterized by the Wiedemann-Franz law κ/σ=L_0T <cit.>, where T is the temperature and the Lorentz number
L_0=(π k_B/e)^2/3
is composed of the elementary charge e and the Boltzmann constant k_B.
The deviations from them usually provide insights for exotic phases of matter, such as in non-Fermi liquids and hydrodynamics <cit.>.
Recently, the thermoelectric and thermal transports have become promising tools to probe topological phases of matter <cit.>.
In particular, topological magnets have attracted tremendous interest because of their outstanding electromagnetic conversion abilities for potential device applications <cit.>.
The latest experiments on the topological kagome magnets TbMn_6Sn_6 <cit.> and Mn_3Ge <cit.> show confusingly opposite deviations from the Wiedemann-Franz law in the Hall measurements [Fig. <ref> (b)], raising questions on their microscopic mechanisms. In particular, disorder and topology could both play sophisticated roles in the anomalous Hall transport <cit.>, but their contributions and competition remain unclear in these experiments.
In this Letter, we calculate the ratios
of thermal Hall conductivity κ_xy
and thermoelectric Hall (Nernst) conductivity
α_xy to the electric Hall conductivity σ_xy [Fig. <ref> (a)].
Beyond the previous works, we take into account the disorder contribution and topological contribution on same footing. By comparing the calculation with the experiments, we find that
the topological contribution may dominate in the experiments. More importantly, we can derive the analytic formulas for the corrections to the Wiedemann-Franz law (κ/σ) and Mott relation (α=-e L_0T ∂σ/∂μ, where μ is the chemical potential), with the help of the Dirac model that carry the topological and magnetic properties of the topological kagome magnets [Fig. <ref>].
The analytic formulas depend not explicitly on the model details, but only on the chemical potential, implying the universal nature of the corrections.
Our analytic formulas can reproduce both the negative and positive derivations from the classical Wiedemann-Franz law [Fig. <ref> (b)], as well as the tendencies in the Mott relation
[Fig. <ref>(c)] in the experiments, with the same chemical potential in each experiment. These formulas will be helpful for further explorations on the electric, thermoelectric, and thermal transports in topological magnets.
Despite the sophisticated magnetic structures of the topological kagome magnets, in the metallic phase as those in the experiments <cit.>, the magnon <cit.> and phonon <cit.> degrees of freedom are inactive in the thermal transport. Therefore, the electronic, thermoelectric, and thermal transports are fairly described by the electronic Hamiltonian. The electronic structure of TbMn_6Sn_6 can be described by the 2D massive Dirac model, which has been confirmed by the spectroscopic measurement <cit.>. The electronic structure of non-colinear antiferromagnet Mn_3Ge [Fig. <ref>(c)] <cit.> is the Weyl semimetal <cit.>, which can be viewed as layers of coupled 2D massive Dirac models <cit.>. More importantly, the massive Dirac model can describe two of the most important characteristics of the topological kagome magnets, i.e., time-reversal symmetry breaking and topological properties. More importantly, later we will see that κ_xy^in/σ_xy^in and α_xy^in/σ_xy^in in Eqs. (<ref>) and (<ref>) do not depend on the model details.
The electric, thermoelectric (Nernst coefficient), and thermal Hall conductivities can
be expressed in an organized form
σ_xy^χ=-e^2/h𝒞_0^χ, α_xy^χ=k_B e/h𝒞_1^χ, κ_xy^χ=-k_B^2 T/h𝒞_2^χ,
where h is the Planck constant and the coefficient 𝒞_n^χ (see <cit.> for details) can be expressed as
𝒞_n^χ=∫ dε[χ](ε-μ/k_B T)^n(-∂ f^0/∂ε),
here ε is the energy, μ is the chemical potential, and f^0=1/(e^(ε-μ)/k_BT+1) is the Fermi distribution function. The kernel function χ denotes different mechanisms in the anomalous transport, including the topological contribution revealed in the seminal works <cit.> and disorder contribution <cit.>. For the topological contribution, χ^in=2π∑_l Ω_l^zf_l^0, where l=(𝐤,n) stands for the quantum numbers (momentum, band index), Ω^z_l is the z component of the Berry curvature of band n with the definition Ω_l= i∇_𝐤×⟨ψ_n|∇_𝐤ψ_n⟩.
