text
stringlengths
0
643k
meta
stringlengths
137
151
# Matroid Intersection under Common Independence Oracle {#sec:ci} As discussed in Section [3](#sec:oracles){reference-type="ref" reference="sec:oracles"}, the common independence oracle is strictly weaker than the minimum rank and the rank sum oracles. As weighted matroid intersection turned out to be tractable for the rank sum oracle, the complexity of the problem under the common independence oracle is especially interesting. In what follows, we present an algorithm for the unweighted matroid intersection problem when one of the matroids is a partition matroid, and an algorithm for the weighted matroid intersection problem when one of the matroids is an elementary split matroid. We also show that the common independence oracle, when complemented with the rank oracle, is strong enough to design an algorithm similar to that for the rank sum case. ## Intersection with Partition Matroid {#sec:cipart} The aim of this section is to show that the unweighted matroid intersection problem is tractable under the common independence oracle when \({\mathbf{M}}_1\) is a **partition matroid** with all-one upper bound on the partition classes, that is, when \({\mathcal{I}}_1\) is represented as \({\mathcal{I}}_1 = \{\, I \subseteq E \mid |I \cap E_i| \leq 1\ \text{for \)i=1,\dots,q\(}\,\}\) for some partition \(E=E_1\cup\dots\cup E_q\). We will provide an algorithm that emulates Algorithm [\[alg:1\]](#alg:1){reference-type="ref" reference="alg:1"}, i.e., Augment\([E, {\mathcal{I}}_1, {\mathcal{I}}_2, I]\), using only the common independence oracle. Take any \(k = 0, 1, \dots, n-1\) and let \(I\in {\mathcal{I}}_1^k \cap {\mathcal{I}}_2^k\). To emulate Algorithm [\[alg:1\]](#alg:1){reference-type="ref" reference="alg:1"}, we want to find a shortest \(S_I\)--\(T_I\) path in the exchangeability graph \(D[I] = (E \setminus I, I; A_1[I]\cup A_2[I])\). With only the common independence oracle, however, we cannot construct \(D[I]\), and cannot determine even \(S_I\) or \(T_I\). Note that a shortest \(S_I\)--\(T_I\) path in \(D[I]\) never uses arcs entering sources or leaving sinks. Therefore, finding a shortest \(S_I\)--\(T_I\) path in \(D[I]\) is equivalent to finding it in \(D'[I]\), where \(D'[I]\) is the subgraph of \(D[I]\) obtained by removing those arcs from \(D[I]\) (it is used also in Section [5](#sec:rank_sum){reference-type="ref" reference="sec:rank_sum"}). We now provide a search procedure, described as Algorithm [\[alg:part2\]](#alg:part2){reference-type="ref" reference="alg:part2"}, that will be used as a subroutine for our augmentating procedure. If a given element \(s\) belongs to \(S_I\), this search algorithm works like the breadth first search in \(D'[I]\) rooted at \(s\), and returns a shortest \(s\)--\(T_I\) path or certifies the nonexistence of such a path. In Algorithm [\[alg:part2\]](#alg:part2){reference-type="ref" reference="alg:part2"}, for each \(y\in I\), a sequence \(P_y\) of distinct elements is defined. In our analysis, \(P_y\) will turn out to be a shortest \(s\)--\(y\) path in \(D'[I]\). We use the notation \(P_y+x\) to denote the sequence obtained by appending an element \(x\) to \(P_y\). By the algorithm, it is clear that the output is either a sequence \(P\) with \(I\triangle P\in {\mathcal{I}}_1 \cap {\mathcal{I}}_2\) and \(|I\triangle P|=k+1\) or a message *"No"*. Also, if \(s\in S_I\cap T_I\), we see that \(s\) itself is a shortest \(s\)--\(T_I\) path and is returned at Step 1. Therefore, we assume \(s\in S_I\setminus T_I\) and show that a shortest \(s\)--\(T_I\) path is returned if such a path exists. We denote by \(\dist(s,T_I)\) the length (i.e., the number of vertices) of a shortest \(s\)--\(T_I\) path in \(D'[I]\) and by \(\dist(s,y)\) the length of a shortest \(s\)--\(y\) path in \(D'[I]\) for each \(y\in I\). Note that \(\dist(s,T_I)\) is odd and \(\dist(s,y)\) is even for any \(y\in I\). Suppose that we are at the beginning of \(\ell\)th process of Step 3(iii). Take \(y'\) and \(x\) as before and take any \(y\in I\) such that \(P_y\) is undefined. Then \(\dist(s,y)>2\ell\) by (a) and induction for (c). Also \((y',x)\in A'_1[I]\) implies \(x\not\in T_I\) since otherwise the algorithm has halted at Step 3 (ii). The following claim completes the proof of (c). Thus, both (b) and (c) hold for \(\ell\). ◻ Using EmulatingBFS (Algorithm [\[alg:part2\]](#alg:part2){reference-type="ref" reference="alg:part2"}) as a subroutine, we design a procedure that emulates Augment\([E, {\mathcal{I}}_1, {\mathcal{I}}_2, I]\) with the common independence oracle. Lemma [\[lem:common_indep_partition\]](#lem:common_indep_partition){reference-type="ref" reference="lem:common_indep_partition"} completes the proof of Theorem [\[thm:ci\]](#thm:ci){reference-type="ref" reference="thm:ci"}. ## Intersection with Elementary Split Matroid {#sec:split} Motivated by the study of matroid polytopes from a tropical geometry point of view, Joswig and Schröter  introduced the notion of **split matroids**. This class does not only generalize paving matroids, but it is closed both under duality and taking minors. Bérczi, Király, Schwarcz, Yamaguchi and Yokoi  later observed that every split matroid can be obtained as the direct sum of a so-called **elementary split matroid** and uniform matroids. Elementary split matroids capture all the nice properties of connected split matroids, and is closed not only under duality and taking minors but also truncation. Motivated by representations of paving matroids by hypergraphs, they provided a hypergraph characterization of elementary split matroids as follows. Let \(E\) be a ground set of size at least \(r\), \({\mathcal{H}}=\{H_1,\dots, H_q\}\) be a (possibly empty) collection of subsets of \(E\), and \(r, r_1, \dots, r_q\) be nonnegative integers satisfying \[\begin{aligned} |H_i \cap H_j| &\le r_i + r_j-r &&\text{for \(1 \le i < j \le q\),}\tag*{(H1)}\label{eq:h1}\\ |E\setminus H_i| + r_i &\ge r &&\text{for \(i=1,\dots, q\).} \tag*{(H2)}\label{eq:h2} \end{aligned}\] Then \({\mathcal{I}}=\{\, X\subseteq E\mid |X|\leq r,\ |X\cap H_i|\leq r_i\ \text{for \)1\leq i \leq q\(} \,\}\) forms the family of independent sets of a rank-\(r\) matroid \(M\) with rank function \(r_M(Z)=\min\big\{r,|Z|,\min_{1\leq i\leq q}\{|Z\setminus H_i|+r_i\}\big\}\). Matroids that can be obtained in this form are called **elementary split matroids**. We call a set \(F\subseteq E\) **\(H_i\)-tight** or **tight with respect to \(H_i\)** if \(|F\cap H_i|=r_i\). The following lemma shows that an independent set of size less than \(r\) cannot be tight with respect to two different hyperedges. Now we show that the weighted matroid intersection problem is tractable under the common independence oracle when \({\mathbf{M}}_1\) is an **elementary split matroid**, that is, when \({\mathcal{I}}_1\) can be represented as \({\mathcal{I}}_1=\{\, X\subseteq E\mid |X|\leq r,\ |X\cap H_i|\leq r_i\ \text{for \)1\leq i \leq q\(} \,\}\) for some (possibly empty) hypergraph \({\mathcal{H}}=\{H_1,\dots, H_q\}\) and nonnegative integers \(r, r_1, \dots, r_q\) satisfying [\[eq:h1\]](#eq:h1){reference-type="ref" reference="eq:h1"} and [\[eq:h2\]](#eq:h2){reference-type="ref" reference="eq:h2"}. The proof is based on observing that the exchangeability graph has a special structure. By Claim [\[cl:short\]](#cl:short){reference-type="ref" reference="cl:short"}, a \(w\)-maximal member of \({\mathcal{I}}_1^{k+1}\cap{\mathcal{I}}_2^{k+1}\), if exists, can be found by checking every set \(I'\) of size \(k+1\) with \(|I\triangle I'|\leq 2\). This concludes the proof of the theorem. ◻ # Introduction {#sec:introduction} A cornerstone of matroid theory is the efficient solvability of the matroid intersection problem introduced by Edmonds. Efficient algorithms for weighted matroid intersection were developed subsequently by Edmonds, by Lawler, and by Iri and Tomizawa. The min-max duality theorem of Edmonds for the unweighted matroid intersection problem was generalized by Frank to the weighted case. These results do not only provide a well-established framework that includes various tractable combinatorial optimization problems such as bipartite matching and arborescence packing, but in certain cases they are unavoidable in solving natural optimization problems that seem to be unrelated to matroids. A beautiful example is the problem of computing a cheapest rooted \(k\)-connected spanning subgraph of a digraph. This is a pure graph optimization problem and yet the only known polynomial algorithm is based on the recognition that minimal rooted \(k\)-connected subgraphs of a digraph form the common bases of two matroids, and therefore a weighted matroid intersection algorithm can be applied. In order to design matroid algorithms and to analyze their complexity, it should be clarified how matroids are given. As the number of bases can be exponential in the size of the ground set, defining a matroid in an explicit form is inefficient. Rather than giving a matroid as an explicit input, it is usually assumed that one of the standard oracles is available, and the complexity of the algorithm is measured by the number of oracle calls and other elementary steps. Another way to define a matroid is to give an explicit linear representation, but this restricts the scope of the algorithm to linear matroids for which such an explicit representation is known. For both the unweighted and weighted problems, a variety of efficient algorithms have been developed; see e.g.. A common feature of these algorithms, and also all previous studies on matroid intersection, is that they assume the availability of one of the standard oracles for both matroids; e.g., we can ask for the rank of a subset in each of them. Our main contribution is showing that this assumption is not necessary for the tractability of matroid intersection, not even in the weighted setting. One motivation for studying restricted oracles comes from polymatroid matching, a framework introduced by Lawler  as a common generalization of matroid intersection and non-bipartite matching. In, Edmonds' theorem was deduced from polymatroid matching using a sophisticated argument. The main point is that when the matroid intersection problem is formulated as a polymatroid matching problem, only the *rank sum function* of the two matroids is used rather than the two rank functions. Although the polymatroid matching problem cannot be solved in polynomial time in general , the hardness was shown through special instances that seem to be far from matroid intersection. This suggests that matroid intersection might still be tractable when only the sum of the rank functions is available. We mention that another natural oracle to consider is the *minimum rank function*, which answers the smaller value among the two ranks of a subset. It follows from the polyhedral results of Edmonds that this oracle suffices to describe the convex hull of common independent sets. In an unpublished manuscript, Bárász gave a polynomial time algorithm for unweighted matroid intersection under the minimum rank oracle. We will present additional results about this oracle in a separate paper . #### Our results Our goal is to settle the tractability of the weighted matroid intersection problem under restricted oracles. In particular, we will focus on three different oracles: rank sum, common independence, and maximum rank oracles. The study of the rank sum oracle is motivated by the above discussed connection to polymatroid matching results. The difficulty of giving an efficient algorithm is that the usual augmenting path approach cannot be applied directly, since the exchangeability graphs are not determined by the rank sum oracle. Still, we are able to give a strongly polynomial time algorithm for the weighted matroid intersection problem by emulating the Bellman--Ford algorithm without explicitly knowing the underlying graph. It is not difficult to see that a common independence oracle can be constructed with the help of a rank sum oracle. Therefore, any algorithm that is based on the usage of a common independence oracle immediately translates into an algorithm that uses a rank sum oracle. Nevertheless, the reverse implication does not hold, hence the common independence oracle is strictly weaker. We show that unweighted matroid intersection remains tractable under the common independence oracle model when one of the matroids is a partition matroid. Although the complexity of the problem in general remains an intriguing open question even for the unweighted setting, this seemingly simple case already includes matchings in bipartite graphs and arborescences. Recently, Joswig and Schröter  introduced the notion of split matroids, a class with distinguished structural properties that generalizes paving matroids. Bérczi, Király, Schwarcz, Yamaguchi and Yokoi  showed that every split matroid can be obtained as the direct sum of a so-called elementary split matroid and uniform matroids, and provided a hypergraph characterization of elementary split matroids. By relying on this characterization, we show that even weighted matroid intersection is tractable in the common independence oracle model when one of the matroids is from this class. We will see that the maximum rank oracle does not carry too much information on its own. However, when combined with the common independence oracle, they are strong enough to mimic our algorithm for the rank sum case. #### Organization The rest of the paper is organized as follows. Basic definitions and notation are introduced in Section [4](#sec:preliminaries){reference-type="ref" reference="sec:preliminaries"}, together with some fundamental results on matroid intersection. Section [3](#sec:oracles){reference-type="ref" reference="sec:oracles"} describes the relation between different oracles. We present our strongly polynomial algorithm under the rank sum oracle in Section [5](#sec:rank_sum){reference-type="ref" reference="sec:rank_sum"}. The common independence oracle case when one of the matroids is a partition matroid or an elementary split matroid, as well as the combination of the common independence and maximum rank oracles, is discussed in Section [1](#sec:ci){reference-type="ref" reference="sec:ci"}. # Polynomial Reducibility of Oracles {#sec:oracles} Although there are many different types of oracles that are used in studies on matroids, many of these conventional oracles have the same computational power. More precisely, we say that an oracle \({\mathcal{O}}_1\) is **polynomially reducible** to another oracle \({\mathcal{O}}_2\) if \({\mathcal{O}}_1\) can be simulated by using a polynomial number of oracle calls to \({\mathcal{O}}_2\) measured in terms of the size of the ground set. Two oracles are **polynomially equivalent** if they are mutually polynomially reducible to each other. In this sense, the rank, independence, strong basis, circuit-finding, spanning, and port oracles are polynomially equivalent . The aim of this section is to clarify the relation between the restricted oracles that we consider, that is, [Sum]{.smallcaps}, [Min]{.smallcaps}, [Max]{.smallcaps}, and [CI]{.smallcaps}. As it turns out, [Max]{.smallcaps} is not very useful on its own, but it provides a powerful tool when combined with any of the other three oracles. We denote by a '+' sign when we have access to two of the oracles, e.g., [Min+Max]{.smallcaps} means that for a set \(X\subseteq E\) the oracle tells both \({r_\mathrm{min}}(X)\) and \({r_\mathrm{max}}(X)\). In what follows, we discuss the reducibility of the oracles one by one. In order to keep the presentation clear, some of the ideas appear multiple times. For an overview of the results, see Figure [\[fig:oracles\]](#fig:oracles){reference-type="ref" reference="fig:oracles"}. Observe that, by \({r_\mathrm{sum}}(X)={r_\mathrm{min}}(X)+{r_\mathrm{max}}(X)\), any combination of at least two of [Min]{.smallcaps}, [Max]{.smallcaps}, and [Sum]{.smallcaps} is clearly equivalent. This immediately implies that each of Min, Sum, and Max is reducible to each of Min+Max, Min+Sum, and Sum+Max. # Preliminaries {#sec:preliminaries} For the basics on matroids and the matroid intersection problem, we refer the reader to. Throughout the paper, for \(i=1,2\), let \({\mathbf{M}}_i=(E,{\mathcal{I}}_i)\) be loopless[^1] matroids on the same finite ground set \(E\) of size \(n\), whose **independent set families**, **rank functions**, and **closure operators** are denoted by \({\mathcal{I}}_i\), by \(r_i\), and by \(\mathrm{cl}_i\), respectively. For two sets \(X,Y\subseteq E\), we denote their **symmetric difference** by \(X\triangle Y=(X\setminus Y)\cup(Y\setminus X)\). The **\(k\)-truncation** of a matroid \({\mathbf{M}}=(S,{\mathcal{I}})\) is a matroid \(({\mathbf{M}})_{k}=(S,{\mathcal{I}}^{\le k})\) with \({\mathcal{I}}^{\le k}=\{\, X\in{\mathcal{I}} \mid |X|\leq k \,\}\). For \(I \in {\mathcal{I}}_i\) and \(x \in \mathrm{cl}_i(I) \setminus I\), the **fundamental circuit** of \(x\) with respect to \(I\) in \({\mathbf{M}}_i\) is denoted by \(C_i(I, x) = \{\, y \in I \mid I + x-y \in {\mathcal{I}}_i \,\}\). We consider four oracles for matroid intersection. Given a set \(X\subseteq E\) as an input, a **rank sum oracle** ([[Sum]{.smallcaps}]{.smallcaps}) answers the sum \({r_\mathrm{sum}}(X)\coloneqq r_1(X)+r_2(X)\) of the ranks of \(X\), a **minimum rank oracle** ([Min]{.smallcaps}) answers the minimum \({r_\mathrm{min}}(X)\coloneqq\min\left\{r_1(X),r_2(X)\right\}\) of the ranks of \(X\), a **maximum rank oracle** ([Max]{.smallcaps}) answers the maximum \({r_\mathrm{max}}(X)\coloneqq\max\left\{r_1(X),r_2(X)\right\}\) of the ranks of \(X\), and a **common independence oracle** ([CI]{.smallcaps}) answers *"Yes"* if \(X\in{\mathcal{I}}_1\cap{\mathcal{I}}_2\) and *"No"* otherwise. Let us first overview some basic results on unweighted matroid intersection. In, Edmonds gave the following characterization for the maximum cardinality of a common independent set of two matroids. The notion of exchangeability graphs plays a central role in any matroid intersection algorithm. Brualdi observed that the set \(A_i[I]\) satisfies the following property for \(i=1,2\). Krogdahl  proved a partial converse to the above lemma. Finally, let us recall that a standard algorithm for finding a maximum-cardinality common independent set is driven by the following subroutine (see ). For any digraph \(D=(E,A)\), a **path** in \(D\) is a sequence \(P=e_1e_2\cdots e_\ell\) of distinct vertices such that \((e_i,e_{i+1})\in A\) for each \(i=1,2,\dots,\ell-1\); we call \(P\) an **\(e_1\)--\(e_\ell\) path** or **an \(X\)--\(Y\) path** for sets \(X \ni e_1\) and \(Y \ni e_\ell\) to emphasize the end vertices, and define \(\ell\) as the **length**. A **cycle** in \(D\) is a sequence \(e_1e_2\cdots e_\ell e_1\) such that \(e_1e_2 \cdots e_\ell\) is a path and \((e_\ell, e_1)\in A\). We often identify a path or a cycle with its vertex set \(\{e_1, e_2,\dots,e_\ell\}\). Now we turn to the weighted setting. For a weight function \(w \colon E \to {\mathbb{R}}\) and a subset \(X \subseteq E\), define \(w(X) \coloneqq \sum_{e \in X} w(e)\). For a family \({\mathcal{F}} \subseteq 2^E\), a subset \(X \subseteq E\) is **\(w\)-maximal in \({\mathcal{F}}\)** if \(X \in \textrm{arg\,max}\left\{\, w(Y) \mid Y \in {\mathcal{F}} \,\right\}\). We define \({\mathcal{I}}_i^k \coloneqq \{\, X \in {\mathcal{I}}_i \mid |X| = k \,\}\) for \(i = 1, 2\) and \(k = 0, 1, \dots, n\). One approach to solve the weighted matroid intersection problem is via augmentation along cheapest paths in the exchangeability graph (see ), where the cost function \(c \colon E \to {\mathbb{R}}\) is defined on the vertex set as follows: \[\begin{aligned} \label{eq:cost} c(e) &\coloneqq \begin{cases} w(e) & \text{if \(e \in I\)},\\ -w(e) & \text{if \(e \in E \setminus I\)}. \end{cases} \end{aligned}\] For each path (or cycle) \(P\) in \(D[I]\), we define the **cost** of \(P\) as \(c(P) \coloneqq \sum_{e \in P}c(e)\). The next lemma characterizes \(w\)-maximal common independent sets in \({\mathcal{I}}^k_1\cap {\mathcal{I}}^k_2\). # Matroid Intersection under Rank Sum Oracle {#sec:rank_sum} In Algorithm [\[alg:2\]](#alg:2){reference-type="ref" reference="alg:2"}, we assume that we are given the independence oracles of matroids \({\mathbf{M}}_1\) and \({\mathbf{M}}_2\), which are polynomially equivalent to the oracles of rank functions \(r_1\) and \(r_2\), respectively. In this section, we consider the solvability of the weighted matroid intersection problem when only the *rank sum function* \({r_\mathrm{sum}} \colon 2^E \to {\mathbb{Z}}_{\geq 0}\) is available, that is, for any set \(X\subseteq E\) the oracle answers the value of \({r_\mathrm{sum}}(X) \coloneqq r_1(X)+r_2(X)\). Note that a subset \(I \subseteq E\) belongs to \({\mathcal{I}}_1\cap {\mathcal{I}}_2\) if and only if \({r_\mathrm{sum}}(I) = 2|I|\). However, when \({r_\mathrm{sum}}(I)<2|I|\), we cannot decide whether \(I\in {\mathcal{I}}_i\) or not for each \(i=1,2\). The matroid intersection problem under this oracle model is exactly a special case of the *polymatroid matching problem*, which is equivalent to the so-called *matroid matching (or parity) problem* . While a max-min duality theorem was given by Lovász  for the case when the matroids in question admit linear representations[^2], such a good characterization is not known in general even in the matroid intersection case. In what follows, we provide an algorithm for the weighted matroid intersection problem with the rank sum oracle. We consider emulating Algorithm [\[alg:2\]](#alg:2){reference-type="ref" reference="alg:2"}, i.e., CheapestPathAugment\([E, w, {\mathcal{I}}_1, {\mathcal{I}}_2, I]\). ## Searching a Shortest Cheapest Path Take any \(k \in \{0, 1, \dots, n-1\}\) and let \(I\) be a \(w\)-maximal set \({\mathcal{I}}_1^k \cap {\mathcal{I}}_2^k\). To emulate Algorithm [\[alg:2\]](#alg:2){reference-type="ref" reference="alg:2"}, we want to find a shortest cheapest \(S_I\)--\(T_I\) path in \(D[I] = (E \setminus I, I; A_1[I]\cup A_2[I])\) with respect to vertex cost \(c\colon E \to {\mathbb{R}}\) defined in Algorithm [\[alg:2\]](#alg:2){reference-type="ref" reference="alg:2"}. With only the rank sum oracle, however, we cannot determine the sets \(A_1[I]\), \(A_2[I]\), \(S_I\), and \(T_I\), and hence cannot simply emulate Algorithm [\[alg:2\]](#alg:2){reference-type="ref" reference="alg:2"}. We show that, despite this difficulty, we can compute a shortest cheapest \(S_I\)--\(T_I\) path in \(D[I]\). We first make some observations. Let \(D'[I]=(E \setminus I, I; A'_1[I]\cup A'_2[I])\) be the subgraph of \(D[I]\) obtained from \(D[I]\) by removing arcs entering \(S_I\) and leaving \(T_I\), i.e., \[\begin{aligned} A'_1[I] \coloneqq&\{\, (y, x) \mid x \in E \setminus (I \cup S_I),~y \in C_1(I, x) \,\},\\ A'_2[I] \coloneqq&\{\, (x, y) \mid x \in E \setminus (I \cup T_I),~y \in C_2(I, x) \,\}. \end{aligned}\] Note that each element in \(S_I\cap T_I\) is an isolated vertex in \(D'[I]\). Recall that \(D[I]\) has no negative cost cycle with respect to \(c\) by Lemma [\[lem:negative_cycle\]](#lem:negative_cycle){reference-type="ref" reference="lem:negative_cycle"}. This fact implies that finding a shortest cheapest \(S_I\)--\(T_I\) path in \(D[I]\) is equivalent to finding one in \(D'[I]\). While we cannot determine \(S_I\) and \(T_I\), we can determine \(S_I\cup T_I\) as \(S_I\cup T_I=\{\,s\in E\setminus I\mid {r_\mathrm{sum}}(I+s)\geq 2|I|+1\,\}\). We now provide a search algorithm with the rank sum oracle. Its description is given as Algorithm [\[alg:3\]](#alg:3){reference-type="ref" reference="alg:3"}. For any \(s\in S_I\) (resp., \(s\in T_I\)), it emulates the Bellman--Ford algorithm in \(D'[I]\) (resp., in the inverse of \(D'[I]\)) rooted at \(s\) without knowing \(D'[I]\) explicitly. Since there is no negative cost cycle in \(D'[I]\) by Lemma [\[lem:negative_cycle\]](#lem:negative_cycle){reference-type="ref" reference="lem:negative_cycle"}, the algorithm finds shortest cheapest paths from \(s\) to all reachable vertices, and it returns a shortest cheapest \(s\)--\(T_I\) path (resp., \(s\)--\(S_I\) path) if it exists. By applying this search algorithm for all \(s\in S_I\cup T_I\), we can obtain a shortest cheapest \(S_I\)--\(T_I\) path in \(D'[I]\), which is also a shortest cheapest path in \(D[I]\) by Lemma [\[lem:shortest-cheapest-path\]](#lem:shortest-cheapest-path){reference-type="ref" reference="lem:shortest-cheapest-path"}. For each \(e\in E\), the algorithm maintains a sequence \(P_e\) of distinct elements of \(E\). We will show that \(P_e\) is an \(s\)--\(e\) path in \(D'[I]\). For a sequence \(P_e\) and an element \(e'\in E\setminus P_e\), we denote by \(P_e+e'\) the sequence obtained by appending \(e'\) to \(P_e\). ## Correctness of the Search The following lemma shows an important property of Algorithm [\[alg:3\]](#alg:3){reference-type="ref" reference="alg:3"}, where we can assume that \(s\) belongs to \(S_I = \{\, s \in E \setminus I \mid I + s \in {\mathcal{I}}_1 \,\}\) by symmetry. (For \(s\in T_I = \{\, s \in E \setminus I \mid I + s \in {\mathcal{I}}_2 \,\}\), replace \(D'[I]\) with its inverse in the arguments.) We postpone the proofs of these claims and complete the proof of the lemma relying on them. For any \(e\in E\), let \(P^{\ell-1}_e\) and \(P^{\ell}_e\) be the sequence \(P_e\) just after the \((\ell-1)\)th and \(\ell\)th process, respectively. By induction, \(P^{\ell-1}_e\) is a shortest cheapest \(s\)--\(e\) path in \(D'[I]\) subject to \(|P_e|\leq \ell\). Let \(P^*_e\) be any shortest cheapest \(s\)--\(e\) path in \(D'[I]\) subject to \(|P^*_e|\leq \ell+1\). By the "only if" parts of Claims [\[claim:equivalence1\]](#claim:equivalence1){reference-type="ref" reference="claim:equivalence1"} and [\[claim:equivalence2\]](#claim:equivalence2){reference-type="ref" reference="claim:equivalence2"}, \(P^{\ell}_e\) is an \(s\)--\(e\) path in \(D'[I]\) with \(|P^{\ell}_e|\leq \ell+1\), and hence \(c(P^*_e)\leq c(P^{\ell}_e)\). Also, \(c(P^{\ell}_e)\leq c(P^{\ell-1}_e)\) by the algorithm. If \(c(P^*_e)=c(P^{\ell-1}_e)\), then \(P^{\ell}_e=P^{\ell-1}_e\) and the statement immediately follows. Otherwise, \(c(P^*_e)<c(P^{\ell-1}_e)\). This implies \(|P^*_e|=\ell+1\). Then \(e\in I\) if \(\ell\) is odd and \(e\in E\setminus I\) if \(e\) is even (recall that \(D'[I]\) is a bipartite digraph between \(E\setminus I\) and \(I\)). Let \(e'\) be the second last element in \(P^*_e\) and let \(P^*_{e'}:=P^*_{e}-e\) (i.e., delete \(e\) from \(P^*_e\)). Then \(P^*_{e'}\) is an \(s\)--\(e'\) path with \(|P_{e'}|=\ell\), and hence \(c(P^{\ell-1}_{e'})\leq c(P^*_{e'})\). So \(c(P^{\ell-1}_{e'}+e)\leq c(P^*_e)<c(P^{\ell-1}_e)\). If \(\ell\) is odd, then \((e',e)\in A'_2[I]\), and hence (\(\ast\)) holds with \(x:=e'\) and \(y:=e\) by Claim [\[claim:equivalence1\]](#claim:equivalence1){reference-type="ref" reference="claim:equivalence1"}. If \(\ell\) is even, then \((e',e)\in A'_1[I]\), and hence (\(\ast\ast\)) holds with \(y:=e'\) and \(x:=e\) by Claim [\[claim:equivalence2\]](#claim:equivalence2){reference-type="ref" reference="claim:equivalence2"}. In either case, we obtain \(c(P^\ell_e)\leq c(P^*_{e'}+e)=c(P^*_e)\) and \(|P^{\ell}_e|\leq \ell+1=|P^*_e|\). Hence \(P^\ell_e\) is a shortest cheapest \(s\)--\(e\) path subject to \(|P_e|\leq \ell+1\). ◻ Now we are ready to show Claims [\[claim:equivalence1\]](#claim:equivalence1){reference-type="ref" reference="claim:equivalence1"} and [\[claim:equivalence2\]](#claim:equivalence2){reference-type="ref" reference="claim:equivalence2"}. We sometimes denote by \(V(P)\) the set of elements in a sequence \(P\) for emphasizing that we focus on the set rather than the sequence. ## Matroid Intersection Algorithm under Rank Sum Oracle Using Algorithm [\[alg:3\]](#alg:3){reference-type="ref" reference="alg:3"} as a subroutine, we can emulate CheapestPathAugment\([E, w, {\mathcal{I}}_1, {\mathcal{I}}_2, I]\) as Algorithm [\[alg:4\]](#alg:4){reference-type="ref" reference="alg:4"}. The following theorem concludes the section. Lemma [\[lem:cpars\]](#lem:cpars){reference-type="ref" reference="lem:cpars"} completes the proof of Theorem [\[thm:ranksum\]](#thm:ranksum){reference-type="ref" reference="thm:ranksum"}. [^1]: The assumption that the matroids are loopless is not restrictive as loops can be easily detected by any of the oracles considered. [^2]: For the matroid intersection considered as a special case, the two matroids are necessarily representable over the same field.
{'timestamp': '2022-09-30T02:06:33', 'yymm': '2209', 'arxiv_id': '2209.14516', 'language': 'en', 'url': 'https://arxiv.org/abs/2209.14516'}
null
null
# Introduction {#Section1} With the rapid development of the Internet of Things (IoT) and \(5\)th Generation Mobile Communication (\(5\)G) technologies, the power supply and high-rate communication for electronic devices (e.g., sensors, cameras) have become well-known issues. Recently, to support novel applications in the IoT and 5G wireless networks, some studies have been conducted to implement self-sustainable communication systems with energy harvesting (EH) techniques. Compared with the currently available batteries and charged super-capacitors, EH can capture and convert wasted or important energy into electricity, which makes it possible to integrate energy sources into wireless networks. However, since the irregular and unforeseeable nature of ambient sources, the application of EH faces many limitations and applies only to specific environments. The wireless power transfer (WPT) technology is one of the novel EH technologies that can overcome the above limitations. Recent WPT technologies that have been widely used include near-field and far-field energy transmission. For near-field WPT, such as magnetic induction and magnetic resonance, watt-level power can be transferred within multi-centimeter-level distances using centimeter-sized transceivers. For far-field WPT, radio-frequency (RF) or laser can transfer milliwatt-level energy over meter-level distances under safety regulations. The prospect of integrating WPT into communication networks creates a demand for technology that can simultaneously transmit information and power to electronic devices. Thus, the concept of simultaneous wireless information and power transfer (SWIPT) was first introduced in with theoretical analysis. To realize long-range, high-power WPT and high-rate communication, the existing near-field and far-field SWIPT face the challenge of balancing distance, power, spectral efficiency, and safety. The latest SWIPT, resonant beam system (RBS), is firstly proposed in, where the end-to-end power transfer was theoretically and numerically studied, and the \(5\rm{m}\) distance was exhibited. The resonant beam (i.e. the intra-cavity laser) is used to transmit energy between the spatially separated transmitter and receiver. However, due to the resonant beam spot diffuses with the increase of transmission distance, the transmission loss grows with the extension of cavity length between the transmitter and the receiver. Afterwards, if the transmission distance keeps extending, the resonance condition in the RBS will be no longer satisfied (i.e. losses are greater than gain), so the energy transfer will be suspended, which will result in limited transmission distances. In this paper, we introduce an RBS with a telescope internal modulator (TIM), which can be called TIM-RBS. As shown in Fig. [\[Fig1\]](#Fig1){reference-type="ref" reference="Fig1"}(b), the telescope contains a concave mirror and a convex mirror, which has been used in the laser resonator for obtaining reliable operation of an Nd:YAG laser with a large-volume TEM\(_{00}\) mode in. Then, due to the telescope can reduce the size of the beam to increase the diffraction per unit length, Sarkies reported using a telescope in an Nd:YAG resonator allowing easily controllable adjustment to compensate thermal lensing under varied pumping conditions. In Fig. [\[Fig1\]](#Fig1){reference-type="ref" reference="Fig1"}(b), the resonant beam carrying energy is transmitted from the transmitter to the receiver through input reflector, gain medium, TIM, and output reflector in order while it passes through input reflector, gain medium, and output reflector in the RBS without TIM depicted in Fig. [\[Fig1\]](#Fig1){reference-type="ref" reference="Fig1"}(a). From and Fig. [\[Fig1\]](#Fig1){reference-type="ref" reference="Fig1"}, the main contribution of TIM is the compression of resonant beam spot, which brings small transmission losses and allows more beam energy to enter the gain medium for gain amplification, releasing more energy to be transmitted to the receiver for charging and communication. Thus, the transmission distance will increase with a higher power in the TIM-RBS. The contributions of this paper include: 1. We propose an accurate transmission model for the TIM-RBS, which combines the electromagnetic field propagation and E\(2\)E power transfer model and allows to obtain precise energy distribution on the optical plane, transmission efficiencies, and output power. 2. Using the proposed accurate transmission model, we visualise the process of beam spot compression and verify that the TIM-RBS can achieve longer range and higher power compared with the RBS without TIM. 3. The numerical evaluation shows that the TIM-RBS can realize SWIPT at a distance of two times longer than the RBS without TIM, and about \(34\rm{m}\) transmission distance, \(4\rm{W}\) electric power, and \(12\rm{bps/Hz}\) spectral efficiency can be achieved in the TIM-RBS with \(200\rm{W}\) input power. In the rest of this paper, the structure of the TIM-RBS, the effect of the TIM, and the E\(2\)E power transfer will be illustrated in Section II, the accurate transmission model including electromagnetic field propagation, E\(2\)E power transfer model, power and information reception will be proposed in Section III. Then, Section IV will depict the performance comparison of TIM-RBS and RBS without TIM and the power transfer evaluation of the TIM-RBS. Finally, the conclusion with future research of the TIM-RBS will be presented in Section V. # System Overview {#Section2} To realize long-range power and information transfer using resonant beam, the telescope internal modulator (TIM) is adopted in the RBS compressing the beam spot for decreasing transmission loss. In this section, we will illustrate the structure of the TIM-RBS and propose the power transfer model. ## TIM-RBS System The TIM-RBS shown in Fig. [\[Fig2\]](#Fig2){reference-type="ref" reference="Fig2"} incorporates spatially separated transmitter and receiver structures, with the lasing gain medium situated in the transmitter and the transmitter's output directed into the receiver. The implementation of a TIM-RBS comprises: i) a transmitter containing: a) a pumping source providing the input power for the system; b) an input reflector R\(1\) having high reflectivity, usually 100%; c) a gain medium offering sites for photon emission; d) a TIM compressing the resonant beam for decreasing the diffraction loss. ii) a receiver including: a) an output reflector R\(2\) with partial reflectivity; b) a power splitter (PS) dividing the received power into two power streams based on a certain PS ratio; c) a photovoltaic (PV) panel converting the received beam power into electric power for charging the battery; d) an avalanche photodiode (APD) converting the received beam power to electronic signals for communication. For a TIM-RBS, the transmitter can be located in a fixed position and properly sealed from dust and other contaminants, while the receiver is embedded in electronic devices for charging and communication. The resonant beam carrying the power transmits in the free space between the transmitter and the receiver. During the power transmission in the system, the resonant beam will pass through a series of optical apertures, e.g. input/output reflectors, gain medium. Since the limitations of optical aperture size, the transmission undergoes a series of diffraction losses. That is, in a resonant beam system, some part of the resonant beam will be lost either by spillover at the reflectors or by limiting apertures, such as the lateral boundaries of the gain medium. As shown in Fig. [\[Fig_diffractionloss\]](#Fig_diffractionloss){reference-type="ref" reference="Fig_diffractionloss"}, these losses depend on the diameter of the beam in the plane of the aperture and the aperture radius, the diffracted beam energy outside the effective aperture of the optical components (reflectors or gain medium) will be lost, thus generating diffraction loss. Thus, to decrease the diffraction loss during the resonant beam transmission, the diameter of resonant beam should be compressed. The role of the TIM in the system lies in compressing the resonant beam, reducing transmission losses, and improving transmission efficiency including extending transmission distance and improving output power. As displayed in Fig. [\[Fig_TIM\]](#Fig_TIM){reference-type="ref" reference="Fig_TIM"}, the TIM in the TIM-RBS comprises i) a concave lens with a focal length \(f_{\rm{d1}}\), and ii) a convex lens with a focal length \(f_{\rm{d2}}\), wherein the two lenses are placed parallel to each other and the focal points of them coincide. Then, the effective aperture of the gain medium is placed at the focal position, which allows the resonant beam with the smallest diameter to pass through the gain medium for amplification. ## End-to-End Power Transfer In the TIM-RBS, the energy is transformed into electricity and data through a series of conversions: i) power pumping, ii) power transfer including beam compression through the TIM and free-space transmission, iii) power output, and iv) beam power converting into electric power and communication resources. For power pumping, the electric power from the pumping source simulates the gain medium to excite the resonant beam. Firstly, the input electric power is converted into optical power. Then, the optical power is absorbed by the gain medium for realizing the population inversion. Finally, the inverted photons are spilled by the gain medium to form resonant beam. After the resonant beam is excited out of the gain medium, the TIM will shape its spot. When the resonant beam is transmitted forward (i.e. from the transmitter to the receiver) entering the TIM, the concave lens will perform the first phase conversion on it, so that the beam is transmitted to the focal point of the lens. Then, the beam passes through the convex lens and undergoes the second phase change. Conversely, if the resonant beam is transmitted from the receiver to the transmitter, the resonant beam will pass through the convex lens and the concave lens in the TIM successively, which causes the phase of the beam to be reversely adjusted, and the resonant beam is emitted with a smaller spot in parallel from the concave lens. Then, the resonant beam is transmitted from the transmitter to the receiver over the air. During the free-space transmission, the resonant beam will suffer a series of losses, such as dust and other contaminants, which will affect the end-to-end transmission efficiency. Afterwards, at the receiver, a portion of the resonant beam passes through the output reflector R\(2\) converting into the output beam power for charging and communication. Another part of the resonant beam is reflected to the transmitter for amplification in the gain medium. Overall, the energy carried by the resonant beam is transmitted from the transmitter to the receiver by the above transfer stages. # Transmission Model Theoretical Analysis {#Section3} The charging power and the communication resource at the receiver are decided by the input power and the transmission efficiency of each transfer stage. The linear equation between the input power \(P_{\rm{in}}\) and output power \(P_{\rm{out}}\) is \[\label{E2Epower} \begin{aligned} P_{\rm{out}} = (P_{\rm{in}}-P_{\rm{th}})\eta_{\rm{g}}\eta_{\rm{s}}\eta_{\rm{m}}\eta_{\rm{t}}(1-R_2), \end{aligned}\] where \(P_{\rm{th}}\) is the input power threshold of enabling beam oscillation, \(\eta_{\rm{g}}\) and \(\eta_{\rm{s}}\) denote the stimulation efficiency and the transfer factor of gain medium, \(\eta_{\rm{m}}\) represents the transmission efficiency in the telescope while \(\eta_{\rm{t}}\) is the resonant beam transmission efficiency over the free-space. Besides, \(R_2\) is the reflectivity of the output reflector. Among them, \(P_{\rm{th}}\), \(\eta_{\rm{g}}\) and \(\eta_{\rm{s}}\) are the parameters relying on the hardware, such as the gain medium, the cavity, while \(\eta_{\rm{m}}\) and \(\eta_{\rm{t}}\) depend on the power transfer process through each optical element including TIM, input and output reflector. To explore the transmission efficiency and the output power of the TIM-RBS, we adopt the electromagnetic field propagation inside the resonant cavity to obtain the steady distribution on the optical plane. ## Field Propagation inside the Cavity The finite size of the transfer aperture causes diffraction loss, and diffraction plays a major role in determining the spatial distribution of the oscillation energy. In the TIM-RBS, the resonant beam will be diffracted if it passes through a series of transfer apertures, e.g. reflectors, gain medium, and TIM. Therefore, the amplitude and phase would change, and there exist the diffraction loss during power transfer. As Fig. [\[Fig_Transfunction\]](#Fig_Transfunction){reference-type="ref" reference="Fig_Transfunction"}(a) illustrated, we set the center point of the gain medium as the coordinate origin, that is \(z=0\), and in which the \((x,y)\)-plane is perpendicular to the \(z\)-axis. Then, \(U(x,y,z)\) is the field mode distribution on the plane \((x,y)\) in \(z\). A round-trip field propagation in the resonant cavity can be depicted in an eigenfunction as \[\label{eq:transmissionengie} \gamma \mathbf{U} = \mathbf{T} \mathbf{U},\] where the eigenvalue \(\gamma\) is a complex constant related to the change in amplitude and phase. \(\mathbf{U}\) represents the field distribution on a plane \(U(x,y)\). \(\mathbf{T}\) is the transfer function of a round-trip transmission, which can be formulated as \(\mathbf{T}=\mathbf{T}_{\rm g}\mathbf{T}_{\rm m}\mathbf{T}_{\rm t}\mathbf{T}_{\rm r}\mathbf{T}_{\rm t}\mathbf{T}_{\rm m}\mathbf{T}_{\rm g}\mathbf{T}_{\rm r}\) as illustrated in Fig. [\[Fig_Transfunction\]](#Fig_Transfunction){reference-type="ref" reference="Fig_Transfunction"}(b). Among them, \(\mathbf{T}_{\rm g}\), \(\mathbf{T}_{\rm m}\), \(\mathbf{T}_{\rm t}\) and \(\mathbf{T}_{\rm r}\) are the transfer function through gain medium, TIM, free space between transmitter and receiver, and reflector. Besides, \(\mathbf{T}_{\rm m} = \mathbf{T}_{\rm ce}\mathbf{T}_{\rm cx}\) since the TIM comprises a concave lens and a convex lens (Fig. [\[Fig_Transfunction\]](#Fig_Transfunction){reference-type="ref" reference="Fig_Transfunction"}(b)). Using electromagnetic wave propagation theory, if the field distribution on the source wave plane \(U_1(x_1, y_1, z_1)\) is known, the field distribution on the observing plane \(U_2(x_2, y_2, z_2)\) can be calculated as \[\label{eq:planefield} U_2(x_2, y_2, z_2) = \iint_s U_1(x_1, y_1, z_1) T_{12}(x_1, y_1, x_2, y_2) ds,\] where \(s\) is the area of the source wave plane. \(T_{12}\) is the transfer function between the two planes, and it can be depicted as \[\label{eq:transfunction} T_{12} = \frac{i\exp{(-ikL)}}{\lambda L}\exp \left\{\frac{-ik}{2 L}\left[\left(x_{2}-x_{1}\right)^{2}+\left(y_{2}-y_{1}\right)^{2}\right]\right\},\] where \(i\) is the imaginary unit, \(L\) is the distance between the two planes, \(\lambda\) is the wavelength of resonant beam, and \(k = 2\pi/\lambda\) represents the wavenumber. Afterwards, if the beam passes through a lens, the phase and amplitude of beam field distribution are affected and changed. Here, we treat a lens as a diffraction screen, the complex amplitude transfer function of each lens can be given by \[\label{eq:transplane} \begin{aligned} t(x, y) &= A(x, y) P(x, y) \\ &= A(x,y) \exp{\left[-\frac{ik}{2f}(x^2 + y^2)\right]}, \end{aligned}\] where \(P(x, y)\) is the phase factor causing the phase changes, and \(f\) is the focal length of the lens. \(A(x, y)\) denotes the optical pupil function corresponding amplitude changes in the beam field, which is defined as \(1\) with the area within the aperture and \(0\) as the area is outside the aperture, i.e., \[\label{eq:pupilfunction} A(x, y) = \left\{ \begin{aligned} & 1,\ x^2 + y^2 \leq r^2 \\ & 0,\ x^2 + y^2 > r^2 \end{aligned} \right.\] where \(r\) is the radius of the aperture. Then, given the transfer function of the lens, the relationship between amplitude distribution on the front surface of lens \(U(x, y)\) and on the rear surface \(U'(x, y)\) (Fig. [\[Fig_lens_fox\]](#Fig_lens_fox){reference-type="ref" reference="Fig_lens_fox"}(a)) is \[\label{eq:frontandrear} U'(x, y) = U(x, y) t(x, y).\] For a round-trip power transfer in the TIM-RBS, the resonant beam passes through gain medium, TIM, output reflector, TIM, gain medium, and input reflector in sequence. To obtain the field distribution on the plane in the TIM-RBS, we adopt Fast-Fourier-Transform (FFT) method for a round-trip field propagation calculation. Based on [\[eq:transmissionengie\]](#eq:transmissionengie){reference-type="eqref" reference="eq:transmissionengie"}, [\[eq:planefield\]](#eq:planefield){reference-type="eqref" reference="eq:planefield"}, [\[eq:transfunction\]](#eq:transfunction){reference-type="eqref" reference="eq:transfunction"}, [\[eq:transplane\]](#eq:transplane){reference-type="eqref" reference="eq:transplane"}, and [\[eq:frontandrear\]](#eq:frontandrear){reference-type="eqref" reference="eq:frontandrear"}, the field propagation from the front surface \(s_1\) of an optical element \(E_1\) to the front surface \(s_2\) of another optical element \(E_2\) can be expressed as \[\label{eq:S1s2} \begin{aligned} U_2(x,y) &= \mathbf{T}_{12} \mathbf{U} \\ &= \mathscr{F}^{-1}\left\{\mathscr{F}\{U_1(x,y) t_{1}(x,y)\} \mathscr{F}\{T_{12}(x,y)\}\right\}, \end{aligned}\] where \(U_1(x,y)\) and \(U_2(x,y)\) are the field distribution on the front surface of the optical element \(E_1\) and \(E_2\), \(t_{1}(x,y)\) is the field transfer function from the front surface to the rear surface of \(E_1\), and \(T_{12}\) denotes the transfer function from \(E_1\) to \(E_2\) and can be depicted as \[\label{eq:TransfunCal2} \begin{aligned} T_{12}(x,y) = \frac{j \exp{(-j k L)}}{\lambda L} \exp{ \left[\frac{-j k}{2 L}\left(x^{2}+y^{2}\right)\right]}, \end{aligned}\] with the distance \(L\) between \(E_1\) and \(E_2\). Therefore, the field distribution on the input reflector after a round-trip transmission can be calculated by \(\mathbf{T}_{\rm g}\mathbf{U}\), \(\mathbf{T}_{\rm{ce}}\mathbf{U}\), \(\mathbf{T}_{\rm{cx}}\mathbf{U}\), \(\mathbf{T}_{\rm{t}}\mathbf{U}\), \(\mathbf{T}_{\rm{r}}\mathbf{U}\), \(\mathbf{T}_{\rm{t}}\mathbf{U}\), \(\mathbf{T}_{\rm{cx}}\mathbf{U}\), \(\mathbf{T}_{\rm{ce}}\mathbf{U}\), \(\mathbf{T}_{\rm g}\mathbf{U}\), and \(\mathbf{T}_{\rm{r}}\mathbf{U}\) in order. Combining electromagnetic field propagation theory and FFT method, the field distribution on any plane during a round-trip transfer can be obtained. As shown in Fig. [\[Fig_lens_fox\]](#Fig_lens_fox){reference-type="ref" reference="Fig_lens_fox"} (b), after several round-trip transmissions, the field distribution on a plane can achieve a stable mode, i.e., self-reproductive mode, whose amplitude and phase will not vary after the next transition. To solve [\[eq:transmissionengie\]](#eq:transmissionengie){reference-type="eqref" reference="eq:transmissionengie"} and obtain the self-reproductive mode, we adopt the "Fox-Li\" iteration algorithm to simulate the multiple round trips. A round-trip intra-cavity power transfer can be considered as the resonant beam passing through a series of apertures (reflector, gain medium, TIM) (Fig. [\[Fig_Transfunction\]](#Fig_Transfunction){reference-type="ref" reference="Fig_Transfunction"}(a)), and one iterative process in "Fox-Li\" is equivalent to a round-trip power transfer. If a certain number of iterations are implemented, the field distribution on a plane no longer changes during transmission, the stable mode is achieved, and eventually, the self-reproductive mode is obtained (Fig. [\[Fig_lens_fox\]](#Fig_lens_fox){reference-type="ref" reference="Fig_lens_fox"}(b)). After the self-reproductive mode achieved in the TIM-RBS, the transmission loss between the two planes \(s_1\), \(s_2\) of the optical element \(E_1\) and \(E_2\) can be calculated as \[\label{eq:transmissionloss} \delta_{12} = \frac{\iint_{s_1}|U_1(x_1, y_1)|^2ds_1-\iint_{s_2}|U_{2}(x_{2}, y_{2})|^2ds_{2}}{\iint_{s_1}|U_1(x_1, y_1|^2ds_1},\] where \(|U|^2\) denotes the power intensity on the plane, while the power on the plane can be obtained by double integration of power intensity \(\iint|U|^2\). Afterwards, the transmission efficiency between the two planes can be depicted as \[\label{eq:transmissioneff} \begin{aligned} \eta_{12} & = 1-\delta_{12} \\ & = \frac{\iint_{s_2}|U_{2}(x_{2}, y_{2})|^2ds_{2}}{\iint_{s_1}|U_1(x_1, y_1)|^2ds_1}. \end{aligned}\] Hence, the transmission efficiency between any two planes can be obtained based on the electromagnetic field propagation. ## End-to-End Power Transfer According to the output power of stable resonators, during a round-trip forward and backward traveling, the beam intensity is decreased due to diffraction losses (transfer factors \(\eta_1\)-\(\eta_4\)), absorption inside the gain medium (transfer factor \(\eta_{\rm s}\)), and by output coupling (the reflectivity of the output reflector \(R_2\)). In the steady-state operation, these losses are compensated by the amplification process in the gain medium (\(\eta_{\rm g}\)) characterized by the small-signal gain coefficient \(g_0\). If the transfer factors (i.e. transfer efficiencies) and the small-signal gain coefficient \(g_0\) are known, and the cross-sectional area of the beam is \(A_{\rm b}\), the output beam power is given by \[\label{eq:outputpower} \begin{aligned} P_{\text {out }} &= A_{\rm b} I (1-R_2) \eta_{\rm m} \eta_2 \\ &= A_{\rm b} I_{\rm s} \frac{(1-R_2) \eta_{\rm m} \eta_{2}}{1-R_2 \eta_{\rm m}^2 \eta_{2} \eta_{3}+\sqrt{R_2 \eta_{\rm m}^2 \eta_{\rm t}}\left[1 /\left(\eta_{1} \eta_{\rm{s}} \eta_{\rm m} \eta_{2} \right)-\eta_{\rm{s}}\right]} \\ &\ \ \ \ \left[ g_{0} \ell-\left| \ln \sqrt{R_2 \eta_{\rm{s}}^{2} \eta_{\rm m}^2 \eta_{\rm t}} \right| \right] \end{aligned}\] where \(I_{\rm s}\) is the saturated beam intensity of gain medium. As shown in Fig. [\[Fig_transeff\]](#Fig_transeff){reference-type="ref" reference="Fig_transeff"}, \(\eta_{\rm m}\) is the transfer efficiency of the TIM, which can be calculated by multiplying the transfer efficiencies of the gain medium to the concave lens and the concave lens to the convex lens as \(\eta_{\rm m} = \eta_{\rm ce} \eta_{\rm cx}\). The transmission efficiency \(\eta_{\rm t} = \eta_1 \eta_2 \eta_3 \eta_4\) with \(\eta_1\), \(\eta_2\), \(\eta_3\) and \(\eta_4\) representing the forward and backward transfer efficiency between the input reflector and the gain medium, the TIM and the output reflector, respectively. Moreover, all the transmission efficiency can be calculated through [\[eq:transmissioneff\]](#eq:transmissioneff){reference-type="eqref" reference="eq:transmissioneff"} with the field distribution on the two planes accurately. Additionally, based on [\[E2Epower\]](#E2Epower){reference-type="eqref" reference="E2Epower"} and [\[eq:outputpower\]](#eq:outputpower){reference-type="eqref" reference="eq:outputpower"}, to pump the resonant beam, the input power \(P_{\rm{in}}\) is firstly converted into the stored power in the gain medium for stimulating the resonant beam with the efficiency \(\eta_{\rm g}\), which can be expressed as \[\label{eq:gaineff} \begin{aligned} \eta_{\rm{g}} =\frac{AI_{\rm s}g_0\ell}{P_{\rm{in}}}, \end{aligned}\] where \(A\) is the cross-sectional area of gain medium. Besides, to obtain the beam oscillation, the laser threshold condition should be satisfied. That is, the input power \(P_{\rm{in}}\) needs to be greater than the pumping power threshold \(P_{\rm{th}}\) \[\label{eq:powerthreshold} \begin{aligned} P_{\rm{th}} = \frac{A I_{\rm s} \left| \ln \sqrt{R_2 \eta_{\rm{s}}^{2} \eta_{\rm m}^2 \eta_{\rm t}} \right|}{\eta_{\rm{g}}}. \end{aligned}\] Thus, in the TIM-RBS, the transmission efficiency calculation and the E\(2\)E power transfer analysis enable the receiver to obtain the output power with different parameters. ## Power Harvesting and Information Receiving At the receiver, the power splitter (PS) divides the received power into two power streams of different levels with a certain PS ratio. Afterwards, both power streams are transmitted to an energy harvester and an information decoder to achieve simultaneous power harvesting and information decoding. The information rate and the harvested energy can be balanced and optimized according to the system requirements by varying the PS ratio. Let \(\theta\) denote the PS ratio for the receiver. The PV panel is responsible for converting beam power received by the receiver into electrical power, while the APD converts the light beam into electronic signals for communication. For power harvesting, the equivalent circuit of the single-diode model for PV panel is shown in Fig. [\[Fig_pv\]](#Fig_pv){reference-type="ref" reference="Fig_pv"}. The meaning of the five parameters for the PV model is illustrated as follows: \(I_{\rm{ph}}\) represents the photo-generated current, which depends on the input beam power of the PV panel and can be depicted as \[\label{current} \begin{aligned} I_{\rm{ph}} = \theta \eta_{\rm{pv}} P_{\rm{out}}, \end{aligned}\] where \(\eta_{\rm{pv}}\) is the conversion responsivity of the PV panel. \(I_{\rm o}\) is the dark saturation current, \(R_{\rm s}\) is the panel resistance, \(R_{\rm{sh}}\) is panel parallel (shunt) resistance, and \(D\) is the diode quality (ideality) factor. Afterwards, the general current-voltage characteristic of a PV panel based on the single exponential model can be expressed as \[\label{PV} \begin{aligned} i_{\rm{pv}} = I_{\rm{ph}}-I_{\rm o} \left\{\exp{\left[\frac{(v_{\rm{pv}} + i_{\rm{pv}} R_{\rm s})q}{n_{\rm s} D K T}\right]}-1\right\}-\frac{v_{\rm{pv}} + i_{\rm{pv}} R_{\rm s}}{R_{\rm{sh}}}, \end{aligned}\] where \(i_{\rm{pv}}\) and \(v_{\rm{pv}}\) are the output current and voltage of the PV panel, and the output electric power through the PV panel can be calculated as \[\label{outelepower} \begin{aligned} P_{\rm e} &= i_{\rm{pv}} v_{\rm{pv}} = i_{\rm{pv}}^2 R_{\rm{pv}}, \end{aligned}\] where \(R_{\rm{pv}}\) denotes the load resistance of the PV panel. Additionally, the constants in [\[PV\]](#PV){reference-type="eqref" reference="PV"} include Boltzmann's constant \(K\), the charge of electron \(q\), the number of cells in the panel connected in series \(n_{\rm s}\), and the temperature in Kelvin \(T\). For information receiving, the power stream received by APD is \[\label{powerapd} \begin{aligned} P_{\rm{apd}} = (1-\theta) P_{\rm{out}}. \end{aligned}\] Then, the spectral efficiency, also known as information transfer rate, can be expressed as \[\label{SE} \begin{aligned} C = \frac{1}{2}\log \left( 1+ \frac{S}{N}\frac{e}{2 \pi} \right), \end{aligned}\] where \(S\) is the signal power while \(N\) is the noise power. Thereby, \(S/N\) denotes the signal-to-noise ratio (SNR). Additionally, \(S\) relies on the output beam power \[\label{SP} \begin{aligned} S = \left(P_{\rm{apd}}\eta_{\rm{apd}}\right)^2, \end{aligned}\] where \(\eta_{\rm{apd}}\) is the photo-electric conversion efficiency of APD. \(N\) is the additive Gaussian white noise (AGWN) power and can be calculated as \[\label{NP} \begin{aligned} N & = 2q \left(P_{\rm{apd}}\eta_{\rm{apd}} + I_{\rm{bc}} \right) B_{\rm n} + \frac{4KTB_{\rm n}}{R_{\rm{apd}}}, \end{aligned}\] where \(I_{\rm{bc}}\) is the background current, \(B_{\rm n}\) is the noise bandwidth, and \(R_{\rm{apd}}\) is the load resistor of the APD. The meanings of \(q\), \(K\), and \(T\) are similar to them in [\[PV\]](#PV){reference-type="eqref" reference="PV"}. In summary, based on the output beam power in the TIM-RBS, the electric power and communication rate in the receiver can be obtained through [\[outelepower\]](#outelepower){reference-type="eqref" reference="outelepower"} and [\[SE\]](#SE){reference-type="eqref" reference="SE"}. # Numerical Evaluation {#Section4} To demonstrate the validity of the proposed transfer model in the TIM-RBS including the field propagation and the E\(2\)E power transfer, we will simulate the field distribution on the optical planes, the beam radius, the transmission efficiency, and the output power in this section. ## Parameters Setting The parameters of the TIM-RBS system are depicted in Table [1](#table1){reference-type="ref" reference="table1"}. Among them, the input and output reflectors are plane mirrors. The Nd:YVO\(_4\) is adopted as the gain medium, whose radius is less than or equal to that of the reflectors. . By using the PV equivalent circuit fitting measured data of a real PV cell product, we obtain the parameters of the vertical multi-junction PV cell, which are shown in Table [2](#table2){reference-type="ref" reference="table2"}. Additionally, the parameter of the APD \(\eta_{\rm{apd}}\) is from the experimental results using APD for information decoding. Furthermore, other parameters related to the information receiving including \(B_{\rm n}\), \(I_{\rm{bc}}\), and \(R_{\rm{apd}}\) are extracted from the literature. ## Comparison of Field Distribution Based on [\[eq:planefield\]](#eq:planefield){reference-type="eqref" reference="eq:planefield"}-[\[eq:TransfunCal2\]](#eq:TransfunCal2){reference-type="eqref" reference="eq:TransfunCal2"}, the field distribution \(U\) on the planes of the optical elements can be accurately obtained. Then, the beam intensity on the planes can be calculated by \(|U|^2\). To observe the change of field distribution during a round-trip transmission and compare the compression effect of beam spot with and without TIM, we illustrate the normalized beam intensity distribution of TIM-RBS and RBS without TIM under the same radii of the input/output reflectors and gain medium with \(10\rm{m}\) transmission distance in Figs. [\[Fig_field_TIM\]](#Fig_field_TIM){reference-type="ref" reference="Fig_field_TIM"} and [\[Fig_Field_no\]](#Fig_Field_no){reference-type="ref" reference="Fig_Field_no"} respectively. During a round trip, the resonant beam passes through the gain medium, TIM, output reflector, TIM, gain medium and input reflector in turn in the TIM-RBS, while it is transmitted through the gain medium, output reflector, gain medium, and input reflector in the RBS without TIM. After the resonance in the system has achieved a steady state, that is the self-reproductive mode of resonant beam has been obtained, we study the normalized beam intensity distribution in the TIM-RBS and the RBS without TIM. Fig. [\[Fig_field_TIM\]](#Fig_field_TIM){reference-type="ref" reference="Fig_field_TIM"}(a)-(d) shows the beam intensity distribution on the gain medium, output reflector, gain medium, and the input reflector in the TIM-RBS. From the gain medium to the output reflector (Fig. [\[Fig_field_TIM\]](#Fig_field_TIM){reference-type="ref" reference="Fig_field_TIM"}(a)-(b)), the cross-sectional area of resonant beam increases because the resonant beam spreads when it travels in free space. Then, since the spot compression effect of the TIM, the cross-sectional area of the resonant beam reduces from the output reflector to the gain medium (Fig. [\[Fig_field_TIM\]](#Fig_field_TIM){reference-type="ref" reference="Fig_field_TIM"}(b)-(c)). Finally, the resonant beam is focused onto the input reflector due to the function of the gain medium with convex lens properties (Fig. [\[Fig_field_TIM\]](#Fig_field_TIM){reference-type="ref" reference="Fig_field_TIM"}(c)-(d)). Similarly, Fig. [\[Fig_Field_no\]](#Fig_Field_no){reference-type="ref" reference="Fig_Field_no"}(a)-(d) depicts the normalized beam intensity distribution on the gain medium, output reflector, gain medium, and input reflector during a round-trip transmission in the RBS without TIM. The variation of the resonant beam spot transmitting from the gain medium to the output reflector (Fig. [\[Fig_Field_no\]](#Fig_Field_no){reference-type="ref" reference="Fig_Field_no"}(a)-(b)) and from the gain medium to the input reflector (Fig. [\[Fig_Field_no\]](#Fig_Field_no){reference-type="ref" reference="Fig_Field_no"}(c)-(d)) is identical to that in the TIM-RBS. Differently, since there isn't the TIM between the transmitter and the receiver, the transmission from the output reflector to the gain medium without spot compression, the spot of resonant beam transmitted from the output reflector to the gain medium remains almost unchanged (Fig. [\[Fig_Field_no\]](#Fig_Field_no){reference-type="ref" reference="Fig_Field_no"}(b)-(c)). Therefore, the TIM in the TIM-RBS can compress the resonant beam spot during the transmission. Thus, the transmission loss in the TIM-RBS can be reduced, and finally, the transmission distance can be extended while the transmission power is able to be improved. ## Comparison of Power Transfer performance The TIM can suppress the transmission loss by compressing the resonant beam spot in the TIM-RBS. To illustrate the advantages of the TIM-RBS, we compare the radius of resonant beam on the gain medium (i.e. the radius at which the amplitude on the gain medium is \(20\%\) of its peak value), the transmission efficiency, and the output beam power in the TIM-RBS and the RBS without TIM. Here, we analyze the power transfer performance in the TIM-RBS and RBS without TIM with \(200\rm{W}\) input power \(P_{\rm{in}}\) and \(1.5\rm{mm}\) gain medium radius for comparison. Under the maximum transmission distance of \(20\rm{m}\), the changes of resonant beam radius on gain medium \(r_{\rm b}\) and transmission efficiency \(\eta\) with the transmission distance \(D_{\rm t}\) in the TIM-RBS and the RBS without TIM are shown in Fig. [\[Fig_TIM_no_eff_radius\]](#Fig_TIM_no_eff_radius){reference-type="ref" reference="Fig_TIM_no_eff_radius"}. ### For the resonant beam radius Firstly, due to the diffusion effect of the resonant beam, the resonant beam radius increases as the transmission distance \(D_{\rm t}\) extends in the two systems. Besides, under the same transmission distance \(D_{\rm t}\), the resonant beam radius on the gain medium in the TIM-RBS is less than that in the RBS without TIM. Moreover, the radius of resonant beam in RBS without TIM can increase to the same size as the gain medium if the transmission distance increases to \(4\rm{m}\). For example, if \(D_{\rm t}\) is \(10\rm{m}\), \(r_{\rm b}\) in the TIM-RBS is about \(1.3\rm{mm}\) while it is about \(1.5\rm{mm}\) in the RBS without TIM. ### For the transmission efficiency Since the resonant beam radius increases with the extension of the transmission, the diffraction loss increases as the transmission increases. Thus, the transmission efficiency \(\eta\) during a round trip (i.e., \(\eta=\eta_{\rm t}\eta_{\rm m}^2\)) decreases if the transmission distance grows. Moreover, the transmission efficiency in the TIM-RBS is greater than that in the RBS without TIM regardless of the transmission distance. If \(D_{\rm t}\) is \(10\rm{m}\), the transmission efficiency is \(44\rm{\%}\) in the TIM-RBS and \(14\rm{\%}\) in the RBS without TIM, respectively. Additionally, the variation of output beam power \(P_{\rm{out}}\) of the TIM-RBS and the RBS without TIM with \(200\rm{W}\) input power \(P_{\rm{in}}\) is depicted in Fig. [\[Fig_power_TIM_no\]](#Fig_power_TIM_no){reference-type="ref" reference="Fig_power_TIM_no"}. From Fig. [\[Fig_power_TIM_no\]](#Fig_power_TIM_no){reference-type="ref" reference="Fig_power_TIM_no"}, the increase in transmission distance causes a decrease in output beam power due to the decrease of transmission efficiency. Besides, the largest transmission distance of the TIM-RBS is \(35\rm{m}\) while it is \(20\rm{m}\) of the RBS without TIM. Moreover, if the transmission distance is \(1\rm{m}\), the output power in the TIM-RBS is less than that in the RBS without TIM due to the large beam spot (\(A_{\rm b}=\pi r_{\rm b}^2\)) and the similar transmission efficiency. Conversely, the output beam power in the TIM-RBS is greater than that in the RBS without TIM as the transmission distance is larger than \(1\rm{m}\) and equal. For instance, if \(D_{\rm t}\) is \(10\rm{m}\), the output power is \(15.30\rm{W}\) and \(8.07\rm{W}\) in the TIM-RBS and the RBS without TIM, respectively. In general, since the beam spot compression of the TIM, the diffraction loss is suppressed in the TIM-RBS. Thus, the power transfer performance in the TIM-RBS is superior to the RBS without TIM, which can be illustrated in higher output power and longer transmission distance. ## Power Transfer performance in TIM-RBS For the TIM-RBS, the output beam power can be obtained based on [\[eq:outputpower\]](#eq:outputpower){reference-type="eqref" reference="eq:outputpower"} with the determined input power \(P_{\rm{in}}\). To analyze the power transfer performance of the TIM-RBS, we firstly explore the output beam power with different input power, and then study the output electric power and spectral efficiency with various PS ratios. Firstly, if the input power \(P_{\rm{in}}\) is \(100\rm{W}\), \(200\rm{W}\) and \(300\rm{W}\), the output beam power \(P_{\rm{out}}\) obtained from [\[eq:outputpower\]](#eq:outputpower){reference-type="eqref" reference="eq:outputpower"} with the parameters in Table [1](#table1){reference-type="ref" reference="table1"} is drawn in Fig. [\[Fig_outpower_diffin\]](#Fig_outpower_diffin){reference-type="ref" reference="Fig_outpower_diffin"}. From Fig. [\[Fig_outpower_diffin\]](#Fig_outpower_diffin){reference-type="ref" reference="Fig_outpower_diffin"}, the growth of the transmission distance \(D_{\rm t}\) brings the decrease of the output beam power \(P_{\rm{out}}\). If the input power is \(300\rm{W}\), the output beam power is \(23.87\rm{W}\), \(8.91\rm{W}\), and \(3.36\rm{W}\) with \(10\rm{m}\), \(20\rm{m}\), and \(30\rm{m}\) transmission distance. Then, the output beam power increases as the input power increases under the same transmission distance. For example, \(P_{\rm{out}}\) is \(2.62\rm{W}\), \(13.25\rm{W}\), and \(23.87\rm{W}\) if \(D_{\rm t}\) is \(10\rm{m}\) and \(P_{\rm{in}}\) is \(100\rm{W}\), \(200\rm{W}\), and \(300\rm{W}\). Moreover, the maximum transmission distance varies if the input power is different. That is, the maximum transmission distance extends as the input power increases. The maximum transmission distances are \(15\rm{m}\), \(34\rm{m}\) and \(58\rm{m}\) with the \(100\rm{W}\), \(200\rm{W}\) and \(300\rm{W}\) input power. Additionally, the output electric power and the communication spectral efficiency (i.e. data rate) can be calculated by [\[outelepower\]](#outelepower){reference-type="eqref" reference="outelepower"} and [\[SE\]](#SE){reference-type="eqref" reference="SE"} with the known output beam power. If the input power \(P_{\rm{in}}\) is \(200\rm{W}\), under different transmission distance \(D_{\rm t}\), the output electric power \(P_{\rm e}\) and the spectral efficiency \(C\) with various PS ratio \(\theta\) are depicted in Fig. [\[Fig_comm_charging\]](#Fig_comm_charging){reference-type="ref" reference="Fig_comm_charging"}. Since the output beam power decreases with the extension of the transmission distance, and \(P_{\rm e}\) and \(C\) are proportional to the output beam power, the output electric power and spectral efficiency decrease as the transmission distance increases regardless of the PS ratio. Besides, the output electric power increases with the growth of PS ratio, while the spectral efficiency decreases as the PS ratio increases under the same transmission distance. This is because that the PS ratio determines the distribution proportion of the output beam power, i.e., if \(\theta\) is \(0.5\), \(50\rm{\%}\) of the output beam power is converted into the output electric power and the rest is transformed into the communication resources. Under the \(10\rm{m}\) transmission distance, the output electric power is \(0.41\rm{W}\) and the spectral efficiency is \(11.47\rm{bps/Hz}\) with \(0.3\) PS ratio while they are \(2.10\rm{W}\) and \(11.05\rm{bps/Hz}\) as the PS ratio is \(0.7\). Moreover, the maximum electric power and spectral efficiency are about \(4\rm{W}\) and \(12\rm{bps/Hz}\) if the input power is \(200\rm{W}\). In summary, based on the electromagnetic field propagation and power transfer model in the TIM-RBS, the output beam power, electric power, and spectral efficiency can be calculated accurately, and they all decrease as the transmission distance extends. Moreover, the maximum transmission distance (i.e. cavity length) increases with the growth of input power. # Conclusions {#Section5} In this paper, we proposed an accurate transmission model based on the electromagnetic field propagation and E\(2\)E power transfer for TIM-RBS. Then, we evaluated the power transfer performance of the TIM-RBS by comparing it with the RBS without TIM and analyzing the output beam/electric power and spectral efficiency. Comparing the normalized beam intensity distribution and the beam radius in the TIM-RBS and RBS without TIM, we concluded that the TIM plays an important role in compressing the beam spot. Then, the comparisons of transmission efficiency and output beam power shown that the power transfer performance in TIM-RBS is better than that in the RBS without TIM. Additionally, the power transfer performance of the TIM-RBS is related to the input power and transmission distance. The maximum transmission distance is \(59\rm{m}\) with \(300\rm{W}\) input power, and maximum output electric power and spectral efficiency are about \(4\rm{W}\) and \(12\rm{bps/Hz}\) if the input power is \(200\rm{W}\). Hence, the TIM-RBS can realize longer-range SWIPT. However, some problems in the TIM-RBS need to be solved in future research, including i) proof of safety in the system, ii) power transfer performance in the TIM-RBS with different radii of input/output reflector and gain medium, and iii) experimental validation of the TIM-RBS.
{'timestamp': '2022-09-30T02:07:15', 'yymm': '2209', 'arxiv_id': '2209.14539', 'language': 'en', 'url': 'https://arxiv.org/abs/2209.14539'}
null
null
# Introduction {#sec:intro} About \(13\) million people in Bangladesh are suffering from different degrees of hearing loss, of which \(3\) million have hearing disability . There are around \(1\) million using Bangladeshi Sign Language (BdSL) in their everyday life. While communicating with a signer, there are two major tasks for a non-signer: *(i)* understanding the signs and *(ii)* expressing the signs. Researchers made impressive contributions to task *(i)* by developing sign letters[^1] recognition techniques from images (Fig. [\[fig:teaser\]](#fig:teaser){reference-type="ref" reference="fig:teaser"} ![image](crc1.png)). Several works has been proposed for BdSL letters classification via machine learning techniques . Task *(ii)* still has less research attention since it is a difficult process for non-signers. A naive and tiresome approach to expressing signs is to use flashcards with signs and symbols. Being inspired by that,  proposed a system that generates symbols of signs using generative adversarial networks (GANs) . However, their work only produces symbols of signs---which may raise questions regarding the necessity of such a system. Another way is by using animated avatars of signs, i.e. ; but there is no such system for BdSL. Moreover, an avatar-based system does not provide a realistic environment for communication. All the above scenarios inspired us to make task *(ii)* more realistic yet effortless. Hence, we introduced ***PerSign**: Personalized Bangladeshi Sign Letters Synthesis* which converts the image of a user into an image showing signs while keeping the person's profile unchanged. Fig. [\[fig:teaser\]](#fig:teaser){reference-type="ref" reference="fig:teaser"} ![image](crc2.png) explains the working pipeline of our prototype. A user first uploads their profile photo (\(I_P\)) only once to our system. The \(I_P\) must follow a specific rule of showing hand and palm (as shown in ![image](crc2.png)\(^{a}\)). After that, the user inserts the desired letter (\(L\)) to be expressed (e.g. ![image](Ga.png) in ![image](crc2.png)\(^{b}\)). Our system converts \(I_P\) into \(I_L\) by considering \(L\). This can be seen as \(I_L \leftarrow I_P+L\), where \(I_L\) contains the same person in \(I_P\) with unchanged face, skin tone, attire, and background (![image](crc2.png)\(^{c}\)). In that case, the person does not need any expertise in sign language. We believe, a signer will feel a natural environment if \(I_L\) is shown, thus, making the communication more realistic and affectionate. ***Do we really need such a system?***---in order to address this question, we performed a survey on a group of \(6\) guardians and \(11\) teachers of deaf children---who were also signers---regarding the necessity of our system. We let participants upload profile images to *PerSign* and asked them to rate the results on a scale of 1⃝ to 5⃝ according to *Likert* rating method , with 1⃝ being *not necessary at all* and 5⃝ being *very necessary*. Out of total \(17\) participants, \(13\) and \(3\) rated *PerSign* with 5⃝ and 4⃝ respectively with an average rating of \(4.705\). Most of the sign language teachers commented that *personalized* signs are very helpful for general people to get closer to signers, especially when it comes to children. # Implementation We employed the *Generative Adversarial Network* (Fig. [\[fig:teaser\]](#fig:teaser){reference-type="ref" reference="fig:teaser"} ![image](crc3.png)), an unsupervised deep learning technique that automatically learns the patterns from datasets in order for the model to produce a new output . Our problem lies under a sub-domain of GAN which *image-to-image translation*  and we adopted *GestureGAN* ---a gesture-to-gesture translation method---to implement a prototype system. For this purpose, we built a dataset of images with hand gestures of arbitrary poses, sizes, and backgrounds. Since we needed a paired dataset \(\{I_P, I_L\}\) we could not reuse any of the existing unpaired ones. For localizing gestures and appearances, we exploited *OpenPose*  to make the skeleton of the hands and face of the images and store the pair of input and output images. We then trained and tested the *GestureGAN* model with our dataset, and constructed our system's working prototype. Fig. [\[fig:res\]](#fig:res){reference-type="ref" reference="fig:res"} presents more results of *PerSign*. # Conclusion and Future work In this poster, we proposed a framework---*PerSign*---for synthesizing Bangladeshi Sign Letters that can be *personalized*. Through our method, anyone will be able to communicate as a signer without having any expertise in BdSL. We built our own dataset and exploited *GestureGAN* method to accomplish the task. Our work is still in progress and we gathered comments from the participants during the survey to find areas for improvement. Most of the users recommended applying the technique for a sequence of images to render video for a stream of input letters. We can achieve better results by increasing the number of diverse examples in our dataset. Though our dataset has samples for all BdSL letters, some specific letters need to be treated carefully because of their similarities in patterns. Our final aim is to merge task (*i*) and (*ii*) into a single system to provide an *one-stop solution* for two-way communication. Some of the users also suggested extending our work for full gestures, rather than letters only. We are also intent on implementing better *GUI* with voice input. Last but not the least, we plan to conduct a thorough evaluation from experts and signers. We believe, this poster opens new avenues in sign language for further research. [^1]: signs that represent letters only.
{'timestamp': '2022-09-30T02:08:42', 'yymm': '2209', 'arxiv_id': '2209.14591', 'language': 'en', 'url': 'https://arxiv.org/abs/2209.14591'}
null
null
null
null
# Introduction The fundamental goal of machine learning algorithms is to identify the conditional distribution given any input and its label. In the training phase, it's conventional to assume that the underlying classifier or function belongs to a certain class of functions. Therefore presuming that the approximation error is insignificant would be a necessary practice. This practice allows the training to emphasize on what is more practical to reduce the estimation error, which is the major error a classifier develops due to incomplete data training. The estimation error can be further decomposed into optimization and generalization errors, which are greatly complementary. Convexity, strong convexity, smoothness, and other features of the objective function (loss function) influence the optimization error. Furthermore, the convergence rate of the optimization problem relies on the algorithm used to solve it. For example, some algorithms have a linear convergence rate, and some have a sublinear or superlinear convergence rate. The computational complexity of an algorithm is a measure of how much computer resources the algorithm utilizes to solve the optimization problem. As a result, computational complexity can be quantified in units of storage, time, dimension, or all three simultaneously. A common methodology to quantify the computational complexity of optimization algorithms is by counting entire gradient evaluations required to obtain an optimal solution with a given accuracy \(\epsilon\). The Gradient Descent algorithm is the most popular deterministic optimization algorithm with a linear convergence rate assuming \(\mu\)-strongly convex and \(L\)-smooth functions and a computational complexity of \(\mathcal{O}( \frac{L}{\mu} N \log\frac{1}{\epsilon} )\) for \({N}\) data objective function. On the other hand, the Stochastic Gradient Descent is the most common algorithm that randomly picks a single function every iteration and thus has different computational complexity iteration \(\mathcal{O}(\frac{1}{\epsilon} )\). When \(N\) is large, the preferred methods for solving the resulting optimization or sampling problem usually rely on stochastic estimates of the gradient of \(f\). Standard variance reduction techniques used for stochastic optimizations require additional storage or the computation of full gradients. Another approach for variance reduction is through adaptively increasing the sample size used to compute gradient approximations. Some adaptive sampling optimization methods sizes have been studied in. These methods have optimal complexity properties, making them useful for various applications. uses variance-bias ratios to consider a test that is similar to the norm test, which is reinforced by a backup mechanism that ensures a geometric increase in the sample size. establishes terms for global linear convergence by investigating methods that sample the gradient and the Hessian. Other noise reduction methods like SVRG, SAG, and SAGA, either compute the full gradient at regular intervals or require storage of the component gradients, respectively . # Problem Definition The ultimate goal of most machine learning algorithms is to estimate the underlying distribution e.g.: \(\mathcal{D}(\mathcal{X},\mathcal{Y})\) where \(\mathcal{X}\) is the input feature space, and \(\mathcal{Y}\) is the label space, in terms of some hypothesis function \(h:\mathcal{X} \rightarrow \mathcal{Y}\), further on we assume that \(h\) is determined by a parameter \(w\). Given any set \(\mathcal{H}\) (that plays the role of hypotheses space) and domain \(\mathbf{Z}:\mathcal{X\times Y}\): let \(\ell\) be any function that maps from \(\mathcal{H} \times \mathbf{Z}\) to the set of non-negative real numbers e.g. \(\ell\): \(\mathcal{H} \times \mathbf{Z} \rightarrow \mathbb{R}_+\). The ability of the proposed hypothesis to estimate the underlying distribution is assessed by such loss functions. The expected loss of a classifier, \(h \in \mathcal{H}\), with regard to a probability distribution \(\mathcal{D}\) over \(Z\) is measured by the risk function [\[eq:1\]](#eq:1){reference-type="ref" reference="eq:1"}. \[\label{eq:1} L_{\mathcal{D}}(h) := \mathbb{E}_{z\sim \mathcal{D}} (\ell(h,z))\] Since this Expected Loss is built on the unknown distribution \(\mathcal{D}\), the empirical risk over a given sample of the data \(S = (z_1,\dots, z_m) \in Z_m\) is proven to be a good estimator of the expected loss, namely, \[\label{eq:ERM} L_s(h) := \frac{1}{m} \sum_{i=1}^{m}\ell(h,z_i)\] [\[sec:Definition\]]{#sec:Definition label="sec:Definition"} ## Computational complexity The computational complexity is used to relate an excess error's upper bound (if one exists) to the available computational resources. Not only the convergence rate, but also the computational resources utilized to accomplish that convergence rate is important in order to have a superior algorithm. If we define a family \(\mathcal{H}\) of candidates prediction functions, and let \(h_s :=\argmin_{h\in\mathcal{H}}L_s(f)\implies\) ERM solution, \(h^*:\argmin_{h}L_{\mathcal{D}}(h)\implies\) True solution (unknown) \(h_{\mathcal{H}} :=\argmin_{h\in\mathcal{H}}L_{\mathcal{D}}(h)\implies\) Best in class solution (unknown) We can decompose the true loss (excess loss) as follow: \[\mathcal{E}(h_s,h^*) = \mathbb{E}[L(h^*_{\mathcal{H}})-L(h^*)]+\mathbb{E}[L(h_s)-H(h^*_{\mathcal{H}})] = \mathcal{E}_{app} + \mathcal{E}_{est}\] Where the expectation w.r.t the samples. - The approximation error \(\mathcal{E}_{app}\) measures how closely functions in \(\mathcal{H}\) can approximate the optimal solution \(h^*\). - The estimation error \(\mathcal{E}_{est}\) measures the effect of minimizing the empirical risk \(L_s(f )\) instead of the expected risk \(L(f )\). - The estimation error is determined by the number of training examples and the capacity of the family of functions. - The estimation error can be bounded using Rademacher Complexity to measure the complexity of a family of functions. Since the empirical risk \(L_s (h )\) is already an approximation of the expected risk \(L(h )\), it should not be necessary to carry out this minimization with great accuracy. Assume that our algorithm returns an approximate solution \(\hat{h}_s\) such that \[\label{eq:rho} L_s(\hat{h}_s) \leq L_s(h_s) +\delta_s\] where \(\delta_s\) is a predefined positive tolerance. The new excess error can be decomposed as follows; \[\mathcal{E}(\hat{h}_s,h^*) = \mathbb{E}[L(h^*_{\mathcal{H}})-L(h^*)]+\mathbb{E}[L(h_s)-L(h^*_{\mathcal{H}})]+\mathbb{E}[L(\hat{h}_s)-L(h_s)]= \mathcal{E}_{app}+\mathcal{E}_{est}+\mathcal{E}_{opt}\] Where the expectation w.r.t the samples. The additional term \(\mathcal{E}_{opt}\) is optimization error. It reflects the impact of the approximate optimization on the generalization performance. ## General Model: The decomposition of the excess error leads to a trade-off minimization taking into account the number samples and allocating computation resources. \[\begin{matrix} \min_{\mathcal{H},\rho,m} & \mathcal{E}_{app} + \mathcal{E}_{est} + \mathcal{E}_{opt}\\ s.t. &m \leq m_{max}\\ &T(\mathcal{H},\rho,m) \leq T_{max} \end{matrix}\] The variables are the size of the family of functions \({F}\), the optimizaton accuracy \(\rho\) within the allotted training time \(T_{max}\), and the number of examples \({n}\) altered by using a subset of all available \(n_max\) samples.\ Typically when the size the class increases, the approximation error decreases, but the estimation error increases and nothing happens to optimization error because it's not related, but the computation time increase. When n increases the estimation error decreases and computation time increases, but no relation to approximation error or optimization error. When \(\rho\) increases, the optimization error increases by definition, and computation time decreases. ## Statistical Error Minimization In this paper we investigate the statistical error component of the excess error, which just comprises the difference of expected loss in some class and the empirical loss as shown below. \[\mathcal{E}_{stat} := \mathcal{E}(\hat{f}_n,f^*_{\mathcal{F}})= \mathbb{E}[E(\hat{f}_n)-E(f^*_{\mathcal{F}})]\] Further we can add and substract some terms to have: \[\begin{aligned} \mathcal{E}_{stat} := \mathcal{E}(\hat{f}_n,f^*_{\mathcal{F}})&= \mathbb{E}[E(\hat{f}_n)-E_n(\hat{f}_n)] +\underbrace{\mathbb{E}[E_n(\hat{f}_n)-E_n(f_n)]}_{\mathbb{E}[E_n(f_n)]=E(f_n)}\\ &+\underbrace{\mathbb{E}[E_n({f}_n)-E_n({f}^*_{\mathcal{F}})]}_{\leq0}+\underbrace{\mathbb{E}[E_n({f}^*_{\mathcal{F}})-E({f}^*_{\mathcal{F}})]}_{=0}\\ &\leq \underbrace{\mathbb{E}[E(\hat{f}_n)-E_n(\hat{f}_n)]}_{\mathcal{E}_{gen}} +\underbrace{\mathbb{E}[E_n(\hat{f}_n)-E_n(f_n)]}_{\mathcal{E}_{opt}}\\ \end{aligned}\] As a result, our primary goal is to minimize statistical error as follows: \[\label{eq:min} \begin{matrix} \min_{\rho,m} & \mathcal{E}_{gen} + \mathcal{E}_{opt}\\ s.t. &m \leq m_{max}\\ &T(\rho,m) \leq T_{max} \end{matrix}\] We list our assumptions below: # Methodology {#sec:others} The contribution of this work is mainly deriving the computational complexity of sub-linear convergent algorithm with adaptive sample size training. In order to derive that we start by the generalized bound that haven been studied well in literature : \[\mathbb{E} \left[\sup_{h\in\mathcal{H}} |L_s(h)-L(h)| \right] \leq V_n \approx \mathcal{O}\left(\frac{1}{n^\alpha}\right)\] where \(\alpha \in [0 \; 0.5]\) depends on an algorithm used to solve ERM and other factors. The bound is found by to be \(\mathcal{O}(\sqrt{1/n \log{1/n}})\geq\mathcal{O}(\sqrt{1/n })\), while in other references e.g. the bound is improved to \(\mathcal{O}(1/n)\) under extra conditions in the regularizer. In any situation, the bound indicates that regardless of the ERM solution's optimization accuracy, there will always be a bound in the order \(\mathcal{O}({1}/{n^\alpha})\), thus solving the ERM optimization problem with accuracy \(\delta_s\) = 0 would not be beneficial to the final statistical error (estimation) minimization problem in [\[eq:min\]](#eq:min){reference-type="ref" reference="eq:min"} as illustrated in. Thus, solving the ERM with a statistical accuracy of \(\delta_s\) in [\[eq:rho\]](#eq:rho){reference-type="ref" reference="eq:rho"} equal to the \(V_ n\) is sufficient to provide a uniformly stable result, namely hypothesis \(h\). This solution is denoted in literature by calculating the ERM within its statistical accuracy. ## Adaptive Sample Size Following the work of, an adaptive sample size scheme is employed to take advantage of the nature of ERM, namely, the finite sum of functions drawn identically and independently from the same distribution to achieve a higher convergence rate with lesser computational complexities. However, the research in only focuses into linearly convergent algorithms (strongly convex loss function are implemented with the aid of L-2 norm regularizer). The adaptive sample size scheme starts with a small portion of the training samples and solves the correspoding ERM within its statistical accuracy, then expands to include new samples with the original one and solves the ERM with the initial solution found by the previous sample and repeats until all samples are finished.\ In other words given training data samples \(\mathcal{Z}\) with \(|\mathcal{Z}|=s\), we initialize the training with small sample \(S_m \subset \mathcal{Z}\) and solve ERM in [\[eq:ERM\]](#eq:ERM){reference-type="ref" reference="eq:ERM"} within its statistical accuracy namely \(\mathcal{O}(1/m^\alpha)\) to find \(\hat{h}_m\) defined by some weights \(w_m\). Then expand the training sample to include new samples such that \(S_m \subset S_n \subset \mathcal{Z}\) and solve the ERM with initial solution of \(w_m\) to find the ERM solution \(w_n\). Repeat this process until all data in \({s}\) are included.\ The relationship between the consecutive solutions \(w_n\) and \(w_m\) with \({n = 2m}\) (the increase is discussed in section 4) is established by the following theorem. The bound is expressed in terms of the first sample statistical solution to indicate that solving the first ERM problem with zero accuracy is not required. Theorem 1 asserts that even with the most accurate \(L_m\) ERM solution i.e. \(\ delta_m =0\), the subsequent problem \(L_n\) with \(w_0 = w_m\) will always have an optimal solution that has a dependency on the \(V_m\). Thus solving the \(L_m\) should be only withing \(\mathcal{O}(V_m)\) only to reduce the computational complexity. The results [\[eq:th1\]](#eq:th1){reference-type="ref" reference="eq:th1"} in theorem [\[th:th1\]](#th:th1){reference-type="ref" reference="th:th1"} can be simplified if we consider \(V_n = 1/n^\alpha\) and \(n = 2m\) in Lemma [\[lemma:lemma1\]](#lemma:lemma1){reference-type="ref" reference="lemma:lemma1"}. ## Computational Complexity The computational complexity of an algorithm is a measure of the algorithm's recruitment of computer resources, and the less computing required to accomplish one iteration in an iterative process, the simpler the algorithm is. Typically, it's measured in cost units associated with the algorithm; for example, some algorithms are assessed in gradient evaluation or number of iterations, while others require counting the total number of computing activities performed by the machine. First the smooth loss function assumption is stated as below. Theorem [\[th:th2\]](#th:th2){reference-type="ref" reference="th:th2"} provides the minimal number of iterations required to solve the ERM on subset \(S_n\) within statistical accuracy, i.e. \(\mathbb{E}[L_n(w_n)-L_n(w_n^*)] \leq V_n\) given that the optimization algorithm has a sublinear convergence rate. The number of iterations T in theorem [\[th:th2\]](#th:th2){reference-type="ref" reference="th:th2"} ensures that the solution of any phase (stage) meets the statistical accuracy utilizing this lower constraint based on the iterative optimization algorithm being used. With a batch or sample of data, the ERM problem in equation [\[eq:ERM\]](#eq:ERM){reference-type="ref" reference="eq:ERM"} is solved until the statistical accuracy of that batch is guaranteed, and the solution is then employed as an initial solution for the next batch. The requirement of statistical accuracy, on the other hand, necessitates access to the unknown minimizer \(w^*_n\), thus Theorem [\[th:th2\]](#th:th2){reference-type="ref" reference="th:th2"} examines the minimum iterations needed such that an iterative method might utilize as a stopping criteria. Now the algorithm of solving the ERM problem in an adaptive way is illustrated in Algorithm 1. [\[tab:table1\]]{#tab:table1 label="tab:table1"} # Discussion This paper presents an adaptive sampling technique to simplify the ERM problem for first-order optimization algorithms with sublinear convergence under terms of convexity and L-smoothness. Based on the carried experiments, we can infer that adaptive sampling generally resulted in faster convergence for sublinear problems. The adaptive Gradient (adaGD) has reduced the computational complexity of minimizing the logistic loss on the three datasets MNIST, RCV1, and a1a, as shown in figure [\[fig:fig1\]](#fig:fig1){reference-type="ref" reference="fig:fig1"}. However, the MNIST dataset has the greatest reduction in complexity, which is characterized in gradient evaluations, while the a1a dataset has the least.\ The reduction in computational complexity in adaptive ADAM (adaADAM) is not significant in some datasets, such as MNIST and RCV1, but it has proven to be significant in a1a as shown in figure [\[fig:fig2\]](#fig:fig2){reference-type="ref" reference="fig:fig2"}. The explanation for this could be that the ADAM algorithm stochastically shuffles the dataset after each epoch, which could result in the samples being repeated in different batches, which would employ the adaptive sampling technique implicitly. Future work related to exploring dataset characteristics that would limit convergence rate enhancement for sublinear problems through adaptive sampling is of interest. # Introduction # Headings: first level {#sec:headings} See Section [7](#sec:headings){reference-type="ref" reference="sec:headings"}. ## Headings: second level \[\] ### Headings: third level #### Paragraph # Examples of citations, figures, tables, references {#sec:others} and see. The documentation for `natbib` may be found at Of note is the command `\citet`, which produces citations appropriate for use in inline text. For example, investigated\dots produces > Hasselmo, et al. (1995) investigated... ## Figures See Figure [\[fig:fig1\]](#fig:fig1){reference-type="ref" reference="fig:fig1"}. Here is how you add footnotes. [^1] ## Tables See awesome Table [2](#tab:table){reference-type="ref" reference="tab:table"}. [\[tab:table\]]{#tab:table label="tab:table"} ## Lists - Lorem ipsum dolor sit amet - consectetur adipiscing elit. - Aliquam dignissim blandit est, in dictum tortor gravida eget. In ac rutrum magna. # Conclusion Your conclusion here
{'timestamp': '2022-10-06T02:08:16', 'yymm': '2209', 'arxiv_id': '2209.14558', 'language': 'en', 'url': 'https://arxiv.org/abs/2209.14558'}
null
null
# Introduction Particle-laden turbulent flows are multiphase systems where a carrier fluid interacts with a dispersed phase made by a number of solid objects, e.g., spheres or fibers. Such flows concern an important class of problems with numerous applications related to both natural and industrial processes . In the analysis and modelling of such problems, a crucial distinction can be made regarding the mutual coupling between the carrier flow and the dispersed objects. When the suspension is dilute enough, it can be safely assumed that the fluid flow is not substantially altered by the presence of the objects . However, we often deal with non-dilute conditions where the mutual coupling between the two phases is relevant and gives rise to a macroscopic alteration of the turbulent carrier flow. The resulting turbulence modulation effects have been the subject of previous studies over different classes of multiphase turbulent flows, i.e., considering isotropic  or anisotropic  solid particles, as well as droplets or bubbles , typically focusing on the alteration of both the bulk flow properties as well as the scale-by-scale energy distribution. Nevertheless, the accurate characterization of the underlying physics in these complex systems still requires significant efforts both from the theoretical, computational and experimental viewpoint with relevant questions still not fully addressed, such as: (i) What are the mechanisms controlling the scale-by-scale energy distribution in the presence of immersed objects with finite size (i.e., larger than the dissipative lengthscale)? (ii) How do the geometrical properties of the dispersed particles (i.e., their size and isotropy) affect the backreaction on the carrier flow and the consequent turbulence modulation? In this work, . Exploiting massive direct numerical simulations (DNS) it is observed, at first, that the macroscopic effect in the turbulence modulation essentially consists of a large-scale energy depletion for both configurations. However, we show that this bulk effect arises from qualitatively different mechanisms depending on the geometrical features of the dispersed objects, which becomes evident from a scale-by-scale energy-transfer balance. For isotropic objects (spheres), the backreaction effectively acts at a well defined lengthscale (i.e., the sphere diameter) and over a limited range of smaller scales, without appreciably modifying the inertial range that is obtained in the single phase (i.e., without particles) configuration. For anisotropic objects (fibers), instead, the fluid-solid coupling is responsible for a global modification of the energy distribution over all the scales of motion, which is characterized by the emergence of an alternative energy along with a relative enhancement of small-scale fluctuations. The rest of the paper is structured as follows: [2](#sec:meth){reference-type="ref" reference="sec:meth"} describes the modelling and computational methodology, [3](#sec:resu){reference-type="ref" reference="sec:resu"} shows the results and [4](#sec:conc){reference-type="ref" reference="sec:conc"} contains the conclusions. # Methods {#sec:meth} To investigate the problem, we devote our attention to particles of finite size (i.e., diameter or length) which lies well within the inertial subrange of the turbulent flow. A visual example of two representative configurations is given in [\[fig:snapshots\]](#fig:snapshots){reference-type="ref" reference="fig:snapshots"}. Specifically, we have performed DNS where the fluid and solid dynamics are mutually coupled using the immersed boundary method . An incompressible, homogeneous and isotropic turbulent (HIT) flow is generated within a triperiodic cubic domain of size \(L=2\pi\) using the Arnold-Beltrami-Childress (ABC) cellular-flow forcing , achieving in the single phase case a micro-scale Reynolds number \(\mathit{Re}_\lambda = u' \lambda / \nu \approx 435\), where \(u'\) is the root mean square of the turbulent fluctuations, \(\lambda\) the Taylor's micro-scale, and \(\nu\) the kinematic viscosity. As shown in [\[fig:spectra\]](#fig:spectra){reference-type="ref" reference="fig:spectra"}, the energy spectrum in the single phase configuration (black curve) shows the classical Kolmogorov scaling \(\sim \kappa^{-5/3}\) (dashed line) at low-to-intermediate wavenumbers over more than one decade. \ Once the single phase case reached the fully-developed regime, \(N\) rigid spheres (characterized by diameter \(D\) and volumetric density \(\rho_\mathrm{s}\)) or fibers (characterized by length \(c\) and linear density difference \(\Delta \widetilde{\rho}_\mathrm{s}\)) are added to the carrier flow at randomly initialised positions and orientations. The multiphase cases were therefore evolved until reaching a statistically stationary state. An overview of the main configurations considered in our study is shown in [1](#tab:parCases){reference-type="ref" reference="tab:parCases"}. The dynamics of the bluff, spherical objects is governed by the well-known Euler-Newton equations , whereas the slender, anisotropic ones are modelled in the general framework of the Euler-Bernoulli equation for inextensible filaments, choosing a sufficiently large bending stiffness such that the deformation is always negligible (i.e., within 1%) . Hence, the mass fraction \(M\) of the suspension is defined as the ratio between the mass of the dispersed solid phase and the total mass (i.e., the sum of the fluid and solid mass contained in the domain). Note that for the chosen parameters and when matching \(M\), bluff and slender particles have remarkably different Stokes number, here computed using expressions for small particles, i.e., of length below the dissipative scale, for the sake of a comparative estimate . Moreover, we indicate \(M=1\) as the configurations where the dispersed objects are constrained to a fixed random position; such setting serves as the limiting case where the dispersed phase has infinitely large inertia, as well as a representation of flows in porous media. Finally, we note that sphere and fiber cases with same mass fraction have different volume fraction but approximately the same total wetted area. To solve the governing equations numerically, we employ the in-house solver *Fujin* (`https://groups.oist.jp/cffu/code`). The code is based on the (second-order) central finite-difference method for the spatial discretization and the (second-order) Adams-Bashforth scheme for the temporal discretization. The incompressible Navier-Stokes equations are solved using the fractional step method on a staggered grid. The Poisson equation enforcing the incompressibility constraint is solved using a fast and efficient approach based on the Fast Fourier Transform (FFT). The solver is parallelized using the MPI protocol and the `2decomp` library for domain decomposition (`http://www.2decomp.org`). In this work, the fluid domain is discretized onto a uniform Eulerian grid using \(1024^3\) cells, ensuring that, for the chosen set of domain size and fluid properties, the ratio between the Kolmogorov dissipative lengthscale and the grid spacing is \(\eta/\Delta x = \mathcal{O}(1)\). The carrier-and dispersed-phase dynamics are coupled by the no-slip condition \(\dot{{\bf X}} = \mathbf{U} = {\bf u} \left( {\bf X},t \right)\), where \({\bf X}\) is the position of a generic material point on the solid surface and \({\bf u}={\bf u}\left( {\bf x},t \right)\) is the fluid velocity field. In the present work, we employ two types of immersed boundary (IB) method where the mutual interaction between the two phases is achieved by means of a singular force distribution. Specifically, for bluff spherical particles we use the Eulerian IB method recently proposed by , whereas for slender fibers we use the method originally proposed by  and recently employed for fiber-laden turbulence by . Overall, the code has been extensively validated and tested in a variety of problems, see e.g. . # Results {#sec:resu} ## Main features of turbulence modulation The presence of the dispersed phase clearly causes a complex modification of the key features of the carrier flow, as it can be observed in the energy spectra for suspensions of spheres ([\[fig:spectra\]](#fig:spectra){reference-type="ref" reference="fig:spectra"}*a*) or fibers ([\[fig:spectra\]](#fig:spectra){reference-type="ref" reference="fig:spectra"}*b*) at different mass fraction \(M\). At a first glance and focusing on the smallest wavenumbers (i.e., largest scales), one can note a similar phenomenology between the two kinds of particles, with an overall tendency to decrease the turbulent kinetic energy while increasing \(M\). Indeed, for both bluff and slender particles the energy-containing scales are depleted by the hydrodynamic drag exerted by the particles. A direct indication on how the bulk properties of the flow are altered is provided in the insets of [\[fig:spectra\]](#fig:spectra){reference-type="ref" reference="fig:spectra"}, showing a very similar variation between spheres and fibers in terms of \(\mathit{Re}_\lambda\) with the mass fraction, notwithstanding the different Stokes numbers of the suspended objects, in agreement with previous findings . However, from [\[fig:spectra\]](#fig:spectra){reference-type="ref" reference="fig:spectra"} some peculiar differences between the two kinds of suspensions can also be noticed when extending the observation to the full range of active scales. For bluff particles, the alteration of the energy spectrum with \(M\) remains limited to the low-wavenumber region (i.e., \(\kappa \lesssim 5\)) for fibers the modulation extends up to the highest wavenumber (i.e., \(\kappa_\mathrm{max} = 512\)). At sufficiently large \(M\), a departure from the Kolmogorov scaling indeed appears throughout the full inertial subrange. We anticipate that here the energy transfer due to the fluid-solid coupling, and not to the convective term as in the single phase or bluff particle cases, . A quantitative evaluation of the resulting power law \(E(\kappa) \sim \kappa^{-\beta}\) in the inertial subrange of both single and multiphase flows is given in [\[fig:scalExp\]](#fig:scalExp){reference-type="ref" reference="fig:scalExp"}, showing the scaling exponent \(\beta\) as a function of the mass fraction for both spheres and fibers. The single phase flow (\(M=0\)) and the flows with spheres can be seen to follow the Kolmogorov scaling (\(\beta=5/3\)), whereas the flows with fibers show a significant reduction in \(\beta\) as \(M\) increases. An heuristic explanation for the latter trend is that fibers act as a barrier to the flow between any two points with separation greater than the fibre diameter \(d\), which influences the scaling of the second order velocity structure function \(\langle (\delta u)^2 \rangle \sim r^\gamma\) for two points at a distance \(r > d\), with \(\gamma = \beta-1\). In the single phase case \(\gamma = 2/3\), whereas the presence of fibers tend to decorrelate the flow, thus reducing the value of \(\gamma\) or, equivalently, \(\beta\). ## Scale-by-scale energy transfer A clear distinction in the mechanism of energy distribution between the two geometrical configurations can be highlighted and to gain a more detailed insight we look at the scale-by-scale energy transfer balance \[\mathcal{P}(\kappa) + \Pi (\kappa) + \Pi_\mathrm{fs}(\kappa) + \mathcal{D}(\kappa) = \epsilon, \label{eq:energy-transfer}\] where \(\mathcal{P}\) is the turbulence production associated with the external forcing (acting only at the largest scale \(\kappa=1\)), \(\Pi\) and \(\Pi_\mathrm{fs}\) are the energy fluxes associated with the nonlinear convective term and the fluid-solid coupling term, respectively, and \(\mathcal{D}\) is the viscous dissipation . In [\[fig:fluxes\]](#fig:fluxes){reference-type="ref" reference="fig:fluxes"}, we show the energy fluxes and dissipation in two representative cases with strong backreaction (\(M=0.9\)) for (*a*) bluff and (*b*) slender particles. Focusing on the two different energy fluxes (i.e., \(\Pi\) and \(\Pi_\mathrm{fs}\)), we note at first that the sum of these two contributions (thin dotted line) appears in both cases as a horizontal plateau for relatively low wavenumbers, as expected from [\[eq:energy-transfer\]](#eq:energy-transfer){reference-type="ref" reference="eq:energy-transfer"} and similar to the single phase case. However, qualitatively different scenarios can be identified for bluff vs slender objects when analyzing separately the two distinct contributions. On the other hand, it can be noticed that in both cases, and similarly to the classical, single phase case, for sufficiently large wavenumbers the energy fluxes tend to zero, and the viscous dissipation \(\mathcal{D}\) recovers the totality of the balance. For bluff objects ([\[fig:fluxes\]](#fig:fluxes){reference-type="ref" reference="fig:fluxes"}*a*), we first have a dominance of the fluid-solid coupling \(\Pi_\mathrm{fs}\) contribution within a limited low-wavenumber range, and only subsequently of the convective term \(\Pi\) for larger \(\kappa\). Indeed, two distinct plateau-like regions are found over two distinct subranges of scales, suggesting that, for increasing \(\kappa\), the energy is first transferred from the largest scales (where energy is injected) to smaller ones mainly by the action of the particles, only after which the nonlinear term prevails and the balance substantially recovers the classical energy cascade predicted by Kolmogorov theory. For slender objects ([\[fig:fluxes\]](#fig:fluxes){reference-type="ref" reference="fig:fluxes"}*b*), the scenario looks radically different, with \(\Pi_\mathrm{fs}\) acting over a much wider range of scales and being responsible for transferring most of the energy across all scales, with the nonlinear term being overall weakened. It can also be noted that such is overall prolonged with respect to the single phase case, consistently with the observed alteration in the energy spectrum ([\[fig:spectra\]](#fig:spectra){reference-type="ref" reference="fig:spectra"}*b*). Note that we refer to an energy also for fiber-laden turbulence because not only is constant across a wide range of scales, but also the overall drag coefficient \(C_d = \epsilon / (u'^3 \kappa_\mathrm{in})\), where \(\kappa_\mathrm{in}=1\) is the wavenumber at which the energy is injected , remains finite and comparable with the single phase case (see [1](#tab:parCases){reference-type="ref" reference="tab:parCases"}). ## Characteristic lengthscale of the fluid-solid coupling The reason for the observed difference between bluff and slender objects can be ascribed indeed to specific geometrical features. For bluff, isotropic particles the most representative scale is uniquely identified as the particle diameter \(D\). For slender fibers, the backreaction could be expected instead to act across multiple lengthscales, approximately ranging from the fiber length \(c\) to the cross-sectional diameter \(d\). In fact, the latter is found to have the dominant role (as later shown in [\[fig:source\]](#fig:source){reference-type="ref" reference="fig:source"}). This qualitative difference has a remarkable consequence on the properties of the modulated turbulent flow at sufficiently small scales: on one hand, spherical particles affect the flow essentially only at a scale that is well within the inertial range, without modifying the extension and energy amplitude of the latter; on the other hand, slender fibers are directly acting on wavenumbers that are also beyond the original energy cascade. To isolate the characteristic lengthscale up to which the energy is transferred by the backreaction for the two kinds of dispersed objects, we show in [\[fig:source\]](#fig:source){reference-type="ref" reference="fig:source"} the fluid-solid coupling contribution in the energy-spectrum balance, i.e., \(F_\mathrm{fs}\) such that \(\int_\kappa^\infty F_\mathrm{fs} = \Pi_\mathrm{fs}\). To this aim, along with the variation of the mass fraction, we also consider the influence of the sphere diameter \(D\) or fiber length \(c\) in the limiting case of fixed objects (or infinite inertia). For bluff (isotropic) objects ([\[fig:source\]](#fig:source){reference-type="ref" reference="fig:source"}*a*), it can be clearly observed that the peak of \(F_\mathrm{fs}\) scales with the diameter \(D\), as also shown from the panel inset where the wavenumber is normalized using such quantity. For slender (anisotropic) objects ([\[fig:source\]](#fig:source){reference-type="ref" reference="fig:source"}*b*), we observe instead that the fiber length \(c\) does not appreciably change the position of the peak of \(F_\mathrm{fs}\), it rather appears to be controlled by the fiber diameter \(d\). Differently from spheres, here the fluid-solid contribution shows a wider distribution, therefore suggesting a quantitative role of the fiber length as well, as previously suggested. For both objects, the mass fraction does not appear to control the wavenumber associated with the maximum forcing but only the strength of the backreaction. Remarkably, the same holds also when varying the number of objects \(N\). ## Phenomenological interpretation A simple and effective interpretation of our results can be proposed by considering the characteristic Reynolds number experienced by the particles, i.e., \(\mathit{Re}_\ell = u' \ell/\nu\), in order to argue the main hydrodynamic effect caused by the solid objects and discern peculiar differences between bluff and slender objects. For the sake of simplicity, we consider the root mean square of the fluid velocity fluctuations \(u'\) (accounting for its variation due to the effective backreaction) and the sphere diameter \(D\) or the fiber diameter \(d\) as the reference lengthscale \(\ell\). For the spherical particles such choice is natural, whilst for fibers it comes from that previously observed for the energy-transfer balance ([\[fig:source\]](#fig:source){reference-type="ref" reference="fig:source"}*b*). When computing the characteristic Reynolds number, we typically find that for spheres \(\mathit{Re}_D \sim \mathcal{O}(10^3)\), whereas for fibers \(\mathit{Re}_d \sim \mathcal{O}(10^1)\). These estimates suggest that bluff and slender objects experience qualitatively different hydrodynamic regimes, one dominated by inertial and the other by viscous forces, respectively. In particular, spheres are subject to a large-Reynolds-number flow, inducing a turbulent wake on scales comparable with and smaller than \(D\), while fibers generate flow structures typical of laminar vortex shedding on scales comparable with \(d\), but without any further proliferation of scales due to the dominant viscous dissipation. Note that here we refer to the range of scales smaller than the characteristic lengthscale associated with the individual particles. For spheres, the energy of the generated wakes is therefore converted into smaller structures by means of the well-known energy cascading process (controlled by the nonlinear term \(\Pi\)); for fibers, a similar phenomenology is not possible since the smaller-scale generated flow structures are essentially within the dissipative region. ## On the intermittency of the modulated turbulence Strong spatial and/or temporal fluctuations in the energy flux are the source of intermittency in turbulent flows. Due to the different nature of the flux in the two configurations, it is natural to wonder how intermittency is altered. A comprehensive approach to study this is to compute the multifractal spectrum of the energy dissipation rate , which we report in [\[fig:fractal\]](#fig:fractal){reference-type="ref" reference="fig:fractal"}. For spheres, we find that \(F(\alpha)\) is substantially similar to the single phase case with only minor differences. On the other hand, for fibers we have a remarkably qualitative difference in the spectrum. This further supports the idea of a standard energy cascade in particle-laden flows with finite-size spherical particles, . # Conclusions {#sec:conc} By means of unprecedented high-Reynolds-number multiphase DNS, we have investigated particle-laden turbulent flows considering solid objects of finite size, i.e. well within the inertial range of scales, with the goal of understanding how the geometrical features of the immersed objects impact on the basic mechanisms of turbulence modulation. Specifically, we have focused on two representative classes of suspensions, i.e. bluff (isotropic) spheres vs slender (anisotropic) fibers, as a benchmark for highlighting the effect of particle anisotropy. As a common feature, we found that the presence of the dispersed phase induces a similar decrease of the turbulent kinetic energy and micro-scale Reynolds number for increasing mass fraction. At the same time, we unravelled the intrinsic differences in the resulting scale-by-scale energy distribution. For both kinds of dispersed objects we have shown that the representative lengthscale at which the fluid-solid coupling is dominant is associated with the (sphere or fiber) diameter. For finite-size spherical objects, however, the backreaction due to the dispersed phase is always confined to relatively large scales with a negligible alteration of the higher-wavenumber inertial and viscous subrange. Finite-size fibers, on the other hand, transfer energy up to the smallest scales with a consequent modification of the full energy spectrum and the emergence of a modified energy cascade. A simple phenomenological description for this complex problem is that the immersed objects subtract the energy from the flow by means of hydrodynamic drag and then reinject it by their wakes. For spheres, this happens fully within the inertial subrange and therefore results in a turbulent wake that still contributes to the classical energy cascade. For fibers, the transfer involves significantly smaller scales where viscosity eventually dominates, providing to the latter additional energy with little contribution of the nonlinear terms due to the low local Reynolds number. In conclusion, we underline that these results are unique for finite-size objects and remarkably different from what previously observed for small particles (i.e., whose size is smaller than Kolmogorov's dissipative lengthscale). Our findings have primary relevance for advancing the fundamental understanding of particle-laden turbulence and its numerous related applications (e.g., slurry flows, combustion, papermaking and other industrial processes).