The Berry curvature can be understood as the “magnetic field" in the parameter space, as a result of the geometric structure of the quantum states <cit.>, and is found critical in understanding the anomalous Hall effect <cit.>, topological magnetoresistance <cit.>, and thermal transport <cit.>.
For the 2D Dirac model ℋ= v(k_xσ_x+k_yσ_y)+mσ_z, Ω_±^z=∓ mv^2/(2ε_+^3), where the band dispersions are ε_±(k)=±[ v^2(k_x^2+k_y^2)+m^2]^1/2, v is the model parameter, σ_x,y,z are Pauli matrices, and m is the band gap.
The main results of this work are the analytic formulas for the topological contributions κ_xy^in/σ_xy^in (the Wiedemann-Franz law of the Hall signals) and α_xy^in/σ_xy^in, which can reproduce two opposite types of experiments of the topological kagome magnets. By performing the Sommerfeld expansion of the transport coefficients (Eqs. <ref>) with respect to the energy scale of temperature (up to σ∝ (k_BT)^4, α∝ (k_BT)^4, κ∝ (k_BT)^4), we obtain the analytic expression for the ratio κ_xy^in/σ_xy^in
κ_xy^in/σ_xy^in = 15μ^2/π^2+21(k_BT)^2/15μ^2/π^2+5(k_BT)^2+7π^2(k_BT)^4/μ^2L_0 T,
where the Lorentz number L_0=(π k_B/e)^2/3, the chemical potential μ is measured from the center of the gap. This formula can be simplified in two limits <cit.>
κ_xy^in/σ_xy^in={ (1+16π^2/15k_B^2T^2/μ^2)L_0T, μ≫μ_c;
(1+π^2/3k_B^2T^2/μ^2)^-1L_0T, μ≪μ_c,
.
where the critical chemical potential is found as μ_c=√(7)π k_BT/4 (at which κ_xy^in/σ_xy^in recovers the classical value L_0T). The μ≫μ_c limit of Eq. (<ref>) has been used to fit the positive deviation in the experiment of TbMn_6Sn_6 <cit.>, but only the new formula Eq. (<ref>) can give both the positive and negative deviations in Fig. <ref>.
Similar to the classical Mott relation <cit.>, we also get the relation between the thermoelectric and the electric Hall coefficients
α_xy^in/σ_xy^in=(μ/e+π^2/3k_B^2 T^2/eμ)^-1L_0T.
Note that the formulas are independent of the model parameters but solely depend on μ, i.e. the position of the chemical potential.
This is reasonable because the model details are cancelled as the quantities on the denominator and numerator of the ratios both depends on the model parameters, such as the band gap m. In this sense, the ratios are more intrinsic and universal.
To test Eqs. (<ref>) and (<ref>), we use μ as the only parameter to fit the experimental data from Refs. <cit.>.
Figs. <ref> (b) and (c) show a good agreement between the experiments and our analytic formulas for κ_xy^in/σ_xy^in and α_xy^in/σ_xy^in as functions of temperature T. In particular, we use μ=0.11 eV to fit the data of TbMn_6Sn_6, very close to the measured μ=0.13± 0.004 eV in the experiment <cit.>. We stress that the fitting parameter μ is the same for κ_xy^in/σ_xy^in and α_xy^in/σ_xy^in for the same experiment in the comparison. Constrained by the Sommerfeld expansion, our formulas in Eqs. (<ref>) and (<ref>) are valid for temperatures below the Fermi temperature T_F=μ/k_B, which is more than 1000 K for the high chemical potentials in the experiments. Nevertheless, there is a derivation from the formula above 300 K.
It is reasonable to employ the formulas, because the electronic behaviors of the topological kagome magnet TbMn_6Sn_6 <cit.>
and the non-colinear antiferromagnet Mn_3Ge <cit.> can be reduced to the 2D massive Dirac model [Fig. <ref>].