{'timestamp': '2022-10-05T02:11:17', 'yymm': '2209', 'arxiv_id': '2209.14497', 'language': 'en', 'url': 'https://arxiv.org/abs/2209.14497'}
null
null
# Introduction
{'timestamp': '2022-09-30T02:06:59', 'yymm': '2209', 'arxiv_id': '2209.14527', 'language': 'zh', 'url': 'https://arxiv.org/abs/2209.14527'}
# Introduction {#sec:introduction} The Weibull distribution is one of the most important probability distributions in analysis of lifetime data. The probability density function and cumulative density function of a Weibull random variable \(T\) with shape parameter \(k>0\) and scale parameter \(\lambda>0\) are \[\begin{aligned} \label{eqn:y:complete} p_T(t|k, \lambda) = \left(\frac{k}{\lambda^k}\right) t^{k-1} \exp\left(-\left(\frac{t}{\lambda}\right)^k\right), \quad F_T(t | k, \lambda) = 1-\exp\left(-\left(\frac{t}{\lambda}\right)^k\right), \end{aligned}\] respectively. With lifetime data, we often do not observe complete data and instead have joint realisations of the random variables \((Y = y, \Delta = \delta)\) where \[\begin{aligned} \label{eqn:y:censored} Y &=& \min (T, C) \\ \label{eqn:Delta} \Delta_i &=& {\rm I}(T \leq C) = \begin{cases} 1, & \text{if } T \leq C \; ({\rm observed\; survival})\\ 0, & \text{if } T > C \; ({\rm observed\; censoring}) \end{cases} \end{aligned}\] where the random variables \(T\) and \(C\) are assumed to be independent and denote the survival time and the censoring time of an item, respectively. In words, we observe the survival time \(T=t\) of an item if it is less than the corresponding censoring time \(C = c\) (i.e., \(t \leq c\)); otherwise, we only know that the item survived past time \(c\) (i.e., \(t > c\)). The censoring time may be a fixed constant (say, \(c\)) or a random variable that may depend on other factors. Given \(n\) i.i.d. lifetime data points \({\bf y} = (y_1,\ldots,y_n)\) with or without censoring, an important problem is to estimate the unknown parameters \(k\) and \(\lambda\) and thus learn about the survival distribution of the items. The most common approach to parameter estimation is the method of maximum likelihood, where the unknown parameters are set to values that maximise the (log-) likelihood of the observed data. Unfortunately, in the case of the Weibull shape parameter the corresponding maximum likelihood estimate is known to have large bias with both complete and censored data (see, for example, ) and this is especially evident for small sample sizes and/or under large amounts of censoring. This manuscript introduces the Bayesian minimum message length (MML) approach to inductive inference and demonstrates how MML can be used to estimate Weibull parameters in both the complete and censored data setting. We show that with an appropriate choice of prior distributions the MML estimate of the shape parameter improves on the maximum likelihood estimate, given censored or complete data, and is competitive with alternative proposals that modify the maximum likelihood estimate to reduce bias. Furthermore, we demonstrate how the MML principle can be used to discriminate between the lognormal and Weibull distributions with censored data. Empirical experiments suggest that model selection with MML is an excellent alternative to commonly used information criteria such as the Bayesian information criterion. # Minimum message length {#sec:mml} The minimum message length (MML) principle  is a Bayesian information-theoretic framework for inductive inference that provides a new, unified approach to parameter estimation and model selection. Given data, the key step in applying MML is the computation of the length of a message that describes (encodes) the data, with the assumption that the message comprises two components: 1. the *assertion*, encoding of the structure of the model, including all model parameters \(\bm{\theta} \in \bm{\Theta} \in \mathbb{R}^p\); and 2. the *detail*, encoding the data \(D\) using the model \(p(D | \bm{\theta})\) from the assertion. The length of the assertion measures the complexity of the model, with simpler models having a shorter assertion compared to more complex models. The length of the detail measures how well the model named in the assertion fits the data; more complex models will have shorter detail lengths compared to simpler models. The length of the combined two-part message, \(I(D, \bm{\theta})\), is \[\label{eqn:mml:codelength} I(D, \bm{\theta}) = \underbrace{ I(\bm{\theta}) }_{\rm assertion} + \underbrace{I(D | \bm{\theta})}_{\rm detail}\] i.e., the sum of the length of the assertion, \(I(\bm{\theta})\), and the length of detail, \(I(D|\bm{\theta})\). Inference in the MML framework proceeds by finding the model \[\hat{\bm{\theta}}(D) = \argmin_{\bm{\theta} \in \bm{\Theta}} \left\{ I(D, \bm{\theta}) \right\}\] that minimises the length of the two-part message message. Minimising the MML codelength requires balancing complexity of a model (assertion) with the corresponding fit to the data (detail) with the preferred model being the simplest model that fits the data sufficiently well. A key advantage of MML is that the unit of measurement, the codelength (generally measured in \(\log_e\) digits, called nits or nats), is universal in the sense that allows inference and comparison of models with different model structures (e.g., linear regression vs. decision tree) and parameters within a single, unified framework. Precise computation of codelengths is known to be a NP-hard proble in general. As such, there exist many MML approximations to the codelength ([\[eqn:mml:codelength\]](#eqn:mml:codelength){reference-type="ref" reference="eqn:mml:codelength"}) , with the MML87 approximation  being the most widely applied due to it's relative computational simplicity. Under suitable regularity conditions, the MML87 codelength approximates ([\[eqn:mml:codelength\]](#eqn:mml:codelength){reference-type="ref" reference="eqn:mml:codelength"}) by \[\label{eqn:mml87:codelength} I_{87}(D, \bm{\theta}) = \underbrace{-\log \pi(\bm{\theta}) + \frac{1}{2} \log \abs{J_{\bm{\theta}}(\bm{\theta})} + \frac{p}{2} \log \kappa_p}_{\rm assertion} + \underbrace{\frac{p}{2}-\log p(D|\bm{\theta})}_{\rm detail}\] where \(\pi_{\bm{\theta}}(\bm{\theta})\) is the prior distribution of the parameters \(\bm{\theta}\), \(\abs{J_{\bm{\theta}}(\bm{\theta})}\) is the determinant of the expected Fisher information matrix, \(p(D|\bm{\theta})\) is the likelihood function of the model and \(\kappa_p\) is a quantization constant ; for small \(p\) we have \[\kappa_1 = \frac{1}{12}, \quad \kappa_2 = \frac{5}{36 \sqrt{3}}, \quad \kappa_3 = \frac{19}{192 \times 2^{1/3}},\] while, for moderate to large \(p\), \(\kappa_p\) is well-approximated by : \[\frac{p}{2} (\log \kappa_p + 1) \approx-\frac{p}{2} \log 2\pi + \frac{1}{2} \log p \pi-\gamma,\] where \(\gamma \approx 0.5772\) is the Euler--Mascheroni constant. The MML87 approximation is invariant under smooth one-to-one reparametarizations of the likelihood function and is asymptotically equivalent to the Bayesian information criterion (BIC)  as \(n \to \infty\) with \(p>0\) fixed; that is, \[\label{eqn:mml87:bic} I_{87}(D, \bm{\theta}) =-\log p(D|\bm{\theta}) + \frac{p}{2} + O(1)\] where the \(O(1)\) term depends on the prior distribution, the Fisher information and the number of parameters \(p\). There exist many successful applications of the MML principle in statistics and machine learning literature, including factor analysis , time series , linear causal models  and mixture models ), among others. # Complete data ## Maximum likelihood estimates {#sec:complete:mle} Consider first the setting of complete data with no censoring. The negative log-likelihood of data \({\bf y} = (y_1,\ldots,y_n)\) is \[\label{eqn:complete:nll}-\log p_T({\bf y} | k, \lambda) = n \log \left(\frac{\lambda^k}{k}\right)-(k-1) \left(\sum_{i=1}^n \log y_i\right) + \sum_{i=1}^n \left(\frac{y_i}{\lambda}\right)^k\] The maximum likelihood (ML) estimates of \(k,\lambda\) are \[\hat{\lambda}^{k}({\bf y}) = \frac{1}{n} \sum_{i=1}^n y_i^{k},\] where \(\hat{k}({\bf y})\) is defined implicitly by \[\label{eqn:mle:kscore} \frac{n}{k} + \sum_{i=1}^n \log y_i-\frac{n \sum_i y_i^k \log y_i}{\sum_i y_i^k} = 0\] and must be solved for numerically. While the ML estimate of \(\lambda\) is reasonable, the ML estimate of \(k\) is known to exhibit large bias and perform poorly in terms of squared error risk, especially for small sample sizes . Several attempts have been made to construct a modified ML estimate with improved performance. Ross  derives the simple adjustment formula \[\label{eqn:mle:kross} \hat{k}_{\rm R}({\bf y}) = \left(\frac{n-2}{n-0.68}\right) \hat{k}_{\rm ML}({\bf y})\] for the ML estimate that reduces the bias to typically better than about \(0.05\)%, though this adjustment applies to complete data only. Similarly, Hirose  derives tables with correction coefficients that can be used to obtain modified ML estimates of both \(k\) and \(\lambda\) with reduced bias. In a somewhat different approach, Yang and Xie  apply the modified profile likelihood proposed by Cox and Reid  to derive a penalized maximum likelihood estimate of \(k\). Specifically, the Yang and Xie estimate of \(\lambda\) is equivalent to the ML estimate while the new estimate of the shape parameter \(k\) is obtained by numerically solving \[\label{eqn:ml:yangxie} \frac{n-2}{k} + \sum_{i=1}^n \log y_i-\frac{n \sum_i y_i^k \log y_i}{\sum_i y_i^k} = 0.\] which is similar to ([\[eqn:mle:kscore\]](#eqn:mle:kscore){reference-type="ref" reference="eqn:mle:kscore"}), the only difference being \((n-2)\) in the numerator of the first term. Yang and Xie empirically show that their estimate of \(k\) is less biased than the ML estimate and is more efficient than the simple modification ([\[eqn:mle:kross\]](#eqn:mle:kross){reference-type="ref" reference="eqn:mle:kross"}) proposed by Ross. In the next section, we show how to derive an MML estimate of the Weibull distribution parameters and demonstrate that the Yang and Xie modified maximum likelihood estimate is an MML87 estimate for a particular prior distribution. ## Minimum message length estimates {#sec:complete:mml} To derive the MML87 codelength ([\[eqn:mml87:codelength\]](#eqn:mml87:codelength){reference-type="ref" reference="eqn:mml87:codelength"}) we require the determinant of the expected Fisher information matrix \[| J(k, \lambda) | = \frac{n^2 \pi^2}{6 \lambda ^2},\] and prior distributions for both parameters. Assuming that \(k\) and \(\lambda\) are independent a priori, we opt for the half-Cauchy distributions \[\label{eqn:mmlprior:complete} \pi(k, \lambda) = \pi(k) \pi(\lambda), \quad \pi(k) = \frac{2}{\pi (1 + k^2)}, \quad \pi(\lambda) = \frac{2}{\pi (1 + \lambda^2)}.\] As \(\lambda\) is a scale parameter, a heavy tailed distribution like the half-Cauchy is appropriate and recommended in, for example,. Additionally, the half-Cauchy distribution is suitable for the shape parameter \(k\) as \(k=1\) denotes a fixed (constant) failure rate and decreasing (\(k < 1\)) and increasing (\(k > 1\)) failure rate are assumed equally likely a priori; that is, \[\int_0^1 \pi(k) dk = \int_1^\infty \pi(k) dk = \frac{1}{2}.\] The complete MML87 codelength for the Weibull distribution is \[\label{eqn:mml87:weibull:codelength} I_{87}(D, k, \lambda) =-\log \left(\frac{4}{\pi^2 (1+k^2)(1+\lambda^2)} \right) + \frac{1}{2} \log \left( \frac{n^2 \pi^2}{6 \lambda ^2} \right)-\log p_T({\bf y} | k, \lambda) + 1 + \log \kappa_2\] where the negative log-likelihood function \(-\log p_T({\bf y} | k, \lambda)\) is given in ([\[eqn:complete:nll\]](#eqn:complete:nll){reference-type="ref" reference="eqn:complete:nll"}) and \(\kappa_2 = 5/(36 \sqrt{3})\) (see Section [2](#sec:mml){reference-type="ref" reference="sec:mml"}). Unfortunately, with this selection of prior distributions, the MML87 estimates of \(k\) and \(\lambda\) must be obtained by numerically minimising ([\[eqn:mml87:weibull:codelength\]](#eqn:mml87:weibull:codelength){reference-type="ref" reference="eqn:mml87:weibull:codelength"}). It is straightforward to see that the modified maximum likelihood estimate of Yang and Xie ([\[eqn:ml:yangxie\]](#eqn:ml:yangxie){reference-type="ref" reference="eqn:ml:yangxie"}) is the MML87 estimate obtained under the prior distribution \[\pi(k, \lambda) = \pi(k) \pi(\lambda), \quad \pi(k) \propto \frac{1}{k^2}, \quad \pi(\lambda) \propto \frac{1}{\lambda}.\] which is improper unless lower and upper bound limits are imposed on both the shape and scale parameters. The implied prior distribution for \(\lambda\) is the usual scale invariant distribution often used to model a scale parameter while the prior distribution for the shape parameter \(k\) is heavy tailed and Cauchy-like asymptotically. As the aforementioned implied prior distributions are similar to ([\[eqn:mmlprior:complete\]](#eqn:mmlprior:complete){reference-type="ref" reference="eqn:mmlprior:complete"}) in their behaviour, it is expected that both the Yang and Xie modified maximum likelihood estimate and the MML87 estimate proposed in this manuscript will yield similar parameter estimates with virtually identical properties. # Censored data {#sec:censored} We now examine inference of the Weibull distribution in the presence of Type I fixed as well as random censoring. Consider first the fixed censoring setup where observations are censored after some period of time \(c > 0\). In particular, we observe the lifetime of an item only if \(T_i \leq c\), otherwise we observe the censoring time \(c\). The likelihood function of \(n\) observed data points \(D = \{(y_1, \delta_1), \ldots, (y_n, \delta_n)\}\) is \[p(D) = \prod_{i=1}^n p_{T}(y_i)^{\delta_i} (1-F_{T}(y_i))^{1-\delta_i}\] where \(\delta_i = 1\) if the survival time is observed, and \(\delta_i = 0\) if the censoring time is observed (see Section [1](#sec:introduction){reference-type="ref" reference="sec:introduction"}). In contrast, under random censoring, both the lifetime \(T_i\) and the censoring time \(C_i\) are assumed to be mutually independent random variables. Here, the likelihood function of \(n\) observed data points \(D = \{(y_1, \delta_1), \ldots, (y_n, \delta_n)\}\) can be written as \[p(D) = \left(\prod_{i=1}^n p_{T}(y_i)^{\delta_i} (1-F_{T}(y_i))^{1-\delta_i}\right) \left( \prod_{i=1}^n p_C(y_i)^{1-\delta_i} (1-F_{C}(y_i))^{\delta_i} \right)\] where \(p_T(t|\theta)\) and \(F_T(t|\theta)\) denote the probability density and the cumulative density function of the random variable \(T\), respectively. We assume the random censoring setup examined in, where both \(T_i\) and \(C_i\) are Weibull random variables \[\label{eqn:exponential} T_i \sim {\rm Weibull}(\theta, \beta), \quad C_i \sim {\rm Weibull}(\theta, \alpha), \quad i = 1,\ldots,n,\] where \(\alpha,\beta>0\) are the scale parameters and \(\theta > 0\) is the common shape parameter. The joint probability density function of \(Y_i = {\rm min}(T_i, C_i)\) and \(\Delta_i = I(T_i < C_i)\) is \[p_{Y,\Delta}(y, \delta | \alpha, \beta, \theta) = \left( \frac{\theta}{\alpha^\theta} \right) \left( \frac{\alpha}{\beta} \right)^{\delta_i \theta} y^{\theta-1} \exp\left(-\left(\frac{1}{\alpha ^{\theta }}+\frac{1}{\beta ^{\theta }}\right) y^{\theta }\right).\] Next we derive maximum likelihood estimates for the Weibull distribution under type I and random censoring. ## Maximum likelihood estimates {#sec:censored:mle} Consider the type I censoring setup as described in Section [4](#sec:censored){reference-type="ref" reference="sec:censored"}. The likelihood of \(n\) data points \(D = \{(y_1, \delta_1), \ldots, (y_n, \delta_n)\}\) is \[\begin{aligned} p(D) &= \left(\frac{k}{\lambda^k}\right)^d \exp\left(-\frac{1}{\lambda^k} \sum_{i=1}^n y_i^k \right) \prod_{i=1}^n y_i^{\delta_i (k-1)} \label{eqn:censored:nll} \end{aligned}\] The maximum likelihood (ML) estimates of \(k,\lambda\) are \[\hat{\lambda}^{k}({\bf y}) = \frac{1}{d} \sum_{i=1}^n y_i^{k},\] where \(d = \sum_{i=1}^n \delta_i\) and \(\hat{k}({\bf y})\) is given implicitly by \[\label{eqn:mle:censored:kscore} \frac{d}{k} + \sum_{i=1}^n \delta_i \log y_i-\frac{d \sum_i y_i^k \log y_i}{\sum_i y_i^k} = 0 \,.\] The maximum likelihood estimate of \(k\) is known to exhibit large bias in small samples and when the proportion of censoring is high. Sirvanci and Yang  propose the alternative estimate \[\hat{k}^{-1}(D) = \frac{1}{d g(d / n)} \sum_{i=1}^n \delta_i (\log c-\log y_i),\] where the function \(g(\cdot)\) given by \[g(p) = \log \log (1-p)^{-1}-\frac{1}{p} \int_0^p \log \log (1-t)^{-1} \, dt.\] is a bias correction factor for the bias in estimating \(1/k\). Sirvanci and Yang derive finite sample properties of this estimate and show that it has high relative efficiency in estimating \(1/k\) over a range of censoring levels (10%--90% censoring) provided \(0 < d < n\). Using the same strategy as in the complete data case (see Section [3.1](#sec:complete:mle){reference-type="ref" reference="sec:complete:mle"}), Yang and Xie  propose a new modified maximum likelihood estimate of the shape parameter \(k\) that is obtained by solving \[\label{eqn:ml:yangxie:censored} \frac{d-1}{k} + \sum_{i=1}^n \delta_i \log y_i-\frac{d \sum_i y_i^k \log y_i}{\sum_i y_i^k} = 0.\] However, this modified profile score function requires \(d>1\) to yield a positive estimate for \(k\). Next, we examine the random censoring setup described in Section [4](#sec:censored){reference-type="ref" reference="sec:censored"}. The likelihood of the data under the random censoring model is \[p_D(D | \alpha, \beta, \theta) = \left(\frac{\theta }{\alpha^{\theta }}\right)^n \left(\frac{\alpha }{\beta }\right)^{d \theta } \exp\left(-\left(\frac{1}{\alpha ^{\theta }}+\frac{1}{\beta ^{\theta }}\right) \sum_{i=1}^n y_i^{\theta }\right) \prod_{i=1}^n y_i^{\theta-1}\] where, as before, \(d = \sum_{i=1}^n \delta_i\). From this, the maximum likelihood estimates of \((\alpha,\beta)\) are \[\hat{\alpha}_{\rm ML} = \left(\frac{\sum_{i=1}^n y_i^\theta}{n-d}\right)^{1/\theta }, \quad \hat{\beta}_{\rm ML} = \left(\frac{\sum_{i=1}^n y_i^\theta}{d}\right)^{1/\theta }\] while the maximum likelihood estimate of \(\theta\) must be obtained by numerical optimisation. Clearly, the maximum likelihood estimates \((\hat{\alpha}_{\rm ML}, \hat{\beta}_{\rm ML})\) exist only if \(d \in (0, n)\). Alternatively, maximum likelihood estimates may be obtained by noting the following. The proof is straightforward and is omitted. By Lemma [\[thm:jointpdf\]](#thm:jointpdf){reference-type="ref" reference="thm:jointpdf"} and invariance of the maximum likelihood estimate, the maximum likelihood estimates of \(\alpha,\beta\) and \(\theta\) can also be obtained from the usual maximum likelihood estimates for the binomial and Weibull distributions \[\hat{\phi}_{\rm ML} = \frac{1}{n} \sum_{i=1}^n \delta_i, \quad \hat{\lambda}^{\hat{k}}_{\rm ML} = \frac{1}{n} \sum_{i=1}^n y_i^{\hat{k}},\] where \(\hat{k}\) is given implicitly by \[\frac{1}{n} \sum_{i=1}^n \log y_i + \frac{1}{k}-\frac{\sum_i y_i^k \log y_i}{\sum_i y_i^k} = 0\] and by noting that \[\label{eqn:param:transform} \theta = k, \quad \alpha = \lambda (1-\phi)^{-1/\theta}, \quad \beta = \lambda \phi^{-1/\theta}.\] These estimates exist only if \(\phi_{\rm ML} \in (0, 1)\) or, equivalently, \(d \in (0, n)\). ## Minimum message length estimates {#sec:censored:mml} We consider first MML inference under the type I censoring setup described in Section [4](#sec:censored){reference-type="ref" reference="sec:censored"}. Let \[p = F_T(c | k, \lambda), \quad q =-\log(1-p), \quad E_1(z) = \int_1^\infty \exp(-t z) / t \, dt,\] where \(E_1(\cdot)\) is the usual exponential integral function. As with the complete data setting, we assume independent half-Cauchy prior distributions (see ([\[eqn:mmlprior:complete\]](#eqn:mmlprior:complete){reference-type="ref" reference="eqn:mmlprior:complete"})) for both the shape and the scale parameters. The expected Fisher information matrix with type I censoring is \[J(k,\lambda) = n \left( \begin{array}{cc} J_{k,k} & J_{k,\lambda} \\ J_{k,\lambda} & J_{\lambda,\lambda} \end{array} \right)\] \[\begin{aligned} J_{\lambda,\lambda} &= p \left(\frac{k}{\lambda}\right)^2, \quad J_{k,\lambda} = \frac{E_1(q)-p-(p-1) \log(q)+\gamma }{\lambda } \\ J_{k,k} &= \frac{(\log (q)+1) (p+(p-2) \log (q)-2 E_1(q)-2 \gamma ) + 2 q \, _3F_3(1,1,1;2,2,2;-q)}{k^2}, \end{aligned}\] where \(_3F_3(\cdot;\cdot;\cdot)\) is the generalized hypergeometric function and \(\gamma \approx 0.5772\) is the Euler--Mascheroni constant. The determinant of the expected Fisher information matrix \[| J(k,\lambda) | = \left(\frac{n}{\lambda}\right)^2 \left[ 2 p q \, _3F_3(1,1,1;2,2,2;-q)-(\gamma+\log (q)-\text{li}(1-p))^2 \right],\] where \(\text{li}(\cdot)\) is the logarithmic integral function, is clearly a complicated function of the probability of no censoring, \(p\). The second term approaches \[\begin{aligned} \lim_{p \to 1} \left[ 2 p q \, _3F_3(1,1,1;2,2,2;-q)-(\gamma+\log (q)-\text{li}(1-p))^2 \right] = \frac{\pi^2}{6} \end{aligned}\] as \(p\) gets closer to 1, and is otherwise always less than (\(\pi^2/6\)). A simple approximation to the log-determinant using a rational function of \(p\) is \[\log | J(k,\lambda) | \approx \frac{-89.8213 p^3+194.713 p^2-87.8331 p-10.7758}{-24.0356 p^3+7.79886 p^2+28.0711 p+1} + \log \left(\frac{n}{\lambda}\right)^2\] with the absolute approximation error of the order \(0.005\) for all \(0.1 \leq p \leq 0.9\); a higher order rational approximation can be used if smaller approximation error is desired over the entire range of \(p \in (0,1)\). The MML87 codelength for the Weibull distribution with type I censoring is \[\label{eqn:mml87:censored:codelength} I_{87}(D, \bm{\theta}) =-\log \left(\frac{4}{\pi^2 (1+k^2)(1+\lambda^2)} \right) + \frac{1}{2} \log | J(k,\lambda) |-\log p_T({\bf y} | k, \lambda) + 1 + \log \kappa_2\] where the negative log-likelihood function \(-\log p_T({\bf y} | k, \lambda)\) is given in ([\[eqn:censored:nll\]](#eqn:censored:nll){reference-type="ref" reference="eqn:censored:nll"}) and \(\kappa_2 = 5/(36 \sqrt{3})\) (see Section [2](#sec:mml){reference-type="ref" reference="sec:mml"}). As with the complete data case the MML87 estimates of \(k\) and \(\lambda\) must be obtained by numerically minimising ([\[eqn:mml87:censored:codelength\]](#eqn:mml87:censored:codelength){reference-type="ref" reference="eqn:mml87:censored:codelength"}). Consider next the random censoring setup described in Section [4](#sec:censored){reference-type="ref" reference="sec:censored"} where the lifetime \(T_i\) and the censoring time \(C_i\) are mutually independent Weibull random variables with a common shape parameter. From Lemma [\[thm:jointpdf\]](#thm:jointpdf){reference-type="ref" reference="thm:jointpdf"}, the joint density of \((Y_i, \Delta_i)\) can be written as a product of a binomial distribution \(\Delta \sim (n, \phi)\) and Weibull distribution \(Y | \Delta \sim \text{Weibull}(k, \lambda)\). This implies that an MML code for the data \(D\) could comprise two messages with the first message encoding the binary censoring indicators \(\bm{\delta} = (\delta_1,\ldots,\delta_n)\), followed by another message that encodes the lifetimes \({\bf y} = (y_1,\ldots,y_n)\) given the censoring data \(\bm{\delta}\). With this encoding, the total MML codelength for the data \(D = \{(y_1, \delta_1), \ldots, (y_n, \delta_n)\}\) is \[\label{eqn:cond:codelength} I_{87}(D, \alpha, \beta, \theta) = I_{87}(\bm{\delta}, \phi) + I_{87}({\bf y}, k, \lambda |\bm{\delta}),\] where \(\phi\) is the probability of observing an uncensored datum. As with maximum likelihood, MML87 is invariant under one-to-one parameter transformations implying that MML87 estimates of \((\alpha, \beta, \theta)\) can be obtained from MML87 estimates of \((\phi, k, \lambda)\) using the relations ([\[eqn:param:transform\]](#eqn:param:transform){reference-type="ref" reference="eqn:param:transform"}). The MML87 codelength of the binomial distribution was derived in, for example, and, for a uniform prior distribution on \(\phi\), is given by \[\label{eqn:Idelta} I_{87}(\bm{\delta}, \phi) =-\left(k + \frac{1}{2}\right) \log \phi-\left(n + \frac{1}{2}-k\right) \log (1-\phi) + \frac{1}{2}(1 + \log (n/12) )\] where, as before, \(k = (\sum_i \delta_i)\). The minimum of the codelength is at the MML87 estimate \[\hat{\phi}_{87}(\bm{\delta}) = \frac{k + 1/2}{n + 1}.\] The conditional codelength of the surivival times \({\bf y}\) given the censoring indicators \(\bm{\delta}\), \(I_{87}({\bf y}, k, \lambda | \bm{\delta})\) is simply the MML87 codelength for the Weibull distribution discussed in Section [3.2](#sec:complete:mml){reference-type="ref" reference="sec:complete:mml"}. Note that it is of course possible to derive the MML87 joint codelength and construct a single message for the data \(D\), similar to the complete data case discussed in Section [3.2](#sec:complete:mml){reference-type="ref" reference="sec:complete:mml"}. Due to the invariance of the MML87 codelength, both approaches will yield exactly the same inferences. # Experiments {#sec:experiments} Numerical experiments were performed to measure the performance of the newly proposed MML87 estimates compared to the maximum likelihood estimate and the modified maximum likelihood estimate of Yang and Xie  with complete (see Section [5.1](#sec:experiments:complete){reference-type="ref" reference="sec:experiments:complete"}) and type I censored data (see Section [5.2](#sec:experiments:censored){reference-type="ref" reference="sec:experiments:censored"}). :::
{'timestamp': '2022-09-30T02:08:39', 'yymm': '2209', 'arxiv_id': '2209.14587', 'language': 'en', 'url': 'https://arxiv.org/abs/2209.14587'}
# Introduction Dense prediction refers to the process of predicting the label for each point in a point cloud. It is widely known that dense prediction plays a pivotal role in 3D robotic perception and autonomy, enabling an array of tasks such as semantic segmentation, depth completion, and scene flow estimation. UNet based network has been the de-facto choice of today's point neural network architecture design for cloud dense prediction. In a UNet-like network, one can observe that the input and the output of two correspondingly linked layers have the same number of points, e.g., if the input point cloud is denoted by a \(N \times 3\) tensor, then the output of its correspondingly linked layer is a \(N \times D\) tensor. In this regard, the output can also be viewed as an embedding map, and a dense prediction network can then be decomposed as an embedding learning network and a task-specific regressor (or classifier). Therefore, the heart of the dense prediction task is embedding learning. Embedding learning aims to learn a discriminative embedding model that pulls samples of the same class closer and pushes those of different classes away from each other in the embedding space. Successful embedding learning empowers many downstream tasks, including image retrieval, face recognition and zero-shot learning. In addition to improving the embedding model's discriminative capability, quantifying its uncertainty is also attracting much attention. For dense prediction tasks of point clouds, it is desirable that an uncertainty level could be provided in conjunction with the point-wise labels to make its downstream decision-making more information-aware. Consider a scenario where an autonomous vehicle is predicting semantic labels of each point on the road, a prediction with an estimated uncertainty level would be helpful for the computer to decide when to trust its prediction and moreover, utilize the uncertainty to optimize the vehicle's planning and control. Such promising benefits have stimulated the development of various uncertainty estimation methods for different dense prediction tasks. In 3D semantic segmentation tasks, for example, the popular approaches include (1) using the output of the logit layer to calculate softmax entropy , (2) building a two-head network to predict the mean and variance of an embedding separately, and (3) resorting to a BNN model and approximating posterior weights with MCD. However, two major issues remain in existing uncertainty estimation methods for dense prediction of 3D point clouds. First, points can only interact in the limited receptive field of convolution kernels, and they need a shared MLP to realize an implicit interaction among logits (see Fig. [\[fig_pipeline2\]](#fig_pipeline2){reference-type="ref" reference="fig_pipeline2"}.a). Such under-treatment of cross-point dependencies, unfortunately, often results in sub-optimal uncertainty estimation as evidenced by . Second, a notable trait of the predominant dense prediction networks is that they are sequential compositions of embedding learning networks and task-specific regressors (or classifiers). While prior arts have shown that enforcing embedding learning in regression or classification tasks can yield better predictive performance, it is largely under-explored if utilizing embedding learning can also give rise to better-calibrated uncertainty. In this paper, we propose a novel and generic uncertainty estimation pipeline, called  in the paper for **C**ross-point embedding **U**ncertainty **E**stimation, to bridge the gap between the dense prediction of point clouds and its dense uncertainty quantification.  involves building a probabilistic embedding model and enforcing metric alignments of massive points in the embedding space. In view of the aforementioned issues,  identifies the importance of embedding learning, and exploits this embedding space via a diagonal multivariate Gaussian model amenable to cross-point interactions. Moreover, we propose + that further utilizes cross-point dependencies by a low-rank multivariate Gaussian model. Low-rank covariance matrix in + explicitly expresses off-diagonal elements' dependencies while maintaining computational efficiency. Specifically, our contributions are stated as follows: - For the first time we propose a generic dense uncertainty estimation framework for dense prediction tasks of 3D point clouds. - We propose a novel method that fully explores cross-point information for dense uncertainty estimation. - We validate our proposed method on two representative dense prediction tasks, with the experimental results consistently showing that our method produces better-calibrated uncertainty than state-of-the-arts without losing any predictive performance. - Source code of both  and + is available at: <https://github.com/ramdrop/cue>. # Related Work ## Dense Prediction of 3D Point Cloud With the dense nature of the 3D point cloud, we focus on its dense prediction tasks, e.g., 3D geometric feature learning and 3D semantic segmentation. *3D Geometric Features Learning*: To find the correspondences in the absence of relative transformation information, a series of methods is to convert point clouds from the 3D Euclidean space to a feature space, where the correspondences are the nearest neighbors. Early work focus on hand-crafted features, such as SHOT and FPFH, we kindly refer readers to for more details about hand-crafted features. Recently deep learned geometric features are becoming popular, which are generally based on volumetric and point-wise operations on point clouds: (1) Volumetric: 3DMatch learns patch descriptors by applying a 3D convolutional neural network on volumetric input. FCGF directly applies 3D CNN to volumetric point clouds with the hardest contrastive loss, generating dense point features. (2) Point-wise: PointNet uses multiple parallel shared MLP to learn global or dense features. DGCNN combines point-wise MLP with dynamic graph neural networks, obtaining flexible and effective feature extractors for unordered point clouds. SpinNet proposes a reference axis with a spherical voxelization to learn viewpoint-invariant point descriptors. Nevertheless, the above methods focus on improving predictive performance while ignoring the inherent uncertainty in massive points. *3D Semantic Segmentation*: PointNet is the very first work for 3D point cloud learning, and its shared-MLP architecture shows strong representation capability. However, the perturbation invariance of point clouds is obtained at the cost of ignorance of the local context. Following works propose different solutions to make for this limitation: PointNet++ adopts hierarchical sampling strategies, KPConv proposes a kernel-based MLP operation mimicking convolution, MinkowskiNet extends 2D convolution to 3D voxel and specifically design sparse operation python library for point clouds, and recently PointTransformer shows the power of Transformer mechanisms in point cloud processing. ## Dense Uncertainty Estimation *Embedding Learning Uncertainty*: Kendall categorizes uncertainties in deep learning as two types: aleatoric uncertainty and epistemic uncertainty. Aleatoric uncertainty stems from data noises, while epistemic uncertainty refers to model uncertainty, which can be reduced with sufficient training data. Embedding learning is usually applied to image recognition tasks, where most methods focus on estimating aleatoric uncertainty: PFE models face embeddings as Gaussian distributions and uses the proposed Mutual Likelihood Score to measure the likelihood of two embeddings belonging to the same class. DUL proposes to learn aleatoric uncertainty for both regression and classification face recognition tasks. BTL proposes a Bayesian loss to learn aleatoric uncertainty in place recognition. RUL uses relative uncertainty measurements to learn aleatoric uncertainty. In the above image recognition tasks, a single feature is learned for a whole image. But in the dense prediction task of the point cloud, a single point cloud will involve learning thousands of features (i.e., equals to the number of points in the point cloud). Furthermore, image recognition is applied to regular-size images, while point clouds are totally unordered and varied-size. The massive features within a batch and irregular input size render it rather challenging to estimate dense uncertainty for a 3D point cloud. *Semantic Segmentation Uncertainty*: Popular uncertainty estimation methods for semantic segmentation include softmax entropy , Bayesian Neural Network (BNN), learned aleatoric uncertainty , auxiliary network and variance propagation based on Assumed Density Function (ADF). Please refer to for a thorough overview. However, these dominant approaches for semantic segmentation usually treat pixels or points as independent of each other (see Fig. [\[fig_pipeline2\]](#fig_pipeline2){reference-type="ref" reference="fig_pipeline2"}.a). Such ignorance of cross-pixel or cross-point dependencies tends to result in noisy uncertainty estimation. Embedding learning has been explored in image segmentation: and show contrastive learning optimizes embedding space and improve prediction performance in a semantic segmentation task, proves that optimized embeddings contribute to predictive performance. However, all the above methods exploit embedding learning for improving predictive performance, rather than estimating dense uncertainty. SSN has used a low-rank multivariate Gaussian model to account for cross-pixel dependencies. But it is developed for logits, which does not involve embedding optimization. Our  is based on a probabilistic embedding model and enforces metric alignments in the embedding space by using bayesian triplet loss. Bayesian triplet loss has been used in in image recognition. The major differences are: (1) the image recognition requires a single embedding for an image (i.e., whole pixels), while massive point-wise embeddings are desired in . Thus, we design additional sophisticated sampling strategies and efficient networks for unordered point clouds; and (2) the probabilistic embedding model of ignores the cross-point dependencies. Thus, we propose + to alleviate this issue by a low-rank multivariate Gaussian model. # Method ## Preliminary A dense prediction network maps a batch of points to a set of scalars. The process can be decomposed into a metric learning phase and a task-oriented regression or classification phase. Formally, given a point cloud \(\boldsymbol{\mathcal{P}} \in \mathbb{R}^{N \times 3}\), the network \(f_{\theta}\) first maps it to a set of embeddings \(\boldsymbol{\mathcal{X}} \in \mathbb{R}^{N \times D}\), where \(N\) is the number of points, and \(D\) is the embedding dimension: \[\rm metric \ \ learning:\ \boldsymbol{\mathcal{X}} = f_{\theta}(\boldsymbol{\mathcal{P}})\] which is followed by a task-oriented regressor (or classifier) \(f_{r}\) that generates predictions \(\boldsymbol{\mathcal{Y}} \in \mathbb{R}^{N \times 1}\) (or \(\boldsymbol{\mathcal{Y}} \in \mathbb{R}^{N \times C}\) where \(C\) is the number of class ) for the set of embedding: \[\rm regression \ or\ classification:\ \boldsymbol{\mathcal{Y}} = f_{r}(\boldsymbol{\mathcal{X}})\] In the above formulation, predictions are regarded as deterministic, while the inherent noise from data is ignored. A probabilistic prediction model (e.g., probabilistic semantic segmentation ) casts the prediction as a Gaussian distribution, which provides uncertainty level along with prediction (See Fig. [\[fig_pipeline2\]](#fig_pipeline2){reference-type="ref" reference="fig_pipeline2"}.a). But embeddings are still deterministic and equally weighted, which means each embedding will contribute equally to the regressor (or classifier). Inspired by probabilistic contrastive learning in face recognition, we adopt a probabilistic embedding model for a point cloud, where embeddings are represented by a diagonal multivariate Gaussian distribution: \[\label{eq_distribution} \boldsymbol{\mathcal{X}} \sim \boldsymbol{\mathcal{N}}\left ( \boldsymbol{\mu}, \boldsymbol{\Lambda^2}\right )\] where \(\boldsymbol{\mu}=f_\mu(\boldsymbol{\mathcal{P}})\in \mathbb{R}^{N \times D}\) and \(\boldsymbol{\Lambda^2}=f_\sigma(\boldsymbol{\mathcal{P}}) \in \mathbb{R}^{(N \times D) \times (N \times D)}\) is a diagonal matrix. \(f_\mu\) and \(f_\sigma\) represents the mean branch and variance branch of the network \(f_\theta\). We will later propose a full-covariance multivariate Gaussian model and show its superiority in Sec. [3.2.2](#lrmg){reference-type="ref" reference="lrmg"}. ## Exploring Cross-point Embeddings After building the probabilistic embedding model, we now discuss how to optimize the embedding space and derive the uncertainty. An overview of a traditional probabilistic prediction pipeline, the proposed  and + is presented in Fig. [\[fig_pipeline2\]](#fig_pipeline2){reference-type="ref" reference="fig_pipeline2"}. A traditional probabilistic prediction only allows logits to interact implicitly through a shared MLP, while  explores cross-point embeddings by building a probabilistic embedding model and enforcing metric alignments, and + goes further by replacing the diagonal covariance matrix with a low-rank covariance matrix. In what follows we will first describe  that is based on the diagonal multivariate Gaussian model. Then an improved version + will be introduced, which is based on the low-rank multivariate Gaussian model. ### Given a triplet \(\{\boldsymbol{P_a},\boldsymbol{P_p}, \boldsymbol{P_n} \vert \boldsymbol{P_i} \in \mathbb{R}^{1 \times 3}, i=a, p, n\}\), their embeddings are obtained as \(\{\boldsymbol{X_a},\boldsymbol{X_p}, \boldsymbol{X_n} \vert \boldsymbol{X_i} \in \boldsymbol{\mathcal{N}}(\boldsymbol{\mu}_i, \boldsymbol{\Sigma}_i^2), \boldsymbol{\mu}_i \in \mathbb{R}^{1 \times D}, \boldsymbol{\Sigma^2}_i \in \mathbb{R}^{1 \times D}, i=a, p, n\}\), where the subscripts \(a, p, n\) denote an anchor, positive and negative sample, respectively. In the probabilistic setting, we are interested in the probability of the positive embedding being closer than the negative to the anchor: \[\label{eq_bayesian_triplet} P(\Vert \boldsymbol{X}_a-\boldsymbol{X}_p \Vert-\Vert \boldsymbol{X}_a-\boldsymbol{X}_n \Vert + m < 0)\] Rewrite it as: \[\label{eq_normal} P(\tau<-m)\] where the new distribution \(\tau= \sum_d^D \boldsymbol{T} ^d=\sum_d^D (\boldsymbol{X}_a^d-\boldsymbol{X}_p^d)^2-(\boldsymbol{X}_a^d-\boldsymbol{X}_n^d)^2\), and \(d\) means \(d^{th}\) dimension. According to central limit theorem, \(\tau\) will approximate a normal distribution when \(D\) is large, i.e.,\(\frac{\tau-\mu_{\tau}}{\sigma_{\tau}} \thicksim \mathcal{N}(0, 1)\), where \(\mu_\tau\) and \(\sigma^2_\tau\) are the mean and the variance of the distribution \(\tau\). Then Eq. [\[eq_normal\]](#eq_normal){reference-type="ref" reference="eq_normal"} is solved as: \[P(\tau<-m) = \Phi_{\mathcal{N}(0, 1)} (\frac{-m-\mu_{\tau}}{\sigma_{\tau}})\] where \(\Phi\) is the Conditional Density Function (CDF). Now the task is converted to finding an analytical solution of \(\mu_\tau\) and \(\sigma_\tau\). The mean \(\mathbb{E}^\prime [\tau]\) and variance \(\mathbb{D}^\prime[\tau]\) of a single dimension is given as follows (the superscript \(d\) at right-hand side is omitted for brevity): \[\begin{aligned} \mathbb{E}[\boldsymbol{T}^d] &= \mu_{p}^{2}+\sigma_{p}^{2}-\mu_{n}^{2}-\sigma_{n}^{2}-2 \mu_{a}\left(\mu_{p}-\mu_{n}\right) \\ \mathbb{D}[\boldsymbol{T}^d] &= 2[\sigma_{p}^{4}+2 \mu_{p}^{2} \sigma_{p}^{2}+2\left(\sigma_{a}^{2}+\mu_{a}^{2}\right)\left(\sigma_{p}^{2}+\mu_{p}^{2}\right)-2 \mu_{a}^{2} \mu_{p}^{2}\\&-4 \mu_{a} \mu_{p} \sigma_{p}^{2}] + 2[\sigma_{n}^{4}+2 \mu_{n}^{2} \sigma_{n}^{2}+2\left(\sigma_{a}^{2}+\mu_{a}^{2}\right)\left(\sigma_{n}^{2}+\mu_{n}^{2}\right)\\&-2 \mu_{a}^{2} \mu_{n}^{2}-4 \mu_{a} \mu_{n} \sigma_{n}^{2}] +4 \mu_{p} \mu_{n} \sigma_{a}^{2} \end{aligned}\] Since the embedding model is assumed to be isotropic, we arrive at: \[\mu_\tau = \sum_d^D \mathbb{E}[\boldsymbol{T} ^d], \quad \sigma _\tau^2 = \sum_d^D \mathbb{D}[\boldsymbol{T} ^d]\] In summary, after the network generates a set of embeddings for a point cloud, we calculate the probability of the positive embedding being closer than the negative to the anchor, and the goal of training is to minimize the metric loss derived from Eq. [\[eq_bayesian_triplet\]](#eq_bayesian_triplet){reference-type="ref" reference="eq_bayesian_triplet"}: \[\label{eq_metric_loss} L_{M} =-\frac{1}{T} \sum _{t=1}^T P(\Vert \boldsymbol{X}_{t,a}-\boldsymbol{X}_{t,p} \Vert-\Vert \boldsymbol{X}_{t,a}-\boldsymbol{X}_{t,n} \Vert + m < 0)\] where \(T\) is the number of total triplets in a mini-batch. ### + {#lrmg} Points usually show spatial correlation with their neighbors. For example, points at the boundaries of an object usually exhibit high uncertainty since the points around the boundary have varied semantic labels. But  fails to model point-wise dependencies because the diagonal covariance matrix of  (see Eq. [\[eq_distribution\]](#eq_distribution){reference-type="ref" reference="eq_distribution"}) is based on the assumption that points are independent of each other. To solve this issue, we propose further capturing the point-wise dependencies by a full-covariance multivariate Gaussian model. Specifically, the diagonal covariance matrix in Eq. [\[eq_distribution\]](#eq_distribution){reference-type="ref" reference="eq_distribution"} is replaced with a full covariance matrix \(\boldsymbol{\Sigma}^2 \in \mathbb{R}^{(N \times D) \times (N \times D)}\): \[\boldsymbol{\mathcal{X}} \sim \boldsymbol{\mathcal{N}}\left ( \boldsymbol{\mu}, \boldsymbol{\Sigma^2}\right )\] where \(\boldsymbol{\mu} \in \mathbb{R}^{N \times D}\). However, the computational complexity of the full covariance matrix \(\boldsymbol{\Sigma}^2\) scales with the square of \(N\), and a point cloud usually consists of tens of thousands of points, i.e., \(N>10^4\). This makes training networks difficult. To alleviate this issue, we resort to a low-rank parameterization of the covariance matrix: \[\boldsymbol{\Sigma}^2 = \boldsymbol{P}\boldsymbol{P}^T+\boldsymbol{\Lambda}^2\] where the scale factor \(\boldsymbol{P} \in \mathbb{R}^{(N\times D)\times K}\) and \(K\) is the rank of the parameterization, \(\boldsymbol{\Lambda}^2 \in \mathbb{R}^{(N\times D) \times (N\times D)}\) and \(\boldsymbol{\Lambda}^2\) is a diagonal matrix. Therefore, we refer to the pipeline based on a low-rank covariance matrix as +. Compared with , + learns parameters of additional elements other than diagonal elements of the covariance matrix. This makes the point-wise dependencies explicitly described by the learned variances. For ease of application, we choose \(K=1\). Then the equivalent of the embedding \(\boldsymbol{\mathcal{X}}\) is obtained as \[\begin{aligned} \boldsymbol{\mathcal{X}} =& \boldsymbol{\mu} + \left(\boldsymbol{P} + \boldsymbol{\Lambda} \right ) \cdot \boldsymbol{\mathcal{N}}\left (\boldsymbol{0}, \boldsymbol{I} \right ) \\ \end{aligned}\] \(L_M\) is then used to train the network. By experimental results we show that + generates better-calibrated uncertainty than  (see Sec. [4](#experiments){reference-type="ref" reference="experiments"}). The network architectures of the proposed  and + are shown in Fig. [\[fig_network\]](#fig_network){reference-type="ref" reference="fig_network"}, where \(\boldsymbol{\mathcal{P}}\) means a 3D point cloud. The backbone encoder and decoder can be chosen from any UNet-like network. We add three branches to predict the mean \(\boldsymbol{\mu}\), diagonal covariance matrix \(\boldsymbol{\Lambda^2}\) and the scale factor \(\boldsymbol{P}\). \(\boldsymbol{\mu}\) branch ends with an L2-Normalization layer, while \(\boldsymbol{\Lambda^2}\) and \(\boldsymbol{P}\) branches with softplus layers. # Experimental Results {#experiments} ## 3D Geometric Feature Learning While  and + are generic to dense prediction tasks, sampling strategies for triplets should be adapted according to different downstream tasks. Here, we present practical sampling strategies for two different tasks: 3D geometric feature learning and 3D semantic segmentation. *3D geometric feature learning* aims to learn a discriminative mapping function represented by a deep neural network, such that raw points in the Euclidean space are mapped to the feature space. Ideally, points with similar geometric characteristics should be close to each other in the feature space. studies different sampling strategies, including hardest-triplet sampling and random triplet sampling, where triplet loss is adopted. We follow their sampling methods but adapt their conventional triplet loss to our metric loss \(L_M\). Specifically, given point clouds \(\boldsymbol{\mathcal{P}}_i\) and \(\boldsymbol{\mathcal{P}}_j\) and the relative transformation \(\boldsymbol{\mathcal{T}}\), we first sample anchor embeddings \(\boldsymbol{X}_{i,a}\) and \(\boldsymbol{X}_{j,a}\). Then, we randomly choose its positives \(\boldsymbol{X}_{i,p}\), \(\boldsymbol{X}_{j,p}\) and negatives \(\boldsymbol{X}_{i,n}\), \(\boldsymbol{X}_{j,n}\). Finally, we calculate the metric loss \(L_M\) of the triplets \(\{\boldsymbol{X}_{i,a}, \boldsymbol{X}_{i,p}, \boldsymbol{X}_{i,n}\}\) and \(\{ \boldsymbol{X}_{j,a}, \boldsymbol{X}_{j,p}, \boldsymbol{X}_{j,n}\}\) for training. [\[table_fcgf\]]{#table_fcgf label="table_fcgf"} **Datasets.** We use the 3D Match dataset, following the official training and evaluation splits. **Model Architectures.** FCGF is the first 3D convolutional network to integrate metric learning in a fully-convolutional setting. We choose FCGF as our backbone because it holds state-of-the-art predictive performance with fast training and inferencing. To empower the deterministic FCGF to estimate the uncertainty of each point, we integrate it with our proposed  and + as is shown in Fig. [\[fig_network\]](#fig_network){reference-type="ref" reference="fig_network"}. **Training Details.** We train FCGF following the original paper, i.e., Hardest-contrastive loss, \(100\) epoches with SGD optimizer and batch size \(4\), learning rate starts from \(0.1\) with exponetial decay rate \(0.99\), dada augmentation includes random scaling \(\in [0.8, 1.2]\) and random rotation \(\in [0 ^\circ, 360^\circ)\). **Competing Methods.** - RG: After training the FCGF, we randomly form ten bins of points and then calculate ECE. - MCD: We insert dropout layers with dropout rate \(p=0.1\) after every convolutional layer. We take \(N=40\) samples from the weights' posterior distribution at test time. - : To assure original predictive performance, we freeze the \(\boldsymbol{\mu}\) branch and train \(\boldsymbol{\Lambda^2}\) branches with the metric loss \(L_M\). - +: We freeze the \(\boldsymbol{\mu}\) branch, and train \(\boldsymbol{\Lambda^2}\) and \(\boldsymbol{P}\) branches with the metric loss \(L_M\). Note that MCD produces epistemic uncertainty, while our methods generate aleatoric uncertainty. We include it here for a comprehensive comparison. **Evaluation Metrics.** To evaluate the predictive performance, we use Feature Matching Recall with \(0.1m\) inlier distance threshold and \(0.05\) inlier recall threshold (FMR\@0.05). We adopt the widely used Expected Calibrated Error (ECE) and the reliability diagram to evaluate uncertainty quality, where we calculate the Hit Ratio of points in the same bin. **Results.** We evaluate the above methods on the 3D Match Benchmark. We establish correspondences by the nearest neighbor search in the embedding space, where each correspondence has an estimated uncertainty.[^1] Table. [1](#table_fcgf){reference-type="ref" reference="table_fcgf"} shows the predictive performance and uncertainty quality of different methods on the 3DMatch dataset. MCD shows degraded predictive performance due to the dropout layers significantly harming the network's representation ability. Since the \(\boldsymbol{\mu}\) branch is inherited from the backbone network,  and + do not sacrifice any predictive accuracy. Compared with MCD,  reduces ECE by \(0.202\). Besides, + outperforms  with ECE \(0.135\). Fig. [\[fig_ece_fcgf\]](#fig_ece_fcgf){reference-type="ref" reference="fig_ece_fcgf"} illustrates the reliability diagram on the 3D Match Benchmark. The ideal line means points with higher uncertainty levels should have lower hit ratios. RG produces a horizontal line, while MCD fails to produce a sensible estimation.  and + present closer lines to the ideal line. Fig. [\[fig_qua_fcgf\]](#fig_qua_fcgf){reference-type="ref" reference="fig_qua_fcgf"} shows the matching results and dense uncertainty map estimated by + of a point cloud. We can observe that incorrect correspondences (\(1\) and \(2\) areas) tend to have high uncertainties. In summary, the proposed  and + provide well-calibrated uncertainty that can be used as an effective tool to filter incorrect correspondence. ## 3D Semantic Segmentation *3D semantic segmentaion* aims to learn a classification network that predicts class labels for each point in a point cloud. To optimize the embedding space by enforcing metric alignments, we first randomly sample anchors from a point cloud \(\boldsymbol{\mathcal{P}}\), and then, within the neighbors of each anchor \(\boldsymbol{X}_{a}\), choose embeddings with the same class label as positives \(\boldsymbol{X}_{p}\), and those with different class label as negatives \(\boldsymbol{X}_{n}\). Finally, we calculate the metric loss \(L_M\) of the triplet \(\{ \boldsymbol{X}_{a}, \boldsymbol{X}_{p}, \boldsymbol{X}_{n}\}\) for training. **Datasets.** Following, we use the ScanNet dataset and evaluate models on the ScanNet validation split. **Model Architectures.** Considering inference latency and accuracy, we choose MinkowskiNet42 (Mink) as our 3D semantic segmentation backbone. The semantic segmentation network is the same as that in Fig. [\[fig_network\]](#fig_network){reference-type="ref" reference="fig_network"}, except that we add a convolution layer as the segmentation classfier before the L2-Normalization layer of the \(\boldsymbol{\mu}\) branch. [\[table_scannet\]]{#table_scannet label="table_scannet"} **Training Details.** We train the model for \(10^5\) steps with an SGD optimizer, learning rate starting from \(0.1\) with a cosine annealing schedule and a linear warmup. We use a batch size of \(8\). For more training details, we kindly refer readers to. **Competing Methods.** We compare  and + with the following popular uncertainty estimation methods from image segmentation: - Softmax Entropy (SE): \[H =-\sum_c^Cp_c\log(p_c)/log(C) \in [0,1]\] where \(C\) is the number of classes, \(p_c\) is a probability by the softmax layer. - Aleatoric Uncertainty (AU): Logits are modeled as Gaussian distribution, whose mean and variance are predicted by two heads of the network. We use MC sampling (\(n=10\) ) to draw samples from the logits distribution and optimize the network with Cross Entropy Loss. - MCD: MCD estimates epistemic uncertainty because dropout at test time approximates random sampling of the model's weights. Test time inference is obtained by \(p_c = \frac{1}{N}\sum_n^Np_{n,c}\), where \(p_c\) denotes the output of the Softmax layer. We set the number of MC samples \(N=40\) as suggested by. We evaluate MCD with two dropout probability settings: \(p=0.2\) and \(p=0.05\). Aleatoric uncertainty and MCD uncertainty generates high-dimensional variance vectors, which are converted to uncertainty levels by \(y(1-0.5q)+(1-y)(0.5q)\), where \(q\in[0,1]\) is the normalized variance. -  / +: We train the  / + network from scratch with a weighted sum of cross entropy loss and the metric loss \(L = L_{CR} + \lambda L_M\), where we set \(\lambda=1\) for all experiments. **Evaluation Metrics.** We use the mean IOU (mIOU) to evaluate the predictive performance. mIOU refers to the ratio of the intersection of ground-truth labels and predicted labels to their union, and a higher mIOU indicates better performance. The reliability diagram and ECE are adopted to evaluate uncertainty quality, where we calculate the precision of points in each bin. **Results.** Table. [\[table_scannet\]](#table_scannet){reference-type="ref" reference="table_scannet"} presents the predictive performance and uncertainty quality on the ScanNet validation split. In terms of predictive performance, we observe that AU,  produce comparable results to Mink, while MCD shows degraded performance due to dropout layers decreasing representative power. + promotes the Mink's predictive power with \(0.13\) boost in mIOU. From the perspective of uncertainty quality, SE achieves a \(0.251\) ECE, outperformed by MCD (p=0.05) with a \(0.170\) ECE, while  and + provide significantly improved uncertainty with ECE \(0.142\) and \(0.141\), i.e., + reduces ECE of SE by \(43.8\%\). Fig. [\[fig_ece_scannet\]](#fig_ece_scannet){reference-type="ref" reference="fig_ece_scannet"} shows the reliability diagram on the ScanNet validation split. It can be seen that  is close to the ideal calibrated line, while + improves  in the low-uncertainty region. Fig. [\[fig_qua_scannet\]](#fig_qua_scannet){reference-type="ref" reference="fig_qua_scannet"} presents the qualitative results of +, where we can observe a significant correlation between segmentation prediction error and estimated uncertainty, i.e., Incorrect predictions tend to have high uncertainties. Fig. [\[fig_qua_compare\]](#fig_qua_compare){reference-type="ref" reference="fig_qua_compare"} presents segmentation errors and dense uncertainty maps by different methods on the ScanNet validation split. For incorrect predictions (black points in the magnified area), we can observe that SE fails to detect them and shows high confidence, while  and + are uncertain about those incorrect predictions. AU is under-confident in most areas, while MCD (p=0.05) cannot produce sensible results. For correct predictions (Rectangular area \(1\)),  is under-confident while + is more confident than . The above results indicate that  and + provide better-calibrated uncertainty than existing methods without compromising any predictive performance. + outperforms  in both predictive performance and uncertainty quality. This shows that embedding learning contributes to uncertainty estimation of dense prediction tasks and low-rank multivariate Gaussian model is more effective than a diagonal one. # Conclusion Observing the fact that dense prediction networks are sequential compositions of embedding learning networks and task-specific regressors (or classifiers), we propose  that estimates dense uncertainty by building a probabilistic embedding model and enforcing metric alignments with a diagonal multivariate Gaussian model. Besides, we propose + that further enhances cross-point interactions with a low-rank multivariate Gaussian model, which explicitly expresses off-diagonal elements' dependencies while maintaining computational efficiency. Experimental results on the 3D Match Benchmark and the ScanNet dataset prove that  and + are generic and effective tools for 3D dense uncertainty estimation. [^1]: We follow the covariance formulation in and use the sum of two points' uncertainty as the correspondence's uncertainty.
{'timestamp': '2022-09-30T02:09:07', 'yymm': '2209', 'arxiv_id': '2209.14602', 'language': 'en', 'url': 'https://arxiv.org/abs/2209.14602'}
# Introduction Distributional reinforcement learning  characterizes the intrinsic randomness of returns within the framework of Reinforcement Learning (RL). When the agent interacts with the environment, the intrinsic uncertainty of the environment seeps in the the stochasticity of rewards the agent receives and the inherently chaotic state and action dynamics of physical interaction, increasing the difficulty of the RL algorithm design. Distributional RL is aimed at representing the entire distribution of returns in order to capture more intrinsic uncertainty of the environment, and therefore to use these value distributions to evaluate and optimize the policy. This is in stark contrast to the classical RL that only focuses on the expectation of the return distributions, such as temporal-difference (TD) learning  and Q-learning . As a promising branch of RL algorithms, distributional RL has demonstrated the state-of-the-art performance in a wide range of environments, e.g., Atari games, in which the representation of return distributions and the distribution divergence between the current and target return distributions within each Bellman update are pivotal to its empirical success . Specifically, categorical distributional RL, e.g., C51 , integrates a categorical distribution by approximating the density probabilities in pre-specified bins with a bounded range and Kullback-Leibler (KL) divergence, serving as the first successful distributional RL family in recent years. Quantile Regression (QR) distributional RL, e.g., QR-DQN , approximates Wasserstein distance by the quantile regression loss and leverages quantiles to represent the whole return distribution. Other variants of QR-DQN, including Implicit Quantile Networks (IQN)  and Fully parameterized Quantile Function (FQF) , can even achieve significantly better performance across plenty of Atari games. Moment Matching distributional RL  learns deterministic samples to evaluate the distribution distance based on Maximum Mean Discrepancy, while a more recent work called Sinkhorn distributional RL  interpolates Maximum Mean Discrepancy and Wasserstein distance via Sinkhorn divergence . Meanwhile, distributional RL also inherits other benefits in risk-sensitive control , policy exploration settings  and robustness . Despite the remarkable empirical success of distributional RL, the illumination on its theoretical advantages is still less studied. A distributional regularization effect  stemming from the additional value distribution knowledge has been characterized to explain the superiority of distributional RL over classical RL, but the benefit of the proposed regularization on the optimization of algorithms has not been investigated as the optimization plays a key role in RL algorithms. In the literature of strategies that can help the learning in RL, a recent progress mainly focuses on the policy gradient methods . show that the policy gradient with a softmax parameterization converges at a \(\mathcal{O}(1/t)\) rate, with constants depending on the problem and initialization, which significantly expands the existing asymptotic convergence results. Entropy regularization  has gained increasing attention as it can significantly speed up the policy optimization with a faster linear convergence rate . provide a fine-grained understanding on the impact of entropy on policy optimization, and emphasize that any strategy, such as entropy regularization, can only affect learning in one of two ways: either it reduces the noise in the gradient estimates or it changes the optimization landscape. These commonly-used strategies that accelerate RL learning inspire us to further investigate the optimization impact of distributional RL arising from the exploitation of return distributions. In this paper, we study the theoretical superiority of distributional RL over classical RL from the optimization standpoint. We begin by analyzing the optimization impact of different strategies within the Neural Fitted Z-Iteration (Neural FZI) framework and point out two crucial factors that contribute to the optimization of distributional RL, including the distribution divergence and the distribution parameterization error. The smoothness property of distributional RL loss function has also be revealed leveraging the categorical parameterization, yielding its stable optimization behavior. The uniform stability in the optimization process can thus be more easily achieved for distributional RL in contrast to classical RL. In addition to the optimization stability, we also elaborate the acceleration effect of distributional RL algorithms based on the value distribution decomposition technique proposed recently. It turns out that distributional RL can be shown to speed up the convergence and perform favorably if the value distribution is approximated appropriately, which is measured by the variance of gradient estimates. Empirical results collaborate that distributional RL indeed enjoys a stable gradient behavior by observing smaller gradient norms in terms of the observations the agent encounters in the learning process. Besides, the variance reduction of gradient estimates for distributional RL algorithms with respect to network parameters also provides strong evidence to demonstrate the smoothness property and acceleration effects of distributional RL. Our study opens up many exciting research pathways in this domain through the lens of optimization, paving the way for future investigations to reveal more advantages of distributional RL. # Preliminary Knowledge {#sec:preliminary} #### Classical RL. In a standard RL setting, the interaction between an agent and the environment is modeled as a Markov Decision Process (MDP) (\(\mathcal{S}, \mathcal{A}, R, P, \gamma\)), where \(\mathcal{S}\) and \(\mathcal{A}\) denote state and action spaces. \(P\) is the transition kernel dynamics, \(R\) is the reward measure and \(\gamma \in (0,1)\) is the discount factor. For a fixed policy \(\pi\), the return, \(Z^{\pi}=\sum_{t=0}^{\infty} \gamma^t R_t\), is a random variable representing the sum of discounted rewards observed along one trajectory of states while following the policy \(\pi\). Classical RL focuses on the value function and action-value function, the expectation of returns \(Z^{\pi}\). The action-value function \(Q^\pi(s, a)\) is defined as \(Q^{\pi}(s, a)=\mathbb{E}\left[Z^{\pi}(s, a)\right]=\mathbb{E}\left[\sum_{t=0}^{\infty} \gamma^t R\left(s_t, a_t\right) \right]\), where \(s_0=s\), \(a_0=a\), \(s_{t+1}\sim P(\cdot|s_t, a_t)\), and \(a_t \sim \pi(\cdot|s_t)\). #### Distributional RL. Distributional RL, on the other hand, focuses on the action-value distribution, the full distribution of \(Z^{\pi}(s, a)\) rather than only its expectation, i.e., \(Q^\pi(s, a)\). Leveraging knowledge on the entire value distribution can better capture the uncertainty of returns and thus can be advantageous to explore the intrinsic uncertainty of the environment . The scalar-based classical Bellman updated is therefore extended to distributional Bellman update, which allows a flurry of distributional RL algorithms, mainly including Categorical distributional RL  and Quantie Regression Distributional RL . #### Categorical Distributional RL. As the first successful distributional RL family, Categorical distributional RL  approximates the action-value distribution \(\eta\) by a categorical distribution \(\hat{\eta}=\sum_{i=1}^{k}f_i \delta_{l_i}\) where \(l_1, l_2,..., l_k\) is a set of fixed supports and \(\{f_i\}_{i=1}^k\) are learnable probabilities, normally parameterized by a neural network. A projection is also introduced to have the joint support with a newly distributed target probabilities, equipped by a KL divergence to compute the distribution distance between the current and target value distribution within each Bellman update. In practice, C51 , an instance of Categorical Distributional RL with \(k=51\), performs favorably on a wide range of environments. #### Quantile Regression (QR) Distributional RL. QR Distributional RL  approximates the value distribution \(\eta\) by a mixture of Dirac \(\hat{\eta}=\frac{1}{N}\sum_{i=1}^{N}\delta_{\tau_i}\), where \(\tau_i=F^{-1}_\eta(\frac{2i-1}{2N})\) are the learnable quantile values at the fixed quantiles \(\{\frac{2i-1}{2N}\}\) and \(F^{-1}\) is the inverse cumulative distribution function of \(\eta\). Since the quantile regression loss proposed in QR distributional RL can be used to approximate the Wasserstein distance, it gains favorable performance on Atari games. Moreover, the performance has been further improved by a series of variants based on quantile regression loss . For example, Implicit Quantile Network (IQN)  utilizes a continuous mapping for the quantile function \(F^{-1}_\eta(\frac{2i-1}{2N})\) rather than a fixed set of quantiles, which expands the expressiveness power of function approximators to represent the value distribution. # Optimization Effect of Distributional RL {#sec:optimization} We consider the function approximation setting to analyze the optimization benefit of distributional RL. In Section [3.1](#sec:neuralFZI){reference-type="ref" reference="sec:neuralFZI"}, we begin by showing the different roles of components in distributional RL on the entire optimization of RL algorithms within the Neural FZI framework. Further, in Section [3.2](#sec:stability){reference-type="ref" reference="sec:stability"} we reveal the desirable smoothness properties of distributional RL loss function as opposed to classical RL, contributing to the stable optimization. Finally, the acceleration effect of distributional RL stemming from the additional value distribution is analyzed in Section [3.3](#sec:acceleration){reference-type="ref" reference="sec:acceleration"}, which is characterized by the variance of gradient estimates. ## How to Optimize Neural Fitted Z-Iteration for Distributional RL? {#sec:neuralFZI} In classical RL, *Neural Fitted Q-Iteration* (Neural FQI)  provides a statistical interpretation of DQN  while capturing its two key features, i.e., the leverage of target network and the experience replay: \[\begin{aligned}\label{eq:Neural_Q_fitting} Q_\theta^{k+1}=\underset{Q_{\theta}}{\operatorname{argmin}} \frac{1}{n} \sum_{i=1}^{n}\left[y_{i}-Q_\theta^k\left(s_{i}, a_{i}\right)\right]^{2}, \end{aligned}\] where the target \(y_{i}=r(s_i, a_i)+\gamma \max _{a \in \mathcal{A}} Q^k_{\theta^*} \left(s_{i}^{\prime}, a\right)\) is fixed within every \(T_{\text{target}}\) steps to update target network \(Q_{\theta^*}\) by letting \(\theta^*=\theta\). The experience buffer induces independent samples \(\left\{\left(s_{i}, a_{i}, r_{i}, s_{i}^{\prime}\right)\right\}_{i \in[n]}\) and ideally without the optimization and TD approximation errors, Neural FQI is exactly the updating under Bellman optimality operator . Similarly, in distributional RL, proposed *Neural Fitted Z-Iteration* (Neural FZI), a distributional version of Neural FQI based on the parameterization of \(Z_\theta\): \[\begin{aligned}\label{eq:Neural_Z_fitting} Z_\theta^{k+1}=\underset{Z_{\theta}}{\operatorname{argmin}} \frac{1}{n} \sum_{i=1}^{n} d_p (Y_{i}, Z_\theta^k\left(s_{i}, a_{i}\right)), \end{aligned}\] where the target \(Y_{i}=R(s_i, a_i)+\gamma Z^k_{\theta^*} \left(s_{i}^{\prime}, \pi_Z(s_i^\prime)\right)\) is a random variable, whose distribution is also fixed within every \(T_{\text{target}}\) steps. The target follows a greedy policy rule, where \(\pi_Z(s^\prime_i)= \operatorname{argmax}_{a^\prime} \mathbb{E}\left[Z_{\theta^*}^{k}(s_i^\prime, a^\prime)\right]\) and \(d_p\) is the choice of distribution distance. Within the Neural FZI process, we can easily perceive that there are mainly two crucial components that determine the comprehensive optimization of distributional RL algorithms. - **The choice of \(d_p\)**. \(d_p\) in fact has two-fold impacts on the optimization of the whole Neural FZI. Firstly, \(d_p\) determines the convergence rate of distributional Bellman update. For instance, distributional Bellman operator under Crámer distance is \(\gamma^{\frac{1}{2}}\)-contractive, and is a \(\gamma\)-contraction when \(d_p\) is Wasserstein distance. Apart from the impact on the distributional Bellman update speed, \(d_p\) also largely affects the continuous optimization problem to estimate parameter \(\theta\) in \(Z_\theta\) within each iteration of Neural FZI, including the convergence speed and the bad or good local minima issues. - **The parameterization manner of \(Z_\theta\)**. The distribution representation way of \(d_p\) plays an integral part of the optimization for deep RL algorithms. For example, with more expressiveness power on quantile functions, IQN outperforms QR-DQN on a wider range of Atari games, which is intuitive as a more informative representation way can approximate the true value distribution more reasonably. A smaller value distribution parameteriation error is also potential to help the optimization albeit in an indirect avenue. Owing to the fact that convergence rates of distributional Bellman update under typical \(d_p\) are basically known, our optimization analysis mainly focuses on the impact of \(d_p\) and the paramterization error of \(Z_\theta\) on the continuous optimization within Neural FZI of distributional RL by comparing Neural FQI of classical RL. In Sections [3.2](#sec:stability){reference-type="ref" reference="sec:stability"} and [3.3](#sec:acceleration){reference-type="ref" reference="sec:acceleration"}, we attribute the optimization benefits of distributional RL to its distribution objective function, consisting of the aforementioned two factors, as opposed to the vanilla least squared loss in classical RL. ## Stable Optimization Analysis based on Categorical Parameterization {#sec:stability} To allow for a theoretical analysis, we resort to the categorical parameterization equipped with KL divergence in categorical distributional RL , e.g., C51, in order to investigate the stable optimization properties within each iteration in Neural FZI. Concretely, we assume \(Z_\theta\) is absolutely continuous and the current and target value distributions under KL divergence within a bounded range have joint supports , under which the KL divergence is well-defined. Note that this analysis strategy is slightly different from vanilla Categorical distributional RL, which also introduces a projection to redistribute probabilities of target value distribution by the neighboring smoothing without the joint support assumption. We slightly simplify Categorical distributional RL by assuming that the target distribution is still within the pre-specified support, which is still easy to satisfy in practice given a relative large bounded range \([l_0, l_k]\) in advance. To approximate the categorical distribution, we leverage the *histogram function* \(f^{s, a}\) with \(k\) uniform partitions on the support to parameterize the approximated probability density function of \(Z(s, a)\). With KL divergence as \(d_p\), we can eventually derive the distribution objective function to be optimized within each update in Neural FZI, which is similar to the histogram distributional loss proposed in. In particular, we denote \(\mathbf{x}(s)\) as the state feature on each state \(s\), and we let the support of \(Z(s, a)\) be uniformly partitioned into \(k\) bins. The output dimension of \(f^{s,\cdot}\) can be \(|\mathcal{A}| \times k\), where we use the index \(a\) to focus on the function \(f^{s, a}\). Hence, the function \(f^{s, a}: \mathcal{X} \rightarrow[0,1]^{k}\) provides a k-dimensional vector \(f^{s, a}(\mathbf{x}(s))\) of the coefficients, indicating the probability that the target is in this bin given the state feature \(\mathbf{x}(s)\) and action \(a\). Next, we use *softmax* based on the linear approximation \(\mathbf{x}(s)^{\top} \theta_{i}\) to express \(f^{s, a}\), i.e., \(f_{i}^{s, a, \theta}(\mathbf{x}(s))=\exp \left(\mathbf{x}(s)^{\top} \theta_{i}\right) / \sum_{j=1}^{k} \exp \left(\mathbf{x}(s)^{\top} \theta_{j}\right)\). For simplicity, we use \(f_{i}^{\theta}(\mathbf{x}(s))\) to replace \(f_{i}^{s, a, \theta}(\mathbf{x}(s))\). Note that the form of \(f^{s, a}\) is similar to that in Softmax policy gradient optimization , but here we focus on the value-based RL rather than the policy gradient RL. Our prediction probability \(f_i^{s, a}\) is redefined as the probability in the \(i\)-th bin over the support of \(Z(s, a)\), thus eventually serving as a density function. While the linear approximator is clearly limited, this is the setting where so far the cleanest results have been achieved and understanding this setting is a necessary first step towards the bigger problem of understanding distributional RL algorithms. Under this categorical parameterization equipped with KL divergence, the resulting distributional objective function \(\mathcal{L}_\theta(s, a)\) for the continuous optimization for each \(s, a\) pair in each iteration of Neural FZI (Eq. [\[eq:Neural_Z\_fitting\]](#eq:Neural_Z_fitting){reference-type="ref" reference="eq:Neural_Z_fitting"}) can be expressed as: \[\begin{aligned}\label{eq:histogram} \mathcal{L}_\theta(s, a) =-\sum_{i=1}^{k} \int_{l_{i}}^{l_{i}+w_{i}} p^{s, a}(y) \log \frac{f_{i}^\theta(\mathbf{x}(s))}{w_{i}} d y \propto-\sum_{i=1}^{k} p^{s, a}_{i} \log f_{i}^\theta(\mathbf{x}(s)), \end{aligned}\] where \(\theta=\{\theta_1,..., \theta_{k}\}\) and \(p^{s, a}_i\) is the probability in the \(i\)-th bin of the true density function \(p^{s, a}(x)\) for \(Z(s, a)\) defined in Eq. [\[eq:decomposition\]](#eq:decomposition){reference-type="ref" reference="eq:decomposition"}. \(w_i\) is the width for the \(i\)-th bin \((l_i, l_{i+1}]\). The derivation of the categorical distributional loss under the categorical parameterization is given in Appendix [\[appendix:histogram\]](#appendix:histogram){reference-type="ref" reference="appendix:histogram"}. To attain the stable optimization property of distributional RL, we firstly derive the appealing properties of the new categorical distributional loss in Eq. [\[eq:histogram\]](#eq:histogram){reference-type="ref" reference="eq:histogram"}, as shown in Proposition [\[prop:lipschitz\]](#prop:lipschitz){reference-type="ref" reference="prop:lipschitz"}. Please refer to Appendix [\[appendix:lemma_lipschitz\]](#appendix:lemma_lipschitz){reference-type="ref" reference="appendix:lemma_lipschitz"} for the proof. The derived smoothness properties of \(d_p\) under the categorical distributional loss plays an integral role in the stable optimization for distributional RL. In stark contrast, classical RL optimizes a least squared loss function  in Neural FQI. It is known that the least squared estimator has no bounded Lipschitz constant in general and is only \(\lambda_\text{max}\)-smooth, where \(\lambda_\text{max}\) is the largest singular value of the design or data matrix. More specifically, for the categorical distributional loss in distributional RL, we have \(\Vert \nabla_\theta \mathcal{L}_\theta \Vert \le kl\), while the gradient norm in classical RL is \(|y_i-Q_\theta^k(s, a)|\Vert \mathbf{x}(s) \Vert\), where \(Q_\theta^k(s, a)=\sum_{i=1}^{k} (l_i+l_{i+1})f_{i}^\theta(\mathbf{x}(s)) / 2 w_{i}\) under the same categorical parameterization for a fair comparison. Clearly, \(Q_\theta^k(s, a)\) can be sufficiently large if the support \([l_0, l_k]\) is specified to be large, which is common in environments where the agent is able to attain a high level of expected returns . As such, \(|y_i-Q_\theta^k(s, a)|\) can vary significantly more than \(k\) and therefore classical RL with the potentially larger upper bound of gradient norms is prone to the instability optimization issue. After providing the intuitive comparison in terms of gradient norms above, we next show that distributional RL loss can induce an uniform stability property under the desirable smoothness properties analyzed in Proposition [\[prop:lipschitz\]](#prop:lipschitz){reference-type="ref" reference="prop:lipschitz"}. We recap the definition of uniform stability for an algorithm while running *Stochastic Gradient Descent* (SGD) in Definition [\[def:stability\]](#def:stability){reference-type="ref" reference="def:stability"}. In Theorem [\[theorem:lipschitz\]](#theorem:lipschitz){reference-type="ref" reference="theorem:lipschitz"}, we show that while running SGD to solve the categorical distributional loss within each Neural FZI, the continuous optimization process in each iteration is \(\epsilon_{\text{stab}}\)-uniformly stable. Please refer to the proof of Theorem [\[theorem:lipschitz\]](#theorem:lipschitz){reference-type="ref" reference="theorem:lipschitz"} in Appendix [\[appendix:lipschitz\]](#appendix:lipschitz){reference-type="ref" reference="appendix:lipschitz"}. The stable optimization has multiple advantages. In deep learning optimization literature , an uniform stability can guarantee \(\epsilon_{\text {stab }}\)-bounded generalization gap. In reinforcement learning, algorithms with more stability tend to achieve a better final performance . In summary, under the categorical parameterization equipped with KL divergence, the continuous optimization objective function within each update of Neural FZI for distributional RL is uniformly stable with the stability errors shrinking at the rate of \(O(n^{-1})\), and the immediately obtained bounded generalization gap also guarantees a desirable local minima. This advantage can be owing to the desirable smoothness property of categorical distributional loss with a potentially smaller upper bound of gradient norms compared with classical RL. Empirically, in Section [4](#sec:experiments){reference-type="ref" reference="sec:experiments"}, we validate the stable gradient behaviors of categorical distributional RL, and similar results are also observed in Quantile Regression distributional RL. By contrast, without these smooth properties, classical RL may not yield the stable optimization property directly. For example, \(\lambda_\text{max}\)-smooth may be of less help for the optimization given a bad conditional number of the design matrix where \(\lambda_\text{max}\) could be sufficiently large. The potential optimization instability for classical RL can be used to explain its inferiority to distributional RL in most environments, although it may not explain why distributional RL could not perform favorably in certain games . We leave the comprehensive explanation as future works. #### Remark on Non-linear Categorical Parameterization. Although the aforementioned stability optimization conclusions are established on the linear categorical parameterization on the value distribution of \(Z^\pi\). Similar conclusions can be extended in the non-convex optimization case with a non-linear categorical parameterization by techniques proposed in. We also empirically validate our theoretical conclusions in the experiments by directly applying practical neural network parameterized distributional RL algorithms. ## Acceleration Effect of distributional RL {#sec:acceleration} To characterize the acceleration effect of distributional RL, we additionally leverage the recently proposed *value distribution decomposition*  to decompose the target \(p^{s, a}\). #### Value Distribution Decomposition. In order to decompose the optimization impact of value distribution into its expectation and the remaining distribution part, we adopt the wisdom from robust statistics via a variant of *gross error model* . Value distribution decomposition  was successfully applied to derive the distributional regularization effect of distributional RL. We utilize \(F^{s, a}\) to express the distribution function of \(Z^\pi(s, a)\) and we consider the function class of \(F^{s, a}\) that satisfies the following expectation decomposition: \[\begin{aligned}\label{eq:decomposition} F^{s, a}(x)=(1-\epsilon)\mathbbm{1}_{\{x \ge \mathbb{E}\left[Z^\pi(s, a)\right]\}}(x) + \epsilon F^{s, a}_{\mu}(x), \end{aligned}\] where the distribution function \(F^{s, a}_{\mu}\) is determined by \(F^{s, a}\) and \(\epsilon\) to measure the impact of remaining distribution *independent of* its expectation \(\mathbb{E}\left[Z^\pi(s, a)\right]\). \(\epsilon\) controls the proportion of \(F^{s, a}_\mu(x)\) and the indicator function \(\mathbbm{1}_{\{x \ge \mathbb{E}\left[Z^\pi(s, a)\right]\}}=1\) if \(x \ge \mathbb{E}\left[Z^\pi(s, a)\right]\), otherwise 0. Although the function class of \(F^{s, a}\) is restricted to satisfy this decomposition equality, it is still rich with the rationale rigorously demonstrated in. To reveal the speeding up effect of distributional RL loss, we consider the density function form of Eq. [\[eq:decomposition\]](#eq:decomposition){reference-type="ref" reference="eq:decomposition"}, i.e., \(p^{s, a}(x)=(1-\epsilon)\delta_{\{x=\mathbb{E}\left[Z^\pi(s, a)\right]\}}(x) + \epsilon \mu^{s, a}(x)\), where \(\delta_{\{x=\mathbb{E}\left[Z^\pi(s, a)\right]\}}\) is a Dirac function centered at \(\mathbb{E}\left[Z^\pi(s, a)\right]\) to characterize the expectation impact and \(\mu^{s, a}\) is the density function of \(F^{s, a}_\mu\) to measure the addition value distribution information. Within Neural FZI, our goal is to minimize \(\frac{1}{n}\sum_{i=1}^{n}\mathcal{L}_\theta(s_i, a_i)\). We denote \(G^k(\theta)\) as the expectation of \(\mathcal{L}_\theta\), i.e., \(G^k(\theta)=\mathbb{E}_{(s, a)\sim \rho^\pi}\left[\mathcal{L}_\theta(s, a)\right]\). Based on the categorical parameterization in Section [3.2](#sec:stability){reference-type="ref" reference="sec:stability"}, the convex and smooth properties with respect to the parameter \(\theta\) in \(f_\theta\) as shown in Proposition [\[prop:lipschitz\]](#prop:lipschitz){reference-type="ref" reference="prop:lipschitz"} still hold for \(G^k(\theta)\). We use \(G(\theta)\) for \(G^k(\theta)\) for simplicity and rewrite \(\mathcal{L}_\theta(s, a)\) as \(\mathcal{L}_\theta(g^{s, a}, f^{s, a}_\theta)\), where the target density function \(g^{s, a}\) can be \(p^{s, a}\), \(\mu^{s, a}\) or \(\delta_{\{x=\mathbb{E}\left[Z^\pi(s, a)\right]\}}\), and \(f^{s, a, \theta}\) is rewritten as \(f^{s, a}_\theta\) for conciseness. As the KL divergence enjoys the property of unbiased gradient estimates, we let the variance of its stochastic gradient over *the expectation* \(\delta_{\{x=\mathbb{E}\left[Z^\pi(s, a)\right]\}}\) be bounded, i.e., \[\begin{aligned} \mathbb{E}_{(s, a)\sim \rho^\pi}\left[\|\nabla \mathcal{L}_\theta(\delta_{\{x=\mathbb{E}\left[Z^\pi(s, a)\right]\}}, f_\theta^{s, a}))-\nabla G(\theta)\|^{2}\right]=\sigma^{2}. \end{aligned}\] Next, following the similar label smoothing analysis in, we further characterize the approximation degree of \(f^{s, a}_\theta\) to the target value distribution \(\mu^{s, a}\) by measuring its variance as \(\kappa \sigma^2\): \[\begin{aligned}\label{eq:acceleration_kappa} \mathbb{E}_{(s, a)\sim \rho^\pi}\left[\|\nabla \mathcal{L}_\theta(\mu^{s, a}, f_\theta^{s, a}))-\nabla G(\theta)\|^{2}\right]=\hat{\sigma}^2:=\kappa \sigma^{2}. \end{aligned}\] Notably, \(\kappa\) can be used to measure the approximation error between \(f_\theta^{s, a}\) and \(\mu^{s, a}\) and we do not assume \(\hat{\sigma}^2\) to be bounded as \(\kappa\) can be arbitrarily large. This expression \(\kappa \sigma^2\) for \(\hat{\sigma}^2\) allows us to utilize \(\kappa\) to characterize different acceleration effects for distributional RL given different \(\kappa\). Concretely, a favorable approximation of \(f_\theta^{s, a}\) to \(\mu^{s, a}\) would lead to a small \(\kappa\) that contributes to the acceleration effect of distributional RL as shown in Theorem [\[theorem:acceleration\]](#theorem:acceleration){reference-type="ref" reference="theorem:acceleration"}. Based on Eq. [\[eq:acceleration_kappa\]](#eq:acceleration_kappa){reference-type="ref" reference="eq:acceleration_kappa"}, we immediately have Proposition [\[prop:acceleration\]](#prop:acceleration){reference-type="ref" reference="prop:acceleration"}. Please refer to Appendix [\[appendix:acceleration_lemma\]](#appendix:acceleration_lemma){reference-type="ref" reference="appendix:acceleration_lemma"} for the proof. Before comparing the sample complexity in the optimization process of both classical and distributional RL, we provide the definition of the first-order \(\tau\)-stationary point, which is preferred in the optimization of deep learning rather than the a simple stationary point in order to guarantee the generalization. Based on Definition [\[definition:acceleration\]](#definition:acceleration){reference-type="ref" reference="definition:acceleration"}, we formally characterize the acceleration effects for distributional RL in Theorem [\[theorem:acceleration\]](#theorem:acceleration){reference-type="ref" reference="theorem:acceleration"} that depends upon approximation errors between \(\mu^{s, a}\) and \(f^{s, a}_\theta\) measured by \(\kappa\). The proof is provided in Appendix [\[appendix:acceleration_theorm\]](#appendix:acceleration_theorm){reference-type="ref" reference="appendix:acceleration_theorm"}. Theorem [\[theorem:acceleration\]](#theorem:acceleration){reference-type="ref" reference="theorem:acceleration"} is inspired by the intuitive connection between the value distribution in distributional RL and the label distribution in label smoothing technique . Importantly, Theorem [\[theorem:acceleration\]](#theorem:acceleration){reference-type="ref" reference="theorem:acceleration"} demonstrates that solving categorical distributional loss of distributional RL can speed up the convergence if a distribution approximation error is favorable. Otherwise, the convergence point, albeit stationary, may not guarantee a desirable performance under an agnostic \(\kappa\), which may be very large on certain environments. *The results in Theorem [\[theorem:acceleration\]](#theorem:acceleration){reference-type="ref" reference="theorem:acceleration"} in fact incorporate the impact of both two key ingredients, including the choice of \(d_p\) and parameterization error of \(Z_\theta\), analyzed in Section [3.1](#sec:neuralFZI){reference-type="ref" reference="sec:neuralFZI"} on the optimization of distributional RL.* **In the first scenario ((2) in Theorem [\[theorem:acceleration\]](#theorem:acceleration){reference-type="ref" reference="theorem:acceleration"})**, there is only a small approximation or paramterization error between \(f_\theta^{s, a}\) and \(p^{s, a}\) (or \(\mu^{s, a}\)), corresponding to a small \(\kappa\) with \(\kappa\le \frac{\tau}{2\sigma}\). In this case, solving \(\mathcal{L}_\theta\) based on the categorical parameterization can reduce the sample complexity from \(O(\frac{1}{\tau^4})\) to \(O(\frac{1}{\tau^2})\) compared with classical RL in (1) of Theorem [\[theorem:acceleration\]](#theorem:acceleration){reference-type="ref" reference="theorem:acceleration"}, and meanwhile guarantees a \(\tau\)-stationary point. **In the second scenario ((3) in Theorem [\[theorem:acceleration\]](#theorem:acceleration){reference-type="ref" reference="theorem:acceleration"})** especially for some challenging environments with much intrinsic uncertainty, we can also attain a relatively large approximation error or parameterization error of \(Z_\theta\) with a large \(\kappa > \frac{\tau}{2\sigma}\) as the distributional TD approximation error could be potentially large in practice. Under this circumstance, distributional RL algorithms may fail to speed up the convergence or achieve the superior performance compared with classical RL as \(\mathcal{O}(\kappa^2)\) could be potentially large on some complex environments. If \(\mathcal{O}(\kappa^2)\) is proper, distributional RL can still potentially perform reasonably due the to \(\mathcal{O}(\kappa^2)\)-stationary point guarantee. Theses theoretical results also coincide with past empirical observations , where distributional RL algorithms outperform classical RL in most cases, but are inferior in certain environments. Based on our results in Theorem [\[theorem:acceleration\]](#theorem:acceleration){reference-type="ref" reference="theorem:acceleration"}, we contend that these certain environments have much intrinsic uncertainty, the distribution parameterization error between \(Z_\theta\) and the true value distribution under the distributional TD approximation is still too large (\(\kappa > \frac{\tau}{2\sigma}\)) to guarantee a favorable convergence point for distributional RL algorithms with different \(d_p\), which is intuitive. # Experiments {#sec:experiments} We perform extensive experiments on eight continuous control MuJoCo games to validate the theoretical optimization advantage of distributional RL algorithms analyzed in Section [3](#sec:optimization){reference-type="ref" reference="sec:optimization"}, including the stable gradient behaviors of distributional RL to achieve the uniform stability as well as the acceleration effects determined by the distribution parameterization error. #### Implementation. Our implementation is based Soft Actor Critic (SAC)  and distributional Soft Actor Critic . We eliminate the optimization impact of entropy regularization in these algorithm implementations, and thus we denote the resulting algorithms as Actor Critic (AC) and Distributional Actor Critic (DAC) for the conciseness. For DAC, we firstly perform the C51 algorithm to the critic to extend the classical critic loss to the distributional version denoted by *DAC (C51)* as our theoretical analysis in Sections [3.2](#sec:stability){reference-type="ref" reference="sec:stability"} and [3.3](#sec:acceleration){reference-type="ref" reference="sec:acceleration"} are mainly based on categorical parameterization. We further apply our empirical demonstration on Quantile Regression distributional RL heuristically, i.e., Implicit Quantile Network (IQN), which is denoted as *DAC (IQN)*. Hyper-parameters and more implementation details are provided in Appendix [\[appendix:implementation\]](#appendix:implementation){reference-type="ref" reference="appendix:implementation"}. ## Performance and Uniform Stability in distributional RL Optimization Figure [\[fig:performance\]](#fig:performance){reference-type="ref" reference="fig:performance"} suggests that DAC (IQN) in orange lines outperforms its classical version AC (black lines) across all environments, while DAC (C51) in red lines is inferior to AC on humanoid, walker2d and reacher. This could be explained by a more flexible parameterization of IQN over C51. We then demonstrate the advantage of uniform optimization stability for distributional RL over classical RL. According to Theorem [\[theorem:lipschitz\]](#theorem:lipschitz){reference-type="ref" reference="theorem:lipschitz"}, the stable optimization of distribution loss with Neural FZI is described as a bounded loss difference for a neighboring dataset in terms of each state \(s\) and action \(a\). In other words, the error bound holds by taking the supreme over each state the agent encounters. To measure this algorithm stability, while far from perfect, we consider to leverage *the average gradient norms with respect to the state feature \(\mathbf{x}(s)\)* in the whole optimization process as the proxy due to the fact that the gradient could measure the sensitivity of loss function regarding each state the agent observes. From Figure [\[fig:optimization\]](#fig:optimization){reference-type="ref" reference="fig:optimization"}, it turns out that both DAC (C51) and DAC (IQN) entail a much smaller gradient norm magnitude as opposed to their classical version AC (black lines) across all eight MuJoCo environments, which corroborates the theoretical advantage of the uniform optimization stability for distributional RL analyzed in Theorem [\[theorem:lipschitz\]](#theorem:lipschitz){reference-type="ref" reference="theorem:lipschitz"}. ## Smoothness Property and Acceleration Effect of Distributional RL Theorem [\[theorem:acceleration\]](#theorem:acceleration){reference-type="ref" reference="theorem:acceleration"} demonstrates that distributional RL can speed up the convergence if the distribution parameterization is appropriate, characterized by the variance of the gradient estimates with a small \(\kappa\) (case (2) in Theorem [\[theorem:acceleration\]](#theorem:acceleration){reference-type="ref" reference="theorem:acceleration"}). To demonstrate it, we use the proxy by evaluating the \(\ell_2\)-norms of gradients *with respect to network parameters* of the critic for AC and DAC. We mainly focus on a direct comparison between vanilla AC and DAC algorithm, although their network architectures are slightly different. Similar results under the same architecture and via the value distribution decomposition of Eq. [\[eq:decomposition\]](#eq:decomposition){reference-type="ref" reference="eq:decomposition"} are provided in Appendix [\[appendix:exp_acceleration_kappa\]](#appendix:exp_acceleration_kappa){reference-type="ref" reference="appendix:exp_acceleration_kappa"}. Figure [\[fig:acceleration\]](#fig:acceleration){reference-type="ref" reference="fig:acceleration"} showcases that both DAC (C51) and DAC (IQN) have smaller gradient norms in terms of network parameters \(\theta\) compared with AC in the whole optimization process, which directly validates that distributional RL loss is more likely to enjoy smoothness properties in Proposition [\[prop:lipschitz\]](#prop:lipschitz){reference-type="ref" reference="prop:lipschitz"}. In terms of acceleration effects, the property of stationary points, albeit being different, in cases (2) and (3) of Theorem [\[theorem:acceleration\]](#theorem:acceleration){reference-type="ref" reference="theorem:acceleration"} guarantees bounded gradient norms, but the precise evaluation of \(\kappa\) is tricky in order to discriminate either case (2) or (3) for each algorithm in a specific environment. Nevertheless, by considering the fact that DAC (IQN) outperforms DAC (C51) in most environments in Figure [\[fig:performance\]](#fig:performance){reference-type="ref" reference="fig:performance"}, we hypothesize that the inferiority of DAC (C51) on humanoid, walker2d and reacher could be owing to its larger parameterization errors \(\kappa\) in these environments. This results in the worse performance of DAC (C51) compared with DAC (IQN) that is more likely to accord with the case (3) in Theorem [\[theorem:acceleration\]](#theorem:acceleration){reference-type="ref" reference="theorem:acceleration"} due to its richer distribution expressiveness power than C51. # Discussions and Conclusion Our optimization analysis of distributional RL is based on the categorical parameterization, and the alternative analysis on Wasserstein distance can be an integral complementary for our conclusions. Acceleration effects could be further investigated to explain whether a typical distributional RL algorithm can perform favorably in a specific environment. We leave them as future works. In our paper, we answer the question: *how does value distribution in distributional RL help the optimization* from two perspectives, including the stable optimization analysis based on the smoothness property of categorical distributional loss, as well as the acceleration effects determined by the variance of gradient estimates. We theoretically and empirically show that distributional RL embraces stable gradient behaviors and could speed up the convergence if the distribution approximation is desirable or the parameterization error is sufficiently small. #### Ethics Statement. Due to the fact that our study is about the theoretical properties of distributional RL algorithms, we do not think our research is involved with any ethics issues. #### Reproducibility Statement. As stated in Section [4](#sec:experiments){reference-type="ref" reference="sec:experiments"}, our implementation is based on the public code of SAC  and Distributional SAC . We also provide implementation details in Appendix [\[appendix:implementation\]](#appendix:implementation){reference-type="ref" reference="appendix:implementation"} for reproducibility. For the theoretical results, rigorous proof is also given in Appendix from [\[appendix:histogram\]](#appendix:histogram){reference-type="ref" reference="appendix:histogram"} to [\[appendix:acceleration_theorm\]](#appendix:acceleration_theorm){reference-type="ref" reference="appendix:acceleration_theorm"}.
{'timestamp': '2022-09-30T02:06:30', 'yymm': '2209', 'arxiv_id': '2209.14513', 'language': 'en', 'url': 'https://arxiv.org/abs/2209.14513'}
# Introduction Galactic scale flows (both inflowing and outflowing) are an essential ingredient in models of galaxy formation. In particular, flows are responsible for regulating the baryon cycle and are necessary to reproduce observations on both galactic and cosmic scales. A simple, but useful explanation is that flows work in equilibrium. For example, supernovae or AGN driven feedback is necessary to expel matter from the interstellar medium (ISM) to enrich the circumgalactic medium (CGM, @Tumlinson2017) and intergalactic medium (IGM, @Oppenheimer2006), and in doing so, actively suppresses star formation; consequently, accretion is then necessary to refuel star formation to-for example-recreate the observed time evolution of the star formation rate (e.g., @Erb2008 [@Mannucci2010; @Papovich2011]). In this paradigm, knowing the physical properties of flows is essential for testing models of galaxy formation against observations. Indeed, flow parameters are often introduced into hydrodynamical simulations in an ad hoc fashion to incorporate the physics of star formation which occurs on unresolved scales (e.g., @Springel2005 [@Vogelsberger2014]). Furthermore, simulations which rely on self consistent models of star formation to derive flows (e.g., @Hopkins2014 [@Hopkins2018]) need to be checked as well to ensure their results agree with observations. For a review on the status of galaxy formation models which emphasizes the importance of observationally constraining flows see. Observationally, flows are identified by the asymmetric absorption and emission line broadening observed in their spectra where the width reflects the maximum velocity of the flow and the depth reflects the optical depth of the relevant transition. Over the past decade, absorption and emission line studies have made tremendous progress constraining the properties of flows across multiple wavelengths. For example, local UV studies relying on the Hubble Space Telescope's Cosmic Origins Spectrograph (COS) have successfully constrained the cool and warm phases of the CGM from low and high ionization state metal lines , while sub-milimeter studies with the Herschel Space Observatory's PACS instrument have constrained the cold phase of the CGM via atomic and molecular lines. Ground based studies in the optical with Keck and milimeter with ALMA have placed constraints on flows at even higher redshifts. The hot phase of the CGM is the least well constrained due to the difficulty in observing the faint x-ray emission produced at such high temperatures (\(\sim 10^7\) K); however, evidence for outflows has been observed in the x-ray emission of nearby galaxies. Together these studies reveal that outflows are ubiquitous, multiphase, and energetic reaching speeds on the order of hundreds to a few thousand kilometers per second. In contrast, inflows are less energetic, typically reaching speeds less than 200 kilometers per second, and are observed far less frequently. For example, in a study of \(\sim 200\) galaxies from \(0.4 < z < 1.4\), found evidence for inflows in only \(3-6\%\) of their sample compared to the roughly \(20\%\) detection rate for outflows in the absorption lines of Fe II (i.e., partially ionized gas \(\sim10^4\)K) under similar restrictions on the net observed velocity. For a summary on the current state of observations of both inflows and outflows see and. Given the important role accretion plays in models of galaxy formation, the overall lack of detections of inflows is surprising. Indeed, hydrodynamical simulations predict that a significant amount of the gas feeding star formation at low redshifts is metal enriched. For example, using the FIRE cosmological simulations, found that all galaxies in their simulations re-accrete \(>50\%\) of the gas ejected in winds. A possible explanation for the lack of detections is that galactic inflows occur along streams with low covering fractions, and hence, whether or not inflowing gas is detected will be highly sensitive to the viewing angle . Furthermore, the spectral features of the more energetic outflows may mask that of inflows. For example, the symmetric emission component of an outflow may fill in the weaker redshifted absorption feature necessary to identify inflows in resonant lines. The observational approach to study the CGM (i.e., background vs down the barrel spectroscopy) matters in terms of what information can be recovered from flows and how efficiently. In the case of background spectroscopy, where light from a distant quasar is used to probe the CGM of a single galaxy, the orientation of the flow cannot be determined from the absorption lines alone. When this is the case, the galaxy's morphology and orientation can be used to predict the direction of the flow; however, these analyses suffer from model degeneracies and favor certain orientations for constraining flow properties (e.g., @Ho2020). Down-the-barrel spectroscopy, on the other hand, has the potential to unambiguously identify the orientation of a flow and has been used to study the spectra of outflows (e.g., @Rivera-Thorsen2015 [@Zhu2015; @Chisholm2017a; @Gazagnes2018; @Carr2021]) and to estimate mass outflow rates (e.g., @Chisholm2016 [@Chisholm2017b; @Xu2022]). There is, however, very little modeling available to study the spectra of inflows in this area. The lack of modeling has been recognized (see @Faucher2017), and any progress made would be a step forward. In this paper, we present a modified version of the semi-analytical line transfer (SALT) model of to predict the spectra of galactic inflows obtained via down the barrel spectroscopy. The model pertains only to the scattering of continuum radiation, and does not include emission from the inflows themselves. As such, it cannot be used to interpret-for example-radio observations, but can be used to interpret the spectra of cool partially ionized gas where collisional excitation is expected to be low (e.g., @Rubin2012). We plan to consider an emission component in a future paper. The rest of this paper is organized as follows. In section 2, we adapt the SALT model of to account for galactic inflows. In section 3, we explore the parameter space of the inflowing SALT model in various physically motivated scenarios including spherical inflows, inflows with covering fractions less than unity, and galactic fountains. Our discussion and conclusions follow in section 4. # Modeling {#Modeling} This paper is the third in a series of theoretical papers aimed at calculating the spectra of galactic flows. In the first paper, presented a semi-analytical line transfer (SALT) model to predict the spectra of spherical galactic outflows. Their work was later generalized by to include spectra of bi-conical outflows. The aim of the current paper is to adapt SALT to predict the spectra of galactic inflows (both spherical and with covering fractions less than unity). This model is intended to interpret the inverse P Cygni profiles observed in the UV lines associated with the low ionization metals (e.g., Mg II, Si II, etc.) thought to trace cool inflows during metal recycling (e.g., @Ford2014). For consistency, we preserve what notation we can from previous works. All models are to assume a spherical source of isotropically emitted radiation of radius, \(R_{SF}\), surrounded by an envelope of flowing material which extends to a terminal radius, \(R_W\). A diagram has been provided in Figure [\[f1\]](#f1){reference-type="ref" reference="f1"}. The \(For convenience, we have provided a complete list of the SALT parameters for the outflowing and inflowing SALT model along with their definitions in Table~\ref{tab:pars}. More detailed definitions can be found in. \subsection{SALT Model for Galactic Inflows} We begin by assuming the velocity field of the in-falling gas follows a power law of the form, \begin{equation} \begin{aligned} v &= v_{\infty}-v_0\left(\frac{r}{R_{SF}}\right)^{\gamma}&&\text{for}\ r < R_{W} \\[1em] v &= 0 &&\text{for} \ r \geq R_{W}, \\ \end{aligned} \end{equation} where\)v = v\_-v_0\(represents the velocity at\)R\_SF\(and\[takes positive values. To ensure an inflow, we set the orientation of the velocity field to be positive along the line of sight when positioned between the observer and the source (i.e., opposite the orientation of the outflowing case). This velocity field assumes that accretion begins from rest at some finite distance,\)R_W\(, away from the galaxy. Such a situation is suitable for metal enriched gas that has been thrown out of the galaxy, comes to a halt, and falls back in. Aside from this insight, the exact expression for the velocity field was chosen for analytical simplicity, and we direct the reader to \citealt{Fielding2022} for a discussion on the physics influencing the velocity fields of flows. We assume an arbitrary density field,\)n(r) = n_0(r/R\_SF)\^-\(, for the in-falling medium. The Sobolev approximation is still valid in this context, and we assume photons can only interact locally with the inflow at a single point. Staying consistent with prior works, we will use the normalized units:\)y = v/v_0\(and\)x = v /v_0\(where\)v\(is the projection of\)v\(onto the line of sight. Following the derivation of the outflowing SALT model in Carr et al. (2022, in prep), we seek to identify the surfaces of constant observed velocity,\)\_x\(, in the inflow; however, due to radial symmetry, it will suffice to construct\)\_x\((i.e., the intersection of\)\_x\(with the\)s \]\begin{aligned} \Gamma_x(y) &&\resizebox{0.38\textwidth}{!}{\(= \left([y_{\infty}-y]^{1/\gamma}\left(\frac{x}{y}\right),\left[(y_{\infty}-y)^{2/\gamma}-(y_{\infty}-y)^{2/\gamma}\left(\frac{x}{y}\right)^2\right]^{1/2}\right)\)}\\ &&= (S,\Xi), \end{aligned}\[ where \(S(y)\) and \(\Xi(y)\) refer to the parameterizations of the \(s\) and \(Observe that rays emitted parallel to the line of sight can intersect a surface of constant observed velocity once, twice, or zero times. An example of a surface for which all three scenarios are possible is shown in Figure~\ref{f3}. This issue does not occur in an outflowing velocity field and requires special attention. Consider a continuum ray emitted at a height,\)h\(, above the\)s\(-axis. To determine if this ray will pass through the surface of constant observed velocity,\)\_x\(, we must first find the maximum height,\)(y\_max)\(, reached by\)\_x\(in the\)s \]\begin{aligned} \resizebox{0.41\textwidth}{!}{\(\frac{d\Xi}{dy} = \frac{\gamma x^2y^{-3}[y_{\infty}-y]^{2/\gamma}+(x^2y^{-2}-1)[y_{\infty}-y]^{(2-\gamma)/\gamma}}{-\Xi([y_{\infty}-y]^{(1-\gamma)/\gamma}xy^{-1}+\gamma[y_{\infty}-y]^{1/\gamma}xy^{-2})}\),} \end{aligned}\[ and after minimizing we deduce that \]\begin{aligned} 0 &=& y^3+(\gamma-1)x^2y-\gamma y_{\infty}x^2, \end{aligned}\[ which has the real valued solution \]\begin{aligned} \resizebox{0.41\textwidth}{!}{\(y_{\rm{max}} = \left(-\frac{q}{2}+\left(\frac{q^2}{4}+\frac{p^3}{27}\right)^{1/2}\right)^{1/3}+\left(-\frac{q}{2}-\left(\frac{q^2}{4}+\frac{p^3}{27}\right)^{1/2}\right)^{1/3}\),} \end{aligned}\[ where \(p = (\gamma-1)x^2\) and \(q =-\gamma x^2y_{\infty}\). Thus, if \(\Xi(y_{max}) < h\), then the continuum ray will miss \(\Omega_x\). A shell with intrinsic velocity \(y_{max}\) which intersects \(\Omega_x\) at its maximum is shown in red in Figure [\[f3\]](#f3){reference-type="ref" reference="f3"}. If \(\Xi(y_{\infty}-1) < h < \Xi(y_{max})\), then the continuum ray will intersect \(\Omega_x\) twice. Setting \(\Xi = h\), we deduce the following relation, \]\begin{aligned} \frac{h^2}{(y_{\infty}-y)^{2/\gamma}}=1-\left(\frac{x}{y}\right)^2, \label{intersections} \end{aligned}\[ which has solutions \(y_{h_1}\) and \(y_{h_2}\) corresponding to the intrinsic velocities of the shells intersecting \(\Gamma_x\) at height \(h\). Shells with intrinsic velocities \(y_{h_1}\) and \(y_{h_2}\) for a fixed value of \(h\) are shown in black in Figure [\[f3\]](#f3){reference-type="ref" reference="f3"}. Finally, if \(h < \Xi(y_{\infty}-1)\) the continuum ray will intersect \(\Omega_x\) only once. Putting it all together, we compute the absorption spectrum as follows. We define the integrand, \(\rm{ABS}\), as \]\begin{aligned} \rm{ABS} &=& 2 \pi h (1-e^{-\bar{\tau}_S})|dh/dy|/\pi \\ &=&\resizebox{0.35\textwidth}{!}{\(\frac{2}{\gamma}\left[\frac{x^2}{y^2}(y_{\infty}-y)^{\frac{2-\gamma}{\gamma}}+\frac{\gamma x^2}{y^3}(y_{\infty}-y)^{\frac{2}{\gamma}}-(y_{\infty}-y)^{\frac{2-\gamma}{\gamma}}\right]\)}\nonumber\\ &\times& (1-e^{-\bar{\tau}_S(y)}), \label{SF_abs1} \end{aligned}\[ where \(\bar{\tau}_S(y)\) is defined over the following cases. \]\begin{gathered} \bar{\tau}_S \equiv \begin{cases} \tau_S(y_{h_1})+\tau_S(y_{h_2})&\ \rm{if} \ \Xi(y_{\infty}-1)\leq \Xi(y)< \Xi(y_{\rm{max}}) \\[1em] \tau_S(y) & \ \rm{otherwise}\\ \end{cases} \label{SF_abs2} \end{gathered}\[ and \(\tau_S\) is the Sobolev optical depth defined as \]\begin{aligned} \tau_S &=& \frac{\pi e^2}{mc} f_{lu}\lambda_{lu} n_l(r)\left[1-\frac{n_ug_l}{n_lg_u}\right] \frac{r/v}{1+\sigma {\cos^2{\phi}}}, \label{Castor} \end{aligned}\[ where \(f_{ul}\) and \(\lambda_{ul}\) are the oscillator strength and wavelength, respectively, for the \(ul\) transition, \(\sigma = \frac{d \ln(v)}{d\ln(r)}-1\), and \(\phi\) is the angle between the velocity and incoming photon ray. All other quantities take their usual definition. Writing Equation [\[Castor\]](#Castor){reference-type="ref" reference="Castor"} in terms relevant to the SALT model, and by neglecting stimulated emission (i.e., \(\left[1-\frac{n_ug_l}{n_lg_u}\right] =1\)), we get \]\begin{aligned} \tau_S(y) = \tau_0 \frac{(y_{\infty}-y)^{(1-\delta)/\gamma}}{y+[\gamma(y_{\infty}-y)-y](x/y)^2]}, \label{inflow_tau} \end{aligned}\[ where \]\begin{aligned} \tau_0 = \frac{\pi e^2}{mc} f_{lu}\lambda_{lu} n_0 \frac{R_{SF}}{v_0}. \end{aligned}\[ Note that we are assuming that the population of the excited state is negligible (\(n_u\sim0\)), and are therefore excluding the possibility of emission from the inflow and are focusing exclusively on continuum scattering. We will consider an emission component in a future paper and extend the range of our model to include radio observations and the interpretation of the inverse P Cygni profiles frequently observed in the spectra of cool atomic and molecular inflows (e.g., @Gonzalez-Alfonso2012 [@Falstad2015; @Herrera-Camus2020]). Finally, if \(\Xi(y_{max})\leq1\), then the normalized absorption profile becomes: \]\begin{aligned} \resizebox{0.4\textwidth}{!}{\( \frac{I_{\rm{abs,red}}}{I_0} = \frac{F(x)}{F_c(x)}-\frac{F(x)}{F_c(x)}\int_{x}^{\rm{min}(y_{max},y_{\infty}-1)}\rm{ABS}(y) \ dy,\)} \end{aligned}\[ where \(F(x)/F_c(x)\) is the flux at \(x\) normalized by the continuum flux. If \(\Xi(y_{max})>1\), then the normalized absorption profile becomes \]\begin{aligned} \frac{I_{\rm{abs,red}}}{I_0}= \frac{F(x)}{F_c(x)}-\frac{F(x)}{F_c(x)} \int_{x}^{y_h}\rm{ABS}(y) \ dy, \end{aligned}\[ where \(y_h = \rm{min}(y_{h_2}(1),y_{h_1}(1))\), and \(y_{h_2}(1)\) and \(y_{h_1}(1)\) are the solutions of equation [\[intersections\]](#intersections){reference-type="ref" reference="intersections"} for \(h=1\). We can compute the emission component of the inflowing SALT model using the same general procedure used in the outflowing case (see Carr et al. 2022, in prep). To this end, we think of \(\Gamma_x(y)\) as a homotopy (i.e., a continuous map between surfaces of constant observed velocity), and compute the amount of energy absorbed by each surface that lies within the shell as we move in observed velocity space from \(x = y\cos{\Theta_C}\) to \(x = y\) where \(\Theta_C = \arcsin{\left([y_{\infty}-y]^{-1/\gamma}\right)}\). Similar to the absorption case, we must be careful to identify which rays intersect \(\Omega_x(y)\) before reaching the shell. With this in mind, we compute the total energy absorbed by a shell at velocity \(y\) in the inflow as \]\begin{aligned} &&\hspace*{-1cm}L_{\rm{shell}} = \nonumber \\ &&\hspace*{-1cm}\resizebox{0.43\textwidth}{!}{\( \int_{y\cos{\Theta_C}}^{y}\frac{2L(x)}{\gamma}\left[\frac{x^2}{y^2}(y_{\infty}-y)^{\frac{2-\gamma}{\gamma}}+\frac{\gamma x^2}{y^3}(y_{\infty}-y)^{\frac{2}{\gamma}}-(y_{\infty}-y)^{\frac{2-\gamma}{\gamma}}\right] \rm{SF} dx,\)} \end{aligned}\[ where \(L(x)\) is the total energy emitted by the shell at resonance with material moving at observed velocity, \(x\). We refer to SF as the Sobolev factor and define it for the following cases. If \(y \geq y_{max}\), then \]\begin{aligned} \rm{SF} \equiv-[1-e^{-\tau_S(y)}]; \label{neg_change} \end{aligned}\[ otherwise, \]\begin{gathered} \resizebox{0.48\textwidth}{!}{\( \rm{SF} \equiv \begin{cases} e^{-\tau_S(y_{h_2})}[1-e^{-\tau_S(y_{h_1})}]& \ \rm{if} \ \Xi(y_{\infty}-1)\leq \Xi(y)< \Xi(y_{\rm{max}}) \\[1em] 1-e^{-\tau_S(y)} & \ \rm{otherwise,}\\ \end{cases} \)} \label{SF_em} \end{gathered}\[ where \(\tau_S\) is given by Equation [\[inflow_tau\]](#inflow_tau){reference-type="ref" reference="inflow_tau"}. The leading negative sign in Equation [\[neg_change\]](#neg_change){reference-type="ref" reference="neg_change"} accounts for the sign change in \(dh\) when \(y>y_{max}\). Now that we know the total energy absorbed by the shell, the reemission of energy in terms of the observed velocities can be computed exactly as in the outflowing case, albeit for a change in orientation (see Carr et al. 2022, in prep). We compute the normalized red emission profile as \]\begin{aligned} &&\hspace*{-.9cm}I_{\rm{em,red}}/I_0 = \nonumber \\ &&\hspace*{-.9cm}\resizebox{0.43\textwidth}{!}{\(\int_{x}^{y_{\infty}-1} \frac{F(x^{\prime})}{F(x)}\frac{dy}{2y} \int_{y\cos{\Theta_C}}^{y}\frac{2}{\gamma}\left[\frac{{x^{\prime}}^2}{y^2}(y_{\infty}-y)^{\frac{2-\gamma}{\gamma}}+\frac{\gamma {x^{\prime}}^2}{y^3}(y_{\infty}-y)^{\frac{2}{\gamma}}-(y_{\infty}-y)^{\frac{2-\gamma}{\gamma}}\right] \rm{SF} dx^{\prime},\)} \end{aligned}\[ where \(SF\) is defined for the cases given above. Similar to the outflowing case, we account for the occultation effect on the blue emission profile by removing all photons reemitted from behind the source at heights \(h = \Xi < 1\). To this end, we define the scale factor \(\Theta_{\rm{blue}} \equiv \Theta(\Xi-1)\) such that \]\begin{gathered} \Theta \equiv \begin{cases} 1 & \rm{if \ } \ \Xi > 1 \\[1em] 0 & \rm otherwise.\\ \end{cases} \end{gathered}\[ The normalized blue emission profile becomes \]\begin{aligned} &&\hspace*{-.9cm}I_{\rm{em,blue}}/I_0 = \nonumber \\ &&\hspace*{-.9cm}\resizebox{0.43\textwidth}{!}{\(\int_{x}^{y_{\infty}-1} \Theta_{\rm{blue}}\frac{F(x^{\prime})}{F(x)}\frac{dy}{2y} \int_{y\cos{\Theta_C}}^{y}\frac{2}{\gamma}\left[\frac{{x^{\prime}}^2}{y^2}(y_{\infty}-y)^{\frac{2-\gamma}{\gamma}}+\frac{\gamma {x^{\prime}}^2}{y^3}(y_{\infty}-y)^{\frac{2}{\gamma}}-(y_{\infty}-y)^{\frac{2-\gamma}{\gamma}}\right] \rm{SF} dx^{\prime}.\)} \end{aligned}\[ The technique developed by to account for the effects of a biconical outflow geometry still holds and can be applied to the line profile in the obvious way; however, rays which can interact with a surface of constant observed velocity more than once must be handled carefully since the geometry of the flow may be different at each interaction. When this is the case, we can approximate the expression for \(SF\) in Equation [\[SF_em\]](#SF_em){reference-type="ref" reference="SF_em"} as \]\begin{aligned} f_g(y_{h_1})[I(y_{h_2})-I(y_{h_2})e^{-\tau_S(y_{h_1})}], \label{new_g} \end{aligned}\[ where \]\begin{aligned} I = 1-f_g(y_{h_2})[1-e^{-\tau_S(y_{h_2})}], \end{aligned}\(\) and \(f_g\) is the geometric factor as defined by. Likewise, the Sobolev factor defined in Equations [\[SF_abs1\]](#SF_abs1){reference-type="ref" reference="SF_abs1"} & [\[SF_abs2\]](#SF_abs2){reference-type="ref" reference="SF_abs2"} will also need to change to the expression in Equation [\[new_g\]](#new_g){reference-type="ref" reference="new_g"}, but with the addition of the term, \(f_g(y_{h_2})[1-e^{-\tau_S(y_{h_2})}]\). The techniques developed by to account for a dusty CGM, a limiting observing aperture, and holes in the outflow still hold and can be applied in the obvious way. Lastly, the multiple scattering procedure of used to account for resonant and fluorescent reemission still applies. The absorption, emission, and full line profile or inverse P Cygni profile for a spherical inflow are shown in Figure [\[f4\]](#f4){reference-type="ref" reference="f4"}. The most striking difference when compared to the traditional line profiles of outflows is that absorption now occurs to the right of systemic velocity or at positive observed velocities using our orientation. The emission profile is now more sharply peaked with a wider base compared to that of an outflow. This is because, in our model, the highest density material near the source is moving at the highest velocities-opposite of the outflowing case-thus the majority of energy is now spread over a larger observed velocity range; however, absorption (and reemission) can still occur in shells with low intrinsic velocities all the way to zero intrinsic velocity (outflows are cut off at the launch velocity) and accumulate emission into a sharp peak. # Results In this section, we explore the parameter space of the inflowing SALT model by generating spectra for a variety of distinct physically motivated scenarios for the emergence of inflows in galactic systems. In other words, we explore the range of applicability for detecting galactic inflows using down-the-barrel spectroscopy-an area where modeling has been especially lacking (see @Faucher2017). We consider the case of pure inflows-both spherical and with partial covering fractions-as well as galactic fountains. In our fiducial model, we assume \(v_{\infty} = 200 \ \rm{km} \ {s}^{-1}\) and a column density ranging from \(14 \leq \log{(N \ [\rm{cm^{-2}}])} \leq 15\). These values were chosen to be in agreement with and . For the remaining parameters, we assume \(\gamma = 0.5\), \(\delta = 1.5\), \(\kappa = 0.0\) (i.e., dust free), \(v_0 = 15 \ \rm{km} \ {s}^{-1}\), and \(R_{AP} > R_W\) (i.e., flow is fully captured by the observing aperture) while \(\alpha\), \(\psi\), and \(f_c\) vary. For the chosen velocity field, a value of \(\gamma \leq 1\) ensures that the acceleration (\(\sim vdv/dr\)) of the inflow increases monotonically with decreasing radius, and a value of \(\delta < 2\) ensures that the mass inflow rate (\(\sim r^2nv\)) will start to decrease with decreasing radius some finite distance from the source. The latter can be expected since material is likely to be stripped from the flow during infall, and the ionizing flux should increase as the material moves closer to the galaxy thereby increasing the ionization state. ## Pure Inflows By far the most convincing evidence for inflows in absorption line studies is the direct detection of inverse P Cygni profiles (e.g., @Rupke2021). These line profiles are characterized by having an overall net blueshift in emission and an overall net redshift in absorption. The latter of which is a stark quality unique to the spectra of inflowing gas; however, to declare the detection of an inflow, the redshifted absorption must reach observed velocities exceeding the limitations of the spectral resolution of the study. Furthermore, the absorption must be asymmetric with respect to line center (e.g., @Martin2012) to distinguish the inflow from possible ISM absorption or thermal/turbulent line broadening (Carr et al. 2022, in prep). Here we investigate which parameter ranges favor detections of inflows in absorption for cases of pure spherical inflows and inflows with covering fractions less than unity. We examine the effects of varying the power laws of both the density field (left column) and velocity field (right column) on the line profile of a spherical inflow in Figure [\[f5\]](#f5){reference-type="ref" reference="f5"}. We have chosen to model the Fe II \(2382\)Å resonant transition which was used in the study by to identify inflows and outflows in galaxies at redshifts \(0.4<z<1.4\) as an example. All atomic data for the lines used in this paper is provided in Table [\[tab:atomicdata\]](#tab:atomicdata){reference-type="ref" reference="tab:atomicdata"}. In each column, we show how the absorption (top panel), emission (middle panel), and full inverse P Cygni profile (bottom panel) vary as functions of \(\delta\) (left column) and \(\gamma\) (right column) for fixed column density, \(\log{(N \ [\rm{cm}^{-2}])} = 15\). In regards to density, the amount of absorption at low observed velocities increases with decreasing \(\delta\). This is because for steep density fields, most absorption is happening near the source at high observed velocities. When the density field becomes shallower, however, more absorption can occur at larger radii or at lower observed velocities. The spectrum varies significantly less over our chosen range for \(\gamma\), but absorption does appear to increases at lower observed velocities for increasing \(\gamma\). This occurs because the size of the inflow (i.e., \(R_W = R_{SF}(v_{\infty}/v_0)^{1/\gamma}\)) increases with decreasing \(\gamma\). Therefore, the bulk of material at low velocity is moving further away from the galaxy at lower density. We can conclude that steeper density and shallower velocity fields yield better conditions for identifying inflows. Under these conditions, most absorption will occur near the maximum observed velocity of the flow creating a more asymmetric (with regards to systemic velocity) absorption profile. In Figure [\[f6\]](#f6){reference-type="ref" reference="f6"}, we break the assumption of spherical symmetry and consider biconical inflows. These are the same geometrical models used by, but are now inflowing. We mention that this is only an example, and note that the SALT model can just as easily be used in the case of a single cone geometry. In the left panel of Figure [\[f6\]](#f6){reference-type="ref" reference="f6"}, we vary the opening angle, \(\alpha\), of an inflow oriented along the line of sight. As is the case with outflows (see @Carr2018), there is less reemission for smaller opening angles. This includes reducing the amount of red emission infilling[^1], which enhances the increase of absorption for smaller opening angles. The opposite effect occurs when increasing the orientation angle, \(\psi\), which is shown for an inflow with an opening angle \(\alpha = 30^{\circ}\) in the right panel of Figure [\[f6\]](#f6){reference-type="ref" reference="f6"}. As \(\psi\) increases, the inflowing gas is moved away from the line of sight, which results in less absorption since there is less material between the observer and the source. Coincidently, more and more emission appears near systemic or zero observed velocity, reflecting the position of the inflow with respect to the observer. The importance of this example is to demonstrate that when spherical symmetry is broken either the absorption or emission equivalent width can dominate based on the orientation of the inflow with respect to the observer. In regards to detecting inflows, a red shifted absorption profile is still a dead give away for inflowing gas; however, a pure emission profile could be mistaken for outflowing gas. The only difference between emission profiles that arise from outflows and inflows, is that, in the case of inflows, they are much more narrow peaked with wider bases[^2]. In this instance, fitting these lines with a single Gaussian-as is typically done in more traditional modeling techniques-may be difficult. More than likely fitting these emission lines would require two Gaussians (one for the narrow component near systemic velocity and the second for the wider base) and be misinterpreted as representing two kinematically distinct components. Thus the necessity to fit emission profiles with more than one Gaussian could be evidence for inflowing gas. ## Outflow and Inflows: Galactic Fountains Realistically, both accretion and feedback occur simultaneously in galaxies-for example, during gas recycling when material expelled by the galaxy is returned via gravity. This is a fair assumption given the high detection rate of outflows and the necessity for inflows brought on by simulations. In fact, it has been suggested that the presence of outflows can mask inflows in spectral lines preventing the latter's detection (e.g., @Martin2012). This can foreseeably occur if the symmetric, with respect to line center, emission profile of an outflow fills in the weaker absorption feature of an inflow. Since numerical simulations show that outflows typically emerge in the direction perpendicular to the face of the disc while inflows move in the plane of the disc, orientation should also play a factor. In this section, we attempt to explore which conditions favor the detection of inflows in galactic fountains (i.e., galactic systems with both inflows and outflows). To prevent the masking scenario mentioned above, we have chosen to model the Fe II 2343Å line. This line has two strong fluorescent channels at wavelengths 2365Å and 2381Å, and will therefore incur very little resonant emission (see @Scarlata2015 for a detailed description of the role fluorescence plays in resonant scattering). In addition, ignoring the emission component will also allow us to much more easily model the simultaneous outflowing and inflowing of a single ionic species in SALT. In fact, under these conditions we can compute the spectrum from each model (inflow and outflow) independently and take the final spectrum as the superposition; otherwise, more modeling would be necessary to account for photons which are scattered by both the outflow and inflow. We also note that this situation can be enforced observationally by limiting the portion of the outflow captured by the observing aperture. By limiting the field of view to exclude the outflow except along the line of sight, one can effectively eliminate the entire emission component of a line profile (see @Scarlata2015 for justification). This technique is feasible with IFU spectroscopy where one can obtain spectra from sub images. We explore how the line profile of a galactic fountain changes with orientation in Figure [\[f7\]](#f7){reference-type="ref" reference="f7"}. We show both a medium (\(50 \ \rm{km} \ \rm{s}^{-1}\)) and a low (\(120 \ \rm{km} \ \rm{sec}^{-1}\)) resolution spectra which has been smoothed with a Gaussian kernel. The latter is about the high resolution limit of the study by. In this setup, we are assuming that the outflows and inflows occupy separate regions of the CGM with inflows moving perpendicular to a biconical outflow. Specifically, the models are made by generating the spectrum of a spherical inflow, removing the contribution of a biconical inflow from that spectrum, and then replacing it with a spectrum produced by a biconical outflow refilling that space. The remaining volume filled by inflowing gas is roughly the shape of a torus. Leaving such a large volume for the inflows represents a best case scenario for observing them. As expected, the orientation (compare the top two profiles) strongly affects our ability to detect an inflow at all resolutions: If there is no gas moving along the line of sight then we cannot detect any redshifted absorption, and thus have no possible way to identify an inflow given the weak emission component for this line. In the bottom panel, the low resolution spectrum of both the outflow and inflow appears to have merged together making it impossible to distinguish the inflow from another absorption feature such as absorption occurring in the ISM. This appears to be another form of masking by the outflow since this would not be the case if the outflow were absent (see the blue profile). There does appear to be hope of identifying the inflow at \(50 \ \rm{km} \ \rm{s}^{-1}\) resolution, however, since the asymmetric redshifted absorption feature becomes visible. In the case of a true fountain, where warm (\(5050\rm{K} < T < 2\times 10^4\rm{K}\)) ejected gas doesn't have enough energy to escape the gravitational potential well, large regions of the CGM can have both an inflowing and outflowing component (see @Kim2018). We attempt to model such situations in Figure [\[f8\]](#f8){reference-type="ref" reference="f8"}, where we show various outflows with an inflowing gas component occupying the same general volume. For each scenario, we have chosen covering fractions for the outflows, \(f_{c,o}\), and inflows, \(f_{c,i}\), such that \(f_{c,o} + f_{c,i} = 1\) and \(f_{c,i} <f_{c,o}\) with the order representing the fact that inflows are typically expected to have smaller covering fractions than outflows. Once again, we are not able to identify inflows at the \(120 \ \rm{km} \ \rm{sec}^{-1}\) resolution level given our model constraints, but are able to at the \(50 \ \rm{km} \ \rm{s}^{-1}\) level. This strongly suggests that the number of inflows detected in large low resolution surveys is undercounted, and can be improved by moving to higher, but still obtainable resolutions by active instruments. # Discussion and Conclusions While the detection rate for accretion or galactic inflows is much lower than that of outflows in absorption line studies (see @Martin2012 and @Rubin2014), the important role inflows play in models of galaxy formation suggests that they should be just as common as outflows. This fact implies that the effects of inflows on spectra lines are either weak (i.e., inflows have low covering fractions and/or low column densities) or hidden (i.e., the effects of inflows are masked by outflows and/or are mistaken for the ISM). In regards to the latter, given the available constraints on inflows, our models suggest that we should be able to resolve the properties of inflows with observations reaching spectral resolution of \(\approx 50\ \rm{km} \ \rm{sec}^{-1}\) or \(R=6000\). In addition to high spectral resolution, the detection of outflows/inflows requires spectra with high signal-to-noise ratio in the continuum[^3]. The COS spectrograph on board of the Hubble Space Telescope provides access to the required spectral resolution, but has no multiplexing capabilities, and is limited in the fluxes that it's able to observe. Observing large samples of objects at the required resolution and SNR is thus a challenging task. Future space-based missions, such as the large infrared/optical/ultraviolet telescope recommended by the Astro2020 Decadal Survey, will substantially improve the situation for low-redshift galaxies. For galaxies at \(z>0.6\) some of the resonant spectral features are redshifted in the optical and can be observed from the ground. A number of spectrographs on large-aperture telescopes provide both the resolution and the mutiplexing capability that allow the study of statistical samples of galaxies in reasonable time frames. Examples include FLAMES, the multi-object, intermediate and high resolution spectrograph of the Very Large Telescope, and the IMACS multi-object spectrograph on the 6.5m Magellan telescope. Additionally, focusing on ionic transition lines with strong fluorescent channels which naturally have less resonant emission (such as the Fe II 2343Å transition studied in this work) will mitigate the effect outflows have on masking inflows. The SALT model presented in this work will be invaluable in constraining the properties of gas inflows and outflows identified in high spectral-resolution data.
{'timestamp': '2022-09-30T02:05:34', 'yymm': '2209', 'arxiv_id': '2209.14485', 'language': 'en', 'url': 'https://arxiv.org/abs/2209.14485'}
null
null
# Introduction {#Introduction} Recently, Federated Learning (FL) is known as a novel distributed learning methodology for enhancing communication efficiency and ensuring privacy in traditional centralized one. However, the most challenge of this method for client models is non-independent and identically distributed (non-IID) data, which leads to divergence into unknown directions. Inspired by this, various works on handling non-IID were proposed in . However, these works mainly rely on arbitrary configurations without thoroughly understanding the models' behaviors, yielding low-efficiency results. Aiming to fulfil this gap, in this work, we propose a new hierarchical FL framework using information theory by taking a deeper observation of the model's behaviors, and this framework can be realized for various FL systems with heterogeneous data. In addition, our proposed framework can trigger the FL system to be more scalable, controllable, and accessible through hierarchical architecture. Historically, anytime a new segment (i.e., a new group of clients) is integrated into the FL network, the entire network must be retrained from the beginning. Nevertheless, with the assistance of LKD, the knowledge is progressively transferred during the training process without information loss owing to the empirical gradients towards the newly participated clients' dataset. The main contributions of the paper are summarized as follows. **(1)** We show that conventional FLs performance is unstable in heterogeneous environments due to non-IID and unbalanced data by carefully analyzing the basics of Stochastic Gradient Descent (SGD). **(2)** We propose a new multi-teacher distillation model, Label-Driven Knowledge Distillation (LKD), where teachers can only share the most certain of their knowledge. In this way, the student model can absorb the most meaningful information from each teacher. **(3)** To trigger the scalability and robustness against non-IID data in FL, we propose a new hierarchical FL framework, subbed Full-stack Federated Learning (F2L). Moreover, to guarantee the computation cost at the global server, F2L architecture integrates both techniques: LKD and FedAvg aggregators at the global server. To this end, our framework can do robust training by LKD when the FL process is divergent (i.e., at the start of the training process). When the training starts to achieve stable convergence, FedAvg is utilized to reduce the server's computational cost while retaining the FL performance. **(4)** We theoretically investigate our LKD technique to make a brief comparison in terms of performance with the conventional Multi-teacher knowledge distillation (MTKD), and in-theory show that our new technique always achieves better performance than MTKD. **(5)** We validate the practicability of the proposed LKD and F2L via various experiments based on different datasets and network settings. To show the efficiency of F2L in dealing with non-IID and unbalanced data, we provide a performance comparison and the results show that the proposed F2L architecture outperforms the existing FL methods. Especially, our approach achieves comparable accuracy when compared with FedAvg () and higher \(7-20\%\) in non-IID settings. # Related Work {#sec:related-works} ## Federated Learning on non-IID data {#sec:fl-non-iid} To narrow the effects of divergence weights, some recent studies focused on gradient regularization aspects. By using the same conceptual regularization, the authors in, and introduced the FedProx, FedDyne, and FedU, respectively, where FedProx and FedDyne focused on pulling clients' models back to the nearest aggregation model while FedU's attempted to pull distributed clients together. To direct the updated routing of the client model close to the ideal server route, the authors in proposed SCAFFOLD by adding a control variate to the model updates. Meanwhile, to prevent the aggregated model from following highly biased models, the authors in rolled out FedNova by adding gradient scaling terms to the model update function. Similar to, the authors in launched the WALF by applying Wasserstein metric to reduce the distances between local and global data distributions. However, all these methods are limited in providing technical characteristics. For example, demonstrated that FedProx and FedDyne are ineffective in many cases when using pullback to the globally aggregated model. Meanwhile, FedU and WAFL have the same limitation on making a huge communication burden. Aside from that, FedU also faces a very complex and non-convex optimization problem. Regarding the aspect of knowledge distillation for FL, only the work in proposed a new generative model of local users as an alternative data augmentation technique for FL. However, the majority drawback of this model is that the training process at the server demands a huge data collection from all users, leading to ineffective communication. Motivated by this, we propose a new FL architecture that is expected to be more elegant, easier to implement, and much more straightforward. Unlike, we utilize the knowledge from clients' models to extract good knowledge for the aggregation model instead of using model parameters to reduce the physical distance between distributed models. Following that, our proposed framework can flexibly handle weight distance and probability distance in an efficient way, i.e., \(\Vert p^k(y=c)-p(y=c) \Vert\) (please refer to Appendix [\[appendix:SGDissues\]](#appendix:SGDissues){reference-type="ref" reference="appendix:SGDissues"}). ## Multi-Teacher Knowledge Distillation {#sec:multi-teacher-knowledge-distillation} MTKD is an improved version of KD (which is presented in Appendix [\[appendix:knowledge-distillation\]](#appendix:knowledge-distillation){reference-type="ref" reference="appendix:knowledge-distillation"}), in which multiple teachers work cooperatively to build a student model. As shown in, every MTKD technique solves the following problem formulation: \[\begin{aligned} \textbf{P1}:\min \mathcal{L}_m^\textit{KL} = \sum^R_{r=1} \sum^C_{l=1}\hat{p}(l|\boldsymbol{X},\boldsymbol{\omega}^r,T)\log{\frac{\hat{p}(l|\boldsymbol{X},\boldsymbol{\omega^r},T)}{\hat{p}(l|\boldsymbol{X},\boldsymbol{\omega}^g,T)}}, \label{eq:general-mtkd} \end{aligned}\] here, \(r\in \{R\}\) are the teachers' indices. By minimizing **P1**, the student \(\hat{p}^g\) can attain knowledge from all teachers. However, when using MTKD, there are some problems in extracting the knowledge distillation from multiple teachers. In particular, the process of distilling knowledge in MTKD is typically empirical without understanding the teacher's knowledge (i.e., aggregating all KL divergences between each teacher and the student). Therefore, MTKD is unable to exploit teachers' detailed predictions for the KD (e.g.,, ,, , ). Another version of MTKD, KTMDs can only apply for a better teachers to distill knowledge (e.g.,, ,, ). For example, as provided in, the student only selects the best teacher to operate the knowledge distillation. Visually, this technique is the same as the way of selecting a teacher among a set of teachers to carry out a single teacher distillation. Therefore, the student's performance is always bounded by the best teacher's performance. Another popular research direction in MTKD is to leverage the advantage of the gap between teachers' hidden class features. However, owing to the lack of explanatory knowledge in teachers' hidden layers, the method in cannot obtain better student performance when compared to their teachers. Generally, current MTKD techniques cannot extract good knowledge from different customer models, leading to weight divergence in FL. # Full-stack Federated Learning {#sec:IV-ProposedAlgorithm} ## The F2L framework {#sec:IV-C-MultiteacherKD} The main objective of our work is to design a hierarchical FL framework, in which a global server manages a set of distinct regional servers. Utilizing hierarchical FL, our proposed algorithm can achieve computation and computation efficiency. The reason is that Hierarchical FL makes the clients to train sectionally before making the global aggregation. Consequently, FL inherits every advantage from mobile edge intelligence concept over traditional non-hierarchical networks (e.g., communication efficiency, scalability, controlability). At the end of each knowledge-sharing episode, the regions (which are supervised by regional servers) cooperate and share their knowledge (each region functions as a distinguished FL system, with a set amount of communication rounds per episode). In each episode, each region randomly selects a group of clients from the network to carry out the aggregation process (e.g., FedAvg, FedProx); therefore, each region functions as a small-scale FL network. As a result, there are always biases in label-driven performance by applying random sampling on users per episode (see Appendix [\[appendix:proof-on-sampling-and-data-distribution\]](#appendix:proof-on-sampling-and-data-distribution){reference-type="ref" reference="appendix:proof-on-sampling-and-data-distribution"}). Given the random sampling technique applied to the regional client set, the regions always have different regional data distributions. Consequently, various label-driven performances of different teachers might be achieved. At the global server, our goal is to extract good performance from regional teachers while maintaining the salient features (e.g., understanding of the regional data distributions) of all regions. As a result, we can capture useful knowledge from diverse regions in each episode using our proposed innovative knowledge distillation technique (which is briefly demonstrated in Section [3.2](#sec:IV-D-LabelDrivenKD){reference-type="ref" reference="sec:IV-D-LabelDrivenKD"}). We train the model on the standard dataset on the central server to extract knowledge from multiple teachers into the global student model. The preset data pool on the server \(\mathcal{S}\) is used to verify the model-class reliability and generate pseudo labels. The system model is illustrated in Fig. [\[fig:hierarchicalFL\]](#fig:hierarchicalFL){reference-type="ref" reference="fig:hierarchicalFL"}, and thoroughly described in Appendix [\[sec:system-model\]](#sec:system-model){reference-type="ref" reference="sec:system-model"}. The pseudo algorithm for F2L is demonstrated in Algorithm [\[alg:F2L\]](#alg:F2L){reference-type="ref" reference="alg:F2L"}. When the FL process suffers from client-drift (i.e., the distribution of label-driven accuracies of different regions have large variance), the F2L framework applies LKD to reduce the class-wise performance gaps between regions (i.e., the regions with better performance on a particular class share their knowledge to regions with low performance). As a result, the FL network achieves a significantly faster convergence when utilizing LKD (which is intensively explained in Section [3.2](#sec:IV-D-LabelDrivenKD){reference-type="ref" reference="sec:IV-D-LabelDrivenKD"}.) for the global aggregation process. When the generalization gap between regions is considerably reduced (i.e., \(\Vert\max_r{\beta^c_r}-\min_r{\beta^c_r}\Vert \leq \epsilon\)), our F2L network becomes vanilla FL to reduce computation and communication costs. To this end, our method can achieve computation efficiency while showing robustness to the non-IID data in the network. Additionally, whenever a new set of clients are added into the network and makes positive contributions to the FL system (e.g., \(\Vert\max_r{\beta^c_r}-\min_r{\beta^c_r}\Vert \geq \epsilon\) where \(\Vert\max_r{\beta^c_r}\Vert\) a corresponding to the new region's performance) the LKD aggregator can be switched back to improve the FL system's performance over again. ## Label-driven Knowledge Distillation {#sec:IV-D-LabelDrivenKD} To extract knowledge from multiple teachers to the global student model, we train the model on the standard dataset on the central server. The preset data pool on the server \(\mathcal{S}\) is used to verify the model-class reliability and generate pseudo labels. In our work, the MTKD process executes two main tasks: (1) extracting the teachers' knowledge and (2) maintaining the students' previous performance. To comprehend the LKD method, we first revisit the conventional MTKD, where the probabilistic output is calculated by model \(\boldsymbol{\omega}\) on \(x_i\), the prediction label \(c\) is \(\hat{p}(l|x_i,\boldsymbol{\omega},T,c)\) and its relation is: \[\begin{aligned} \label{LKD-surrogateOutput} \hat{p}(l|x_i,\boldsymbol{\omega},T,c) = \begin{cases} \hat{p}(l|x_i,\boldsymbol{\omega},T), & \text{if } \text{argmax}\left[ \hat{p}(l|x_i,\boldsymbol{\omega},T)\right] = c, \\ 0, & \text{otherwise}. \end{cases} \end{aligned}\] On the one hand, we aim to transfer knowledge from different regional models to the global one. Inspired by, we use the Kullback--Leibler (KL) divergence between each regional teacher and the global logits as a method to estimate the difference between two models' performance. The relationship is expressed as follows: \[\begin{aligned} \label{LKD-TeaStu-Loss-Weighted} \mathcal{L}_r^\textit{KL} = \sum^C_{c=1} &\beta^c_r \sum^{S^r_c}_{i=1} \sum^C_{l=1} \hat{p}^r(l|x_i,\boldsymbol{\omega}^r,T,c) \times\log{\frac{\hat{p}^r(l|x_i,\boldsymbol{\omega}^r,T,c)}{\hat{p}^g(l|x_i,\boldsymbol{\omega}^g,T,c)}}, \end{aligned}\] where \(S\) is the number of samples of the fixed dataset \(\mathcal{S}\) on the server. \((\boldsymbol{X}^r_\text{alg}, \boldsymbol{Y}^r_\text{alg})\) is the dataset which is pseudo labeled and aligned by regional model \(r\) and \((\boldsymbol{X}^r_\text{alg}[c], \boldsymbol{Y}^r_\text{alg}[c])\) represents the set of data with size of \(S_c^r\) labeled by the model \(r\) as \(c\). Although the same preset dataset is utilized on every teacher model, the different pseudo labeling judgments from different teachers lead to the different dataset tuples. The process of identifying \(S_c^r\) is demonstrated in Algorithm [\[alg:L-SampleAlign\]](#alg:L-SampleAlign){reference-type="ref" reference="alg:L-SampleAlign"}. Because the regional models label on the same dataset \(S\), we have \(\sum_{c=1}^C S^r_c = S\) for all regional models. \(D_\textit{KL}^c(\hat{p}^r||\hat{p}^g)\) is the \(c\) label-driven KL divergence between model \(r\) and model \(g\). On the other hand, we aim to guarantee that the updated global model does not forget the crucial characteristics of the old global model. Hence, to measure the divergence between the old and the updated model, we introduce the following equation: \[\begin{aligned} \label{LKD-OldNew-Loss-Weighted} \mathcal{L}_{\boldsymbol{\omega}_\textit{upd}}^\textit{KL} = \sum^C_{c=1} &\beta^c_{\boldsymbol{\omega}_\textit{old}} \sum^{S^r_c}_{i=1} \sum^C_{l=1} \hat{p}^g(l|x_i,\boldsymbol{\omega}^g_\textit{old},T,c) \times\log{\frac{\hat{p}^g(l|x_i,\boldsymbol{\omega}^g_\textit{old},T,c)}{\hat{p}^g(l|x_i,\boldsymbol{\omega}^g_\textit{new},T,c)}}, \end{aligned}\] where \(\boldsymbol{\omega}_\textit{old}\) is the old parameters set of the global model which is distilled in the last episode of F2L. More details about the label-driven knowledge distillation are discussed in Appendix [\[appendix:labeldriven-knowledgedistillation\]](#appendix:labeldriven-knowledgedistillation){reference-type="ref" reference="appendix:labeldriven-knowledgedistillation"}. To compare the performance between LKD and MTKD, we consider the following assumption and lemmas: *Proof:* The proof is provided in Appendix [\[appendix:lemma-1\]](#appendix:lemma-1){reference-type="ref" reference="appendix:lemma-1"}. *Proof.* The proof can be found in Appendix [\[appendix:relationship-accuracy-variance\]](#appendix:relationship-accuracy-variance){reference-type="ref" reference="appendix:relationship-accuracy-variance"}. *Proof*: For the complete proof see Appendix [\[appendix:labeldriven-knowledgedistillation-analysis\]](#appendix:labeldriven-knowledgedistillation-analysis){reference-type="ref" reference="appendix:labeldriven-knowledgedistillation-analysis"}. Given Theorems [\[theorem:labeldriven-knowledgedistillation-analysis\]](#theorem:labeldriven-knowledgedistillation-analysis){reference-type="ref" reference="theorem:labeldriven-knowledgedistillation-analysis"} and [\[theorem:labeldriven-knowledgedistillation-analysis-mean\]](#theorem:labeldriven-knowledgedistillation-analysis-mean){reference-type="ref" reference="theorem:labeldriven-knowledgedistillation-analysis-mean"}, we can prove that our proposed LKD technique can consistently achieve better performance than that of the conventional MTKD technique. Moreover, by choosing the appropriate LKD allocation weights, we can further improve the LKD performance over MTKD. Due to space limitation, we defer the proof to Appendix [\[appendix:labeldriven-knowledgedistillation-analysis-mean\]](#appendix:labeldriven-knowledgedistillation-analysis-mean){reference-type="ref" reference="appendix:labeldriven-knowledgedistillation-analysis-mean"}. ## Class Reliability Scoring The main idea of class reliability variables \(\beta^c_r\), \(\beta^c_{\boldsymbol{\omega}_\textit{old}}\) in LKD is to weigh the critical intensity of the specific model. Therefore, we leverage the attention design from to improve the performance analysis of teachers' label-driven. For regional models with disequilibrium or non-IID data, the teachers only teach the predictions relying upon their specialization. The prediction's reliability can be estimated by leveraging the validation dataset on the server and using the function under the curve (AUC) as follows: \[\label{LKD-teacher_weight} \begin{split} \beta^c_r = \frac{\text{exp}(f_\textit{AUC}^{c,r} T_{\boldsymbol{\omega}})}{\sum^R_{r=1}\text{exp}(f_\textit{AUC}^{c,r} T_{\boldsymbol{\omega}} )}, \end{split}\] where \(f^{c,r}_\text{AUC}\) denotes the AUC function on classifier \(c\) of the regional model \(r\). Since AUC provides the certainty that a specific classifier can work on a label over the rest, we use the surrogate softmax function to weigh the co-reliability among the same labeling classifiers on different teacher models. For simplicity, we denote \(\beta^c_{\boldsymbol{\omega}_\textit{old}}\) as the AUC on each labeling classifier: \[\label{LKD-oldModel_weight} \begin{split} \beta^c_{\boldsymbol{\omega}_\textit{old}} = \frac{\text{exp}(f_\textit{AUC}^{c,\boldsymbol{\omega}_\text{old}} T_{\boldsymbol{\omega}})}{\text{exp}(f_\textit{AUC}^{c,\boldsymbol{\omega}_\text{new}} T_{\boldsymbol{\omega}})+\text{exp}(f_\textit{AUC}^{c,\boldsymbol{\omega}_\text{old}} T_{\boldsymbol{\omega}} )}. \end{split}\] In the model update class reliability, instead of calculating the co-reliability between teachers, [\[LKD-oldModel_weight\]](#LKD-oldModel_weight){reference-type="eqref" reference="LKD-oldModel_weight"} compares the performance of the previous and current global models. Moreover, we introduce a temperatured value for the class reliability scoring function, denoted as \(T_{\boldsymbol{\omega}}\). By applying a large temperatured value, the class reliability variable sets \(\beta^c_r\), and \(\beta^c_{\boldsymbol{\omega}_\textit{old}}\) make a higher priority on the better performance (i.e., the label-driven performance on class \(c\) from teacher \(r\), e.g., \(f_\textit{AUC}^{c,r}\) in equation [\[LKD-teacher_weight\]](#LKD-teacher_weight){reference-type="eqref" reference="LKD-teacher_weight"} or class \(c\) from old model \(\boldsymbol{\omega}_\text{old}\) in equation [\[LKD-oldModel_weight\]](#LKD-oldModel_weight){reference-type="eqref" reference="LKD-oldModel_weight"}). By this way, we can preserve the useful knowledge which is likely ignored in the new distillation episode. The more detailed descriptions of class reliability scoring are demonstrated in Algorithm [\[alg:C-Reliability\]](#alg:C-Reliability){reference-type="ref" reference="alg:C-Reliability"}. ## Joint Multi-teacher Distillation for F2L We obtain the overall loss function for online distillation training by the proposed F2L: \[\begin{aligned} \mathcal{L}_\text{F2L} = \lambda_1 \sum^R_{r=1}\mathcal{L}^\textit{KL}_r + \lambda_2\mathcal{L}^{KL}_{\boldsymbol{\omega}_\textit{upd}} + \lambda_3\mathcal{L}^g_\textit{CE}, \end{aligned}\] where \(\lambda_1, \lambda_2, \lambda_3\) are the scaling coefficients of the three terms in the joint loss function. The first and second terms imply the joint LKD from the regional teacher models and the updating correction step, respectively. Moreover, to ensure that knowledge the student receives from teachers is accurate and can be predicted accurately in practice, we need to validate the quality of the student model on the real data. Thus, we also compute the "standard" loss between the student and the ground-truth labels of the train dataset. This part is also known as the hard estimator, which is different from the aforementioned soft-distillator. The hard loss equation is as follows: \[\begin{aligned} \mathcal{L}^g_\textit{CE} &= H(y,\hat{p}(l|\boldsymbol{X},\boldsymbol{\omega}^g,T)) = \sum^C_{l=1} y_l \log{\hat{p}(l|\boldsymbol{X},\boldsymbol{\omega}^g,T)}. \end{aligned}\] We run the baselines (see Section [\[sec:V-A-ExperimentSetup\]](#sec:V-A-ExperimentSetup){reference-type="ref" reference="sec:V-A-ExperimentSetup"}) and compare with our F2L. Then, we evaluate the comparisons under different non-IID ratio. More precisely, we generate the IID data and non-IID data with two different Dirichlet balance ratio: \(\alpha = \{1, 10\}\). The comparison results are presented in Table [\[tab:F2L-Comparisons\]](#tab:F2L-Comparisons){reference-type="ref" reference="tab:F2L-Comparisons"}. As shown in Table [\[tab:F2L-Comparisons\]](#tab:F2L-Comparisons){reference-type="ref" reference="tab:F2L-Comparisons"}, the F2L can outperform the four baselines with a significant increase in accuracy. The reason for this phenomenon is that the LKD technique selectively draws the good features from regional models to build a global model. Hence, the global model predicts the better result on each different class and the entire accuracy of the global model then increases tremendously. The significant impact when applying LKD to distill different teachers to one student is shown in Table [\[tab:LKD-Distillation-Efficiency\]](#tab:LKD-Distillation-Efficiency){reference-type="ref" reference="tab:LKD-Distillation-Efficiency"}. ## Computation Efficiency of F2L {#sec:V-C-F2L-CommCompEfficiency} To evaluate the computation efficiency of our proposed F2L process, we compare our F2L process with 3 benchmarks: (i) F2L-noFedAvg (aggregator only consists of LKD), (ii) vanilla FL (FL with flatten architecture and FedAvg as an aggregator), and (iii) flatten LKD (FL with flatten architecture based with LKD as an alternate aggregator). Fig. [\[fig:F2L-performance\]](#fig:F2L-performance){reference-type="ref" reference="fig:F2L-performance"} shows that the F2L system can achieve convergence as good as the F2L-noFedAvg. The reason is that: after several communication rounds, the distributional distance between regions is reduced thanks to the LKD technique. Hence, the efficiency of the LKD technique on the data is decreased. As a consequence, the LKD technique shows no significant robustness over FedAvg aggregator. In the non-hierarchical settings, the flatten LKD and FedAvg reveal under-performed compared to the proposed hierarchical settings. We assume that the underperformance above comes from the data shortage of clients' training models. To be more detailed, the clients' dataset are considerably smaller than that of the . Thus, the regional models contain more information than the clients' models. We believe that: in the LKD technique, teachers' models require a certain amount of knowledge to properly train a good student (i.e., the global model). Given the convergence rate from Fig. [\[fig:F2L-performance\]](#fig:F2L-performance){reference-type="ref" reference="fig:F2L-performance"} and the computation cost at the server on Fig. [\[fig:F2L-compcost\]](#fig:F2L-compcost){reference-type="ref" reference="fig:F2L-compcost"}, we can see that, by using the adaptive switch between LKD and FedAvg in F2L, we can achieve significant computational efficiency at the aggregation server. Note that F2L can substantially increase performance and computation efficiency compared with non-hierarchical architecture. ## Scalability {#sec:V-C-F2L-Scalability} This section evaluates the F2L scalability. To do so, we inject a group of clients with non-IID data into our FL system after \(100\) rounds (when the convergence becomes stable). Note that the FL system has never trained these data. The detailed configurations of our experimental assessments can be found in Appendix [\[sec:V-A-ExperimentSetup\]](#sec:V-A-ExperimentSetup){reference-type="ref" reference="sec:V-A-ExperimentSetup"}. As it can be seen from Fig. [\[fig:F2L-scalability\]](#fig:F2L-scalability){reference-type="ref" reference="fig:F2L-scalability"}, when a new group of clients are added to the FL system, the vanilla FL shows a significant drop in terms of convergence. The reason is because of the distribution gap between the global model's knowledge and knowledge of the clients' data. Whenever new data with unlearned distribution is added to a stable model, the model will make considerable gradient steps towards the new data distribution. Thus, the FedAvg takes considerable learning steps to become stable again. In contrast, in F2L system, the learning from newly injected regions does not directly affect the learning of the whole FL system. Instead, the knowledge from the new domains is selectively chosen via the LKD approach. Thus, the LKD process does not suffer from information loss when new clients with non-IID data are added to the FL system. ## LKD Analysis {#sec:V-C-LKD-Analysis} In this section, we evaluate the LKD under various settings to justify the capability of LKD to educate the good student from the normal teachers. Our evaluations are as follows. **Can student outperform teachers?** To verify the efficiency of LKD with respect to enhancing student performance, we first evaluate F2L on MNIST, EMNIST, CIFAR-\(100\), CINIC-\(10\), CelebA dataset. The regions are randomly sampled from the massive FL network. In this way, we only evaluate the performance of LKD on random teachers. Table [\[tab:LKD-Distillation-Efficiency\]](#tab:LKD-Distillation-Efficiency){reference-type="ref" reference="tab:LKD-Distillation-Efficiency"} shows top-1 accuracy on the regional teacher and student models. The results reveal that LKD can significantly increase the global model performance compared with that of the regional models. Moreover, the newly distilled model can work well under each regional non-IID data after applying the model update. [\[tab:LKD-Distillation-Efficiency\]]{#tab:LKD-Distillation-Efficiency label="tab:LKD-Distillation-Efficiency"} To make a better visualization for the LKD's performance, we reveal the result of LKD on EMNIST dataset in terms of confusion matrix as in Fig. [\[fig:ConfusionMatrix\]](#fig:ConfusionMatrix){reference-type="ref" reference="fig:ConfusionMatrix"}. As it can be seen from the figure, the true predictions is represented by a diagonals of the matrices. A LKD performance is assumed to be well predicted when the value on diagonals is high (i.e., the diagonals' colors is darker), and the off-diagonals is low (i.e., the off-diagonals' colors are lighter). As we can see from the four figures, there are a significant reduce in the off-diagonals' darkness in the student performance (i.e., Fig. [\[fig:student-later-distill-evaluation\]](#fig:student-later-distill-evaluation){reference-type="ref" reference="fig:student-later-distill-evaluation"}) comparing to the results in other teachers (i.e., Figures [\[fig:teacher1-prior-distill-evaluation\]](#fig:teacher1-prior-distill-evaluation){reference-type="ref" reference="fig:teacher1-prior-distill-evaluation"}, [\[fig:teacher2-prior-distill-evaluation\]](#fig:teacher2-prior-distill-evaluation){reference-type="ref" reference="fig:teacher2-prior-distill-evaluation"}, and [\[fig:teacher3-prior-distill-evaluation\]](#fig:teacher3-prior-distill-evaluation){reference-type="ref" reference="fig:teacher3-prior-distill-evaluation"}). Therefore, we can conclude that our proposed MTKD techniques can surpass the teachers' performance as we mentioned in Section [2](#sec:related-works){reference-type="ref" reference="sec:related-works"}. **Teachers can really educate student?** We evaluate LKD under different soft-loss coefficients \(\lambda_1\) while the hard-loss factor is set at \(\lambda_3 = 1-\lambda_1\) (the scaling value \(\lambda_2\) is set to \(0\)). Thus, we can justify whether the robust performance of LKD comes from the joint distillation from teachers or just the exploitation of data-on-server training. We evaluate LKD on six scaling values \(\lambda_1 = \{0, 0.001, 0.01, 0.1, 0.5, 1\}\). We evaluate on three dataset, including EMNIST, CIFAR-10, and CIFAR-100, and summarize the results in Tables [\[tab:LKD-DistillationTest-EMNIST\]](#tab:LKD-DistillationTest-EMNIST){reference-type="ref" reference="tab:LKD-DistillationTest-EMNIST"}, [\[tab:LKD-DistillationTest-CIFAR10\]](#tab:LKD-DistillationTest-CIFAR10){reference-type="ref" reference="tab:LKD-DistillationTest-CIFAR10"} and [\[tab:LKD-DistillationTest-CIFAR100\]](#tab:LKD-DistillationTest-CIFAR100){reference-type="ref" reference="tab:LKD-DistillationTest-CIFAR100"} in **Appendices**. We can see from the three tables that the LKD cap off with \(\lambda_3=0.01\). Especially, when \(\lambda_3=1\) (which means the LKD acts as a vanilla cross-entropy optimizer), the model accuracy reduces notably. This means that the LKD only uses hard-loss as a backing force to aid the distillation. Thus, our LKD is appropriate and technically implemented. **Required training sample size for joint distillation.** To justify the ability of LKD under a shortage of training data, we evaluate LKD with six different data-on-server settings: \(\sigma = \{1, 1/2, 1/4, 1/6, 1/8, 1/10\}\), where \(\sigma\) is the sample ratio when compared with the original data-on-server as demonstrated in Table [\[tab:data-configuration\]](#tab:data-configuration){reference-type="ref" reference="tab:data-configuration"}. As we can see from the implementation results in three Tables [\[tab:LKD-SampleTrainTest-EMNIST\]](#tab:LKD-SampleTrainTest-EMNIST){reference-type="ref" reference="tab:LKD-SampleTrainTest-EMNIST"}, [\[tab:LKD-SampleTrainTest-CIFAR10\]](#tab:LKD-SampleTrainTest-CIFAR10){reference-type="ref" reference="tab:LKD-SampleTrainTest-CIFAR10"}, and [\[tab:LKD-SampleTrainTest-CIFAR100\]](#tab:LKD-SampleTrainTest-CIFAR100){reference-type="ref" reference="tab:LKD-SampleTrainTest-CIFAR100"} in **Appendices**, the F2L is demonstrated to perform well under a relatively small data-on-server. To be more specific, we only need the data-on-server to be \(4\) times lower than the average data-on-client to achieve a robust performance compared with the vanilla FedAvg. However, we suggest using the data-on-server to be larger than the data from distributed clients to earn the highest performance for LKD. Moreover, due to the ability to work under unlabeled data, the data-on-server does not need to be all labeled. We only need a small amount of labeled data to aid the hard-loss optimizer. Thus, the distillation data on the server can be updated from distributed clients gradually. # Broader Impact and Limitation {#broader-impact-and-limitation .unnumbered} Due to the hierarchical framework of our proposed F2L, each sub-region acts like an independent FL process. Therefore, our F2L is integrable with other current methods, which means that we can apply varying FL techniques (e.g., FedProx, FedDyne, FedNova, HCFL ) into distinct sub-regions to enhance the overall F2L framework. Therefore, architecture search (e.g., which FL technique is suitable for distinct sub FL region) for the entire hierarchical network is essential for our proposed framework, which is the potential research for the future work. Moreover, the hierarchical framework remains unearthed. Therefore, a potentially huge amount of research directions is expected to be investigated (e.g., resource allocation, and task offloading in hierarchical FL ). However, our LKD technique still lacks of understanding about the teachers' models (e.g., how classification boundaries on each layer impact on the entire teachers' performance). By investigating in explainable AI, along with layer-wise performance, we can enhance the LKD, along with reducing the unlabeled data requirements for the distillation process in the future work. # Conclusion In this research, we have proposed an FL technique that enables knowledge distillation to extract the-good-feature-only from clients to the global model. Our model is capable of tackling the FL's heterogeneity efficiently. Moreover, experimental evaluations have revealed that our F2L model outperforms all of the state-of-the-art FL baselines in recent years.