The description of Mn_3Ge by the 2D model is further supported by considering a 3D tilted massless Weyl cone <cit.> ℋ=s(v 𝐤·σ+tk_z), where v is the model parameter, and s=± 1 labels the chirality of a single node. The tilt term tk_z is necessary to cover more general case, and we assume t/v≪ 1 to get the analytical result. This model can well describe the Weyl semimetal phase in the bulk Mn_3Ge <cit.>. We find that there is no deviation from the Wiedemann-Franz law and Mott relation when both the topology and disorder contributions are taken into account for the tilted massless Weyl cone (Details can be found in <cit.>), additionally justifying that the 2D model is a better description for the layered structure of Mn_3Ge.
Up to now, we only consider the topological correction. However, disorder in real materials can contribute to the anomalous transport <cit.>. We use the Boltzmann kinetics to account for the disorder contribution, which is widely used in explaining magneto-transport <cit.> and nonlinear transport <cit.>. To have analytic results, we consider a δ-correlated disorder model V̂_imp=∑_i V_i δ(𝐫-𝐑_i) with the randomly distributed vector R_i and the disorder strength V_i satisfying the second-order correlation ⟨ V_i^2⟩_dis=V_0^2 and third-order correlation⟨ V_i^3⟩_dis=V_1^3. This model can well describe the elastic scattering (even the electron-phonon scattering approximately below the Debye temperature <cit.>). After a lengthy calculation <cit.>, we find the kernel functions for the disorder contributions, including the side-jump, extrinsic skew-scattering, and intrinsic skew-scattering parts, respectively,
χ^sj=2m(ε^2-m^2)/ε(ε^2+3m^2),
χ^sk,1=V_1^3/n_iV_0^4m(ε^2-m^2)^2/(ε^2+3m^2)^2,
χ^sk,2=3m(ε^2-m^2)^2/2ε(ε^2+3m^2)^2.
By substituting χ's into Eq. (<ref>), we can have the total contribution that includes the topological and disorder contributions for all transport coefficients, as well as the ratios κ_xy^tot/σ_xy^tot and α_xy^tot/σ_xy^tot.
Interestingly, in the presence of the disorder contribution, up to the leading-order (σ∝ (k_BT)^0, α∝ (k_BT)^2, κ∝ (k_BT)^2) Sommerfeld expansion of Eq. (<ref>), the ratios can recover
the classical Wiedemann-Franz law and Mott relation, i.e., (check <cit.> for details)
κ_xy^in(0)+κ_xy^dis(0) =L_0 T [σ_xy^in(0)+σ_xy^dis(0)],
α_xy^in(0)+α_xy^dis(0) = -e L_0T ∂/∂μ[σ_xy^in(0)+σ_xy^dis(0)],
where the superscript (0) means leading-order and dis(0) includes the leading-order side-jump and skew-scattering contributions.
To fully examine the disorder correction, we numerically evaluate κ_xy^tot/σ_xy^tot and α_xy^tot/σ_xy^tot by using Eqs. (<ref>) and (<ref>) for different values of m and μ. As shown in [Figs. <ref> (a)-(b)], both κ_xy^tot/σ_xy^tot and α_xy^tot/σ_xy^tot show the m dependence, which is different when there is only the topological contribution. We adopt the value m=0.017 eV for the TbMn_6Sn_6 <cit.>, i.e., black curves in [Figs. <ref> (c)-(d)]. It can be seen that the topological and total contribution show different behaviors. For κ_xy/σ_xy, the total contribution show almost only negative correction to the Wiedemann-Franz law, unable to describe the positive deviation in the TbMn_6Sn_6 experiment <cit.>. Similarly, if we include the disorder contribution, the total correction to the
α_xy/σ_xy is also not consistent with the experiment <cit.>. These results imply that the topological contribution is dominant in these topological kagome magnet experiments so far <cit.>.
To see if the above results based on the 2D Dirac model can be generalized to 3D, we also use a 3D Dirac model to calculate the topological correction to κ_xy^in/σ_xy^in and α_xy^in/σ_xy^in <cit.>
ℋ=v 𝐤·α+(m-bk^2)β+Mσ_0⊗σ_z,
where v, m, b, and M are model parameters, α_i=σ_x⊗σ_i and β=σ_z⊗σ_0 are Dirac matrices, 𝐤=(k_x,k_y,k_z) is the wavevector with k=|𝐤|.
When the parameters mb>0, this model can characterize a magnetic topological insulator. The last term is the Zeeman energy that describes magnetism, which
breaks time-reversal symmetry to unveil the hidden Berry curvature, as seen in inset of Fig. <ref> (d).