{'timestamp': '2022-10-03T02:05:31', 'yymm': '2209', 'arxiv_id': '2209.14520', 'language': 'en', 'url': 'https://arxiv.org/abs/2209.14520'}
# Introduction Let \(q\) be a positive integer and \(a\in(\mathbb{Z}/q\mathbb{Z})^*\). We define \(p(q,a)\) as the least prime occurring in the arithmetic progression \(\{qn+a, n\in\mathbb{N}\}\). Under the Riemann Hypothesis for the \(L\)-Dirichlet series of characters \(\chi\) mod \(q\), it can be proved that \[p(q,a)\ll(\phi(q)\log q)^2,\] where \(\phi\) denotes the Euler totient function. Unconditionally, using the Siegel-Walfisz Theorem, one can show that \[p(q,a)\ll_{\varepsilon}\exp(p^{\varepsilon})\] for any \(\varepsilon>0\). Moreover, if there are no Siegel zeros, this bound reduces to \[p(q,a)\ll q^{c\log q}\] for some \(c>0\). So, in 1944, it came as a big surprise when Linnik proved that there exist positive universal constants \(C\) and \(L\) such that \[p(q,a)\leq Cq^L\] for any choice of \(q\in\mathbb{N}\) and \(a\in(\mathbb{Z}/q\mathbb{Z})^*\). One of the steps that lead Linnik to this breakthrough, now known as Linnik's theorem, was the following estimate. Assume that \(x\geq q^2\). If there exists an exceptional character \(\chi\) corresponding to a Siegel zero, then \[\label{linnest} \sum_{\substack{n\leq x\\n\equiv a\mod{q}}}\Lambda(n)=\frac{x}{\phi(q)}+\frac{\chi(a)}{\phi(q)}\sum_{n\leq x}\Lambda(n)\chi(n)+O\bigg(\frac{x^{1-c_1/\log(2q)}}{\phi(q)}+\frac{xe^{-c_2\sqrt{\log x}}}{\phi(q)}\bigg),\] where \(c_1\) and \(c_2\) are two positive absolute constants. If the exceptional character \(\chi\) does not exist, then ([\[linnest\]](#linnest){reference-type="ref" reference="linnest"}) remains true, but the character sum of the right-hand side is omited. Linnik's work on \(p(q,a)\) was later simplified, as was done by Bombieri in, but the new proofs, including Linnik's original proof, relied in one form or another on the following three ingredients. - The classical zero-free region; - A log-free zero-density estimate; - The exceptional zero repulsion, also known, as the Deuring-Heilbronn phenomenon, stating that it is possible to enlarge the classical zero-free region when it contains a Siegel zero. Proofs that make use of these three principles can be found in modern treatments, like the one which is presented in. Nonetheless, in the last years, some proofs that avoid these tools have appeared. For example, in 2002, such a proof was developed by Elliot in. Later, in 2016, Granville, Harper and Soundararjan studied pretentiously the distribution of multiplicative functions on arithmetic progressions and as a consequence of their general results, they were able to show a weaker form of ([\[linnest\]](#linnest){reference-type="ref" reference="linnest"}). In turn, this served as the stepping stone for another new proof of Linnik's theorem which circumvented the combination of the three aforementioned principles. Another pretentious proof of Linnik's theorem is presented in and a basic element of the proof is a flexible variant of ([\[linnest\]](#linnest){reference-type="ref" reference="linnest"}) where every prime is weighted with \(1/p\) instead of \(\log p\). Even though the alternative approaches recover Linnik's theorem, they do not provide a pretentious proof of the same quantitative strength as ([\[linnest\]](#linnest){reference-type="ref" reference="linnest"}). To this end, in this paper, we apply pretentious methods and prove Linnik's estimate ([\[linnest\]](#linnest){reference-type="ref" reference="linnest"}) with a refined error term where a Korobov-Vinogradov type term replaces \(\exp\{-c_2\sqrt{\log x}\}\). In particular, we prove the following theorem. We might bound the sum \(\sum_{n\leq x}\psi(n)\Lambda(n)\) and simplify Theorem [\[main\]](#main){reference-type="ref" reference="main"}. Indeed, by referring to Theorem 1.6(a) of, it follows that there exist positive constants \(c'\) and \(c''\) such that \[\sum_{n\leq x}\psi(n)\Lambda(n)\ll x^{1-c'L_q(1,\psi)/\log(2q)}+xe^{-c''\sqrt{\log x}},\] for all \(x\geq q^2\). The same theorem provides also information about the size of the quantity \(L_q(1,\psi)\) that is involved in the bound above. It is known that there exists a constant \(\delta\in(0,1)\) such that \(L(\cdot,\psi)\) has at most one zero \(\beta\) in \([1-\delta/\log q,1)\). If such a zero does not exist, we set \(\beta=1-\delta/\log q\). In either case, Theorem 1.6(a) of claims that \(L_q(1,\psi)\asymp (1-\beta)\log q\). Therefore, we arrive at the following consequence of Theorem [\[main\]](#main){reference-type="ref" reference="main"}. We prove Theorem [\[main\]](#main){reference-type="ref" reference="main"} in Section 5. Its proof borrows ideas from the pretentious large sieve that Granville, Harper and Soundararjan developed in. It is also inspired by techniques of Koukoulopoulos from his work on bounded multiplicative functions with small partial sums. These techniques were deployed recently in a similar fashion by the author in, where he generalized the work of Koukoulopoulos for classes of divisor-bounded multiplicative functions. The rest of the text is divided into four sections and the first three serve as preparatory material for the last one where we prove Theorem [\[main\]](#main){reference-type="ref" reference="main"}. In subsequent work, we intend to extend the recent results of and by applying the core methods of this paper to determine the structure of divisor-bounded multiplicative functions whose partial sums are small on arithmetic progressions. ## Notation {#notation .unnumbered} Throughout the text, for an integer \(n>1\), we denote its smallest prime factor by \(P^-(n)\). For \(n=1\), we define \(P^-(1)=+\infty\). For \(m\in\mathbb{N}\), the symbol \(\tau_m\) will denote the \(d\)-fold divisor function given as \(\tau_m(n)=\sum_{d_1\cdots d_m=n}1\) for all \(n\in\mathbb{N}\). # Preliminary Sieving Results In this section we prove two auxiliary sieving results. For the end of their proofs, the following theorem of Shiu will be necessary. This theorem may be seen as an analogue of the Brun-Titchmarsch inequality for multiplicative functions. # Existing Bounds for Sifted \(L\)-Dirichlet Series Let us consider a real number \(y\geq 1\) and a positive integer \(q\). For \(s\in\mathbb{C}\) with \(\Re(s)>1\), we define the \(y\)-rough Dirichlet series of a Dirichlet character \(\chi\) modulo \(q\) as \[\label{sifL} L_y(s,\chi):=\sum_{\substack{n\geq 1\\P^-(n)>y}}\frac{\chi(n)}{n^s}=L(s,\chi)\prod_{p\leq y}(1-\chi(p)/p^s).\] In ([\[sifL\]](#sifL){reference-type="ref" reference="sifL"}), the series is absolutely convergent and its rightmost side implies the meromorphical continuation of \(L_y(\cdot,\chi)\) on the whole complex plane (with one pole at \(1\) only in the case of the principal character \(\chi_0\)). The present section constitutes a collection of some existing upper and lower bounds for the values of a \(y\)-rough Dirichlet series. We will use all these bounds in the proof of Theorem [\[main\]](#main){reference-type="ref" reference="main"}. The theorems listed below are stated without their proofs, as they are already part of the literature. We only provide a reference for each one of them. To simplify their statements, we introduce the notation \[V_t:=\exp\{100(\log (3+|t|))^{2/3}(\log\log(3+|t|))^{1/3}\}\quad (t\in\mathbb{R}).\] We start with the following theorem concerning an upper bound for the derivatives of \(L(\cdot,\chi)\). The next result equips us with lower bounds for \(L_y(s,\chi)\). We close this section with a theorem dealing with the size of \(L_q(\sigma,\chi)\) for \(\sigma\geq 1\) when \(\chi\neq\psi\), where \(\psi\) is defined as in the statement of Theorem [\[main\]](#main){reference-type="ref" reference="main"}. # A Mean Value Theorem The goal of this section is to establish a mean value thoerem for the derivatives of the Dirichlet series \[\sum_{\substack{n\equiv a\mod{q}\\P^-(n)>y}}\frac{\Lambda(n)}{n^s}.\] Such a result will be essential at the end of the proof of Theorem [\[main\]](#main){reference-type="ref" reference="main"}. To prove it, we are making use of the following lemma which is due to Montgomery. # Proof of Theorem [\[main\]](#main){reference-type="ref" reference="main"} ## A useful lemma Before embarking on the proof of Theorem [\[main\]](#main){reference-type="ref" reference="main"}, which is the main objective of this section, we first state a lemma that will be useful. ## Proof of Theorem [\[main\]](#main){reference-type="ref" reference="main"}: We may assume that \(q\geq 2\) and that \(x\geq q^B\) for some sufficiently large real number \(B>0\). Indeed, for \(q=1\), it is the prime number theorem with the error term provided by Korobov and Vinogradov and if \(q^2\leq x<q^B\), then \(\log x/\log q\asymp 1\) and the theorem follows from a trivial application of the Brun-Titchmarsch inequality. Now, let \(k\) be a positive integer and set \(y=(10q)^{100}V_T\) with \(T=\exp\{2L(\log x)^{3/5}(\log\log x)^{2/5}\}\) for a large constant \(L>0\). Since \(\log =\Lambda\ast 1\), we have that \[\begin{aligned} \label{1'} \sum_{\substack{n\leq x\\n\equiv a \mod{q}\\P^-(n)>y}}\log n=\sum_{\substack{m\leq \sqrt{x}\\P^-(m)>y}}\sum_{\substack{\ell\leq \frac{x}{m}\\\ell\equiv a\overline{m}\mod{q} \\P^-(\ell)>y}}\Lambda(\ell)+\sum_{\substack{\ell\leq \sqrt{x}\\P^-(n)>y}}\Lambda(\ell)\sum_{\substack{\sqrt{x}<m\leq \frac{x}{\ell}\\mathfrak{m}\equiv a\overline{\ell}\mod{q}\\P^-(m)>y}}1. \end{aligned}\] For \(\chi\in\{\chi_0,\psi\}\), it is true that \(\log\cdot\chi=(\Lambda\cdot\chi)\ast\chi\). Therefore, we similarly have that \[\begin{aligned} \label{2'} \sum_{\substack{n\leq x\\P^-(n)>y}}\chi(n)\log n=\sum_{\substack{m\leq \sqrt{x}\\P^-(m)>y}}\chi(m)\sum_{\substack{\ell\leq \frac{x}{m}\\P^-(\ell)>y}}\Lambda(\ell)\chi(\ell)+\sum_{\substack{\ell\leq \sqrt{x}\\P^-(n)>y}}\Lambda(\ell)\chi(\ell)\sum_{\substack{\sqrt{x}<m\leq \frac{x}{\ell}\\P^-(m)>y}}\chi(m). \end{aligned}\] Because of Lemmas [\[chlem\]](#chlem){reference-type="ref" reference="chlem"} and [\[logap\]](#logap){reference-type="ref" reference="logap"}, we have that \[\begin{aligned} \sum_{\substack{n\leq x\\n\equiv a \mod{q}\\P^-(n)>y}}\log n-\frac{1}{\phi(q)}\sum_{\substack{n\leq x\\P^-(n)>y}}\chi_0(n)\log n-\frac{\psi(a)}{\phi(q)}\sum_{\substack{n\leq x\\P^-(n)>y}}\psi(n)\log n\ll\frac{x^{1-c_1/\log y}}{\phi(q)}, \end{aligned}\] where \(c_1=\min\{\kappa,\lambda\}/2\). Consequenlty, if we put \[\begin{aligned} \Delta(u,y;q,b):=\sum_{\substack{\ell\leq u\\\ell\equiv b\mod{q}\\P^-(\ell)>y}}\Lambda(\ell)-\frac{1}{\phi(q)}\sum_{\substack{\ell\leq u\\P^-(\ell)>y}}\Lambda(\ell)\chi_0(\ell)-\frac{\psi(b)}{\phi(q)}\sum_{\substack{\ell\leq u\\P^-(\ell)>y}}\Lambda(\ell)\psi(\ell) \end{aligned}\] and \[\begin{aligned} \Delta^*(u,y;q,b):=\sum_{\substack{m\leq u\\mathfrak{m}\equiv b\mod{q}\\P^-(m)>y}}1-\frac{1}{\phi(q)}\sum_{\substack{m\leq u\\P^-(m)>y}}\chi_0(m)-\frac{\psi(b)}{\phi(q)}\sum_{\substack{m\leq u\\P^-(m)>y}}\psi(m) \end{aligned}\] for simplicity, then ([\[1\'\]](#1'){reference-type="ref" reference="1'"}) and ([\[2\'\]](#2'){reference-type="ref" reference="2'"}) imply that \[\begin{aligned} \sum_{\substack{m\leq\sqrt{x}\\P^-(m)>y}}\Delta\Big(\frac{x}{m},y;q,a\overline{m}\Big)&=-\sum_{\substack{\ell\leq\sqrt{x}\\P^-(\ell)>y}}\Lambda(\ell)\Delta^*\Big(\frac{x}{\ell},y;q,a\overline{\ell}\Big)\\ &+\sum_{\substack{\ell\leq\sqrt{x}\\P^-(\ell)>y}}\Lambda(\ell)\Delta^*(\sqrt{x},y;q,a\overline{\ell})+O\bigg(\frac{x^{1-c_1/\log y}}{\phi(q)}\bigg). \end{aligned}\] Since \(x/\ell\geq\sqrt{x}\geq y\) for \(\ell\leq \sqrt{x}\), we can apply Lemmas [\[chlem\]](#chlem){reference-type="ref" reference="chlem"} and [\[logap\]](#logap){reference-type="ref" reference="logap"} to bound \(\Delta^*(x/\ell,y;q,a\overline{\ell})\) and \(\Delta^*(\sqrt{x},y;q,a\overline{\ell})\). Doing so yields that \[\begin{aligned} \sum_{\substack{\ell\leq\sqrt{x}\\P^-(\ell)>y}}\Lambda(\ell)\Big\{\Delta^*\Big(\frac{x}{\ell},y;q,a\overline{\ell}\Big)-\Delta^*(\sqrt{x},y;q,a\overline{\ell})\Big\}&\ll\frac{x^{1-c_1/\log y}}{\phi(q)\log y}\sum_{\substack{\ell\leq\sqrt{x}\\P^-(\ell)>y}}\frac{\Lambda(\ell)}{{\ell}^{1-c_1/\log y}}\\ &\ll\frac{x^{1-c_1/(2\log y)}}{\phi(q)\log y}\sum_{\ell\leq\sqrt{x}}\frac{\Lambda(\ell)}{\ell}\\ &\ll \frac{x^{1-c_1/(2\log y)}\log x}{\phi(q)\log y}\ll \frac{x^{1-c_1/(3\log y)}}{\phi(q)}. \end{aligned}\] Hence, \[\begin{aligned} \label{rec} \Delta(x,y;q,a)=-\sum_{\substack{1<m\leq\sqrt{x}\\P^-(m)>y}}\Delta\Big(\frac{x}{m},y;q,a\overline{m}\Big)+O\bigg(\frac{x^{1-c_2/\log y}}{\phi(q)}\bigg), \end{aligned}\] where \(c_2=c_1/3\). Now, we set \(D=x^{1-\delta/\log y}\) for some sufficietly small \(\delta\in(0,c_2)\). When \(m\leq \sqrt{x}\) and \(x\geq q^B\) with a suitably large exponent \(B\), we have that \(D/m\geq (x/m)^{\eta}q\) with \(\eta=2\delta/(\log 2)\). Thus, for \(t\in[x-D,x]\), an application of the Brun-Titchmarsch theorem gives \[\sum_{\substack{\frac{t}{m}<\ell\leq\frac{x}{m}\\\ell\equiv a\overline{m}\mod{q}\\ P^-(\ell)>y}}\Lambda(\ell)\leq\sum_{\substack{\frac{x-D}{m}<\ell\leq\frac{x}{m}\\\ell\equiv a\overline{m}\mod{q}}}\Lambda(\ell)\ll\frac{D}{m\phi(q)}.\] Similarly, \[\sum_{\substack{\frac{t}{m}<\ell\leq\frac{x}{m}\\P^-(\ell)>y}}\Lambda(\ell)\chi_0(\ell)\ll\frac{D}{m}\quad\,\,\,\,\text{and}\quad\sum_{\substack{\frac{t}{m}<\ell\leq\frac{x}{m}\\P^-(\ell)>y}}\Lambda(\ell)\psi(\ell)\ll\frac{D}{m},\] by bounding the characters trivially before making use of the Brun-Titchmarsh theorem. With these estimates, we deduce that \[\begin{aligned} \label{trick} \sum_{\substack{1<m\leq\sqrt{x}\\P^-(m)>y}}\Delta\Big(\frac{x}{m},y;q,a\overline{m}\Big)&=\frac{1}{D}\sum_{\substack{1<m\leq\sqrt{x}\\P^-(m)>y}}\int_{x-D}^x\Delta\Big(\frac{x}{t},y;q,a\overline{m}\Big)\mathrm{d} t\\ &+O\bigg(\frac{D}{\phi(q)}\sum_{\substack{m\leq\sqrt{x}\\P^-(m)>y}}\frac{1}{m}\bigg).\nonumber \end{aligned}\] But, \[\sum_{\substack{m\leq\sqrt{x}\\P^-(m)>y}}\frac{1}{m}\leq \prod_{y<p\leq\sqrt{x}}\bigg(1-\frac{1}{p}\bigg)^{-1}\ll \frac{\log x}{\log y},\] and so combination of ([\[rec\]](#rec){reference-type="ref" reference="rec"}) and ([\[trick\]](#trick){reference-type="ref" reference="trick"}) leads to \[\begin{aligned} \label{recres} \Delta(x,y;q,a)=-\frac{1}{D}\sum_{\substack{1<m\leq\sqrt{x}\\P^-(m)>y}}\int_{x-D}^x\Delta\Big(\frac{x}{t},y;q,a\overline{m}\Big)\mathrm{d} t+O\bigg(\frac{x\log x}{\phi(q)\log y}\bigg(\frac{2k\log y}{\delta\log x}\bigg)^{\!\!k+1\,}\bigg), \end{aligned}\] since \(x^{\delta/\log y}=\exp\{\delta\log x/\log y\}\geq (\delta\log x/\log y)^{k+1}/(k+1)!\geq (\delta\log x/(2k\log y))^{k+1}\). By referring to the orthogonality of the characters modulo \(q\), it follows that \[\Delta\Big(\frac{x}{t},y;q,a\overline{m}\Big)=\frac{1}{\phi(q)}\sum_{\substack{\chi\mod{q}\\\chi\neq\chi_0,\psi}}\overline{\chi}(a)\chi(m)\sum_{\substack{\ell\leq\frac{x}{t}\\P^-(\ell)>y}}\Lambda(\ell)\chi(\ell).\] Therefore, \[\begin{aligned} &\frac{1}{D}\bigg|\sum_{\substack{1<m\leq\sqrt{x}\\P^-(m)>y}}\int_{x-D}^x\Delta\Big(\frac{x}{t},y;q,a\overline{m}\Big)\mathrm{d} t\bigg|\\ &\leq \frac{1}{D\phi(q)}\sum_{\substack{\chi\mod{q}\\\chi\neq\chi_0,\psi}}\bigg|\sum_{\substack{1<m\leq\sqrt{x}\\P^-(m)>y}}\chi(m)\int_{x-D}^x\Big(\sum_{\substack{\ell\leq \frac{x}{t}\\P^-(\ell)>y}}\Lambda(\ell)\chi(\ell)\Big)\mathrm{d} t\bigg|\\ &=\frac{1}{D\phi(q)}\sum_{\substack{\chi\mod{q}\\\chi\neq\chi_0,\psi}}\bigg|\sum_{\substack{1<m\leq\sqrt{x}\\P^-(m)>y}}\chi(m)m\int_{\frac{x-D}{m}}^{\frac{x}{m}}\Big(\sum_{\substack{\ell\leq t\\P^-(\ell)>y}}\Lambda(\ell)\chi(\ell)\Big)\mathrm{d} t\bigg|\\ &=\frac{1}{D\phi(q)}\sum_{\substack{\chi\mod{q}\\\chi\neq\chi_0, \psi}}\bigg|\int_{\frac{x-D}{\sqrt{x}}}^{\frac{x}{y}}\Big(\sum_{\substack{\ell\leq t\\P^-(\ell)>y}}\Lambda(\ell)\chi(\ell)\Big)\Big(\sum_{\substack{\frac{x-D}{t}<m\leq\frac{x}{t}\\P^-(m)>y}}\chi(m)m\Big)\mathrm{d} t\bigg|. \end{aligned}\] We move the absolute value inside the integral and then use the Cauchy-Schwarz inequality twice to obtain \[\begin{aligned} \label{dcs} &\frac{1}{D}\bigg|\sum_{\substack{1<m\leq\sqrt{x}\\P^-(m)>y}}\int_{x-D}^x\Delta\Big(\frac{x}{t},y;q,a\overline{m}\Big)\mathrm{d} t\bigg|\\ &\leq\frac{1}{D\phi(q)}\int_{\frac{x-D}{\sqrt{x}}}^{\frac{x}{y}}\bigg(\sum_{\substack{\chi\mod{q}\\\chi\neq \chi_0, \psi}}\Big|\sum_{\substack{\ell\leq t\\P^-(\ell)>y}}\Lambda(\ell)\chi(\ell)\Big|^2\bigg)^{1/2}\bigg(\sum_{\substack{\chi\mod{q}\\\chi\neq \chi_0, \psi}}\Big|\sum_{\substack{\frac{x-D}{t}<m\leq\frac{x}{t}\\P^-(m)>y}}\chi(m)m\Big|^2\bigg)^{1/2}\mathrm{d} t\nonumber\\ &\leq\frac{1}{D\phi(q)}\bigg(\sum_{\substack{\chi\mod{q}\\\chi\neq \chi_0, \psi}}\int_{\frac{x-D}{\sqrt{x}}}^{\frac{x}{y}}\Big|\sum_{\substack{\ell\leq t\\P^-(\ell)>y}}\Lambda(\ell)\chi(\ell)\Big|^2\frac{\mathrm{d} t}{t^3}\bigg)^{1/2}\nonumber\\ &\times \bigg(\int_{\frac{x-D}{\sqrt{x}}}^{\frac{x}{y}}\sum_{\chi\mod{q}}\Big|\sum_{\substack{\frac{x-D}{t}<m\leq\frac{x}{t}\\P^-(m)>y}}\chi(m)m\Big|^2t^3\mathrm{d} t\bigg)^{1/2}.\nonumber \end{aligned}\] However, \[\begin{aligned} \sum_{\chi\mod{q}}\Big|\sum_{\substack{\frac{x-D}{t}<m\leq\frac{x}{t}\\P^-(m)>y}}\chi(m)m\Big|^2&=\phi(q)\sum_{b\in(\mathbb{Z}/q\mathbb{Z})^*}\bigg(\sum_{\substack{\frac{x-D}{\sqrt{x}}<m\leq \frac{x}{t}\\mathfrak{m}\equiv b\mod{q}\\P^-(m)>y}}m\bigg)^2\\ &\leq \frac{\phi(q)x^2}{t^2}\sum_{b\in(\mathbb{Z}/q\mathbb{Z})^*}\bigg(\sum_{\substack{\frac{x-D}{\sqrt{x}}<m\leq\frac{x}{t}\\mathfrak{m}\equiv b\mod{q}\\P^-(m)>y}}1\bigg)^2\ll\frac{x^2D^2}{t^4(\log y)^2}, \end{aligned}\] where the final step is a consequence of Theorem [\[shiu\]](#shiu){reference-type="ref" reference="shiu"} which was applied separately to each sum of the last line. So, \[\int_{\frac{x-D}{\sqrt{x}}}^{\frac{x}{y}}\sum_{\chi\mod{q}}\Big|\sum_{\substack{\frac{x-D}{t}<m\leq\frac{x}{t}\\P^-(m)>y}}\chi(m)m\Big|^2t^3\mathrm{d} t\ll\frac{x^2D^2}{(\log y)^2}\int_1^x\frac{\mathrm{d} t}{t}=\frac{x^2D^2\log x}{(\log y)^2}.\] This means that ([\[dcs\]](#dcs){reference-type="ref" reference="dcs"}) leads to the estimate \[\begin{aligned} \label{bP} \frac{1}{D}\sum_{\substack{1<m\leq\sqrt{x}\\P^-(m)>y}}\int_{x-D}^x\Delta\Big(\frac{x}{t},y;q,a\overline{m}\Big)\mathrm{d} t&\ll \frac{x\sqrt{\log x}}{\phi(q)\log y}\\ &\times\bigg(\sum_{\substack{\chi\mod{q}\\\chi\neq \chi_0, \psi}}\int_{\frac{\sqrt{x}}{2}}^x\Big|\sum_{\substack{\ell\leq t\\P^-(\ell)>y}}\Lambda(\ell)\chi(\ell)\Big|^2\frac{\mathrm{d} t}{t^3}\bigg)^{1/2}.\nonumber \end{aligned}\] Now, we continue by establishing a bound for the sum of integrals at the second line of ([\[bP\]](#bP){reference-type="ref" reference="bP"}). For \(t\in[\sqrt{x}/2,x]\), by partial summation and Chebyshev's estimates, we have that \[\begin{aligned} \sum_{\substack{\ell\leq t\\P^-(\ell)>y}}\Lambda(\ell)\chi(\ell)&=O(\sqrt{t})+\int_{\sqrt{t}}^t(\log u)^{-k}\mathrm{d} \Big(\sum_{\substack{\ell\leq u\\P^-(\ell)>y}}\Lambda(\ell)\chi(\ell)(\log \ell)^k\Big)\\ &=O(\sqrt{t})+(\log t)^{-k}\sum_{\substack{\ell\leq t\\P^-(\ell)>y}}\Lambda(\ell)\chi(\ell)(\log \ell)^k\\ &+\int_{\sqrt{t}}^t\sum_{\substack{\ell\leq u\\P^-(\ell)>y}}\Lambda(\ell)\chi(\ell)(\log \ell)^k\frac{\mathrm{d} t}{u(\log u)^{k+1}}\\ &\ll\sqrt{t}+M_0^k(\log x)^{-k}\Big|\sum_{\substack{\ell\leq t\\P^-(\ell)>y}}\Lambda(\ell)\chi(\ell)(\log \ell)^k\Big|\\ &+M_0^k(\log x)^{-(k+1)}\int_{\sqrt{t}}^t\Big|\sum_{\substack{\ell\leq u\\P^-(\ell)>y}}\Lambda(\ell)\chi(\ell)(\log \ell)^k\Big|\frac{\mathrm{d} u}{u}, \end{aligned}\] where \(M_0\) is some sufficiently large positive constant. Because of the basic inequality \(3(\alpha^2+\beta^2+\gamma^2)\geq (\alpha+\beta+\gamma)^2\) for all \(\alpha, \beta, \gamma\in\mathbb{R}\), we deduce that \[\begin{aligned} \Big|\sum_{\substack{\ell\leq t\\P^-(\ell)>y}}\Lambda(\ell)\chi(\ell)\Big|^2&\ll t+M_0^{2k}(\log x)^{-2k}\Big|\sum_{\substack{\ell\leq t\\P^-(\ell)>y}}\Lambda(\ell)\chi(\ell)(\log \ell)^k\Big|^2\\ &+M_0^{2k}(\log x)^{-2(k+1)}\bigg(\int_{\sqrt{t}}^t\Big|\sum_{\substack{\ell\leq u\\P^-(\ell)>y}}\Lambda(\ell)\chi(\ell)(\log \ell)^k\Big|\frac{\mathrm{d} u}{u}\bigg)^2. \end{aligned}\] But, upon noticing that \[\bigg(\int_{\sqrt{t}}^t\Big|\sum_{\substack{\ell\leq u\\P^-(\ell)>y}}\Lambda(\ell)\chi(\ell)(\log \ell)^k\Big|\frac{\mathrm{d} u}{u}\bigg)^2\leq\frac{\log t}{2}\int_{\sqrt{t}}^t\Big|\sum_{\substack{\ell\leq u\\P^-(\ell)>y}}\Lambda(\ell)\chi(\ell)(\log \ell)^k\Big|^2\frac{\mathrm{d} u}{u},\] by the Cauchy-Schwarz inequality, we conclude that \[\begin{aligned} &\bigg(\sum_{\substack{\chi\mod{q}\\\chi\neq \chi_0, \psi}}\int_{\frac{\sqrt{x}}{2}}^x\Big|\sum_{\substack{\ell\leq t\\P^-(\ell)>y}}\Lambda(\ell)\chi(\ell)\Big|^2\frac{\mathrm{d} t}{t^3}\bigg)^{1/2}\\ &\ll\sqrt{\frac{\phi(q)}{x}}+M_0^k(\log x)^{-k}\bigg(\sum_{\substack{\chi\mod{q}\\\chi\neq \chi_0, \psi}}\int_{\frac{\sqrt{x}}{2}}^x\Big|\sum_{\substack{\ell\leq t\\P^-(\ell)>y}}\Lambda(\ell)\chi(\ell)(\log \ell)^k\Big|^2\frac{\mathrm{d} t}{t^3}\bigg)^{1/2}\nonumber\\ &+M_0^k(\log x)^{-k}\bigg(\sum_{\substack{\chi\mod{q}\\\chi\neq \chi_0, \psi}}\int_{\frac{\sqrt{x}}{2}}^x\bigg(\int_{\sqrt{t}}^t\Big|\sum_{\substack{\ell\leq u\\P^-(\ell)>y}}\Lambda(\ell)\chi(\ell)(\log \ell)^k\Big|^2\frac{\mathrm{d} u}{u}\bigg)\frac{\mathrm{d} t}{t^3}\bigg)^{1/2}.\nonumber \end{aligned}\] We use Fubini's theorem to interchange the order of integration, and so the double integral above equals \[\begin{aligned} \int_{\frac{\sqrt[4]{x}}{\sqrt{2}}}^x\Big|\sum_{\substack{\ell\leq u\\P^-(\ell)>y}}\Lambda(\ell)\chi(\ell)(\log \ell)^k\Big|^2\bigg(\int_u^{u^2}\frac{\mathrm{d} t}{t^3}\bigg)\frac{\mathrm{d} u}{u}\leq\int_{\frac{\sqrt[4]{x}}{2}}^x\Big|\sum_{\substack{\ell\leq u\\P^-(\ell)>y}}\Lambda(\ell)\chi(\ell)(\log \ell)^k\Big|^2\frac{\mathrm{d} u}{u^3}. \end{aligned}\] Hence, \[\begin{aligned} &\bigg(\sum_{\substack{\chi\mod{q}\\\chi\neq \chi_0, \psi}}\int_{\frac{\sqrt{x}}{2}}^x\Big|\sum_{\substack{\ell\leq t\\P^-(\ell)>y}}\Lambda(\ell)\chi(\ell)\Big|^2\frac{\mathrm{d} t}{t^3}\bigg)^{1/2}\\ &\ll\sqrt{\frac{\phi(q)}{x}}+M_0^k(\log x)^{-k}\bigg(\sum_{\substack{\chi\mod{q}\\\chi\neq \chi_0, \psi}}\int_{\frac{\sqrt[4]{x}}{2}}^x\Big|\sum_{\substack{\ell\leq t\\P^-(\ell)>y}}\Lambda(\ell)\chi(\ell)(\log \ell)^k\Big|^2\frac{\mathrm{d} t}{t^3}\bigg)^{1/2}\nonumber\\ &\ll\sqrt{\frac{\phi(q)}{x}}+M_0^k(\log x)^{-k}\bigg(\sum_{\substack{\chi\mod{q}\\\chi\neq \chi_0, \psi}}\int_{\frac{\sqrt[4]{x}}{2}}^x\Big|\sum_{\substack{\ell\leq t\\P^-(\ell)>y}}\Lambda(\ell)\chi(\ell)(\log \ell)^k\Big|^2\frac{\mathrm{d} t}{t^{3+2/\log x}}\bigg)^{1/2}.\nonumber \end{aligned}\] Since Parseval's theorem for Dirichlet series guarantees that \[\int_1^{\infty}\Big|\sum_{\substack{\ell\leq u\\P^-(\ell)>y}}\Lambda(\ell)\chi(\ell)(\log \ell)^k\Big|^2\frac{\mathrm{d} u}{u^{3+2/\log x}}=\frac{1}{2\pi}\int_{\mathbb{R}}\Big|\bigg(\frac{L_y^{'}}{L_y}\bigg)^{(k)}(c+it,\chi)\Big|^2\frac{\mathrm{d} t}{c^2+t^2},\] with \(c:=1+1/\log x\), we arrive at the following bound. \[\begin{aligned} \label{afP} &\bigg(\sum_{\substack{\chi\mod{q}\\\chi\neq \chi_0, \psi}}\int_{\frac{\sqrt{x}}{2}}^x\Big|\sum_{\substack{\ell\leq t\\P^-(\ell)>y}}\Lambda(\ell)\chi(\ell)\Big|^2\frac{\mathrm{d} t}{t^3}\bigg)^{1/2}\\ &\ll\sqrt{\frac{\phi(q)}{x}}+M_0^k(\log x)^{-k}\bigg(\sum_{\substack{\chi\mod{q}\\\chi\neq\chi_0, \psi}}\int_{\mathbb{R}}\Big|\bigg(\frac{L_y^{'}}{L_y}\bigg)^{(k)}(c+it,\chi)\Big|^2\frac{\mathrm{d} t}{c^2+t^2}\bigg)^{1/2}\nonumber \end{aligned}\] We now restrict our attention to the integrals involving the derivatives of \(L_y^{'}/L_y\). We are going to split these integrals into two parts. In the first parts, we will be integrating over \(|t|\leq T\). We will bound these parts by mainly using the results of Section 3. For the remaining parts, where we integrate over the range \(|t|>T\), we will use Lemma [\[mvt\]](#mvt){reference-type="ref" reference="mvt"}. We start with the integrals over \(|t|>T\) first. It is true that \[\begin{aligned} \sum_{\chi\mod{q}}\bigg|\bigg(\frac{L_y^{'}}{L_y}\bigg)^{(k)}(c+it,\chi)\bigg|^2=\phi(q)\sum_{b\in(\mathbb{Z}/q\mathbb{Z})^*}\bigg|\sum_{\substack{n\equiv a\mod{q}\\P^-(n)>y}}\frac{\Lambda(n)(\log n)^k}{n^{c+it}}\bigg|^2. \end{aligned}\] This may be proven by opening the square of the left hand-side and by using the orthogonality relations of the characters modulo \(q\). So, now one can use Lemma [\[mvt\]](#mvt){reference-type="ref" reference="mvt"} to infer that \[\begin{aligned} \label{smt} &\sum_{\substack{\chi\mod{q}\\\chi\neq\chi_0, \psi}}\int_{|t|>T}\Big|\bigg(\frac{L_y^{'}}{L_y}\bigg)^{(k)}(c+it,\chi)\Big|^2\frac{\mathrm{d} t}{c^2+t^2}\\ &\leq\phi(q)\sum_{b\in(\mathbb{Z}/q\mathbb{Z})^*}\int_{|t|>T}\bigg|\sum_{\substack{n\equiv a\mod{q}\\P^-(n)>y}}\frac{\Lambda(n)(\log n)^k}{n^{c+it}}\bigg|^2\frac{\mathrm{d} t}{t^2}\ll \frac{(c_3k)^{2k}(\log x)^{2k+1}}{T},\nonumber\end{aligned}\] where \(c_3=2\sqrt{\log 4}\). Our treatment for the integrals corresponding to the large values of \(t\) is complete and we turn our focus to the integrals whose range of integration is \(|t|\leq T\). For a character \(\chi\notin\{\chi_0,\psi\}\), using Lemma [\[lasl\]](#lasl){reference-type="ref" reference="lasl"}, it follows that \[\begin{aligned} \label{afld} &\int_{|t|\leq T}\Big|\bigg(\frac{L_y^{'}}{L_y}\bigg)^{(k)}(c+it,\chi)\Big|^2\frac{\mathrm{d} t}{c^2+t^2}\\ &\leq4^k((k+1)!)^2\sum_{j=1}^{k+1}(j!)^{-\frac{2(k+1)}{j}}\int_{|t|\leq T}\Big|\frac{L_y^{(j)}}{L_y}(c+it,\chi)\Big|^{\frac{2(k+1)}{j}}\frac{\mathrm{d} t}{c^2+t^2}.\nonumber \end{aligned}\] Since \(\chi\notin\{\chi_0,\psi\}\) and \(y=(10q)^{100}V_T>qV_t\) when \(|t|\leq T\), a proper combination of Theorems [\[lb\]](#lb){reference-type="ref" reference="lb"} and [\[ldnS\]](#ldnS){reference-type="ref" reference="ldnS"} implies that \(\abs{L_y^{-1}(c+it,\chi)}\ll 1\). Moreover, \(|L_y^{(j)}(c+it,\chi)|\ll j!(C\log y)^j\) for all \(j\in\{1,\ldots,k+1\}\), as can be seen from Theorem [\[ub\]](#ub){reference-type="ref" reference="ub"}. Hence, ([\[afld\]](#afld){reference-type="ref" reference="afld"}) gives \[\begin{aligned} \label{1rel} &\sum_{\substack{\chi\mod{q}\\\chi\neq\chi_0,\psi}}\int_{|t|\leq T}\Big|\bigg(\frac{L_y^{'}}{L_y}\bigg)^{(k)}(c+it,\chi)\Big|^2\frac{\mathrm{d} t}{c^2+t^2}\\ &\ll (2C)^{2k}((k+1)!)^2\sum_{j=1}^{k+1}\frac{(\log y)^{2(k+1-j)}}{(j!)^2}\sum_{\substack{\chi\mod{q}\\\chi\neq\chi_0,\psi}}\int_{\mathbb{R}}\abs{L_y^{(j)}(c+it,\chi)}^2\frac{\mathrm{d} t}{c^2+t^2}.\nonumber \end{aligned}\] From an application of Parseval's theorem, it follows that \[\begin{aligned} \label{lP} \sum_{\substack{\chi\mod{q}\\\chi\neq\chi_0, \psi}}\int_{\mathbb{R}}\abs{L_y^{(j)}(c+it,\chi)}^2\frac{\mathrm{d} t}{c^2+t^2}\leq\int_y^{\infty}\sum_{\substack{\chi\mod{q}\\\chi\neq\chi_0}}\Big|\sum_{\substack{n\leq u\\P^-(n)>y}}\chi(n)(\log n)^j\Big|^2\frac{\mathrm{d} u}{u^3}. \end{aligned}\] For \(b\in(\mathbb{Z}/q\mathbb{Z})^*\) and \(u\geq y\), Lemmas [\[chlem\]](#chlem){reference-type="ref" reference="chlem"} and [\[logap\]](#logap){reference-type="ref" reference="logap"} yield that \[\begin{aligned} \label{1''} \sum_{\substack{n\leq u\\n\equiv b \mod{q}\\P^-(n)>y}}(\log n)^j-\frac{1}{\phi(q)}\sum_{\substack{n\leq u\\P^-(n)>y}}\chi_0(n)(\log n)^j\ll\frac{(\log u)^ju^{1-c_1/\log y}}{\phi(q)\log y}. \end{aligned}\] Since \(\int_y^v(\log t)^j\mathrm{d} t\leq v(\log v)^j\) for \(v\geq y\), these lemmas also imply that \[\begin{aligned} \label{2''} \sum_{\substack{n\leq u\\n\equiv b \mod{q}\\P^-(n)>y}}(\log n)^j+\frac{1}{\phi(q)}\sum_{\substack{n\leq u\\P^-(n)>y}}\chi_0(n)(\log n)^j\ll\frac{u(\log u)^j}{\phi(q)\log y}. \end{aligned}\] We combine ([\[1\'\'\]](#1''){reference-type="ref" reference="1''"}) and ([\[2\'\'\]](#2''){reference-type="ref" reference="2''"}) with the elementary identity \(w^2-z^2=(w-z)(w+z)\) and infer that \[\begin{aligned} &\sum_{\substack{\chi\mod{q}\\\chi\neq \chi_0}}\Big|\sum_{\substack{n\leq u\\P^-(n)>y}}\chi(n)(\log n)^j\Big|^2\\ &=\phi(q)\sum_{b\in(\mathbb{Z}/q\mathbb{Z})^*}\bigg\{\Big(\sum_{\substack{n\leq u\\n\equiv b \mod{q}\\P^-(n)>y}}(\log n)^j\Big)^2-\Big(\frac{1}{\phi(q)}\sum_{\substack{n\leq u\\P^-(n)>y}}\chi_0(n)(\log n)^j\Big)^2\bigg\}\\ &\ll\frac{(\log u)^{2j}u^{2-c_1/\log y}}{(\log y)^2}, \end{aligned}\] for all \(j\in\{1,\ldots,k+1\}\). We plug this estimate into ([\[lP\]](#lP){reference-type="ref" reference="lP"}) and obtain \[\begin{aligned} \sum_{\substack{\chi\mod{q}\\\chi\neq\chi_0, \psi}}\int_{\mathbb{R}}\abs{L_y^{(j)}(c+it,\chi)}^2\frac{\mathrm{d} t}{c^2+t^2}&\ll\frac{1}{(\log y)^2}\int_y^{\infty}(\log u)^{2j}u^{-1-c_1/\log y}\mathrm{d} u\\ &=c_1^{-2j-1}(\log y)^{2j-1}\Gamma(2j+1)\leq c_1^{-3}(2j)!(\log y)^{2j-1}, \end{aligned}\] for \(j\in\{1,\ldots,k+1\}\). Now, with this last bound, ([\[1rel\]](#1rel){reference-type="ref" reference="1rel"}) turns into \[\begin{aligned} \sum_{\substack{\chi\mod{q}\\\chi\neq\chi_0,\psi}}\int_{|t|\leq T}\Big|\bigg(\frac{L_y^{'}}{L_y}\bigg)^{(k)}(c+it,\chi)\Big|^2\frac{\mathrm{d} t}{c^2+t^2}\ll (2C)^{2k}((k+1)!)^2(\log y)^{2k+1}\sum_{j=1}^{k+1}\binom{2j}{j}. \end{aligned}\] But, the series \(\sum_{n\geq 1}\binom{2n}{n}5^{-n}\) converges because of the ratio test, and so \[\sum_{j=1}^{k+1}\binom{2j}{j}\leq 5^{k+1}\sum_{j=1}^{k+1}\binom{2j}{j}5^{-j}\leq25^k\sum_{j\geq 1}\binom{2j}{j}5^{-j}\ll 25^k.\] Therefore, we complete the estimation of the integrals over \(|t|\leq T\) by arriving at the bound \[\begin{aligned} \label{lart} \sum_{\substack{\chi\mod{q}\\\chi\neq\chi_0,\psi}}\int_{|t|\leq T}\Big|\bigg(\frac{L_y^{'}}{L_y}\bigg)^{(k)}(c+it,\chi)\Big|^2\frac{\mathrm{d} t}{c^2+t^2}\ll (10C)^{2k}((k+1)!)^2(\log y)^{2k+1}. \end{aligned}\] Putting ([\[smt\]](#smt){reference-type="ref" reference="smt"}) and ([\[lart\]](#lart){reference-type="ref" reference="lart"}) together, we deduce that \[\begin{aligned} \sum_{\substack{\chi\mod{q}\\\chi\neq\chi_0,\psi}}\int_{\mathbb{R}}\Big|\bigg(\frac{L_y^{'}}{L_y}\bigg)^{(k)}(c+it,\chi)\Big|^2\frac{\mathrm{d} t}{c^2+t^2}\ll (10C)^{2k}((k+1)!)^2(\log y)^{2k+1}+\frac{(c_3k)^{2k}(\log x)^{2k+1}}{T}. \end{aligned}\] We insert this into ([\[afP\]](#afP){reference-type="ref" reference="afP"}) and conclude that \[\begin{aligned} \label{afc} &\bigg(\sum_{\substack{\chi\mod{q}\\\chi\neq \chi_0, \psi}}\int_{\frac{\sqrt{x}}{2}}^x\Big|\sum_{\substack{\ell\leq t\\P^-(\ell)>y}}\Lambda(\ell)\chi(\ell)\Big|^2\frac{\mathrm{d} t}{t^3}\bigg)^{1/2}\\ &\ll\sqrt{\frac{\phi(q)}{x}}+(10M_0C)^k(k+1)!\frac{(\log y)^{k+\frac{1}{2}}}{(\log x)^k}+\frac{(c_3M_0k)^k(\log x)^{k+\frac{1}{2}}}{\sqrt{T}}.\nonumber \end{aligned}\] In turn, ([\[afc\]](#afc){reference-type="ref" reference="afc"}), when used in ([\[bP\]](#bP){reference-type="ref" reference="bP"}), implies that \[\begin{aligned} \label{alend} \frac{1}{D}\sum_{\substack{1<m\leq\sqrt{x}\\P^-(m)>y}}\int_{x-D}^x\Delta\Big(\frac{x}{t},y;q,a\overline{m}\Big)\mathrm{d} t\ll\frac{x}{\phi(q)}\bigg(\frac{\log x}{\log y}\bigg)^{3/2}\bigg\{\bigg(\frac{M_1\ell\log y}{\log x}\bigg)^{\!\!\ell}+\frac{(c_3M_0\ell)^{\ell}}{\sqrt{T}}\bigg\}, \end{aligned}\] where \(\ell=k+1\) and \(M_1=10M_0C\). Note that we omitted the term stemming from \(\sqrt{\phi(q)}/\sqrt{x}\), since we are working with a \(x\geq q^B\) for a sufficiently large \(B\). Now, we combine ([\[recres\]](#recres){reference-type="ref" reference="recres"}) with ([\[alend\]](#alend){reference-type="ref" reference="alend"}) and obtain that \[\begin{aligned} \label{forend} \Delta(x,y;q,a)\ll \frac{x}{\phi(q)}\bigg(\frac{\log x}{\log y}\bigg)^{3/2}\bigg\{\bigg(\frac{M_2\ell\log y}{\log x}\bigg)^{\!\!\ell}+\frac{(c_3M_0\ell)^{\ell}}{\sqrt{T}}\bigg\}, \end{aligned}\] where \(M_2=\max\{M_1,2/\delta\}\). If \(C'=eM_2\), then by choosing \[\ell=\flbgg{\frac{\log x}{C'\log y}},\] it follows that \[\bigg(\frac{M_2\ell\log y}{\log x}\bigg)^{\!\!\ell}\leq \frac{\log x}{M_2\log y}x^{-1/(C'\log y)}.\] Since \(T=\exp\{2L(\log x)^{3/5}(\log\log x)^{2/5}\}\), we have \(\log V_T\asymp (\log x)^{2/5}(\log\log x)^{3/5}\), and so with the above integer \(\ell\), we deduce that \[\begin{aligned} \label{opt1} \bigg(\frac{\log x}{\log y}\bigg)^{3/2}\bigg(\frac{M_2\ell\log y}{\log x}\bigg)^{\!\!\ell}&\ll x^{-\frac{1}{2C'\log y}}\ll x^{-\frac{1}{4C'\log (2q)}}+e^{-\frac{(\log x)^{3/5}}{4C'(\log\log x)^{3/5}}}. \end{aligned}\] In order to justify the last step, note that the first term \(x^{-1/(4C'\log (2q))}\) of the rightmost side dominates \(x^{-1/(2C'\log y)}\) when \(V_T\geq q\), while the second term majorizes the expression \(x^{-1/(2C'\log y)}\) when \(q\geq V_T\). We also observe that \(\ell\leq \log x/\log V_T\ll (\log x)^{3/5}(\log\log x)^{-3/5}\) and that \(\log\ell\leq\log\log x\). Hence, there exist some positive constants \(c_4\) and \(c_5\) such that \[\begin{aligned} \label{opt2} \bigg(\frac{\log x}{\log y}\bigg)^{3/2}\frac{(c_3M_0\ell)^{\ell}}{\sqrt{T}}&\leq \exp\bigg\{\ell\log \ell+\log(c_3M_0)\ell+\frac{3}{2}\log\log x-L(\log x)^{3/5}(\log\log x)^{2/5}\bigg\}\nonumber\\ &\leq\exp\{c_4(\log x)^{3/5}(\log\log x)^{1-9/15}-L(\log x)^{3/5}(\log\log x)^{2/5}\}\nonumber\\ &\leq\exp\{-c_5(\log x)^{3/5}(\log\log x)^{2/5}\}, \end{aligned}\] because the constant \(L\) in the definition of \(T\) is suffiently large. With the selection of \(\ell\) that we made, we have the estimates ([\[opt1\]](#opt1){reference-type="ref" reference="opt1"}) and ([\[opt2\]](#opt2){reference-type="ref" reference="opt2"}) and then ([\[forend\]](#forend){reference-type="ref" reference="forend"}) becomes \[\begin{aligned} \Delta(x,y;q,a)\ll\frac{x^{1-c_6/\log(2q)}}{\phi(q)}+\frac{xe^{-c_6(\log x)^{3/5}(\log \log x)^{-3/5}}}{\phi(q)}, \end{aligned}\] where \(c_6=1/(4C')\). The proof of the theorem is almost complete. It only remains to observe that \(\Delta(x,y;q,a)\) does not differ much from \[\sum_{\substack{n\leq x\\n\equiv a\mod{q}}}\Lambda(n)-\frac{x}{\phi(q)}-\frac{\psi(a)}{\phi(q)}\sum_{n\leq x}\Lambda(n)\psi(n).\] First, \[\sum_{\substack{n\leq x\\n\equiv a\mod{q} \\P^-(n)>y}}\Lambda(n)=\sum_{\substack{n\leq x\\n\equiv a\mod{q}}}\Lambda(n)+O\bigg(\frac{y\log x}{\log y}\bigg),\] because \[\begin{aligned} 0\leq \sum_{\substack{n\leq x\\n\equiv a\mod{q}}}\Lambda(n)-\sum_{\substack{n\leq x\\n\equiv a\mod{q} \\P^-(n)>y}}\Lambda(n)=\sum_{\substack{p^{\nu}\leq x\\p\leq y}}\Lambda(p^{\nu})\leq \pi(y)\log x\ll\frac{y\log x}{\log y}. \end{aligned}\] Similarly, \[\sum_{\substack{n\leq x\\P^-(n)>y}}\Lambda(n)\chi(n)=\sum_{n\leq x}\Lambda(n)\chi(n)+O\bigg(\frac{y\log x}{\log y}\bigg)\] for \(\chi\in\{\chi_0,\psi\}\). In addition, there exists a constant \(c_7>0\) such that \[\sum_{n\leq x}\Lambda(n)\chi_0(n)=x+O(x\exp\{-c_7(\log x)^{3/5}(\log\log x)^{-1/5}\}),\] and so, when \(x\geq q^B\) for a large \(B>0\), with the \(y\) that we had chosen, we conclude that \[\begin{aligned} &\Delta(x,y;q,a)=\sum_{n\leq x}\Lambda(n)-\frac{x}{\phi(q)}-\frac{\psi(a)}{\phi(q)}\sum_{n\leq x}\Lambda(n)\psi(n)\\ &\ll\frac{x^{1-c_6/\log(2q)}}{\phi(q)}+\frac{xe^{-c_8(\log x)^{3/5}(\log \log x)^{-3/5}}}{\phi(q)} \end{aligned}\] with \(c_8=\min\{c_6,c_7\}\). The theorem has now been proven.
{'timestamp': '2022-09-30T02:07:15', 'yymm': '2209', 'arxiv_id': '2209.14538', 'language': 'en', 'url': 'https://arxiv.org/abs/2209.14538'}
null
null
# Introduction Legal information retrieval is a specialized task in natural language processing (NLP) that involve retrieving relevant legal documents [^1] given a query. Compared with traditional text retrieval, legal text retrieval is more difficult since legal documents are often long and complicated. On the other hand, questions are often highly complex and need a person with good expertise to give the correct answer. Legal information retrieval for English documents has received a lot of attentions. COLIEE [^2] is an annual competition about legal information extraction/entailment or JURIX [^3] is an annual conference on legal AI. However, there are very few studies on Vietnamese legal information retrieval. Recent studies of Vietnamese legal text retrieval have been mainly on CNN architecture combined with attention mechanism, using fine-tuned Multilingual transformer model like XLM-RoBERTa. In recent years, monolingual transformer models like PhoBERT, ViBERT have beat the state-of-the-art (SOTA) in many NLP tasks in Vietnamese like Part-of-Speech(POS tagging), Named-Entity Recognition(NER), and Dependency Parsing(DP). Sentence-BERT(SBERT) and models evolved from it have recently reached significant results on several tasks like semantic searching or information retrieval. In this paper, we focus on exploring fine-tuned sentence-transformer monolingual models for Vietnamese legal text retrieval. The contribution of this paper is two-fold. First, we propose a novel pipeline of multi-stage information retrieval based on sentence-transformer for Vietnamese legal texts. Experiments were conducted and the results show that the proposed pipeline significantly outperforms existing models. Second, empirical analyses of the effects of multiple factors including language models(LM), word segmentation methods, and ranking scores on the performance of information retrieval are performed. The results show that SPhoBERT-large language model, word-based segmentation, and system with combine ranking scores yield the best result in information retrieval for Vietnamese legal documents. # Background and Related Work In this paper, we focus on answering legal queries at the article level. Given a legal query, our goal is to retrieve all the relevant articles, that can be used as the fundamental to answer the query. Many approaches, especially for ad-hoc text retrieval have been proposed, from past decades to recent years. ### Non-neural approaches These methods, decide relevance based on the frequency and occurrence of the words in the query and the documents. Non-neural approaches do not perform well in the semantic searching problem due to lexical mismatching in the answers. However, they are still useful for current SOTA models. BM25 and tf-idf are well-known among all while BM25+ is currently the most effective in the approach. To overcome the lexical mismatching challenge, dense embedding is used to represent queries and documents. The main idea of this method was proposed with the LSI approach. ### Attention mechanism approaches Attention mechanism makes the model able to focus more on the main keywords or informative sentences in the original text. Kien and Nguyen et al. signed a simple attentive convolution neural network for Vietnamese legal text retrieval . Nguyen also used this method in his dissertation. Their retrieval system can capture both local and global contexts to construct to build representation vectors. ### Transformer cross-encoder approaches BERT brings breakthroughs in NLP. The cross-encoder approach is the first widely approach of BERT in information retrieval. Both query and document will be passed simultaneously to the BERT network. Birch-the system combines lexical matching and the cross-encoder approach for better performance. Several other studies applied the cross-encoder approach and reached significant results. BERT-PLI is a retrieval system based on these approaches. However, these approaches require lots of time for training and costly computation resource. ### Transformer bi-encoder approaches Cross-encoder approaches are costly and time-consuming for training. Motivated by this, Reimers and Gurevych presented SBERT which uses SiameseBERT-network to represent semantically meaningful sentence embeddings. SBERT produce vector embedding for each sentence independently. When we want to compare two sentences, we just need to calculate the cosine similarity of the two existing vectors. The authors of SBERT train the bi-encoder from BERT and compare two input sentences using cosine similarity. For question answering(QA) or IR tasks, many studies developed from or applied SBERT and get high performance.According to recent research by Gao and Callan standard LMs' internal attention structure is not ready to use for dense encoders. The authors proposed a new transformer architecture, Condenser as an improvement for the bi-encoder approach. For applying bi-encoder approach for Vietnamese, to the best of our knowledge, there is only one paper on bi-encoder approach and the solution [^4] for an annual competition of artificial intelligence. # Sentence-transformers based Multi-stage information retrieval for Vietnamese legal text The general idea of our approach is to use both lexical matching and semantic searching to improve the performance of our system. For lexical matching, we used BM25+ in package rank_bm25 library [^5]. For semantic searching, we trained sentence-transformer models by contrastive learning. For each query in training dataset, the label of the relevant article to query is 1 while the negative sample is 0. To get the negative samples, we took the top-k highest ranking score in the previous training round. Then the samples for each query was k+(number of positive articles)as positive(pos) and negative(neg) pairs. We used BM25+ and then trained the sentence-transformer model for three rounds. Our pipeline for training are shown in Figure [\[pipeline for training\]](#pipeline for training){reference-type="ref" reference="pipeline for training"} # Experiments ## Datasets The dataset used in our paper is from the original dataset in the paper published by Kien et al.. We clean the data to reduce the noise in the legal corpus. The removed laws and articles do not appear in QA dataset while QA dataset remains the original so that data cleaning does not affect the evaluation results. Finally, we obtained the legal corpus containing 8,436 documents with 114,177 articles. In legal corpus, we concatenated title and text in each article as a \"very long\" sentence. Not like English, Vietnamese syllables and word tokens are different. For example, 4-syllable written text \"Bài báo khoa học\" (scientific paper) form 2 words \"Bài_báo khoa_học \". We used VNCoreNLP for word segmentation. We divided the corpus into 4 types of lengths: \< 100, 101-256,257-512, and 513+. 256 is the maximum number of tokens supported by PhoBERT while 512 is the maximum number of tokens supported by ViBERT. Table [\[len_syl\]](#len_syl){reference-type="ref" reference="len_syl"} and table [2](#len_word){reference-type="ref" reference="len_word"} show percentage of articles based on length. For QA dataset, we found that only 1,709 articles (about 1.5% of the whole articles) in the legal corpus appear and about 95% of questions in both training and testing datasets have one to three relevant articles. ## Experimental procedure We use a single NVIDIA Tesla P100 GPU via Google Colaboratory to train all the models. Figure [\[experiment procedure\]](#experiment procedure){reference-type="ref" reference="experiment procedure"} presents an overview of the experimental procedure in this paper. ### Monolingual pre-trained models - PhoBERT pre-training approach is based on RoBERTa which is using Dynamic Masking to create masked tokens. Because two PhoBERT versions are trained on large-scale Vietnamese dataset, they perform great results on several NLP tasks in Vietnamese like NER, POS tagging, and DP. - ViBERT leverages checkpoint from mBERT and continues training on 10 GB of Vietnamese news data. ViBERT pre-training approach based on BERT which has model architecture is a multilayer bidirectional Transformer encoder. ViBERT now is supporting sequence lengths up to 512 tokens, this is an advantage compared to only 256 tokens supported by PhoBERT. ### Word-level and syllable-level approaches In a field that contains many semantic challenges such as law, we want to evaluate how words and syllables of Vietnamese affect the results of models. We trained transformer models on both word-level and syllable-level independently in every below step. ### Fine-tuning monolingual language models We used our legal corpus to fine-tune masked language modeling of monolingual language models. We set gradient_accumulation_steps = 4, train_batch_size = 8, eval_batch_size = 8 and epochs = 20. ### Fine-tuning Condenser After training mask language modeling, we used both versions of PhoBERT to train Condenser. We used source code [^6] for creating data in Condenser's form and fine-tuning Condenser from PhoBERT. ### Lexical matching For lexical matching, we used BM25+. VNCoreNLP was used for word segmentation. Stopwords were also removed to make the model focus on important words. Our goal after this step is to get the list of the top highest lexical similarity articles for each query. ### Training sentence-transformer We trained 3 rounds for sentence-transformer. The choosing method we mentioned above, for short, we will call the number of negative sample each round is k. In the first round, we picked 35 negative samples from BM25+. These negative samples almost are high lexical similarity to queries but low semantic similarity. In the second round, we picked 20 negative samples from the first round. These negative samples have better semantic similarity to queries. In the third round, we pick 15 negative samples from the second round. These negative samples are really close semantic to queries. We set batch_size=8, epochs = 4, learning_rate = 1e-5. For loss function, we used contrastive loss ### Evaluation metrics The first measure we use to evaluate the performance of the system is (macro)recall\@20, where 20 is the number of the top selected articles. The second evaluation metric we use is F2. The F2-measure is shown below: \[Precision\raisebox{-0.7ex}{\footnotesize{i-th}} = \frac{\text{the number of correctly retrieved articles of query i-th}}{\text{the number of retrieved articles of query i-th}}\] \[Recall\raisebox{-0.7ex}{\footnotesize{i-th}} = \frac{\text{the number of correctly retrieved articles of query i-th}}{\text{the number of relevant articles of query i-th}}\] \[F2\raisebox{-0.7ex}{\footnotesize{i-th}} = \frac{\text{5*Precision\raisebox{-0.7ex}{\footnotesize{i-th}}*Recall\raisebox{-0.7ex}{\footnotesize{i-th}}}}{\text{4*Precision\raisebox{-0.7ex}{\footnotesize{i-th}}+Recall\raisebox{-0.7ex}{\footnotesize{i-th}}}}\] \[F2= \text{average of (F2\raisebox{-0.7ex}{\footnotesize{i-th}})}\] ## Results of BM25+ and sentence-transformer The models we selected can only compute scores between query-rule pairs. The performance of the model on F2 will decrease if we choose too many articles. In order to get good results on the F2 measure, we have to set a suitable threshold. Let the highest score between each query and all articles as highest_score. The articles would be chosen if their scores in range \[highest_score-threshold, highest_score\]. For short, we rewrite sentence-transformer Condenser trained from PhoBERT-base and PhoBERT-large respectively SConPBB and SConPBL in the below table. The result in Table [3](#single model){reference-type="ref" reference="single model"} shows that: sentence-transformer models outperform BM25+. However, we want to build a retrieval system with both lexical matching and semantic searching approaches. We consider the combining score of these two approaches. More than 95% of questions have one to three relevant articles. We visualized the average score of the top 3 highest scores of BM25+. ## Retrieval system using BM25+ and sentence-transformer Sentence-transformer uses the cosine similarity(cos_sim) of the two vectors query and article to rank.Cos_sim is always in range \[-1,1\]. According to Figure [\[fig:top3_BM25_avg\]](#fig:top3_BM25_avg){reference-type="ref" reference="fig:top3_BM25_avg"} average score of BM25+ is much larger than cos_sim while semantic approach makes a big gap. Combining score for ranking in previous work like (1-\(\alpha\))\*lexical_score + \(\alpha\) \* semantic_score will not work or take much time to fine the \(\alpha\). We proposed two combining score: sqrt(BM25_score)\*cos_sim and BM25_score\*cos_sim to rank our retrieval systems. Similar to single model, we used suitable threshold for retrieval system to get best results on F2. For short, we named the retrieval system by a name of sentence-transformer model within it. Based on the results from Tables [3](#single model){reference-type="ref" reference="single model"}, [\[retrieval_sys\]](#retrieval_sys){reference-type="ref" reference="retrieval_sys"}, we had three observations: - If LMs were pre-trained on word-level data like PhoBERT and CondenserPhoBERT, trained sentence-transformer models on word-level data bring better results. - If LM were pre-trained on syllable-level data like ViBERT, trained sentence-transformer model on syllable-level data bring better results. - The system with both lexical matching and semantic searching performances better than sentence-transformer model within it. - Sqrt(BM25_score)\*cos_sim is the best ranking score for the system on F2 while BM25_score\*cos_sim is the best on recall\@20. ## Comparison with previous Vietnamese legal text retrieval systems Our best performing system on F2 is SPhoBERT-large(word) system with ranking score: sqrt(BM25_score)\*cos_sim. On Recall\@20, our best performing system is SPhoBERT-large(word) system with ranking score: BM25_score\*cos_sim. For short, we call our best retrieval system on F2 is our best system 1 and our best retrieval system on Recall\@20 is our best system 2. Table [\[CompareF2\]](#CompareF2){reference-type="ref" reference="CompareF2"} and Table [5](#CompareRecall@20){reference-type="ref" reference="CompareRecall@20"} illustrate the results of our best systems compared with the previous systems. It is proved that our system yields the best performance on both metrics. ## Analysis by the number of relevant articles related to queries We used best retrieval system from each sentence-transformer model to analysis effect of the number of relevant articles to queries in both metrics. Our observations based on the results from Figures [\[F2_num\]](#F2_num){reference-type="ref" reference="F2_num"}, [\[recall_num\]](#recall_num){reference-type="ref" reference="recall_num"}: - The more relevant articles relate to the query, the lower F2 of the systems there. Part of the reason for this is because we set the threshold pretty low. So the range \[highest_score-threshold, highest_score\] would not be large enough to cover many the relevant articles. - Queries with (3,5,7) relevant articles make the systems with recall\@20 significantly lower than queries with (2,4,6) relevant articles. Most of the recall\@20 results of systems are pulled down because of queries with (2,4,6) relevant articles. - SViBERT system achieves much better results than other systems on the recall\@20 measure in queries with (5,6) relevant articles. - SPhoBERT-large achieved the best results because it outperformed other systems in queries with (3,5,7) relevant articles. ## Data-driven error analysis There are two main errors we found during the experiment. First, wrong crawling relevant articles for query in the dataset. After a thorough discussion, we all agreed that the answer to this question was wrong. The example in Table [6](#tab:wrong_crawling){reference-type="ref" reference="tab:wrong_crawling"} shows that relevant article was wrongly collected. The question is about person who is obliged to execute the judgment returns the non-implementation papers while relevant article is about principles of auction of land use rights. We did not find any correlation between the question and the answer. [\[tab:wrong_crawling\]]{#tab:wrong_crawling label="tab:wrong_crawling"} Second, very hard semantic queries and relevant articles. These queries often miss-matching lexical with their relevant articles. Both of them are also long and contain difficult specialized words. To be able to understand the semantic of these queries and articles will still be a big challenge for retrieval systems. In Table [7](#tab:hard_semantic){reference-type="ref" reference="tab:hard_semantic"}, \"pháp nhân\" is a specialized word in Vietnamese legal. To the best of our knowledge, the word has the closest meaning to it in English is corporation. We found the answer for the query in clause c) of this article. This article and query are lexical mismatching, so retrieval system will not work as well as sentence-transformer model. We used SPhoBERT-large which is the best semantic searching model to evalute cos_sim between question and clause c) only. The result is 0.351. This shows that our model is still limited in the face of questions and answers with high semantic difficulty. # Conclusion and future work In this paper, we proposed multi-stage information retrieval based on sentence-transformers for Vietnamese legal texts. We also compare the best performance model to the Attentive CNN model (previous SOTA in this QA dataset). The results indicate that our models outperform previous SOTA in both evaluation metrics. In future work, we will try other techniques for long articles like summary, and keyword extraction. We will also improve the models to learn the to learn the relationship between queries and rules of very high semantic complexity. [^1]: In this paper, \"text\" and \"document\" are used interchangeably [^2]: <https://sites.ualberta.ca/~rabelo/COLIEE2022/> [^3]: <http://jurix.nl/conferences/> [^4]: <https://github.com/CuongNN218/zalo_ltr_2021> [^5]: <https://pypi.org/project/rank-bm25/> [^6]: [ https://github.com/luyug/Condenser]( https://github.com/luyug/Condenser)
{'timestamp': '2022-09-30T02:05:47', 'yymm': '2209', 'arxiv_id': '2209.14494', 'language': 'en', 'url': 'https://arxiv.org/abs/2209.14494'}
# Introduction Quantum interference is one of the most vivid illustrations of the wave nature of quantum mechanical systems. It shows up whenever multiple paths of different phases or multiple energy levels are present, from double slit experiments and weak localization to Landau-Zener interference. Quantum interference also underlies many important applications, whether it is atomic clocks or Shor's factorization algorithm, and would conceivably be a key feature to many future quantum coherent devices. One example of the consequences of quantum interference is coherent population trapping (CPT), as a result of destructive interference between different transition paths, and first observed in a three-level atom in an optical experiment. In such a three-level system, two states are coupled to a third, intermediate, state. When the driving fields are properly detuned for the two allowed transitions, a superposition of the first two states emerges and is decoupled from the intermediate states. Such a superposition is called a "dark state" since a system trapped in this state would not respond to the probe field, leading to interesting phenomena such as electromagnetically induced transparency. By adiabatically tuning the controls of the dark state (such as the amplitude and phase of the driving fields), one can perform rapid state initialization and Stimulated Raman Adiabatic Passage (STIRAP) with suppressed excitation. Compared to state manipulation based on resonant driving, STIRAP has significant advantages in robustness, while maintaining high degree of efficiency and selectivity, and is thus of great importance in quantum information processing. CPT has been extensively studied in various physical systems since its first observation, and widely employed in both metrology and quantum engineering, from atomic cooling and atomic clock, to high-sensitivity magnetometry and quantum state manipulation. In condensed matter systems, CPT has been demonstrated in doped crystals, ultracold atoms, color centers in diamond, superconducting circuits, microelectromechanical systems and self-assembled quantum dots. In contrast, in electrically-controlled gate-defined quantum dots (QDs), which are viewed as one of the promising platforms for quantum computing, CPT has received less attention. This is due to differences in energy structure and the way electromagnetic field couples to the system, even though QDs, particularly double quantum dots (DQD), provide intriguing possibilities for CPT. For example, in an atom, the optical field participates in CPT in two aspects, to couple the energy levels, and to serve as a probe. On the other hand, DQD energy levels are tunable, and its state can be readout via electronic methods, so that CPT without driving fields and CPT measurement without a probe field are both possible. In this letter, we demonstrate CPT in a gate-defined DQD without drive or probe field, and also with one longitudinal drive. We focus on a singlet-triplet (ST) system in a DQD device for holes, and measure the leakage current through the DQD in the Pauli Spin Blockade (PSB) regime. In the absence of driving, we observe a sharp dip in the leakage current at zero bias, which can be attributed to the formation of dark states and the occurrence of CPT. When the ST system is driven longitudinally through detuning \(\varepsilon\), we again observe CPT under proper conditions, and the physical picture can be explained using an effective Hamiltonian for this longitudinally driven system (with distinctive features compared to the transversely driven atomic systems, such as the modulation of the effective couplings and the observation of the odd-even effect ). Importantly, with controls provided by the driving, we show that STIRAP is feasible. Our sample is fabricated in a Ge hut nanowire. The DQD is defined in the nanowire by depositing Aluminum electrodes above, which control the numbers of holes in each dot and the coupling strength in between. Figure [\[fig-1\]](#fig-1){reference-type="ref" reference="fig-1"} (a) shows a scanning electron micrograph of the device, where the black dashed box indicates the location of the nanowire. Sketch of the cross-section along the nanowire is presented in the inset, where the DQD potential, from interdot detuning to tunnel barriers, is tuned by gate voltages \(U_i\). In addition, microwave drive is applied to \(U_2\) gate when we study driven dynamics. A uniform magnetic field is applied perpendicular to the nanowire, as shown in Fig. [\[fig-1\]](#fig-1){reference-type="ref" reference="fig-1"} (a). The device is cooled in a dilution refrigerator with a base temperature of \(200\) mK. We perform transport measurement through the DQD. Figure [\[fig-1\]](#fig-1){reference-type="ref" reference="fig-1"} (b) shows the current as a function of gate voltages \(U_2\) and \(U_4\), which determine the energy levels and thus the occupation of the two dots. When gate voltages are set in the region outlined by the black dashed trapezoid in Fig. [\[fig-1\]](#fig-1){reference-type="ref" reference="fig-1"} (b), we observe PSB, when current is blocked due to spin configurations of the holes instead of Coulomb interaction. In Fig. [\[fig-1\]](#fig-1){reference-type="ref" reference="fig-1"} (b) we define the interdot detuning \(\varepsilon\) along the black solid arrow. When \(\varepsilon\) is tuned deeper into negative beyond the PSB regime, excited orbital states are involved in the transition and lift the PSB, leading to a jump in current. Based on the width of the PSB region in Fig. [\[fig-1\]](#fig-1){reference-type="ref" reference="fig-1"} (b), we estimate the magnitude of the excitation energy of the DQD to be \(\sim 1 \text{meV}\). While our DQD is still in the multi-hole regime, in the PSB regime the system is well described by an effective two-hole model near the \((N+2,M+0)\) to \((N+1,M+1)\) charge transition, where \(N\) and \(M\) refer to the nominal number of core holes in the left and right QDs that do not participate in transport. More specifically, the low-energy DQD Hamiltonian can be expanded in the basis of five effective two-hole states \(\{|\uparrow\uparrow\rangle,~ |\uparrow\downarrow\rangle,~ |\downarrow\uparrow\rangle,~ |\downarrow\downarrow\rangle,~ |S_{20}\rangle\}\). Here \(|S_{20}\rangle\) denotes a singlet state \(|S\rangle = (|\uparrow\downarrow\rangle-|\downarrow\uparrow\rangle)/\sqrt2\) with a charge configuration of \((N+2,M+0)\), while the charge configuration of the other four states has the two valence holes evenly distributed between the dots as \((N+1,M+1)\). The Hamiltonian in this basis is given by \[H = \begin{pmatrix} \bar E_z &0 &0 &0 & t_{so}\\ 0& \delta E_z & 0& 0& t\\ 0& 0&-\delta E_z & 0&-t\\ 0& 0& 0&-\bar E_z & t_{so}\\ t_{so} & t &-t & t_{so}& \varepsilon \end{pmatrix}, \label{eq-H}\] where \(\varepsilon\) is the detuning defined in Fig. [\[fig-1\]](#fig-1){reference-type="ref" reference="fig-1"} (b), \(\bar E_z=(g_1+g_2)\mu_B B/2\), \(\delta E_z=(g_1-g_2)\mu_B B/2\), with \(g_{1,2}\) the g-factors of the hole spins in the two QDs, \(\mu_B\) the Bohr magneton and \(B\) the external magnetic field strength. Spin-flip tunneling (\(t_{so}\)) couples \(|S_{20}\rangle\) to \(|T_\pm\rangle\), while \(t\) gives the spin-preserved inter-dot tunnel coupling strength. Figure [\[fig-1\]](#fig-1){reference-type="ref" reference="fig-1"} (c) presents the low-energy spectrum as a function of \(\varepsilon\) when \(B\ne 0\), and Fig. [\[fig-1\]](#fig-1){reference-type="ref" reference="fig-1"} (d) gives a schematic illustration of possible tunneling events between source/drain and QDs. Notice that in general \(t_{so} \ll t\), even for a hole system like ours, as can be qualitatively seen in the contrast of the current amplitude between the PSB regime and the non-PSB-non-Coulomb-blockade regime shown in Fig. [\[fig-1\]](#fig-1){reference-type="ref" reference="fig-1"} (b). Nevertheless, the presence of \(t_{so}\) means that in our DQD, PSB is not complete, and a finite leakage current is always present through the DQD, as shown by the elevated current in the PSB regime compared to the surrounding Coulomb-blocked areas in Fig. [\[fig-1\]](#fig-1){reference-type="ref" reference="fig-1"} (b). In the rest of this study, our focus will be on how the leakage current in the PSB regime varies with system parameters and possible driving. The form of the ST Hamiltonian \(H\) is reminiscent of the one for the original observation of CPT. In particular, when \(B=0\), the system should have three dark states that are orthogonal to \(|S_{20}\rangle\), the final state for the transitions here: \((|\uparrow\uparrow\rangle-|\downarrow\downarrow\rangle)/\sqrt2\), \((|\uparrow\downarrow\rangle+|\downarrow\uparrow\rangle)/\sqrt2\) and \((\sin\theta|\uparrow\uparrow\rangle-\cos\theta|\uparrow\downarrow\rangle+\cos\theta|\downarrow\uparrow\rangle + \sin\theta|\downarrow\downarrow\rangle)/2\), where \(\theta=\arctan(t/t_{so})\). With these states all in the \((N+1,M+1)\) charge configuration decoupled from the \(|S_{20}\rangle\) state in the \((N+2, M)\) configuration, PSB should be strengthened and the leakage current should be suppressed. In other words, CPT in our DQD should manifest itself as a suppression in the leakage current. To experimentally demonstrate the possible existence of these dark states and therefore CPT, we measured transport current through the DQD versus the applied field \(B\) and interdot detuning \(\varepsilon\) (controlled by \(U_4\)), as is shown in Fig. [\[fig-2\]](#fig-2){reference-type="ref" reference="fig-2"} (a). This method has been used to characterize mechanisms leading to leakage current through PSB, such as hyperfine interaction, spin-orbit coupling, *etc.*. In a significant deviation from previous results, we observe an abrupt and narrow current suppression at zero field, as is shown in Fig. [\[fig-2\]](#fig-2){reference-type="ref" reference="fig-2"} (a). The cross-section at \(\varepsilon=0\) is measured repeatedly, and the result is shown in Fig. [\[fig-2\]](#fig-2){reference-type="ref" reference="fig-2"} (b). The signal is clearly a narrow sharp dip on a broad peak (instead of a superposition of two peaks), which is a distinct feature of CPT. To understand our observation, we have carried out a detailed theoretical analysis. Specifically, we model sequential tunneling through the DQD by operator \(T = i\sum_{s_z,s_z'}|s_zs_z'\rangle\langle S_{20}|+h.c.\), where the summation runs over all possible states in the \(|(1, 1)\rangle\) configuration, and \(h.c.\) stands for Hermitian conjugate. The transport current is then evaluated as \(I \propto \text{tr}(T\rho)\), where \(\rho\) is the steady-state density matrix of the DQD, obtained from the Lindblad master equation (LME) \[\frac{d\rho}{dt} =-\frac{i}{\hbar}[H, \rho] + \sum_k \left(L_k\rho L_k^\dagger-{1\over2}\{L^\dagger_kL_k, \rho\}\right), \label{eq-LME}\] with \(L_k\) the Lindblad operators representing relaxation and dephasing in the DQD. In our device, the ST system undergoes a transport cycle of \(|S_{20}\rangle\to|(1, 0)\rangle\to|(1, 1)\rangle\to|S_{20}\rangle\) as indicated by the arrows in Fig. [\[fig-1\]](#fig-1){reference-type="ref" reference="fig-1"} (d). In practice, the dot-reservoir tunneling rate labeled by \(\Gamma\) in Fig. [\[fig-1\]](#fig-1){reference-type="ref" reference="fig-1"} (d) is in the order of \(10\) GHz, which is significantly greater than the interdot tunnel coupling strength \(t\) and \(t_{so}\). The steady state population of \(|S_{20}\rangle\) is thus very small, since it would rapidly relax to \(|(1,0)\rangle\) and the DQD would then quickly reload into one of the \(|(1,1)\rangle\) states. Under this condition, a hole jumping out of the left dot and another jumping into the right dot happen almost simultaneously, with the whole reloading process captured by the Lindblad operator \(L_{s_z s_z'}^r=\sqrt\Gamma|s_zs_z'\rangle\langle S_{20}|\), with \(\Gamma\) the dot-reservoir tunneling rate and \(s_z^{(\prime)} = \uparrow,~\downarrow\). In addition to this relaxation process, we also consider dephasing of all the energy levels, depicted by the Lindblad operator \(L_{i}^d = \sqrt\gamma|i\rangle\langle i|\) with \(i\) covering all the basis states of \(H\). The steady-state of the system can be calculated straightforwardly by vectorizing the LME (see Appendix Sec. 1). To estimate the parameters of our device, we calculate the mean squared error \(\text{MSE} = \frac{1}{N}\sum_{i=1}^N|I_i^e-I_i^s|^2\), where the summation runs over all experimental measurements, with \(I^e\) and \(I^s\) referring to experimental data and numerical simulations, respectively. Experimental parameters are then estimated by searching for the minimal MSE in a reasonable regime. Simulation results are shown in Fig. [\[fig-2\]](#fig-2){reference-type="ref" reference="fig-2"} (b) by the solid line, which agrees very well with the experiment data. From our simulation results, we estimate the following parameters for our device: \(\Gamma\approx 27.5\) GHz, \(\gamma \approx 0.655\) GHz, \(t_{so}/\hbar\approx 5.32\) GHz and \(t/\hbar \approx 2.09\) GHz. Our experimental measurements, supported by numerical simulations, demonstrate that coherent population trapping can indeed occur in a DQD even without microwave driving. However, this observed CPT has limited utility due to the degeneracy among the dark states in the five-level system. On the other hand, a recent theoretical study has shown that a longitudinally driven (at angular frequency \(\omega\)) ST system can be described by an effective Hamiltonian of a similar structure as conventional CPT systems, near the harmonic resonance condition \(E_i-E_j\approx n\hbar\omega\), where \(E_{i,j}\) is the energies of the \(|(1,1)\rangle\) states. In such a driven ST system, the resonant driving field allows us to selectively create individual dark states and avoid degeneracy. This driven CPT could then enable useful applications such as STIRAP. Moreover, the effective coupling is modulated by driving field, further increasing the tunability of the ST system. According to our theoretical investigation, such modulation is reflected in two aspects. Firstly, the modulation cased by a sinusoidal drive leads to an odd-even effect, i.e., for odd (even) orders of harmonics, the resonance signals are measured as a peak (dip) (see Appendix Sec. 2). Secondly, the modulation on the effective coupling also inevitably leads to the CPT being modulated at the same time. We have performed our transport measurement with a microwave applied to the \(U_2\) gate, longitudinally driving the interdot detuning of the DQD. In Fig. [\[fig-3\]](#fig-3){reference-type="ref" reference="fig-3"}, the transport current at \(\varepsilon=0\) as a function of driving frequency and external magnetic field strength is presented. Here we clearly observe current enhancement and suppression caused by the various resonances, indicated by the arrows in the inset of Fig. [\[fig-3\]](#fig-3){reference-type="ref" reference="fig-3"}. These resonances include single-spin rotations labeled by the relevant single-dot g-factor \(g_{1,2}\), and a two-spin rotation labeled by \((g_1+g_2) / 2\). From the spectrum, we extract g-factors of the spins in the left and right dot as \(g_1 \approx 4.5\) and \(g_2 \approx 3.0\). Our observation here clearly indicates the presence of the odd-even effect for single-spin rotations: for \(n = 1\), a resonance yields an enhancement in current, while for \(n = 2\), the current is suppressed. In addition to the odd-even effect, we also observe a clear dip in current caused by CPT in the vicinity of \(B=0\) in Fig. [\[fig-3\]](#fig-3){reference-type="ref" reference="fig-3"}. For a driven ST system, CPT can be observed whenever \(E_i-E_j = n\hbar\omega\) while \(E_i-E_{S} = m\hbar\omega\), where the subscript \(i,~j\) represent \((1,1)\) states and \(S\) refers to \(|S_{20}\rangle\). This condition can be fulfilled when \(\varepsilon =0\) and \(B=0\), where a suppression in current is observed as presented in the left panel of Fig. [\[fig-4\]](#fig-4){reference-type="ref" reference="fig-4"} (a). We also perform a numerical simulation based on the time-dependent LME with a driving amplitude \(A/\hbar = 190\) GHz, and the result is presented in the right panel of Fig. [\[fig-4\]](#fig-4){reference-type="ref" reference="fig-4"} (a). A consequence of the longitudinal driving we employed is a modulation of the effective couplings when varying the driving frequency. To reveal this modulation, we extract the half-width-at-half-maximum \(w\) as a function of driving frequency \(f\) by fitting the current dip at \(B = 0\) with a Lorentzian function. The fitted result is displayed in Fig. [\[fig-4\]](#fig-4){reference-type="ref" reference="fig-4"} (b) by scatters, where the error bar is given by the \(95\%\) confidence interval of the fitting. Results from the LME and \(H_\text{eff}\) are also presented in Fig. [\[fig-4\]](#fig-4){reference-type="ref" reference="fig-4"} (b) by red and black solid curves. The \(H_\text{eff}\) used here is accurate up to \(\mathcal{O}(t_{(so)}J_\nu/\omega)\), in which the coupling strengths are replaced by the modulated ones, i.e., \(t_{(so)}\to t_{(so)}J_0(A/\omega)\) (See Appendix Sec. 3). Figure [\[fig-4\]](#fig-4){reference-type="ref" reference="fig-4"} (b) shows that results from both LME and \(H_\text{eff}\) are qualitatively consistent with the experiment data, though \(H_\text{eff}\) can be non-convergent when \(J_0(A/\omega)=0\) due to the approximations used in its derivation. The agreement here shows that the clear modulation on CPT originates from the longitudinal driving. Such a modulation could enable possible applications such as STIRAP in similar systems. It is worth noting that, both odd-even effect and CPT yields a suppression in current, though they are fundamentally different. Odd-even effect is a direct result of the modulated effective coupling in the form of Bessel function, and is a coherent destruction of tunneling between \(|(1,1)\rangle\) and \(|S_{20}\rangle\). In contrast, CPT does not require modulation of the effective coupling. Instead, it requires that all the relevant energy levels are on resonance, i.e. all diagonal terms in \(H_\text{eff}\) are equal, leading to a coherent interference involving all levels. In summary, we report experimental observation of CPT without driving field based on a five-level ST system for holes in a nanowire device. The CPT manifests itself as a sharp suppression in the leakage current in the Pauli Spin Blockade regime, and is due to the presence of multiple dark states under certain conditions. By applying a longitudinal drive, we have also demonstrated the possibility of selectively creating a dark state and the associated CPT, with the added benefit of an increase in tunability for the effective couplings. The longitudinal driving also leads to other interesting features to our experimental observations, from an odd-even effect in the tunnel current to a CPT modulated by the varying driving field frequency. Our results clearly demonstrate the potential tunability of a longitudinally driven system, open up the possibility for STIRAP based quantum gates, and broaden the capacity of the ST system in quantum simulation and quantum computation applications.
{'timestamp': '2022-09-30T02:06:59', 'yymm': '2209', 'arxiv_id': '2209.14528', 'language': 'en', 'url': 'https://arxiv.org/abs/2209.14528'}
# Introduction The sharing of medical datasets is essential in enabling the cross-hospital flow of medical information and improving the quality of medical services . However, sharing healthcare datasets between different hospitals faces several thorny issues. Firstly, privacy protection has been a severe issue hindering the process when sharing medical image datasets from different hospitals . Second, sharing large-scale high-resolution medical image datasets increases transmission and storage costs . Therefore, the solution to these problems will significantly promote the development of medical dataset sharing. Dataset distillation can synthesize a small dataset such that models trained on it achieve comparable performance with the original large dataset . Although dataset distillation has been proposed for distilling some simple datasets, such as MNIST and CIFAR10, its effectiveness in high-resolution complex medical datasets has not yet been proved . Medical dataset distillation may have potential advantages for solving the existing medical dataset sharing problems . For example, the size of distilled medical image datasets can be significantly compressed, and distilled images generated from noise are automatically anonymized . Therefore, it is desirable to explore the potential of dataset distillation for medical dataset sharing and contribute to real-world applications. In this paper, we propose a novel dataset distillation-based method for medical dataset sharing. COVID-19 and its variants have rapidly spread worldwide, influencing the health and life of billions of people . X-ray is widely used in clinical because of its high speed and low cost. Detecting COVID-19 from chest X-ray images is perhaps one of the fastest and easiest ways . However, sharing COVID-19 datasets between different hospitals also has the above-mentioned problems. We perform experiments on a COVID-19 chest X-ray image dataset to prove the effectiveness of the proposed method. Experimental results show that we can achieve high COVID-19 detection performance even using scarce anonymized chest X-ray images, hopeful of solving existing medical dataset sharing problems. The concept of this study is shown in Figure [\[fig1\]](#fig1){reference-type="ref" reference="fig1"}. # Methodology The objective of our method is to have the parameters of the student network trained on the distilled dataset match the parameters of the teacher networks trained on the original dataset. Before the distillation process, we first train \(T\) teacher networks on the original COVID-19 dataset \(\mathcal{D}\) and obtain their parameters . These time sequences of parameters \(\{\theta_{i}\}^{I}_{0}\) are defined as teacher parameters. Also, network parameters trained on the distilled dataset \(\mathcal{D}_{c}\) at each training step \(i\) are defined as student parameters \(\tilde{\theta}_{i}\). Our method aims to distill chest X-ray images that induce network parameters similar to those learned from the original COVID-19 dataset (given the same initial values). In the distillation process, student parameters are initialized as \(\tilde{\theta}_{i}=\theta_{i}\) by sampled from one of the teacher parameters at a random step \(i\). Then we perform gradient descent updates on the student parameters \(\tilde{\theta}\) with respect to the cross-entropy loss \(\ell\) of the distilled dataset \(\mathcal{D}_{c}\) as follows: \[\tilde{\theta}_{i+j+1} = \tilde{\theta}_{i+j}-\alpha\nabla\ell(\mathcal{A}(\mathcal{D}_{c});\tilde{\theta}_{i+j}),\] where \(j\) and \(\alpha\) represent the number of gradient descent updates and the trainable learning rate, respectively. \(\mathcal{A}\) represents a differentiable data augmentation module that can improve the distillation performance, which was proposed in . Since the data augmentation used during distillation is differentiable, it can be propagated back through the augmentation layers to the distilled dataset. Then we get the teacher parameters \(\theta_{i+K}\) from \(K\) gradient descent updates after the parameters used to initialize the student network. The final loss \(\mathcal{L}\) calculate the normalized \(L_{2}\) loss between updated student parameters \(\tilde{\theta}_{i+J}\) and teacher parameters \(\theta_{i+K}\) as follows: \[\mathcal{L} = \frac{|| \tilde{\theta}_{i+J}-\theta_{i+K} ||^{2}_{2}} {|| \theta_{i}-\theta_{i+K} ||^{2}_{2}},\] Finally, we minimize the loss \(\mathcal{L}\) and backpropagate the gradient through all \(J\) updates to the student network for obtaining the optimized distilled dataset \(\mathcal{D}^{\ast}_{c}\). Since the distilled chest X-ray images are generated from noise and have different distribution or visual similarities from the original images, they are automatically anonymized. After obtaining the distilled dataset \(\mathcal{D}^{\ast}_{c}\), we can share it with different hospitals and train neural networks for high-accuracy COVID-19 detection. # Experiments The dataset used in our study has four classes, i.e., COVID-19 (C), Lung Opacity (L), Normal (N), and Viral Pneumonia (V) . The number of images in each class is 3616, 6012, 10192, and 1345, respectively. The resolution of chest X-ray images is 224 \(\times\) 224, and we resized it to 112 \(\times\) 112 for distillation or training networks. The number of pre-trained teacher networks \(T\) was set to 100. And we set the number of distilled images as 1, 2, 3, 5, 10, and 20 images per class. The network structure used in this study is a simple ConvNet with depth-5 and width-128, which is often used in the dataset distillation task. For comparative methods, we used several SOTA self-supervised learning methods, including SKD , BYOL , SimSiam  and MAE . We also used transfer learning from ImageNet  and training from scratch as baseline methods. We randomly selected 42 images per class (1% of the training set) for these comparative methods. Except for the MAE method used ViT-Large , all other methods used ResNet50  as the backbone network. The test accuracy of COVID-19 detection are shown in Tables [1](#tab1){reference-type="ref" reference="tab1"} and [2](#tab2){reference-type="ref" reference="tab2"}. From Table [1](#tab1){reference-type="ref" reference="tab1"}, we can see that the accuracy of our method increased accordingly as the number of distilled images grew. Table [2](#tab2){reference-type="ref" reference="tab2"} shows that our method achieved high COVID-19 detection accuracy even when using scarce distilled chest X-ray images. Furthermore, our method drastically outperformed other SOTA methods with a simpler network and fewer training images. Figure [\[fig2\]](#fig2){reference-type="ref" reference="fig2"} shows some examples of real and distilled images. We can see that the distilled images are entirely visually different from the original images, which shows the anonymization effectiveness of the proposed method. # Conclusion We have proposed a novel dataset distillation-based method for medical dataset sharing. Since the size of the distilled medical image dataset has been significantly compressed and the images are also anonymized, the sharing of medical datasets between different hospitals will be more efficient and secure. Experimental results on a COVID-19 chest X-ray image dataset show the advantage of our method compared to other SOTA methods. # Potential Negative Societal Impact {#potential-negative-societal-impact .unnumbered} The findings of this paper show the effectiveness of dataset distillation for medical dataset sharing. Although the experimental results are promising, the proposed method should be verified on other medical datasets of different diseases for any potential bias. Additionally, since the computational overhead of training and storing teacher parameters is relatively high, which may not necessarily be available in low-resource settings.
{'timestamp': '2022-10-03T02:07:19', 'yymm': '2209', 'arxiv_id': '2209.14603', 'language': 'en', 'url': 'https://arxiv.org/abs/2209.14603'}
null
null
null
null
null
null
# Introduction {#sec:intro} Applications of big data analytics have brought many new opportunities to economic research. With the developments of modern quantitative tools, economists are now able to analyze datasets that contain tens of millions of observations. One motivation of using datasets with ultra-large sample sizes is to deal with econometric models with a large number of parameters within the framework of simple parametric models. Suppose that there are \(d\) parameters to estimate with a sample of size \(n\). For instance, a parametric regression model can be as large as \(d \sim 1,000\) because a large number of controls might be necessary. This could be viewed as a high-dimensional estimation problem if \(n\) is relatively small, say several thousands. In the recent decade, new machine learning techniques have been applied in economics to deal with high-dimensional estimation problems; however, they arguably require more demanding conditions such as sparsity assumptions and inference is less straightforward. This paper deals with the setting of "ultra-large\" sample size with \(n\sim 10^7\), which is not an unusual sample size in applied microeconomic studies. With this size of the sample, straightforward parametric estimators can be used with \(d \sim 1,000\) under standard textbook assumptions. With datasets containing millions of observations, one major challenge of parametric estimation and inference based on extreme estimators is that they would require huge computing powers and memories that are often not accessible using ordinary personal computers. While inference is desirable in empirical studies to quantify statistical uncertainty, it often requires more computationally demanding tasks than point estimation. Typically, asymptotic normal inference with extreme estimators involves solving optimization problems and computing asymptotic covariance matrices. Computationally efficient implementation of both tasks is crucial with ultra-large datasets. In this paper, we focus on such a challenging instance, namely, to run large-scale quantile regression, which has been increasingly popular since the groundbreaking work of. One of the important economic applications of quantile regression is to study the wage structure . The common data source for the U.S. wage structure is IPUMS USA. For instance, the 2000 5% sample in IPUMS USA contains more than 14 million observations and more than 4 million even after restricting the sample to a subpopulation of working adults. We use the data from IPUMS USA to study the trends in the gender gap in terms of the college wage premium. In our empirical application, we aim to control for work experience by flexibly interacting workers' age with various state-level dummies, which creates over one thousand regressors, thereby motivating the need of ultra-large datasets. We find that existing inference methods are not applicable due to either time or memory constraints, while our inference method provides new insight into the trends in the gender gap. To the best of knowledge, our empirical illustration is the first to obtain confidence intervals based on quantile regression with more than 4 million observations and more than 1000 regressors. We propose a very fast statistical inference framework to analyze cross-sectional data with millions of observations as typically the case for the IPUMS data by embracing the stochastic subgradient descent techniques, one of the most active research areas in machine learning. While we focus on the quantile regression framework, whose inference has been well known to be a hard problem, our proposed method can be easily generalized to other econometric frameworks. ## Standard inference for quantile regression Consider the setting of a linear quantile regression model for which data \(\{ Y_i \equiv (y_i,x_i) \in \mathbb{R}^{1+d}: i=1,\ldots,n\}\) are generated from \[\begin{aligned} \label{model} y_i = x_i'\beta^* + \varepsilon_i, \end{aligned}\] where \(\beta^*\) is a vector of unknown parameters and the unobserved error \(\varepsilon_i\) satisfies \(P(\varepsilon_i \leq 0|x_i)= \tau\) for a fixed quantile \(\tau \in(0,1)\). Note that \(\beta^{*}\) is characterized by \[\beta^{*}:=\arg\min_{\beta\in\mathbb{R}^{d}}Q\left(\beta\right),\] where \(Q(\beta):= \mathbb E [q(\beta, Y_i)]\) with the check function \(q(\beta, Y_i):= (y_i-x_i'\beta)(\tau-I\{y_i-x_i'\beta\leq 0\}).\) Here, \(I(\cdot)\) is the usual indicator function. The standard approach for estimating \(\beta^{*}\) is to use the following M-estimator originally proposed by: \[\begin{aligned} \label{def:m-estimator} \widehat{\beta}_n := \arg\min_{\beta\in\mathbb{R}^{d}} \; \frac{1}{n} \sum_{i=1}^n q(\beta, Y_i). \end{aligned}\] See and for a monograph and a review of recent developments, respectively. There have been two potential challenges for the inference of standard quantile regression. First is the computational issues. The optimization problem is typically reformulated to a linear programming problem, and solved using interior-point algorithms. The second challenge is associated with the statistical inference. As was shown by , the asymptotic distribution of the M-estimator is: \[\sqrt{n}(\widehat\beta_n-\beta^*) \overset{d}{\to} N(0, \tau(1-\tau)G^{-1}\mathbb Ex_ix_i' G^{-1}),\quad G= \mathbb E f_{\varepsilon}(0|x_i)x_ix_i'\] where \(f_{\varepsilon}(\cdot|x_i)\) is the conditional distribution of \(\varepsilon_i\) given \(x_i\), assuming data are independent and identically distributed (i.i.d.). Hence in the heteroskedastic setting, standard inference based on the "plug-in" method would require nonparametrically estimating the conditional density function. An alternative inference would be based on bootstrap. One of the attempts to solving the computational/inference difficulties is to rely on the *smoothing* idea, via either smoothing the estimating equation or the convolution-type smoothing . Both require a choice of the smoothing bandwidth. In particular, the convolution-type smoothing (`conquer` as coined by ) has received recent attention in the literature because the optimization problem is convex, so it is more scalable. Figure 1 of shows that `conquer` works well for point estimations when the sample size ranges from \(10^3\sim 10^6\) with the number of regressors \(d \approx n^{1/2}\). Meanwhile, in terms of inference, both types of smoothed estimators are first-order asymptotically equivalent to the unsmoothed estimator \(\widehat{\beta}_n\). Meanwhile, the scale of the numerical studies of these solutions is less ambitious for the purpose of statistical inference. For instance, the largest model considered for inference in is merely \((n, d) = (4000, 100)\) (see Figure 7 in their paper). Therefore, there is a scalability gap between point estimation and inference in the literature. In this paper, we aim to bridge this gap by proposing a method for fast inference. ## The proposed fast S-subGD framework We focus on the inference problem at the scale up to \((n, d) = (10^7, 10^3)\), which we refer to as an "ultra-large\" quantile regression problem. This is a possible scale with IPUMS USA, but very difficult to deal with using benchmark inference procedures for quantile regression. To tackle this large-scale problem, we estimate \(\beta^*\) via stochastic (sub)gradient descent. Our assumption on the asymptotic regime is that \(d\) is fixed but \(n\) grows to infinity. Suppose that we have i.i.d. data from a large cross-sectional survey: \[Y_1..., Y_n,\quad Y_i=(x_i, y_i),\] where the ordering of these observations is randomized. Our method produces a sequence of "estimators", denoted by \(\beta_i\), which is a solution path being updated as \[\beta_{i}=\beta_{i-1}-\gamma_{i}\nabla q\left(\beta_{i-1},Y_{i}\right).\] Here \(Y_i\) is a "new" observation in the randomized data sequence. Also, \(\nabla q\left(\beta_{i-1},Y_i\right)\) is a subgradient of the check function with respect to the current update, and \(\gamma_i\) is a pre-determined learning rate. Then we take the average of the sequence \[\bar\beta_n:=\frac{1}{n}\sum_{i=1}^n\beta_i,\] which is called as the-average in the machine learning literature. It will be shown in this paper that \(\sqrt{n}(\bar{\beta}_{n}-\beta^*)\) is asymptotically normal with the asymptotic variance same as that of the standard estimator \(\widehat{\beta}_n\). So it achieves the same first-order asymptotic efficiency. The main novelty of this paper comes from how to conduct inference based on \(\bar{\beta}_{n}\). We use a recursive transformation of \(\beta_i\)'s that is suitable for on-line updating to construct asymptotically pivotal statistics. That is, we studentize \(\sqrt{n}\left(\bar{\beta}_{n}-\beta^{*}\right)\) via a random scaling matrix \(\widehat V_n\) whose exact form will be given later. The resulting statistic is not asymptotically normal but *asymptotically pivotal* in the sense that its asymptotic distribution is free of any unknown nuisance parameters; thus, its critical values are easily available. Furthermore, the random scaling quantity \(\widehat{V}_{n}\) does not require any additional inputs other than stochastic subgradient paths \(\beta_i\), and can be computed very fast. The main contribution of this paper is computational. We combine the idea of stochastic subgradient descent with random scaling and make large-scale inference for quantile regression much more practical. We demonstrate the usefulness of our method via Monte Carlo experiments. Empirically, we apply it to studying the gender gap in college wage premiums using the IPUMS dataset. The proposed inference method of quantile regression to the ultra-big dataset reveals some interesting new features. First, it shows heterogeneous effects over different quantile levels. Second, we find that the female college wage premium is significantly higher that that of male workers at the median, which is different from what have been concluded in the literature. In fact, although the S-subGD inference tends to be conservative than the standard normal approximation, it reveals statistically significant results while controlling over \(10^3\) covariates to mitigate confounding effects. With more availability of such a large dataset, the S-subGD method will make it possible to obtain convincing empirical evidence for other analyses. ## The related literature Our estimator is motivated from the literature on *online learning*, where data were collected in a streaming fashion, and as a new observation \(Y_i\) arrives, the estimator is updated to \(\beta_i\). Under the M-estimation framework with strongly convex, differentiable loss functions, showed that the -average is asymptotically normal. More recently,, , and studied the statistical inference problem and proposed methods that require consistent estimation of the asymptotic variance matrix, implementation of bootstrap, or the use of "batch-means" approach. Besides the smoothness assumption that excludes quantile regression, these inference solutions are not computationally attractive for datasets as large as ones this paper is concerned with. The idea of random scaling is borrowed from the time-series literature on fixed bandwidth heteroskedasticity and autocorrelation robust (HAR) inference and has been recently adopted in the context of stochastic gradient descent (SGD) in machine-learning problems: online inference for linear mean regression, federated learning, and Kiefer-Wolfowitz methods among others. The current paper shares the basic inference idea with our previous work; however, quantile regression is sufficiently different from mean regression and it requires further theoretical development that is not covered in the existing work. In particular, our previous work is based on, which limits its analysis to differentiable and strongly convex objective functions; however, the check function \(q(\beta, Y_i)\) for quantile regression is non-differentiable and is not strongly convex. We overcome these difficulties by using the results given in . One could have adopted convolution-type smoothing for S-subGD as the corresponding objective function is differentiable and locally strongly convex. We do not go down this alternative route in this paper as the existence of a sequence of smoothing bandwidths converging to zero complicates theoretical analysis and it would be difficult to optimally choose the sequence of smoothing bandwidths along with the sequence of learning rates. In the econometric literature, and developed SGD-based resampling schemes that deliver both point estimates and standard errors within the same optimization framework. The major difference is that their stochastic path is a Newton-Raphson type which requires computing the Hessian matrix or its approximation. Hence, their framework is not applicable to quantile regression because the check function is not twice differentiable. In other words, for quantile regression inferences with over millions of observations, estimating the inverse Hessian matrix is a task that we particularly would like to avoid. As an alternative to full sample estimation, one may consider sketching. For example, proposed a fast randomized algorithm for large-scale quantile regression and solved the problem of size \(n \sim 10^{10}\) and \(d = 12\) by randomly creating a subsample of about \(n = 10^5\). However, the theoretical analysis carried out in is limited to approximations of the optimal value of the check function and does not cover the issue of inference. In mean regression models, the precision of a sketched estimator depends on the subsample size and is typically worse than that of the full sample estimator. ## Notation Let \(a'\) and \(A'\), respectively, denote the transpose of vector \(a\) and matrix \(A\). Let \(| a |\) denote the Euclidean norm of vector \(a\) and \(\| A \|\) the Frobenius norm of matrix \(A\). Also, let \(\ell^{\infty}\left[0,1\right]\) denote the set of bounded continuous functions on \([0,1].\) Let \(I(A)\) be the usual indicator function, that is \(I(A) = 1\) if \(A\) is true and 0 otherwise. For a symmetric, positive definite matrix \(S\), let \(\lambda_{\min}(S)\) denote its smallest eigenvalue. # A Fast Algorithm for Quantile Inference {#sec:algorithm} ## Stochastic subgradient descent (S-subGD) In this section, we describe our proposed inference algorithm. The general idea behind the algorithm is proposed in our previous work but it is now tailored to run quantile regression with cross-sectional data \(\{Y_1..., Y_n \}\), where \(Y_i=(x_i, y_i)\). First, we randomize the ordering of the observed data: \[Y_1=(x_1, y_1)..., Y_n=(x_n, y_n).\] We start with an initialized estimator, denoted by \(\beta_0\), using a method which we shall discuss later. Then produce a sequence of S-subGD solution path which updates according to the rule: \[\begin{aligned} \label{eq:SGD1} \beta_{i}=\beta_{i-1}-\gamma_{i}\nabla q\left(\beta_{i-1},Y_{i}\right), \end{aligned}\] where the updating subgradient depends on a *single "next" observation* \(Y_i\): \[\begin{aligned} \label{eq:SS} \nabla q(\beta, Y_i) := x_i [I\{y_i \leq x_i'\beta\}-\tau]. \end{aligned}\] This is the subgradient of \(q\left(\beta,Y_i\right)\) with respect to \(\beta\). Here \(\beta_{i-1}\) is the "current" estimate, which is updated to \(\beta_{i}\) when the next observation \(Y_i\) comes into play. Also \(\gamma_i\) is a pre-determined step size, which is also called a learning rate and is assumed to have the form \(\gamma_{i}:=\gamma_0 i^{-a}\) for some constants \(\gamma_0 > 0\) and \(a \in (1/2,1)\). Then we take the average of the sequence \(\bar\beta_n:=\frac{1}{n}\sum_{i=1}^n\beta_i\) as the final estimator. Computing this estimator does not require storing the historical data; thus, it is very fast and memory-efficient even when \(n\sim 10^7\). In fact, as we shall see below, the gain of memory-efficiency is much more substantial for inference. ## The pivotal statistic The usual inference based on a consistent estimator of the asymptotic variance for \(\sqrt{n}(\bar\beta_n-\beta^*)\) is very computationally demanding. For instance, one needed to estimate the conditional density function. Instead of pursuing a consistent estimator for the asymptotic variance, we apply the random scaling using the *fixed-b* standardization. Motivated by the fact that the solution path \(\beta_i\) is recursively updated, we apply the random scaling approach by defining: \[\begin{aligned} \label{def:random-scaling} \widehat{V}_{n} := \frac{1}{n}\sum_{s=1}^{n} \left\{ \frac{1}{\sqrt{n}} \sum_{i=1}^{s} \left( \beta_{i}-\bar{\beta}_{n} \right) \right \} \left\{ \frac{1}{\sqrt{n}} \sum_{i=1}^{s} \left( \beta_{i}-\bar{\beta}_{n} \right) \right \}'. \end{aligned}\] Inference will be conducted based on the standardization using \(\widehat V_n.\) Computing \(\widehat V_n\) can be very efficient even if \(n\sim 10^7\) or larger, since it can be recursively computed as detailed later. Once \(\bar{\beta}_{n}\) and \(\widehat{V}_{n}\) are obtained, it is straightforward to carry out inference. For example, for the \(j\) th component of \(\bar \beta_n\), let \(\widehat V_{n,jj}\) denote the \((j,j)\) th diagonal entry of \(\widehat V_n\). The t-statistic is then \[\begin{aligned} \label{t-stat} \frac{\sqrt{n}\left(\bar{\beta}_{n,j}-\beta_{j}^{*}\right)}{\sqrt{\widehat{V}_{n,jj}}} \end{aligned}\] whose asymptotic distribution is mixed normal and symmetric around zero, and we shall formally derive it in the next section. The mixed normal asymptotic distribution for the t-statistic in [\[t-stat\]](#t-stat){reference-type="eqref" reference="t-stat"} is the same as the distribution of the statistics observed in the estimation of the cointegration vector by and and in the heteroskedasticity and autocorrelation robust inference in. They are different statistics but have the identical distribution as functions of the standard Wiener process as shown by. We can use the t-statistic to construct the \((1-\alpha)\) asymptotic confidence interval for the \(j\)-th element \(\beta_{j}^{*}\) of \(\beta^{*}\) by \[\left[ \bar{\beta}_{n,j}-\textrm{cv} (1-\alpha/2) \sqrt{\frac{\widehat{V}_{n,jj}}{n}}, \; \bar{\beta}_{n,j} + \textrm{cv} (1-\alpha/2) \sqrt{\frac{\widehat{V}_{n,jj}}{n}} \; \right],\] where the critical value \(\textrm{cv} (1-\alpha/2)\) is tabulated in. For easy reference, we reproduce the critical values in Table [1](#tab:cv){reference-type="ref" reference="tab:cv"}. When \(\alpha = 0.05\), the critical value is 6.747. Critical values for testing linear restrictions \(H_{0}: R\beta^{*} = c\) are given in. ::: [\[tab:cv\]]{#tab:cv label="tab:cv"} Note. The table gives one-sided asymptotic critical values that satisfy \(\mathrm{Pr}( \hat{t} \leq c ) = p\) asymptotically, where \(p \in \{0.9, 0.95, 0.975, 0.99\}\). Source:.
{'timestamp': '2022-09-30T02:06:03', 'yymm': '2209', 'arxiv_id': '2209.14502', 'language': 'en', 'url': 'https://arxiv.org/abs/2209.14502'}
null
null
null
null
# Introduction Sampling from a probability distribution given its score function, i.e., the gradient of the log-density, is an active area of research in machine learning. Its applications range far and wide, from Bayesian learning to learning energy-based models, synthesizing new high-quality data, and so on. Typical examples of traditional score-based samplers are Markov chain Monte Carlo (MCMC) methods such as Langevin dynamics and Hamiltonian Monte Carlo. Recent developments in score matching with deep neural networks (DNNs) have made it possible to estimate scores of high-dimensional distributions such as those of natural images. However, natural data distributions are often sharp and multi-modal, rendering naïve application of traditional MCMC methods impractical. Specifically, MCMC methods tend to skip over or get stuck at local high-density modes, producing biased samples. Diffusion models depart from MCMC and use the concept of diffusion, the process of gradually corrupting data into noise, to generate samples. observed that for each diffusion process, there is a reverse stochastic differential equation (SDE) and an ordinary differential equation (ODE). Hence, given a noise sample, integrating the reverse-S/ODE produces a data sample. Only a time-dependent score function of the data during the diffusion process is required to simulate the reverse process. This discovery generated great interest in finding better ways to integrate reverse-S/ODEs. For instance, uses black-box ODE solvers with adaptive stepsizes to accelerate sampling. Furthermore, multitude of recent works on score-based generative modeling focus on improving reverse-S/ODE integrators. In this work, we develop an orthogonal approach to accelerating score-based sampling. Specifically, we propose Denoising MCMC (DMCMC) which combines MCMC with reverse-S/ODE integrators. MCMC is used to generate samples \(\{(\bm{x}_n,t_n)\}\) in the product space of data \(\bm{x}\) and variance exploding (VE) diffusion time \(t\) / noise level \(\sigma\) (see Fig. [\[fig:dmcmc_example\]](#fig:dmcmc_example){reference-type="ref" reference="fig:dmcmc_example"} top panel). Since all modes are connected in the product space, MCMC mixes well. Then, a reverse-S/ODE integrator solves the reverse-S/ODE starting at \(\bm{x}_n\) from time \(t = t_n\) to \(t = 0\). Since MCMC explores high-density regions, the MCMC chain stays close to the data manifold, so \(t_n\) tends to be close to \(0\), i.e., noise level tends to be small (see Fig. [\[fig:dmcmc_example\]](#fig:dmcmc_example){reference-type="ref" reference="fig:dmcmc_example"} top and bottom panels). Thus, integrating the reverse-S/ODE from \(t = t_n\) to \(t = 0\) is much faster than integrating the reverse-S/ODE from maximum time \(t = T\) to \(t = 0\) starting from noise. This leads to a significant acceleration of the sampling process. Our contributions can be summarized as follows. - We introduce the product space of data and diffusion time, and develop a novel score-based sampling framework called Denoising MCMC on the product space. Our framework is general, as any MCMC, any VE process noise-conditional score function, and any reverse-S/ODE integrator can be used in a plug-and-play manner. - We develop Denoising Langevin Gibbs (DLG), which is an instance of Denoising MCMC that is simple to implement and is scalable. The MCMC part of DLG alternates between a data update step with Langevin dynamics and a noise level prediction step, so all that DLG requires is a pre-trained noise-conditional score network and a noise level classifier. - We verify the effectiveness of DLG by accelerating six reverse-S/ODE integrators. Notably, combined with the integrators of, DLG achieves state-of-the-art results. On CIFAR10 in the limited number of score function evaluation (NFE) setting, we obtain \(3.86\) FID with \(\approx 10\) NFE and \(2.63\) FID with \(\approx 20\) NFE. On CelebA-HQ-256, we have \(6.99\) FID with \(\approx 160\) NFE, which is currently the best result with score-based models. The computation cost of evaluating a noise level classifier is negligible, so we obtain acceleration essentially for free. # Background ## Denoising Score Matching Given a distribution \(p(\bm{x})\), a noise level \(\sigma\), and a perturbation kernel \(p_\sigma(\bm{x}\mid\tilde{\bm{x}}) = \mathcal{N}(\bm{x} \mid \tilde{\bm{x}}, \sigma^2 \bm{I})\), solving the denoising score matching objective \[\begin{aligned} \min_\theta \mathbb{E}_{p(\tilde{\bm{x}})} \mathbb{E}_{p_\sigma(\bm{x} \mid \tilde{\bm{x}})} \left[ \| {\boldsymbol s}_\theta(\bm{x})-\nabla_{\bm{x}} \log p_\sigma(\bm{x} \mid \tilde{\bm{x}}) \|_2^2 \right] \label{eq:dsm_orig} \end{aligned}\] yields a score model \({\boldsymbol s}_\theta(\bm{x})\) which approximates the score of \(\int p_\sigma(\bm{x} \mid \tilde{\bm{x}}) p(\tilde{\bm{x}}) \, d\tilde{\bm{x}}\). Denoising score matching was then extended to train Noise Conditional Score Networks (NCSNs) \({\boldsymbol s}_\theta(\bm{x}, \sigma)\) which approximate the score of data smoothed at a general set of noise levels by solving \[\begin{aligned} \min_\theta \mathbb{E}_{\lambda(\sigma)} \mathbb{E}_{p(\tilde{\bm{x}})} \mathbb{E}_{p_{\sigma}(\bm{x} \mid \tilde{\bm{x}})} \left[ \| {\boldsymbol s}_\theta(\bm{x},\sigma)-\nabla_{\bm{x}} \log p_{\sigma}(\bm{x} \mid \tilde{\bm{x}}) \|_2^2 \right] \label{eq:dsm_cont} \end{aligned}\] where \(\lambda(\sigma)\) can be a discrete or a continuous distribution over \((\sigma_{\min},\sigma_{\max})\). We note \(\int p_\sigma(\bm{x} \mid \tilde{\bm{x}}) p(\tilde{\bm{x}}) \, d\tilde{\bm{x}}\) approaches \(p(\bm{x})\) as \(\sigma \rightarrow 0\), since the perturbation kernel \(p_\sigma(\bm{x} \mid \tilde{\bm{x}})\) converges to the Dirac delta function centered at \(\bm{x}\). ## Markov Chain Monte Carlo (MCMC) Given an unnormalized version of \(p(\bm{x})\) or the score function \(\nabla_{\bm{x}} \log p(\bm{x})\), MCMC constructs a Markov chain in the data space whose stationary distribution is \(p(\bm{x})\). An MCMC which uses the unnormalized density is the Metropolis-Hastings MCMC that builds a Markov chain by sequentially accepting or rejecting proposal distribution samples according to a density ratio. A popular score-based MCMC is Langevin dynamics. Langevin dynamics generates a Markov Chain \(\{\bm{x}_n\}_{n = 1}^\infty\) using the iteration \[\begin{aligned} \bm{x}_{n+1} = \bm{x}_n + (\eta / 2) \cdot \nabla_{\bm{x}} \log p(\bm{x}_n) + \sqrt{\eta} \cdot \bm{\epsilon} \label{eq:langevin} \end{aligned}\] where \({\boldsymbol \epsilon} \sim \mathcal{N}(\bm{0},\bm{I})\). \(\{\bm{x}_n\}_{n = 1}^\infty\) converges to \(p(\bm{x})\) in distribution for an appropriate choice of \(\eta\). To sample from a joint distribution \(p(\bm{x},\bm{y})\), we may resort to Gibbs sampling. Given a current Markov chain state \((\bm{x}_n,\bm{y}_n)\), Gibbs sampling produces \(\bm{x}_{n+1}\) by sampling from \(p(\bm{x} \mid \bm{y}_n)\) and \(\bm{y}_{n+1}\) by sampling from \(p(\bm{y} \mid \bm{x}_{n+1})\). The sampling steps may be replaced with MCMC. Hence, Gibbs sampling is useful when conditional distributions are amenable to MCMC. **Annealed MCMC.** Despite their diversity, MCMC methods often have difficulty crossing low-density regions in high-dimensional multimodal distributions. For Langevin dynamics, at a low-density region, the score function vanishes in [\[eq:langevin\]](#eq:langevin){reference-type="eqref" reference="eq:langevin"}, resulting in a meaningless diffusion. Moreover, natural data often lies on a low-dimensional manifold. Thus, once Langevin dynamics leaves the data manifold, it becomes impossible for Langevin dynamics to find its way back. One way to remedy this problem is to use annealing, i.e., constructing a sequence of increasingly smooth and wide distributions and running MCMC at different levels of smoothness. As smoothness is increased, disjoint modes merge, so MCMC can cross over to other modes. Annealing has been used to empower various types of MCMC. In this work, we shall refer to the collection of MCMC that use annealing as annealed MCMC. An instance of annealed MCMC is annealed Langevin dynamics (ALD). For a sequence of increasing noise levels \(\{\sigma_i\}_{i = 1}^N\), Langevin dynamics is sequentially executed with \(\int p_{\sigma_i}(\bm{x} \mid \tilde{\bm{x}}) p(\tilde{\bm{x}}) \, d\tilde{\bm{x}}\) in place of \(p(\bm{x})\) in [\[eq:langevin\]](#eq:langevin){reference-type="eqref" reference="eq:langevin"} for \(i = N, N-1, \ldots, 1\). Since \(p(\bm{x})\) smoothed at a large noise level has wide support and connected modes, ALD overcomes the pitfalls of vanilla Langevin dynamics. However, ALD has the drawback that thousands of iterations are required to produce a single batch of samples. ## Diffusion Models **Diffusion models and differential equations.** Diffusion models opened up a new avenue towards fast sampling with score functions via SDEs and ODEs. Suppose data is distributed in \(\mathbb{R}^d\). Given a diffusion process of data sample \(\bm{x}_0 \sim p(\bm{x})\) into a sample from a simple prior noise distribution, the trajectory of data during diffusion can be described with an Itô SDE \[\begin{aligned} d\bm{x} = \bm{f}(\bm{x},t) \, dt + g(t) \, d\bm{w} \label{eq:SDE} \end{aligned}\] for some drift coefficient \(\bm{f}: \mathbb{R}^d \times [0,T] \rightarrow \mathbb{R}^d\), diffusion coefficient \(g: [0,T] \rightarrow \mathbb{R}\), and Brownian motion \(\bm{w}\). Here, \(T\) is the diffusion termination time. With initial condition \(\bm{x}(0) = \bm{x}_0\), integrating [\[eq:SDE\]](#eq:SDE){reference-type="eqref" reference="eq:SDE"} from time \(t = 0\) to \(t = T\) produces a sample from the prior distribution. For each diffusion SDE, there exists a corresponding reverse-SDE: \[\begin{aligned} d\bm{x} = [\bm{f}(\bm{x},t)-g(t)^2 \nabla_{\bm{x}} \log p_t(\bm{x})] \, dt + g(t) \, d\bar{\bm{w}} \label{eq:RSDE} \end{aligned}\] where \(p_t(\bm{x})\) is the density of \(\bm{x}(t)\) evolving according to [\[eq:SDE\]](#eq:SDE){reference-type="eqref" reference="eq:SDE"} and \(\bar{\bm{w}}\) is a Brownian motion if time flows from \(t = T\) to \(t = 0\). Given a sample \(\bm{x}_T\) from the prior distribution, integrating [\[eq:RSDE\]](#eq:RSDE){reference-type="eqref" reference="eq:RSDE"} with initial condition \(\bm{x}(T) = \bm{x}_T\) from \(t = T\) to \(t = 0\) results in a sample from \(p(\bm{x})\). Moreover, to each reverse-SDE, there exists a corresponding deterministic reverse-ODE \[\begin{aligned} d\bm{x} = \left[\bm{f}(\bm{x},t)-(1/2) \cdot g(t)^2 \nabla_{\bm{x}} \log p_t(\bm{x}) \right] \, dt \end{aligned}\] which also can be integrated from \(t = T\) to \(t = 0\) to produce samples from \(p(\bm{x})\). Diffusion models generate data by simulating the reverse of the diffusion process, i.e., by solving the reverse-S/ODE of the diffusion process. Initial works on diffusion models used computationally expensive ancestral sampling to solve the reverse differential equations. Later works discovered that using adaptive numerical integrators to solve the reverse-S/ODE could accelerate the sampling process. This led to great attention on developing better reverse-S/ODE integrators. Our work is orthogonal to such works as focus on finding good initialization points for integration via MCMC. Hence, a better integration technique directly translates to even better generative performance when plugged into Denoising MCMC. **Variance exploding (VE) diffusion model.** A VE diffusion model considers the diffusion process \[\begin{aligned} d\bm{x} = \sqrt{\frac{d[\sigma^2(t)]}{dt}} \, d\bm{w}. \label{eq:VESDE} \end{aligned}\] where \(\sigma(t)\) increases monotonically with \(t\) from \(\sigma_{\min}\) to \(\sigma_{\max}\). The data distribution evolves as \[\begin{aligned} \textstyle p_t(\bm{x}) = \int p_{\sigma(t)}(\bm{x} \mid \tilde{\bm{x}}) p(\tilde{\bm{x}}) \, d\tilde{\bm{x}} \end{aligned}\] so if \(\sigma_{\min}\) is sufficiently small, \(p_0(\bm{x}) \approx p(\bm{x})\), and if \(\sigma_{\max}\) is sufficiently large, so variance explodes, \(p_T(\bm{x}) \approx \mathcal{N}(\bm{x} \mid \bm{0}, \sigma_{\max}^2 \bm{I})\). If we have a score model \({\boldsymbol s}_\theta(\bm{x},\sigma)\) trained with [\[eq:dsm_cont\]](#eq:dsm_cont){reference-type="eqref" reference="eq:dsm_cont"}, \(\nabla_{\bm{x}} \log p_t(\bm{x}) \approx {\boldsymbol s}_\theta(\bm{x}, \sigma(t))\). It follows that with \(\bm{x}_T \sim \mathcal{N}(\bm{x} \mid \bm{0}, \sigma_{\max}^2 \bm{I})\), we may integrate the reverse-S/ODE corresponding to [\[eq:VESDE\]](#eq:VESDE){reference-type="eqref" reference="eq:VESDE"} with \(\bm{x}(T) = \bm{x}_T\) from \(t = T\) to \(t = 0\) using a score model to generate data. In the next section, we bridge MCMC and reverse-S/ODE integrators with VE diffusion to form a novel sampling framework that improves both MCMC and diffusion models. # Denoising Markov Chain Monte Carlo (DMCMC) {#sec:dmcmc} From here on, we denote the data distribution as \(p(\bm{x})\) and its domain as \(\mathcal{X} \subseteq \mathbb{R}^d\). Diffusion runs from time \(t = 0\) to \(t = T\), and noise scale \(\sigma(t)\) increases monotonically from \(\sigma_{\min}\) to \(\sigma_{\max}\), such that \(\sigma(0) = \sigma_{\min}\) and \(\sigma(T) = \sigma_{\max}\). We denote the range of \(\sigma(t)\) as \(\SS = [\sigma_{\min},\sigma_{\max}]\). The Gaussian perturbation kernel is denoted as \(p_\sigma(\bm{x} \mid \tilde{\bm{x}}) = \mathcal{N}(\bm{x} \mid \tilde{\bm{x}}, \sigma^2 \bm{I})\). The distribution of \(\bm{x}(t)\) following the VE diffusion [\[eq:VESDE\]](#eq:VESDE){reference-type="eqref" reference="eq:VESDE"} is denoted as \(p_t(\bm{x})\), and recall that \(p_t(\bm{x}) = \int p_{\sigma(t)}(\bm{x} \mid \tilde{\bm{x}}) p(\tilde{\bm{x}}) \, d\tilde{\bm{x}}\). We now develop a general framework called Denoising MCMC (DMCMC) which combines MCMC with reverse-S/ODE integrators. The construction of DMCMC is comprised of two steps. In the first step, we build MCMC on the product space \(\mathcal{X} \times \SS\), i.e., \(\mathcal{X}\) augmented by the smoothness parameter \(\sigma\). Since \(\sigma(t)\) is a monotone increasing function, this is equivalent to augmenting the data space with diffusion time \(t\). In the second step, we incorporate denoising steps, where we denoise MCMC samples via reverse-S/ODE integrators. ## Construction Step 1: MCMC on the Product Space \(\mathcal{X} \times \mathcal{S}\) Suppose \(p(\bm{x})\) is a high-dimensional multimodal distribution, supported on a low-dimensional manifold. If the modes are separated by wide low-density regions, MCMC can have difficulty moving between the modes. Indeed, convergence time for such distributions can grow exponential in dimension \(d\). Intuitively, for MCMC to move between disjoint modes, the Markov Chain would have to step off the data manifold. However, once MCMC leaves the data manifold, the density or the score vanishes. Then, most random directions produced by the proposal distribution do not point to the manifold. Thus, MCMC gets lost in the ambient space, whose volume grows exponentially in \(d\). Annealing via Gaussian smoothing, used in both ALD and VE diffusion, circumvents this problem. As \(p(\bm{x})\) smoothed with perturbation kernel \(p_\sigma(\bm{x} \mid \tilde{\bm{x}})\) of increasing \(\sigma\), the modes of \(p(\bm{x})\) grow wider and start to connect. Thus, MCMC can easily transition between modes. However, running MCMC in the manner of ALD is inefficient since we do not know how many iterations within each noise level is sufficient. To address this problem, we propose to augment \(\mathcal{X}\) with the smoothness scale \(\sigma\) and run MCMC in the product space \(\mathcal{X} \times \SS\) such that MCMC automatically controls the value of \(\sigma\). Below, we formally describe MCMC on \(\mathcal{X} \times \SS\). Let us define the \(\sigma\)-conditional distribution \[\begin{aligned} \textstyle \hat{p}(\bm{x} \mid \sigma) \coloneqq \int p_\sigma(\bm{x} \mid \tilde{\bm{x}}) p(\tilde{\bm{x}}) \, d\bm{\tilde{x}}. \label{eq:cond} \end{aligned}\] We also define a prior \(\hat{p}(\sigma)\) on \(\SS\). Then by the Bayes' Rule, \[\begin{aligned} \hat{p}(\bm{x},\sigma) = \hat{p}(\bm{x} \mid \sigma) \cdot \hat{p}(\sigma). \end{aligned}\] Here, \(\hat{p}(\sigma)\) reflects our preference for how much time we want the MCMC chain to stay at a particular level of \(\sigma\). MCMC with \(\hat{p}(\bm{x},\sigma)\) will produce samples \(\{(\bm{x}_n,\sigma_n)\}\) in \(\mathcal{X} \times \SS\) such that \[\begin{aligned} \sigma_n \sim \hat{p}(\sigma), \qquad \bm{x}_n \sim \hat{p}(\bm{x} \mid \sigma_n). \label{eq:sample_dist} \end{aligned}\] Hence, if \(\sigma_n \gg \sigma_{\min}\), \(\bm{x}_n\) will be a noisy sample, i.e., a sample corrupted with Gaussian noise of variance \(\sigma_n^2\), and if \(\sigma_n \approx \sigma_{\min}\), \(\bm{x}_n\) will resemble a sample from \(p(\bm{x})\). Since our goal is to generate samples from \(p(\bm{x})\), naïvely, we can keep samples \((\bm{x}_n,\sigma_n)\) with \(\sigma_n \approx \sigma_{\min}\) and discard other samples. However, this could lead to a large waste of computation resources. In the next section, we incorporate reverse-S/ODE integrators to avert this problem. ## Construction Step 2: Incorporating Denoising Steps Let us recall that integrating the reverse-S/ODE for the VE diffusion SDE Eq. ([\[eq:VESDE\]](#eq:VESDE){reference-type="ref" reference="eq:VESDE"}) from time \(t = T\) to \(t = 0\) sends samples from \(p_T(\bm{x})\) to samples from \(p_0(\bm{x}) \approx p(\bm{x})\). In general, integrating the reverse-SDE or ODE from time \(t = t_2\) to \(t = t_1\) for \(t_1 < t_2\) sends samples from \(p_{t_2}(\bm{x})\) to samples from \(p_{t_1}(\bm{x})\). We use this fact to denoise MCMC samples from \(\hat{p}(\bm{x},\sigma)\). Suppose we are given a sample \((\bm{x}_n,\sigma_n) \sim \hat{p}(\bm{x},\sigma)\). With \(t_n \coloneqq \sigma^{-1}(\sigma_n)\), [\[eq:sample_dist\]](#eq:sample_dist){reference-type="eqref" reference="eq:sample_dist"} tells us \[\begin{aligned} \bm{x}_n \sim p_{t_n}(\bm{x}) \end{aligned}\] so integrating the reverse-S/ODE with initial condition \(\bm{x}(t_n) = \bm{x}_n\) from \(t = t_n\) to \(t = 0\) produces a sample from \(p_0(\bm{x}) \approx p(\bm{x})\). Here, we note that any reverse-S/ODE solver may be used to carry out the integration. Given an MCMC chain \(\{(\bm{x}_n,\sigma_n)\}\) in \(\mathcal{X} \times \SS\), MCMC is biased towards high-density regions of \(\mathcal{X}\), so the sequence \(\{\bm{x}_n\}\) will generally stay close to the data manifold, except when traversing between disjoint modes. This means \(\sigma_n \ll \sigma_{\max}\) for most \(n\), or in other words, \(t_n \ll T\) for most \(n\). So, the average length of integration intervals will tend to be much shorter than \(T\). Thus, a numerical integrator can integrate the reverse-S/ODE with less truncation error given the same computation budget. Equivalently, less computation budget is required to reach the same truncation error level. This idea is illustrated in Figure [\[fig:dmcmc_example\]](#fig:dmcmc_example){reference-type="ref" reference="fig:dmcmc_example"}. # Denoising Langevin Gibbs (DLG) In Section [3](#sec:dmcmc){reference-type="ref" reference="sec:dmcmc"}, we described an abstract framework, DMCMC, for accelerating score-based sampling by combining MCMC and reverse-S/ODE integrators. We now develop a concrete instance of DMCMC. As the second construction step of DMCMC is simple, we only describe the first step. Naïvely, we could extend denoising score matching [\[eq:dsm_orig\]](#eq:dsm_orig){reference-type="eqref" reference="eq:dsm_orig"} to estimate the score \(\hat{s}_\theta(\bm{x},\sigma): \mathbb{R}^d\times\mathbb{R} \rightarrow \mathbb{R}^d\times\mathbb{R}\) of \(\hat{p}(\bm{x},\sigma)\) and apply Langevin dynamics in the first step of DMCMC. But, this would prevent us from using pre-trained score models, as we would have to solve (for some small \(\nu > 0\)) \[\begin{aligned} \min_\theta \mathbb{E}_{\bm{\epsilon} \sim \mathcal{N}(\bm{0}_{d+1},\nu^2 \bm{I}_{d+1})} \mathbb{E}_{\hat{p}(\bm{x}, \sigma)} [\|\hat{s}_\theta(\bm{x}-\epsilon_{1:d},\sigma-\epsilon_{d+1})-\bm{\epsilon}/\nu^2\|_2^2] \end{aligned}\] which differs from [\[eq:dsm_cont\]](#eq:dsm_cont){reference-type="eqref" reference="eq:dsm_cont"}. Gibbs sampling provides a simple path around this problem. Let us recall that given a previous MCMC iterate \((\bm{x}_n,\sigma_n)\), Gibbs sampling proceeds by alternating between an \(\bm{x}\) update step \(\bm{x}_{n+1} \sim \hat{p}(\bm{x} \mid \sigma_n)\) and a \(\sigma\) update step \(\sigma_{n+1} \sim \hat{p}(\sigma \mid \bm{x}_{n+1})\). Below, we describe our score-based sampling algorithm, Denoising Langevin Gibbs (DLG). **Updating \(\bm{x}\).** Suppose we are given an MCMC iterate \((\bm{x}_n,\sigma_n)\) and a score model \(s_\theta(\bm{x},\sigma)\) from [\[eq:dsm_cont\]](#eq:dsm_cont){reference-type="eqref" reference="eq:dsm_cont"}. We generate \(\bm{x}_{n+1}\) by a Langevin dynamics step on \(\hat{p}(\bm{x} \mid \sigma_n)\). Specifically, by [\[eq:cond\]](#eq:cond){reference-type="eqref" reference="eq:cond"}, \[\begin{aligned} \nabla_{\bm{x}} \log \hat{p}(\bm{x} \mid \sigma_n) \approx s_\theta(\bm{x}, \sigma_n) \label{eq:dlg_lang} \end{aligned}\] and so an Langevin dynamics update on \(\bm{x}\), according to [\[eq:langevin\]](#eq:langevin){reference-type="eqref" reference="eq:langevin"} is \[\begin{aligned} \bm{x}_{n+1} = \bm{x}_n + (\eta/2) \cdot s_\theta(\bm{x}_n,\sigma_n) + \sqrt{\eta} \cdot \bm{\epsilon} \end{aligned}\] for \(\bm{\epsilon} \sim \mathcal{N}(\bm{0},\bm{I})\). Here, we call \(\eta\) the step size. **Updating \(\sigma\).** We now have \(\bm{x}_{n+1}\) and need to sample \(\sigma_{n+1} \sim \hat{p}(\sigma \mid \bm{x}_{n+1})\). To this end, we first train a DNN noise level classifier \(q_{\phi}(\sigma \mid \bm{x})\) to approximate \(\hat{p}(\sigma \mid \bm{x})\) by solving \[\begin{aligned} \max_{\phi} \mathbb{E}_{\hat{p}(\bm{x},\sigma)} [\log q_{\phi}(\sigma \mid \bm{x})]. \end{aligned}\] Specifically, we discretize \([\sigma_{\min},\sigma_{\max}]\) into \(M\) levels \(\tau_1 = \sigma_{\min} < \tau_2 < \cdots < \tau_M = \sigma_{\max}\). Given \(\tau_m\) where \(1 \leq m \leq M\), \(m\) serves as the label and clean training data corrupted by Gaussian noise of variance \(\tau_m^2\) serves as the classifier input. The classifier is trained to predict \(m\) by minimizing the cross entropy loss. Having trained a noise level classifier, we sample \(\sigma_{n+1}\) by drawing an index \(m\) according to the classifier output probability for \(\bm{x}_{n+1}\) and setting \(\sigma_{n+1} = \tau_m\). In practice, using the index of largest probability worked fine. We denote this process as \(\sigma_{n+1} \sim q_{\phi}(\sigma \mid \bm{x}_{n+1})\). ## Practical Considerations **Computation cost of \(\sigma\) prediction.** We found that using shallow neural networks for the noise classifier \(q_{\phi}\) was sufficient to accelerate sampling. Concretely, using a neural net with four convolution layers and one fully connected layer as the classifier, one evaluation of \(q_{\phi}\) was around \(100 \sim 1000\) times faster than one evaluation of the score model \({\boldsymbol s}_\theta\). So, when comparing sampling methods, we only count the number of score function evaluations (NFE). We also note that the training time \(q_{\phi}\) was negligible compared to the training time of \(s_\theta\). For instance, on CelebA-HQ-256, training \(q_{\phi}\) with the aforementioned architecture for 100 epochs took around 15 minutes on an RTX 2080 Ti. **Initialization points for DLG.** Theoretically, MCMC chain \(\{(\bm{x}_n,\sigma_n)\}_{n = 1}^\infty\) will converge to \(\hat{p}(\bm{x},\sigma)\) regardless of the initialization point \((\bm{x}_0,\sigma_0)\). However, we found it was beneficial to set \(\bm{x}_0\) close to the image manifold and set \(\sigma_0 \sim q_{\phi}(\sigma \mid \bm{x}_0)\). Indeed, theory also shows that setting initialization points close to the stationary distribution could significantly accelerate convergence of the Markov chain. In practice, we set \(\bm{x}_0\) by generating a sample starting from a noise distribution, adding Gaussian noise of variance \(0.25\), and running Gibbs sampling for a few iterations. The NFE involved in generating \(\bm{x}_0\) is included in the final per-sample average NFE computation for DLG when comparing methods in Section [5](#sec:exp){reference-type="ref" reference="sec:exp"}. But, we note that this cost vanishes in the limit of infinite sample size. **Reducing autocorrelation.** Autocorrelation in MCMC chains, i.e., correlation between consecutive samples in the MCMC chain, could reduce the sample diversity of MCMC. A typical technique to reduce autocorrelation is to use every \(n_{skip}\)-th samples of the MCMC chain for some \(n_{skip} > 1\). For DMCMC, this means we denoise every \(n_{skip}\)-th sample. So, if we use \(n_{den}\) NFE to denoise MCMC samples, the average NFE for generating a single sample is around \(n_{skip} + n_{den}\). **Choosing iterates to apply denoising.** The MCMC chain can be partitioned into blocks which consist of \(n_{skip}\) consecutive samples. Using every \(n_{skip}\)-th sample of the MCMC chain corresponds to denoising the last iterate of each block. Instead, to further shorten the length of integration, within each block, we apply denoising to the sample of minimum noise scale \(\sigma\). **Choice of prior \(\hat{p}(\sigma)\).** We use \(\hat{p}(\sigma) \propto 1/\sigma\) to drive the MCMC chain towards small values of \(\sigma\). # Experiments {#sec:exp} ## Mixing of DMCMC Chains For DMCMC to successfully generate diverse high-quality data, DMCMC must mix, i.e., traverse between disjoint modes of \(p(\bm{x})\). We provide experimental evidence that DMCMC indeed mixes as a consequence of running MCMC in the product space \(\mathcal{X} \times \SS\). Specifically, we run fifty Langevin dynamics chains and fifty DLG chains on a mixture of Gaussians (MoG) with \(1k\) modes at CIFAR10 images. All chains are initialized at a single mode. For each method, we compute the mode coverage of the samples, the class distribution of the samples, and the autocorrelation of sample image class sequence. Since the noise conditional score function can be calculated analytically for MoGs, this setting decouples sampler performance from score model approximation error. Figure [\[fig:mixing\]](#fig:mixing){reference-type="ref" reference="fig:mixing"} shows the results. In the left panel, we observe that Langevin dynamics is unable to escape the initial mode. Increasing the step size \(\eta\) of Langevin dynamics caused the chain to diverge. On the other hand, DLG successfully captures all modes of the distribution. DLG samples cover all \(1k\) modes at chain length \(432\). Middle panel provides evidence that DLG samples correctly reflect the statistics of the data distribution. Finally, the right panel indicates that the DLG chain moves freely between classes, i.e., distant modes. These observations validate our claim that DLG mixes well. ## Accelerating Image Generation with Score Networks We compare six integrators with and without DLG on CIFAR10 and CelebA-HQ-256 image generation. The deterministic integrators are: the deterministic integrator of (KAR1), the probability flow integrator of, and the RK45 solver. The stochastic integrators are: the stochastic integrator of (KAR2), the reverse diffusion integrator of, and the Euler-Maruyama method. We use the Fréchet Inception Distance (FID) to measure sample quality. For CIFAR10, we generate \(50k\) samples, and for CelebA-HQ-256, we generate \(10k\) samples. We use pre-trained score models of. **CIFAR10.** Figure [\[fig:cifar10_acc\]](#fig:cifar10_acc){reference-type="ref" reference="fig:cifar10_acc"} shows the results on CIFAR10. We make two important observations. First, DLG successfully accelerates all six integrators by a non-trivial margin. In particular, if an integrator without DLG already performs well, the integrator combined with DLG outperforms other integrators combined with DLG. For instance, compare the results for KAR1 with those of other deterministic integrators. Second, DLG improves the performance lower bound for some deterministic integrators. Specifically, while the performance of KAR1 and RK45 saturates at around \(4\) FID, KAR1 and RK45 combined with DLG achieve better results around \(2.4\) FID. **CelebA-HQ-256.** Figure [\[fig:celeba_acc\]](#fig:celeba_acc){reference-type="ref" reference="fig:celeba_acc"} shows the results on CelebA-HQ-256. We observe that DLG improves computational efficiency and sample quality simultaneously. Indeed, in Figure [\[fig:samples\]](#fig:samples){reference-type="ref" reference="fig:samples"}, we observe remarkable improvements in sample quality despite using fewer NFE. This demonstrates the scalability of DLG to generating high-resolution images. We also note that we did not perform an exhaustive search of DLG hyper-parameters for CelebA-HQ-256, so fine-tuning could yield better results. **Achieving SOTA.** DLG combined with KAR1 sets a new SOTA record for CIFAR10 in the limited number of NFE setting: \(3.86\) FID with \(10.11\) NFE and \(2.63\) FID with \(20.11\) NFE which beats the results of, \(4.17\) FID with \(10\) NFE and \(2.86\) FID with \(20\) NFE. DLG combined with KAR2 sets a new record on CelebA-HQ-256 among score-based models: \(6.99\) FID with \(158.96\) NFE which beats the current best result of, \(7.16\) FID with \(4000\) NFE. ## Ablation Study In this section, we perform an ablation study of the components of DLG. Based on the observations, we construct a generic strategy for choosing the hyper-parameters. Given a reverse-S/ODE integrator, DLG is determined by three hyper-parameters: total NFE per sample \(n\), NFE spent on denoising samples \(n_{den}\), and Langevin dynamics step size \(\eta\). We fix the integrator to be the deterministic sampler of and observe the effect of each hyper-parameter on CIFAR10 image generation. We observed the same general trend with other samplers. **\(\bm{\eta}\) vs. \(\bm{n}_{\bm{den}}/ \bm{n}\).** In the left panel of Figure [\[fig:ablation\]](#fig:ablation){reference-type="ref" reference="fig:ablation"}, we fix NFE and vary \(\eta\) and \(n_{den}/n\). \(n_{den}\) governs individual sample quality, and \(n_{skip} = n-n_{den}\) governs sample diversity. Thus, we observe optimal FID is achieved when \(n_{den}/n\) has intermediate values, not extreme values near \(0\) or \(1\). Also, lower \(n_{den}/n\) is needed to attain optimality for lower \(\eta\). This is because lower \(\eta\) means the MCMC chain travels closer to the image manifold at the cost of slower mixing. **NFE vs. \(\bm{n}_{\bm{den}}/ \bm{n}\).** In the middle panel of Figure [\[fig:ablation\]](#fig:ablation){reference-type="ref" reference="fig:ablation"}, we fix \(\eta\) and vary NFE and \(n_{den}/n\). We observe two trends. First, in the small NFE regime, where \(10 \leq \text{NFE} \leq 50\), it is beneficial to decrease \(n_{den}/n\) as NFE increases. Second, in the large NFE regime, where \(\text{NFE} > 50\), it is beneficial to increase \(n_{den}/n\) as NFE increases. This is because if \(n_{skip}\) is sufficiently large, MCMC chain starts producing essentially independent samples, so increasing \(n_{skip}\) further provides no gain. Also, as we increase NFE, the set of \(n_{den}/n\) which provides near-optimal performance becomes larger. Moreover, we see that most of the time, optimal FID is achieved when \(n_{den} / n > 0.5\), i.e., when \(n_{den} > n_{skip}\). So, a reasonable strategy for choosing \(n_{den}\) given \(\eta\) and NFE budget \(n\) is to find smallest \(n_{skip}\) which produces visually distinct samples, and then allocate \(n_{den} = n-n_{skip}\). **\(\bm{\eta}\) vs. NFE.** In the right panel of Figure [\[fig:ablation\]](#fig:ablation){reference-type="ref" reference="fig:ablation"}, we choose optimal (in terms of FID) \(n_{den}/n\) for each combination of \(\eta\) and NFE. We see choosing overly small or large \(\eta\) leads to performance degradation. If \(\eta\) is within a certain range, we obtain similarly good performance. In the case of CIFAR10, we found it reasonable to set \(\eta \in [0.05,1.0]\). To choose \(\eta\) for data of general dimension \(d\), we define a value \(\kappa \coloneqq \eta / \sqrt{d}\) called displacement per dimension. If we see [\[eq:dlg_lang\]](#eq:dlg_lang){reference-type="eqref" reference="eq:dlg_lang"}, Gaussian noise of zero mean and variance \(\eta\) is added to the sample at each update step. Gaussian annulus theorem tells us that a high-dimensional Gaussian noise with zero mean and variance \(\eta\) has Euclidean norm approximately \(\eta \sqrt{d}\). So, the average displacement of the sample per dimension by the random noise is around \(\eta / \sqrt{d}\). Since \(\kappa\) is a dimension-independent value, given \(\kappa\) and \(d\), we can set \(\eta = \sqrt{d} \kappa\). On CIFAR10, we have \(\eta \in [0.05,1.0]\), which translates to \(\kappa \in [0.0009, 0.018]\). This means, on CelebA-HQ-256, we can choose \(\eta \in [0.4,8.0]\). If the sampler was inefficient, we chose a smaller \(\kappa\) to trade-off diversity for sample quality. # Conclusion In this work, we proposed DMCMC which combines MCMC with reverse-S/ODE integrators. This has led to significant improvements for both MCMC and diffusion models. For MCMC, DMCMC allows Markov chains to traverse between disjoint modes. For diffusion models, DMCMC accelerates sampling by reducing the average integration interval length of reverse-S/ODE. We developed a practical instance of DMCMC, called DLG, which uses Langevin dynamics along with Gibbs sampling as the choice of MCMC. We demonstrated the practicality and scalability of DLG through various experiments. In particular, DLG achieved state-of-the-art results on CIFAR10 and CelebA-HQ-256. Overall, our work opens up an orthogonal approach to accelerating score-based sampling. We leave exploration of other kinds of MCMC or diffusion process in DMCMC as future work.
{'timestamp': '2022-09-30T02:08:47', 'yymm': '2209', 'arxiv_id': '2209.14593', 'language': 'en', 'url': 'https://arxiv.org/abs/2209.14593'}
# METHOD {#method .unnumbered} In this work, we investigate magnetotransport properties of 4LG encapsulated by hexagonal boron nitride (hBN). The electronic band structure of 4LG can be characterized by a set of hopping parameters \(\gamma_{0}\)-\(\gamma_{5}\) \[Fig. \(1\)(a)\] and energy imbalance between dimmer and non-dimmer sites \(\delta\) . The low energy band structure of 4LG, shown in Fig. \(1\)(b), comprises two BLG-like subbands with different effective masses . We denote the light-mass subband by b and the heavy-mass subband by B. The presence of skewed lattice sites hopping \(\gamma_{3}\) induces trigonal warping. The next-nearest interlayer hopping parameters \(\gamma_{2}\) and \(\gamma_{5}\) cause the b and B subbands to overlap and hybridize at low energy as shown in Fig. \(1\)(b) . The remaining hopping parameters \(\gamma_{4}\) and \(\delta\) generate electron-hole asymmetry in the band structure. In our devices, we use a dry transfer technique to assemble the heterostructures and etch them in CHF\(_3\)/O\(_2\) plasma. Edge contacts are defined by electron beam lithography and formed by sputtering 80-nm Mo . The standard lock-in technique is used to investigate magnetotransport properties. All measurements are performed at 2.4 K unless stated otherwise. Figure \(1\)(c) shows an optical image and a schematic diagram of a device. We first examine two-terminal conductance \(g\) as a function of back-gate voltage \(V_{\rm BG}\) at magnetic field \(B=0\) \[Fig. \(1\)(d), black line\]. We find that the conductance curve exhibits multiple local minimums, which are associated with band edges and Lifshitz transitions near zero energy in the band structure of 4LG as shown in Fig. \(1\)(b) . At finite \(B\), we observe conductance oscillations in \(V_{\rm BG}\) due to the QHE \[Fig. \(1\)(d)\]. Our conductance does not develop into well-defined plateaus even at \(7\) T, likely due to relatively high contact resistance (\(\sim\)`<!-- -->`{=html}1 k\(\Omega\)) and geometry effect on two-terminal conductance which leads to the distortion of the QH plateaus. At high field, the conductance exhibits a single minimum at which we associate to the charge neutrality point (CNP) of the sample. Near-zero gate voltage for the CNP indicates pristine quality of our samples. To further investigate the magnetotransport properties of the system, we measure \(g\) as a function of \(V_{\rm BG}\) and \(B\) \[Fig. \(2\)(a)\]. Charge carrier density \(n\) is determined from the period of conductance oscillations at high \(B\). The Landau fan diagram displays rich features associated with LLs from the b and B subbands. To see the oscillations more clearly, we calculate \({\rm d} g/ {\rm d} n\) \[Fig. \(2\)(b)\]. The dark lines correspond to energy gaps with associated filling factors \(\nu\) shown in the figure. Multiple LL crossings are evident. For instance, the dark line for \(\nu=12\), seen clearly at \(7\) T, disappears at about \(5\) T and reemerges again at \(3\) T. The absence of the dark line for \(\nu = 12\) between \(3\) and \(5\) T is the result of the LL crossing. To gain a better understanding of the Landau fan diagram, we calculate energies of LLs as a function of \(B\) using the tight-binding (TB) model \[Fig. \(2\)(c)\]. In this plot, we assume that potential difference between layers is zero and use \(\gamma_{0}=3.1\), \(\gamma_{1}=0.39\), \(\gamma_{2}=-0.022\), \(\gamma_{3}=0.315\), \(\gamma_{4}=0.12\), \(\gamma_{5}=0.018\) and \(\delta=0.020\) eV. These TB parameters are determined by matching the LL crossing positions from the experiment at low density with those from the calculation . We note that our device has a single gate. As we induce higher carrier density via back gate, 4LG is inevitably subject to a stronger displacement field which induces larger potential difference between layers. Therefore, our simulation gives a good agreement with data from low density at which potential difference is still small. From the spectra, LLs of 4LG at high \(B\) can be viewed as a combination of two sets of BLG-like LLs from the b and B subbands . At high energy, a LL energy is approximately linear in \(B\), as expected from bilayer nature of the subbands. The energy spacing of the LLs from the light-mass band b is larger than that of the heavy-mass band B because cyclotron frequency is inversely proportional to effective mass. The mixing between LLs due to \(\gamma_2\) and \(\gamma_5\) parameters and trigonal warping effect from \(\gamma_3\) parameter leads to hybridization gaps, more visible at low energy . We label each LL in Fig. \(2\)(c) with two indices, indicating the subband (B or b) and LL index \(n\) (\(n+\) for electron-like and \(n-\) for hole-like LLs). For the zeroth index LL, we label them as (b/B, 0) and (b/B, \(-1\)). These two LLs are degenerate in bilayer graphene but the degeneracy is slightly lifted in 4LG with a small energy gap of \(\sim\)`<!-- -->`{=html}2 meV at \(7\) T. The numbers inside LL energy gaps in Fig. \(2\)(c) indicate values of \(\nu\) associated with the gaps. Each LL has four-fold spin and valley degeneracy . To compare our data with the calculation, we simulate density of states as a function of \(B\) and \(n\) from the LL spectra in Fig. \(2\)(c) to obtain the plot in Fig. \(2\)(d). Here, we assume a Lorentzian line-shape for each LL with broadening of 1.5 meV, estimated from a LL gap from the b subband at the onset of the oscillations of \(0.5\) T \[Fig. \(2\)(b)\]. The simulation captures main features of the experimental data in Fig. \(2\)(b) such as the positions of LL crossing at low density and a position of the horizontal line in the electron side which originates from the zeroth LL of the light-mass band. However, some discrepancies exist between our data and simulation. In our data, some LLs are two-fold degenerate. For example, in Fig. \(2\)(b) at \(6\) T, we observe the filling factor sequences of {\(8\), \(10\), \(12\)} and {\(24\), \(26\), \(32\)} which imply LLs with degeneracy of \(2\) and \(6\). Comparing the positions of these LLs with the LL spectra in Fig. \(2\)(c), we conclude that each of the 4-fold degenerate (b, \(0\)) and (b, \(1+\)) split into \(2\) LLs with \(2\)-fold degeneracy while the LLs from the B subband remain 4-fold degenerate. The \(6\)-fold degeneracy observed when filling factors change from \(26\) to \(32\) is the result of LL crossing between the \(2\)-fold degenerate LL from the splitting of (b, \(1+\)) and the \(4\)-fold degenerate (B, \(5+\)). In 4LG, a 2-fold degenerate LL can occur by applying a displacement field to generate a potential difference between layers which breaks inversion symmetry and lifts valley degeneracy. To capture the effect of the potential difference on LLs, we simulate LL spectra using a constant value of the potential difference between adjacent layers of \(16\) meV and the same set of the hopping parameters used in Fig. \(2\)(c). We note that, in our measurement, a value of potential difference will vary as we change density (see more details in Supplemental Material ). The black and red lines in Fig. \(3\)(a) represent LLs from \(K\) and \(K'\) valleys, respectively. The valley splittings of the LLs from the B subband are much smaller than LL broadening and therefore they continue to appear \(4\)-fold degenerate in our measurement. However, the splittings are much more pronounced for LLs from the b subband, consistent with the data in which the LL splittings are observed in the b subband only. Although we can explain most observed features within a single-electron picture, we cannot completely rule out interaction-induced LL splitting. For example, the (b, \(0\)) and (b, \(-1\)) are so close in energy that they should experience similar value of the potential difference. However, we observe the splitting of (b, \(0\)) but not (b, \(-1\)) which may suggest that other symmetry-breaking mechanisms are involved. A more surprising discrepancy between our data and the simulation occurs at zero filling factor. Figure [\[fig:zeroFF\]](#fig:zeroFF){reference-type="ref" reference="fig:zeroFF"}(a) shows a plot of \({\rm d}g/{\rm d}n\) at low \(n\) and \(B\) while Figure [\[fig:zeroFF\]](#fig:zeroFF){reference-type="ref" reference="fig:zeroFF"}(b) displays \(g\) at \(n = 0\) as a function of \(B\) at various temperatures. We observe oscillations in magnetoconductance clearly along the zero density in all three devices we have measured (see data in Supplemental Material ). Typically, the conductance oscillations in QHE occur when Fermi energy passes through a LL. However, from the calculation of the LL spectra from the TB model \[Fig. [\[fig:zeroFF\]](#fig:zeroFF){reference-type="ref" reference="fig:zeroFF"}(c), black lines\], there is no LL crossing inside \(\nu = 0\). As a result, the conductance should exhibit no oscillation in \(B\) at \(\nu = 0\), contradicting our results. To resolve this discrepancy, we examine the complex nature of low-energy LL spectra. Due to the band inversion in 4LG at zero magnetic field \[see Fig. [\[fig:bandstruc\]](#fig:bandstruc){reference-type="ref" reference="fig:bandstruc"}(b)\], hole states from the b subband reside at higher energy than electron states from the B subband for wave vectors around zero. As \(B\) increases, energies of hole-like LLs decrease while those of electron-like LLs increase. The opposite magnetic dependence of LL energies leads to a series of crossings and anti-crossings which manifests as three adjacent LLs braided together at low field \[see Fig. 4(c), black lines\]. These anti-crossings, whose energy gaps depend on \(\gamma_2\) and \(\gamma_5\) parameters, are the result of hybridization between hole-like LLs and electron-like LLs from the b and B subbands, respectively. A braiding of three LLs is the consequence of the trigonal warping effect from \(\gamma_3\) parameter. The effect causes the anti-crossings to occur when the LL indices of the unperturbed LLs are the same or differ by multiples of \(3\) . To identify the underlying LLs that hybridize into the braided LLs, we calculate LL spectra by setting the mixing terms between the subbands to zero . The result is displayed in Fig. [\[fig:zeroFF\]](#fig:zeroFF){reference-type="ref" reference="fig:zeroFF"}(c). The blue and red lines represent LLs of the b and B subbands, respectively. Comparing the LLs with and without the mixing terms, we find that the energy gap at \(\nu = 0\) originates from two different mechanisms with a crossover at the critical field \(B_{c1}\) of \(\sim\)`<!-- -->`{=html}2.1 T. For \(B > B_{c1}\), the \(\nu=0\) gap is a trivial LL gap which is always present regardless of LL hybridization. For \(B < B_{c1}\), the \(\nu=0\) gap emerges from a series of hybridizations between hole-like (b, \(i-\)) and electron-like (B, \(i+\)) for \(i = 1,2,\ldots\). Let us focus on a \(\nu = 0\) gap at \(B_{c1}\) arising from the hybridization between (b, \(1-\)) and (B, \(1+\)). At \(B_{c1}^< < B_{c1}\), the hybridized LLs at higher energy (solid blue star) and lower energy (solid red triangle) in Fig. [\[fig:zeroFF\]](#fig:zeroFF){reference-type="ref" reference="fig:zeroFF"}(c) are mostly dominated by hole-like (b, \(1-\)) and electron-like (B, \(1+\)), respectively. As we increase \(B\) beyond \(B_{c1}\), the admixture of each hybridized LL gradually changes and the situation becomes reversed. Now, the higher-energy LL (hollow red triangle) evolves into the electron-like (B, \(1+\)) while the lower-energy LL (hollow blue star) turns into the hole-like (b, \(1-\)). Therefore, as we increase \(B\), the characteristic of the higher-energy LL switches from electron-like to hole-like LL while that of the lower-energy LL changes from hole-like to electron-like LL. As a result, the edge states change their behavior significantly across a hybridization gap. Figure [\[fig:zeroFF\]](#fig:zeroFF){reference-type="ref" reference="fig:zeroFF"}(d) illustrates edge state diagrams at \(B_{c1}^<\) and \(B_{c1}^>\), indicated by pink and orange lines in Fig. [\[fig:zeroFF\]](#fig:zeroFF){reference-type="ref" reference="fig:zeroFF"}(c). Due to a confining potential, the energy of an electron-like LL will bend up near the edge while that of a hole-like LL will bend down. At \(B_{c1}^>\) \[Fig. \(4\)(d), right\], an energy ordering of the LLs is a conventional one in which the electron-like (B, \(1+\)) has higher energy than the hole-like (b, \(1-\)). In this case, the energies of both LLs will bend away from each other near the edge. Therefore, these two LLs do not contribute any edge state to the system at \(\nu = 0\). However, at \(B_{c1}^<\), we have an inverted energy ordering of the LLs in which the energy of hole-like (b, \(1-\)) is higher than that of the electron-like (B, \(1+\)) in the bulk. Near the edge, their energies will bend toward each other (down for (b, \(1-\)) and up for (B, \(1+\))) \[Fig. [\[fig:zeroFF\]](#fig:zeroFF){reference-type="ref" reference="fig:zeroFF"}(d), left\]. We therefore obtain two counter-propagating edge states even though the filling factor is zero in the bulk. We note that these counter-propagating edge states are likely not helical since they can interact via mixing terms. As a result, we expect an energy gap to open at the crossing. As we lower \(B\) further, we encounter another hybridization gap between (b, \(2-\)) and (B, \(2+\)) at \(B_{c2} \sim 1.2\) T \[Fig. \(4\)(a-c)\]. With the same argument as the \(B_{c1}\) case, the number of edge states will increase from \(2\) to \(4\) when \(B\) drops below \(B_{c2}\) because two hole-like (b, \(1-\)) and (b, \(2-\)) now sit at higher energy than two electron-like (B, \(1+\)) and (B, \(2+\)). In general, as we move through the hybridization gap between (b, \(i-\)) and (B, \(i+\)), the number of edge states changes from \(2(i-1)\) to \(2i\). We find that the positions of the conductance peaks at \(\nu = 0\) in Fig. [\[fig:zeroFF\]](#fig:zeroFF){reference-type="ref" reference="fig:zeroFF"}(b) are in excellent agreement with the theoretical positions of \(B_{ci}\) in Fig. 4(c) which are magnetic fields at which a slope is zero for a hybridized LL separating \(\nu = 0\) and \(4\). For \(B > B_{c1}\), the energy gap at \(\nu = 0\) turns into a trivial LL gap and there is no further inversion of electron-like and hole-like LLs for LL indices \(|n| \geq 1\). Therefore, the number of edge states stays constant and we no longer observe any oscillation \[Fig. [\[fig:zeroFF\]](#fig:zeroFF){reference-type="ref" reference="fig:zeroFF"}(b)\]. Similarly, following the \(\nu = 12\) line in Fig. [\[fig:zeroFF\]](#fig:zeroFF){reference-type="ref" reference="fig:zeroFF"}(a), we observe magnetoconductance oscillations when \(B \lesssim 1.2\) T even though the \(\nu = 12\) gap remains finite in the bulk. We find that this \(\nu = 12\) gap below \(1.2\) T arises from a series of hybridization gaps between (b, \(i-\)) and (B, \((i+3)+\)) while the gap above \(1.2\) T is a trivial LL gap. We therefore conclude that the oscillations arise from the change in the number of edge states in a hybridization gap between electron-like and hole-like LLs. We emphasize that a hybridization gap between LLs of the same type will not lead to an oscillation because the number of edge states remains unchanged . Our results show that it is not sufficient to predict Shubnikov-de Haas oscillations from Landau level spectra only. One needs to consider if a gap is a trivial Landau level gap or a hybridization gap between electron-like and hole-like LLs to obtain a complete picture of the oscillations. We expect our result to be useful for understanding Landau level spectra of other few layer graphene systems because of the band inversion in their band structures. For helical edge modes, two-terminal conductance in the hybridization gap regime along \(\nu = 0\) should appear as steps with quantized values of \(4N e^2/h\) where \(N\) is the number of edge states and a factor of \(4\) comes from spin and valley degeneracy . For instance, when \(\nu = 0\) and \(B_{c2} < B < B_{c1}\), we expect conductance of \(8e^2/h\) from two counter-propagating edge states from (b, \(1-\)) and (B, \(1+\)) but the measured value is less than \(2 e^2/h\). A few mechanisms could contribute to the observed low value of conductance. Since the edge states in our system are not helical and they counterpropagate on the same edge, these two states could mix and tunnel to each other. As a result, they form 1D localized states and conductance is no longer quantized at \(4N e^2/h\) because the edge states do not have a perfect transmission . An interaction between the edge states could induce a small gap at the Fermi energy, reducing conductance further. In addition, our conductance appears oscillatory which is likely due to the geometry effect observed in a long sample for two-terminal measurement . In summary, we study magnetotransport properties of 4LG. We observe LL crossings between the b and B subbands. At finite displacement field, we find that the LLs in the b subband become valley polarized while those in the B subband remain valley degenerate, in agreement with the TB calculation with finite potential difference. At low \(n\) and \(B\), the band inversion gives rise to a series of bulk hybridization gaps between electron-and hole-like LLs. As a result, alternating characteristic of the hybridized LLs between electron and hole states leads to the change in the number of edge states and manifests as magnetoconductance oscillations in our measurement. Finally, our proposed mechanism for magnetoconductance oscillations should be applicable to other Bernal-stacked multilayer graphenes since they also host similar band inversion .
{'timestamp': '2022-09-30T02:08:11', 'yymm': '2209', 'arxiv_id': '2209.14574', 'language': 'en', 'url': 'https://arxiv.org/abs/2209.14574'}
null
null
# Introduction In the clinical diagnosis of vascular diseases, vessel segmentation is necessary to analyze the vessel structures and therapy planning. In particular, when diagnosing coronary artery disease, X-ray angiography is taken to enhance vessel visualization by injecting a contrast agent into the blood vessels. However, it is challenging to extract vessels accurately due to low contrast, motion artifacts, many tiny branches, structural interference in the backgrounds, etc. To segment vascular structures, various segmentation methods have been explored. Traditional optimization models typically require complicated preprocessing steps and manual tuning. Furthermore, they are computationally expensive to process many images. On the other hand, learning-based methods generate segmentation maps in real-time once the models are trained. However, supervised methods require a huge amount of labeled data for training, which complicates their use in practical applications. Also, existing unsupervised methods designed on natural images are difficult to apply to medical vessel images due to low contrast subtle branches and confusing background structures. Although a recent self-supervised method is presented to learn vessel representations, this requires two different adversarial networks to segment vessels, which leads to increasing training complexity. Recently, diffusion models such as denoising diffusion probabilistic model (DDPM) has become one of the main research topics in modeling data distribution and sampling diverse images. By learning the Markov transformation of the reverse diffusion process from Gaussian noise to data, DDPM is successfully applied to many low-level computer vision tasks such as super-resolution, inpainting, and colorization. For high-level vision tasks, while a recent study shows that DDPM can capture semantic information and be used as image representations, methods applying DDPM in learning semantic segmentation without labeled data have so far not been developed. In this paper, we introduce a novel concept of diffusion adversarial representation learning (DARL), which is a non-iterative version of diffusion-based generative model that can be successfully applied to self-supervised vessel segmentation. As illustrated in Figure [\[fig:method\]](#fig:method){reference-type="ref" reference="fig:method"}, our model is composed of a diffusion module and a generation module, which learns semantic information of vessels via adversarial learning without ground-truth labels. In particular, given unpaired data of background images and angiography images that are taken before and after injection of the contrast agent, the diffusion module is designed to learn the background image distribution. Also, inspired by the spatially-adaptive denormalization (SPADE) layer that is effective in image synthesis given semantic masks, we design a *switchable* version of SPADE as the generation module to estimate vessel segmentation masks as well as fake angiograms using the synthetic fractal masks. More specifically, as shown in Figure [\[fig:method\]](#fig:method){reference-type="ref" reference="fig:method"}, there are two paths for feeding the inputs into our proposed model: (A) when the real angiography images are given, our model without the SPADE estimates vessel segmentation masks; (B) when the background images are given, our model with the SPADE generates synthetic angiograms that composite fake vessel masks such as fractal masks with the input backgrounds. Also, by feeding the generated angiograms into the (A) path, we apply the cycle consistency between the segmentation results of the synthetic angiograms and the inputted fake vessel masks to capture semantic information of vessels. Since the diffusion module learns the background distribution, the foreground vessel structures of angiograms are considered as outlier noise so that latent features from the diffusion module can isolate the vessel representations. This enables the generation module to effectively segment the vessels. We build our model on X-ray coronary angiography using XCAD dataset and apply to several different blood vessel datasets, including retinal images. Experimental results show that our method outperforms existing unsupervised and self-supervised learning methods in the absence of labeled data for training. The main contributions are summarized as: 1. We propose a diffusion adversarial representation model, a non-iterative version of diffusion model for image generation, and apply it for self-supervised vessel segmentation. Specifically, the latent features of our diffusion module provide vessel information and thus improve the segmentation performance. 2. Through the proposed generation module with switchable SPADE layers, our model not only generates synthetic angiography images but also segments vessel structures. 3. Experimental results verify that our model achieves superior segmentation performance by learning vessel representations. In particular, although the model is trained using X-ray coronary angiograms, it provides the state-of-the-art performance for un-/self-supervised retinal vessel segmentation as well, confirming the generalization capability of the model. # Backgrounds and related works #### Denoising diffusion probabilistic model Diffusion model is one of generative models that sample realistic data by learning the distribution of real images. In particular, the denoising diffusion probabilistic model (DDPM) with a score matching has been shown superior performance in image generation. Specifically, DDPM learns the Markov chain to convert the Gaussian noise distribution \({\boldsymbol x}_T \sim \mathcal{N}(\bm 0, \bm I)\) into the target distribution \({\boldsymbol x}_0\). In the forward diffusion process, the noise is gradually added the noise to the data by: \[\begin{aligned} q({\boldsymbol x}_t|{\boldsymbol x}_{t-1}) = \mathcal{N}({\boldsymbol x}_t;\sqrt{1-\beta_t}{\boldsymbol x}_{t-1}, \beta_t \bm I), \end{aligned}\] where \(\beta_t\in[0,1]\) is a fixed variance. Accordingly, a noisy target \({\boldsymbol x}_t\) distribution from the data \({\boldsymbol x}_0\) is represented as: \[\begin{aligned} \label{eq:diff_forward} q({\boldsymbol x}_t|{\boldsymbol x}_0) = \mathcal{N}({\boldsymbol x}_t; \sqrt{\alpha_t}{\boldsymbol x}_0, (1-\alpha_t)\bm I), \end{aligned}\] where \(\alpha_t=\Pi_{s=1}^t(1-\beta_s)\). Then, DDPM is trained to approximate reverse diffusion process: \[\begin{aligned} p_\theta ({\boldsymbol x}_{t-1}|{\boldsymbol x}_t) = \mathcal{N}({\boldsymbol x}_{t-1}; \bm\mu_\theta ({\boldsymbol x}_t, t), \sigma_t^2 \bm I), \end{aligned}\] where \(\sigma_t\) is a fixed variance, and \(\bm\mu_\theta\) is a parameterized mean with the noise predictor \(\bm\epsilon_\theta\): \[\begin{aligned} \bm\mu_\theta ({\boldsymbol x}_t, t) = \frac{1}{\sqrt{1-\beta_t}}\left({\boldsymbol x}_t-\frac{\beta_t}{\sqrt{1-\alpha_t}}\bm\epsilon_\theta({\boldsymbol x}_t,t) \right). \end{aligned}\] Thus, in the generative process, the sample can be obtained from the Gaussian noise by the iterative denoising steps: \({\boldsymbol x}_{t-1}=\bm\mu_\theta ({\boldsymbol x}_t, t)+\sigma_t {\boldsymbol z}\), where \({\boldsymbol z}\sim\mathcal{N}(0, I)\). Through this stochastic process, DDPM provides diverse realistic samples and has been exploited in many applications, including super-resolution, inpainting, and colorization. However, the application study of semantic segmentation is limited. Although several works are recently presented to solve high-level vision problems, they require annotated data to train the models. #### Self-supervised vessel segmentation For the vessel segmentation task, it is difficult to obtain fine-grained labels for supervised learning, since the vessel has complex structures with numerous tiny branches. While this label scarcity issue can be alleviated by semi-or unsupervised learning, fully unsupervised methods to segment the tiny vessels with reasonable performance are relatively scarce. In fact, recent unsupervised learning methods trained with natural images have great generalization capability on unseen datasets, thus they can be easily adapted to medical image segmentation tasks. However, due to the unique characteristics of angiography, e.g. confusing background factors and sophisticated vessel structures, most unsupervised methods fail to endure drastic performance degradation when they are applied to vessel segmentation tasks. As a type of unsupervised learning, self-supervised learning also has been introduced to utilize self-generated supervisory labels from data themselves to efficiently learn target representations in various medical image segmentation tasks and has demonstrated its potential. Specifically, introduces an end-to-end adversarial learning framework for vessel segmentation with the CycleGAN structure, which learns realistic angiogram generation that adds fractal-guided pseudo labels to the background images. However, the simple arithmetic operation for synthetic vessel generation often fails to yield realistic pseudo-vessel images, thus training the adversarial networks using unrealistic synthetic images is difficult to produce optimal segmentation performance. # Diffusion adversarial representation learning In this section, we describe our novel diffusion adversarial representation learning (DARL) model, tailored for self-supervised vessel segmentation method. As shown in Figure [\[fig:method\]](#fig:method){reference-type="ref" reference="fig:method"}, DARL model is trained on unpaired real angiography images \({\boldsymbol x}_0^a\) and real background images \({\boldsymbol x}_0^b\). Specifically, our model is comprised of a diffusion module \(\bm\epsilon_{\bm\theta}\) to estimate latent features, a generation module \(G\) to estimate both the vessel segmentation masks \(\hat{{\boldsymbol s}}^v\) and the synthetic angiograms \(\hat{{\boldsymbol x}}^a\), and two discriminators (\(D_s\), \(D_a\)) to distinguish real and fake images of the vessel masks and the angiograms, respectively. Here, to generate fake angiograms, we design the generation module to synthesize the fake angiograms by combining fake vessel masks \({\boldsymbol s}^{f}\) with the background images, where the fake vessels are random fractal masks presented in. In particular, we utilize the SPADE normalization layer that facilitates realistic image generation while preserving the semantic information of a given input mask. In the following, we explain the proposed generation module in detail, and then describe the model training and inference. #### Generation module with switchable SPADE layer As illustrated in Figure [\[fig:method\]](#fig:method){reference-type="ref" reference="fig:method"}, the proposed generation module consists of \(N\) residual blocks (ResnetBlock) that have switchable SPADE (S-SPADE) layers. Let \(\v\in \mathbb{R}^{M\times C\times H\times W}\) be the feature map in the ResnetBlock, where \(M\), \(C\), \(H\), and \(W\) are the size of batch, channel, height, and width, respectively. Then, the switchable SPADE layer normalizes feature maps differently depending on the existence of an input mask \({\boldsymbol s}\): \[\begin{aligned} \v= \begin{cases} \mathrm{SPADE}(\v, {\boldsymbol s}), & \text{if mask \({\boldsymbol s}\) is given,} \\ \mathrm{IN}(\v), & \text{otherwise,} \end{cases} \end{aligned}\] where IN is the instance normalization. So, when our model is given the fake vessel mask \({\boldsymbol s}^{f}\), the SPADE is computed by: \[\begin{aligned} x_{m,c,h,w} = \gamma_{c,h,w}({\boldsymbol s}^{f}) \frac{x_{m,c,h,w}-\mu_c}{\sigma_c} + \beta_{c,h,w}({\boldsymbol s}^{f}), \end{aligned}\] where \(x_{m,c,h,w}\) denotes the \((m,c,h,w)\)-th element of the feature tensor \(\v\), (\(\mu_c, \sigma_c\)) are the mean and standard deviation of the feature map in channel \(c\), and (\(\gamma_{c,h,w}, \beta_{c,h,w}\)) are learned modulation parameters during training. Thus, in the (A) path, given the noisy angiogram \({\boldsymbol x}_{t}^{a}\) and the latent feature \(\bm\epsilon_{\bm\theta}({\boldsymbol x}_t^a,t)\), the generation module \(G\) estimates the vessel segmentation masks \(\hat{{\boldsymbol s}}^{v}\) without the SPADE: \[\begin{aligned} \hat{\boldsymbol s}^v = G(\bm\epsilon_{\bm\theta}({\boldsymbol x}_t^a,t);\bm 0). \end{aligned}\] On the other hand, in the (B) path that provides the fractal mask \({\boldsymbol s}^{f}\), the generation module taking the noisy background \({\boldsymbol x}_{t}^{b}\) and its latent feature \(G(\bm\epsilon_{\bm\theta}({\boldsymbol x}_t^b,t))\) synthesizes the fake angiograms \(\hat{{\boldsymbol x}}^{a}\): \[\begin{aligned} \hat{\boldsymbol x}^a = G(\bm\epsilon_{\bm\theta}({\boldsymbol x}_t^b,t);{\boldsymbol s}^f). \end{aligned}\] ## Network Training {#sec:loss} In contrast to the DDPM that pretrains the diffusion model, our method trains the diffusion module, generation module, and discriminators simultaneously using an adversarial learning framework. Figure [\[fig:method_detail\]](#fig:method_detail){reference-type="ref" reference="fig:method_detail"} depicts the detailed training flow of our model. There are two distinct paths: (A) one feeds the real angiograms \({\boldsymbol x}_0^{a}\) into the model to provide vessel masks \(\hat{{\boldsymbol s}}^{v}\), and (B) the other takes the real backgrounds \({\boldsymbol x}_0^{b}\) and the fractal masks \({\boldsymbol s}^f\) for the model to generate fake angiograms \(\hat{{\boldsymbol x}}^{a}\). Here, as shown in Figure [\[fig:method_detail\]](#fig:method_detail){reference-type="ref" reference="fig:method_detail"}(B), since the input fractal masks can be regarded as vessel segmentation labels of the fake angiograms, we forward the fake angiograms generated through the (B) path to the (A) path, and apply cycle consistency between the estimated segmentation masks and the fractal masks to capture the vessel information. ### Loss function To train the model, we employ LSGAN framework, which leads to the alternating application of the following two optimization problems: \[\begin{aligned} \min_{\bm\theta,G} \mathcal{L}^G(\bm\epsilon_{\bm\theta}, G, D_s, D_a), \quad \min_{D_s, D_a} \mathcal{L}^D(\bm\epsilon_{\bm\theta}, G, D_s, D_a), \end{aligned}\] where \(\mathcal{L}^G\), and \(\mathcal{L}^D\) denotes the losses for the diffusion/generator and discriminator, respectively, which are given by: \[\begin{aligned} \mathcal{L}^G(\bm\epsilon_{\bm\theta}, G, D_s, D_a)& = \mathcal{L}_{diff}(\bm\epsilon_{\bm\theta}) + \alpha \mathcal{L}_{adv}^G(\bm\epsilon_{\bm\theta},G, D_s, D_a) + \beta \mathcal{L}_{cyc} (\bm\epsilon_{\bm\theta},G), \\ \mathcal{L}^{D}(\bm\epsilon_{\bm\theta}, G, D_s, D_a) &= \mathcal{L}_{adv}^{D_s}(\bm\epsilon_{\bm\theta},G, D_s)+ \mathcal{L}_{adv}^{D_a}(\bm\epsilon_{\bm\theta},G, D_a), \end{aligned}\] where \(\alpha\) and \(\beta\) are hyperparameters, \(\mathcal{L}_{diff}\) is the diffusion loss, \(\mathcal{L}_{adv}\) is adversarial loss, and \(\mathcal{L}_{cyc}\) is cyclic reconstruction loss. The detailed description of each loss function is as follows. #### Diffusion loss Recall that the diffusion module learns the distribution of images to estimate meaningful latent features of the inputs. We follow the standard loss for DDPM training: \[\begin{aligned} \label{eq:objective} \mathcal{L}_{diff}(\bm\epsilon_{\bm\theta}):=\mathbb{E}_{t,{\boldsymbol x}_0,\boldsymbol{\epsilon}}\Big{[}\|\boldsymbol{\epsilon}-\boldsymbol{\epsilon}_\theta(\sqrt{{\alpha}_t}{\boldsymbol x}_0+\sqrt{1-{\alpha}_t}\boldsymbol{\epsilon},t)\|^2\Big{]}. \end{aligned}\] where \(\bm\epsilon\sim\mathcal{N}(\bm 0, \bm I)\). In particular, to let the diffusion module represent the vessels of angiograms effectively, we define the diffusion loss on the background images, i.e. \({\boldsymbol x}_0 = {\boldsymbol x}_0^{b}\) in the (B) path and set the sampling schedule in \(t\in [0,T]\). Accordingly, the diffusion module is trained intensively to learn the background image distribution, allowing the module in the (A) path to regard the vessel structures of the angiograms as outlier noise and represent vessels in the latent features. #### Adversarial loss To generate both vessel segmentation masks and synthetic angiograms without the ground-truth labels, the proposed model is trained by adversarial learning using the two discriminators \(D_s\) and \(D_a\). As shown in Figure [\[fig:method\]](#fig:method){reference-type="ref" reference="fig:method"}, the discriminator \(D_s\) attempts to distinguish the estimated segmentation masks \(\hat{{\boldsymbol s}}^{v}\) from the real fractal mask \({\boldsymbol s}^{f}\) (in the (A) path), while the discriminator \(D_a\) tries to discriminate between the generated angiograms \(\hat{{\boldsymbol x}}^a\) and the real aniography images \({\boldsymbol x}_0^{a}\) (in the (B) path). As we employ LSGAN, the adversarial loss of generator \(\mathcal{L}_{adv}^G\) can be formulated by: \[\begin{aligned} \mathcal{L}_{adv}^G(\bm\epsilon_{\bm\theta},G,\!D_s,\!D_a) \!=\!\mathbb{E}_{{\boldsymbol x}^{a}}[(D_s(G(\bm\epsilon_{\bm\theta}({\boldsymbol x}^{a});\bm 0))-1)^2] + \mathbb{E}_{{\boldsymbol x}^{a},{\boldsymbol s}^f}[(D_a(G(\bm\epsilon_{\bm\theta}({\boldsymbol x}^{b}); {\boldsymbol s}^f))-1)^2]. \end{aligned}\] On the other hand, the discriminators are trained to compete against the generator with the adversarial loss functions, \(\mathcal{L}_{adv}^{D_s}\) and \(\mathcal{L}_{adv}^{D_a}\), which are defined by: \[\begin{aligned} \mathcal{L}_{adv}^{D_s}(\bm\epsilon_{\bm\theta},G, D_s) &= \frac{1}{2}\mathbb{E}_{{\boldsymbol s}^{f}}[(D_s({\boldsymbol s}^{f})-1)^2] + \frac{1}{2}\mathbb{E}_{{\boldsymbol x}^{a}}[(D_s(G(\bm\epsilon_{\bm\theta}({\boldsymbol x}^{a});\bm 0)))^2], \\ \mathcal{L}_{adv}^{D_a}(\bm\epsilon_{\bm\theta},G, D_a)&= \frac{1}{2}\mathbb{E}_{{\boldsymbol x}_0^{a}}[(D_a({\boldsymbol x}_0^{a})-1)^2] + \frac{1}{2}\mathbb{E}_{{\boldsymbol x}^{a},{\boldsymbol s}^f}[(D_a(G(\bm\epsilon_{\bm\theta}({\boldsymbol x}^{b}); {\boldsymbol s}^f)))^2]. \end{aligned}\] This adversarial loss enables the single generator \(G\) to fool the discriminator \(D_s\) and \(D_a\), by generating realistic segmentation masks \(\hat{{\boldsymbol s}}^{v}=G(\bm\epsilon_{\bm\theta}({\boldsymbol x}^{a});\bm 0)\) and angiograms \(\hat{{\boldsymbol x}}^{a}=G(\bm\epsilon_{\bm\theta}({\boldsymbol x}^{b}); {\boldsymbol s}^f)\). In contrast, the discriminators attempt to distinguish these generated images being fake and the real images of \({\boldsymbol s}^{f}\) and \({\boldsymbol x}_0^{a}\) being real. #### Cyclic reconstruction loss For the generator \(G\) to capture the semantic information of the vessels, we also constrain our model with the cyclic reconstruction loss on the fractal masks. Specifically, as the vessel-like fractal masks \({\boldsymbol s}^{f}\) can be labels for the synthetic angiograms \(\hat{\boldsymbol x}^{a}\) generated in the (B) path, we feed the \(\hat {\boldsymbol x}^{a}\) into our model and reconstruct the fractal masks by the (A) path. Therefore, the cyclic reconstruction loss is computed between the reconstructed segmentation masks and the real fractal masks, which can be written by: \[\begin{aligned} \mathcal{L}_{cyc} (\bm\epsilon_{\bm\theta},G) = \mathbb{E}_{{\boldsymbol x}^{b}, {\boldsymbol s}^{f}}[||G(\bm\epsilon_{\bm\theta}(G(\bm\epsilon_{\bm\theta}({\boldsymbol x}^{b}); {\boldsymbol s}^f));\bm 0)-{\boldsymbol s}^{f} ||_1]. \end{aligned}\] Here, we solve the segmentation problem as a vessel mask image generation, which is why we use L1 loss in the cyclic loss. ### Image perturbation for the model input Given real images of \({\boldsymbol x}_0^{a}\) and \({\boldsymbol x}_0^{b}\), our diffusion module takes noisy angiograms \({\boldsymbol x}_{t_a}^{a}\) in the (A) path and noisy background images \({\boldsymbol x}_{t_b}^{b}\) in the (B) path as the input, in which each noisy image is sampled based on the forward diffusion process ([\[eq:diff_forward\]](#eq:diff_forward){reference-type="ref" reference="eq:diff_forward"}): \[\begin{aligned} \label{eq:diff_samA} {\boldsymbol x}_t=\sqrt{{\alpha}_t}{\boldsymbol x}_0+\sqrt{1-{\alpha}_t}\boldsymbol{\epsilon}, \end{aligned}\] where \(\bm \epsilon\sim\mathcal{N}(\bm 0, \bm I)\), and both of \(t_a\) and \(t_b\) are uniformly sampled time step in \([0, T]\). Here, for the diffusion module not only to learn the background image distribution in the (B) path but also to provide useful information for the generation module to segment the vessel structures under even certain noisy angiogram images in the (A) path, we sample \(t_a\) in the range of \([0, T_a]\) where \(T_a<T\). Empirically, we found that this makes our model learn vessel representations robust to the noise. ## Inference of vessel segmentation The inference phase of DARL is different from the conventional diffusion model in that our model do not require iterative reverse process, similar to the recent diffusion-based unsupervised learning method called DiffuseMorph. Specifically, once the proposed DARL is trained, in the inference, we can obtain the vessel segmentation masks of angiograms from the (A) path by one step. For the noisy angiograms \({\boldsymbol x}_{t_a}^a\) given by the forward diffusion process ([\[eq:diff_samA\]](#eq:diff_samA){reference-type="ref" reference="eq:diff_samA"}), our model provides the vessel segmentation masks using the latent features \(\bm\epsilon_{\bm\theta}({\boldsymbol x}_{t_a}^a, t_a)\) estimated from the diffusion module. As shown in Figure [\[fig:inference\]](#fig:inference){reference-type="ref" reference="fig:inference"}, our model can generate the segmentation masks for any noise level \(t_a\) within a certain range (i.e. \([0, T_a]\)). Nevertheless, since the angiography image \({\boldsymbol x}_0^{a}\) can be considered as one of the clean target images, the closer \(t_a\) is to zero, the better the vessel segmentation performance. Therefore, we test our model by setting \(t_a=0\). # Experiments In this section, we thoroughly evaluate the vessel segmentation performance of our method. We firstly compare the proposed DARL to existing unsupervised and self-supervised baseline models on various angiography datasets, including X-ray coronary angiography and retinal images. Also, we study the noise robustness of our model. Then, we analyze the success of our model in vessel representation and conduct an ablation study. #### Datasets To realize the self-supervised learning framework, we train our model with the publicly available X-ray coronary angiography disease (XCAD) dataset obtained during stent placement surgery. A total of 1,621 angiography frames and their corresponding first frames, taken before injecting the contrast agents, are used as the real angiography and background images, respectively. Also, we generate 1,621 synthetic fractal masks by. Additional 126 angiography images, along with the ground-truth vessel masks annotated by experienced radiologists, are divided into validation and test sets by 10% and 90%, respectively. We subsample all data into 256\(\times\)`<!-- -->`{=html}256. Also, in testing, we utilize two external X-ray coronary angiography (XCA) datasets acquired from different machines. 134 XCA dataset is composed of 134 angiography images with the vessel masks labeled by an expert cardiologist. 30 XCA datset is composed of 30 sequences of angiography images. We utilize one angiography image from each sequence, along with its corresponding ground-truth vessel mask labeled by experts. All the test images are resized to 512\(\times\)`<!-- -->`{=html}512. Furthermore, we evaluate cross-organ generalization capability on retinal imaging datasets. We use DRIVE and STARE datasets, each of which is composed of 20 retinal images and the corresponding expert-labeled vessel masks. Since retinal imaging is taken under high-resolution, we resize the image into 768\(\times\)`<!-- -->`{=html}768 and split into 9 patches with 256\(\times\)`<!-- -->`{=html}256. #### Implementation details Our model is implemented by employing the network architectures proposed in DDPM and SPADE for the diffusion module and the generation module, respectively. Also, for the discriminators, we use the network of PatchGAN. To train the model, we set the number of time steps as \(T=2000\) with the linearly scheduled noise levels from \(10^{-6}\) to \(10^{-2}\). Within this range, we sample the noisy angiograms by setting \(T_a\) to 200. Also, we set the hyperparameters of loss function as \(\alpha=0.2\) and \(\beta=5\). Our model is optimized by using the Adam algorithm with a learning rate of \(5\times10^{-6}\) on a single GPU card of Nvidia Quadro RTX 6000. We train the model for 150 epochs, and the model in the epoch with the best performance on the validation set is used for test data. All the implementations are done using the library of PyTorch in Python. The details of network structures and hyperparameter setting can be found in Appendix. #### Baseline methods and metrics We compare our model to several baseline methods of un-/self-supervised learning, which do not require ground-truth vessel labels. For unsupervised learning methods, we utilize Spatial-Guided Clustering (SGC), Redrawing, and Deep Spectral (DS). For self-supervised learning methods, we employ Self-supervised Transformer with Energy-based Graph Optimization (STEGO), Deep Adversarial (DA), and Self-Supervised Vessel Segmentation (SSVS). All these methods are implemented under identical training conditions to our model, unless the method needs no training procedure. For baseline methods that require heuristic thresholds, optimal performance is achieved by selecting data-specific thresholds within the range from 0.2 to 0.8 in increments of 0.1. To quantitatively evaluate the segmentation performance, we compute Intersection over Union (IoU), Dice similarity coefficient, and Precision. ## Experimental results Figure [\[fig:main\]](#fig:main){reference-type="ref" reference="fig:main"} shows the vessel segmentation masks from the baseline methods and our proposed method on three different coronary angiography datasets and two retinal imaging datasets. Quantitative evaluation results of the methods are presented in Table [\[tab:main\]](#tab:main){reference-type="ref" reference="tab:main"}. The analysis of the results is as follows. #### Comparison of ours to baselines When we compare the proposed method to the baselines, our model segments vessel structures including tiny branches more accurately. Also, as shown in Table [\[tab:main\]](#tab:main){reference-type="ref" reference="tab:main"}, our model consistently achieves the SOTA performance by large margin compared to existing unsupervised and self-supervised methods. In specific, our network shows significantly improved precision scores, which demonstrates advantages of our DARL that effectively differentiates foreground vessel structure and eliminates false positive signals from the noisy backgrounds. [\[tab:main\]]{#tab:main label="tab:main"} #### Generalization capability To verify that our trained DARL can be generally applied to various vessel image taken from different machines or different anatomic region-of-interests (ROI), we also study the generalization capability of our method. First, when we test our model on external 134 XCA and 30 XCA datasets directly, which have different resolutions and noise distributions to those of the XCAD dataset, as shown in Figure [\[fig:main\]](#fig:main){reference-type="ref" reference="fig:main"} and Table [\[tab:main\]](#tab:main){reference-type="ref" reference="tab:main"}, our model achieves higher performance than the others. Moreover, when we evaluate the model on DRIVE and STARE retinal datasets that have unseen data distribution of different modalities and ROIs from the XCAD, our DARL shows the most promising cross-organ generalization performance. This may come from the proposed adversarial framework that reuses the generated angiography images for the segmentation process through the cycle path, diversifying the input data distribution. Also, the diffusion module learning the stochastic diffusion process enables our model to be used in general for vessel segmentation. #### Robustness to noises {#sec:noise} As X-ray images are often acquired under low-dose radiation exposure to reduce potential risks, we further evaluate the performance of our model on simulated noisy angiograms. Using the XCAD dataset, we add Gaussian noise to the angiogram with different levels of \(\sigma=\)`<!-- -->`{=html}10, 25, and 50. We show the segmentation results according to the noise levels in Figure [\[fig:main\]](#fig:main){reference-type="ref" reference="fig:main"}. Also, we report the quantitative evaluation results in Table [\[tab:noise\]](#tab:noise){reference-type="ref" reference="tab:noise"}. It is noteworthy that our DARL is the only method to segment vessel structures with reasonable performance under noise corruption. Since the proposed segmentation method is trained through the diffusion module that perturbs the input images, the model is highly robust to segment vessel structure even from the noisy data. [\[tab:noise\]]{#tab:noise label="tab:noise"} #### Latent representation To study the origin of the performance improvement, in Figure [\[fig:discuss_diff\]](#fig:discuss_diff){reference-type="ref" reference="fig:discuss_diff"}, we show the latent features \(\bm\epsilon_{\bm\theta}({\boldsymbol x}_t, t)\) given \({\boldsymbol x}_0\) for (A) the angiography \({\boldsymbol x}_0={\boldsymbol x}_0^a\) and (B) the backgrounds \({\boldsymbol x}_0={\boldsymbol x}_0^b\) with \(t=100\), respectively. In contrast to the (B) path, the latent representation in the (A) path emphasizes the vessel structures. This implies that although there are no ground-truth labels, our model learns the background image representation so that the vessel structure can be captured as outlier noise, leading to improved segmentation performance. #### Ablation study Table [\[tab:ablation\]](#tab:ablation){reference-type="ref" reference="tab:ablation"} shows the quantitative evaluation results of several ablation studies, and visual results are in Appendix. (a) Our model without the diffusion module and \(\mathcal{L}_{diff}\) shows lower performance by about 5% for all metrics compared to our model, which suggests that the diffusion module guides the generation module to extract vessel representation accurately. (b) The generation module without the proposed S-SPADE layers is degraded by more than 5% over (a) for all metrics, verifying that our SPADE-based unified generator effectively captures vessel semantic information through the synergy of learning both image segmentation and generation. (c) Through the implementation of our model without the proposed cyclic loss \(\mathcal{L}_{cyc}\), we verify that \(\mathcal{L}_{cyc}\) allows our model to segment proper vessel regions. (d) When training our model by converting the L1 loss for \(\mathcal{L}_{cyc}\) to the cross-entropy (CE) loss, the performance is much worse than ours in all metrics, which implies that our approach using L1 loss for the cycle path is proper to obtain the vessel masks. [\[tab:ablation\]]{#tab:ablation label="tab:ablation"} # Conclusion We present a non-iterative diffusion model called DARL for self-supervised vessel segmentation. Our model composed of the diffusion and generation modules learns vessel representation without labels via adversarial learning, in the guidance of latent features estimated from the diffusion module. Also, through the proposed switchable SPADE layer, we generate synthetic angiograms as well as vessel segmentation masks, leading to learning semantic information about vessels more effectively. Although the diffusion module training is combined with other loss functions, the inference is not iterative but only done in one step, which makes it faster and unique compared to the existing diffusion models. Using various medical vessel datasets, we verify that our model is much superior to existing un-/self-supervised learning methods. Moreover, thanks to the diffusion module, our model is robust to image diversity and noise, suggesting that our model can be an important platform for designing a general vessel segmentation model.
{'timestamp': '2022-09-30T02:08:02', 'yymm': '2209', 'arxiv_id': '2209.14566', 'language': 'en', 'url': 'https://arxiv.org/abs/2209.14566'}
# Introduction {#introduction and main results} A central topic in differential geometry is how the curvature conditions restrict the topology. In the case of Ricci curvature (abbreviated by "Ric\") in Kähler geometry this principle goes back to Bocher, who proved that (,, ) the condition of \(\text{Ric}>0\) or \(\text{Ric}<0\) on compact Kähler manifolds or the existence of Kähler-Einstein metrics impose heavy restrictions on their holomorphic tensor fields. These conditions can now be reformulated in terms of the first Chern class, thanks to the celebrated Calabi-Yau theorem and the Aubin-Yau theorem (). In order to precisely state Bochner's results, let (throughout this article) \(TM\) and \(T^{\ast}M\) be respectively the (*holomorphic*) tangent and cotangent bundle of a compact complex manifold \(M\), and [\[holomorphic tensor field\]]{#holomorphic tensor field label="holomorphic tensor field"}\^p_q(M):=H\^0(M,(TM)\^p(T\^M)\^q),(p, q\_)the space of *\((p,q)\)-type holomorphic tensor fields* on \(M\). Bochner's results can be stated as follows (,, ). It is well-known that the condition \(\text{Ric}>0\), which is equivalent to be Fano due to the Calabi-Yau theorem, implies simple-connectedness (). This was further strengthened to be rational connected by Campana () and Kollár-Miyaoka-Mori () independently. Recall that a complex manifold is called *rationally connected* if any two points on it can be joined by a chain of rational curves. Rational connetedness is an important tool/notion in algebraic geometry. In view of the subtle relationship between Ric and the holomorphic sectional curvature \(H\) (), one may expect that the above-mentioned conclusions still hold when Ric is replaced by \(H\). The simple-connectedness under the condition \(H>0\) is well-known (). A recent important result due to Wu-Yau, Tosatti-Yang and Diverio-Trapani (,, , ) implies that the quasi-negativity of \(H\) implies \(c_1(M)<0\), and hence the conclusions of parts (2)-(3) in Theorem [\[Bochner\]](#Bochner){reference-type="ref" reference="Bochner"} remain true when \(H\) is quasi-negative. Yau conjectured that () a compact Kähler manifold with \(H>0\) is projective and rational connected. Assuming the projectivity this was proved by Heier-Wong (). Shortly afterwards the projectivity was proved by Yang in by showing that the Hodge number \(h^{2,0}=0\) (), who also provided an alternative proof of the rational connectedness therein. Recently Yang introduced in the notion of *uniform RC-positivity* on Hermitian holomorphic vector bundles, which is satisfied by the tangent bundle of a compact Kähler manifold with \(H>0\), and deduced that a compact Kähler manifold whose tangent bundle is uniform RC-positive with respect to a (possibly different) Hermitian metric is projective and rational connected (). In contrast to the negative case, in general the condition \(H>0\) is *not* able to yield \(c_1(M)>0\), as exhibited by Hitchin () that the Hirzebruch surfaces [\[Hitchin example\]]{#Hitchin example label="Hitchin example"}F:=(\_\^1(-k) \_\^1)(k)admit Kähler metrics with \(H>0\) but \(c_1(F)\) are *not* positive (cf. ). More related examples can be found in and. Even so, we can still ask whether the conclusions of part (1) in Theorem [\[Bochner\]](#Bochner){reference-type="ref" reference="Bochner"} hold when \(H>0\). In fact, Yang showed that () the condition \(H>0\) leads to the Hodge numbers \(h^{q,0}=0\) for \(1\leq q\leq n\) and thus provides positive evidence towards this validity. Recently the author showed that the conclusions of part (1) in Theorem [\[Bochner\]](#Bochner){reference-type="ref" reference="Bochner"} are true when \(H>0\) (). Indeed what we proved in is in a more general setting, i.e., for those Hermitian metrics whose Chern curvature tensors behave like the usual Kähler curvature tensors. The *\(k\)-Ricci curvatures* \(\text{Ric}_k\) for \(1\leq k\leq n\) was introduced by Ni () in his study of the \(k\)-hyperbolicity of a compact Kähler manifold. \(\text{Ric}_k\) coincides with \(H\) when \(k=1\) and with Ric when \(k=n\) and so they interpolate between \(H\) and \(\text{Ric}\). Ni showed that the condition \(\text{Ric}_k>0\) for some \(k\in\{1,\ldots,n\}\) yields rational connectedness and \(h^{q,0}=0\) for \(1\leq q\leq n\), and hence the simple-connectedness and projectivity (). Chu-Lee-Tam showed that () the condition \(\text{Ric}_k<0\) for some \(k\in\{1,\ldots,n\}\) also implies \(c_1(M)<0\). (see by Li-Ni-Zhu for an alternative proof). Hence the conclusions of parts (2) and (3) in Theorem [\[Bochner\]](#Bochner){reference-type="ref" reference="Bochner"} hold true under the condition \(\text{Ric}_k<0\) for some \(k\in\{1,\ldots,n\}\). In view of the discussions above, we may wonder whether the conclusions of part (1) in Theorem [\[Bochner\]](#Bochner){reference-type="ref" reference="Bochner"} are true when \(\text{Ric}_k>0\) for some \(k\in\{1,\ldots,n\}\). One main motivation in this article is, as an application of the main results, to affirmatively prove it. Another motivation is to extend Yang's differential-geometric criterion for rational connectedness () from the case of uniform RC-positivity to that of uniform RC \(k\)-positivity for arbitrary \(k\). # Main results {#main results} Our main results and applications are stated in this section. The following concept is inspired by that of uniform RC-positivity introduced by Yang () as well as BC \(k\)-positivity by Ni (). The following vanishing theorem for uniformly RC \(k\)-positive vector bundles is a key technical tool. The main motivation to introduce this concept is that the tangent bundle of a compact Käher manifold \((M,\omega)\), or more generally a compact Kähler-like Hermitian manifold \((M,\omega)\), with the condition \(\text{Ric}_k(\omega)>0\) (resp. \(\text{Ric}_k(\omega)<0\)) is uniformly RC \(k\)-positive (resp. negative). To this end, let us recall the following notion, which was first proposed and investigated in detail by B. Yang and Zheng in. With this notion understood, our second main result is the following Apply Theorem [\[RC vanishing theorem\]](#RC vanishing theorem){reference-type="ref" reference="RC vanishing theorem"} to Theorem [\[rick lead to uniform\]](#rick lead to uniform){reference-type="ref" reference="rick lead to uniform"} by taking the holomorphic vector bundle \(F\) trivial, it yields the following desired vanishing theorem, which extends from the case \(\text{Ric}_1\) to arbitrary \(\text{Ric}_k\). Our second major application is a differential-geometric criterion for the rational connectedness of compact Kähler manifolds. The following nice criterion for rational connectedness was established in, on which both and are based. Combining Theorems [\[RC vanishing theorem\]](#RC vanishing theorem){reference-type="ref" reference="RC vanishing theorem"}, [\[rick lead to uniform\]](#rick lead to uniform){reference-type="ref" reference="rick lead to uniform"}, [\[CKL result\]](#CKL result){reference-type="ref" reference="CKL result"} and [\[CDP\]](#CDP){reference-type="ref" reference="CDP"} we have the following criterion for projectivity and the rational connectedness. The rest of this article is organized as follows. Some necessary background materials are collected in Section [3](#Preliminaries){reference-type="ref" reference="Preliminaries"}. Sections [4](#proof of rc vanishing){reference-type="ref" reference="proof of rc vanishing"} and [5](#proof of theorem rick yield rc){reference-type="ref" reference="proof of theorem rick yield rc"} are devoted to the proofs of Theorems [\[RC vanishing theorem\]](#RC vanishing theorem){reference-type="ref" reference="RC vanishing theorem"} and [\[rick lead to uniform\]](#rick lead to uniform){reference-type="ref" reference="rick lead to uniform"} respectively. In Section [6](#further remarks){reference-type="ref" reference="further remarks"} some related questions and remarks shall be discussed, in which various positivity notions are proposed and their relations are briefly discussed for possible further study in the future. # Background materials {#Preliminaries} We collect in this section some basic facts on Hermitian holomorphic vector bundles and Hermitian and Kähler manifolds in the form we shall use to prove our main results. A thorough treatment can be found in and. ## Hermitian holomorphic vector bundles Let \((E,h)\rightarrow M\) be a Hermitian holomorphic vector bundle of rank \(r\) over an \(n\)-dimensional complex manifold \(M\) with canonical Chern connection \(\nabla\). The Chern curvature tensor \[R=R^{(E,h)}:=\nabla^2\in\Gamma(\Lambda^{1,1}M\otimes E^{\ast}\otimes E)\] Here and throughout this article \(\Gamma(\cdot)\) is used to denote the space of *smooth* sections for holomorphic vector bundles and the notation \(\Gamma^p_q(M)\) in ([\[holomorphic tensor field\]](#holomorphic tensor field){reference-type="ref" reference="holomorphic tensor field"}) is reserved throughout this article to denote the space of \((p,q)\)-type *holomorphic* tensor fields on \(M\). Take a local frame field \(\{s_1,\ldots,s_r\}\) of \(E\), whose dual coframe field is denoted by \(\{s_1^{\ast},\ldots,s_r^{\ast}\}\), and a local holomorphic coordinates \(\{z^1,\ldots,z^n\}\) on \(M\). With the Einstein summation convention adopted here and in what follows, the Chern curvature tensor \(R\) and the Hermitian metric \(h\) can be written as \[\begin{aligned} \label{curvature tensor} \left\{ \begin{array}{ll} \displaystyle R=:\Omega^{\beta}_{\alpha}s^{\ast}_{\alpha}\otimes s_{\beta}=:R^{\beta}_{i\bar{j}\alpha}dz^i\wedge d\bar{z}^j\otimes s^{\ast}_{\alpha}\otimes s_{\beta},\\ ~\\ \displaystyle h=(h_{\alpha\bar{\beta}}):=\big(h(s_{\alpha},s_{\beta})\big),\\ ~\\ \displaystyle R_{ij\alpha\bar{\beta}}:=R_{ij\alpha}^{\gamma}h_{\gamma\bar{\beta}}. \end{array} \right.\nonumber \end{aligned}\] The Hermitian metric \(h(\cdot,\cdot)\) and the induced metrics on various vector bundles arising naturally from \(E\) are sometimes denoted by \(<\cdot,\cdot>\). For \(u=u^{\alpha}s_{\alpha}\in\Gamma(E)\), \(v=v^{\alpha}s_{\alpha}\in\Gamma(E)\), \(X=X^i\frac{\partial}{\partial z^i}\), and \(Y= Y^i\frac{\partial}{\partial z^i}\), we have \[R(u)=(\Omega^{\beta}_{\alpha}s^{\ast}_{\alpha}\otimes s_{\beta})(u^{\gamma}s_{\gamma})= \Omega^{\beta}_{\alpha}u^{\alpha}s_{\beta} \in\Gamma(\Lambda^{1,1}M\otimes E),\] \[R_{X\overline{Y}}(u)=\Omega^{\beta}_{\alpha} (X,\overline{Y})u^{\alpha}s_{\beta}= R^{\beta}_{i\bar{j}\alpha}X^i\overline{Y^j}u^{\alpha}s_{\beta} \in\Gamma(E),\] and therefore, [\[Hermitian formula\]]{#Hermitian formula label="Hermitian formula"} Here and in what follows we always use capital letters to denote vectors in \(TM\) and lowercase letters to denote vectors in \(E\), so as to distinguish them. The formula ([\[Hermitian formula\]](#Hermitian formula){reference-type="ref" reference="Hermitian formula"}) yields an easy but useful fact, which we record in the next lemma for our later reference. ## The Ricci and scalar \(k\)-curvatures Let \((M,\omega)\) be an \(n\)-dimensional Hermitian manifold, \(R=R^{(TM,\omega)}\) the Chern curvature tensor. Denote by \(T_xM\) the *\((1,0)\)-type* tangent space at \(x\in M\) and \(\{E_1,\ldots,E_n\}\) a unitary basis of \(T_xM\). For \(X\in T_xM\), let \(H(X)\), \(\text{Ric}(X,\overline{X})\) and \(S(x)\) be respectively the holomorphic sectional curvature, Chern-Ricci curvature and Chern scalar curvature: \[\begin{aligned} \left\{ \begin{array}{ll} \displaystyle H(X):=\frac{R(X,\overline{X},X,\overline{X})}{|X|^4},\\ ~\\ \displaystyle\text{Ric}(X,\overline{X}):=\sum\limits_{i=1}^nR(X,\overline{X},E_i,\overline{E_i}),\\ ~\\ \displaystyle S(x):=\sum\limits_{i,j=1}^nR(E_i,\overline{E_i},E_j,\overline{E_j}). \end{array} \right.\nonumber \end{aligned}\] When \(\omega\) is Kähler, \(H(X)\), \(\text{Ric}(X,\overline{X})\) and \(S(x)\) are the usual notions of holomorphic sectional curvature, Ricci curvature and scalar curvature in Kähler geometry. For \(k\in\{1,\ldots,n\}\), pick a \(k\)-dimensional subspace \(\Sigma\subset T_xM\) and choose a unitary basis \(\{E_1,\ldots,E_k\}\) of \(\Sigma\). Define [\[def riccik\]]{#def riccik label="def riccik"}\_k(x,)(X,):=\_i=1\^kR(X, ,E_i,),and call it the *\(k\)-Ricci curvature* of \(\omega\), which was introduced by Ni in. The \(k\)-Ricci curvatures \(\text{Ric}_k\) interpolate \(H\) and \(\text{Ric}\) in the sense that \[\text{Ric}_1(x,\mathbb{C}X)(X,\overline{X})=|X|^2H(X)\quad \text{and} \quad\text{Ric}_n=\text{Ric}.\] We say that \(\text{Ric}_k(x)>0\) if \(\text{Ric}_k(x,\Sigma)(X,\overline{X})>0\) for any \(k\)-dimensional subspace \(\Sigma\) in \(T_xM\) and any nonzero \(X\in\Sigma\), and \(\text{Ric}_k=\text{Ric}_k(\omega)>0\) if \(\text{Ric}_k(x)>0\) for any \(x\in M\). Closely related to \(\text{Ric}_k\) are the *\(k\)-scalar curvatures* \(S_k=S_k(\omega)\) (\(1\leq k\leq n\)) introduced in by Ni-Zheng for *Kähler* metrics, which is the average of \(H\) on \(k\)-dimensional subspaces of \((1,0)\)-type tangent spaces. These \(\{S_k\}\) interpolate between \(H\) (\(k=1\)) and the usual scalar curvature (\(k=n\)). They extended Yang's results by showing that the condition \(S_k>0\) for a *Kähler* metric implies that the Hodge numbers \(h^{q,0}=0\) for \(k\leq q\leq n\) (). In particular, the condition \(S_2>0\) is enough to gurantee the projectivity. Here we shall define \(S_k=S_k(\omega)\) for \(k\in\{1,\ldots,n\}\) in the Hermitian situation, which turns out to be the same as the original one in when \(\omega\) is Kähler (see Lemma [\[relations riccik and sk\]](#relations riccik and sk){reference-type="ref" reference="relations riccik and sk"}). As above, for \(x\in M\), a \(k\)-dimensional subspace \(\Sigma\subset T_xM\) and a unitary basis \(\{E_1,\ldots,E_k\}\) of \(\Sigma\), define [\[def sk\]]{#def sk label="def sk"}S_k(x,):=\_i,j=1\^k R(E_i,,E_j,).It is obvious that in the Hermitian case these \(\{S_1,\ldots,S_n\}\) interpolate between \(H\) (\(k=1\)) and the Chern scalar curvature \(S(x)\) (\(k=n\)). Similarly we say that \(S_k(x)>0\) if \(S_k(x,\Sigma)>0\) for any \(k\)-dimensional subspace \(\Sigma\) in \(T_xM\), and \(S_k=S_k(\omega)>0\) if \(S_k(x)>0\) for any \(x\in M\). ## Integral formulas The trick of the proof in the next lemma is usually attributed to Berger, who first applied it to show that for *Kähler* metrics the sign of \(H_x(\cdot)\) determines that of \(S(x)\). where \(d\theta(Y)\) is the spherical measure on \(\{Y\in\Sigma,~|Y|=1\}\cong\mathbb{S}^{2k-1}\) and \(\text{V}(\mathbb{S}^{2k-1})\) the volume with respect to it. and  ◻ # Proof of Theorem [\[RC vanishing theorem\]](#RC vanishing theorem){reference-type="ref" reference="RC vanishing theorem"} {#proof of rc vanishing} ## Two lemmas We prepare two crucial lemmas in order to establish Theorem [\[RC vanishing theorem\]](#RC vanishing theorem){reference-type="ref" reference="RC vanishing theorem"}. The following result was obtained in, whose proof is to apply a \(\partial\bar{\partial}\)-Bochner formula and the maximum principle to part of directions. The next lemma is parallel to. ## Proof of Theorem [\[RC vanishing theorem\]](#RC vanishing theorem){reference-type="ref" reference="RC vanishing theorem"} {#proof-of-theorem-rc-vanishing-theorem} Let \(T\in H^0\big(M,E^{\otimes p}\otimes (E^{\ast})^{\otimes q}\otimes F^{\otimes m}\big)\), \(x\in M\) and a *unit* vector \(X\in T_xM\). Arbitrarily choose a Hermitian metric \(h_F\) on \(F\) and simply write \(R\) to denote the Chern curvature tensors of various Hermitian holomorphic vector bundles involved in the proof. Due to Lemma [\[diagonal and real lemma\]](#diagonal and real lemma){reference-type="ref" reference="diagonal and real lemma"} denote by the real eigenvalues of the Hermitian transformations \(R_{X\overline{X}}(\cdot)\) on \(\big(E_x,h(x)\big)\) and \(\big(F_x,h_F(x)\big)\) by \(\lambda_i=\lambda_i(x,X)\) (\(1\leq i\leq r_1\)) and \(\mu_j=\mu_j(x,X)\) (\(1\leq j\leq r_2\)) respectively, where \(r_1\) and \(r_2\) are the ranks of \(E\) and \(F\). Let \(\{e_1,\ldots,e_{r_1}\}\) and \(\{s_1,\ldots,s_{r_2}\}\) be unitary bases of \(E_x\) and \(F_x\) such that \[\begin{aligned} \label{0.1} \left\{ \begin{array}{ll} \displaystyle R_{X\overline{X}}(e_i)=\lambda_ie_i, &(1\leq i\leq r_1)\\ ~\\ R_{X\overline{X}}(s_j)=\mu_js_j. &(1\leq j\leq r_2) \end{array} \right. \end{aligned}\] Let \(\{\theta^1,\ldots,\theta^{r_1}\}\) be the unitary basis of \(E^{\ast}_x\) dual to \(\{e_i\}\). Then the induced action of \(R_{X\overline{X}}(\cdot)\) on \(\{\theta^i\}\) is given by [\[0.2\]]{#0.2 label="0.2"}R\_X(\^i)=-\_i\^i,ir_1.Write \[T\Big|_x=T^{\alpha_1\cdots\alpha_p\gamma_1\cdots\gamma_m}_{\beta_1\cdots\beta_q}e_{\alpha_1} \otimes\cdots\otimes e_{\alpha_p}\otimes\theta^{\beta_1}\otimes\cdots\otimes\theta^{\beta_q}\otimes s_{\gamma_1}\otimes\cdots\otimes s_{\gamma_m}.\] Then ([\[0.1\]](#0.1){reference-type="ref" reference="0.1"}) and ([\[0.2\]](#0.2){reference-type="ref" reference="0.2"}) imply , . which gives the desired one in ([\[1\]](#1){reference-type="ref" reference="1"}). Taking integrals \(\oint(\cdot)\) on both sides of ([\[T-formula\]](#T-formula){reference-type="ref" reference="T-formula"}) yields \|T\^\_1_p\_1_m\_\_1_q\|\^2 (\_i=1\^p\_\_i-\_j=1\^q\_\_j+\_l=1\^m\_\_l)\ &\_ \|T\^\_1_p\_1_m\_\_1_q\|\^2 (\^2k-1) ()\ =&(\^2k-1)\|T\|\^2\|\_x. We are ready now to complete the proof of Theorem [\[RC vanishing theorem\]](#RC vanishing theorem){reference-type="ref" reference="RC vanishing theorem"} in the following lemma. If \(q> C_1\cdot p+C_2\cdot m\), ([\[2\]](#2){reference-type="ref" reference="2"}) and ([\[3\]](#3){reference-type="ref" reference="3"}) together imply \[\int_{X\in \Sigma_{x_0},~|X|=1}<R_{X\overline{X}}(T)\Big|_{x_0},T\Big|_{x_0}>d\theta(X)=0,\] which, in turn via ([\[3\]](#3){reference-type="ref" reference="3"}) tells us that the only possibility is \(\big|T\big|^2\Big|_{x_0}=0\). The maximum of \(\big|T\big|\) at \(x_0\) then implies \(T\equiv0\). This completes the proof of this lemma and hence that of Theorem [\[RC vanishing theorem\]](#RC vanishing theorem){reference-type="ref" reference="RC vanishing theorem"}. ◻ We first explain how Lemma [\[NZ estimate lemma\]](#NZ estimate lemma){reference-type="ref" reference="NZ estimate lemma"}, together with the materials in Section [3](#Preliminaries){reference-type="ref" reference="Preliminaries"}, leads to Theorem [\[rick lead to uniform\]](#rick lead to uniform){reference-type="ref" reference="rick lead to uniform"} and postpone its proof to the next subsection. *Proof of Theorem [\[rick lead to uniform\]](#rick lead to uniform){reference-type="ref" reference="rick lead to uniform"}*. \_k(x,)(X,)\>0().The definitions of \(\text{Ric}_k(\omega)\) and \(S_k(\omega)\) in ([\[def riccik\]](#def riccik){reference-type="ref" reference="def riccik"}) and ([\[def sk\]](#def sk){reference-type="ref" reference="def sk"}) then imply that [\[lower bound for sk\]]{#lower bound for sk label="lower bound for sk"}\_ S_k(x,)kD\>0().For any \(x\in M\), let the \(k\)-dimensional subspace \(\Sigma\subset T_xM\) *minimize* (resp. *maximize*) the \(k\)-scalar curvature \(S_k(x,\cdot)\) at \(x\), as required in Lemma [\[NZ estimate lemma\]](#NZ estimate lemma){reference-type="ref" reference="NZ estimate lemma"}. We shall show that such \(\Sigma\) satisfies the inequality ([\[RC-positivity\]](#RC-positivity){reference-type="ref" reference="RC-positivity"}) and hence \((TM,\omega)\) is uniformly RC \(k\)-positive (resp. uniformly RC \(k\)-negative) over \((M,\omega)\). In fact, for any \(X\in T_xM\), decompose \(X\) as \(X=X_1+X_2\), where \(X_1\in\Sigma\) and \(X_2\in\Sigma^{\bot}\). Like before, denote by \(\oint f(Y)\) the integral of \(f(Y)\) over \(\{Y\in\Sigma~|~|Y|=1\}\) with respect to the spherical measure. Then This completes the proof of Theorem [\[rick lead to uniform\]](#rick lead to uniform){reference-type="ref" reference="rick lead to uniform"}. ◻ We may assume that the two vectors \(Y\in\Sigma\) and \(Z\in\Sigma^{\bot}\) are both *nonzero* as otherwise ([\[NZ estimate1\]](#NZ estimate1){reference-type="ref" reference="NZ estimate1"}) and ([\[NZ estimate2\]](#NZ estimate2){reference-type="ref" reference="NZ estimate2"}) trivially hold. Let \[a(\cdot):=\sqrt{-1}\big(<\cdot,Y>Z+<\cdot,Z>Y\big)\] and it can be easily checked that \(a(\cdot)\in\mathfrak{u}(n)\). Then [\[a formula\]]{#a formula label="a formula"}a(X)=\<X,Y\>Z,a\^2(X)=-\<X,Y\>\|Z\|\^2Y.Apply ([\[5\]](#5){reference-type="ref" reference="5"}) to ([\[a formula\]](#a formula){reference-type="ref" reference="a formula"}) and also the one with \(Z\) being replaced by \(\sqrt{-1}Z\), and sum the two we have [\[8\]]{#8 label="8"}R(Z,,X,)d(X)=0.We take a unitary basis of \(\Sigma\) as follows [\[7\]]{#7 label="7"}{E_1=Y/\|Y\|,E_2,...,E_k},and simply write \(V:=\text{V}(\mathbb{S}^{2k-1})\). Then This and its conjugate lead to ([\[NZ estimate1\]](#NZ estimate1){reference-type="ref" reference="NZ estimate1"}). We now derive ([\[NZ estimate2\]](#NZ estimate2){reference-type="ref" reference="NZ estimate2"}). Apply ([\[6\]](#6){reference-type="ref" reference="6"}) to the above ([\[a formula\]](#a formula){reference-type="ref" reference="a formula"}) and also the one being replaced by \(\sqrt{-1}Z\), and sum the two we have [\[9\]]{#9 label="9"} Arbitrarily choose a unitary basis \(\{E_1,\ldots,E_k\}\) of \(\Sigma\), which is irrelevant to ([\[7\]](#7){reference-type="ref" reference="7"}). Then [\[10\]]{#10 label="10"} Analogous to ([\[10\]](#10){reference-type="ref" reference="10"}) it can be derived that [\[11\]]{#11 label="11"} d(Y)= S_k(x,)\|Z\|\^2. Putting ([\[9\]](#9){reference-type="ref" reference="9"}), ([\[10\]](#10){reference-type="ref" reference="10"}) and ([\[11\]](#11){reference-type="ref" reference="11"}) together yields the desired ([\[NZ estimate2\]](#NZ estimate2){reference-type="ref" reference="NZ estimate2"}). # Further questions and remarks {#further remarks} In the process of proofs we have seen that the *strict* positivity or negativity in Theorems [\[RC vanishing theorem\]](#RC vanishing theorem){reference-type="ref" reference="RC vanishing theorem"} and [\[rick lead to uniform\]](#rick lead to uniform){reference-type="ref" reference="rick lead to uniform"} is needed. In view of Theorem [\[Bochner\]](#Bochner){reference-type="ref" reference="Bochner"}, it is natural to wonder whether the conclusions remain true if only assuming quasi-positivity or quasi-negativity of various curvature conditions. Therefore the following question can be proposed (see ). Among various geometric positivity concepts for Hermitian holomorphic vector bundles, the *Griffiths positivity* () may be the best-known. In view of the results proved in this article, it may be interesting to propose the following notion. 2. Griffiths \((1,1)\)-positivity is the original Griffiths positivity, in which case the metric \(\omega\) is irrelevant. By definition Griffiths \((k,l)\)-positivity (resp. negativity) implies Griffiths \((k+1,l)\)-positivity and \((k,l+1)\)-positivity (resp. negativity). Thus the condition Grffiths \((k,l)\)-positivity becomes weaker as \(k\) or \(l\) increases (compare to the \(k\)-scalar curvatures in Remark [\[remark2\]](#remark2){reference-type="ref" reference="remark2"}). 3. The subject of cohomology vanishing theorems for Griffiths positive holomorphic vector bundles occupies a central role in several complex variables and algebraic geometry (, ). It seems to be possible to generalize these to Griffiths \((k,l)\)-positive vector bundles. The author hopes to discuss it in a separate article in the near future.