In Fig. <ref>, we present the numerical results of κ_xy^in/σ_xy^in and α_xy^in/σ_xy^in for the 3D Dirac model in Eq. (<ref>), which show similar temperature and chemical potential dependences to those described by the 2D Dirac model and in the experiments. Specifically, the violation of the classical Wiedemann-Franz law becomes stronger as the chemical potential approaches the band edge and as temperature is increased, and κ_xy^in/σ_xy^in is below and above the classical value, respectively, as the chemical potential is very close to and moves away from the band edge.
These numerical results of 3D Dirac model show that our analytical formulas based on the 2D Dirac model could be a qualitative tool to study the topological corrections to the Wiedemann-Franz law and Mott relation in the topological magnets.
To conclude, we analytically and numerically calculated the corrections to the Wiedemann-Franz law and Mott relation for topological kagome magnets, by treating the topological correction and disorder correction on same footing. By comparing our results with the recent experiments with opposite behaviors, we show the dominance of the topological correction from the Berry curvature in the experiments. More importantly, our analytic formulas for the topological correction will be an useful tool to explore the emergent topological magnets.
We thank Jia-Xin Yin for helpful discussions. This work was supported by the National
Key R&D Program of China (2020YFA0308900),
Innovation Program for Quantum Science and Technology (2021ZD0302400),
the National Natural Science Foundation of China (11925402),
the National Basic Research Program of China (2015CB921102), the Strategic Priority Research Program of Chinese Academy of Sciences (XDB28000000),
Guangdong province (2020KCXTD001 and 2016ZT06D348),
and the Science, Technology and Innovation Commission of Shenzhen Municipality (ZDSYS20170303165926217, JAY20170412152620376, and KYTDPT20181011104202253). The numerical calculations were supported by Center for Computational Science and Engineering of SUSTech.
|
http://arxiv.org/abs/2303.06681v1
|
20230312145422
|
Learning Deep Intensity Field for Extremely Sparse-View CBCT Reconstruction
|
[
"Yiqun Lin",
"Zhongjin Luo",
"Wei Zhao",
"Xiaomeng Li"
] |
eess.IV
|
[
"eess.IV",
"cs.CV"
] |
DIF-Net
Y. Lin, Z. Luo, W. Zhao, and X. Li^⋆
The Hong Kong University of Science and Technology The Chinese University of Hong Kong, Shenzhen Beihang University
Learning Deep Intensity Field for Extremely Sparse-View CBCT Reconstruction
Yiqun Lin1 Zhongjin Luo2 Wei Zhao3 Xiaomeng Li1Corresponding Authors: [email protected]
March 30, 2023
=========================================================================================
Sparse-view cone-beam CT (CBCT) reconstruction is an important direction to reduce radiation dose and benefit clinical applications.
Previous voxel-based generation methods represent the CT as discrete voxels, resulting in high memory requirements and limited spatial resolution due to the use of 3D decoders. In this paper, we formulate the CT volume as a continuous intensity field and develop a novel to perform high-quality CBCT reconstruction from extremely sparse (≤10) projection views at an ultrafast speed.
The intensity field of a CT can be regarded as a continuous function of 3D spatial points. Therefore, the reconstruction can be reformulated as regressing the intensity value of an arbitrary 3D point from given sparse projections.
Specifically, for a point, extracts its view-specific features from different 2D projection views. These features are subsequently aggregated by a fusion module for intensity estimation. Notably, thousands of points can be processed in parallel to improve efficiency during training and testing.
In practice, we collect a knee CBCT dataset to train and evaluate . Extensive experiments show that our approach can reconstruct CBCT with high image quality and high spatial resolution from extremely sparse views within 1.6 seconds, significantly outperforming state-of-the-art methods.
Our code will be available at https://github.com/lyqun/DIF-Net.
§ INTRODUCTION
Cone-beam computed tomography (CBCT) is a common 3D imaging technique used to examine the internal structure of an object with high spatial resolution and fast scanning speed <cit.>. During CBCT scanning, the scanner rotates around the object and emits cone-shaped beams, obtaining 2D projections in the detection panel to reconstruct 3D volume.