{'timestamp': '2022-09-30T02:07:40', 'yymm': '2209', 'arxiv_id': '2209.14554', 'language': 'en', 'url': 'https://arxiv.org/abs/2209.14554'}
# Introduction Let \(X\) be an integral algebraic variety over a field \(F\), i.e. a separated scheme and of finite type over \(F\). The \(i\)-th unramified cohomology group of \(X\) denoted by \(H_{nr}^{i}(F(X)/F,\mathbb{Q/Z}(j))\) (see section §[2](#sec:pre){reference-type="ref" reference="sec:pre"} ) is defined by a subgroup of \(H^{i}(F(X),\mathbb{Q/Z}(j))\), which were first introduced by Colliot-Thélène and Ojanguren. We will write \(\bar{H}_{nr}^{i}(F(X)/F,\mathbb{Q/Z}(j))\) as \(H_{nr}^{i}(F(X)/F,\mathbb{Q/Z}(j))/H^{i}(F,\mathbb{Q/Z}(j))\). The unramified cohomology groups are homotopy invariants and can be used as an invariant to disprove the rationality of an algebraic variety. The non-triviality of the group \(\bar{H}_{nr}^{i}(F(X)/F,\mathbb{Q/Z}(j))\) implies the stably irrational property of \(X\). Peyre, Colliot-Thélène and Pirutka, Schreieder have given many examples of varieties which are not stably rational but unirational. The unramified cohomology groups also play a role on rational points. In, a certain subgroup of the third unramified cohomology group can control the defect of weak approximation for tori over \(p\)-adic function fields. There are no general methods to estimate the unramified cohomology groups for general variety \(X\). Let \(W\) be a torus over \(F\). In 1995, Colliot-Thélène raised the problem: for \(n\) prime to \(\mathrm{char}(F)\) and \(i>0\), determine the group \(\bar{H}_{nr}^{i}(F(W)/F,\mu_n^{\otimes(i-1)})\). The first unramified cohomology group \(\bar{H}_{nr}^{1}(F(W)/F,\Z/n\Z)\) is trivial. The second unramified cohomology group \(\bar{H}_{nr}^{2}(F(W)/F,\mathbb{Q/Z}(1))\) coincides with the unramified Brauer group \(\mathrm{Br}_{nr}(W)/\mathrm{Br}(F)\) which is isomorphic to the group \(\Sha_\omega^2(\hat{W})\) and has been extensively studied (see and ). In 2013, Blinstein and Merkurjev investigated Colliot-Thélène's problem when \(i=3\) and obtained an exact sequence for the group \(\bar{H}_{nr}^{3}(F(W)/F,\mathbb{Q/Z}(2))\), see. Let \(K/F\) be a finite abelian extension and \(W\) the norm one torus \(R_{K/F}^{(1)}\mathbb{G}_{m,K}\). Based on Blinstein and Merkurjev's work, we explicitly determine the \(p\)-primary component of \(\bar{H}_{nr}^{3}(F(W)/F,\mathbb Q/\mathbb Z(2))\) which we denote by \(\bar{H}_{nr}^{3}(F(W)/F,\mathbb Q/\mathbb Z(2))\{p\}\) for any odd prime \(p\); furthermore, if \(K/F\) has odd degree, we explicitly determine \(\bar{H}_{nr}^{3}(F(W)/F,\mathbb Q/\mathbb Z(2))\). If \(G=\Z/n\oplus \Z/n\) and \(n\) is odd, then \(\bar{H}^3_{nr}(F(W),\mathbb Q/\mathbb Z(2)) \simeq H^3(G,K^*)\). In particular, if \(F\) is a local field or some special number field (see Examples [\[exa:un\]](#exa:un){reference-type="ref" reference="exa:un"}), then \(\bar{H}^3_{nr}(F(W),\mathbb Q/\mathbb Z(2))=0\). However, \(\bar{H}^2_{nr}(F(W),\mathbb Q/\mathbb Z(1))=\Z/n\) is always nontrivial. The second author is supported by National Key R\(\&\)D Program of China. # Preliminaries {#sec:pre} In this section, we will introduce the unramified cohomology groups. The notation and definition coincide with. Let \(F\) be the base field (of arbitrary characteristic) and \(\Gamma=\Gal(F^{sep}/F)\) the absolute Galois group of \(F\). Given an integer \(j>0\), we denote \(\Q/\Z(j)\) as the direct sum of \[\Q_p/\Z_p(j)= \begin{cases} \underset{n}{\mathrm{colim}}\ \mu_{p^n}^{\otimes j}, \quad p\neq \mathrm{char}(F)\\ \underset{n}{\mathrm{colim}}\ W_n\Omega_{\log}^j[-j], \quad p= \mathrm{char}(F) \end{cases}\] in the derived category of sheaves of abelian groups on the big étale site of \(\mathrm{Spec}\ F\) over all primes \(p\), where \(W_n\Omega_{\log}^j[-j]\) is the sheaf of logarithmic de Rham--Witt differentials (see and ). Given a field extension \(L/F\), let \(A\) be a rank one discrete valuation ring with fraction field \(L\) which contains \(F\). The \(i\)-th unramified cohomology group of \(L/F\) is defined by the group \[H_{nr}^i(L/F,\Q/\Z(j))):=\bigcap_{A\in P(L)}\mathrm{im}\ (H^i(A,\Q/\Z(j))\longrightarrow H^{i}(L,\Q/\Z(j)))\] where \(P(L)\) is the set of all rank one discrete valuation rings which contains \(F\) and has quotient field \(L\). They can also be defined by the intersection of the kernel of residue map \(\partial_A\) for \(A\in P(L)\) when \(\mathrm{char}(F)=0\). If \(X\) is a smooth integral variety over \(F\), the \(i\)-th unramifiel cohomology group of \(X\) is defined by \(H_{nr}^i(F(X)/F,\Q/\Z(j))\). These groups are only dependent on the function field of \(X\), and when \(X\) is proper, we can replace \(P(L)\) by the set of local rings of codimension one points in \(X\). If \(i=2\), the unramified chomology group coincides with the unramified Brauer group of \(X\). We will denote \(\bar{H}_{nr}^{i}(F(X)/F,\mathbb{Q/Z}(j))\) by \(H_{nr}^{i}(F(X)/F,\mathbb{Q/Z}(j))/H^{i}(F,\mathbb{Q/Z}(j))\). Recall that an algebraic torus of dimension \(n\) over \(F\) is an algebraic group \(T\) such that \(T_{sep}\) is isomorphic to \(\mathbb{G}_m^{n}\). For an algebraic torus \(T\), we write \(\hat{T}_{sep}\) as the \(\Gamma\)-module \(\mathrm{Hom}(T_{sep},\mathbb{G}_m)\) and call it character lattice of \(T\). The contravariant functor \(T \mapsto \hat{T}_{sep}\) is an anti-equivalence between the category of algebraic torus over \(F\) and the category of \(\Gamma\)-lattices. We write \(\hat{T}\) as the character group \(\mathrm{Hom}_F(T,\mathbb G_m)\) and \(T^\circ\) as the dual torus of \(T\) such that \((\hat{T}^\circ)_{sep}=(\hat{T}_{sep})^\circ\). Let \(K/F\) be a finite Galois extension with \(G=\mathrm{Gal}(K/F)\). We embed \(K\) to \(F_{sep}\), the separable closure of \(F\), such that the absolute Galois group \(\Gamma_K\) is a subgroup of \(\Gamma\). We mainly consider the unramified cohomology of the norm one torus \(W=R_{K/F}^{(1)}(\mathbb G_{m,K})\). It is defined by the equation \(N_{K/F}(\Xi)=1\) and can be constructed by the exact sequence \[1\longrightarrow W\longrightarrow R_{K/F}(\mathbb G_{m,K})\longrightarrow\mathbb G_{m}\longrightarrow 1\] and for its character lattice, we have \[0\longrightarrow\mathbb Z\stackrel{N_G}{\longrightarrow} \mathbb Z[G]\longrightarrow\hat{W}_{sep}\longrightarrow 0\] where \(N_G\) maps \(1\) to \(\sum_{g\in G}g\). A torus \(T\) is called quasisplit if its character lattice \(\hat{T}_{sep}\) is a permutation \(\Gamma\)-module, i.e. isomorphic to the finite direct-sum of \(\mathbb Z[\Gamma/\Gamma_i]\) for open subgroups \(\Gamma_i\leq \Gamma\). And \(T\) is called flasque (resp. coflasque) if \(H^1(L,\hat{T}_{sep}^\circ)=0\) (resp. \(H^1(L,\hat{T}_{sep})=0\)) for all finite field extension \(L/F\). A flasque resolution (resp. coflasque resolution) of a torus \(T\) is an exact sequence of torus \[1\longrightarrow S\longrightarrow P\longrightarrow T\longrightarrow 1\] (resp. \(1\longrightarrow T\longrightarrow P\longrightarrow M\longrightarrow 1\) ) where \(P\) is quasisplit and \(S\) is flasque (resp. \(M\) is coflasque). If \(T\) is the norm one torus of a finite Galois extension, then the flasque resolution (resp. coflasque resolution) of \(T\) can be constructed as follows. For a torus \(S\) over \(F\), Blinstein and Merkurjev give an estimate of \(\bar{H}^3_{nr}(F(S),\mathbb Q/\mathbb Z(2))\): The first term is the torsion subgroup of the second Chow group of the classify variety of \(T\). The symbol \(\Dec\) in the fourth term is the subgroup \(\Dec(H^0(F,S^2(\hat{T}_{sep})))\) of \(H^0(F,S^2(\hat{T}_{sep}))\), defined as follows. Given a \(\Gamma\)-module \(A\), \(\Dec(A)\subset S^2(A)\) is generated by \((A^{\Gamma})^2\) and \(\Qtr_{\Gamma'}(A^{\Gamma'})\) for all open subgroups \(\Gamma'\subset\Gamma\), with the following definition \[\begin{aligned} \Qtr_{\Gamma'}:\ A^{\Gamma'}\to&\ S^2(A)^{\Gamma}\\ a\mapsto&\ \sum_{i<j}\gamma_i(a)\cdot \gamma_j(a) \end{aligned}\] where \(\{\gamma_i\}\) is a representative for the left cosets of \(\Gamma'\) in \(\Gamma\). # Main results We continue to use the notations in §[2](#sec:pre){reference-type="ref" reference="sec:pre"}. For the norm one torus \(W=R^{(1)}_{K/F}(\mathbb{G}_{m,K})\) of Galois extension \(K/F\), we fix a flasque resolution of \(W\) constructed from Lemma [\[flasqueresolution\]](#flasqueresolution){reference-type="ref" reference="flasqueresolution"}: \[\label{seq:flasque} 1\longrightarrow T\longrightarrow P\longrightarrow W\longrightarrow 1\] where \(P=R_{K/k}(\mathbb{G}_{m,K})^r\) and \(r\) is the number of generators of \(G=\Gal(K/F)\). We mainly consider the \(3\)-th unramified cohomology group \(\bar{H}^3_{nr}(F(W),\mathbb Q/\mathbb Z(2))\) and it can be expressed by \(T\) from Theorem [\[mainlem\]](#mainlem){reference-type="ref" reference="mainlem"}. Building on this work, we will reduce \(\bar{H}^3_{nr}(F(W),\mathbb Q/\mathbb Z(2))\) to a form determined only by the field extension \(K/F\) and the Galois group \(\mathrm{Gal}(K/F)\). The flasque resolution ([\[seq:flasque\]](#seq:flasque){reference-type="ref" reference="seq:flasque"}) of \(W=R^{(1)}_{K/F}(\mathbb G_{m,K})\) can derive the following exact sequence of dual \(\Gamma\)-modules \[1\longrightarrow \hat{W}_{sep}\longrightarrow \hat{P}_{sep}\longrightarrow \hat{T}_{sep}\longrightarrow 1.\label{exactseq}\] The part \(H^0(F,S^2(\hat{T}_{sep}))/\Dec\) in Theorem [\[mainlem\]](#mainlem){reference-type="ref" reference="mainlem"} is actually only dependent on the group \(\mathrm{Gal}(K/F)\). To prove this, we need several lemmas. Because \(\Gamma_K\) acts trivially on \(S^2(\hat{P}_{sep})\), we can only consider the \(G\)-action: \(S^2(\hat{T}_{sep})^{\Gamma} = S^2(\hat{T}_{sep})^G\). The short exact sequence \(0\longrightarrow N\longrightarrow S^2(\hat{P}_{sep}) \stackrel{g'}{\longrightarrow} S^2(\hat{T}_{sep})\longrightarrow 0\) induce an exact sequence: \[S^2(\hat{P}_{sep})^G \stackrel{g'}{\longrightarrow} S^2(\hat{T}_{sep})^G\stackrel{\delta}{\longrightarrow} H^1(G,N)\longrightarrow H^1(G,S^2(\hat{P}_{sep})).\label{dec}\] Let \(\bar \sigma\in \Gamma/ \Gamma_L\) and \(\sigma_1,\cdots,\sigma_m\) representatives of \(\Gamma/\Gamma'\). We have \[\begin{aligned} \Qtr_{\Gamma'}(\bar e+\bar \sigma)&=\sum_{i<j}\sigma_i(\bar e+\bar \sigma)\cdot\sigma_i(\bar e+\bar \sigma)\\ &=\sum_{i<j}\bar \sigma_i\cdot \bar \sigma_j+\sum_{i<j}{\sigma_i\bar \sigma}\cdot {\sigma_j\bar \sigma}+\sum_{i<j}\bar \sigma_i\cdot {\sigma_j\bar\sigma}+\sum_{i>j}\bar \sigma_i\cdot {\sigma_j\bar\sigma}\\ &=\Qtr_{\Gamma'}(\bar e)+\Qtr_{\Gamma'}(\bar \sigma)+\mathrm {Tr}(\bar e)\cdot \mathrm {Tr}(\bar e)-\sum_{i}\bar\sigma_i\cdot\sigma_i\bar\sigma. \end{aligned}\] Therefore, \(\sum_{i}\bar\sigma_i\cdot\sigma_i\bar\sigma\in \Dec(\Bbb Z[\Gamma/\Gamma_L])\). If \(\Gamma_{\bar \sigma}=\Gamma'\), then \(N_{\bar \sigma}=\sum_{i}\bar\sigma_i\cdot\sigma_i\bar\sigma\in \Dec(\mathbb Z[\Gamma/\Gamma_L])\). Suppose \([\Gamma_{\bar \sigma}:\Gamma']=2\). Let \(\sigma'\in \Gamma_{\bar \sigma}\setminus \Gamma'\) and \(\sigma_1,\cdots,\sigma_m\) representatives of \(\Gamma/\Gamma_{\bar \sigma}\), hence \(\sigma_1,\cdots,\sigma_m,\sigma_1\sigma',\cdots,\sigma_m\sigma'\) are representatives of \(\Gamma/\Gamma_{\bar \sigma}\). Since \(\bar \sigma'=\bar\sigma\in \Gamma/\Gamma_L\) by Lemma [\[lem:stabilizer\]](#lem:stabilizer){reference-type="ref" reference="lem:stabilizer"}, one has \(\bar e+\bar \sigma'=\bar e+\bar \sigma\in \mathbb Z[\Gamma/\Gamma_L]^{\Gamma_{\bar\sigma}}\), hence \[\begin{aligned} \Qtr_{\Gamma_{\bar \sigma}}(\bar e+\bar \sigma')&=\sum_{i<j}\sigma_i(\bar e+\bar \sigma')\cdot \sigma_j(\bar e+\bar \sigma')\\ &=\sum_{i<j}\bar \sigma_i\cdot \bar \sigma_j+\sum_{i<j}{\sigma_i\bar \sigma'}\cdot {\sigma_j\bar \sigma'}+\sum_{i<j}\bar \sigma_i\cdot {\sigma_j\bar\sigma'}+\sum_{i>j}\bar \sigma_i\cdot {\sigma_j\bar\sigma'}\\ &=\Qtr_{\Gamma'}(\bar e)-\sum_{i}\bar\sigma_i\cdot{\sigma_i\bar \sigma}, \end{aligned}\] which implies \(N_{\bar \sigma}=\sum_{i}\bar\sigma_i\cdot{\sigma_i\bar \sigma}\in \Dec(\mathbb Z[\Gamma/\Gamma_L])\), the proof of Lemma [\[lem:stabilizer\]](#lem:stabilizer){reference-type="ref" reference="lem:stabilizer"} then follows. ◻ Let \(N'\) be the kernel of \(\hat{P}_{sep}\otimes\hat{T}_{sep}\to S^2(\hat{T}_{sep})\) and \(N''\) the kernel of \(\hat{P}_{sep}\otimes\hat{P}_{sep}\to S^2(\hat{T}_{sep})\). Then we have the following commutative diagram with the exact rows: \[\begin{tikzcd} 0\arrow[r]&N\arrow[r]& S^2(\hat{P}_{sep})\arrow[r]& S^2(\hat{T}_{sep})\arrow[r]&0\\ 0\arrow[r]&N''\arrow[r]\arrow[u]\arrow[d]& \hat{P}_{sep}\otimes\hat{P}_{sep}\arrow[r]\arrow[u]\arrow[d]& S^2(\hat{T}_{sep})\arrow[r]\arrow[u,equal]\arrow[d,equal]&0\\ 0\arrow[r]&N'\arrow[r]& \hat{P}_{sep}\otimes\hat{T}_{sep}\arrow[r]& S^2(\hat{T}_{sep})\arrow[r]&0 \end{tikzcd}\] By construction \(\hat{P}_{sep}\simeq \mathbb{Z}[G]^{\oplus r}\), for \(i\ge 1\) and an odd prime \(p\), \(\hat{H}^i(G,\hat{P}_{sep}\otimes\hat{P}_{sep})=\hat{H}^i(G, \hat{P}_{sep}\otimes\hat{T}_{sep})=0\) by Shapiro's Lemma, \(\hat{H}^i(G,S^2(\hat{P}_{sep}))\{p\}=0\) by Lemma [\[duichen\]](#duichen){reference-type="ref" reference="duichen"}. Therefore the following diagram is commutative \[\begin{tikzcd} &\hat{H}^1(G,N)\{p\}\\ \hat{H}^0(G,S^2(\hat{T}_{sep}))\{p\}\arrow[dr, "\delta'", "\simeq"']\arrow[r, "\delta''", "\simeq"']\arrow[ur,"\delta", "\simeq"']&\hat{H}^1(G,N'')\{p\}\arrow[u, "\simeq"]\arrow[d, "\simeq"]\\ &\hat{H}^1(G,N')\{p\} \end{tikzcd}\] and we deduce \[\begin{aligned} (H^1(G,N)/\delta((\hat{T}_{sep}^G)^{\otimes2}))\{p\}&\simeq(H^1(G,N')/\delta'((\hat{T}_{sep}^G)^{\otimes2}))\{p\}\\ &\simeq(H^1(G,N'')/\delta''((\hat{T}_{sep}^G)^{\otimes2}))\{p\}. \end{aligned}\] Combining Theorem [\[mainlem\]](#mainlem){reference-type="ref" reference="mainlem"} with Proposition [\[prop:cup\]](#prop:cup){reference-type="ref" reference="prop:cup"}, we immediately have the following result. If \(G\) is abelian, then \(\#[G,G]=1\), this satisfies the condition of the above Corollary, and we can give a more precise expression for this cokernel by induction and Hochschild-Serre spectral sequence. If \(G=G'\times G''\) and acts trivially on \(\mathbb Z\), then the Hochschild-Serre spectral sequence \[E_2^{p,q} = H^p(G',H^q(G'',\mathbb Z))\implies H^{p+q}(G,\mathbb Z)\] degenerates, and there is the decomposition by the main theorem of \[H^{n}(G,\mathbb Z)\simeq \oplus_{p+q=n}H^p(G',H^q(G'',\mathbb Z)).\] Moreover, the following diagram is commutative: \[\begin{tikzcd} H^p(G',\mathbb Z)\arrow[d,"\simeq"]\arrow[phantom, r, description, "\times"]&H^q(G'',\mathbb Z)\arrow[d,"\simeq"]\arrow[r,"\cup"]&H^{p+ q}(G,\mathbb Z)\arrow[d,"projection"]\\ E_2^{p,0}\arrow[phantom, r, description, "\times"]&E_2^{0,q}\arrow[r,"\cup"]&E_2^{p,q} \end{tikzcd}\label{cup}\] Since \(G\) is finite and abelian, we can represent \(G\) as the direct sum of cyclic groups: \(G=\oplus_{i=1}^mC_i\) such that \(\#C_{i-1}|\#C_i\) (\(1<i\leq m\)). We set \(G_i=\oplus_{j=1}^{i}C_j\), \(G=G_m\), \(G_{i+1}=G_i\oplus C_{i+1}\). We immediately obtain the following theorem by the previous lemmas. In particular, if \(m=2\), we deduce:
{'timestamp': '2022-09-30T02:08:41', 'yymm': '2209', 'arxiv_id': '2209.14590', 'language': 'en', 'url': 'https://arxiv.org/abs/2209.14590'}
null
null
# Literature we should mention/cite Quantum computation is a disruptive technology that has irrevocably changed the way that computation is envisioned. It holds the potential for addressing a wide range of computational challenges  from factoring  and database search  to finance  and machine learning  problems much more efficiently than what can be achieved by classical machines. Yet, current noisy intermediate-scale quantum (NISQ) devices  are still far from addressing these applications at a practically relevant scale and early demonstrations of quantum advantages remain confined to algorithms that do not yet have clearly identifiable broad applications . The primary obstacle for today's quantum computers, which now feature 10s to 100s of qubits remains noise and decoherence, which limits the number of entangling operations and therefore the achievable circuit depth. Quantum error correction (QEC) promises to overcome these obstacles and enable fault-tolerant quantum information processing, yet only at the cost of significant overheads in experimental complexity. Despite impressive progress , QEC proves to be an extremely challenging goal to realise and its cost is highly dependent on the performance of the underlying hardware and implementation. Hence, it is imperative, not just for near-term, but also for future large-scale quantum devices, to maximise the efficiency of quantum information processing and use available resources to their full extent. Fortunately, there is a lot of unused potential in current quantum devices, which tend to use only a small fraction of the available Hilbert space. Indeed, control over the inherently high-dimensional Hilbert space has been demonstrated in all major quantum technology platforms , motivating the exploitation of a new paradigm of quantum computing based on \(d\)-dimensional *qudits*, rather than qubits. Compared to their two-level counterpart, qudit architectures offer much richer coherence  and entanglement structures , which can be exploited for efficient quantum information processing  and improved QEC . Since entangling operations tend to be the bottleneck in current quantum devices, the efficiency of a quantum computation, or the complexity of a quantum circuit, is traditionally measured by counting the number of entangling operations. While this is clearly an incomplete picture, it serves as a good hardware-agnostic approximation, because the optimal circuit for a given quantum operation is elusive and highly dependent on the available gate set. Here, we investigate *qudit circuit compression*, as a way to simplify a given qubit circuit by rephrasing it as a qudit circuit. We achieve this in two steps: First, the qubits are partitioned into groups of equal size such that the number of gates within the groups is maximized. Each group is then interpreted as a qudit, turning entangling gates into local gates and thus reducing the overall entangling gate count by a combinatorial factor for which we find lower and upper bounds using a graph-based approach. Second, by considering an extended gate set including not only qubit-entangling gates, but also genuine qudit-entangling gates, the number of entangling gates in the resulting qudit circuit can be further reduced, even saturating the combinatorial lower bound. To showcase these two effects, we study the compression of exemplary qubit circuits under different gate sets. We illustrate this gate compression with experimental details for two contemporary quantum technologies using qudits: photonic qudits encoded in orbital angular momentum and trapped ions with multiple addressable levels, showing that, already today, qubit circuits can be more efficiently compiled on qudit architectures. Aside from algorithmic improvements, reducing the number of quantum information carriers tends to make the system experimentally easier to control, leading to improved performance. Furthermore, any reduction in entangling-gate count for a given application directly lowers the resource requirements for quantum error correction, thus greatly benefiting future large-scale quantum devices. We provide general design principles, as well as upper and lower bounds for the possible reduction in the number of gates, exemplified with explicit constructions for photonic systems and trapped ions. *Circuit compression.--* Quantum circuits are built from a sequence of gate operations. At the lowest level of abstraction, circuit compression is hence concerned with compiling an \(N\)-qubit unitary to an \(M\)-qudit architecture (\(M<N\)), which we call *gate compression*, see Fig. [\[fig1:combinedfigure\]](#fig1:combinedfigure){reference-type="ref" reference="fig1:combinedfigure"}. The task is to encode the qubit circuit into the qudit architecture in such a way that the maximal number of entangling gates in the qubit circuit manifests as local gates in the resulting qudit circuit. Importantly, the remaining entangling gates retain their qubit-entangling structure, in terms of maximally generated entanglement entropy, when embedded in the qudit Hilbert space. Consequently, this procedure always reduces the amount of entanglement needed (irrespective of the available gate set for qudits), by compressing non-local gates into local ones. Curiously, however, while embedded qubit gates still create two-level entanglement (i.e., equivalent to a two-qubit gate in terms of entanglement entropy), they are not necessarily easily implementable in a qudit architecture. This is easy to see for the example of a CNOT gate \(U\subtiny{0}{0}{\mathrm{CNOT}}\suptiny{1}{0}{(c,t)}\) applied to qubits 2 (control) and 3 (target) in a four-qubit register, taking the form \(\mathds{1}_1 \otimes\, U\subtiny{0}{0}{\mathrm{CNOT}}\suptiny{1}{0}{(2,3)} \otimes \mathds{1}_4\). When qubits 1 and 2 are encoded in the first qudit, and 3 and 4 in the second, the resulting embedded version of the original gate would have to be a subspace-agnostic operation (i.e., applying the same operation on both subspaces pertaining to the encoded qubits 1 and 4). While such operations still only create two-level entanglement, they are often not available natively. On the other hand, the qudit encoding enables new kinds of two-level entangling operations, which do not admit a tensor-product structure in the corresponding qubit circuit. Such gates provide new powerful tools for circuit compression, as discussed below, while also emphasising the importance of the available gate set for qudit architectures. While finding the ideal embedding is hard in general, it is easy to visualise using graphs: Given a qubit circuit, we want to find the optimal partition into qudits by encoding the non-local gates of the circuit into a weighted graph and applying graph partitioning. A weighted graph \(G=(V,E)\) is a pair of a set of vertices \(V=\{v_1,\dots,v_n\}\) and a set of edges \(E=\{e_1,\dots,e_k\}\), where each edge \(e_i= ((v_l,v_m),w_i)\) is a pair of vertices together with a weight \(w_i\). We can encode the non-local properties by identifying each vertex with a qubit and drawing an edge whenever a non-local gate is present. The weight is given by the number of non-local gates between each pair of qubits. *Graph partitioning* describes a family of several different partitioning problems. However, we are interested in the following variation of the problem: Given a weighted graph \(G\), find a partition of \(V=\bigcup_i V_i\), under the condition that each subset \(V_i\) has the same cardinality such that the sum of weights of the edges connecting these subsets is minimal. Graph partitioning is also a hard problem, however, there exist several heuristic algorithms which find solutions at least for a small number of vertices. *Gate set optimisation.--* After we have reduced the width of the circuit we can further improve upon the circuit by considering the extended gate set we can access for qudits. After the partitioning, previously non-local gates within a partition now act as local gates for individual qudits, while non-local gates between partitions still generate two-level entanglement between different qudits. Depending on the resulting entanglement structure, the experimental complexity can be further reduced by considering more powerful entangling gates than just embedded qubit gates. *Upper and lower bounds.--* Using the above principles, we can derive upper and lower bounds on the *compression ratio* \(C_d\) as the ratio of the number of entangling gates in the compressed circuit to the number of gates in the original circuit. Consider the vector \(\vec{\tilde w} \in \mathds{Z}^{M\choose 2}\) of weights \(\vec{\tilde w}=(\tilde w_1,\dots, \tilde w_{M\choose 2})^T\) corresponding to the qudit graph for the compressed circuit. This vector is obtained from the weights \(w_i\) of the qubit circuit by summing those that correspond to qubits encoded in the same qudit. The upper bound is then given by the sum of compressed weights, representing the total number of entangling gates remaining after compression. The lower bound, on the other hand, is given by the number of non-zero weights, representing the number of entangling links between the qudits. \[\frac{\norm{\vec{\tilde w}}_0}{\norm{\vec{w}}_1} \leq C_d \leq \frac{\norm{\vec{\tilde w}}_1}{\norm{\vec{w}}_1}\] The span between the lower and upper bounds indicates potential improvements based on an appropriate gate set. In the following, we will provide examples saturating both the lower and the upper bound. *Controlled phase gates.--* As a key example, we will now study \(N\)-qubit controlled phase-flip gates \(C\subtiny{0}{0}{\mathrm{PF}}\suptiny{1}{-1}{(N)}\) (i.e., phase gates with a \(\pi\) phase shift). These gates are central elements in quantum computing, for example, as a key part of Grover's search algorithm. It can be written as follows, \[\begin{aligned} C\subtiny{0}{0}{\mathrm{PF}}\suptiny{1}{-1}{(N)} = \mathds{1}^{\otimes N}+\ket{1}\!\bra{1}^{\otimes (N-1)}\otimes(Z-\mathds{1}), \label{eq:equation} \end{aligned}\] where \(\mathds{1}\) is the identity operator and \(Z\) denotes the single-qubit Pauli-\(z\) gate. Due to its central role, the decomposition of \(C\subtiny{0}{0}{\mathrm{PF}}\suptiny{1}{-2}{(N)}\) is often used as a benchmark for comparing circuit decompositions and gate sets. Importantly, provably optimal decompositions into two-qubit gates and local operations are known for 3 to 8 qubits . As we noted above, the optimality of a quantum circuit depends on the metric used. However, even when the metric is fixed, finding an efficient way to realize the circuit is highly non-trivial. For example, for a four-qubit controlled phase flip \(C\subtiny{0}{0}{\mathrm{PF}}\suptiny{1}{-1}{(4)}\), the most efficient decomposition known, believed to be optimal, requires 13 two-qubit gates , as shown in Fig. [\[fig1:combinedfigure\]](#fig1:combinedfigure){reference-type="ref" reference="fig1:combinedfigure"} (a). The same circuit can be realized in a qudit system by embedding two qubits each into two ququarts. There are 3 ways to achieve such a partition, and the best choice turns 6 entangling gates into local gates, leaving 7 embedded two-qubit gates between the two ququarts. If we consider also ququart gates in our gate set, this can further reduce the nonlocal-gate count to just a single gate between the two ququarts, which turn out to generate only two-level entanglement, as shown in Fig. [\[fig1:combinedfigure\]](#fig1:combinedfigure){reference-type="ref" reference="fig1:combinedfigure"} (a). In case \(N>4\), we can cut \(N\) qubits into \(k\) equal parts by using a \(2^{N/k}\)-dimensional qudit in each part and achieve similar improvements. For the six-qubit controlled phase-flip gate (\(C\subtiny{0}{0}{\mathrm{PF}}\suptiny{1}{-1}{(6)}\)), for example, 61 two-qubit gates are needed in the best known (again, believed to be optimal) decomposition . Encoding the same circuit into 3 ququarts reduces the requirement to 9 two-ququart gates, including four two-ququart controlled-shift gates and five two-ququart controlled phase gates, see Fig. [\[fig1:combinedfigure\]](#fig1:combinedfigure){reference-type="ref" reference="fig1:combinedfigure"} (b). Going further by encoding the gate into two qudits of dimension \(d=8\) (quocts), the gate can again be realized with a single two-level entangling qudit gate.\ *Graph states and the saturation of graph partitioning bounds.--* Graph states are another highly relevant example. For a set of edges \(E=\{e\}\), they can always be created by applying controlled-\(Z\) gates across all edges on computational-superposition product states, i.e., \(|G\rangle:=\prod_{e\in E} CZ_e|+\rangle^{\otimes n}\) with \(|+\rangle=\bigl(|0\rangle+|1\rangle\bigr)/\sqrt{2}\). As all \(CZ_e\) commute, it directly follows that, with an unrestricted entangling power of the gate set, the lower bound \(\norm{\vec{\tilde w}}_0\) can be saturated. If the gate set is restricted to two-level entangling gates, however, the fact that a high amount of entanglement may be generated if multiple edges cut across a bipartition directly implies that the upper bound needs to be observed with \(\norm{\vec{\tilde w}}_1\) embedded qubit gates. Consider, for example, a 4-qubit quadratic 2D cluster state as illustrated in Fig. [\[fig1:combinedfigure\]](#fig1:combinedfigure){reference-type="ref" reference="fig1:combinedfigure"} (c). Due to the symmetry of the state the partition is irrelevant and we can thus combine the first and second qubit as well as the third and fourth qubit to a qudit each without loss of generality. This reduces the number of non-local gates from \(4\) to \(2\), which saturates the upper bound \(\norm{\vec{\tilde w}}_1\). Now, we can use gate optimization to reduce the number to \(1\) by combining the two non-local gates between the qudits to a single genuine qudit gate, saturating the lower bound \(\norm{\vec{\tilde w}}_0\). This example demonstrates that the commutativity of the entangling gates across compressed partitions as well as the maximum amount of entanglement generated across these partitions are crucial parameters that determine how well a qubit circuit can be compressed when compiled on a qudit architecture and which gate set would be required for the qudits. *Photonic implementation.--* Photonic systems are excellent candidates for gate compression. Current developments enable increased control over higher-dimensional degrees of freedom by manipulating a photon's polarisation, spatial profile, temporal profile, or frequency, either separately or simultaneously. This enables the encoding of multiple bits into a single photon, as is routinely done in entanglement-based quantum communication. Local unitary operations are easily done within a certain degree of freedom, such as spatial manipulation through multi-plane light conversion, frequency manipulation, or between different degrees of freedom, for example, using polarizing beam splitters to couple path and polarization. For instance, high-dimensional Pauli \(X\)-and \(Z\)-gates, which are parts of higher-dimensional universal gate sets, have recently been implemented in a number of ways. While local gates can often be performed with near unit efficiency and fidelity, entangling gates remain the Achilles heel of photonic information processing, as entangling two photons can be achieved probabilistically at best, leading to an exponential decrease in success probability with the number of entangling gates. However, recent developments show promising results, including the implementation of high-dimensional multi-partite quantum gates and an implementation of the SUM gate (a high-dimensional controlled-\(X\) gate) in the time and frequency degrees of freedom of photons. *Trapped-ion implementation.--* Trapped ions are among the leading platforms for quantum information processing , where the electronic energy levels of each ion naturally provide a high-dimensional Hilbert space. Recently it was shown that such a system can be operated as a universal qudit quantum processor up to dimension 7 . The qudit-gate set used in this demonstrations consisted of arbitrary local gates and two-qubit CNOT gates embedded in a qudit Hilbert space. Compared to a standard qubit CNOT, the embedded version exhibits error rates larger by roughly a factor of 2, independent of the Hilbert-space dimension. Beyond this basic gate set, it has been shown that both dominant gate mechanisms in this platform, the Mølmer-Sørensen gates  and light-shift gates , can be generalized to achieve genuine qudit entanglement. A first experimental realization of the latter demonstrated the generation of genuine qudit entanglement in a scalable fashion and with highly competitive error rates . Compiling the example of Fig. [\[fig1:combinedfigure\]](#fig1:combinedfigure){reference-type="ref" reference="fig1:combinedfigure"} (a) and using state-of-the-art error rates for trapped-ion quantum processors of about 0.01 per qubit CNOT gate , a rough estimate suggests that the implementation of the four-qubit \(C\subtiny{0}{0}{\mathrm{PF}}\suptiny{1}{-1}{(4)}\) gate could achieve an error rate on the order of 0.12 with the standard two-level decomposition using 13 two-qubit entangling gates. Curiously, while it is known on the one hand that enlarging the Hilbert space locally (i.e., encoding 4 qubits into 4 qudits) can reduce the required number of gates quadratically , this gain is offset almost exactly in the 4-qubit case by the factor of 2 increased error rates incurred in the experimental implementation . On the other hand, when two qubits each are encoded in a qudit of dimension 5 (4 computational levels and 1 auxiliary level), the required number of two-level entangling gates drops to 1 (albeit with a rotation angle equivalent to 4 qubit gates), achieving an estimated error rate of 0.04, see Appendix [\[sec:appendix B\]](#sec:appendix B){reference-type="ref" reference="sec:appendix B"} for the circuit. Curiously, this is an example where it is optimal to use a two-level entangling gate in the qudit circuit, which is not an embedded qubit gate. *Conclusion.--* We have explored two ways in which higher-dimensional architectures are universally beneficial to quantum computing. First, using gate compression, we can cut down on the amount of entanglement needed for a specific \(N\)-qubit circuit, and second, by exploiting the added capabilities of qudit systems in the form of richer gate sets, we can further reduce the number of non-local gates required to generate that entanglement. This highlights the key role played by entanglement and the available gate set in efficient qudit QIP. As every higher-dimensional gate can be achieved by any universal gate set applied a number of times, the advantage from larger gate sets is constant in the number of qubits. Similarly, even the most efficient partitioning of the qubit circuit leads to only a constant advantage. Such constant improvements, however, can make the difference between feasibility and failure. Another important aspect is the potential breakdown of conventional wisdom regarding easily implementable local gates versus hard non-local gates. Once qudit dimensions get sufficiently large, the performance gap between local and non-local gates might change. Moreover, gate performance typically degrades somewhat with system size, providing another motivation for reducing the number of quantum-information carriers and making more efficient use of available resources. Finally, we emphasize that a case-by-case evaluation of the actual trade-offs is critical to finding the optimal dimensionality for a given problem and hardware platform. Our examples provide a promising first step, showing that qudit encodings can lead to a significant reduction in gate count. Hence, this approach can greatly increase the utility of current and future quantum hardware, using only degrees of freedom that are already present in today's quantum technology. Indeed, various quantum-computing platforms have demonstrated qudit control with ever-increasing performance. Both gate compression and gate-set optimisation will be central tools for making the most of the next generation of high-dimensional quantum processors, harnessing the full potential of physical quantum information carriers. *Acknowledgements.--* We are indebted to Mateus Araújo for discussion and input during early stages of this work, and we thank him for his Krapfen. We acknowledge support from the Austrian Science Fund (FWF) through the START project Y879-N27 and the project P 31339-N27. This project has received funding from the European Union's Horizon 2020 research and innovation programme under the Marie Skłodowska-Curie grant agreement No 840450. X.G. acknowledges the support of Joint Centre for Extreme Photonics (JCEP). M.H. acknowledges funding from the European Research Council (Consolidator grant 'Cocoquest' 101043705).
{'timestamp': '2022-09-30T02:08:33', 'yymm': '2209', 'arxiv_id': '2209.14584', 'language': 'en', 'url': 'https://arxiv.org/abs/2209.14584'}
# Introduction The detection of gravitational waves (GWs) from black hole mergers gave birth to GW astronomy, while the observation of neutron star merger in gravitational and electromagnetic waves is the prime example of the multi-messenger astronomy. One of the most promising multi-messenger sources that are yet to be detected in GWs are core-collapse supernovae (CCSNe). CCSNe are the powerful explosions of massive stars at the end of their life. The collapse of the stellar core releases \(\sim\! 10^{53}\) erg of its gravitational binding energy. While most of this escapes in the form of neutrinos, the rest powers the explosion. Supernovae involve powerful aspherical flows that generate GWs with energies up to \(\sim\! 10^{47}\) erg. The explosion front breaks out of the stellar surface hours later, producing a blast of photons across the electromagnetic spectrum. The supernova dynamics, and thus the GW signal, strongly depends on rotation. In non-or slowly rotating models, which represent the majority of CCSNe, the explosion is governed by the *neutrino mechanism*. A fraction of neutrinos emitted by the protoneutron star (PNS) heats the post-shock material, giving rise to neutrino-driven convection and standing accretion shock instability (SASI). These flows perturb the PNS and excite its oscillations, generating powerful GWs. Asymmetries in neutrino emission also contributes to the GW signal. The GWs are detectable for sources within our Galaxy with current generation detectors, while the future generation detectors will enable a more detailed observation. In rare rapidly rotating stars, the rotational kinetic energy powers the explosion via the *magnetorotational mechanism*. Due to the centrifugal force, the PNS forms with an oblate perturbation, triggering PNS ring-down oscillations that last for \(\sim\! 10\) ms. In some cases, the PNS may be subject to non-axisymmetric instabilities. When this happens, the non-axisymetrically-deformed PNS emits GW for many rotation periods, significantly enhancing the detectability. For moderate rotation, both the rotational bounce and convection contribute to the GW signal. Once detected, it is possible to estimate the parameters of source using the GWs emitted by the source. Since slowly and rapidly rotating models have significantly different dynamics, their GW signals can be confidently distinguished. Both convection and SASI develop from stochastic perturbations, so the GWs coming from slowly rotating models contain stochastic components. In contrast, the bounce GW signal in rapidly rotating stars can be determined precisely for a given (physical and computational) model parameters. Despite the presence of the stochastic contributions, the GW spectra contain the frequencies of the physical processes happening in the central regions. In particular, the PNS oscillations is the dominant component of the signal, the frequencies of which can be related to the physical parameters of the system, such as the mass and radius of the PNS. For rapidly rotating stars, explored the possibility to infer the rotation and its distribution in the supernova core. They considered \(\sim\!100\) different rotational configurations of a stellar model with 5 different degrees of differential rotation. They found that, for a source at \(10\) kpc distance, it is possible to measure rotation with \(\sim\! 20\%\) accuracy for rapidly rotating models, in which the rotational kinetic energy exceed \(\sim\! 8\%\) of the potential binding energy. In slowly rotating models, due to smaller GW amplitudes and higher stochastic contribution, the error becomes larger. These estimates were further improved by, and. showed that signs of rapid rotation can be found in the circular polarization of the GW signal. proposed to combine GW and neutrino observations to infer the rotation from the time delays between the bursts of these two signals. proposed to combine the the core-bounce signal with the dominant frequency mode of the PNS in the pre-explosion to constrain the structure of the progenitor star. studied the dependence of the GW signal on the parameters of the equation of state (EOS) of high-density matter in protoneutron stars and treatment the electron capture rate during collapse. They find a modest impact of these parameters to the bounce and the early \(\sim\! 20\) ms post-bounce GW signal. This emphasizes the importance of accurate modeling. Using deep convolutional neural networks, classified these EOSs \(72\%\) correctly, while their most probable five EOSs were found with \(97\%\) accuracy. In this work, we study if it is possible to probe the iron core mass of CCSN progenitor from the bounce and early ring-down GW signal alone. showed that progenitors with different masses will produce similar GWs if they have a similar angular momentum distributions at a given mass coordinate in the stellar core. This suggest that the progenitor mass at most has a subtle effect on the bounce dynamics. We extend this work further by using machine learning (ML) for signal classification and studying a wider ranges of progenitors and rotational configurations. We look at idealized optimistic scenario for measuring mass from the bounce and early ring-down GW signal alone. First, we consider rapidly rotating models, which produce strong GWs. Second, we use the deleptonization method that is known to artificially amplify the differences between progenitors. Third, we limit ourselves to model progenitors with four different iron core masses only, which simplifies the selection process. Despite these ideally favorable conditions, we show that the iron core mass cannot be accurately measured from the GW bounce signal alone. This suggests that, to measure the mass, one has to incorporate additional information such as longer post-bounce signal or neutrino observations, or both. # Methodology ## Gravitational waveforms {#sec:gw_data} We consider four progenitor models with zero-age main sequence masses ranging from \(12\) to \(40\) \(M_\odot\). At the pre-collapse stage, these models develop iron cores with masses ranging from \(1.3M_\odot\) to \(1.8M_\odot\), as shown in Table  [4](#tab:progenitor_param){reference-type="ref" reference="tab:progenitor_param"}, which also provides the central densities and entropies. The \(12M_\odot\) and \(40M_\odot\) models are produced by, while the \(15M_\odot\) model is evolved by with magnetic field prescription by. The \(27M_\odot\) model is produced by. All models have solar metallicity. To obtain the GW signals, we perform simulations using the `CoCoNuT` code. The simulations are continued until 25 ms after bounce. This time interval contains full bounce and ring-down signal from a CCSN event. We use the same computational setup as in with the SFHo nuclear equation of state. During collapse, our code uses the \(Y_\mathrm{e}(\rho)\) deleptonization method of. Following, we use \(Y_\mathrm{e}(\rho)\) profile obtained from spherically symmetric radiation hydrodynamics simulations using the `GR1D` code. This method is known to amplify the contrast between progenitors with different masses: it produces variations in the inner core mass at bounce of \(\simeq 10\%\) between progenitors with different masses, whereas full neutrino-transport simulations yields inner core masses that are practically independent of the progenitor. However, this weakness of the method represents the strength of our work: as we show below, even with the artificial amplification, the difference in the GW signals is too small to be distinguishable. In more realistic models, the distinction should be even smaller. Following, for each progenitor we consider about \(100\) different rotational profiles ranging from slow to rapid rotation, where rotation has little to large effect on the core dynamics, respectively. At distance \(\varpi\) from the rotation axis, the angular velocity of pre-collapse models is given by \[\label{eq:rot_law} \Omega(\varpi) = \Omega_0 \left[ 1 + \left(\frac{\varpi}{A}\right)^2\right]^{-1},\] where \(A\) is a measure of degree of differential rotation, \(\Omega_0\) is the central angular velocity. As in, we consider five different values of \(A\), ranging from \(300\) to \(10,\!000\) km, which correspond to the limits of, respectively, extreme differential and uniform rotations in the stellar core. For a given \(\Omega_0\) and \(A\), we impose the rotation law ([\[eq:rot_law\]](#eq:rot_law){reference-type="ref" reference="eq:rot_law"}) to the \(12M_\odot\) model, as described in. We then map the specific angular momentum distribution homologously to the other progenitors with different masses. This ensures that the specific angular momentum at a given enclosed mass coordinate is similar in all four progenitors. As summarized in Table [5](#tab:T1){reference-type="ref" reference="tab:T1"}, the total number of rotational configurations we consider is 97, 99, 102, and 104 for s12, s15, s27, and s40 models, respectively. The difference in this number is caused by the fact that at the extreme rapid rotation limit, due to a fine balance between gravity and centrifugal force in the pre-collapse stage, some of the models do not collapse for some progenitors and collapse for other. We extract the GW waveforms from the simulations using the Newtonian quadrupole formula in the first moment of momentum density formulation, which yields accurate waveforms for stellar core collapse simulations. ::: # Conclusion We have presented a detailed analysis of whether bounce and early ring-down GW signals from future observations of rotating CCSNe can be used for identifying iron core masses. We used GW data obtained from numerical simulations and injected white Gaussian noise to mimic the detector noise. We developed a ML classifier with the aim to identify the target classes of these input signals. We considered an idealized optimistic scenario for identifying the mass: we use rapidly rotating models that emit strong GWs, include only progenitor with only four different masses, which simplifies the selection process. In addition, to generate GW signals, we used numerical simulations that use a deleptonization scheme that artificially amplify differences in the collapse and post-bounce dynamics of progenitors with distinct masses. Despite this idealized favorable scenario, we were unable to identify the mass, purely based on bounce and early ring-down GW signal alone. More realistic treatment of noise modelling like non-Gaussian signals can only reduce the chances of any possible identification of the progenitor mass labels. The fact that even for SNR of 100, the classifier failed to give a high accuracy score, does point to the fact that this is an intrinsic phenomenon and independent of detector quality. Our results therefore show that the information about the iron core mass is not contained in the bounce and early ring-down GW signal. We have also performed similar analysis in Fourier space and classification performance was within \(2\%\) of the accuracy score in time domain space. We thus conclude that the weak relation between GW waveforms and the iron core mass is an intrinsic property of the system and the classification via ML is not possible. Additionally, we have explored sensitivity of the ML algorithm by performing our analysis with multiple different classifiers (e.g., XGBoost and Neural Network, as discussed in Appendix [\[appendix-1\]](#appendix-1){reference-type="ref" reference="appendix-1"}). In all cases, our results showed that the performance of the classifier was not satisfactory to recover target labels. We do however note that, as with any ML analysis, numerous other hyperparameter combinations are possible, as do multiple other algorithms. We anticipate to further perform our analysis in future with more complex ML model and representative data. However, we do not expect significant deviation from the results presented in this paper. We expect that to constrain the iron core mass one has to incorporate more information such us longer-term post-bonce GW signal and/or neutrino emission.
{'timestamp': '2022-09-30T02:07:18', 'yymm': '2209', 'arxiv_id': '2209.14542', 'language': 'en', 'url': 'https://arxiv.org/abs/2209.14542'}
null
null
# Introduction Leptoquarks (LQs) are hypothetical particles that can convert quarks into leptons and vice versa with great interest in elementary particle physics. From the theoretical aspect, it has been predicted naturally by the Pati-Salam unification of quarks and leptons where leptoquark is first raised as well as many other grand unified theories. From the experimental side, the existence of leptoquarks is strongly indicated by lepton flavour universality violation (LFUV) in semi-leptonic \(B\) decay. Besides LFUV, leptoquarks can also be related to a wide variety of phenomena beyond the standard model, including the muon \(g-2\), the neutrino mass and the \(W\) boson mass. Despite the theoretical and experimental attraction from leptoquarks, they have not been found by any collider experiment so far. One of the possibilities to find leptoquark is through its connection with Higgs phenomenology. Generically, the scalar leptoquarks can couple to Higgs boson in the scalar potential. After electroweak symmetry breaking, the leptoquark-Higgs operator induces the couplings to the physical Higgs boson which can further affect loop-induced Higgs production and decay processes. Such effects can be probed with the Higgs signal strength measurements at colliders and thus are potential smoking guns for leptoquarks. At the meantime, the Higgs portal allows leptoquarks to modify the EWPT in the early universe. It has been shown that first order EWPT can be induced by an additional singlet scalar field without any vacuum expectation value (VEV). And the stochastic gravitational wave background produced during the cosmological phase transition can be potentially tested by detectors. This provide us with a new possibility of testing scalar leptoquarks, using a similar approach to the singlet, from cosmic signals. In this paper, we extend the study of first order EWPT induced by an extra singlet scalar to the case of scalar leptoquarks in \(SU(2)\) singlet, doublet and triplet representations, and show how such leptoquarks can affect the EWPT through their coupling to the standard model Higgs boson. By computing the effective scalar potential, we find the range of Higgs portal where eligible first order EWPT can happen for different types of scalar leptoquark with a mass around TeV scale. Then we calculate the gravitational wave background produced during the first order EWPT induced by leptoquark for some benchmark cases and compare it with the detector sensitivities. We found that in some range of the parameter space, the first order EWPT induced by a leptoquark is able to produce gravitational wave signals which are strong enough to be detected. The paper is organised as follows. In Sec.[\[sec:1stPT\]](#sec:1stPT){reference-type="ref" reference="sec:1stPT"}, we discuss the first order EWPT induced by leptoquark through the Higgs portal. We also show the constraint from Higgs physics to the parameter space. In Sec.[\[sec:GW\]](#sec:GW){reference-type="ref" reference="sec:GW"}, we show the gravitation wave signal produced during leptoquark-induced first order EWPT for benchmark points. Finally, we summarise and conclude in Sec.[\[sec:con\]](#sec:con){reference-type="ref" reference="sec:con"}. # First order EWPT induced by scalar leptoquarks [\[sec:1stPT\]]{#sec:1stPT label="sec:1stPT"} In this section, we discuss how first order EWPT can be induced by leptoquarks. The scalar potential of the SM scalar doublet \(H\) and an extra complex scalar leptoquark \(S\) with a \(SU(2)\) index \(a\), corresponding to a singlet, doublet or triplet representation, can be written as \[\begin{aligned} V_0 =-\mu^2 |H|^2 + \lambda_H |H|^4 +\mu_S^2|S_a|^2 + \lambda_S |S_a|^4 + 2\lambda_{HS} |H|^2|S_a|^2 \end{aligned}\] For simplicity, we only consider the minimal quartic interaction between Higgs and scalar leptoquark in the form of \(|H|^2|S|^2\). Other forms of quartic interactions such as \(|H^\dagger S|^2\) for \(SU(2)\) doublet leptoquark and \(H^\dagger (\sigma^i S_i)(\sigma^j S_j)^\dagger H\) for \(SU(2)\) triplet leptoquark can lead to mass shifts between the \(SU(2)\) components of leptoquarks after spontaneous symmetry breaking (SSB) as well as extra contributions to the thermal mass of the SM Higgs field. Focussing on the field \(h\) in \(H=(G^+,(h+iG^0)/\sqrt2)\) which becomes the SM Higgs boson after spontaneous symmetry breaking, the scalar potential becomes \[\begin{aligned} V_0 =-\frac{\mu^2}{2} h^2 + \frac{\lambda_H}{4} h^4 +\frac{\mu_S^2}{2}\left(s_{a,1}^2+s_{a,2}^2\right) + \frac{\lambda_S}{4}\left(s_{a,1}^2+s_{a,2}^2\right)^2 + \frac{\lambda_{HS}}{2} h^2\left(s_{a,1}^2+s_{a,2}^2\right) \end{aligned}\] where \(S_a=(s_{a,1}+i\,s_{a,2})/\sqrt2\). As the leptoquark is typically heavier than the electroweak scale, we assume \(\mu_S^2 > 0\) in this research. Then the leptoquark mass after SSB is \(m_S^2 = \mu_S^2 + \lambda_{HS} v_0^2\) with \(v_0\) the standard model Higgs VEV. At tree level, the phase transition is second order as the participation of \(S\) does not vary the minimum of the scalar potential. However, by considering the finite temperature effective potential, the existence of a leptoquark modifies the minimum through the Higgs portal at loop order. In this study, we consider the scalar effective potential at one-loop level for simplicity, neglecting higher order effects which may vary the transition strength by 20%. We also neglect renormalisation group corrections which have a smaller effect. At one-loop level, the effective scalar potential receives contribution from zero-temperature correction \(\Delta V_0^{\rm 1-loop}\) (Coleman-Weinberg potential) and finite-temperature correction \(\Delta V_T^{\rm 1-loop}\) \[\begin{aligned} V_{\rm eff} (h,T)= V_0 + \Delta V_0^{\rm 1-loop}(h) + \Delta V_T^{\rm 1-loop}(h,T)\.\label{eq:Veff} \end{aligned}\] The one-loop zero-temperature correction reads \[\begin{aligned} \Delta V_0^{\rm 1-loop}(h) &=& \sum_{i\in b,f} \frac{n_i}{64\pi^2} \left[ m_i^4(h) \left(\ln\frac{m_i^2(h)}{m_i^2(v_0)}-\frac32\right) + 2m_i^2(h)m_i^2(v_0)\right]\,, \end{aligned}\] where \(m_i^2=m_{0i}^2 +a_i h^2\) are the shifted masses with \[\begin{aligned} &&m_{0\{t, W, Z, h, G, S\}}^2 = \{0, 0, 0,-\mu^2,-\mu^2, \mu_S^2\}\,,\\ &&a_{\{t, W, Z, h, G, S\}} = \{\frac{y_t^2}{2}, \frac{g^2}{4},\frac{g^2+{g'}^2}{4}, 3\lambda_H, \lambda_H, \lambda_{HS}\}\,,\\ &&n_{\{t, W, Z, h, G, S\}} = \{-12, 6, 3, 1, 3, n_S\}\. \end{aligned}\] The quantity \(v_0\) is the SM Higgs VEV at zero temperature. The degree of freedom \(n_S\) in the complex \(SU(3)\) triplet \(S\), depending on the SU(2) nature of the leptoquark, can be 6 for \(SU(2)\) singlet, 12 for \(SU(2)\) doublet or 18 for \(SU(2)\) triplet. The one-loop finite-temperature correction in Eq.[\[eq:Veff\]](#eq:Veff){reference-type="ref" reference="eq:Veff"} is \[\begin{aligned} \Delta V_T^{\rm 1-loop}(h,T) &=& \sum_{i\in b} \frac{n_i T^4}{2\pi^2} J_b \left(\frac{m_i^2}{T^2}\right) + \sum_{i\in f} \frac{n_i T^4}{2\pi^2} J_f \left(\frac{m_i^2}{T^2}\right)\, \end{aligned}\] where \(b\) and \(f\) stand for bosons and fermions and \[\begin{aligned} J_{b/f} \left(\frac{m_i^2}{T^2}\right) &=& \int_0^\infty dx x^2\ln\left[1 \mp e^{-\sqrt{x^2+m_i^2(h)/T^2}}\right]\,, \end{aligned}\] At high temperature \(T \gtrsim m_i\), the functions \(J_b\) and \(J_f\) can be expressed approximately as \[\begin{aligned} J_b \left(\frac{m_i^2}{T^2}\right) &\simeq&-\frac{\pi^4}{45} + \frac{\pi^2}{12}\frac{m_i^2}{T^2}-\frac{\pi}{6}\frac{m_i^3}{T^3}-\frac{1}{32}\frac{m_i^4}{T^4}\left(\ln\frac{m_i^2}{T^2}-c_b\right) +... \label{eq:Jb_app}\\ J_f \left(\frac{m_i^2}{T^2}\right) &\simeq&\frac{7\pi^4}{360}-\frac{\pi^2}{24}\frac{m_i^2}{T^2}-\frac{1}{32}\frac{m_i^4}{T^4}\left(\ln\frac{m_i^2}{T^2}-c_f\right) +...\label{eq:Jf_app} \end{aligned}\] with \(c_b \simeq 5.4\) and \(c_f \simeq 2.6\). At low temperature \(T < m_i\), \(J_b\) is exponentially suppressed as its argument increases. To maintain the perturbativity of gauge couplings at high temperature, the so-called ring (daisy) diagrams should be resummed. There are two different methods wildly used for resummation. In the Parwani method, the shifted masses of bosons in the effective potential are replaced by the Debye masses \(M_i^2(h,T)=m_i^2(h)+\Pi_i(T)\), where the self-energies \(\Pi_i(T)\) are given by \(\Pi_i (T)= b_i T^2\) with \[\begin{aligned} &&b_h = b_G = \frac{3g^2+{g'}^2}{16} + \frac{\lambda_H}{2} + \frac{y_t^2}{4}+ \frac{n_S \lambda_{HS}}{12}, \quad b_{W} = b_{Z}(T) = \frac{11}{6} g^2 \,, \quad b_{\gamma} = \frac{11}{6} {g'}^2 \,, \\ &&b_S = \begin{dcases} \frac{\lambda_{HS}}{3} + \frac{(n_S+2)\lambda_S}{12} + \frac34 g_3^2 + \frac14 Y^2 + \frac{{g'}^2}{16} & SU(2) \text{singlet} \,,\\ \frac{\lambda_{HS}}{3} + \frac{(n_S+2)\lambda_S}{12} + \frac34 g_3^2 + \frac14 Y^2 + \frac{3g^2+{g'}^2}{16} & SU(2) \text{ doublet and triplet.} \end{dcases} \nonumber\\ \end{aligned}\] In the Arnold-Espinosa method, the replacement only happens in the mass cubic terms. In this paper, we adapt the Parwani method. While the leptoquark coupling \(Y\) is typically smaller than unitarity, the \(SU(3)\) coupling can have significant contribution to the Debye mass of the leptoquarks. However, the contributions, not only from the \(SU(3)\) coupling but also from other gauge couplings, play the same role as the self-interaction coupling \(\lambda_S\) in phase transition and thus can be absorbed effectively by \(\lambda_S\), turning it into \(\tilde{\lambda}_S\). As \(\lambda_S\) is unconstrained, relevant discussion is commonly avoided by fixing it to certain value. Here, we consider the contributions to the thermal mass from the gauge couplings and leptoquark-fermion couplings as an effective contribution to the quartic coupling \(\lambda_S\) and fix the resulting effective \(\tilde{\lambda}_S\) to be 2. When the phase transition happens at a low temperature, the effective potential can develop an imaginary part as the thermal masses of Goldstone bosons become negative. It has been pointed out in that such an imaginary part remarks the decay rate of the quantum state minimising the Hamiltonian. In the simplest case, the sufficient conditions for a eligible first order EWPT to occur are 1. The electroweak minimum is the true minimum at zero temperature \(T=0\) and \(h=0\) is a local maximum (\(V''(0,0)<0\)). 2. At the temperature \(T_2\) that \(h=0\) transfer from a local maximum to a local minimum, there is another non-zero local minimum. The first condition ensures that the phase transition is completed today. If \(h=0\) is a local minimum at zero temperature, the phase transition can only happen through tunnelling and the probability is too low for the vacuum to transfer to the electroweak vacuum until today. The second condition ensures that there are two minima existing simultaneously during the phase transition. In a scenario satisfying both of the conditions, the two minima of the scalar potential are degenerate at a critical temperature \(T_c\). The allowed parameter spaces for first-order phase transition to happen are shown as the coloured regions in Fig.[\[fig:PT\]](#fig:PT){reference-type="ref" reference="fig:PT"}. The strength of the transition can be estimated by the ratio of the non-zero VEV and the critical temperature, \(v_c/T_c\), which is shown are the colour in Fig.[\[fig:PT\]](#fig:PT){reference-type="ref" reference="fig:PT"}. Above the coloured regions, the first order EWPT is not eligible as condition 1 is not satisfied; below the coloured regions, first order EWPT cannot happen because condition 2 is not satisfied. In Fig.[\[fig:PT_S\]](#fig:PT_S){reference-type="ref" reference="fig:PT_S"} to Fig.[\[fig:PT_T\]](#fig:PT_T){reference-type="ref" reference="fig:PT_T"}, the required coupling for first order EWPT increases as the leptoquark becomes heavier in each \(SU(2)\) representation of leptoquark. By comparing different panels and also by comparing the lines with different colours in Fig.[\[fig:PT_all\]](#fig:PT_all){reference-type="ref" reference="fig:PT_all"}, it can be figured out that the Higgs portal coupling required for first order EWPT becomes smaller as the dimension of the leptoquark \(SU(2)\) representation increases. Empirical expressions of the interesting parameter spaces can be obtained when the leptoquark is heavy. For leptoquark mass above 1 TeV, the allowed Higgs portal for eligible first order EWPT to happen is roughly between \(\{3.59,\,4.99\}\times (m_{S_1}/1\,\text{TeV})^{0.685}\) for singlet leptoquark, between \(\{2.87,\,4.00\}\times (m_{S_2}/1\,\text{TeV})^{0.679}\) for doublet leptoquark and between \(\{2.52,\,3.50\}\times (m_{S_3}/1\,\text{TeV})^{0.676}\) for triplet leptoquark. A more complicated case can occur when the scalar potential develops two non-zero minima simultaneously after the temperature drops below \(T_2\). In such a case, the scalar configuration transfer to the nearest non-zero minimum continuously through second order phase transition and tunnel to the larger non-zero minimum through second order phase transition. The regions where such cases happen are marked as green in Fig.[\[fig:PT_D\]](#fig:PT_D){reference-type="ref" reference="fig:PT_D"} and Fig.[\[fig:PT_T\]](#fig:PT_T){reference-type="ref" reference="fig:PT_T"}. However, as the leptoquark is typically above 1 TeV, such regions are not of interest in this study. ## Constraints on the Higgs portal coupling The new interaction between a scalar leptoquark and the Higgs doublet can affect the Higgs boson production and decay processes. The discrepancy between SM prediction and experimental measurement is commonly characterised by the \(\varkappa\)-factor, defined as \(\varkappa_i=\sqrt{\Gamma_i^{\rm exp}/\Gamma_i^{\rm SM}}\). The loop-induced contribution from leptoquark to the Higgs boson decay process into photons and the gluon-gluon production of Higgs boson are given by \[\begin{aligned} \varkappa_g &=& 1 + 0.24 \, \frac{\lambda_{HS}\,v^2}{m_S^2} N_S\\ \varkappa_\gamma &=& 1-0.052 \, \frac{\lambda_{HS}\,v^2}{m_S^2} N_c \sum_i Q_i^2 \end{aligned}\] where the sum is taken over all \(SU(2)\) components of the leptoquark and \(Q_i\) is the electric charge of the \(i\)th component. \(N_S\) is the number of the leptoquark \(SU(2)\) components. The experimental measurements by the ATLAS collaboration are \(\varkappa_g = 1.01^{+0.11}_{-0.09}\) and \(\varkappa_\gamma = 1.02^{+0.08}_{-0.07}\). Similar contribution appears in the decay channel of Higgs into a \(Z\) boson and a photon as well, in the form of \[\begin{aligned} \varkappa_{Z\gamma} &=& 1 + 0.036\, \frac{\lambda_{HS}\,v^2}{m_S^2} N_c \sum_i Q_i \left(I_i^W-0.23 Q_i\right) \end{aligned}\] where \(I_i^W\) is the value of the weak isospin of the leptoquark. The value of \(\varkappa_{Z\gamma}\) measured by CMS collaboration is \(1.65^{+0.34}_{-0.37}\). Despite abundant collider phenomena caused by the Higgs portal to leptoquarks, none of the observables can constrain the portal coupling restrictedly. When multiple leptoquarks appear in a model, the contributions from different types of leptoquarks can have opposite contributions to the \(\varkappa\) parameters above. In order to visualise the effects of these observables, we consider the collider constraints under the assumption of a single leptoquark multiplet and show the maximal values of the Higgs portal allowed by \(h\rightarrow\gamma\gamma\) and \(gg\rightarrow h\) as the dashed and dotted lines in Fig.[\[fig:PT_S\]](#fig:PT_S){reference-type="ref" reference="fig:PT_S"} to Fig.[\[fig:PT_T\]](#fig:PT_T){reference-type="ref" reference="fig:PT_T"}. While the \(gg\rightarrow h\) cross section is affected by the \(SU(2)\) representation of the leptoquark, the \(h\rightarrow\gamma\gamma\) cross section depends on the electric charge. For scalar leptoquark, assuming direct interaction to SM fermions, there are two different possible assignments of hypercharge for \(SU(2)\) singlet and doublet and one assignment for \(SU(2)\) triplet: \(4/3\) or \(1/3\) for singlet, \(7/6\) or \(1/6\) for doublet and \(1/3\) for triplet. Although those constraints are currently weak, they are expected to be improved foreseeably by future experiments like HL-LHC, FCC, ILC and CEPC. Moreover, the Higgs portal coupling also affects flavour violating processes like the \(h\rightarrow\mu\tau\) or \(\tau\rightarrow\mu\gamma\) decay which can be tested by precious measurements at colliders. # Gravitational wave signals [\[sec:GW\]]{#sec:GW label="sec:GW"} During a first-order phase transition, the scalar field configuration transfer from zero vacuum to non-zero vacuum locally in the form of bubbles through tunnelling. The scalar bubbles can then move, collide and expand. Sound waves and magnetohydrodynamic turbulence can be produced after the collision of bubbles. The gravitational wave can be produced through three different mechanisms: **collision** of the scalar bubbles, overlap of the **sound wave** in the plasma and the fluid **turbulence**. The total gravitational wave spectrum is the sum of the three contributions \[\begin{aligned} \Omega_{\rm tot}(f)h^2 = \Omega_{\rm coll}(f)h^2 + \Omega_{\rm sw}(f)h^2 + \Omega_{\rm turb}(f)h^2\. \end{aligned}\] All three contributions depend on the phase transition dynamics which is described by four key parameters: the wall velocity \(v_w\), the inverse phase transition duration \(\beta/\mathcal{H}_*\), the phase transition strength \(\alpha_{T_*}\) and the transition temperature \(T_*\). After these parameters are determined, the gravitational wave spectrum can be computed using results from numerical simulations. The crucial step in computing these key parameters is to compute the Euclidean action. To find the Euclidean action which is defined as the spacial integration of the effective Lagrangian, a solution of the Euclidean equation of motion is required, which is generally not solvable analytically. For further details see Appendix [\[app:GWinPT\]](#app:GWinPT){reference-type="ref" reference="app:GWinPT"}. A common treatment for particles of electroweak scale or below is to make an approximation using Eq.[\[eq:Jb_app\]](#eq:Jb_app){reference-type="eqref" reference="eq:Jb_app"} and Eq.[\[eq:Jf_app\]](#eq:Jf_app){reference-type="eqref" reference="eq:Jf_app"} after which the effective potential can be simplified into a quartic function of the scalar field and a semi-analytical bounce solution can be derived. However, as the leptoquark is typically above TeV scale, the one-loop finite-temperature correction from leptoquark is exponentially suppressed and thus negligible. On the other hand, no eligible expansion can be made to the one-loop zero-temperature correction from leptoquark in the parameter space of interest. Therefore we choose to solve the Euclidean equation of motion numerically in this work. In Fig.[\[fig:fix_rep\]](#fig:fix_rep){reference-type="ref" reference="fig:fix_rep"}, we show the gravitational wave produced from first order EWPT for six benchmark cases. From top to bottom, the benchmark cases in each row are chosen for \(SU(2)\) singlet, doublet and triplet leptoquark. For each \(SU(2)\) representation, the strongest gravitational wave signals that leptoquark-induced first order EWPT can produce when the leptoquark mass is 1 TeV and 5 TeV are presented on the left and right panels respectively. In all the cases, the gravitational wave signals can be detected by BBO, DECIGO, while LISA and \(\mu\)Ares can potentially find the signal in Benchmark Point 1 for singlet leptoquark. We also show the gravitational waves produced by different sources during the phase transition independently. In most of the frequency range, the gravitational wave is dominantly produced by the magnetohydrodynamic (MHD) turbulence. By comparing panels, it can be observed that only the shape of the gravitational wave spectrum for 5 TeV \(SU(2)\) singlet leptoquarks shows a significant difference from the others. In fact, the result follows from the fact that the gravitational wave produced from first order EWPT relies on the strength of the transition. To illustrate the relation more explicitly, we show the dependence of gravitational wave signal peak values on the strength of the phase transition in Fig.[\[fig:peak_strength\]](#fig:peak_strength){reference-type="ref" reference="fig:peak_strength"}. Here, instead of \(v_c/T_c\) in the previous section, the phase transition strength is evaluated by the ration of the non-zero minimum of the scalar potential and temperature when the phase transition happens, i.e. when the probability of bubble nucleation is significant. The temperature \(T_*\) is defined by the temperature when one bubble is nucleated per unit volume per unit time and the non-zero VEV at \(T_*\) is denoted as \(v_*\). We find that the gravitational wave is testable when the phase transition strength is roughly larger than \(1.34\), corresponding to the Higgs portal roughly larger than \(3.95\times (m_{S_1}/1\,\text{TeV})^{0.685}\) in the singlet case, \(3.17\times (m_{S_2}/1\,\text{TeV})^{0.679}\) in the doublet case and \(2.79\times (m_{S_3}/1\,\text{TeV})^{0.676}\) in the triplet case. In the case with a 5 TeV \(SU(2)\) singlet leptoquark, the Higgs portal is constrained by its perturbativity limit and as a consequence, the strongest gravitational wave signal that eligible first order EWPT can produce is less than the other cases. For the same benchmark point, the gravitational wave produced during first order EWPT induced by leptoquark with a smaller dimension is stronger. In Fig.[\[fig:fix_BP\]](#fig:fix_BP){reference-type="ref" reference="fig:fix_BP"}, we choose the benchmark points 3 and 5 in Fig.[\[fig:PT\]](#fig:PT){reference-type="ref" reference="fig:PT"} and show the gravitational wave produced during singlet-and doublet-induced first order EWPT for the former case and the gravitational wave produced during doublet-and triplet-induced first order EWPT for the later one. It is clear that for the same coupling, the first order EWPT induced by the \(SU(2)\) multiplet with a higher dimension produces stronger gravitational waves. Supposing the Higgs portal is measured to be in the region where first-order phase transition appears by future collider experiments, the gravitational waves detection provides an alternative method to further test the Higgs portal as well as determine the \(SU(2)\) representation of leptoquarks. # Conclusion[\[sec:con\]]{#sec:con label="sec:con"} In this paper, we have explored the possibility that first order EWPT induced by the coupling between a scalar leptoquark and the SM Higgs boson produces detectable gravitational wave signals. We have considered different \(SU(2)\) representations of the scalar leptoquark, including singlet, doublet and triplet. Despite the lack of VEV for leptoquark itself, a first order EWPT can be induced due to the 1-loop order effects. In general, with first order EWPTs, gravitational waves can be produced by multiple processes in the dynamical evolution of the scalar bubbles. The resulting gravitational waves form a stochastic background that can be probed by gravitational wave detectors. We have calculated the effective potential of the SM Higgs field in the presence of a scalar leptoquark, including tree level and 1-loop level contributions as well as the resummation over the ring/daisy diagrams. By applying the conditions for first order EWPT, we have found that the leptoquark can induce a first order EWPT in the parameter space allowed by collider constraints and can be tested by future Higgs precision experiments. Enhanced by the internal degree of freedom of the particular leptoquark, we found that the leptoquark in the \(SU(2)\) representation with a higher dimension requires smaller coupling in order to trigger a first order EWPT. We have followed the standard procedure to compute the gravitational wave spectrum during first order EWPTs. It turns out that the gravitational wave spectrum is mainly determined by the strength of the phase transition characterised by the ratio of the non-zero VEV and the temperature at the time that the transition happens. However, due to the difference in internal degrees of freedom, the strengths of first order EWPTs induced by leptoquarks with the same masses and Higgs portal couplings but different \(SU(2)\) nature are different. Since the gravitational wave signals differ, this provides a possibility to determine the \(SU(2)\) representation of the leptoquarks through the observations of gravitational wave in particular regions of parameter space.
{'timestamp': '2022-10-06T02:13:22', 'yymm': '2209', 'arxiv_id': '2209.14605', 'language': 'en', 'url': 'https://arxiv.org/abs/2209.14605'}
null
null
null
null
null
null
# Introduction {#intro} Dense and hot plasma structures are a common sight in the solar corona. These structures are mostly linear (in the sense that their lengths are much longer than their transverse scales) and are believed to trace local magnetic field lines. Some of them are closed, meaning both ends of the structure anchored on the Sun (footpoints) are clearly visible while others that are extended to very large distances concealing their connection from one foot point to other, are considered open. Ray-like structures visible in the polar regions of the Sun, called polar plumes, are open structures. The structures that form part of active regions are typically closed and are called coronal loops. It is also common to have "open loops" or "extended loops", referring to the loops that are part of active regions but their connectivity to the other foot point is not clear. Extended loops originating in a quiet-Sun network region (or a plage region) are called network plumes or on-disk plume-like structures. Because of the constant churning experienced by all these structures due to convective motions on the surface, it is natural to expect creation of different magnetohydrodynamic (MHD) wave modes which are believed to play a significant role in maintaining the million degree temperatures in the corona. We refer the reader to a review by in this issue, to find our current understanding on the contribution of MHD waves to coronal heating. The launch of high-resolution telescopes such as SoHO and TRACE in the late 90s has led to the discovery of different MHD wave modes in the solar corona. Both longitudinal slow magnetoacoustic waves and transverse kink/Alfvénic waves were found to exist. Modern telescopes such as Hinode, SDO, and IRIS alongside several ground-based telescopes (for e.g., SST, DST, GREGOR, GST, DKIST) offer us even better resolution in addition to providing increased spatial, temporal, and atmospheric coverage. These extraordinary capabilities have not only expanded the detection of different MHD waves but also improved our knowledge on their characteristic properties. Indeed, as many researchers have shown, current observations are advanced enough to compare the observed wave properties with theoretical models and extract several key parameters through coronal seismology-a newly emergent field in solar physics, thanks to these advances. Slow magnetoacoustic waves (or simply slow waves) have been detected in different coronal structures including polar plumes, active region fan loops and other network or plage related plume-like structures. Standing slow waves were also found in hot flare loops. A dedicated review on standing waves has been presented by in this issue. Recent studies have shown the origin of propagating slow waves in the lower solar atmosphere, revealed their damping to be frequency-dependent albeit with some inconsistencies with theory, and also highlighted that thermal conduction might not be the dominant cause for their damping as previously thought. The high-resolution observations also uncovered a few problems, one of which is the possible ambiguity in distinguishing the slow waves from high-speed quasi-periodic flows. Especially, the spectroscopic observations revealed a more complex picture, with perturbations not only in the line intensities but also in other parameters such as the Doppler velocities, line widths and red-blue asymmetry leading to the debate on interpretation in terms of waves or flows. Despite this, a number of seismological applications of slow waves have been proposed including the determination of plasma temperature, loop geometry, magnetic field, thermal conduction and polytropic index. More recent models discuss the inclusion of unknown coronal heating function in the MHD equations in a parameterised form as a function of the equilibrium parameters such as density and temperature in order to constrain it using the observations of slow waves. Different MHD wave modes are ubiquitously observed in the solar atmosphere by space and ground-based instruments. It is worth noting that early studies since the era of *Skylab* have interpreted the observed nonthermal broadening of spectral lines to be the signature of Alfvén waves in polar coronal holes. However, the observational resolution in that era was not good enough to disentangle different wave modes (torsional Alfvén wave or homogenous Alfvén wave) and the structure of the solar plasma. After the launch of high resolution instruments, there is an ample evidence that the solar plasma is inhomogeneous. Hence, the term Alfvénic (also called kink) better acknowledges the rich and complex nature of the coupled wave system within a realistic, continuous, inhomogeneous magnetic medium. Direct signatures of kink waves were first noted in coronal loops. Both decaying and decayless oscillations have been observed in different solar structures. It has been reported that most of the kink oscillations are excited when coronal loops are displaced from their mean position by the lower coronal eruptions including coronal jets. After the launch of CoMP and SDO, propagating kink waves were detected in the polar regions of the Sun. It has been believed that the sources of these propagating kink waves in polar coronal holes are the supergranular motions. Recently, has shown that p-modes could be responsible for exciting observed kink oscillations in the solar atmosphere. While showed that the observed dependence of the displacement and velocity amplitudes on the oscillation periods does not have any peak at a certain frequency. This casts doubts over the interpretations that p-modes are responsible for observed kink waves in the solar corona. Also, kink waves (standing and propagating) can be used to infer cross density structures and magnetic field using seismology inversion techniques. Though, a unique solution of the inversion does not exist except when the density profile of the inhomogeneous layer is kept fixed. Transverse waves are believed to carry energy flux enough to heat the quiet Sun. While claimed that transverse waves carry insufficient energy to accelerate solar winds in polar coronal holes, reported that transverse waves observed in the transition regions have enough energies to accelerate the solar wind. Thus, more studies using upcoming space and ground-based instruments are needed to understand the role of transverse waves in accelerating solar winds in the polar coronal holes. In this review article, we give an overview of some of these recent advancements in the observations of both slow waves and Alfénic waves with an emphasis on open coronal structures. We also present relevant theoretical/numerical modelling studies wherever appropriate. We discuss some of the latest advances in the study of slow waves in Section [2](#slow_waves){reference-type="ref" reference="slow_waves"}, and that in Alfvénic or kink waves in Section [3](#alfven_waves){reference-type="ref" reference="alfven_waves"}, followed by a description of the role of Alfvénic waves in the solar wind acceleration in Section [4](#solar_wind){reference-type="ref" reference="solar_wind"} and finally provide a brief summary of all the results along with some future directions in Section [5](#summary){reference-type="ref" reference="summary"}. # Slow magnetoacoustic waves {#slow_waves} Observations of propagating slow magnetoacoustic waves in the solar atmosphere have generated increased attention over the past decades. The continuous multi-wavelength capture of the full solar disk at high spatial and temporal resolutions by SDO/AIA, has enabled us to perform detailed studies on the slow wave propagation and dissipation characteristics. The perturbations due to slow waves appear as slanted ridges of alternating brightness (or Doppler velocity) in time-distance maps that are commonly constructed to study the evolution of a specific coronal structure. These perturbations are generally referred to as 'propagating disturbances (PDs)' or 'propagating coronal disturbances (PCDs)'. There has been a debate in the recent years proclaiming the observed PDs could also be generated by high-speed quasi-periodic upflows while their interpretation in terms of slow waves is not unique. Importantly, some spectroscopic observations of PDs from *Hinode*/EIS have revealed periodic blueward asymmetry in the line profiles suggesting the presence of periodic upflows. However, have later demonstrated that such asymmetry in the line profiles is an intrinsic feature of upward propagating slow waves. Although the issue has not been completely resolved yet, it has been largely agreed that both periodic waves and aperiodic flows coexist near the foot points but the wave signatures dominate at larger distances along the structure. The discussion in this article presumes this behaviour and considers PDs synonymous with slow waves unless mentioned otherwise explicitly. Interested readers may refer to, , and, for further details on this debate. One must also note that the extended loop structures associated with active regions are considered as open structures in this article in the sense of the wave propagation but not magnetic connectivities that are unclear in observations. This is a valid assumption since the extent of propagation of slow waves is in general much shorter compared to the length (visible extent) of the associated structures. In the following, we discuss the progress made in the last few years in understanding the origin of the slow waves, their damping behaviour in the solar corona, and finally illustrate some of their seismological applications. ## Source of oscillations Slow waves are regularly observed in a variety of coronal structures. Both standing and propagating versions of these waves have been found although the standing waves are thought to be locally generated, whereas the propagating waves originate in the lower solar atmosphere. Moreover, the propagating waves have been shown to be ubiquitous in the solar corona. A wide range of periodicities are observed, but in general, longer periods (\(\sim\) tens of minutes) are dominant in the polar regions while the active regions are replete with shorter periods (\(\sim\) minutes). However, the longer periods (\(>\) 10 min) are difficult to penetrate into the solar corona unless the magnetic field is highly inclined. Therefore, even though the general characteristic properties of these waves appear broadly similar across all regions, it is quite possible that they have a different origin in active regions and polar regions. Here, we discuss some recent results on possible source locations across these two regions. It may be noted that longer periods (\(\sim\) 25 min) are also found in active regions and similarly, shorter periods (\(\sim\) 5 min) are not totally non-existent in the polar regions but the distinction here is based on their dominant presence. ### Active regions Early observations using high-resolution imaging data from *Transition Region and Coronal Explorer* have revealed that the slow wave perturbations in loops that are rooted in a sunspot umbra display 3-minute periods whereas those in loops anchored in plage-related regions display 5-minute periods. These periods are coincident with that of the oscillations found in the lower atmosphere at the corresponding locations. It was therefore suggested that the driver of the coronal slow waves lies in the lower atmosphere near the footpoints of the supporting structure. used spectroscopic data corresponding to the transition region of a sunspot along with the co-temporal coronal images of the region, to show the propagation of slow waves from the transition region to corona. The authors further conjectured that these oscillations are driven by the global oscillations of the Sun, i.e., the photospheric \(p\)-modes. It is possible that the \(p\)-modes act as a broadband driver and the local magnetic configuration aids the leakage of the natural frequencies in the vicinity of the acoustic cutoff in the form of upward propagating slow waves. The amplitude of propagating slow waves is not constant but appears to be modulated over time. Assuming the local medium is relatively stable, the temporal changes in a propagating wave implies changes in the driver properties. Utilising this idea, traced the coronal slow waves across different layers of the solar atmosphere to identify their driver. High-resolution multi-wavelength observations of a sunspot, acquired from both ground-and space-based telescopes in 9 different channels, are used to perform this study. Fig. [\[kpfig1\]](#kpfig1){reference-type="ref" reference="kpfig1"} (left panel) displays the structure of sunspot across 9 wavelength channels. The fan loop structure is evident in the top two panels characterising coronal emission. The location 'B' corresponds to the foot point of a selected loop which displays propagating slow waves and the vertical dashed line connects this location across all the channels. The central panels display the corresponding Fourier power spectra of the light curves extracted from this location. The peak periods are listed in each panel. The vertical dashed lines in red denote the locations of the 3 and 5 minute periods. The shift in periodicity from 5 min in the photosphere (bottom two panels) to 3 min in the chromosphere/transition region is long-known with multiple explanations already provided in the literature. The grey bands over the spectra delineate the widths of the band-pass filter applied on the original data to obtain the light curves displayed in the right panels. The identification labels for the individual channels are listed at the bottom of the light curves. As may be seen from the light curves, the amplitude of the oscillations is periodically varying with approximately similar behaviour across all the channels. The modulation period is found to be in the range of 20\(-\)`<!-- -->`{=html}27 min. These correlated amplitude variations across different layers imply that they are clearly non local and therefore should be associated with the driver. have further demonstrated that similar modulation periods are found in the global acoustic oscillations at non-magnetic locations outside the sunspot and are fully consistent with those seen in coronal oscillations. The modulation itself is caused by the simultaneous presence of waves with closely spaced frequencies (as may be seen in the Fourier power spectra in Fig. [\[kpfig1\]](#kpfig1){reference-type="ref" reference="kpfig1"}) as noted previously by several authors and is a characteristic feature of global oscillations. These results compelled the authors to conclude that the coronal slow waves are externally driven by the global solar oscillations (\(p\)-modes) in the photosphere. A recent study by also shows similar amplitude modulation in slow waves observed in a sunspot across different layers of the solar atmosphere possibly confirming the wider applicability of this interpretation. Utilising high-resolution multi-wavelength observations of a sunspot from 16 different channels, studied the propagation of slow waves from photosphere to corona. These authors employed a time-distance helioseismic technique to cross-correlate and track the waves across different layers of the solar atmosphere. They analysed the propagation patterns of different frequencies and compared them with a numerical model to demonstrate that the observed slow waves in the corona originate from a source few megameters beneath the photosphere. It was further suggested that the interaction of \(p\)-modes with the sub-surface magnetic fields of sunspots can possibly explain the underlying source. By combining high-spatial and temporal resolution data from the ground-based Dunn Solar Telescope (DST) with the Extreme Ultraviolet (EUV) imaging data from the SDO/AIA, found \(\approx\)`<!-- -->`{=html}3 minute oscillations across different layers of the solar atmosphere. It has been further demonstrated that the coronal fan structures, where propagating slow waves are observed, are rooted at specific locations in the umbra identified by small-scale bright features called Umbral Dots (UDs) and the oscillation power at these locations in the 3-minute period band is at least three orders of magnitude higher than the surrounding umbra. The remarkable correspondence between the oscillation properties across different layers led the authors to suggest that the source of the coronal slow waves is located in the umbral photosphere. studied velocity oscillations in the photosphere of a sunspot umbra and observed similar enhancements in the 3 minute oscillation power in the vicinity of umbral dots and light bridges. Additionally, they found that these oscillations occur independent of the 5 minute oscillations seen in the rest of the umbra and display an upward propagating nature. Based on these results, in addition to the possibility that umbral dots and light bridges are locations of magnetoconvection, the authors speculated that 3 minute oscillations in sunspots are locally driven through turbulent convection as predicted previously by certain models. More recently, identified different oscillation patterns in the umbral photosphere, all centred on umbral dots that exhibit large morphological and dynamical changes. These authors again concluded magnetoconvection as a possible source of sunspot oscillations. & also find the sunspot oscillations are localised over individual cells of few arcseconds, however, to explain the multiple peaks in the oscillation spectra and their spatial distribution, the authors suggest the existence of a sub-photospheric resonator that could drive these oscillations. ### Polar regions As stated earlier, it is not trivial for long-period slow waves to propagate from photosphere to the outer solar atmosphere unless some special conditions are met. The ambiguity between wave and flow interpretations for PDs further complicates the issue. Using spectroscopic data from *Hinode*, found that line profiles near the base of a structure display flow-like signatures while those at larger distances are compatible with slow waves. The authors further concluded that both waves and flows may originate from unresolved explosive events in the lower corona. and performed 3D MHD simulations demonstrating that impulsive flow pulses injected at the base of a coronal loop naturally excite slow waves which propagate along the loop while the flows themselves rapidly decelerate with height. studied PDs of 14.5 min periodicity observed in a south polar coronal hole using spectroscopic data. They found that the spectral parameters of Ne [viii]{.smallcaps} 770 Å line exhibit correlated periodic fluctuations in intensity and Doppler shift with no corresponding signatures in line width. Besides, the spectral line profiles did not show any visible asymmetry compelling the authors to interpret the observed PDs as slow waves. The co-temporal data from N [iv]{.smallcaps} 765 Å line, representing the transition region, displays periodic enhancements in line width near the base of the PDs with no associated variations in the other two line parameters. Based on these results, the authors suggest that the slow waves observed in the investigated polar region may be triggered by small-scale explosive events in the lower atmosphere. The base of a network plume, where PDs were observed, was examined in detail by using both imaging and spectroscopic data from SDO/AIA and IRIS. Quasi-periodic brightenings were found near the base with spectral profiles occasionally displaying Doppler shifts with large deviations from the mean coincident with enhanced line widths and intensity consistent with a flow-like behaviour. The PDs observed along the plume were, however, compatible with slow wave properties. The brightenings were interpreted as due to small scale jet-like features and their correlation with the PDs, according to the authors, indicate them as a possible driver for propagating slow waves observed along the plume. A four-hour-long image sequence, capturing the evolution of a north polar coronal hole at high spatial and temporal resolutions by SDO/AIA, is analysed by to investigate the relation between the PDs observed in the corona and the spicules seen in the lower atmosphere. A direct correspondence between these two phenomena is detected in the composite images constructed by overlaying the lower-atmospheric 304 Å channel data on top of the coronal 171 Å channel data. Fig. [\[kpfig2\]](#kpfig2){reference-type="ref" reference="kpfig2"} shows one such image from their work in the left panel. While noting that a one-to-one correspondence is not always possible because of the overlapping structures along the line of sight especially near the limb, the authors demonstrate that the periodic behaviour of PDs is because of the repeated occurrence of spicules at the same location. Based on the observed speeds, it is further claimed that both type I and type II spicules contribute equally to the generation of PDs. The exact nature of the PDs is not explicitly addressed but the authors appeared to consider them as mass motions. performed a similar study by combining the high-resolution slit-jaw images of a south polar region from IRIS with the co-temporal multi-wavelength data from SDO/AIA. Data from IRIS 2796 Å, and 1400 Å channels along with the AIA 304 Å, 171 Å, and 193 Å channels were used in this study. All these channels, when combined, encompass the observations of solar atmosphere from chromosphere, through transition region, to corona. A correspondence between the spicules in the lower atmosphere and the PDs in the corona is again observed. Furthermore, it is found that the beginning of each PD coincides with the rise phase of a spicule. Brightenings are observed in coronal channels, co-temporal to the fall of spicular material, following which another PD is initiated. A composite time-distance map describing the rise and fall of spicules (as seen in IRIS 1400 Å channel) and the simultaneous propagation of PDs (as seen in AIA 171 Å channel) is shown in the right panel of Fig. [\[kpfig2\]](#kpfig2){reference-type="ref" reference="kpfig2"}. Additionally, the authors measured propagation speeds of PDs in 171 Å and 193 Å channels but could not determine if there is any temperature-dependent propagation because of the large uncertainties in their estimation. However, the presence of alternate bright and dark ridges and their continued existence at large altitudes led the authors to favour a slow-wave interpretation for the observed PDs. Finally, conjecture that both spicules and slow waves are simultaneously driven by a reconnection-like process in the lower atmosphere, of which the cold spicular material falls back while the waves continue to propagate upward. Later, based on 1D MHD modelling, show that finite-lifetime stochastic transients launched at the base of a magnetic structure can generate quasi-periodic oscillations with signatures similar to PDs along the structure. Gaussian pulses with the typical spicular timescales are used to simulate the transients in their study. An empirical atmospheric model is considered and depending on the smoothness of the thermal structure (with or without chromospheric resonant cavity), it was shown that both long and short-period PDs could be reproduced corresponding to those observed in polar plumes and active region loops, respectively. A more recent study by has further illustrated that the connection between spicules and PD-like coronal moving features is very common even in on-disk observations.\ ## Damping/Dissipation properties The slow waves are observed to fall very rapidly in amplitude with their travelling distance along the solar coronal structures. Various physical mechanisms including thermal conduction, compressive viscosity, and optically thin radiation, which could affect the wave amplitude, were identified and studied through theoretical modelling in the past (see a complete review by, in this issue). The results indicated, for typical coronal conditions, that thermal conduction is a strong contributor to the observed damping of slow waves and the effects of viscosity and radiation are negligible. Later studies revealed exceptions to this scenario in some special conditions, e.g., the dissipation by thermal conduction is insufficient to explain the rapid damping of oscillations with longer periods in typical coronal loops, while compressive viscosity may become important when the loop is super-hot and with very low density, or when anomalous transport occurs in hot flaring plasma. By constructing powermaps in different period ranges, studied the distribution of oscillatory power in three different open structures, namely, the active region fan loops, network plumes and the polar plumes. It is found that the oscillatory power at longer periods is significant up to larger distances in all the structures indicating a frequency-dependent damping. Furthermore, the measured amplitudes and damping lengths are shorter in hotter wavelength channels. These results are shown to be compatible with a propagating slow wave model incorporating thermal conduction as the main damping mechanism. The frequency dependence has been further explored by, where the authors attempted to find the exact quantitative dependence of damping length on the oscillation period. For each identified period, the Fourier amplitudes were computed as a function of distance, by fitting with an exponential decay function, from which the associated damping length is derived. Exploiting the simultaneous existence of multiple oscillation periods and combining the results from similar structures, the quantitative dependence of damping length on oscillation period is examined. Considering a power-law dependence of \(L_d \propto P^{\alpha}\), where \(L_d\) is the damping length and \(P\) is the oscillation period, the \(\alpha\) values (power-law indices) were obtained as 0.7\(\pm\)`<!-- -->`{=html}0.2 for the active region loops and network plumes and \(-\)`<!-- -->`{=html}0.3\(\pm\)`<!-- -->`{=html}0.1 for the polar region structures using AIA 171 Å channel. The corresponding values for the AIA 193 Å channel are 1.7\(\pm\)`<!-- -->`{=html}0.5, and \(-\)`<!-- -->`{=html}0.4\(\pm\)`<!-- -->`{=html}0.1, respectively. Assuming a 1D linear wave model, the authors also derived the expected theoretical dependences for different damping mechanisms, according to which, the \(\alpha\) value should lie between 0 and 2. Notably, for the case of weak thermal conduction, the expected \(\alpha\) value is 2 implying a steeper dependence and for the case of strong thermal conduction, this value should be 0 indicating no dependence or uniform damping across all periods. In reality, an intermediate value is possible depending on the strength of the thermal conduction but the obtained values are clearly deviant, especially those from polar regions, uncovering a large discrepancy between the observations and the theory of slow waves. It may be noted that the theoretical dependences (\(\alpha\) values) are calculated under the assumption that only a single dissipation mechanism works (or perhaps dominant). Indeed, the negative slopes obtained for polar regions would mean stronger damping at longer periods which is not expected from any of the dissipation mechanisms studied by in the linear regime. Also, these results appear to be in direct contradiction with, where the authors reported longer periods travelling to larger distances even in polar regions. However, it was later noted that this behaviour was due to the availability of higher power at longer periods near the base of the corona. also studied the damping behaviour of slow waves in polar regions. Their results indicate the presence of two different damping regimes, the stronger damping near the limb (\(<10\) Mm height) and weaker damping at larger heights. Furthermore, in order to understand the frequency dependence, damping lengths were measured over three predefined period bands i.e., 4\(-\)`<!-- -->`{=html}6 min, 6\(-\)`<!-- -->`{=html}15 min, and 16\(-\)`<!-- -->`{=html}45 min. No preferable dependence was found near the limb but at larger heights the damping appears to be stronger in the shorter period band which the authors explain as evidence for damping due to thermal conduction. However, it needs to be pointed out that sampling the oscillations at a larger number of periods as obtained in would be more suitable and better for understanding the period dependence. performed 3D MHD simulations based on a uniform cylinder model to investigate the damping of slow waves at multiple periods. By perturbing the pressure at one end of the loop, slow waves are driven at 4 preselected periods. The other boundary is kept open allowing the waves to propagate and escape the domain. Thermal conduction is incorporated into the model as the only damping mechanism for the waves. The gravitational stratification and the field divergence are ignored. The obtained numerical results are forward modelled to aid a direct comparison with the observations. It is found that the damping lengths are dependent on the oscillation period with a power-law index near 1 agreeing with the previous observations for active region loops. The authors also derived full solutions to the dispersion relation for thermal conduction damping, instead with the approximations made in, which shows a similar dependence. Based on this, the discrepancy in the previous results was explained as due to the differences in the damping of shorter and longer periods which conform to strong and weak thermal conduction limits, respectively. However, the negative dependence found in the polar regions remains unexplained. In order to verify and examine if the frequency dependence obtained in the polar regions is general, performed a statistical study by employing 62 datasets of polar coronal hole regions observed between 2010 and 2017 by SDO/AIA. Fig. [\[kpfig3\]](#kpfig3){reference-type="ref" reference="kpfig3"} displays the results of this study for the data from the AIA 171 Å channel. The left and right panels show the dependences obtained for the plume and interplume regions respectively. The measured slopes obtained by fitting the modal values at each period bin are \(-\)`<!-- -->`{=html}0.3\(\pm\)`<!-- -->`{=html}0.1 for plume and \(-\)`<!-- -->`{=html}0.4\(\pm\)`<!-- -->`{=html}0.1 for interplume regions. Similar values were obtained for the data from the AIA 193 Å channel. These results not only confirm those from, that the anomalous dependence of damping length on oscillation period observed in polar regions is real, but also suggest that such a damping relation is typical for slow waves in polar structures which therefore, strongly necessitates an explanation. More recently, studied the dependence of damping length on the temperature of the loop. The damping lengths of oscillations were measured in 35 loop structures (selected from 30 different active regions) and the corresponding plasma temperatures were obtained from Differential Emission Measure (DEM) analysis. Fig. [\[kpfig4\]](#kpfig4){reference-type="ref" reference="kpfig4"} displays the obtained results from this study. The left panel demonstrates the measurement of damping length (\(L_d\)) by following the phase of a sample oscillation with the obtained \(L_d\) value listed in the plot. An alternate method to estimate damping length, by directly tracking the oscillation amplitudes along the loops produces similar results. The right panel of Fig. [\[kpfig4\]](#kpfig4){reference-type="ref" reference="kpfig4"} depicts the obtained dependence of damping length on temperature. The expected values from linear wave theory considering thermal conduction as the damping mechanism are also plotted (green filled circles). The oscillation periods, densities, temperatures, and polytropic indices for the individual loop structures, extracted previously by, are incorporated into these calculations. Additionally, the expected values derived by assuming a constant value of 5/3 (adiabatic index expected in the corona) for the polytropic index are plotted (green open circles). As may be seen, the damping length is expected to decrease evidently to lower values for hotter loops but the observations appear to defy this. Based on these results, the authors concluded that thermal conduction is suppressed in hotter loops which is consistent with previous reports by. Furthermore, it may be noted that the theoretical damping length values are 2\(-\)`<!-- -->`{=html}3 orders of magnitude larger than the observed values. While this discrepancy could be partly explained by the fact that the observed damping length values are projected values (meaning they are lower limits), the authors speculate that such a large difference could alternatively imply that thermal conduction is not the dominant damping mechanism in those coronal loops. Another aspect that has become popular in recent years is the misbalance in the local thermal equilibrium caused by slow waves which in turn could affect the wave dynamics significantly. To study this effect, the heating function, \(H\), is parametrised as a function of the equilibrium parameters density \(\rho\) and temperature \(T\), and included in the energy equation of MHD in the recent models. In comparison, in earlier models, \(H(\rho,T)\) was either ignored or assumed to be a constant balanced by the other dissipative effects (e.g., radiative cooling). During the linearisation process in the modelling of waves, the partial derivatives of the heating function \(\partial H/\partial \rho\) and \(\partial H/\partial T\) play a crucial role, introducing new effects on the wave dynamics. In particular, found that these novel effects may result in additional damping of slow waves, even in the complete absence of thermal conduction. This could also be an interesting avenue to pursue the explanation of earlier results with unexpected dependence of slow wave damping on oscillation period or temperature. Indeed, it seems quite promising, because the variation of the polytropic index with loop temperature is also recovered in the model.\ ## Seismological applications One of the important applications of studying waves in the solar atmosphere is that it gives us the ability to infer important physical parameters through seismology. The common occurrence of slow magnetoacoustic waves makes them even more compelling to pursue this. Over the past decade a number of important parameters including the plasma temperature, coronal loop geometry, coronal magnetic field, thermal conduction coefficient, polytropic index, have been extracted from the observations of slow waves in combination with MHD theories demonstrating their vast potential in this area. A subset of these applications, particularly those reported in the recent years, will be discussed here in detail. Considering a cylindrical flux tube geometry for coronal loops, within the long-wavelength limit, i.e., when the wavelength of the oscillation, \(\lambda\), is much greater than the diameter of the loop, \(d\), the slow waves propagate at tube speed, \(c_t\), which is dependent on both the sound speed, \(c_s\), and the Alfvén speed, \(v_a\), through the relation \(c_t^2 = c_s^2 v_a^2/(c_s^2+v_a^2)\). From the observations of slow waves we know that the long-wavelength limit is generally applicable in the solar corona which means unless the plasma \(\beta\) is very small, the propagation speed of slow waves is not only dependent on the plasma temperature but also on the magnetic field strength. By applying this relation to the observations of standing slow waves, have earlier demonstrated that one could derive the coronal magnetic field strength. More recently, have further exploited this relation by extending it to the propagating slow waves to derive spatially resolved coronal magnetic fields over a sunspot. have shown that the propagating slow waves observed in an isolated sunspot from the active region NOAA 11366 possess multiple periodicities with longer periods dominant at farther distances from the sunspot centre. The apparent propagation speeds of longer period waves were found to be significantly smaller compared to that of the shorter periods found near the sunspot centre. By combining the speed-period and period-distance dependences, the authors derived a radial dependence of apparent propagation speed on distance. In order to estimate the real propagation speed the inclination of the magnetic field needs to be known. In principle, the local magnetic field geometry can be obtained from stereoscopic observations of propagating slow waves or magnetic field extrapolation methods. Although, each of these methods have their own intrinsic difficulties and ambiguities, the authors applied both the methods to derive the inclination of the field incorporating which they deduced the actual propagation speed (\(c_t\)) as a function of distance from the sunspot centre. The corresponding temperatures and densities were estimated employing a differential emission measure technique. Inputting these values in the expression for \(c_t\), have obtained a magnetic field strength of 32\(\pm\)`<!-- -->`{=html}5 G near the sunspot centre which is found to rapidly decrease to about 1 G over a distance of 7 Mm. It is not explicitly stated whether these values are consistent with those derived from the extrapolations. Also, in order to improve the signal, the authors had to average the observations in the azimuthal direction so they could only provide an average radial dependence of magnetic field strength but not a fully resolved spatial distribution. Furthermore, the azimuthal averaging would result in the loss of some important structure in this dimension so this is perhaps not an ideal procedure. Nevertheless, this study clearly highlights the scope of slow waves in determining one of the most important physical parameters of the corona, the magnetic field strength. Under the condition of low-plasma \(\beta\), which is generally assumed for solar corona, the tube speed \(c_t\) is almost equivalent to the sound speed \(c_s\). So it is common to associate the propagation speed of slow waves with the local sound speed which, in turn, is proportional to the square root of the corresponding plasma temperature, \(T\). Thus, one could derive the temperature of the plasma by measuring the propagation speed of slow waves. However, the observations are typically constituted of two-dimensional projected images of the oscillations and hence could only provide a lower-limit on the slow-wave speed. Availing a rare opportunity, analysed the propagation of slow waves in a coronal loop observed by two spacecrafts from two different vantage points. These stereoscopic observations made by *STEREO*/EUVI enabled the authors to study the three-dimensional propagation of slow waves and provide their true propagation speed. The obtained propagation speed was about 132\(\pm\)`<!-- -->`{=html}11 km s\(^{-1}\) corresponding to a plasma temperature of 0.84\(\pm\)`<!-- -->`{=html}0.15 MK derived under the adiabatic assumption. The observed propagation speeds are, in general, constant along the length of the loop. Earlier observations by report differential propagation of slow waves in different temperature channels indicating a sub-resolution structure within a coronal loop. However, these authors also did not find any spatial variation of propagation speeds in the individual channels. Recently, using the high-spatial resolution observations from *SDO*/AIA studied the propagation of slow waves along an active region fan loop in two different temperature channels. In addition to the differential propagation, the authors found an accelerated propagation of waves along the loop in both the channels. This enabled them to derive the spatial variation of plasma temperature along the wave propagation path. The authors employed nonlinear force-free magnetic field extrapolations to estimate the inclination of the loop and thereby deduced the deprojected propagation speeds. Fig. [\[kpfig5\]](#kpfig5){reference-type="ref" reference="kpfig5"} shows the initial observed speeds, deprojected true speeds, and the obtained temperature values as a function of distance in the left, middle, and right panels, respectively. The results for both wavelength channels are shown in the figure. The temperatures were estimated assuming isothermal propagation of slow waves although corresponding values for adiabatic propagation are also shown (dashed lines in the right panel). It may be noted that the temperature values especially near the bottom of the loop (\(\approx\)`<!-- -->`{=html}0.2 MK) are much lower compared to the previous results. This is mainly because of the lower propagation speeds observed here. It is possible that there are aperiodic downflows in the loop concurrent with the waves. Although the time-distance maps do not clearly indicate this, such flows are fairly common in sunspots. If that is the case, the true propagation speed of the wave (and hence the plasma temperature) could be higher. Nevertheless, the evidence for differential propagation is remarkably clear suggesting a multi-thermal structure within the coronal loop. The authors highlight this as an ability of slow waves to resolve the sub-resolution structure of coronal loops. Utilising the spectroscopic observations of running slow waves in a coronal loop made by *Hinode*/EIS, derived the effective adiabatic index or the polytropic index (\(\gamma_\mathrm{eff}\)) of coronal plasma. The authors employed the expected relation between the density and temperature perturbations due to a slow wave to achieve this. The required density and temperature estimations were made from appropriate spectroscopic line ratios. The authors obtained a value of \(\gamma_\mathrm{eff} =\)`<!-- -->`{=html}1.10\(\pm\)`<!-- -->`{=html}0.02, close to the isothermal value 1, implying that thermal conduction is very efficient in the solar corona. Furthermore, using the observed phase lag between the density and temperature perturbations (under the assumption that it is entirely introduced by thermal conduction), they derived the thermal conduction coefficient, \(\kappa_0 =\)`<!-- -->`{=html}9\(\times\)`<!-- -->`{=html}10\(^{-11}\) W m\(^{-1}\) K\(^{-1}\), which is of the same order of magnitude as the classical *Spitzer* conductivity. On the other hand, a similar study by using the observations of standing slow waves in hot coronal loops, resulted in a polytropic index value of 1.64\(\pm\)`<!-- -->`{=html}0.08. The proximity of this value to the adiabatic index of 5/3 (for an ideal monatomic gas) implies that thermal conduction is heavily suppressed in the investigated loop. By comparing the observed phase lag between density and temperature perturbations to that of a 1D linear MHD model, the authors suggest that thermal conduction is suppressed at least by a factor of three. investigated the behaviour of propagating slow waves in multiple fan loops from 30 different active regions. By analysing the relation between corresponding density and temperature perturbations these authors also derived associated polytropic indices which were found to vary from 1.04\(\pm\)`<!-- -->`{=html}0.01 to 1.58\(\pm\)`<!-- -->`{=html}0.12. Additionally, the authors studied their temperature dependence which indicates a higher polytropic index value for hotter loops. It was further concluded that this dependence perhaps suggests a gradual suppression of thermal conduction with increase in temperature of the loop thus bringing both the previous studies into agreement. Coming back to the new models with the thermal misbalance, these offer an excellent opportunity for slow waves to probe the coronal heating function, which is arguably the greatest mystery in solar or stellar physics. In order to study this has parameterised the heating function \(H\) as power laws of density \(\rho\) and temperature \(T\). Based on the common existence of long-lived plasma structures and the statistical properties of the slow wave damping, the authors then constrained the power-law indices of these key quantities offering an insight into the characteristics of coronal heating function. It has also been shown that the characteristic thermal misbalance time scales are on the same order as the oscillation periods and damping times of slow waves observed in various structures including flaring loops and coronal plumes. Although this investigation has been largely theoretical, it offers a lot of observational potential to make progress in the decades old question of characterising the coronal heating mechanism. For more details, please see the review by in this volume.\ # Alfvénic/Kink waves {#alfven_waves} Apart from slow magnetoacoustic waves, kink(Alfvénic) waves are also observed in the solar atmosphere at the locations of the open magnetic field regions. Alfvénic waves were suggested to have mixed properties as they propagate, having both compression and parallel vorticity and with non-zero radial, perpendicular and parallel components of displacement and vorticity. Thus kink waves under some physical conditions, could share properties of surface Alfvén waves. In this review we will use terms Alfvénic and kink interchangeably. ## Observations Both spectroscopic and imaging observations have been used to establish the presence of the Alfvénic waves in the solar atmosphere. In the following subsections we discuss them separately. ### Spectroscopic Observations {#section:Spectroscopic Observations} Perhaps one of the earliest signatures of the presence of Alfvénic and Alfvén waves (or turbulence) in the solar atmosphere comes from the observations of the nonthermal spectral line broadenings in the solar atmosphere.. The nonthermal line broadening at the location of the coronal holes was reported by using the Solar Ultraviolet Measurements of Emitted Radiation (SUMER) spectrometer, Coronal Diagnostic Spectrometer (CDS), and Ultraviolet Coronagraph Spectrometer (UVCS) on-board *Solar and Heliospheric Observatory* (SoHO). Furthermore, an increase followed by the flattening of the nonthermal line widths with height above the solar limb was noted. A similar nature of variation of the nonthermal line widths was found at the location of the coronal holes using Extreme Ultraviolet Imaging Spectrometer (EIS) on-board *Hinode* . Using the nonthermal line broadening these studies have estimated the energy flux carried by the Alfvénic waves in the solar atmosphere and found that it is enough to balance total coronal energy losses in coronal holes. Furthermore the flattening or leveling-off of the nonthermal line widths was attributed to Alfvén wave damping (see Figure [\[ntlw\]](#ntlw){reference-type="ref" reference="ntlw"}). The departure from the expected WKB theory (undamped propagation of Alfvén wave) happens as early as 0.1 \(R_{\odot}\) from the solar surface. However, recently have shown analytically and using numerical simulations that for a period averaged Alvén(ic) waves (such as those observed by SUMER with large exposure time), the nonthermal line widths are larger than the rms wave amplitude by a factor of \(\sqrt{2}\). Further, LOS integration of several structures oscillating with different polarisation and phases of oscillation cause nonthermal line widths of the order of rms wave amplitudes. These results are in contrast with those obtained in some of the above mentioned studies, where authors assume that the nonthermal line widths are smaller than the rms wave amplitudes by a factor of \(\sqrt{2}\). Thus the energy flux, which varies as the square of the rms wave amplitudes, is overestimated at least by a factor of 2 in above mentioned studies.\ Additionally, several analytical and numerical Alfvén wave models have also been made to demonstrate the propagation and dissipation of the Alfvén waves and their potential contributions in the observed line-width variations in the solar atmosphere, thus invoking the significant role of these waves in generating turbulence and/or heating . However, such studies do not consider the present day scenario of the mixed wave modes/Alfvénic wave modes and their specific physical properties and role in the line-width broadening or narrowing.\ The Coronal Multi-channel Polarimeter (CoMP, see @2007Sci...317.1192T) has established the ubiquity of Alfvénic/kink waves in the solar corona, primarily observed as propagating Doppler velocity fluctuations. reported these fluctuations have both an outwardly-and inwardly-propagating nature and a disparity between the outward and inward wave power, which could be a signal of isotropic MHD turbulence. Furthermore, observed Alfvénic waves that partially reflect while propagating up along the open magnetic field regions, such as polar coronal holes. These results demonstrate that counter-propagating Alfvénic waves exist in open coronal magnetic fields, thus providing support for Alfvén wave turbulence models (see also section [3.2.1](#section:Generation of turbulence in open magnetic field regions){reference-type="ref" reference="section:Generation of turbulence in open magnetic field regions"}). Interestingly, there is also a disparity in outward-to-inward wave power for closed magnetic fields (see @2010A&A...524A..23T [@2010ApJ...718L.102V; @2019ApJ...876..106T]). Moreover, low frequency Alfvénic waves are more likely to reflect than high frequencies (see the right panel of Figure [\[ps\]](#ps){reference-type="ref" reference="ps"}). Earlier, theoretical studies have also reported a similar behaviour for Alfvén waves. These authors reported that these waves are strongly reflected at the transition region (95%). While beyond transition region, waves with frequency lower than the critical frequency (local gradient of Alfvén velocity) reflect, which is about 30 hours (\(\sim\)`<!-- -->`{=html}1 day) at large distances from Sun. Again using CoMP, an enhancement of the power spectra in 3-5 mHz was noted in the open magnetic field regions (see Figure [\[ps\]](#ps){reference-type="ref" reference="ps"}), suggesting the possible role of p-modes in generating Alfvénic waves, as a spatially-ubiquitous input that is sustained over the solar cycle. An enhancement in power at 3-5 mHz is also seen in the intensity variations from SDO/AIA in quiet sun region and sunspots. Furthermore, have noted a wedge shape correlation between rms Doppler velocities and nonthermal line widths in the solar corona similar to Figure [\[wedge\]](#wedge){reference-type="ref" reference="wedge"}. Using Monte Carlo method, these authors suggested that the observed correlation might be due to the Alfveénic wave propagation and LOS integration of several oscillating structures. Since the amplitude of Alfvénic wave increases with height, LOS integration of several oscillating structures also increases non-thermal line widths. This lead to a wedge shape correlation. However, they artificially added a substantial amount of nonthermal broadening in the Monte Carlo simulations to match the observed nonthermal broadening. The source of this additional nonthermal bradening was not known. Later, have studied the correlation between rms Doppler velocities and the nonthermal line widths at different heights at the location of the polar coronal holes using observations from CoMP (see bottom panel of Figure [\[wedge\]](#wedge){reference-type="ref" reference="wedge"}) and numerical simulations. Combining numerical simulations and forward modelling, these authors could reproduce the observed wedge-shaped correlation without adding any artificial source of nonthermal line widths (see left panel of Figure [\[fig-wedge\]](#fig-wedge){reference-type="ref" reference="fig-wedge"}). They proposed that at least a part of the wedge-shape correlation between the nonthermal line widths and rms Doppler velocities is due to the propagation of Alfvénic waves in the solar atmosphere and a part is due to height dependence of RMS wave amplitude and non-thermal line widths. (see section [3.2.2](#section:forward modelling){reference-type="ref" reference="section:forward modelling"} for more details). Figure [\[wedge\]](#wedge){reference-type="ref" reference="wedge"} denotes a wedge shape correlation over entire solar corona (top panel) and at the location of the coronal holes (bottom panel) at different heights obtained using the data from CoMP. ### Imaging Observations {#section:Imaging Observations} In addition to the nonthermal broadening, direct observation of transverse waves have been reported in polar coronal holes. Using data from SDO/AIA, observed ubiquitous outward-propagating Alfvénic motions in the corona with amplitudes of the order of 25 \(\pm\) 5 km s\(^{-1}\), uniformly-distributed over periods of 150-550 seconds throughout the quiescent solar atmosphere. These estimates were obtained using Monte Carlo simulations, which we refer to as indirect measurements. Using these indirect measurements, the energy flux carried by these waves was estimated to be enough to accelerate the fast solar wind and power the quiet corona. Again using SDO/AIA, provided the first *direct* measurements of transverse wave motions in solar polar plumes but, in contrast to, found lower Alfvénic wave amplitudes around 14 \(\pm\) 10 km s\(^{-1}\), as well as observing a broad distribution of parameters which is skewed in favour of relatively-smaller amplitude waves. When this whole range of parameters is taken into account to calculate the energy flux carried by these waves, the energy budget, determined by direct measurement, falls 4-10 times below the minimum theoretical requirement (models require 100--200 W m\(^{-2}\) of wave energy flux near the coronal base to match empirical data, see, e.g. @1988ApJ...325..442W and @1995JGR...10021577H). Furthermore, these energy budget calculations assume a filling factor of unity in a homogeneous plasma, which corresponds to the most generous case in terms of energy flux. Thus, more realistic estimates about the inhomogeneity of the medium would yield even smaller energy fluxes (see, e.g. @2013ApJ...768..191G). conclude that transverse waves in polar coronal holes are insufficiently energetic to be the dominant energy source of the fast solar wind. Furthermore, it is interesting to note that the directly observed transverse velocity amplitudes are broadly compatible (within standard deviations) with the line-of-sight nonthermal velocities reported in plume plasma by using Hinode/EIS. If one assumes that these nonthermal velocity measurements contain contributions from both transverse (kink) waves and torsional Alfvén waves, this comparability suggests torsional Alfvén waves may not contribute strongly to plume nonthermal velocity measurements (otherwise we would expect nonthermal line-of-sight velocities to be larger). However, we must be cautious since this may also be due to a lack of large-amplitude torsional motions in plumes and/or under-resolved line-of-sight motions using our current spectrometers (see also Section [3.1.1](#section:Spectroscopic Observations){reference-type="ref" reference="section:Spectroscopic Observations"} for further discussion of nonthermal motions). Recently, utilised the NUWT automated algorithm (see @2018ApJ...852...57W for details, as well as Section 2.2 of ''Novel techniques in coronal seismology data analysis'') to analyse the transverse waves above the polar coronal hole, with a specific interest in how those properties vary with altitude. Between altitudes of 15 to 35 Mm, it was found that measured wave periods were approximately constant, and that the displacement and velocity amplitudes increased at rates consistent with undamped waves (Figure [\[Figure: Weberg et al 2020\]](#Figure: Weberg et al 2020){reference-type="ref" reference="Figure: Weberg et al 2020"}). Between 5 and 15 Mm above the limb, the relative density was inferred to be larger than that expected from 1D hydrostatic models, which may indicate a more extended transition region with a gradual change in density. ## Theoretical modelling ### Generation of turbulence in open magnetic field regions {#section:Generation of turbulence in open magnetic field regions} Although some observations presented in the previous subsection show that the omnipresent propagating Alfvénic waves have roughly enough energy to power the quiet sun, the problem of how this energy is converted to heat still persists. Because of the very high Reynolds numbers of flows in the corona (e.g. \(R_m \approx 10^8-10^{12}\), see @2005psci.book.....A), any potential damping mechanism must include the generation of scales small enough so that wave energy can be efficiently dissipated. The most popular damping mechanisms of Alfvén and kink(Alfvénic) waves are phase mixing and resonant absorption respectively. For more on the linear damping mechansism, see, e.g.,. In this subsection we will focus instead on nonlinear damping mechanisms, such as turbulence. In MHD turbulence, damping occurs through the nonlinear cascade of wave energy down to the dissipation scales. There are several wave turbulence models which deal with coronal heating and solar wind acceleration in open coronal structures. While a few compressible models are able to maintain a multi-million degree corona and accelerate the solar wind through turbulent heating, it is known that turbulent heating without compressible effects appears to be insufficient in open coronal regions, even when injecting Alfvén waves with rms velocities on the order of the full non-thermal line broadening observed in the corona. All of the previous turbulent models rely on the linear process of reflection of outgoing waves along radial Alfvén speed gradients in order to generate turbulence. The presence of nonlinearly interacting counter-propagating Alfvén waves is thought to be a necessary condition (see subsection [4.2](#section:tm_solwind){reference-type="ref" reference="section:tm_solwind"}). While this requirement still holds in incompressible and transversely homogeneous plasma, as employed in most of the previous models, it is now known that MHD waves affected by perpendicular structuring, such as surface Alfvén, kink, or Alfvénic waves can self-cascade nonlinearly, leading to what is referred to as uniturbulence, a term which is used to differentiate this turbulence generation mechanism from the counter-propagating one. The nonlinear energy cascade rate for kink waves propagating in a cylindrical flux tube was calculated recently by. It was shown that for thin coronal strands and kink wave amplitudes that are comparable to the observed ones the energy cascade time scale can be shorter than the wave period. Uniturbulence lifts the necessity for reflected waves in turbulence generation, however it relies on the presence of structuring. Such structuring may be obtained through other mechanisms, such as the parametric decay instability (see subsection [4.2](#section:tm_solwind){reference-type="ref" reference="section:tm_solwind"}). As there is ample evidence for coronal structuring perpendicular to the magnetic field, uniturbulence might play a major role in turbulence generation. Preliminary results show this is indeed the case, however more research needs to be conducted in order to estimate the added contribution to coronal heating and solar wind acceleration. ### Forward modelling of Alfvénic waves in the open magnetic field regions {#section:forward modelling} The emission observed by a telescope is projected in the plane of sky and affected by the line-of-sight (LOS) effects because of the optically thin nature of the solar corona. The LOS superposition of the emission makes the interpretation of the observed spectroscopic or imaging features difficult to interpret in the solar atmosphere. To account for the LOS effects, a forward modelling of 3D numerical simulations is needed, by which the generated synthetic spectra and images can be compared with the real observations to test the validity of the MHD models. performed the forward modelling of Alfvén waves in the solar atmosphere incorporating both wave propagation and dissipation in open and closed magnetic field regions in optically thin EUV emission lines. A fairly good match is obtained between the total intensities and the nonthermal line widths derived from the synthetic spectra and those derived from the observations of EIS and SUMER. Further, it was noted that the rms wave amplitudes obtained using forward modelling were smaller than those expected for the undamped waves (using WKB assumption) for both open and closed magnetic field regions. Wave dissipation due to counter-propagating waves and wave reflection are proposed to be the main mechanism for damping of Alfvén waves in AWSoM, causing rms wave amplitudes smaller than the expected WKB propagation. It should be noted that the perpendicular structure of Alfvén waves is prescribed by the driver, in contrast with collective fast magnetoacoustic modes of perpendicular plasma non-uniformities, the results of such modelling could be sensitive to the perpendicular structuring. In addition to the global model such as Alfven-Wave driven sOlar wind Model (AWSoM), models based on the collection of the single and multiple flux tubes are also used for studying the wave-driven turbulence. studied the effect of LOS integration of propagating Alfvénic waves in multistranded coronal loops using numerical simulations and forward modelling. They reported that the energies estimated from the derived Doppler velocities from their model are an underestimation of the actual energy present in the Alfvénic waves. Recently, has performed the 3D numerical simulations of propagating Alfvénic waves in open magnetic field regions with both transverse and longitudinal structuring leading to the reflection of waves and generation of the uniturbulence. However, it should be noted that recently have shown that the reflected wave power is quite less and the turbulence in transversely inhomogeneous plasma is primarily due to self cascading of propagating kink(Alfvénic) waves (uniturbulence). These authors performed the forward modelling for Fe XIII emission line centered at 10794Å and compared the synthetic spectra with those obtained from the CoMP. Their model was able to reproduce the observed wedge-shaped correlation between the nonthermal line widths and rms wave amplitudes. The left panel of Figure [\[fig-wedge\]](#fig-wedge){reference-type="ref" reference="fig-wedge"} shows the wedge-shaped correlation between nonthermal line widths ans rms Doppler velocities derived from the synthetic spectra. It matches reasonably well with the correlation observed in the solar corona (see Figure [\[wedge\]](#wedge){reference-type="ref" reference="wedge"}). Right panel of Figure [\[fig-wedge\]](#fig-wedge){reference-type="ref" reference="fig-wedge"} shows the variation of nonthermal line widths for different strength of velocity drivers (shown in different colors). The nature of variation matches with those observed in the solar atmosphere using the data from SUMER and EIS. The curve in black represents the variation of the nonthermal line widths with heights for a non-stratified plasma. Large nonthermal line widths in these simulations are caused by the LOS integration and uniturbulence due to transverse inhomogeneity. Comparison of the gravitationally stratified cases with the non-stratified case shows that the increase in the nonthermal line widths leading to the wedge-shaped correlation is due to the increase in the amplitude of Alfvénic waves with height (due to decrease in the density). Also, the Right panel of Figure [\[fig-wedge\]](#fig-wedge){reference-type="ref" reference="fig-wedge"} shows that the nonthermal line widths levels off with height. Though, the leveling-off of the nonthermal line widths is attributed to the wave damping, have suggested that a part of leveling-off of the nonthermal line widths could be due to the non-WKB propagation of the low frequency (large wavelength) Alfvénic waves in the gravitationally stratified plasma. The reflection of Alfvénic waves is also observed in the solar corona as explained in section [3.1.1](#section:Spectroscopic Observations){reference-type="ref" reference="section:Spectroscopic Observations"}. Though the forward modelling of the uniturbulence models have shown that the LOS effects are quite important while reproducing the observed spectroscopic properties of the solar corona, the influence of uniturbulence (with minimal LOS integration) on the nonthermal line broadening is yet to be ascertained. ## Coronal Seismology Apart from heating the solar corona Kink (Alfvénic) waves in the solar atmosphere can be used to diagnose the local plasma conditions because properties of waves depend on the properties of the medium in which they travel. Here, we will discuss the seismological application of the kink(Alfvénic) waves in the solar atmosphere, particularly in the open magnetic field regions. Recently, there have been a significant developments in diagnosing the plasma conditions using the principle of Bayesian inference. have successfully used the Bayesian inference techniques to infer the local plasma parameters and field conditions for the standing and propagating kink waves. Though there have been a plethora of studies in coronal seismology dedicated to inferring the cross field density structures and magnetic fields in closed magnetic field regions, there are limited studies on the application of the coronal seismology of propagating kink waves in the open magnetic field regions. applied the coronal seismology technique to estimate the density and magnetic field variation at the location of open magnetic field regions. The nature of variation of magnetic field with radial distance was consistent with those predicted by the potential field source surface (PFSS) model. Similarly, has estimated the density gradients studying the height variation of the amplitude of the Alfvénic waves in the open magnetic field regions. The nature of variation of density matches well with those derived in. The observed slow variation of density leads to claim that there might exists an extended transition region due to the presence of spicules. have tested the accuracy of seismologic inversion to infer magnetic field strength in open magnetic field regions using MHD simulations and forward modelling of the propagating Alfvénic waves. They found that the accuracy of inversions does not depend on the fine structuring and choice of the spectroscopic lines. Recently, and observed prevailing transverse MHD waves with CoMP (which they identified as kink waves, which have an Alfvénic nature) and used these waves, in conjunction with estimates of electron number density, to map the plane-of-sky component of the global coronal magnetic field (found to be around 1 to 4 gauss, between 1.05 to 1.35 solar radii, where these results encompass both open and closed magnetic fields). Overall, these studies indicate that Alfvénic waves are a fundamental feature of the Sun's corona. # Connection with solar wind acceleration {#solar_wind} Apart from heating the solar atmosphere and diagnosing the plasma conditions, Alfvénic waves play an important role in accelerating the solar wind. After the advent of space based observations, there has been a significant observational and theoretical advancement in this topic of research. ## Observational inputs Recent observations show that Alfvénic waves are abundant at least at the bottom of the open-field coronal hole regions. The chromosphere of open-field regions is often filled with long spicules. High-resolution and high-cadence observations from Hinode/SOT have revealed the prevalence of swaying motions of spicules, which have been interpreted as Alfvénic waves. These transverse waves have been found to reveal amplitudes of 10-25 km/s and periods of 100-500 seconds. The estimated energy flux is on the order of 100 W m\(^{-2}\), which is comparable to that required to drive the solar wind (for more detail see ). The authors claimed that the discovery of these waves supports the solar wind models based on dissipation of low-frequency Alfvén waves. However, relatively higher frequency (\(\sim\)`<!-- -->`{=html}60 s) waves have also been detected in some spicules, which may support solar wind models based on high-frequency Alfvén waves. Signatures of twisting and torsional motions have also been reported in spicules. From the chromospheric spectra taken by SST, identified both swaying motions and torsional motions. The amplitude of torsional motion is often slightly higher than that of the transverse motion. A subsequent study using IRIS observations has largely confirmed the existence of these motions. Some of these torsional motions could be related to torsional Alfvén waves, which may be associated with significant heating of the chromospheric and coronal plasma. IRIS has performed direct imaging and simultaneous spectroscopic observations of the solar transition region for the first time. The high-resolution image sequences taken by IRIS have revealed the prevalence of intermittent small-scale transition region jets from network lanes in the quiet Sun and open-field coronal hole regions. These network jets are the most prominent dynamic features in the transition region, and some of them are likely the heating signature of the chromospheric spicules, whereas others appear to be the smallest jetlets discovered from SDO/AIA observations. found that these jets exhibit swaying motions similar to that found in chromospheric spicules. In addition, the simultaneously taken spectra of Si IV 1393.77 are found to be obviously broadened at the locations of these jets, demonstrating that the well-known nonthermal broadening of transition region lines is actually related to the network jets. As stated in their paper, unresolved transverse motions associated with kink waves and torsional Alfvén waves propagating along these jets are most likely responsible for the nonthermal broadening of the transition region spectral lines. The wave amplitude was estimated to be \(\sim\)`<!-- -->`{=html}20 km/s, and the energy flux associated with the waves is 1-2 orders of magnitude higher than that required to drive the solar wind. ## Theoretical modelling {#section:tm_solwind} The acceleration and heating of the solar wind are processes that are strongly coupled. realised this by noticing that the density of the wind at the critical point increases exponentially with the temperature at the base of the corona. Hence, the only way of generating a fast wind is to deposit the heat beyond the critical point. This fact naturally led to Alfvén waves becoming a favourite candidate for accelerating the solar wind (noting that the slow magnetosonic waves do not show sufficient energy flux in the solar corona). This result has been further supported by the detection of Alfvénic fluctuations in-situ at distances 0.7-1AU by the Mariner 5 spacecraft by, and Alfvénic waves permeating the base of the corona. However, the latter observations do not detect sufficient energy flux in the Alfvénic fluctuations for coronal heating or solar wind acceleration, and the idea whether Alfvén waves and turbulence could account for solar wind acceleration and heating is still controversial. Indeed, Alfvén waves are notoriously difficult to dissipate at the base of the corona and the wave-action flux is expected to be constant with radial distance due to stratification and no dissipation (assuming radial expansion of the magnetic field in polar regions). This means that the non-linear factor \(\delta B/B\) is expected to steadily increase with radial distance. Hence, non-linear effects, which are a major candidate for Alfvén wave dissipation, become increasingly important at large distances , while super-radial magnetic field divergence may counter this effect [see the review, @2016SSRv..201...55A]. In the nearly collisionless heliospheric solar wind plasma the eventual dissipation of turbulence and heating must occur on kinetic scales and is modeled typically with hybrid or Particle-In-Cell (PIC) or Vlasov's codes (for example, see the review and recently, ). Both, compressible and incompressible models for Alfvén wave dissipation have been successful in generating a corona and accelerating the solar wind. However, these models usually rely on empirical or WKB description of the waves, and the dissipation/heating processes are not modeled explicitly (i.e., the detailed physics is not included). Moreover, the perpendicular structuring of the plasma, intrinsic for the corona, which affects dramatically the MHD wave propagation, is usually neglected in these models. Regardless of the model the aims are the same: secure a turbulent cascade and/or the generation of small-scales down to kinetic dissipation scales in which the heating can take place in the nearly collisionless plasma. In the lower solar corona and in active regions collisions are more frequent, and MHD dissipation through viscosity and resistivity may be appropriate. One way to achieve this, particularly effective at the base of the corona and in closed loops, is the nonlinear mode conversion of Alfvén waves into longitudinal waves due to the centrifugal and ponderomotive forces (see for details). Since the area expansion factor directly controls the amplitude of these forces, numerical models have been successful at generating both the slow and fast solar wind only by changing this factor and was shown first using 2.5D MHD by. Another popular mechanism is the Alfvén wave turbulence, which is discussed in the previous section, is based on the amount of wave-to-wave interaction in very low-beta plasma conditions. Alfvén wave turbulence can be achieved from linear processes as in the RMHD models, or nonlinear processes such as the parametric decay instability (PDI). An important constraint in models of incompressible Alfvén wave turbulence is the ratio of sunward to anti-sunward Alfvén wave energies. This ratio is observed to increase with distance, from a value of \(\approx0.3\) at 1.5 AU to \(\approx 0.5\) at 4 AU, a fact that appears in opposition to Alfvénic turbulence due to the expected dynamic alignment effect. Indeed, a daughter (reflected) wave is expected to decay faster than a parent wave, thereby leading to a dominant anti-sunward wave fraction and a corresponding decrease with radial distance of the sunward to anti-sunward ratio. The PDI is an instability of the Alfvén wave in compressible low beta plasmas and applies to both circularly polarised or linearly polarised waves. Assuming that the original (or parent) wave is propagating rightward, due to interaction with a compressible wave the rightward propagating Alfvén wave decays into a rightward propagating acoustic wave and a leftward propagating Alfvén wave. This nonlinear reflection is also known as backscattering. show that this kind of reflection due to compressible waves is substantial and allows to explain the observed increase in the ratio of sunward to anti-sunward Alfvénic fluctuations despite of the dynamic alignment effect. Another important dissipation mechanism for Alfvén waves in the solar wind is phase mixing (, see for details). This mechanism is efficient in the presence of large transverse density inhomogeneity such as that produced by the PDI. The effects of phase mixing on the dissipation of Alfvén waves due to background inhomogeneity in coronal holes were studied using 2.5D MHD and theoretical models in the past. One of the first fully self consistent models of fast solar wind acceleration by Alfvén waves in a transversely inhomogeneous medium in 2.5D MHD was carried out by. By conducting a first of its kind 3D MHD numerical simulation including compressible effects, show that the early nonlinear stage is dominated by phase mixing, thanks to the fast growth of the PDI (see Figure [\[fig-pdi\]](#fig-pdi){reference-type="ref" reference="fig-pdi"} (b) and (d)). On the other hand, Alfvén wave turbulence dominates the fully nonlinear stage (see Figure [\[fig-pdi\]](#fig-pdi){reference-type="ref" reference="fig-pdi"} (c) and (d)). It is therefore expected that regions with large density fluctuation (that may be attributed to the PDI), such as the coronal base and solar wind acceleration region, are likely dominated by phase mixing, while the other regions are dominated by Alfvén wave turbulence. The observed fast saturation of the non-thermal line broadening may then be a consequence of the PDI-driven large density fluctuations at the coronal base. Recently, quasi-periodic fast propagating (QFPs) waves associated with solar flares were discovered with SDO/AIA in EUV observations of coronal active regions. These waves were identified as fast magnetosonic waves using 3D MHD modeling as well as 2.5D MHD model in a waveguide, and shown to carry significant energy flux for coronal heating. On the other hand, using observations in the radio wavelengths detected signatures of QFP waves in the open coronal structure at about 1.7 R\(_{sun}\), carrying the energy flux at least an order of magnitude lower than the local radiative losses. Since the fast magnetosonic waves can travel across the magnetic field, they can potentially transfer energy flux from flaring loops to open magnetic field regions. Since the initial discovery the QFPs were observed in many events. The observations of QFPs show that the waves damp within short distance (several wavelengths) from the flaring source in an active regions, that is likely due to the combination of magnetic field divergence and wave dissipation processes. At present, the statistics and occurrence rate of the QFPs in the corona is in initial stages of study, and it is not yet known whether the QFPs are produced at sufficient rate and amplitude for coronal heating. The solar wind speed and the location of the heating are furthermore critically dependent on the photospheric perpendicular correlation length \(\lambda_0\), which sets the length scale of the dominant driver for the transverse waves. The solar wind speed generally increases with \(\lambda_0\), while the maximum temperature is almost constant with respect to it. As explained by, this is because shock heating and turbulence heating readjust. Indeed, a reduction in \(\lambda_0\) leads to enhanced turbulence heating, which then increases coronal pressure and reduces compressibility, thereby reducing the efficiency of shock heating. Values of \(\lambda_0 \lesssim 1\) Mm lead to dominant turbulence heating. However, compressibility still plays an essential role in this heating since it enhances the wave reflection via the PDI. The value of \(\lambda_0\) is determined by the properties of magnetoconvection, but its dominant spatial range is still a matter of debate. If it is determined by the photospheric kinetic energy peak then \(\lambda_0\approx1\) Mm is expected, case in which granulation (and thus the observed swaying motion of flux tubes) is the main driver. However, sub-arcsecond magnetic patches and vortex flows may be more energetically important, setting \(\lambda_0\approx0.1\) Mm. # Summary and Future directions {#summary} The progress made in recent years in our understanding of MHD waves as observed in open coronal structures is presented here. We particularly discuss the results pertaining to slow magnetoacoustic waves and Alfvénic waves alongside the role of latter in the acceleration of solar wind. The openness of coronal structures is determined based on the wave propagation lengths (with respect to the scale of the structure) but not on their magnetic connectivity. So, as such, the relevant research on propagating slow waves in active region loops is also discussed in this article. It has been long known that the slow waves observed in active region fan loops originate in the lower atmosphere. Recent high-resolution, multi-instrument, multi-wavelength observations have provided a concrete evidence to show that they are actually generated via the leakage of photospheric oscillations into the outer layers. However, different schools of thought still exist on how these photospheric oscillations are generated. Some researchers find a connection with global \(p\)-modes while others demonstrate that they are locally generated through turbulent magnetoconvection. The possible location of the source region beneath the photosphere has also been discussed. Despite having similar properties, the existence of long period oscillations observed in polar regions is difficult to explain. Their origin has been studied in relation to transient events (spicules, reconnection jets, stochastic transients, etc.) occurring in the lower atmosphere. While we are yet to find a solid evidence to pinpoint to a single source, the bigger challenge, in fact, is to clearly distinguish the PDs in terms of either slow waves or the recently discovered high-speed quasi-periodic upflows. Indeed, using simple models of slow waves and periodic flows, did not find any observational characteristics that would allow to distinguish between the two interpretations in isolation (i.e., without relying on a direct comparison between the two models) within the spatial, temporal, and spectral limits of the current instruments. On the other hand, demonstrated that the observables which are usually considered as signatures of upflows could be easily explained in terms of the wave model. Recent work has highlighted that the PDs observed in network plage regions might be more complex than a simple interpretation in terms of waves or flows. and already suggested a close relationship between PDs in the corona and (type II) spicules, based on the similarities in their properties. This was recently confirmed by, based on combining SDO/AIA and IRIS observations with numerical simulations by. Their modelling results suggest that in plage region loops, PDs are the signatures of a complex series of events where the generation of spicular flows is linked to shock waves propagating into the corona and plasma heating derived from the dissipation of both waves and electric currents. PDs are not always small-amplitude perturbations of a pre-existing coronal structure but can actually represent the formation of new coronal strands. This complexity results in a mixture (and hence wide range) of properties, particularly the propagation speeds, as aspects of real flows, shock waves and current dissipation are all present, providing a natural explanation for the apparent contradictions in the interpretation of PDs in the literature. Although they are generally reported to only contain very modest energy budgets, PDs could play a significant role in the mass and energy flow in the solar corona through their close link with spicule-driven heating. The rapid damping of slow waves has been extensively studied. It has been found that PDs in polar regions exhibit anomalous frequency-dependent damping (see Fig. [\[kpfig3\]](#kpfig3){reference-type="ref" reference="kpfig3"}) which is not compatible with traditionally considered dissipation mechanisms within the linear regime. It may seem that the damping lengths are underestimated especially for longer periods because of the instrument sensitivity or other detection limitations at large distances from the limb. However, the gradual decrease in damping length observed together with the fact that the damping lengths at longer periods are actually smaller than the possibly more reliable values at shorter periods makes these observational results convincing and therefore, requires an explanation. The temperature dependence of damping lengths in active region PDs also shows notable discrepancies with the theory (see Fig. [\[kpfig4\]](#kpfig4){reference-type="ref" reference="kpfig4"}). The results appear to suggest that thermal conduction is suppressed in hotter loops which is, although in agreement with previous observations, counter-intuitive. Further investigations are necessary to develop a proper understanding of this behaviour. The damping of slow waves due to the newly introduced thermal misbalance, is another interesting aspect to pursue further in the future. A number of applications of slow waves that are useful to probe the plasma temperature, magnetic field strength, thermal conduction, polytropic index, and coronal heating function are discussed. While noting that there are still limitations to the individual techniques applied (e.g., projection effects), one may start exploring the scope of implementing the methods over large datasets. Although indirect evidence of Alfvénic waves in the polar regions has been known since early 1970s, only after the advent of high resolution imaging and spectroscopic instruments such as AIA/SDO, EIS/Hinode, and CoMP, these waves could be resolved both spatially and temporally. Past observations and recent simulations have outlined the importance of studying the nonthermal line widths in establishing the prevalence of Alfvénic waves in the solar atmosphere and estimating the wave energy flux. The nonthermal line broadening in the corona is found to be correlated with the Doppler velocities, a feature that can be reproduced by the propagating kink/Alfvénic waves in the solar corona. However, in the transition region, IRIS observations have demonstrated the cause of nonthermal broadening is the network jets. Furthermore, the temperature dependence of the nonthermal broadening is still not well understood. Could it be related to different properties of Alfvén waves at different temperatures? Furthermore the nature of variation of the nonthermal broadening with height is shown to be dependent on temperature. For example, while the nonthermal line widths of Fe X (red, 6347Å) emission line increases with height, the nonthermal line widths of Fe XIV (green, 5303Å) emission line decreases with height in the solar atmosphere at the locations of both open and closed magnetic field regions. Our understanding is quite limited in explaining this nature of variation. Simultaneous multi-temperature and high-resolution spectroscopic observations of the chromosphere, transition region and corona, such as observations that will be made by the SPICE spectrometer on board Solar Orbiter, the proposed EUVST spectrograph, and the proposed VELC spectrograph onboard ADITYA-L1 may be required to answer these questions. There have been significant improvements in the numerical models and these have been somewhat successful in explaining a few observed properties of the solar corona. Most of these models assume a hot corona already present. Thus more efforts are needed to build a model that can self-consistently maintain the corona and reproduce the observed spectroscopic properties. Furthermore, the role of Alfvén(ic) waves in generating fine structures in the coronal plumes should be investigated in more details and compared with the observations. While MHD models could be appropriate for modeling waves and heating in the lower coronal plasma, where collisions are frequent, in the heliospheric plasma the collision are rare and the plasma and kinetic instabilities become important, as evident from in-situ observations at 1AU by Wind and other spacecraft, by Helios to 0.3AU and recently from Parker Solar Probe (PSP) in the inner heliosphere. Therefore, while MHD models could be applied to model the inertial range of turbulence and long wavelength MHD waves, kinetic models must be used to model important small-scale and kinetic processes, such as resonant dissipation of turbulence cascade, temperature anisotropies and related plasma instabilities (such as ion-cyclotron, and firehose), as well as likely Landau damping of compressional wave modes. Thus, the future direction of wave studies in open coronal structures must extend the modeling into kinetic regime in order to capture the physics of solar wind kinetic plasma processes, evident in spacecraft observations.
{'timestamp': '2021-09-22T02:11:22', 'yymm': '2012', 'arxiv_id': '2012.08802', 'language': 'en', 'url': 'https://arxiv.org/abs/2012.08802'}
null
null
null
null
# Introduction Quantum spin liquids (QSLs) represent a novel state of matter in which spins are highly entangled, but do not order nor freeze even in the zero-temperature limit . Such a state does not involve any spontaneous symmetry breaking, which is beyond Landau's paradigm for a phase and the associated transition . They are proposed to host fractional excitations and emergent gauge structures, and thus are promising candidates for quantum computation . Furthermore, high-temperature superconductivity may emerge from carrier doping a QSL . Thus, it has been a long-sought goal to achieve the QSL state. However, spins often tend to order at low temperatures . One approach to the goal is to introduce geometrical frustration into a low-spin system to enhance quantum fluctuations, so magnetic exchange interactions cannot be satisfied simultaneously among different lattice sites and the static magnetic order is prohibited . By now, a number of QSL candidates resulting from geometrical frustrations have been proposed and explored experimentally , and some typical examples include organic triangular-lattice systems \(\kappa\)-(ET)\(_2\)Cu\(_2\)(CN)\(_3\)  and EtMe\(_3\)Sb\[Pd(dmit)\(_2\)\]\(_2\) , kagomé-lattice compound ZnCu\(_3\)(OH)\(_6\)Cl\(_2\) , inorganic triangular-lattice compound YbMgGaO\(_4\)  and its sister compound YbZnGaO\(_4\) , and more recently found triangular-lattice system delafossites . The disorder-free delafossites with effective spin-1/2 moments provide an excellent platform to unveil the QSL nature in a clean system. However, for most of these QSL candidates, the magnetic or nonmagnetic disorder can be significant, and complicates the interpretation of the intrinsic physics of the investigated systems . For this reason, how disorder affects the QSL state is still a controversial issue. Recently, \(RE_3\)Sb\(_3M_2\)O\(_{14}\) as a new family of two-dimensional kagomé-lattice compounds were synthesized , where \(RE^{3+}\) represents rare-earth ions and \(M^{2+}\) denotes nonmagnetic Zn\(^{2+}\) or Mg\(^{2+}\) ions. Among these compounds, Tm\(_3\)Sb\(_3\)Zn\(_2\)O\(_{14}\) was proposed to be a QSL . The Tm\(^{3+}\) ion has an electron configuration of \(4f^{12}\) and, according to the Hund's rule, it has a total angular momentum of \(J = 6\) with a 13-fold degeneracy. Considering the crystal-electric-field (CEF) effect, the degeneracy of \(J\) will be lifted, which was suggested to give rise to a non-Kramers doublet ground state . In [3.2](#subseccef){reference-type="ref" reference="subseccef"}, we will discuss the ground state and CEF excitations in more details. There is no signature of magnetic phase transition by magnetic susceptibility, heat capacity, and muon-spin relaxation measurements, suggesting the possible realization of a gapless QSL ground state . However, it was shown that there was a significant site mixing between the magnetic Tm\(^{3+}\) and nonmagnetic Zn\(^{2+}\) sites , causing a strong disorder effect that could impact the proposed QSL state. In this work, in order to identify the role of disorder in the QSL candidates, we choose Tm\(_3\)Sb\(_3\)Zn\(_2\)O\(_{14}\) # Experimental Details Polycrystalline samples of Tm\(_3\)Sb\(_3\)Zn\(_2\)O\(_{14}\) INS experiments on 5.3-g Tm\(_3\)Sb\(_3\)Zn\(_2\)O\(_{14}\) # Results ## Structure and magnetic susceptibility Figures [\[fig1\]](#fig1){reference-type="ref" reference="fig1"}(a) and [\[fig1\]](#fig1){reference-type="ref" reference="fig1"}(b) show the schematics of the crystal structure and the two-dimensional kagomé layer of Tm\(_3\)Sb\(_3\)Zn\(_2\)O\(_{14}\) The random site mixing between the magnetic and nonmagnetic sites is expected to have a strong impact on the magnetic properties, which is indeed the case as will be discussed later. To address this issue, it is better to have a comparative compound that is isostructural to Tm\(_3\)Sb\(_3\)Zn\(_2\)O\(_{14}\) We further characterize both compounds by measuring the magnetic susceptibility (\(\chi\)) with a magnetic field of 0.1 T, and the results are shown in Figs. [\[fig1\]](#fig1){reference-type="ref" reference="fig1"}(e) and [\[fig1\]](#fig1){reference-type="ref" reference="fig1"}(f). There is no indication of long-range magnetic order down to 2 K. In addition, the absence of the bifurcation of zero-field-cooling (ZFC) and field-cooling (FC) data also indicates that there is no spin freezing at the lowest temperature measured. The inverse susceptibility is linear for most of the temperature range, except for the slight deviation at low temperatures, as shown in the inset of Figs. [\[fig1\]](#fig1){reference-type="ref" reference="fig1"}(e) and [\[fig1\]](#fig1){reference-type="ref" reference="fig1"}(f). Such a deviation may be associated with the development of short-range magnetic correlations, and is commonly observed in QSL candidates . It can also be explained with the thermal population of CEF levels and we will discuss it later. From the Curie-Weiss fits, we obtain the Curie-Weiss temperature \(\Theta_{\rm {CW}}\) of-17.4 and-28.7 K for Tm\(_3\)Sb\(_3\)Zn\(_2\)O\(_{14}\) ## CEF excitations {#subseccef} To further investigate the disorder effect in these two compounds, we measured the CEF excitations, and the experimental results are shown in Fig. [\[fig2\]](#fig2){reference-type="ref" reference="fig2"}. The experimental CEF spectra of Tm\(_3\)Sb\(_3\)Mg\(_2\)O\(_{14}\) In order to confirm the signals we have observed here indeed originate from CEF excitations, some \(\bm{Q}\) scans located at representative energy levels were performed. In Figs. [\[fig2\]](#fig2){reference-type="ref" reference="fig2"}(c) and [\[fig2\]](#fig2){reference-type="ref" reference="fig2"}(d), the behavior of monotonic decrease of intensities with increasing \(\bm{Q}\) follows the magnetic form factor of a Tm\(^{3+}\) ion, distinct from phonon scatterings. Moreover, INS results of a nonmagnetic reference compound La\(_3\)Sb\(_3\)Mg\(_2\)O\(_{14}\) show phonon scattering is only pronounced at a larger range of \(\bm{Q}\) \(\ge\) 10 Å\(^{-1}\) (Ref. ), which is far away from our currently investigated area. The rare-earth ions in the materials are strongly influenced by the electrostatic environment they occupy. Therefore, in order to quantitatively identify how the \((2J+1)\)-fold (\(J=6\)) spin-orbital degeneracy is lifted by the CEF effect, a CEF analysis was performed, and the effective Hamiltonian was obtained by the point-charge model according to the point-group symmetry, \[\label{CEF} H_{\rm CEF}=\sum_{n,m}B_n^m O_n^m,\] where \(O_n^m\) and \(B_n^m\) are the Steven operators and CEF parameters, respectively. In the following, \(B_n^m\) are calculated based on the 15 nontrivial CEF parameters shown in Table [1](#CEFp){reference-type="ref" reference="CEFp"} within the point-charge approximation. Since the CEF of Tm\(^{3+}\) at the original sites has a very low symmetry of the \(C_{2h}\) point group with eight oxygen ligands, the \(13\)-fold degeneracy of the ground-state manifold \(^3H_6\) is expected to be completely lifted. Fortunately, the diagonalization of Eq. ([\[CEF\]](#CEF){reference-type="ref" reference="CEF"}) predicts that the splitting of two low-lying singlets are small enough to be regarded as a nearly degenerate non-Kramers doublet. The effective spin in the doublet is an easy-axis moment, and the components are mostly \(J_z=\pm6\) along the easy axis. If we choose our local axes such that the two-fold rotation symmetry is about the \(y\) axis and the easy axis is the \(z\) axis, the doublet shown in Table [\[doublet\]](#doublet){reference-type="ref" reference="doublet"} can be well described by symmetric and antisymmetric combinations of \(J_z=\pm6\) states: \[\label{state} |+\rangle\approx\frac{\sqrt{2}}{2}(|6\rangle+|-6\rangle),|-\rangle\approx\frac{\sqrt{2}}{2}(|6\rangle-|-6\rangle).\] Due to the low symmetry, the CEF peaks observed experimentally are not sufficient to simulate all the CEF parameters. In addition, the disorder would further influence the simulation. In this case, we simply do the symmetry analysis and obtain the effective CEF Hamiltonian by point-charge approximation. Since the lifting of the degeneracy is mainly determined by the point-group symmetry, we think the analysis is sufficient to identify the low-lying states, which are very far away from other higher energy levels. Further fitting would revise the higher energy levels, but the components of the non-Kramers doublet would not change significantly. A similar non-Kramers doublet was also reported for Ho\(_3\)Sb\(_3\)Mg\(_1\)O\(_{14}\) (Ref. ) and Tb\(_3\)Sb\(_3\)Mg\(_2\)O\(_{14}\) (Ref. ), which share the same structure. The fitting analysis of the same structure of other crystals also supported that the symmetry analysis is qualitatively efficient for the low-lying states. For the Tm\(^{3+}\) cations at the Zn(\(1\)) sites in Tm\(_3\)Zn\(_2\)Sb\(_3\)O\(_{14}\), the ligand environment is a squashed oxygen octahedron, whose symmetry is higher than the original sites. The CEF with \(D_{3d}\) point group symmetry will split the \(13\)-degenerate states into five singlets and four doublets. It has been revealed that two low-lying singlets would compose the nearly degenerate non-Kramers doublet. The components of the nearly degenerate non-Kramers doublet ground state are primarily \(J_z=\pm6\) and \(\pm3\) states. Therefore, an effective spin-\(1/2\) can be defined in this doublet. Due to the occupations of the Tm\(^{3+}\) cations at the original and Zn(1) sites, the two different ligand environments lead to different CEF excitations, which results in a very different CEF pattern shown in Fig. [\[fig2\]](#fig2){reference-type="ref" reference="fig2"}(a). ::: ## Specific heat results We performed ultralow-temperature specific heat (\(C_{\rm p}\)) measurements of these two compounds and the results are shown in Fig. [\[fig3\]](#fig3){reference-type="ref" reference="fig3"}. Figure [\[fig3\]](#fig3){reference-type="ref" reference="fig3"}(a) shows the specific heat results of Tm\(_3\)Sb\(_3\)Zn\(_2\)O\(_{14}\) ## INS spectra We now turn to the INS measurements at low energies to gain further insights into the magnetic state. Figures [\[fig4\]](#fig4){reference-type="ref" reference="fig4"}(a)-[\[fig4\]](#fig4){reference-type="ref" reference="fig4"}(c) show the magnetic excitation spectra (raw data) collected for the polycrystalline sample of Tm\(_3\)Sb\(_3\)Zn\(_2\)O\(_{14}\) To further investigate the broad excitations centered at \(\bm{Q}~\sim\) 1 Å\(^{-1}\), we integrated the intensities with \(\bm{Q}\) ranging from 0.6 and 1.4 Å\(^{-1}\) at various temperatures, and the integrated intensities are plotted as a function of energy in Fig. [\[fig5\]](#fig5){reference-type="ref" reference="fig5"}. The intensities follow similar temperature dependence for both compounds: on the energy-loss side (\(E>0\)), intensities increase with decreasing temperature; on the energy-gain (\(E<0\)) side, the intensities are suppressed at low temperatures due to the detail balance. These results indicate that the intensities are resulting from intrinsic magnetic excitations. Moreover, the magnetic signals are dominated by the inelastic scattering, while the quasi-elastic scattering has no temperature dependence. It is reasonable that the spectral weight is mainly distributed in the inelastic channels for a system with moderate spin interactions in which \(\Theta_{\rm {CW}}\) is-17.4 and-28.7 K for Tm\(_3\)Sb\(_3\)Zn\(_2\)O\(_{14}\) # Discussions and Conclusions How do we understand the INS results given the strong site mixing demonstrated from the XRD, CEF, and specific heat results? At first glance, the low-energy magnetic excitations in Tm\(_3\)Sb\(_3\)Zn\(_2\)O\(_{14}\) experiment. Furthermore, the Zn\(^{2+}\)(1) sites are at the center of the hexagon. This will tune the kagomé lattice to triangular lattice effectively. In this case, the peak center of the excitation intensity \(\bm{Q}\sim\)`<!-- -->`{=html}1 Å\(^{-1}\) corresponds to the M point of the twice-enlarged Brillouin zone in the triangular lattice due to the reduction of the \(a\) axis by half. This is fully consistent with the observation of negative Curie-Weiss temperature for the dominant antiferromagnetic interactions. Of course, INS measurements on single crystals are desirable in order to better reveal the momentum distribution of the spectral weight. Nevertheless, our observation of the site-mixing-induced broad gapless excitations is fully in line with previous reports in YbZnGaO\(_4\) (Ref. ), Yb\(_2\)TiO\(_5\) (Ref. ), and \(\kappa\)-(ET)\(_2\)Cu\[N(CN)\(_2\)\]Cl (Ref. ). At this point, we conclude that the disorder resulting from the site mixing of the magnetic Tm\(^{3+}\) ions and the nonmagnetic ones is responsible for the absence of magnetic order, CEF excitations, specific heat, and the INS spectra. Intriguingly, the amount of disorder is manifested in the value of the residual linear term in the specific heat and the strength of the low-energy magnetic excitations. Then a natural question is what is the ground state with no disorder? One possibility is the valence-bond-solid state, in which two nearest-neighbor antiparallel spins form a singlet---such a state will not exhibit a magnetic order either . Another possibility is the gapped QSL state. In both cases, disorder will induce the low-energy magnetic excitations that contribute to the specific heat and magnetic neutron scattering. Although to distinguish these two states requires further experimental efforts, our results here demonstrate directly that by bringing disorder into such a geometrically frustrated system, a spin-liquid-like state can be induced. We believe this conclusion holds for a broad class of frustrated magnets including both the organic and inorganic compounds in the presence of either magnetic or nonmagnetic disorder. With many efforts, both experimental  and theoretical , the role of disorder in the realization towards the spin-liquid-like behaviors has been made prominent. This also poses a great challenge for experimentalists in identifying a QSL .
{'timestamp': '2020-12-17T02:08:27', 'yymm': '2012', 'arxiv_id': '2012.08722', 'language': 'en', 'url': 'https://arxiv.org/abs/2012.08722'}
# Introduction Let \(G\) be a group, and let \(I=\{\mathcal{C}_1,\dots, \mathcal{C}_k\}\) be a set of conjugacy classes of \(G\). We say that \(I\) *invariably generates* \(G\) if \(\langle x_1,\dots, x_k \rangle=G\) for all \(x_1\in\mathcal{C}_1,\dots, x_k\in\mathcal{C}_k\). The set \(I\) is a *minimal invariable generating set* (or *MIG-set* for short) if \(I\) invariably generates \(G\) and no proper subset of \(I\) invariably generates \(G\). We let \(m_I(G)\) denote the largest possible cardinality of a MIG-set for the group \(G\). We state our main theorem. (Logarithms are in base \(2\).) It is well known that \(\Delta(n)= n^{o(1)}\), therefore Theorem [\[t: main\]](#t: main){reference-type="ref" reference="t: main"} implies that \(m_I(S_n)\) is asymptotic to \(n/2\) as \(n\rightarrow \infty\). The parameter \(m_I(G)\) is the "invariable" analogue of the parameter \(m(G)\), which denotes the largest possible cardinality of a minimal generating set of \(G\) (with analogous definition). See Subsection [1.2](#subsec: context_mIm){reference-type="ref" reference="subsec: context_mIm"} for more context. In, it was asked whether \(m_I(G)\leq m(G)\) holds for every finite group \(G\), and it was proved that \(m_I(G)=m(G)\) in case \(G\) is soluble. In particular, \(m_I(S_n)=m(S_n)\) for \(n\leq 4\). In the upper bound in Theorem [\[t: main\]](#t: main){reference-type="ref" reference="t: main"}, we will in fact prove a more explicit estimate, which will have the following consequence. As we shall explain in the next subsection, this was known for large enough \(n\). ## Methods of proof For a finite group \(G\), we denote by \(k(G)\) the number of conjugacy classes of \(G\). We begin with an elementary observation. In particular, with notation as in the previous lemma, we have the following two consequences: - For every \(j=1, \ldots, t\), \(M_j\) has non-empty intersection with at least \(t-1\) non-trivial \(G\)-conjugacy classes, and therefore \(k(M_j)\geq t\). - For every \(i\neq j\), \(M_i\) and \(M_j\) are not \(G\)-conjugate. Let us see how Lemma [\[l: basic_obs_mI\]](#l: basic_obs_mI){reference-type="ref" reference="l: basic_obs_mI"} can be exploited to give a lower bound for \(m_I(S_n)\). Each conjugacy class \(\mathcal{C}\) of \(S_n\) corresponds to a particular partition, \(X_\mathcal{C}\), of the integer \(n\). On the other hand, if \(M\) is an *intransitive* subgroup of \(S_n\), then \(M\) is the stabilizer of some \(i\)-subset of \(\{1,\dots, n\}\). We say that *the integer \(i\) is a partial sum of the partition \(\mathfrak p=(a_1,\dots, a_t)\)* if we can write \(i=a_{j_1}+a_{j_2}+\cdots + a_{j_\ell}\) for some \(1\leq j_1 < \cdots < j_\ell \leq t\). It is clear that the intersection \(\mathcal{C}\cap M\) is non-empty if and only if \(i\) is a partial sum of \(X_\mathcal{C}\). We will prove the following: Proposition [\[p: partitions\]](#p: partitions){reference-type="ref" reference="p: partitions"} is almost enough to yield the lower bound in Theorem [\[t: main\]](#t: main){reference-type="ref" reference="t: main"} straight away. To complete the proof of that lower bound, we must take care of Lemma [\[l: basic_obs_mI\]](#l: basic_obs_mI){reference-type="ref" reference="l: basic_obs_mI"}(b) for proper transitive subgroups of \(S_n\). Our feeling is that the construction we give in our proof of Proposition [\[p: partitions\]](#p: partitions){reference-type="ref" reference="p: partitions"} is pretty close to being as large a set \(X\) as is possible. Note that we certainly have \(|X|\leq \frac 12n\). In view of Lemma [\[l: basic_obs_mI\]](#l: basic_obs_mI){reference-type="ref" reference="l: basic_obs_mI"} and of the considerations following it, it is clear that the upper bound in Theorem [\[t: main\]](#t: main){reference-type="ref" reference="t: main"} will be established once we prove the following result.[^1] The main point in the proof of Proposition [\[p: upper\]](#p: upper){reference-type="ref" reference="p: upper"} is to deal with the family of almost simple primitive subgroups of \(S_n\); see Theorem [\[p: locally valid\]](#p: locally valid){reference-type="ref" reference="p: locally valid"}. The key ingredient is, which determines the almost simple primitive subgroups \(G\) of \(S_n\) such that \(k(G)\geq \frac 12n\). We remark that a theorem of Liebeck and Shalev gives a general upper bound for the number of conjugacy classes of maximal subgroup of \(S_n\) of the form \(\frac n2+o(n)\). This immediately gives an upper bound for \(m_I(S_n)\) and, in light of the easy fact that \(m(S_n)\geq n-1\), yields Corollary [\[c: main\]](#c: main){reference-type="ref" reference="c: main"} provided \(n\) is large enough (this was observed also in ). We note that in Proposition [\[p: upper\]](#p: upper){reference-type="ref" reference="p: upper"} we do not use, but we use, which relies on upper bounds for the number of conjugacy classes of almost simple groups of Lie type by Fulman--Guralnick. We remark, moreover, that although Proposition [\[p: upper\]](#p: upper){reference-type="ref" reference="p: upper"} only states an upper bound for the number of maximal subgroups with at least \(\frac12 n\) conjugacy classes, results in **S**[3](#s: upper){reference-type="ref" reference="s: upper"} outline specific families of maximal subgroups. In particular, the first two terms of [\[e: pp\]](#e: pp){reference-type="eqref" reference="e: pp"} correspond to the intransitive and imprimitive subgroups of \(S_n\), respectively. This is important because our original aim in this paper was to prove that \(|m_I(G)-\frac n2| =O(\log n)\). We have managed this with the lower bound but not with the upper, precisely because \(\Delta(n)-2\), which is the number of conjugacy classes of maximal imprimitive subgroups of \(S_n\), is not \(O(\log n)\). To achieve our original aim, it would be sufficient to establish that, in the following question, \(t\leq \frac n2+O(\log n)\). We state the question in terms of properties of \(S_n\)--it is easy enough to recast it as a number-theoretic question concerning partitions, similar to Question [\[q: large_partitions\]](#q: large_partitions){reference-type="ref" reference="q: large_partitions"} above.[^2] Proposition [\[p: partitions\]](#p: partitions){reference-type="ref" reference="p: partitions"} shows that \(t>n/2-\log n\). In truth, we believe that, at least for large enough \(n\), a MIG-set of \(S_n\) of size \(m_I(S_n)\) should involve only intransitive subgroups (in the sense that the set \(J\) from Lemma [\[l: basic_obs_mI\]](#l: basic_obs_mI){reference-type="ref" reference="l: basic_obs_mI"} should contain only intransitive subgroups). This would imply that \(m_I(S_n)\leq \frac n2\), and the problem of determining \(m_I(S_n)\) would be reduced to the purely combinatorial problem addressed in Proposition [\[p: partitions\]](#p: partitions){reference-type="ref" reference="p: partitions"} and Question [\[q: large_partitions\]](#q: large_partitions){reference-type="ref" reference="q: large_partitions"}. ## Context {#subsec: context_mIm} The concept of invariable generation was introduced by Dixon, with the motivation of recognizing \(S_n\) as the Galois group of polynomials with integer coefficients. See for instance Kantor--Lubotzky--Shalev for interesting results related to invariable generation of finite groups. In, the invariant \(m_I(G)\) was introduced and studied. This is the "invariable" version of the invariant \(m(G)\), which is the largest possible cardinality of a minimal generating set of \(G\). See Lucchini for results concerning \(m(G)\) where \(G\) is a general finite group. Assume now \(G=S_n\). It is easy to see that \(m(S_n)\geq n-1\), by considering the \(n-1\) transpositions \((1,2), \ldots, (n-1,n)\). Using CFSG, Whiston proved that in fact \(m(S_n)=n-1\). But more is true. Cameron--Cara showed that a minimal generating set of \(S_n\) of size \(n-1\) is very restrictive: either it is made of \(n-1\) transpositions, or it is made of a transposition, some \(3\)-cycles, and some double transpositions (see for a precise statement). One can hardly hope for a similar "elegant" result for \(m_I(S_n)\), for the simple reason that a minimal invariable generating set of \(S_n\) of size \(t\) must contain \(t\) distinct partitions which do not have a common partial sum. Still, it is true that in the proof of the lower bound in Theorem [\[t: main\]](#t: main){reference-type="ref" reference="t: main"}, we feel somewhat restricted about the choice of the relevant partitions--but we are not able to make any precise statement in this direction. In, it was shown that, if \(G\) is a finite soluble group, then \(m_I(G)=m(G)\), which in turn is equal to the number of complemented chief factors in a chief series of \(G\). Moreover, it was asked whether \(m_I(G)\leq m(G)\) is true for every finite group. It seems that, "often", for a finite non-soluble group \(G\), the strict inequality \(m_I(G)<m(G)\) holds. Corollary [\[c: main\]](#c: main){reference-type="ref" reference="c: main"} confirms this feeling in case \(G=S_n\). We recall, however, that \(m_I(\text{PSL}_2(p))=m(\text{PSL}_2(p))\) for infinitely many primes \(p\) (see ). ## Structure of the paper and notation In **S**[2](#s: lower){reference-type="ref" reference="s: lower"} we prove the lower bound on \(m_I(G)\) given in Theorem [\[t: main\]](#t: main){reference-type="ref" reference="t: main"}. In **S**[3](#s: upper){reference-type="ref" reference="s: upper"} we prove the upper bound on \(m_I(G)\) given in Theorem [\[t: main\]](#t: main){reference-type="ref" reference="t: main"}, along with Corollary [\[c: main\]](#c: main){reference-type="ref" reference="c: main"}. We will use exponential notation for partitions, so the partition \((a_1^{n_1}, a_2^{n_2}, \ldots, a_t^{n_t})\) has \(n_1\) parts of length \(a_1\), \(n_2\) parts of length \(a_2, \ldots\), and \(n_t\) parts of length \(a_t\). For a positive real number \(x\), \(\log(x)\) denotes a logarithm in base \(2\). For a positive integer \(x\), \(\Delta(x)\) denotes the number of divisors of \(x\). # The lower bound {#s: lower} In this section we prove the lower bound in Theorem [\[t: main\]](#t: main){reference-type="ref" reference="t: main"}. We first prove a lemma, then we prove Proposition  [\[p: partitions\]](#p: partitions){reference-type="ref" reference="p: partitions"}, and finally we give a proof for the lower bound. ## Proof of Proposition [\[p: partitions\]](#p: partitions){reference-type="ref" reference="p: partitions"} Now we prove Proposition [\[p: partitions\]](#p: partitions){reference-type="ref" reference="p: partitions"}. The proof we give below is constructive--we define an explicit set \(X\) with the given properties. We have decided not to define the set \(X\) outside of this proof, as the construction is built up in pieces as the proof proceeds. In deducing the lower bound in Theorem [\[t: main\]](#t: main){reference-type="ref" reference="t: main"}, we will be interested in the properties of the partitions of \(X\) listed in the statement of Proposition [\[p: partitions\]](#p: partitions){reference-type="ref" reference="p: partitions"}, rather than their explicit construction. The paragraphs involving exceptions to this are labelled **(C1)**, **(C2)**, **(C3)** and **(C4)** in the following proof. We now deduce the lower bound of Theorem [\[t: main\]](#t: main){reference-type="ref" reference="t: main"} from Proposition [\[p: partitions\]](#p: partitions){reference-type="ref" reference="p: partitions"}. # The upper bound {#s: upper} In this section we prove the upper bound in Theorem [\[t: main\]](#t: main){reference-type="ref" reference="t: main"}, and we prove Corollary [\[c: main\]](#c: main){reference-type="ref" reference="c: main"}. Our main tool is the following result, which follows quickly from. Recall that \(k(G)\) denotes the number of conjugacy classes of a finite group \(G\). Note that the subgroups mentioned at item (2) satisfy \(n=\binom{d}{k}\) for some integer \(k\) with \(1\leq k<d/2\); and the subgroups mentioned at item (3) satisfy \(n=(q^d-1)/(q-1)\). As we observed in the introduction, the upper bound in Theorem [\[t: main\]](#t: main){reference-type="ref" reference="t: main"} follows immediately from Proposition [\[p: upper\]](#p: upper){reference-type="ref" reference="p: upper"}, which we prove now. We conclude with the proof of Corollary [\[c: main\]](#c: main){reference-type="ref" reference="c: main"}. [^1]: The idea we are using here is laid out explicitly in: For every maximal subgroup \(M\) of \(G\), denote by \(M^*\) the set of \(G\)-conjugacy classes having non-empty intersection with \(M\). Let \[\mathcal M(G)=\{M^*\mid M \text { maximal subgroups of \(G\)}\}.\] We say that a subset \(\{X_1,\dots,X_t\}\) of \(\mathcal M(G)\) is *independent* if, for every \(1\leq i\leq t\), the intersection \(\cap_{j\neq i}X_j\) properly contains \(\cap_j X_j\). We denote by \(\iota(G)\) the largest cardinality of an independent subset of \(\mathcal M(G)\). It is not hard to see, first, that \(m_I(G)\leqslant\iota(G)\) () and, second, that Proposition [\[p: upper\]](#p: upper){reference-type="ref" reference="p: upper"} yields an upper bound for \(\iota(S_n)\). [^2]: Yet another way to think of this question uses the terminology of the previous footnote. We are effectively asking the following: Let \(t\) be a positive integer and let \(M_1,\dots, M_t\) be maximal subgroups of \(S_n\) that are either intransitive or imprimitive. If \(\{M_1^*, \ldots, M_t^*\}\) is independent, then how large can \(t\) be? [^3]: Singmaster's conjecture asserts that \(b_n\) is bounded above by an absolute constant; de Weger proposes that in fact this constant can be taken to be \(4\), and evidence for the veracity of this conjecture is given in; in particular this is known to be true if \(n\leq 10^{60}\).
{'timestamp': '2020-12-17T02:13:11', 'yymm': '2012', 'arxiv_id': '2012.08815', 'language': 'en', 'url': 'https://arxiv.org/abs/2012.08815'}
null
null
null
null
null
null
# Introduction {#introduction .unnumbered} Materials crystallizing in the perovskite structure attract attention in many fields due to their high tunability and the resulting, broad spectrum of physical and chemical properties. Most applications of these materials rely on their surfaces and interfaces. The ternary chemical composition of perovskites allows for many different surface terminations with dramatically different chemical and physical behaviors. It is mostly assumed, however, that perovskites prepared by wet chemical techniques are bulk-terminated (1\(\times\)`<!-- -->`{=html}1). Theoretical modeling of catalytic processes and physical phenomena generally assume this pristine surface structure. The interfaces between two perovskites preserve the bulk crystal structure and the properties of the junction are strongly influenced by the local defect chemistry. Several emerging applications also profit from the bulk termination, such as employing ferroelectricity for optimizing or promoting catalytic reactions. Surprisingly, the available atomic-scale information on bulk-terminated cubic perovskites is quite limited. A prototypical example is SrTiO\(_3\): The most common SrTiO\(_3\)(001) surface preparation method is wet-chemical treatment. Etching with buffered-HF preferentially removes the SrO layer and leaves the surface fully covered with flat, TiO\(_2\)-terminated terraces. This method was re-examined several times; as was shown by x-ray photoelectron spectroscopy (XPS) it can induce an unintentional substitution of oxygen with F. This can be avoided by etching the surface with HCl--HNO\(_3\) or non-acidic solvents . Etched surfaces must undergo annealing to at least 600 \(^\circ\)C after introduction into vacuum to remove adsorbates. Up to this temperature, perfectly flat, TiO\(_2\)-terminated surfaces usually display a (1\(\times\)`<!-- -->`{=html}1) pattern in low-energy electron diffraction (LEED) or reflection high energy diffraction (RHEED), while a series of surface reconstructions appear after annealing at higher temperatures. Some reconstructions have been atomically resolved using scanning tunneling microscopy (STM) including the (1\(\times\)`<!-- -->`{=html}2), (2\(\times\)`<!-- -->`{=html}2), *c*(4\(\times\)`<!-- -->`{=html}2), *c*(4\(\times\)`<!-- -->`{=html}4), and *c*(6\(\times\)`<!-- -->`{=html}2), and several more on surfaces that were sputtered and annealed in ultrahigh vacuum (UHV). So far, the structural characterization of SrTiO\(_3\)(001) and other cubic perovskites was mostly based on diffraction techniques. A simple (1\(\times\)`<!-- -->`{=html}1) diffraction pattern could also stem from the bulk underneath a disordered layer, however; a true proof of a crystalline top surface requires atomically resolved imaging. For perovskite oxides this has been demonstrated only recently using non-contact atomic force microscopy (nc-AFM, AFM hereafter). This technique provides clear, atomically resolved images of the (1\(\times\)`<!-- -->`{=html}1) termination, whereas STM shows no atomic corrugation. It should be noted that the cleaving process that produces such unequivocally crystalline (1\(\times\)`<!-- -->`{=html}1) terminated SrTiO\(_3\)(001) surfaces relies on incipient ferroelectricity, and that the induced polarity necessarily results in a sizable density of charged point defects. Such cleaved surfaces can have micron-sized domains with exclusively TiO\(_2\) and SrO termination, and each contains 14\(\pm\)`<!-- -->`{=html}2% Sr adatoms and Sr vacancies, respectively. One could expect that thermal annealing heals such intrinsic point defects. Instead, this work shows that the as-cleaved SrTiO\(_3\)(001)-(1\(\times\)`<!-- -->`{=html}1) surface is unstable. Raising the temperature results in the lateral migration of the point defects, and an overlayer without long-range order forms above 400 \(^\circ\)C. Having established that AFM is capable of providing a clear picture of ordered perovskite surfaces, it was applied to SrTiO\(_3\)(001) prepared by wet etching. These samples show no signs of an ordered surface in AFM, however, raising doubts that the commonly observed (1\(\times\)`<!-- -->`{=html}1) diffraction pattern indicates a crystalline, unreconstructed surface. SrTiO\(_3\) samples doped with 0.7 at.% Nb were used. For cleaving, samples were held in a cleaving device constructed from Mo. After insertion into a UHV chamber with a base pressure below 2\(\times\)`<!-- -->`{=html}10\(^{-10}\) mbar, the device was thoroughly degassed and cooled down to room temperature (RT) prior to cleaving. Annealing was performed *via* a resistive-heating wire below the sample mount. The precision of the reported annealing temperatures is estimated as \(\pm\)`<!-- -->`{=html}30 \(^\circ\)C due to the limited thermal conductivity of the sample mount. Annealing times ranged from 30 to 60 min. Scanning--probe measurements were performed in UHV with a base pressure below 2\(\times\)`<!-- -->`{=html}10\(^{-11}\) mbar on a ScientaOmicron low-temperature STM/AFM at either \(T\)=77.7 K or \(T\)=4.8 K, using qPlus cantilevers with a separate wire for the tunneling current and a differential preamplifier. Etched tungsten tips were glued on the tuning fork and cleaned by self-sputtering in Ar atmosphere prior to the experiment. The resonance frequency of the qPlus cantilevers ranged from 25 to 80 kHz, with Q factors of \(\approx\) 50000. The STM images were obtained by applying a positive bias to the sample. All presented AFM images were acquired with an oxygen-terminated tip, \(i.e.\), surface cations appear attractive (bright) and anions repulsive (dark). Figure [1](#fig1) shows XPS and LEED results of SrTiO\(_3\)(001) prepared by the *in-situ* cleaving and after annealing at increasingly higher temperatures for 45 min each, up to 500 \(^\circ\)C. In XPS the surfaces are free of contaminants such as carbon. The core-level spectra of the constituents do not change, indicating that the overall surface stoichiometry is preserved. Despite the reducing character of the UHV environment, the elements retain their oxidation state. The as-cleaved surface exhibits a clear (1\(\times\)`<!-- -->`{=html}1) LEED pattern. The periodicity does not change various annealing steps. On the other hand, the sharpness of the LEED spots and the background intensity vary: The sharpest diffraction pattern was observed after annealing at 200 \(^\circ\)C, while further annealing degraded the pattern somewhat. A distinct (1\(\times\)`<!-- -->`{=html}1) LEED pattern is also reported throughout literature for polished SrTiO\(_3\)(001) surfaces annealed at temperatures above 600 \(^\circ\)C, necessary for degassing after introduction into UHV. Above 850 \(^\circ\)C, spots originating from *c*(4\(\times\)`<!-- -->`{=html}2) , or (1\(\times\)`<!-- -->`{=html}2) reconstructions start to appear. The surfaces of cleaved samples have SrO and TiO\(_2\) domains that span 10 to 100 \(\mu\)m. This is below the resolution of either of the techniques applied in Fig. [1](#fig1). The STM/AFM results in Figs. [2](#fig2) and [3](#fig3) show the temperature evolution of the two terminations separately. Figure [2](#fig2) focuses on the SrO termination. STM images illustrate the large-scale surface morphology, while smaller-size AFM images provide details of the atomic structure. After cleaving at room temperature the surface is atomically flat. The SrO (1\(\times\)`<!-- -->`{=html}1) surface is covered with the specific concentration of 14\(\pm\)`<!-- -->`{=html}2% of Sr vacancies, V\(_{\mathrm{Sr}}^{2-}\), apparent as black, 'missing' atoms in Fig. [2(b)](#fig2). The corresponding STM image shows a corrugation as high as a full unit cell (\(\approx\)`<!-- -->`{=html}0.4 nm), which is a purely electronic effect originating from the band bending induced by the charged Sr vacancies. Annealing at 250\(^\circ\)C results in the formation of pits at the flat SrO terraces, seen in both, STM and AFM. Their surroundings remain unreconstructed, with fewer V\(_{\mathrm{Sr}}^{2-}\) defects. Intrinsic V\(_{\mathrm{Sr}}^{2-}\) agglomerate into larger half-unit-cell-deep pits, that expose the underlying TiO\(_2\) termination. No oxygen atoms are visible within the pits; they can be considered aggregates of Schottky-type defects, formed by Sr vacancy diffusion and the formation of O vacancies. STM images of the SrO domains annealed to 250 \(^\circ\)C and 330 \(^\circ\)C show significantly smaller corrugation compared to the as-cleaved surface, consistent with a reduced band bending. Such surfaces also show a LEED pattern \[Fig. [1(b)](#fig1)\] with the lowest background intensity. Further annealing results in the lateral growth of the pits, preferentially along the \[100\] and \[010\] directions. The STM images in Fig. [2(a)](#fig2) appear considerably rougher (up to 3 layers). Annealing the SrO termination at 500 \(^\circ\)C results in a loss of the (1\(\times\)`<!-- -->`{=html}1) ordering in AFM. Instead, images locally show a short-range (2\(\times\)`<!-- -->`{=html}2) periodicity, while LEED retains the (1\(\times\)`<!-- -->`{=html}1) symmetry. The surface corrugation deduced from the AFM images is less than half unit cell. STM images exhibit larger apparent height differences, but this can be partially attributed to electronic effects, when domains with different electronic properties form. At this stage of annealing, it is no longer possible to distinguish the previously SrO-and TiO\(_2\)-terminated areas: The entire cleaved SrTiO\(_3\)(001) surface shows the same morphology in STM and AFM images as in the rightmost panels of Fig. [2a](#fig2) and Fig. [2b](#fig2), respectively. The (1\(\times\)`<!-- -->`{=html}1) LEED pattern of this surface is attributed to diffraction from the subsurface layers, while the disordered surface layer results in the increased background intensity. The evolution of the TiO\(_2\) termination with temperature is shown in Fig. [3](#fig3). After cleaving, the TiO\(_2\) termination hosts Sr\(_{\mathrm{ad}}^{2+}\) adatoms \[bright dots in Fig. [3(b)](#fig3)\], complementary to the V\(_{\mathrm{Sr}}^{2-}\) vacancies at the SrO termination. In STM, the two terminations appear very similar. Annealing above 250 \(^\circ\)C results in the formation of small, disconnected islands. The clustering of Sr\(_{\mathrm{ad}}^{2+}\) adatoms requires the presence of O\(^{2-}\) to compensate their electric charge, and indeed AFM images show the presence of anions \[dark dots in Fig. [3(b)](#fig3)\]. These SrO islands show tiny areas with a *c*(2\(\times\)`<!-- -->`{=html}2) SrO structure on top of the TiO\(_2\) termination. The intrinsic excess of Sr adatoms at the as-cleaved TiO\(_2\) termination constitute an ideal seed for the crystal growth of the next perovskite SrTiO\(_3\) layer, provided the temperature is sufficiently high for the diffusion of the adatoms and of oxygen to complete the SrO stoichiometry. The *c*(2\(\times\)`<!-- -->`{=html}2)-like areas spread with increasing temperature up to 430 \(^\circ\)C. Islands grow more connected, while still not covering the entire surface. The maximum coverage of this SrO superstructure over the TiO\(_2\) termination is limited by the initial 0.14 ML coverage of the Sr adatoms. When arranged in a *c*(2\(\times\)`<!-- -->`{=html}2) superstructure, it can cover 28% of the surface area, close to the maximum coverage observed in AFM. After annealing at 500 \(^\circ\)C the previous TiO\(_2\) termination appears disordered and becomes indistinguishable from what was the SrO termination \[rightmost panel of Fig. [2(a)](#fig2) and Fig. [2(b)](#fig2)\]. Further annealing of the mixed-termination morphology at 600 \(^\circ\)C \[rightmost panel of Fig. [3(a)](#fig3)\] does not improve the surface roughness, but instead increases the width of the pits and islands. The two opposite terminations of the as-cleaved SrTiO\(_3\)(001)-(1\(\times\)`<!-- -->`{=html}1) surface experience a complementary evolution with annealing. The pit/island creation mechanism is induced by the presence of the intrinsic, polarity--compensating point defects, \(i.e.\), Sr vacancies and adatoms. Migration of these charged V\(_{\mathrm{Sr}}^{2-}\) and Sr\(_{\mathrm{ad}}^{2+}\) point defects is activated at temperatures as low as 200 \(^\circ\)C. Moreover, when the surface is additionally enriched by Sr adatoms *via* evaporation, the adatoms are mobile at both terminations and start to aggregate at temperatures as low as 150 \(^{\circ}\)C, as shown in the Supplemental Material (SM). The disappearance/appearance of O likely originates from the exchange with the subsurface region, because lateral diffusion across the whole micrometers-wide domains is unlikely. The temperature range for migration of vacancies is slightly lower than reported in the literature for SrTiO\(_3\), but can be rationalized by the presence of electric fields related to the charged defects. Since the intrinsic point defects dominate the thermal behavior of the cleaved crystals, annealing excursions were also conducted on SrTiO\(_3\) samples prepared by a wet chemical treatment that exposes only the TiO\(_2\) termination. Full details are laid out in the SM. Two cut-and-polished SrTiO\(_3\)(001) crystals, again with 0.7 at.% Nb doping, were cleaned *ex situ* and boiled in ultra-pure water to etch away the soluble SrO termination. One sample was baked in air at 950 \(^\circ\)C prior to introduction to UHV (to create large, flat terraces) and turned out to be contaminated with carbon, alkali, and alkaline earth metals, see SM. The second sample was introduced to UHV directly after wet cleaning and was contaminated with carbon alone. Figure [4](#fig4) shows the temperature evolution of the latter sample. After annealing to mild temperatures, LEED shows a distinct (1\(\times\)`<!-- -->`{=html}1) pattern, and large-area STM images show flat terraces. In AFM, however, clumps are visible, likely due to contamination. A substantial C1s signal in XPS \[Fig. [4(d)](#fig4)\], indicates that the contaminants are carbon-based organics. Annealing at 500 \(^\circ\)C--650 \(^\circ\)C in 1\(\times\)`<!-- -->`{=html}10\(^{-7}\)--1\(\times\)`<!-- -->`{=html}10\(^{-6}\) O\(_2\) back-pressure for 1--2 h gradually removed the C, but constant-height AFM still shows a surface covered by undetermined hillocks, with no hints of the underlying substrate. A significant reduction of C occurred only after annealing at 700 \(^\circ\)C in 1\(\times\)`<!-- -->`{=html}10\(^{-7}\) mbar O\(_2\) for 2 h. This treatment resulted in a reconstructed surface with a \(\left(\sqrt{\mathrm{13}}\times \sqrt{\mathrm{13}}\right)\!\!R\mathrm{33.7}^\circ\) superstructure clearly visible in LEED and the constant-height AFM image in Fig. [4(c)](#fig4). In summary, the search for an SrTiO\(_3\)(001)-(1\(\times\)`<!-- -->`{=html}1) surface that can be considered 'pristine'---crystalline and well-ordered, with a negligible amount of defects and contaminants---was not successful so far. As-cleaved surfaces come closest, but necessarily contain both, SrO-and TiO\(_2\)-terminated domains (albeit of considerable size), and charged point defects. The temperature-induced transformation to an ill-defined, disordered top layer, indicates that the (1\(\times\)`<!-- -->`{=html}1) has a high surface energy and is only metastable. The techniques generally applied to judge surface quality (electron diffraction, XPS, large-area STM or ambient AFM) give results that would be consistent with a perfect (1\(\times\)`<!-- -->`{=html}1) termination; but are contradicted by atomically resolved nc-AFM. The same is true for the etched TiO\(_2\)-terminated surfaces that are used to great extent as substrates in the growth of heteroepitaxial oxide films. While such surfaces can display a flat morphology with a high-quality diffraction pattern, nc-AFM shows no signs of the unreconstructed surface. The temperature required for removing carbon lies above the stability region of the bulk-terminated surface. The (001) surface of SrTiO\(_3\) and other perovskites continue to be of great interest for both, probing their intrinsic properties and as substrates for heteroepitaxy. As the results presented here show, the assumption of an atomically clean, crystalline bulk-termination might not be warranted. This should be considered in the proper interpretation of experimental data. This work was supported by the Austrian Science Fund (FWF) projects Wittgenstein Prize (Z-250), Solids4Fun (F-1234) and SuPer (P32148-N36). J.X. acknowledges the support from the National Natural Science Foundation of China (91634106), China Scholarship Council and Chongqing University. M.Se. acknowledges support from the Czech Science Foundation GACR 20-21727X and GAUK Primus/20/SCI/009.