In recent years, beyond dentistry, CBCT has been widely used to acquire images of the human knee joint for applications such as total knee arthroplasty and postoperative pain management <cit.>.
To maintain image quality, CBCT typically requires hundreds of projections involving high radiation doses from X-rays, which could be a concern in clinical practice.
Sparse-view reconstruction is one of the ways to reduce radiation dose by reducing the number of scanning views (10× fewer). In this paper, we study a more challenging problem, extremely sparse-view CBCT reconstruction, aiming to reconstruct a high-quality CT volume from fewer than 10 projection views.
Compared to conventional CT (, parallel beam, fan beam), CBCT reconstructs a 3D volume from 2D projections instead of a 2D slice from 1D projections, as comparison shown in Figure <ref>, resulting in a significant increase in spatial dimensionality and computational complexity. Therefore, although sparse-view conventional CT reconstruction <cit.> has been developed for many years, these methods cannot be trivially extended to CBCT.
CBCT reconstruction can be divided into dense-view (≥100), sparse-view (20∼50), extremely sparse-view (≤10), and single/orthogonal-view reconstructions depending on the number of projection views required.
A typical example of dense-view reconstruction is FDK <cit.>, which is a filtered-backprojection (FBP) algorithm that accumulates intensities by backprojecting from 2D views, but requires hundreds of views to avoid streaking artifacts.
To reduce required projection views, ART <cit.> and its extensions (, SART <cit.>, VW-ART <cit.>) formulate reconstruction as an iterative minimization process, which is useful when projections are limited. Nevertheless, such methods often take a long computational time to converge and cope poorly with extremely sparse projections; see results of SART in Table <ref>.
With the development of deep learning techniques and computing devices, learning-based approaches are proposed for CBCT sparse-view reconstruction. Anish <cit.> propose to reconstruct a coarse CT with FDK and use 2D CNNs to denoise each slice. However, the algorithm has not been validated on medical datasets, and the performance is still limited as FDK introduces extensive streaking artifacts with sparse views.
Recently, neural rendering techniques <cit.> have been introduced to reconstruct CBCT volume by parameterizing the attenuation coefficient field as an implicit neural representation field (NeRF), but they require a long time for reconstruction and do not perform well with extremely sparse views; see results of NAF in Table <ref>.
For single/orthogonal-view reconstruction, voxel-based approaches <cit.> are proposed to build 2D-to-3D generation networks that consist of 2D encoders and 3D decoders with large training parameters, leading to high memory requirements and limited spatial resolution. These methods are special designs with the networks <cit.> or patient-specific training data <cit.>, which are difficult to extend to general sparse-view reconstruction.
In this work, our goal is to reconstruct a CBCT of high image quality and high spatial resolution from extremely sparse (≤10) 2D projections, which is an important yet challenging and unstudied problem in sparse-view CBCT reconstruction.
Unlike previous voxel-based methods that represent the CT as discrete voxels, we formulate the CT volume as a continuous intensity field, which can be regarded as a continuous function g(·) of 3D spatial points. The property of a point p in this field represents its intensity value v, , v = g(p). Therefore, the reconstruction problem can be reformulated as regressing the intensity value of an arbitrary 3D point from a stack of 2D projections ℐ, , v = g(ℐ, p).
Based on the above formulation, we develop a novel reconstruction framework, namely (Deep Intensity Field Network).
Specifically, first extracts feature maps from K given 2D projections. Given a 3D point, we project the point onto the 2D imaging panel of each view_i by corresponding imaging parameters (distance, angle, ect.) and query its view-specific features from the feature map of view_i. Then, K view-specific features from different views are aggregated by a cross-view fusion module for intensity regression.
By introducing the continuous intensity field, it becomes possible to train with a set of sparsely sampled points to reduce memory requirement, and reconstruct the CT volume with any desired resolution during testing.
Compared to NeRF-based methods <cit.>, can reconstruct CT of high resolution in a very short time since only inference is required for a new test sample (no retraining). Furthermore, our method performs much better than NeRF-based methods with extremely limited views due to the prior knowledge learned from training data.
To summarize, the main contributions of this work include
1.) we are the first to introduce the continuous intensity field for supervised CBCT reconstruction;
2.) we propose a novel reconstruction framework that reconstructs CBCT with high image quality (PSNR: 29.3 dB, SSIM: 0.92) and high spatial resolution (≥256^3) from extremely sparse (≤10) views within 1.6 seconds;
3.) we conduct extensive experiments to validate the effectiveness of the proposed sparse-view CBCT reconstruction method on a clinical knee CBCT dataset.
§ METHOD
§.§ Intensity Field
We formulate the CT volume as a continuous intensity field, where the property of a 3D point p ∈ℝ^3 in this field represents its intensity value v ∈ℝ. The intensity field can be defined as a continuous function g: ℝ^3 →ℝ, such that v = g(p). Hence, the reconstruction problem can be reformulated as regressing the intensity value of an arbitrary point p in the 3D space from K projections ℐ = {I_1, I_2, …, I_K}, , v = g(ℐ, p).
Based on the above formulation, we propose a novel reconstruction framework, namely , to perform efficient sparse-view CBCT reconstruction, as the overview shown in Figrue <ref>.
§.§ : Deep Intensity Field Network
first extracts feature maps {F_1, F_2, …, F_K}⊂ℝ^C× H × W from projections ℐ using a shared 2D encoder, where C is the number of feature channels and H/W are height/width. In practice, we choose U-Net <cit.> as the 2D encoder because of its good feature extraction ability and popular applications in medical image analysis <cit.>.
Then, given a 3D point, gathers its view-specific features queried from feature maps of different views for intensity regression.
View-specific feature querying.
Considering a point p ∈ℝ^3 in the 3D space, for a projection view_i with scanning angle α_i and other imaging parameters β (distance, spacing, etc.), we project p to the 2D imaging panel of view_i and obtain its 2D projection coordinates p'_i = φ(p, α_i, β) ∈ℝ^2, where φ(·) is the projection function. Projection coordinates p'_i are used for querying view-specific features f_i ∈ℝ^C from the 2D feature map F_i of view_i:
f_i = π(F_i, p'_i) = π(F_i, φ(p, α_i, β)),
where π(·) is bilinar interpolation. Similar to perspective projection, the CBCT projection function φ(·) can be formulated as
φ(p, α_i, β) = H(A(β)R(α_i)
[ p; 1 ]),
where R(α_i) ∈ℝ^4×4 is a rotation matrix that transforms point p from the world coordinate system to the scanner coordinate system of view_i, A(β) ∈ℝ^3×4 is a projection matrix that projects the point onto the 2D imaging panel of view_i, and H: ℝ^3 →ℝ^2 is the homogeneous division that maps the homogeneous coordinates of p'_i to its Cartesian coordinates. Due to page limitations, the detailed formulation of φ(·) is given in the supplementary material.
Cross-view feature fusion & intensity regression.
Given K projection views, K view-specific features of the point p are queried from different views to form a feature list F(p) = {f_1, f_2, …, f_K}⊂ℝ^C. Then, the cross-view feature fusion δ(·) is introduced to gather features from F(p) and generate a 1D vector f̅ = δ(F(p)) ∈ℝ^C to represent the semantic features of p. In general, F(p) is an unordered feature set, which means that δ(·) should be a set function and can be implemented with a pooling layer (, max/avg pooling). In our experiments, the projection angles of the training and test samples are the same, uniformly sampled from 0^∘ to 180^∘ (half rotation). Therefore, F(p) can be regarded as an ordered list (K× C tensor), and δ(·) can be implemented by a 2-layer MLP (K→⌊K/2⌋→ 1) for feature aggregation. We will compare different implementations of δ(·) in the ablation study. Finally, a 4-layer MLP (C→ 2C →⌊C/2⌋→⌊C/8⌋→ 1) is applied to f̅ for the regression of intensity value v∈ℝ.
§.§ Network Training
Assume that the shape and spacing of the original CT volume are H× W × D and (s_h, s_w, s_d) mm, respectively. During training, different from previous voxel-based methods that regard the entire 3D CT image as the supervision target, we randomly sample a set of N points {p_1, p_2, …, p_N} with coordinates ranging from (0, 0, 0) to (s_hH, s_wW, s_dD) in the world coordinate system (unit: mm) as the input. Then will estimate their intensity values 𝒱 = {v_1, v_2, …, v_N} from given projections ℐ. For supervision, ground-truth intensity values 𝒱̂ = {v̂_1, v̂_2, …, v̂_N} can be obtained from the ground-truth CT image based on the coordinates of points by trilinear interpolation. We choose mean-square-error (MSE) as the objective function, and the training loss can be formulated as
ℒ(𝒱, 𝒱̂) = 1/N∑_i=1^N (v_i - v̂_i)^2.
Because background points (62%, , air) occupy more space than foreground points (38%, , bones, organs), uniform sampling will bring imbalanced prediction of intensities. We set an intensity threshold 10^-5 to identify foreground and background areas by binary classification and sample N/2 points from each area for training.
§.§ Volume Reconstruction
During inference, a regular and dense point set to cover all CT voxels is sampled, , to uniformly sample H× W × D points from (0, 0, 0) to (s_hH, s_wW, s_dD). Then the network will take 2D projections and points as the input and generate intensity values of sampled points to form the target CT volume.
Unlike previous voxel-based methods that are limited to generating fixed-resolution CT volumes, our method enables scalable output resolutions by introducing the representation of continuous intensity field.
For example, we can uniformly sample ⌊H/s⌋×⌊W/s⌋×⌊D/s⌋ points to generate a coarse CT image but with a faster reconstruction speed, or sample ⌊ sH⌋×⌊ sW⌋×⌊ sD⌋ points to generate a CT image with higher resolution, where s > 1 is the scaling ratio.
§ EXPERIMENTS
We conduct extensive experiments on a collected knee CBCT dataset to show the effectiveness of our proposed method on sparse-view CBCT reconstruction. Compared to previous works, our can reconstruct a CT volume with high image quality and high spatial resolution from extremely sparse (≤ 10) projections at an ultrafast speed.
§.§ Experimental Settings
Dataset and preprocessing.
We collect a knee CBCT dataset consisting of 614 CT scans. Of these, 464 are used for training, 50 for validation, and 100 for testing. We resample, interpolate, and crop (or pad) CT scans to have isotropic voxel spacing of (0.8, 0.8, 0.8) mm and shape of 256× 256 × 256. 2D projections are generated by digitally reconstructed radiographs (DRRs) at a resolution of 256× 256. Projection angles are uniformly selected in the range of 180^∘.
Implementation.
We implement using PyTorch with a single NVIDIA RTX 3090 GPU. The network parameters are optimized using stochastic gradient descent (SGD) with a momentum of 0.98 and an initial learning rate of 0.01. The learning rate is decreased by a factor of 0.001^1/400≈ 0.9829 per epoch, and we train the model for 400 epochs with a batch size of 4. For each CT scan, N = 10,000 points are sampled as the input during one training iteration. For the full model, we employ U-Net <cit.> with C = 128 output feature channels as the 2D encoder, and cross-view feature fusion is implemented with MLP.
Baseline methods. We choose four publicly available methods as our baselines, including traditional methods FDK <cit.> and SART <cit.>, voxel-based method PatRecon <cit.>, and NeRF-based method NAF <cit.>. In addition to PatRecon, we do not compare other voxel-based methods such as X2CT-GAN <cit.> and MFCT-GAN <cit.> because their networks are specifically designed for reconstruction from 2-view X-rays and cannot be extended to multi-view reconstruction due to extremely high memory requirements.
Evaluation metrics.
We follow previous works <cit.> to evaluate the reconstructed CT volumes with two quantitative metrics, namely peak signal-to-noise ratio (PSNR) and structural similarity (SSIM) <cit.>. Higher PSNR/SSIM values represent superior reconstruction quality.
§.§ Results
Performance. As shown in Table <ref>, we compare with four previous methods <cit.> under the setting of reconstruction with different output resolutions (, 128^3, 256^3) and from different numbers of projection views (, 6, 8, and 10). Experiments show that our proposed can reconstruct CBCT with high image quality even using only 6 projection views, which significantly outperforms previous works in terms of PSNR and SSIM values. More importantly, can be directly applied to reconstruct CT images with different output resolutions without the need for model retraining or modification.
As visual results shown in Figure <ref>, PatRecon <cit.> produces meaningless results because it is designed for patient-specific reconstruction and should be trained on several CT scans of the same patient, which may not be appropriate for general CT datasets; FDK <cit.> produces results with many streaking artifacts due to lack of sufficient projection views; SART <cit.> and NAF <cit.> produce results with good shape contours but lack detailed internal information; our proposed can reconstruct high-quality CT with better shape contour, clearer internal information, and fewer artifacts. More visual comparisons of the number of input views are given in the supplementary material.
Reconstruction efficiency. As shown in Table <ref>, FDK <cit.> requires the least time for reconstruction, but has the worst image quality; SART <cit.> and NAF <cit.> require a lot of time for optimization or training; PatRecon <cit.> has a large number of model parameters and requires high computational memory due to its voxel-based design. Our can reconstruct high-quality CT within 1.6 seconds, much faster than previous methods. In addition, , which benefits from the intensity field representation, has fewer training parameters and requires less computational memory, enabling high-resolution reconstruction.
Ablation study. Table <ref> and <ref> show the ablative analysis of cross-view fusion strategy and the number of training points N. Experiments demonstrate that
1.) MLP performs best, but max pooling is also effective and would be a general solution when the view angles are not consistent across training/test data, as discussed in Section <ref>;
2.) fewer points (, 5,000) may destabilize the loss and gradient during training, leading to performance degradation; 10,000 points are enough to achieve the best performance, and training with 10,000 points is much sparser than voxel-based methods that train with the entire CT volume (, 256^3 or 128^3).
We have tried to use a different encoder like pre-trained ResNet18 <cit.> with more model parameters than U-Net <cit.>. However, ResNet18 does not bring any improvement (PSNR/SSIM: 29.2/0.92), which means that U-Net is powerful enough for feature extraction in this task.
§ CONCLUSION
In this work, we formulate the CT volume as a continuous intensity field and present a novel for ultrafast CBCT reconstruction from extremely sparse (≤10) projection views.
aims to estimate the intensity value of an arbitrary point in 3D space from input projections, which means 3D CNNs are not required for feature decoding, thereby reducing memory requirement and computational cost.
Experiments show that can perform efficient and high-quality CT reconstruction, significantly outperforming previous state-of-the-art methods.
More importantly, is a general sparse-view reconstruction framework, which can be trained on a large-scale dataset containing various body parts with different projection views and imaging parameters to achieve better generalization ability. This will be left as our future work.
*
splncs04
|
http://arxiv.org/abs/2303.07366v1
|
20230313180003
|
Exotic energy injection in the early universe I: a novel treatment for low-energy electrons and photons
|
[
"Hongwan Liu",
"Wenzer Qin",
"Gregory W. Ridgway",
"Tracy R. Slatyer"
] |
astro-ph.CO
|
[
"astro-ph.CO",
"hep-ph"
] |
L[1]>
m#1
C[1]>
m#1
R[1]>
m#1
e-.05em V
pc
mystyle
language = Python,
commentstyle=,
keywordstyle=,
keywordstyle=[1],
keywordstyle=[2],
keywordstyle=[3],
keywordstyle=[4],
commentstyle=,
numberstyle=,
stringstyle=,
basicstyle=,
breakatwhitespace=false,
breaklines=true,
captionpos=b,
keepspaces=false,
numbers=none,
numbersep=5pt,
showspaces=false,
showstringspaces=false,
showtabs=false,
tabsize=2,
morekeywords=True, False, len,
columns=flexible
literate=
*001
111
221
331
441
551
661
771
881
991
e-e-2
e0e02
e1e12
e2e22
e3e32
e4e42
e5e52
e6e62
e7e72
e8e82
e9e92
e-e-2
-0-02
-1-12
-2-22
-3-32
-4-42
-5-52
-6-62
-7-72
-8-82
-9-92
style=mystyle
|
http://arxiv.org/abs/2303.07164v1
|
20230313150813
|
Aspects of the Electroweak Skyrmion
|
[
"Stefano Bolognesi",
"Sven Bjarke Gudnason",
"Giacomo Santoni"
] |
hep-th
|
[
"hep-th",
"hep-ph"
] |
=1
theoremTheorem[section]
postulatePostulate
definitionDefinition[section]
corollaryCorollary[section]
lemmaLemma[section]
plain
1.3
L>l<
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.