{'timestamp': '2020-12-17T02:13:51', 'yymm': '2012', 'arxiv_id': '2012.08831', 'language': 'en', 'url': 'https://arxiv.org/abs/2012.08831'}
# Experiments {#sec:evaluation} In this section we evaluate the proposed algorithm. First, we present the datasets and evaluation metrics used (Section [\[sec:experim:datasets\]](#sec:experim:datasets){reference-type="ref" reference="sec:experim:datasets"}). Second, we provide both quantitative and qualitative results on several datasets
{'timestamp': '2021-11-01T01:23:34', 'yymm': '2012', 'arxiv_id': '2012.08730', 'language': 'en', 'url': 'https://arxiv.org/abs/2012.08730'}
null
null
# Introduction GNNs, especially graph convolutional networks have demonstrated remarkable performance in modeling structured data in a wide variety of fields, such as social networks and graph-based representations of molecules. The common practice is to recursively update node embeddings by aggregating (or message passing) information from topological neighbors such that the GNNs can capture the local structure of nodes. Subsequently, the learned embeddings can be used in downstream analyses, e.g., node classification, link prediction, and graph classification. However, those GNNs fail to capture the hierarchical representations of graphs, which is essential for many scenarios. For instance, in order to predict the properties of a given molecule, it would be highly desirable to infer the sub-parts which are important for the molecular properties hierarchically. To this end, various graph pooling methods are recently proposed, aiming to learn the coarse-grained graph structure by either reserving the most informative nodes or aggregating nodes belonging to the same cluster. In particular, the latter attracts considerable attention mainly attributed to its remarkable performance. Such kind of methods learn a cluster assignment matrix to map each node to a set of clusters that may correspond to strongly connected communities within a social network or functional groups within a molecule. However, their limitations lie in that (i) simply grouping node features fails to effectively model the part-whole relationship that is crucial in characterizing the hierarchical structure, and (ii) they ignore the entanglement of the latent factors behind node embeddings, resulting in limited capacity in preserving detailed node/graph properties and modeling graph hierarchy. For example, it is of particular importance to consider the interaction of heterogeneous factors (e.g., work, hobby) underlying each node, in order to identify the communities in a social network. Capsule neural networks (CapsNets) have proved its effectiveness in modeling hierarchical relationships on image data by exploiting the fact that while viewpoint changes have complicated effects on pixel intensities, they have linear effects at the part/object level. In contrast to convolutional neural networks, CapsNets use activity vectors or pose matrices to represent the entities. Moreover, the viewpoint-invariant relationship between the part and the whole is characterized by trainable transformation matrices, which is under the assumption that the human visual system relies on parse tree-like structure to recognize objects. Such representations make CapsNets especially appealing in reasoning the part-whole hierarchy and robust to adversarial attacks. However, how to effectively take advantage of CapsNets to benefit graph classification remains largely unexplored. In this work, we present the hierarchical graph capsule network (HGCN) that is able to jointly learn node embeddings and extract the hierarchical structure of the input graph. Specifically, to preserve detailed node/graph information, we build graph capsules by disentangling heterogeneous factors behind the node embeddings such that each capsule encodes different properties of the same entity. In order to capture the graph hierarchy, multiple graph capsule layers are stacked to get coarser and coarser representations. In each layer, (i) to infer the votes of instantiation parameters of higher-level capsules (wholes), we propose transformation GNNs to reason about the part-whole relationship by explicitly considering the structure information among lower-level capsules (parts); (ii) each of these votes that are weighted by a routing weight, are iteratively routed to the potential wholes that correspond to tight clusters in the votes. We further introduce the auxiliary graph reconstruction to enhance the representation capacity of graph capsules and the training stability. As a consequence, HGCN is capable of modeling hierarchical representations of the input graph and benefits the goal of graph classification. Our main contributions can be summarized as: (i) we propose a novel capsule-based graph neural network to learn node embeddings and hierarchical graph representations simultaneously, (ii) we demonstrate the effectiveness of considering the entanglement of latent factors and the structure information within the parts in modeling part-whole relationships on the graph data; (iii) comprehensive empirical studies demonstrate that our method achieves remarkably superior improvement over the state-of-the-art approaches on 11 commonly used benchmarks. # Related Work EigenPool introduced a graph pooling that used the local graph Fourier transform to extract subgraph information. Its potential drawback lies in the inherent computing bottleneck for the Laplacian-based graph Fourier transform, given the high computational cost for the eigendecomposition of the graph Laplacian. EigenPooling summarize the subgraph information by also considering the subgraph structure; e local graph Fourier transform MinCutPool spectral clustering; is a well-known clustering technique that leverages the Laplacian spectrum to find strongly connected communities on a graph; eigendecomposition of the Laplacian is expensive; does not require to compute the spectral decomposition; Haar graph pooling (ICML 2020): compressive Haar transforms; it is computed by following a sequence of clusterings of the input graph; the compressive Haar transform filters out fine detail information in the Haar wavelet domain. GMN: these models are not efficient as they require an iterative process of message passing after each pooling layer; cluster-based; assignment matrix-based ### Graph Neural Networks GNNs attempt to exploit the structure information underlying graph structured data in order to benefit various downstream tasks. Recent studies have proved GNNs' wide applicability in, for example, drug discovery, protein interface prediction, and recommendation system. Current GNNs can be mainly summarized as two streams: spectral-based methods and spatial-based methods. The spectral-based methods largely rely on the convolution operation defined in the Fourier domain with spectral filters. This kind of method is further simplified and extended by introducing polynomial spectral filters or linear filters. To deal with arbitrarily structured graphs, the spatial-based methods define convolutions directly on the graph by aggregating features from topological neighbors. ### Graph Pooling It is widely recognized that pooling operation plays an important role in graph classification which requires the graph level representation. The most straightforward way is, to sum up, or take an average of all node features. The limitation of such strategy is that the hierarchical information which is crucial in capturing graph structure is not considered. Inspired by the downsampling in convolutional neural networks, recent studies propose to adaptively keep the most informative nodes in a hierarchical manner, or aggregate maximal cliques by only using topological information. Another line of work focuses on finding strongly connected communities on a graph. This is typically achieved by learning a cluster assignment matrix in order to map each node to a set of clusters. Most recent studies approach this problem by leveraging more advanced clustering techniques, such as local graph Fourier transform, spectral clustering, and compressive Haar transforms. However, simply grouping node features has limited capacity in modeling the part-whole relationships, especially for biological data. In this work, we reason about the part-whole hierarchy by exploring the interaction of underlying latent factors and structure information among the parts, then use an routing mechanism to assign the parts to wholes. ### Capsule Networks A capsule is a group of neurons whose orientation represents the instantiation parameters such as pose (position, size) of an entity (e.g., an object). The probability that the entity exists can be represented by the capsule length or a logistic unit. Compared to a single neuron, a capsule contains different properties of the same entity and can preserve hierarchical relationships between lower-level capsules (e.g., eyes, mouth) and higher-level capsules (e.g., face). Such part-whole relationships are described by trainable transformation matrices which are viewpoint-invariant. Concretely, a lower-level capsule (part) makes predictions for the pose of each higher-level capsule (whole) by multiplying its own pose by the transformation matrices. Routing-by-agreement is then performed between two adjacent capsule layers to update the probability with which a part is assigned to a whole. Inspired by this, GCAPS-CNN builds capsules on graphs by considering higher-order statistical moments as instantiation parameters. Normal graph convolution is then carried out to aggregate information from neighbors and the covariance is computed as the permutation invariant feature for graph classification. Its most obvious drawback lies in that the hierarchical structure of the graph is not considered. Different from GCAPS-CNN, we explicitly take into account the hierarchy between two consecutive capsule layers through trainable transformation GNNs. CapsGNN uses multiple GNN channels to build graph capsules and follow the same voting strategy as to predict higher-level capsules. However, simply using the transformation matrix ignores the local structure information among lower-level capsules and fails to describe part-whole relationships in graphs. Our method introduces transformation GNNs to reason about the pose of each whole in the layer above, which is in contrast to each individual part making its own prediction. A further advantage of transformation GNNs is that they save orders of magnitude of memory compared to transformation matrices used in previous work. Furthermore, different from CapsGNN that reconstructs the histogram of input nodes, we reconstruct the adjacency matrix of the input graph to ensure the quality of graph capsules and enhance the training stability. #### Disentangled Representation Learning We dynamically disentangle the node representations 1. PAYLESS ATTENTION WITH LIGHTWEIGHT AND DYNAMIC CONVOLUTIONS 2. dynamic convolution: attention over convolution kernels 3. Disentangled graph convolutional networks # Preliminaries ### Graph Classification A graph \(G\) with \(N\) nodes is represented as \((\mathbf{A},\mathbf{X})\), where \(\mathbf{A}\in\{0,1\}^{N \times N}\) is the adjacency matrix, and \(\mathbf{X} \in \mathbb{R}^{N \times d}\) is the node feature matrix with feature dimension \(d\). Given a set of labeled graphs \(\mathcal{D}=\{(G_1, y_1),(G_2, y_2)...\}\), the goal of graph classification is to learn a mapping \(f:\mathcal{G} \rightarrow \mathcal{Y}\), where \(G_i \in \mathcal{G}\) and \(y_i \in \mathcal{Y}\). For example, each graph is a molecule, and its label indicates whether it is toxic. ### Graph Neural Networks To extract useful information from local neighborhoods, our method is built upon GNNs by following the general \"message-passing\" paradigm, which is formulated as: \[\mathbf{H}^{(l+1)}=\mathcal{M}(\mathbf{A},\mathbf{H}^{(l)};\mathbf{W}^{(l)}),\] where \(\mathcal{M}\) indicates the message passing function with various possible implementations, \(\mathbf{W}^{(l)}\) is learnable weight matrix, \(\mathbf{H}^{(l+1)}\) and \(\mathbf{H}^{(l)}\) are the node embeddings of layer \(l+1\) and \(l\), respectively. The input node embeddings \(\mathbf{H}^{(1)}\) are initialized using the node feature \(\mathbf{X}\), i.e., \(\mathbf{H}^{(1)}=\mathbf{X}\). The final node representations are denoted by GNN\((\mathbf{A}, \mathbf{X})=\mathbf{H}^{(L_\text{GNN})}\in \mathbb{R}^{N \times h}\) with \(L_\text{GNN}\) iterations. # Methodology In this section, we begin by first briefing the proposed HGCN as shown in Figure [\[fig:framework\]](#fig:framework){reference-type="ref" reference="fig:framework"}, then we detail each component in the following sections. The goal of HGCN is to jointly learn node embeddings and coarsen the graph through exploiting hierarchical information. To achieve this, we disentangle node representations to build the graph capsule by considering heterogeneous factors underlying each edge connection. Therefore, each graph capsule is composed of multiple independent latent factors that represent different properties of the same entity. To learn hierarchical graph representations, transformation GNNs (TGNNs) are proposed to encode the part-whole relationship between lower-level and higher-level graph capsules. Specifically, a capsule in one layer votes for the instantiation parameters of each capsule in the layer above through TGNNs which highly depend on the structure information of lower-level capsules. Each of these votes is then routed to a higher-level capsule that receives a cluster of similar votes by a routing-by-agreement strategy. To encourage the graph capsules to encode the instantiation parameters of the input graph and also enhance the training stability, we further introduce the auxiliary graph reconstruction to reconstruct the input adjacency matrix. ## Disentangled Graph Capsules In most cases, highly complex interactions are involved in the connection between each node pair in a graph. For example, the edges between a node and its neighbors in a social network are driven by heterogeneous factors, since a person connects with others for various reasons such as exercise, work, etc. Therefore, it is necessary to disentangle the explanatory factors of variations underlying the node representations. Furthermore, each node embedding is considered as multiple individual scalar features in existing GNNs, which are proved to have limited capability in preserving the graph properties. To address these two limitations, motivated by, we propose graph capsules to describe the given graph. Specifically, we disentangle the latent factors of each node embedding and use the disentangled node representation to represent graph capsules (Figure [\[fig:framework\]](#fig:framework){reference-type="ref" reference="fig:framework"}A). In this way, each graph capsule is composed of multiple heterogeneous factors, and each factor describes a specific instantiation parameter of the entity/node. Formally, given \(G=(\mathbf{A}, \mathbf{X})\), the node \(i\) is denoted by \(\mathbf{x}_i \in \mathbb{R}^d\). We project the input node features into \(K\) different subspaces, assuming that there are \(K\) latent factors/instantiation parameters: \[\mathbf{z}_{i,k}=\sigma (\mathbf{W}_k^T \mathbf{x}_i) + \mathbf{b}_k,\] where \(\mathbf{W}_k \in \mathbb{R}^{d \times \frac{h}{K}}\) and \(\mathbf{b}_k \in \mathbb{R}^{\frac{h}{K}}\) are learnable parameters, \(\sigma\) is a nonlinear activation function, and \(\frac{h}{K}\) is the dimension of each factor. Although more sophisticated implementations of node disentanglement are possible, we use linear projection in our study attributed to its efficiency and remarkable performance. Therefore, each graph capsule is represented by a pose matrix \(\mathbf{Z}_i \in \mathbb{R}^{K \times \frac{h}{K}}\). For simplicity, we reshape \(\mathbf{Z}_i\) to the vector format \(\mathbf{z}_i \in \mathbb{R}^h\). Recall that the existence probability of an entity represented by a capsule is measured by the capsule length, we thus squash \(\mathbf{z_i}\) as follows: \[{\mathbf{p}}_{i}= squash(\mathbf{z}_{i}) = \frac{\|\mathbf{z}_{i}\|^2}{1+\|\mathbf{z}_{i}\|^2} \frac{\mathbf{z}_{i}}{\|\mathbf{z}_{i}\|},\] where \(\mathbf{u}_i^{(1)} = {\mathbf{p}}_{i} \in \mathbb{R}^{h}\) is the primary graph capsule representing the lowest level of entities, such as atoms in the molecular graph. ## Hierarchical Capsule Layers To obtain hierarchical graph representation, it is essential to capture the part-whole relationship between adjacent capsule layers. Such relationship is measured by viewpoint-invariant transformation matrix \(\mathbf{T}^{(l)}_{i,j} \in \mathbb{R}^{d_{l} \times d_{l+1}}\) for each pair of lower-level capsule \(\mathbf{u}^{(l)}_i\) and higher-level capsule \(\mathbf{u}^{(l+1)}_j\) in previous studies, where \(d_l\) and \(d_{l+1}\) are the capsule dimensions of \(\mathbf{u}^{(l)}_i\) and \(\mathbf{u}^{(l+1)}_j\), respectively. However, \(\mathbf{T}^{(l)}_{i,j}\) totally ignores the structure information within \(\mathbf{u}^{(l)}\), which is especially problematic for graph structured data. Furthermore, \(\mathbf{T}^{(l)} \in \mathbb{R}^{N_{l} \times N_{l+1} \times d_{l} \times d_{l+1}}\) is extremely memory-consuming for the scenario where a large number of high-dimensional capsules are required. To overcome these difficulties, we propose the transformation GNNs (TGNNs) to vote for the instantiation parameters of higher-level graph capsules (**voting**). When multiple votes agree, a higher-level capsule that receives a cluster of similar pose votes becomes active (**routing**). More concretely, we denote the graph capsules at layer \(l\) as \(\mathbf{u}^{(l)} \in \mathbb{R}^{N_l \times d_l}\), the capsule number as \(N_l\), and the adjacency matrix as \(\mathbf{A}^{(l)}\). Our goal is to decide which capsules to activate in \(\mathbf{u}^{(l+1)} \in \mathbb{R}^{N_{l+1} \times d_{l+1}}\) and how to assign each active lower-level capsule \(\mathbf{u}^{(l)}_i\) to one active higher-level capsule \(\mathbf{u}^{(l+1)}_j\). In practice, we set \(N_{l+1} < N_l\) in order to get coarser and coarser graph representations (Figure [\[fig:framework\]](#fig:framework){reference-type="ref" reference="fig:framework"}A). ### Voting For all capsules in \(\mathbf{u}^{(l)}\), their poses are transformed by TGNNs to cast votes for the pose of each capsule in \(\mathbf{u}^{(l+1)}\) by the following equation, \[\mathbf{v}^{(l)}_j = \text{TGNN}_j(\mathbf{A}^{(l)}, \mathbf{u}^{(l)}),\] where \({\mathbf{v}}^{(l)}_j \in \mathbb{R}^{N_l \times d_{l+1}}\). Specifically, \({\mathbf{v}}^{(l)}_{j|i} \in \mathbb{R}^{d_{l+1}}\) is the vote for the pose of \(\mathbf{u}^{(l+1)}_j\) predicted by the capsule \(\mathbf{u}^{(l)}_i\). Note, TGNNs are learned discriminatively and could learn to represent part-whole relationships by considering the structure information of capsules in \(\mathbf{u}^{(l)}\). This is different from previous studies that use one transformation matrix for each pair of \((\mathbf{u}^{(l)}_i, \mathbf{u}^{(l+1)}_j)\). Compared to transformation matrices, TGNNs also save \(N_l\) orders of magnitude memory. ### Routing Each of these votes is then weighted by an routing weight \(c^{(l)}_{i,j}\) with which a part is assigned to a whole, where \(c^{(l)}_{i,j} \geqslant 0\) and \(\sum_{j=1}^{N_{l+1}} c^{(l)}_{i,j}=1\). Here, \(c^{(l)}_{i,j}\) is iteratively updated using an \"routing-by-agreement\" mechanism such that each vote in \({\mathbf{v}}^{(l)}\) is routed to a capsule in \(\mathbf{u}^{(l+1)}\) that receives a cluster of similar votes (Figure [\[fig:routing\]](#fig:routing){reference-type="ref" reference="fig:routing"}). Formally, \(c^{(l)}_{i,j}\) is defined as \(c^{(l)}_{i,j} = {\text{exp}(b^{(l)}_{i,j})}/{\sum_k \text{exp}(b^{(l)}_{i,k})}\), where \(b^{(l)}_{i,j}\) is initialized as \(b^{(l)}_{i,j}=0\). To iteratively search for the vote cluster, in each iteration we have, \[\mathbf{u}^{(l+1)}_j = squash(\sum_i c^{(l)}_{i,j}\mathbf{v}^{(l)}_{j|i})\] where \(\mathbf{u}^{(l+1)}_j\) is the predicted capsule \(j\) in layer \(l+1\), representing a tight cluster of votes from layer \(l\). We update \(b^{(l)}_{i,j}\) with \(b^{(l)}_{i,j} = b^{(l)}_{i,j} + a^{(l)}_{i,j}\), where \(a^{(l)}_{i,j} = \mathbf{v}^{(l)}_{j|i} \cdot \mathbf{u}^{(l+1)}_j\) indicates the agreement between each vote and vote cluster. It is worth mentioning that such top-down feedback also has a beneficial effect on the aggregation in the proposed TGNNs, such that TGNNs can more focus on aggregating information from neighbors that are likely to be in the same cluster. After \(R\) iterations, we get higher-level graph capsules \(\mathbf{u}^{(l+1)}\) and the coarsened adjacency matrix defined as \(\mathbf{A}^{(l+1)}={\mathbf{C}^{(l)}}^T \mathbf{A}^{(l)} \mathbf{C}^{(l)} \in \mathbb{R}^{N_{l+1} \times N_{l+1}}\). As opposed to generating structurally independent higher-level capsules in previous work, the capsule layer we developed is able to explicitly preserve the structure information which is encoded in \(\mathbf{A}^{(l+1)}\). Drawing inspiration from, we add a residual connection at each pair of consecutive capsule layers, aiming to provide fine-grained information to higher-level capsules (Figure [\[fig:framework\]](#fig:framework){reference-type="ref" reference="fig:framework"}B). Formally, we have \(\mathbf{u}^{(l+1)} \leftarrow \mathbf{u}^{(l+1)} + \text{GA}(\mathbf{u}^{(l)})\), where \(\text{GA}\) indicates the global average operation. By stacking multiple capsule layers, we get the class capsules \(\mathbf{u}^{(L)} \in \mathbb{R}^{O \times d_L}\) which are intended to encode feature attributes corresponding to the class, where \(O\) is the number of graph categories. The classification loss is measured by a margin loss which is formulated as: \[\begin{aligned} \mathcal{L}_{m}(\mathbf{A}, \mathbf{X}) = {} & \sum\limits_{o \in O} [T_o \hspace{0.1cm} \text{max}(0, m^+-\|\mathbf{u}^L_o\|)^2 + \\ & \lambda(1-T_o) \hspace{0.1cm} \text{max}(0, \|\mathbf{u}^L_o\|-m^-)^2], \end{aligned}\] where \(m^+=0.9\), \(m^-=0.1\), \(T_o=1\) iff the input graph has label \(o\), and \(\lambda\) is ued to stop the initial learning from shrinking the length of class capsules. ## Auxiliary Graph Reconstruction To encourage the graph capsules to encode the instantiation parameters of the input graph and to improve the training stability, we introduce a reconstruction loss to constraint the capsule reconstruction to closely match the class-conditional distribution. Specifically, we first mask out all but the winning capsule (the capsule corresponds to ground truth) and combine them with primary capsules by following the equation, \[\mathbf{Z} = \mathbf{u}^{(1)} + (\mathbf{W}_r^T \Phi(\mathbf{u}^{(L)}) + \mathbf{b}_r),\] where \(\mathbf{Z} \in \mathbb{R}^{N \times d_1}\), \(\Phi\) is the mask operation, \(\mathbf{W}_r \in \mathbb{R}^{(O \times d_L) \times d_1}\), and \(\mathbf{b}_r \in \mathbb{R}^{d_1}\). The reconstruction loss is then defined as, \[\mathcal{L}_{r}(\mathbf{A}, \mathbf{X}) =-\frac{1}{N^2}\sum_{j=1}^N \sum_{k=1}^N\sum_{c\in\{0,1\}} \mathbf{A}^{(j,k,c)}log(\mathbf{\tilde{A}}^{(j,k,c)}),\] where \(\mathbf{\tilde{A}}=\mathbf{Z} \mathbf{Z}^T\) is the reconstructed adjacency matrix of the input graph. Taken together, we reach the optimization objective of our method as \(\min\limits_{\theta} \sum\limits_{G \in \mathcal{D}} \mathcal{L}_m(\mathbf{A}, \mathbf{X}) + \beta \mathcal{L}_r(\mathbf{A}, \mathbf{X})\), where \(\theta\) are all learnable parameters, and \(\beta\) leverages the importance of \(\mathcal{L}_r\). The whole training process is detailed in Algorithm [\[alg:alg_1\]](#alg:alg_1){reference-type="ref" reference="alg:alg_1"}.
{'timestamp': '2021-03-30T02:21:28', 'yymm': '2012', 'arxiv_id': '2012.08734', 'language': 'en', 'url': 'https://arxiv.org/abs/2012.08734'}
# Conclusions {#sec:conclusions} We explored the To achieve this, a future research direction would be to not just model but also predict cross-device behaviour. # Introduction {#sec:introduction} Information retrieval ([IR]{acronym-label="IR" acronym-form="singular+abbrv"}) technology is at the heart of today's e-commerce platforms, in the form of search engines, recommenders, and conversational assistants that connect users to the products they may be interested in . To help improve the effectiveness of [IR]{acronym-label="IR" acronym-form="singular+short"} technology in an e-commerce context, the problem of analyzing, modeling, and, ultimately, predicting customers' purchase intent has been studied extensively in academia and industry  Here, purchase intent is defined as a predictive measure of subsequent purchasing behavior . Figure [\[fig:teaser\]](#fig:teaser){reference-type="ref" reference="fig:teaser"} illustrates the complexities of customer behavior during a sequence of sessions, when multiple tasks, interests, and devices may play a role. Areas in the back of the figure are meant to signify different user journeys across time, purple for one that is focused on fridges, yellow for one that is focused on a birthday present. Colored rectangular blocks in the front indicate different devices used by the user. Initial exploration of a relatively expensive item (a fridge) starts on a smartphone and continues on a tablet, while the journey ends with a purchase of a fridge on a PC. The purchase of a fridge is interleaved with the purchase of a (lower-priced) birthday present, with initial exploration on a PC, followed by further exploration on a TV and PC, and, ultimately, a purchase on a PC. Online search behavior that targets transactions has been analyzed at scale at least since the work by , who identified a class of so-called *transactional* queries, where the user is seeking to reach a page with more interaction opportunities, e.g., to conduct a purchase, download or sign-up. In particular, factors influencing online purchases have been described as early as in 2002 , and work on predicting purchases goes back to at least to the work of , where the task was to predict whether a given customer is going to purchase within a given session. Despite the many advances, purchase intent prediction still has many challenges . In particular, previous work on purchase intent prediction has focused mostly on customers of an e-commerce platform who are identified or recognized by the platform. A diverse range of models has been considered, from traditional feature-based models such as boosted decision trees to sequence-based neural models such as RNNs. However, based on the analysis of de-identified data from an e-commerce website available to us, more than 50% of traffic comes from anonymous users. Purchase intent detection for anonymous users is particularly challenging because it cannot rely on historical information about the user on which many of the existing models rely. In this paper, we focus on identifying signals that suggest purchase intent in an anonymous and identified setting. We do this by analyzing purchase vs. non-purchase sessions sampled from a large European e-commerce website and testing the features based on our observations on a production-ready model. We further test the obtained feature sets on five other classifiers to explore the generalizability of our findings. In particular, we include features derived from session-based data such as page dwell time and customer-specific data such as the number of days since the last purchase. Session-based features have the advantage that they are available both during sessions when a user is identified (i.e., the customer has logged-in or is recognized through cookies) and anonymous sessions (when the customer is not known). Customer-related features are only available during identified sessions. Interestingly, many of the features proposed previously  apply only to identified sessions: *purchase intent prediction for anonymous sessions has been studied very little*. To fill this gap, we analyze a dataset of more than 95 million sessions, sampled from four weeks of anonymized user interaction data in a European e-commerce platform. We answer the following research questions: *RQ1: How do purchase sessions differ from non-purchase sessions?* In Section [\[section:characterizingpurchaseintent\]](#section:characterizingpurchaseintent){reference-type="ref" reference="section:characterizingpurchaseintent"} we compare purchase vs.  non-purchase sessions in such aspects as session length, temporal variations, device and channel type, queries. Among others, we find out that purchase sessions tend to be longer than non-purchase ones, customers are more likely to purchase in the evening and during a weekday, and more likely to own more than 1 device. *RQ2: What are the important session-based features that allow us to tell purchase sessions apart from non-purchase sessions? What are the important historical features that should inform predictors for identified sessions? How does the importance of features change across the session?* Based on the experiments described in Section [\[section:predictingpurchaseintent\]](#section:predictingpurchaseintent){reference-type="ref" reference="section:predictingpurchaseintent"}, we conclude that historical features related to previous purchasing behavior are highly important for detecting purchases in the identified setting. For the anonymous setting, however, dynamic features related to page dwell time and sequence of pages are most important. Besides, the importance of dynamic features increases as the session continues, while the importance of static features decreases. *RQ3: How effective are models used for purchase intent prediction for anonymous vs. identified sessions? Furthermore, to which degree do the proposed features help improve performance for anonymous sessions?* In Section [\[section:predictingpurchaseintent\]](#section:predictingpurchaseintent){reference-type="ref" reference="section:predictingpurchaseintent"}, we show that in the anonymous setting, tree-based and neural classifiers demonstrate the best performance, and adding extra features to models improves \(F_{1}\) by about 17%. In contrast, for identified setting all models demonstrate high performance and adding extra features do not provide a significant gain.
{'timestamp': '2020-12-17T02:11:33', 'yymm': '2012', 'arxiv_id': '2012.08777', 'language': 'en', 'url': 'https://arxiv.org/abs/2012.08777'}
# Introduction Let us consider a vortex sheet \(\omega\): a weak solution of the 2D Euler equation concentrated on a simple closed curve \(\Gamma:=\left\{ z(\theta,t) \in \R^2: \theta \in \mathbb{T} \right\}\) with vortex-sheet strength \(\gamma(\theta,t)\), that is, for all test functions \(\varphi \in C^{\infty}_c(\R^2)\), it holds that \[\begin{aligned} \int_{\R^2} \varphi(x)d\omega(x,t) = \int_{-\pi}^{\pi} \varphi(z(\theta,t)) \gamma(\theta,t)d\theta. \end{aligned}\] Note that the evolution of \(z\) and \(\gamma\) is described by \[\begin{aligned} \partial_t z(\theta,t) = \mathbf{v}(z,t) + c(\theta,t)\partial_\theta z(\theta,t) \label{evolv_curve}\\ \partial_t \gamma(\theta,t) = \partial_\theta\left( c(\theta,t)\gamma(\theta,t)\right), \label{evolv_strength} \end{aligned}\] where \(\text{curl}(\mathbf{v}) = \omega\) and \(c(\theta,t)\) represents the reparametrization freedom of the curve. Recall that the (discontinuous) velocity \(\mathbf{v}\) on the curve, generated by the vortex sheet on \(\Gamma\) is given by the Birkhoff-Rott integral: \[\begin{aligned} \label{def_BR} \mathbf{v}(z(\theta,t),t): =BR(z,\gamma)(z(\theta,t)) := \frac{1}{2\pi} PV\int_{-\pi}^{\pi} \frac{(z(\theta,t)-z(\eta,t))^{\perp}}{|z(\theta,t)-z(\eta,t)|^2} \gamma(\eta,t) d\eta. \end{aligned}\] For simplicity, we will omit the word \(PV\) in the notation for principal value integral from now on. We will also denote by \(\mathbf{v^{\pm}}\) the respective limits of the velocity on the two sides of \(\Gamma\) (with \(\mathbf{v}^+\) being the limit on the side that \(\mathbf{n}\) points into). The main goal of this paper is to find a class of uniformly-rotating vortex sheets, concentrated on a closed curve which is not a circle. This is the first proof of existence of a family of solutions of such kind. We will say that a vortex sheet is uniformly-rotating with angular velocity \(\Omega\) if it is stationary in the rotating frame with angular velocity \(\Omega\). See Lemma [\[lemma_br_eq\]](#lemma_br_eq){reference-type="ref" reference="lemma_br_eq"} for the exact equations satisfied by a uniformly-rotating vortex sheet. The existence of such solutions is not evident a priori since there are rigidity results by Gómez-Serrano--Park--Shi--Yao ruling out their existence in the case \(\Omega \leq 0\) and \(\gamma > 0\). These solutions are also important since they show that one cannot expect any asymptotic stability of the radial vortex sheet with constant strength. See the recent work by Ionescu--Jia for an asymptotic stability result when the vorticity is made out of a Dirac delta part and a Gevrey smooth part. Previously, similar solutions (uniformly rotating, non-radial) had been found for the 2D Euler equations in the context of vortex patches or smooth, compactly-supported functions. Despite the complexity of the solutions shown in numerical/actual experiments, there have been significant efforts to prove the existence of solutions to [\[evolv_curve\]](#evolv_curve){reference-type="eqref" reference="evolv_curve"}--[\[evolv_strength\]](#evolv_strength){reference-type="eqref" reference="evolv_strength"} in various settings. For a \(L^2_{loc}\) initial velocity whose vorticity has a definite sign, it turns out that there exists a global weak solution by the works of Delort, and Majda. In case that the vorticity does not have a definite sign, the existence was proved by Lopes Filho--Nussenzveig Lopes--Xin under the assumption that the initial vorticity satisfies a reflection symmetry. For analytic initial data, local-in-time existence of analytic solutions was proved by Sulem--Sulem--Bardos--Frisch. The singularity formation was conjectured by Birkhoff--Fisher and Birkhoff. For analytic initial data, the possibility that the curvature may blow up in finite time was supported by asymptotic analysis of Moore and also verified by numerical simulations by Krasny and Meiron--Baker--Orszag in. Note that the system [\[evolv_curve\]](#evolv_curve){reference-type="eqref" reference="evolv_curve"} and [\[evolv_strength\]](#evolv_strength){reference-type="eqref" reference="evolv_strength"} is known to be ill-posed in \(H^{s}\) for \(s>\frac{3}{2}\). For more comprehensive discussion on the well-posedness theory, we refer to. ## Steady solutions of the vortex sheet There are very few known examples of nontrivial steady solutions, and in fact, other than the circle or the line, the list only comprises the segment of length \(2a\) and density \[\label{example_rotate} \gamma(x) = \Omega \sqrt{a^2-x^2}, \qquad x \in [-a,a],\] which is a rotating solution with angular velocity \(\Omega\) and the family found by Protas--Sakajo, made out of segments rotating about a common center of rotation with endpoints at the vertices of a regular polygon. We remark that none of these are supported on a closed curve. Numerically, O'Neil used point vortices to approximate the vortex sheet and compute uniformly rotating solutions and Elling constructed numerically self-similar vortex sheets forming cusps. O'Neil also found numerically steady solutions which are combinations of point vortices and vortex sheets. ## Main strategy The main strategy to prove Theorem [\[rotatingsolution\]](#rotatingsolution){reference-type="ref" reference="rotatingsolution"}, the Main Theorem of this paper, is to employ bifurcation theory and try to bifurcate from the simple eigenvalue \(b:= \frac{1}{2\pi}\int_{-\pi}^{\pi} \gamma(x,t)dx =2\). However, the standard methods (Crandall-Rabinowitz ) fail since the linearized operator around the circle does not satisfy the transversality condition: in other words, the nontrivial zero set is not transversal to the trivial one (disks with constant vorticity amplitude). This phenomenon is usually known in the literature as a *degenerate bifurcation*. Graphically, this can be seen in Figure [\[fig_bifurcation\]](#fig_bifurcation){reference-type="ref" reference="fig_bifurcation"}. The problem is that we no longer have a single branch emanating from the disk, but two, and therefore the linearized operator fails to describe the local behaviour at the bifurcation point. To overcome this issue, we first reduce the nonlinear problem to a suitable finite dimensional space by means of a Lyapunov-Schmidt reduction since the restriction of \(D\mathcal{F}\) is an isomorphism between Ker\((D\mathcal{F})^{\perp}\) and Im\((D\mathcal{F})\). After having done so, we are left with a finite dimensional system and it is there where we perform a higher order expansion around the bifurcation point, since, as expected by the failure of the transversality condition, the first order approximation is identically zero. We obtain that in suitable coordinates, the zero sets of \(\mathcal{F}\) behave as \(x^2-y^2 = 0\) and thus two bifurcation branches emanate from the bifurcation point. The last part of the proof is devoted to handle the higher order terms, which can be controlled if we restrict the bifurcation domain to a suitable small enough neighbourhood. We mention here that this technique had been successfully employed by Hmidi--Mateu (in the hyperbolic case) and Hmidi--Renault (in the elliptic case). ## Organization of the paper The paper is organized as follows. In Section [2](#sec_eqns){reference-type="ref" reference="sec_eqns"} we will write down the equations and describe the main spaces used in the proof. Section [3](#sec_proof){reference-type="ref" reference="sec_proof"} will be devoted to the bulk of the proof of Theorem [\[rotatingsolution\]](#rotatingsolution){reference-type="ref" reference="rotatingsolution"}, with the explicit calculations detailed in Appendix [\[appendix\]](#appendix){reference-type="ref" reference="appendix"}. Numerical calculations of the bifurcation branch and a brief discussion of the numerical methods employed are presented in Section [4](#sec_numerics){reference-type="ref" reference="sec_numerics"}. # The equations and the functional spaces {#sec_eqns} Let \(\omega(\cdot,t)=\omega_0(R_{\Omega t})\) be a stationary/rotating vortex sheet solution to the incompressible 2D Euler equation, where \(\omega_0\in \mathcal{M}(\mathbb{R}^2) \cap H^{-1}(\mathbb{R}^2)\). Here \(\Omega=0\) corresponds to a stationary solution, and \(\Omega\neq 0\) corresponds to a rotating solution. Assume that \(\omega_0\) is concentrated on \(\Gamma\). Throughout this paper we will assume that \(\Gamma\) is a simple closed curve and \(\Omega > 0\). Following, we have that: Note that [\[BR2\]](#BR2){reference-type="eqref" reference="BR2"} can be written as \[\begin{aligned} \left( I-P_0 \right) \left[ \left( BR(z,\Gamma)(z(\theta))-\Omega z(\theta)^{\perp} \right) \cdot \frac{z'(\theta)\gamma(\theta)}{|z'(\theta)|^2} \right]= 0, \label{noevol_strength} \end{aligned}\] where \(P_0\) is a projection to the mean, that is, \(P_0f := \frac{1}{2\pi} \int_{-\pi}^{\pi} f(\theta)d\theta\). For simplicity, we also denote \(\fint f(\theta)d\theta := \frac{1}{2\pi}\int_{-\pi}^{\pi} f(\theta)d\theta\). Now plugging \(z(\theta) = (1+r(\theta))(\cos(\theta),\sin(\theta))\) and \(\gamma(\theta) := b + g(\theta)\) into [\[BR1\]](#BR1){reference-type="eqref" reference="BR1"}, [\[BR2\]](#BR2){reference-type="eqref" reference="BR2"} and [\[noevol_strength\]](#noevol_strength){reference-type="eqref" reference="noevol_strength"} yields that \[\begin{aligned} \label{mainfunctional} \mathcal{F}(b,g,r) := (\mathcal{F}_1,\mathcal{F}_2) = (0,0), \end{aligned}\] where \[\begin{aligned} &\mathcal{F}_1(b,g,r) := \fint_{-\pi}^{\pi}(b+g(\eta))\frac{\left(r'(\theta)\cos(\theta-\eta)-(1+r(\theta))\sin(\theta-\eta)\right)(1+r(\eta))-(1+r(\theta))r'(\theta)}{(1+r(\theta))^2+(1+r(\eta))^2-2(1+r(\theta))(1+r(\eta))\cos(\theta-\eta)}d\eta\\ & \qquad\qquad\qquad + \Omega r'(\theta)(1+r(\theta)), \\ &\mathcal{F}_2 (b,g,r) := \left(I-P_0 \right) \tilde{\mathcal{F}}_2(b,g,r), \\ &\tilde{\mathcal{F}}_2(b,g,r) := \fint_{-\pi}^{\pi}(b+g(\eta))\frac{(1+r(\theta))^2-(r'(\theta)\sin(\theta-\eta)+(1+r(\theta))\cos(\theta-\eta))(1+r(\eta))}{(1+r(\theta))^2+(1+r(\eta))^2-2(1+r(\theta))(1+r(\eta))\cos(\theta-\eta)}d\eta \\ &\qquad\qquad\quad\quad \times \frac{(b+g(\theta))}{r'(\theta)^2+(1+r(\theta))^2} -\Omega (1+r(\theta))^2 \frac{b+g(\theta)}{r'(\theta)^2+(1+r(\theta))^2}. \end{aligned}\] Throughout the paper we will work with the following analytic function spaces. Let \(c>0\) be a sufficiently small parameter and let \(\mathcal{C}_{w}(c)\) be the space of analytic functions in the strip \(|\Im(z)| \leq c\). For \(k \in \mathbb{N}\), denote \[\begin{aligned} X^{k}_{c} := \left\{ f(\theta) \in \mathcal{C}_{w}(c), \quad f(\theta) = \sum_{n=1}^{\infty}a_n\cos(2n\theta), \quad \sum_{\pm} \int_{-\pi}^{\pi} |f(\theta \pm ic)|^2 + |\partial^k f(\theta \pm ic)|^2 d\theta< \infty \right\} \\ \quad Y^{k}_{c} := \left\{f(\theta) \in \mathcal{C}_{w}(c), \quad f(\theta) = \sum_{n=1}^{\infty}a_n\sin(2n\theta),\quad \sum_{\pm} \int_{-\pi}^{\pi} |f(\theta \pm ic)|^2 + |\partial^k f(\theta \pm ic)|^2 d\theta< \infty \right\}, \end{aligned}\] From now on, due to scaling considerations, we will fix \(\Omega = 1\) and \(b\) will play the role as bifurcation parameter. It is clear that \(\mathcal{F}(b,0,0) = (0,0)\) for all \(b\in \R\) since \(\mathcal{F}_1(b,0,0) = 0\) and \(\tilde{\mathcal{F}}_2(b,0,0)\) is constant. Our main theorem in this paper is the following: # Proof of the Main Theorem {#sec_proof} The goal of this section is to prove the existence of non-radial uniformly-rotating vortex sheets. To do so, we will split the proof into the following steps: first we will prove that the functional \(\mathcal{F}\) is \(C^3\), next we will study \(D\mathcal{F}\) to show that, as mentioned in the introduction, it is a Fredholm operator of index 0, with dim(Ker\((D\mathcal{F})) = 1\). The next step is to apply Lyapunov-Schmidt theory and reduce the problem to a finite (2) dimensional one. In those coordinates, linear expansions fail to be conclusive (all the linear terms vanish) since 2 nontrivial branches emanate from the bifurcation point (as opposed to 1). Instead, we perform a quadratic expansion to determine that locally the bifurcation branches look like two pairs of straight lines (specifically as \(x^2-y^2 = 0\) in some well-chosen coordinates) and hence the bifurcation does not trivialize (as if it had been of the type \(x^2 + y^2 = 0\)). We conclude the proof by handling the higher order terms and showing that they don't alter the quadratic behaviour in a sufficiently small neighbourhood of the bifurcation point. ## Continuity of the functional In this subsection, we will check the regularity of \(\mathcal{F}\). As explained above, we will reduce the infinite dimensional problem to a finite dimensional problem and investigate its Taylor expansion up to quadratic order. Hence, we need to check if the functional is regular enough to do so. To this end, we have the following proposition: ## Fredholm index of the linearized operator \(D\mathcal{F}\) This subsection is devoted to show that \(D\mathcal{F}\) is Fredholm of index zero. We can make all the calculations explicit, moreover the operator diagonalizes in Fourier modes. We have the following lemmas: ## Lyapunov-Schmidt reduction {#lsreduction} In this subsection, we will aim to derive a finite dimensional system which is equivalent to [\[mainfunctional\]](#mainfunctional){reference-type="eqref" reference="mainfunctional"}. From Lemma [\[onedimensionality\]](#onedimensionality){reference-type="ref" reference="onedimensionality"}, we have the following orthogonal decompositions of the function spaces: \[\begin{aligned} X := X^k_{c}\times X^{k+1}_{c} = \text{span}\left\{ v \right\} \oplus \text{Ker}\left(D\mathcal{F}(2,0,0)\right)^{\perp} =: \text{span}\left\{ v \right\} \oplus \mathcal{X}, \quad v\in \text{Ker}\left(D\mathcal{F}(2,0,0)\right),\\ Y := Y^{k}_{c} \times X^{k}_{c}= \text{span}\left\{ w \right\} \oplus \text{Im}\left(D\mathcal{F}(2,0,0)\right) =: \text{span}\left\{ w \right\} \oplus \mathcal{Y}, \quad w\in \text{Im}\left(D\mathcal{F}(2,0,0)\right)^{\perp}, \end{aligned}\] where \(v\) and \(w\) are as defined in Lemma [\[onedimensionality\]](#onedimensionality){reference-type="ref" reference="onedimensionality"}. Let us consider the orthogonal projections \[P: X \rightarrow \text{span}\left\{ v \right\},\quad Q: Y \rightarrow \text{span}\left\{ w \right\}.\] More precisely, we have \[\begin{aligned} & P(g(\theta),r(\theta)) = \left( 0, \left(\frac{1}{\pi}\int r(\eta)\cos(2\eta)d\eta\right) \cos(2\theta) \right) \quad \text{ for all }(g,r)\in X^{k}_{c}\times X^{k+1}_{c}, \label{defofpq}\\ &Q(G(\theta),R(\theta)) = \left( 0, \left(\frac{1}{\pi}\int R(\eta)\cos(2\eta)d\eta\right) \cos(2\theta) \right) \quad \text{ for all } (G,R) \in Y^{k}_{c}\times X^{k}_{c}. \label{defofpq1} \end{aligned}\] We remark that we will sometimes abuse notation and identify \(\mathcal{F}(b,g,r)\) with \(\mathcal{F}(b,(g,r))\), where \((g,r) \in X\). Let us define \(G:\R \times \text{span}\left\{ v \right\} \times \mathcal{X} \mapsto {Y}\) as follows: \[\begin{aligned} G(b,f,x):=\mathcal{F}(b,f+x), \quad\text{ for }\quad b\in \R,\quad f\in \text{span}\left\{ v \right\},\quad x\in \mathcal{X}. \end{aligned}\] Then [\[mainfunctional\]](#mainfunctional){reference-type="eqref" reference="mainfunctional"} is equivalent to (for \((g,r) = f+x\)) \[\begin{aligned} \label{Reduction1} QG(b,f,x)=0 \quad \text{ and }\quad \left( I-Q\right)G(b,f,x)=0. \end{aligned}\] However, it follows from Lemma [\[onedimensionality\]](#onedimensionality){reference-type="ref" reference="onedimensionality"} that \[\begin{aligned} \label{isomorphism} D_x \left((I-Q)G\right)(b,0,0)=\left(I-Q\right)D\mathcal{F}(b,0)P: \mathcal{X}\mapsto \mathcal{Y} \end{aligned}\] is an isomorphism, consequently, the implicit function theorem yields that there is an open set \(U\subset \R\times \text{span}\left\{ v \right\}\) near \((b,0)\) and a function \(\varphi:U\mapsto \mathcal{X}\) such that \[\begin{aligned} \left( I-Q\right)G(b,f,\varphi(b,f)) = \left(I-Q\right)\mathcal{F}(b,f+\varphi(b,f))=0. \end{aligned}\] Note that from \(\mathcal{F}(b,0)=(0,0)\) for any \(b\in \R\), we have \[\begin{aligned} \label{trivial_solution} \varphi(b,0)=0, \end{aligned}\] and thus [\[Reduction1\]](#Reduction1){reference-type="eqref" reference="Reduction1"} is equivalent to \[\begin{aligned} \label{Reduction2} 0 = QG(b,f,\varphi(b,f)) = Q\mathcal{F}(b,f+\varphi(b,f)), \quad (b,f)\in U. \end{aligned}\] Since \(\text{span}\left\{ v \right\}\) is one dimensional, we have \(f=tv\) for some \(t\in \R\), therefore the system [\[Reduction2\]](#Reduction2){reference-type="eqref" reference="Reduction2"} can be written in terms of the variables \(b\) and \(t\) as \[\begin{aligned} 0 = Q\mathcal{F}(b,tv+\varphi(b,tv)) &= \int_{0}^{1}\frac{d}{d s}\left( Q\mathcal{F}(b,stv+\varphi(b,stv)) \right)ds\\ &= \int_0^1 QD\mathcal{F}(b,stv+\varphi(b,stv))(tv+t\partial_f\varphi(b,stv)v) ds, \end{aligned}\] where we used [\[trivial_solution\]](#trivial_solution){reference-type="eqref" reference="trivial_solution"} to obtain the second equality. Dividing the right-hand side by \(t\) to get rid of the trivial solutions, we are led to solve the following two dimensional problem: \[\begin{aligned} \label{Reduction4} 0 = F_{red}(b,t):=\int_0^1 Q D\mathcal{F}(b,stv+\varphi(b,stv))(v+\partial_f\varphi(b,stv)v) ds, \quad (b,tv)\in U. \end{aligned}\] ## Quadratic expansion of the reduced functional The main idea is to expand the reduced functional \(F_{red}\) up to quadratic terms. To this end, we recall the following proposition for the derivatives of \(F_{red}\). Now using the values found in Lemma [\[somevalues\]](#somevalues){reference-type="ref" reference="somevalues"}, we can obtain the derivatives of \(F_{red}\). ## Proof of Theorem [\[rotatingsolution\]](#rotatingsolution){reference-type="ref" reference="rotatingsolution"} Now we are ready to prove the main theorem of this section. # Numerical results {#sec_numerics} In this section, we describe how to compute numerically the branches of solutions emanating from the disk, previously proved (locally) in Theorem [\[rotatingsolution\]](#rotatingsolution){reference-type="ref" reference="rotatingsolution"}. See Figure [\[fig_bifurcation\]](#fig_bifurcation){reference-type="ref" reference="fig_bifurcation"}. To do so, we calculate solutions of the form \[R(\theta) = 1 + \sum_{k=1}^{N} r_k \cos(2k\theta), \quad \gamma(\theta) = \sum_{k=0}^{N} \gamma_k \cos(2k\theta)\] with \(\gamma_0 = b\). We first employed continuation in \(b\), in increments of \(\Delta b = 0.001\), starting from \(b=1.8\) and \(b=2.1\) and using as initial guess for the starting \(b\) the solution given by the linear theory and for the subsequent \(b\) the solution found in the previous iteration. After discovering a fold at approximately \(b \sim 1.68\), we switched variables and instead we recalculated using continuation in \(r_1\), which appears to be monotonic along the branches. As before, we start at \(r_1 = \pm 0.125\) and take an increment \(\Delta r_1 = 0.001\). To compute a solution for a fixed \(r_1\) we use the Levenberg-Marquardt algorithm. We aim to find a zero of the system of equations \(\mathcal{F}(b,g,r)(\theta_j)\), with \(\theta_j = \frac{j\pi}{N_\theta}, \quad j=1,\ldots,N_\theta\) and \(N_\theta = 1024\) with variables \(r_k, \, k \neq 1\) (recall that \(r_1\) is fixed at each iteration since it is the continuation parameter) and \(\gamma_k\). We take \(N = 160\). In order to perform the integration in space, we desingularize the principal value at \(\eta = \theta\) by subtracting \(\frac12\mathcal{H}(\gamma)\) to \(\mathcal{F}_1\), where \(\mathcal{H}\) denotes the Hilbert transform, computed explicitly since we have the Fourier expansion of \(\gamma\), and perform a trapezoidal integration on the rest (for which the integrand is smooth), with step \(h = \frac{2\pi}{N_\theta}\). We remark that the integrand of \(\mathcal{F}_2\) has a removable singularity (thus no principal value integration is needed) and can be integrated using the trapezoidal integration if the limit at \(\eta = \theta\) is taken properly.
{'timestamp': '2020-12-17T02:07:57', 'yymm': '2012', 'arxiv_id': '2012.08709', 'language': 'en', 'url': 'https://arxiv.org/abs/2012.08709'}
null
null
# Introduction The diagnostic process of dementia is challenging and takes a substantial period of time after the first clinical symptoms arise: on average 2.8 years in late-onset and 4.4 years in young-onset dementia. The window of opportunity for advancing the diagnostic process is however much larger than these few years. For Alzheimer's disease (AD), the most common form of dementia, there is increasing evidence that disease processes start 20 years or more ahead of clinical symptoms. Advancing the diagnosis is essential to support the development of new disease modifying treatments, since late treatment is expected to be a major factor in the failure of clinical trials. In addition, early and accurate diagnosis have great potential to reduce healthcare costs as they give patients access to supportive therapies that help to delay institutionalization. Machine learning offers an approach for automatic classification by learning complex and subtle patterns from high-dimensional data. In AD research, such algorithms have been frequently developed to perform automatic diagnosis and predict the future clinical status at an individual level based on biomarkers. These algorithms aim to facilitate medical decision support by providing a potentially more objective diagnosis than that obtained by conventional clinical criteria . A large body of research has been published on classification of AD and its prodromal stage, mild cognitive impairment (MCI). Overall, classification methods show high performance for classification of AD patients and control participants with an area under the receiver-operating characteristic curve (AUC) of 85-98%. Reported performances are somewhat lower for prediction of conversion to AD in patients with MCI (AUC: 62-82%). Structural T1-weighted (T1w) MRI to quantify neuronal loss is the most commonly used biomarker, whereas the support vector machine (SVM) is the most commonly used classifier. Following the trends and successes in medical image analysis and machine learning, neural network classifiers-convolutional neural networks (CNN) in particular-have increasingly been used since few years, but have not been shown to significantly outperform conventional classifiers. Most CNN studies perform no to minimal pre-processing of the structural MRI scans as input for their classifier, while others use more extensive pre-processing strategies proven successful for conventional classifiers, such as gray matter (GM) density maps. Although CNNs are designed to extract high-level features from raw imaging data, it is imaginable that the learning process for complex tasks is improved by dedicated pre-processing that enhances disease-related features, which reduces model complexity and enables a more stable learning process. It is unclear yet whether CNNs would improve AD classification over conventional classifiers and whether they benefit from extensive MRI pre-processing. Despite high performance of machine learning diagnosis and prediction methods for AD, it is largely unknown how these algorithms would perform in clinical practice. A next step would be to assess the generalizability of classification methods from a specific research population to another study population. [There are however only very few studies assessing classification performance on an external data set. Results varied from only a minor reduction in performance for some experiments to a severe drop for others.]{style="color: black"} While generalizability seemed related to how well the training data represented the testing data (e.g. an external data set with similar inclusion criteria showed a smaller performance drop than a data set with very different criteria, a better understanding is crucial before applying such methods in routine clinical practice. Therefore, this work aims to assess the generalizability of MRI-based classification performance to an external data set representing a tertiary memory clinic population for both diagnosis of AD and prediction of AD in individuals with MCI. To evaluate the value of neural networks and to determine their optimal MRI pre-processing approach, we compare a CNN with a conventional SVM classifier using two pre-processing approaches: minimal pre-processing using only rough spatial alignment and more extensive pre-processing into modulated GM maps. First, we optimize the methods using a large research cohort and assess classification performance using cross-validation. Subsequently, we validate AD prediction performance in MCI patients of the same cohort as well as AD diagnosis and prediction performance in the external data set. ::: # Methods ## Study population We used data from two cohorts. The first group of 1715 participants was included from the Alzheimer's Disease Neuroimaging Initiative (ADNI; [adni.loni.usc.edu](adni.loni.usc.edu)). The ADNI was launched in 2003 as a public-private partnership, led by Principal Investigator Michael W. Weiner, MD. The primary goal of ADNI has been to test whether clinical and neuropsychological assessment, serial magnetic resonance imaging (MRI), positron emission tomography (PET), and other biological markers can be combined to measure the progression of mild cognitive impairment (MCI) and early Alzheimer's disease (AD). For up-to-date information, see [www.adni-info.org](www.adni-info.org). We included all participants with a T1w MRI scan at baseline from the ADNI1/GO/2 cohorts: 336 AD patients, 520 control participants (CN), 231 mild cognitive impaired (MCI) patients who converted to AD within 3 years (MCIc) and 628 MCI patients who did not convert (MCInc). The CN group consisted of 414 cognitively normal participants and 106 participants with subjective cognitive decline (SCD). Demographics are shown in Table [1](#tab:adni-demographics){reference-type="ref" reference="tab:adni-demographics"}. A list of included participants is made available at <https://gitlab.com/radiology/neuro/bron-cross-cohort>. The second group of participants was included from the Health-RI Parelsnoer Neurodegenerative Diseases Biobank (PND; [www.health-ri.nl/parelsnoer](www.health-ri.nl/parelsnoer)), a collaborative biobanking initiative of the eight university medical centers in the Netherlands. The Parelsnoer Neurodegenerative Diseases Biobank focuses on the role of biomarkers on diagnosis and the course of neurodegenerative diseases, in particular of Alzheimer's disease. It is a prospective, multi-center cohort study, focusing on tertiary memory clinic patients with cognitive problems including dementia. Patients are enrolled from March 2009 and followed annually for two to five years. In the PND biobank, a total of 1026 participants have been included. Inclusion criteria for the current research were: a high resolution T1w MRI at baseline, clinical consult at baseline, 90 days or less between MRI and clinical consult, and a baseline diagnosis of SCD, MCI, or dementia due to AD. A flow diagram of the inclusion can be found in the supplementary files (Fig. [\[fig:pnd-inclusion\]](#fig:pnd-inclusion){reference-type="ref" reference="fig:pnd-inclusion"}). A total of 557 participants met inclusion criteria. One person was excluded because image analysis failed. This led to inclusion of 199 AD patients and 138 participants with SCD. Of the MCI group, we included the 139 participants that had a follow-up period of at least 6 months. Of this group, 48 MCI patients converted towards dementia within the available follow-up time and 91 MCI patients remained stable. Demographics are shown in Table [2](#tab:pnd-demographics){reference-type="ref" reference="tab:pnd-demographics"}. ## Imaging data We used baseline T1w structural MRI acquired at 1.5T or 3T. Acquisition protocols are previously described (ADNI:, PND: ). Variation in acquisition protocols used in PND is detailed in Table [\[tab:pnd-imaging\]](#tab:pnd-imaging){reference-type="ref" reference="tab:pnd-imaging"}. For the majority of scans, a 8-channel head coil was used (N=423; 76%); other scans used a 16-channel (N=27), 24-channel (N=1), 40-channel (N=1), or unknown coil (N=104). ## Image pre-processing We evaluated two pre-processing approaches based on T1w images: minimal pre-preprocessing and a more extensive pre-processing into modulated GM maps. To prepare T1w images with minimal pre-processing, scans were non-uniformity corrected using the N4 algorithm and subsequently transformed to MNI-space using registration of brain masks with a similarity transformation. A similarity transformation is a rigid transformation including isotropic scaling. Registrations were performed with Elastix registration software. To account for variations in signal intensity, images were normalized within the brain mask to have zero mean and unit variance. To obtain modulated GM maps encoding gray matter density, the Iris pipeline was used. To compute these maps a group template space was defined using a procedure that avoids bias towards any of the individual T1w images using pairwise registration. The pairwise registrations were performed using a similarity, affine, and nonrigid B-spline transformation model consecutively. We selected a subset of images for the definition of the template space. This template set consisted of the images of 50 ADNI participants that were randomly selected preserving the ratio between diagnostic groups (subject list available at <https://gitlab.com/radiology/neuro/bron-cross-cohort>). The other images of both ADNI and PND data sets were registered to the template space following the same registration procedure. For the current work, some changes to the template space construction procedure as used in were made: non-uniformity correction was performed, skull-stripping was performed, and the template space corresponded to MNI-space. Using similarity registration based on brain masks, we computed the coordinate transformations of MNI space to each of the template set's images, which were subsequently concatenated with the pairwise transformations before averaging. After template space construction, probabilistic GM maps were obtained with the unified tissue segmentation method of SPM8 (Statistical Parametric Mapping). To obtain the final feature maps, probabilistic GM maps were transformed to the template space and modulated, i.e. multiplied by the Jacobian determinant of the deformation field, to take compression and expansion into account. To correct for head size, modulated GM maps were divided by intracranial volume. ## Classification approaches Two machine learning approaches were used for classification: a support vector machine (SVM) and a convolutional neural network (CNN). ### Support vector machine (SVM) An SVM with a linear kernel was used as this approach previously showed good performance using voxel-based features for AD classification.. The c-parameter was optimized with 5-fold cross-validation on the training set. Input features, i.e. voxel values of the pre-processed images within a brain mask, were normalized to zero mean and unit variance based on the training set. The classifier was implemented using Scikit-Learn. To gain insight into the classifications, we calculated statistical significance maps (p-maps) that show which features contributed to the SVM decision. These maps were computed using an analytical expression that approximates permutation testing. Clusters of significant voxels were obtained using a p-value threshold of \(\alpha\leq 0.05\). P-maps were not corrected for multiple comparisons, as permutation testing has a low false-positive rate. ### Convolutional neural network (CNN) [An all convolutional neural network was used, which is a fully convolutional network (FCN) architecture that uses standard convolutional layers with stride two instead of the pooling layers used in most CNNs.]{style="color: black"} This approach was chosen as it has previously shown good classification performance for AD based on structural MRI. The used architecture is shown in Fig. [\[fig:cnn\]](#fig:cnn){reference-type="ref" reference="fig:cnn"}. Specifically, the network was built of 7 blocks consisting of a 3D convolutional layer (filter size 3; stride 1), followed by dropout, batch normalization (BN), and a rectified linear unit (ReLU) activation function, succeeded by a second 3D convolutional layer (filter size 3; stride 2), dropout, BN, and ReLU activation [.]{style="color: black"} The number of filters changed over blocks: 16 filters in block 1, 32 in block 2 and 3, 64 in block 4 and 5, 32 in block 6, and 16 in block 7. The final output layer of the network was a softmax activation function, providing 2 prediction values (1 per class). The total network consisted of 577,498 parameters. [For artificially increasing the training data set and for removing the class imbalance, data augmentation was used. The training set was augmented to 1000 samples per class based on the 'mixup' approach. Mixup is a data-agnostic augmentation approach that is not based on spatial transformations, and therefore does not degrade the spatial normalization. Augmented samples were constructed by linearly combining two randomly selected images of the same class: a fraction of \(80\%\) of the first image was added to a fraction of \(20\%\) of the second image.]{style="color: black"} The network was compiled with a binary cross-entropy loss function and Adam optimizer (learning rate=0.001, epsilon=1e-8, decay=0.0). To facilitate a stable convergence, learning rate followed a step decay schedule, i.e. after each ten epochs the learning rate was divided by two. The dropout rate was set to \(20\%\). Data was propagated through the network with a batch size of 4. Input images were normalized to zero mean and unit variance based on the augmented training set. [A validation set was created by randomly splitting \(10\%\) of the training data which was not used for training but only for regularization by early stopping, i.e. training was stopped when the validation AUC had not increased for 20 epochs.]{style="color: black"} The model of the epoch with the highest validation AUC was selected as final model. Implementation was based on Keras and Tensorflow. To gain insight into the classifications, we made saliency maps that show which parts of the brain contributed the most to the prediction of the CNN, i.e. which voxels lead to increase/decrease of prediction score when changed. Saliency maps were made using guided backpropagation, changing the activation function of the output layers from softmax to linear activations. Maps were averaged over correctly classified AD patients. ## Analysis and statistics Classification performance was quantified by the area under the curve (AUC) and accuracy. For AD-CN classification, the data of the ADNI AD and CN groups were randomly split for \(20\) iterations preserving relative class sizes in each training and testing sample, using \(90\%\) for training and \(10\%\) for testing. Random splits were the same for both SVM and CNN. In each iteration, classification model parameters were optimized on the training set as explained above. The models were optimized solely on the training set; the test set was used only for evaluation of the final model. Ninety-five percent confidence intervals (\(95\%\)CI) for the mean performance measures were constructed using the corrected resampled t-test based on the 20 cross-validation iterations, thereby taking into account that the samples in the cross-validation splits were not statistically independent Subsequently, we retrained classifiers using all AD and CN participants from the ADNI as training set. These retrained classifiers were used for visualization and their performance was evaluated on three independent test sets: ADNI MCIc-MCInc, PND AD-SCD, and PND MCIc-MCInc. \(95\%\)CIs were obtained based on 500 bootstrap samples of the test set. Significant differences between classifiers were assessed using the non-parametric McNemar Chi-square test (\(\alpha<0.013\) after Bonferroni correction for 4 comparisons in each test set). Trained models, lists of included subjects and all code used in preparation of this article are available from <https://gitlab.com/radiology/neuro/bron-cross-cohort>[^1]. # Results Cross-validation performance for the ADNI AD-CN classification is shown in Fig. [\[fig:adni-adcn\]](#fig:adni-adcn){reference-type="ref" reference="fig:adni-adcn"}. For SVM, the AUC using modulated GM maps (\(0.940\), \(95\%\)CI: \(0.924-0.955\)) was higher than the AUC using T1w images (\(0.801\), \(95\%\)CI: \(0.765-0.837\)). For CNN, the same effect was observed, with modulated GM maps yielding a higher AUC (\(0.933\), \(95\%\)CI: \(0.918-0.948\)) than T1w images (\(0.898\), \(95\%\)CI: \(0.875-0.920\)), albeit here with overlapping confidence intervals. For classification based on modulated GM maps, the AUC for SVM (\(0.940\); \(95\%\)CI: \(0.924-0.955\)) was similar to that of CNN (\(0.933\); \(95\%\)CI: \(0.918-0.948\)). Accuracy measures showed the same patterns. The performance of the classifiers trained on all ADNI AD and CN data to predict MCI conversion is shown in Fig. [\[fig:adni-mci\]](#fig:adni-mci){reference-type="ref" reference="fig:adni-mci"}. While AUCs with both SVM and CNN were slightly higher for modulated GM maps than for T1w images, the accuracy measures showed similar performance for both inputs. Using modulated GM maps, performance for SVM (AUC=0.756, \(95\%\)CI: \(0.720-0.788\); accuracy=0.695, \(95\%\)CI: \(0.665-0.723\)) was higher than for CNN (AUC=0.742, \(95\%\)CI: \(0.709-0.776\)); accuracy=0.658, \(95\%\)CI: \(0.628-0.690\)). This difference was significant according to McNemar's test (\(p<0.01\)). The performance of external validation, i.e. the application of the classifiers in the PND data set, is shown in Fig. [\[fig:pnd\]](#fig:pnd){reference-type="ref" reference="fig:pnd"}. For AD-SCD diagnosis, the AUC for SVM was \(0.896\) (\(95\%\)CI: \(0.855-0.932\)) and that for CNN was \(0.876\) (\(95\%\)CI: \(0.836-0.913\)). Both AUC and accuracy followed the same patterns as in ADNI: SVM and CNN showed similar performance and modulated GM maps yielded higher classification performance than minimally processed T1w images (McNemar's test; \(p<0.01\) for SVM, \(p=0.01\) for CNN). Performances were however slightly lower; PND confidence intervals for AUC (but not for accuracy) overlapped with those of ADNI. For prediction of MCI conversion in PND, classification performance was also lower than that in ADNI. For the GM modulated maps, the AUC for CNN was 0.702 (\(95\%\)CI: \(0.624-0.786\)) and that for SVM was 0.665 (\(95\%\)CI: \(0.576-0.760\)). Confidence intervals were relatively large and overlapped with those in the ADNI data. No significant differences between classifiers and between pre-processing approaches were seen. Brains regions that contributed to the classifications are visualized using SVM p-maps in Fig. [\[fig:pmaps\]](#fig:pmaps){reference-type="ref" reference="fig:pmaps"} and using CNN saliency maps in Fig. [\[fig:saliency\]](#fig:saliency){reference-type="ref" reference="fig:saliency"}. The SVM p-map for the minimally processed T1w images showed small clusters of significant voxels, mainly located in the medial temporal lobe (hippocampus), around the ventricles and at larger sulci at the outside of the brain. For modulated GM maps, clusters of significant voxels in the p-map were larger and predominantly visible in the hippocampus. In addition, smaller clusters were located in the rest of the temporal lobe and the cerebellum. CNN saliency maps showed a very limited contribution of the temporal lobe. Instead, the saliency map for the T1w images mainly showed contribution of voxels at the edge of the brain, in white matter regions around the ventricles and in the cerebellum. For modulated GM maps, clusters of contributing voxels were located in the subcortical structures, the white matter around the ventricles and the cerebellum. # Discussion We performed a comparative study focusing on the generalizability of diagnostic and predictive performance of machine learning based on MRI data of the ADNI research cohort, to the PND multi-center data set representing a tertiary memory clinic population. Both cross-validation and external validation results for AD-CN diagnosis showed similar performance using the used deep learning classifier and conventional classifier. Both approaches significantly benefited from the use of modulated GM maps instead of raw T1w images. Application to MCI conversion prediction yielded higher performance for SVM than for CNN in ADNI, but this was not seen in PND. Performances were in line with the state-of-the-art. [For MCI conversion prediction, showed that performance of current methods converges to an AUC of about 75% as the number of subjects increases, which aligns with our results.]{style="color: black"} While in many medical imaging applications CNNs convincingly outperformed conventional classifiers, our results showed similar performance for CNN and SVM, which confirms the findings by. [Other CNN designs could possibly improve on this, but we made an effort to follow the state-of-the-art for CNN design. Promising developments to further improve performance could come from changes in network architecture (e.g., successful standard architectures like InceptionNet or ResNet, adversarial training, discriminative auto-encoders) and improvements in data collection and handling (e.g., larger datasets to learn more complex models, or pretraining on other collections of brain imaging data).]{style="color: black"} [In addition, data augmentation could play a role in further improvement. While a strength of the mix-up approach is that it is data-agnostic, an augmentation approach using for example prior knowledge may have added value.]{style="color: red"} [This work shows that the need for dedicated pre-processing is lower for CNN than for SVM, but nevertheless has an added value for the performance. While we evaluated only one implementation of the pre-processing procedure, we expect that alternative implementations (e.g. SPM12, FSL-VBM) could have slightly changed results but would have led to the same conclusions.]{style="color: black"} [With sufficiently large datasets the need for dedicated pre-processing including spatial normalization may reduce.]{style="color: red"} Although SVM and CNN classifiers yielded similar performance, their visualizations showed different brain regions to be involved in the classification. SVM significance maps showed a clear contribution of the hippocampus and medial temporal lobe as previously shown and expected based on prior knowledge. CNN saliency maps showed involvement of subcortical structures, regions prone to white matter hyperintensities and the cerebellum. For both classifiers, classification based on minimally processed T1w images showed voxels at the edge of the brain to be involved, which is expected as only similarity transformation to template space had been performed. [In addition to the brain edges, the CNN classifier, which outperformed the SVM for these minimally processed input images, also highlights regions similar to those shown by the saliency map for the modulated GM images. This may implicate that the CNNs non-linear operations, in contrast to the linear kernel of the SVM, could extract feature maps that partly resemble GM modulated maps.]{style="color: black"} The regions highlighted by the CNN saliency maps could possibly be related to AD using prior knowledge, but we will refrain from over-interpretation here. It is however unexpected that the medial temporal lobe is not covered as previously shown with CNN saliency maps on ADNI data. Differences between the SVM and CNN classifiers in involved brain regions could be contributed to both the differences in the classification approaches as well as to the differences in the used visualization techniques. [If the first reason dominates, hence if the classifiers actually use different brain regions, combining classifiers into a hybrid approach would be an interesting future direction. However, for]{style="color: black"} full understanding of brain regions involved in CNN-based classification of AD, further research is required. This work is one of the few to address how AD classification performance of MRI-based machine learning generalizes to an independent cohort. On the PND data, the resulting AUC values (0.896 for SVM, 0.876 for CNN) were competitive with values reported for AD-CN in the literature, but still they were 0.04-0.07 lower than those in the ADNI cross-validation experiment. The main patterns in the results corresponded between ADNI and PND data, i.e. similar performance for SVM and CNN and added value of dedicated MRI processing. For prediction in MCI, AUC values in the PND data set were 0.04-0.10 lower than those in ADNI. Overall, similar to experiments by and, we observed only a minor performance drop. This largely preserved performance could be related to the similarities between the ADNI and PND studies that include a multi-center set-up, within-study standardization of cognitive protocols, and diagnostic criteria for AD and MCI. The performance reduction could be contributed to differences between the studies, such as the MRI protocols (all high resolution T1w, but more homogeneous within ADNI than within PND), country of origin (United States vs. the Netherlands), control population (a combination of cognitively normal and SCD vs. SCD only), MCI population (amnestic MCI only vs. a broad MCI group) and patient inclusion criteria (ADNI used hard cut-offs on cognitive scores and clinical dementia rating whereas PND did not). Studies that found much worse generalizability in their experiments described larger differences in inclusion and diagnostic criteria between training data and validation data than we did . A limitation of this study is that the diagnosis was based on clinical criteria rather than post-mortem histopathological examination. Although diagnosis was typically confirmed by follow-up, it is possible that some of the patients were misdiagnosed. [An alternative could be to use amyloid data from PET imaging or cerebrospinal fluid to classify AD pathology instead of relying on the clinical diagnosis (e.g., )]{style="color: black"}. In addition, because of the limited availability of diagnostic information at follow-up in the PND data set, its MCI data is relatively small. This is reflected by the large confidence intervals for the performance metrics in the prediction task. To maximize the number of PND MCI participants, we chose to use the last available time point for final diagnosis. As a result the time-to-prediction ranged between 1-5 years, whereas for ADNI a fixed time interval of three years is chosen. As time-to-prediction is related to predictive performance, a fixed time interval would be preferred for inter-cohort performance comparison. While the external validation performance was quite high, as expected some performance drop was observed. Therefore, research focusing on approaches to mitigate such performance drops, such as transfer learning, is highly relevant. In addition, whereas this work only exploited structural MRI, other works have shown that performance can be increased with the use of multi-modal inputs, i.e. cognitive test scores, fluid-based biomarker measurements, genetic information and other imaging modalities such as PET, diffusion MRI or perfusion MRI. While multi-modal classification would therefore be a logical and important extension, this may also lead to a decrease of generalizability as chances of differences between studies increase with multiple modalities. In conclusion, classification performance of ADNI data generalized well to the multi-center PND biobank cohort representing tertiary memory clinic patients, with only a minor drop in performance. Conventional SVM classifiers and deep learning approaches using CNN showed comparable results, and both methods benefited from dedicated MRI processing using GM modulated maps. We hope that external validation results like those presented here will contribute to setting next steps towards the implementation of machine learning in clinical practice for aiding diagnosis and prediction.
{'timestamp': '2021-05-27T02:19:47', 'yymm': '2012', 'arxiv_id': '2012.08769', 'language': 'en', 'url': 'https://arxiv.org/abs/2012.08769'}
null
null
# Introduction Quantum key distribution (QKD) enables two remote network users to exchange provably-secure keys when it is implemented faithfully . To ensure implementation security, the research community has been focusing on the security of practical systems in recent years, developing methods to narrow the gap between the theory and practice of QKD. On the theoretical side, robust QKD protocols have been proposed, which not only make practical systems more secure against device imperfections but also easier to calibrate and validate in practice (since fewer assumptions are required). On the experimental side, efforts have been focused on tackling quantum side-channels and a wide variety of countermeasures have been proposed and developed . Trojan-horse attacks (THAs)  represent one of the biggest threats to QKD security. These attacks aim to steal the secret key information via the injection of unauthorized light pulses, seeking to carry critical modulation information out of the transmitters. More specifically, in these attacks, the adversary (henceforth called Eve) injects bright light pulses into the transmitter and collects the reflected light pulses. Consequently, this allows Eve to learn some information about the secret key. It has been shown that these kind of attacks can be readily implemented using standard optical methods . To mitigate this issue, one can use specialized security analyses to include security against specific types of THAs; for instance, by modeling the unauthorized input light pulses as coherent states. Then, under the assumption that the energy of the reflected light pulses is bounded, one can compute the secret key rate, as was done in Refs. . The bright illumination attacks are another particularly powerful class of side-channel attacks. These include laser damage attacks  and blinding attacks . In these attacks, bright light pulses are used to control QKD devices by exploiting their implementation knowledge. Consequently, these allow Eve to avoid eavesdropping detection and hence security is no longer guaranteed. Fortunately, there exist countermeasures which are pretty effective against such attacks  and innovative QKD protocols which are completely immune against detection side-channel attacks are known as well, e.g., see measurement-device-independent QKD (MDI QKD) . Based on the above, it can therefore be said that the injection of (unauthorized) bright light pulses into quantum communication systems is a catalyst for side-channel attacks. This is not so surprising since the presence of bright light pulses essentially breaks one of the most important assumptions of quantum cryptography---that the energy of the underlying quantum signals is at the single-photon level (or sufficiently small). To overcome these potential loopholes, one promising solution is to limit the energy of incoming light. Indeed, if this is achieved, one can be sure that the QKD system is operating at the single-photon level and the energy of any outgoing light pulse is bounded as well. Consequently, this will allow the system to operate faithfully in the quantum regime. In practice, this solution would mean introducing a kind of *quantum power limiting* device into the QKD system. Based on current research on side-channel attacks, we believe an ideal quantum power limiter should possess the following properties: (a) able to provide a reliable and adjustable photon energy limiting down to the order of a few photons to hundreds of photons for each quantum state, (b) have a minimum insertion loss if the input power is below the threshold and stop the transmission or maintain at the threshold power once the input power exceeds the threshold, and (c) the power limiting effects are independent of other physical degrees of freedoms, e.g., frequency, polarization, etc. In terms of practical considerations, the power limiter device should also be cost-effective, passive, and easily replaceable (if it cannot recover to its normal state after being exposed to strong light). Here, we propose and demonstrate a novel and practical quantum power limiter that can secure a broad class of QKD setups . The device is based on a form of thermo-optical defocusing effect, which effectively bounds the output optical power by some predetermined threshold. By modeling the system using a set of physically relevant assumptions, we show that the output-input optical power relation of the proposed device can be precisely controlled by changing the system parameters, e.g. the length of the prism and the diaphragm width. Consequently, this allows us to tailor the device to different quantum cryptographic applications. The feasibility and performance of our proposed power limiter device are confirmed using COMSOL (a multi-physics simulation software) and experimental data. The paper is organized as follows. In Section. [2](#sect2){reference-type="ref" reference="sect2"}, we first present the design details and the modeling of our power limiter. Thereafter, simulation and experimental results are illustrated. Section. [3](#sect3){reference-type="ref" reference="sect3"} discusses the potential implementation loopholes and the robustness of the proposed power limiter. In Section. [4](#sect3.5){reference-type="ref" reference="sect3.5"}, we experimentally verify that the power limiter is essentially transparent to standard quantum encoding choices such as intensity, phase, and polarization degrees of freedom. In Section. [5](#sect4){reference-type="ref" reference="sect4"}, we illustrate the broad utility of the proposed power limiter over three different QKD systems. In the first application, we provide a general security analysis of MDI QKD that allows for Eve to inject in any kind of state in a given Trojan-horse optical mode. Thereafter, a detailed study on the application of our power limiter in MDI QKD is presented, followed by the simulation results. In the second and third applications, we discuss how the proposed power limiter could be utilized to deter bright illumination attacks and to enhance the implementation security of plug-and-play QKD . In Section. [6](#sect5){reference-type="ref" reference="sect5"} we end with a conclusion. # Optical power limiter design {#sect2} Our power limiter design is shown in Fig. [\[fig1\]](#fig1){reference-type="ref" reference="fig1"}. The input light and output light are collimated using a pair of fiber collimators. An acrylic prism is placed along the optical path as the core part of our proposal, whose negative thermo-optical coefficient (TOC) \(dn/dT\) is exploited, where \(n\) is the refractive index and \(T\) is the temperature. Noted here any material with negative TOC could be used with similar analysis. The absorption of input light generates a heat gradient inside the prism, which is then converted to a refractive index gradient accordingly. The negative TOC leads to a relatively smaller reflective index at the center of the prism, resulting in the whole optical architecture works as a concave lens and diverges the transmitting light, as shown in the inset of Fig. [\[fig1\]](#fig1){reference-type="ref" reference="fig1"}. By adding a diaphragm with customizable width, the amount of output power can be suitably controlled. An optical filter is then introduced to restrict the working wavelength range of the device for security analysis, which will be discussed in detail in Section. [3](#sect3){reference-type="ref" reference="sect3"}. We remark that all the components used here are cost-effective and commercially available. The mechanism of thermal optical defocusing and related power limiting phenomenon have been widely studied in both theory and experiments . In our case, We first simulate the temperature and electric field distribution inside a 10 cm acrylic prism with 7.9 mW input power using COMSOL, whose results are shown in [\[fig2\]](#fig2){reference-type="ref" reference="fig2"} (a) and (b). The simulation results indicate a distinct temperature distribution inside the medium, and a clear divergence of the light field. Towards a better quantitative understanding, we model our power limiter design by balancing the optical absorption and the heat transfer inside the prism under steady-state condition : \[\label{eq1-1} \alpha I =-\frac{k}{r}\frac{\partial}{\partial r} \left(r \frac{\partial T}{\partial r} \right),\] where \(\alpha\) is the absorption coefficient of the material, \(I\) represents the input light power density, \(T\) is the temperature, and \(k\) is the thermal conductivity. If we assume that the light propagates along the \(z\)-direction and follows a Gaussian profile, temperature gradient in the \(z\)-direction is negligible, and the radiative and convective heat transfer is minimal, the steady-state laser radiation intensity at position \((r,z)\) can be solved as  \[\label{eq2} \begin{split} I(r,z) =& I(r,0) \\ &\cdot \exp\Bigg[-\alpha z + \frac{\displaystyle\frac{\partial n}{\partial T} P_0 e^\frac{-r^2}{a^2} \left(z-\frac{1-e^{-\alpha z}}{\alpha} \right)}{\pi kna^2}\Bigg], \end{split}\] where the input intensity \(I(r,0)=\frac{P_0}{\pi a^2} e^{-r^2/a^2}\), \(a\) is the radius where the light intensity drops to \(1/e\) of its axial value, and \(P_0\) is the incident laser power. The output optical power can be obtained by integrating the light intensity over a certain area which depends on the position (prism length) and the width of diaphragm. The maximum output power (defined as power limiting threshold) and the insertion loss at different prism length and diaphragm width are shown in Fig. [\[fig2\]](#fig2){reference-type="ref" reference="fig2"} (c) and (d). Since a larger prism length will lead to a greater photon absorption as well as a larger light divergence, a higher insertion loss and a smaller power limiting threshold can thus be expected. Likewise, a smaller diaphragm collects less photon energy, which also results in a higher insertion loss and a smaller power limiting threshold. Therefore, depending on the application, it is possible to choose a set of parameters that balance the insertion loss and power limiting threshold that meet system requirements. Note here that the Gaussian profile assumption only holds when the beam divergence is relatively small, thus the analytical model may only be able to provide a quick guidance for parameter selection. Hence, experiments are conducted to verify the feasibility of our proposal. A proof-of-concept experiment is performed using a simplified version of Fig. [\[fig1\]](#fig1){reference-type="ref" reference="fig1"}. A collimator is used for light coupling from single mode optical fiber to free-space. Here a transmissive collimator based on graded-index (GRIN) lens is used in the setup for feasibility demonstration, and it can be conveniently replaced by reflective collimators to ensure the proper functioning over a wide range of wavelengths for security reasons (See Section.[3](#sect3){reference-type="ref" reference="sect3"} for details). Then the Gaussian beam with a beam width of 0.4 mm is directed into the Acrylic Prism. Three acrylic prisms with lengths of 25.4, 50.8, and 101.6 mm are tested. The output light will then be collected after the diaphragm. Diaphragm width of 25, 50, 380, 750 and 1300 m are used in our experiment. Fig. [\[fig2\]](#fig2){reference-type="ref" reference="fig2"} (e) shows the measured output-input relationship at different diaphragm width and the same prism length of 101.6 mm, while Fig. [\[fig2\]](#fig2){reference-type="ref" reference="fig2"} (f) shows the result at different prism length with the same diaphragm width of 25 m. The results clearly show the power limiting effect in various conditions. The output power linearly increases with the input power at low power region. As the input power further increases, the output power will increase slowly, and finally be limited to a certain threshold. Besides, the experimental results verified that the power limiting feature of our proposal can be readily adjusted by modifying the prism length and diaphragm width. Among all of our system configurations, the lowest power limiting threshold of-27.9 dBm is measured, with a insertion loss of-34.0 dB, when a 101.6 mm prism and 25 m diaphragm are chosen. Similarly, a lower insertion loss of-5.1 dB can be obtained, together with a 10.3 dBm output power limiting threshold, when a 50.8 mm prism and 750 m diaphragm are used. For different applications, one can expect different requirements for power limiting device. For example, for protecting transmitters against THA, the insertion loss of the power limiter is less concerned since we can always adjust the optical attenuators to generate expected quantum states. While in order to protect receivers from bright illumination attacks, the insertion loss of the device can be a critical factor to system performance. Thus, we would imagine customised power limiter configurations for different application scenarios. # Robustness against potential implementation loopholes {#sect3} The above analyses so far only show the feasibility of the proposed power limiter under a steady-state condition. Below, we analyze the robustness of the proposed device against potential implementation loopholes that could happen via the variation of standard optical properties. One important consideration is the finite response time of the proposed device. To investigate this property, we install an electronic variable optical attenuator (EVOA) after a continuous-wave (CW) laser source to create a laser pulse with relatively long pulse width and measure the output response of the power limiter. The experimental results are shown in Fig. [\[fig3\]](#fig3){reference-type="ref" reference="fig3"} (a), where a 101.6 mm prism is used with a 750 m diaphragm. The settling time of our power limiter is measured to be 300 ms. We observed that the peak output power close to the starting time can be a few times higher than the steady-state output power (which happens after about 300 ms). Crucially, this suggests that one could exploit the finite response time of the power limiter to breach the desired energy threshold. However, as we will show in Section. [5](#sect4){reference-type="ref" reference="sect4"}. A, the information leakage due to THAs can, in fact, be bounded using only the average energy constraint (integrated over the finite response time); it is not necessary to bound the maximum (peak) energy for security. Thus, in the experiment, we study the average output optical power at constant-energy pulse input but with different duty cycles. The time domain results are shown in Fig. [\[fig3\]](#fig3){reference-type="ref" reference="fig3"} (b), where a 101.6 mm prism is used with a 25 m diaphragm. The input laser pulse is modulated at 1 Hz frequency with average input power of 10.5 dBm and 13 dBm. The corresponding average output power is shown in Fig. [\[fig3\]](#fig3){reference-type="ref" reference="fig3"} (c). The results indicate that the average output power is higher at a larger duty cycle. The maximum appears at duty cycle equals 1, i.e. CW light input. In other words, given fixed average input power, CW input will give the largest averaged output power, where Eve is getting the most amount of information about the transmitter. As such, we will be using the power limiting threshold obtained under the CW Trojan horse input assumption for THA analysis; see Section. [5](#sect4){reference-type="ref" reference="sect4"}. A. To explain this effect, we study the temperature response inside the medium under constant-energy pulse input with different peak power and different duty cycles using COMSOL. The results are shown in Fig. [\[fig3\]](#fig3){reference-type="ref" reference="fig3"} (d). The simulation results indicate that a higher input peak power will lead to a higher maximum temperature, even with the same amount of average power. Therefore, a higher refractive index gradient and larger divergence of input laser are expected with a higher instantaneous power of the input light, leading to a larger thermo-optical defocusing effect and consequently a lower output power. Another possible attack is to try to change the power limiting threshold by varying the wavelength of the incoming light. This could allow Eve to send in brighter light pulses with a different wavelength. To investigate the possibility of such an attack, we analyze how different input wavelength could affect the TOC and heat generation of the power limiter device. Generally, the TOC can be modeled by  \[\label{eq3} {\rm TOC} = \frac{\mathrm{d} n}{\mathrm{d} T} = f(n(\lambda)) \left(\Phi-\beta\right),\] where \(f(n(\lambda))\) is defined as \((n^2-1)(n^2+2)/(6n)\), \(n\) is the reflective index, \(\lambda\) is the wavelength of input light, \(\Phi\) is the electronic polarizability and \(\beta\) is the volumetric expansion coefficient. In most polymers, the volumetric expansion coefficient is more dominant, i.e. \(\Phi\ll\beta\), and hence the overall TOC is typically negative . More importantly, notice that the volumetric expansion coefficient is physically independent of the wavelength. As such, the wavelength dependency of TOC is only related to \(f(n(\lambda))\). The \(f(n(\lambda))\) for acrylic as the function of wavelength is shown in Fig. [\[fig4\]](#fig4){reference-type="ref" reference="fig4"} (a). The corresponding TOC change will introduce a small difference in the output power threshold calculation, as referenced to the power at 1550 nm, which is shown as the red curve in Fig. [\[fig4\]](#fig4){reference-type="ref" reference="fig4"} (a). As for heat generation, it is related to the absorption loss of the material. A lower loss indicates less energy converted from the optical energy to heat energy, thereby resulting in a lower temperature gradient and a higher power limiting threshold. Based on this, a spectral filter with a large power handling capability can be applied to limit the transmission spectrum of the device; in which case the peak power (over the transmitted spectrum) is considered for the security analysis. Considering optical fiber-based applications at 1550 nm, the optical fiber itself is, in fact, a bandpass filter for about 300-2100 nm wavelength, beyond which the transmission loss is higher than 100 dB/km . Thus, by applying a secure fiber with adequate length, light beyond this wavelength range can be suppressed to a negligible level. In this way, it is effective to only consider the wavelength dependency feature within this band. For the material of our power limiter, acrylic, its absorption loss spectrum is shown in Fig. [\[fig4\]](#fig4){reference-type="ref" reference="fig4"} (b) with some low loss bands marked . The loss is about 1.29 dB/cm at 1550 nm and 0.82 dB/cm at 1310 nm, which are standard communication bands. The loss below 1100 nm is even lower. The minimum occurs at about 800 nm with 0.15 dB/cm loss. Based on the absorption spectrum and considering a prism length of 10 cm with 750 m diaphragm, the maximum output power spectrum and the corresponding input power is calculated based on Eq. [\[eq2\]](#eq2){reference-type="ref" reference="eq2"}, as shown in Fig. [\[fig4\]](#fig4){reference-type="ref" reference="fig4"} (c). The power threshold below 1100 nm is about 11 dB higher than the 1310 nm band and more than 17 dB higher than the 1550 nm band. Although a pessimistic power bound of about 8 dBm can be set and used as the system power bound (marked as a red triangle), it is better to use an optical filter to block the light below 1100 nm wavelength. The silicon absorber can be a good candidate, which provides a stable and robust filtering performance. By adding a thin layer of silicon sheet after the power limiter, the output power can be significantly suppressed. As shown in Fig. [\[fig4\]](#fig4){reference-type="ref" reference="fig4"} (c), with only about 1 mm thick silicon, the maximum output power shifts back to the communication bands. The maximum output photon number per second can be further calculated, as shown in Fig. [\[fig4\]](#fig4){reference-type="ref" reference="fig4"} (d). The maximum output photon number per second appears at 1260 nm wavelength with a photon energy of \(1.58 \times 10^{-19}~J\); as such, this wavelength is considered in the security analysis using the worst-case approach. Similarly, for other degrees of freedom, e.g. the state of polarization, the polymer acrylic used in our design inherently possesses isotropic behavior. Thus, by nature, it will not introduce any birefringence related changes and is independent of the thermo-optical effect, which avoids introducing related loopholes to the system. Another consideration is laser damage attacks . Preliminary simulations indicate that the acrylic prism could be damaged with only about 400 mW of input power . If the acrylic is damaged or burnt, the thermal defocusing effect is not applicable anymore and the light might be collected by the output collimator directly. Consequently, the power limiting effect may not hold. However, this issue can be resolved by replacing the crossing-through prism with a total internal reflection structure, where the input beam is non-coaxial with the output. In this way, any damage to the material will not weaken the robustness of our proposal; instead the device works as an optical fuse to permanently block the optical path. # Quantum signal integrity {#sect3.5} To determine if the proposed power limiter is useful for practical use, it is also important to study if the quantum signals will be disturbed when passing through the device. To this end, experiments based on time-bin (intensity), phase, and polarization encoding are implemented to see whether the quantum signal integrity will be affected. Here, we study the QBER of the system, which is defined as the number of errors (\(N_{error}\)) over the total number of detection counts (\(N_{correct} + N_{error}\)), \[\label{eq_qber} {\rm QBER} = \frac{N_{error}}{N_{correct} + N_{error}}.\] In addition, given that the detector is well characterised (e.g., its background noise and single-photon efficiency are known), we may further write \({\rm QBER}= {\rm QBER}_{opt} + {\rm QBER}_{det}\), where QBER\(_{opt}\) comes from quantum optical imperfections (e.g., imperfect state preparation, optical misalignment, etc) and QBER\(_{det}\) comes from the detector dark counts. Here, as mentioned above, our main focus is the QBER\(_{opt}\) for intensity, phase and polarization encoding schemes, which represent three of the most popular choices for QKD in practice. The QBER of intensity or time-bin encoding scheme is measured first. As shown in Fig. [\[fig_qber_i\]](#fig_qber_i){reference-type="ref" reference="fig_qber_i"} (a), the intensity extinction ratio of a pulsed laser is measured to infer the QBER. The pulsed laser is attenuated to about 0.1 photon per pulse and measured by an avalanche photodiode (APD) operating in the Geiger mode (gated). The laser pulse has a repetition frequency of 100 MHz and a pulse width of 400 ps. The APD has a gate width of 1 ns. The delay on the APD gate signal is scanned to cover both the laser pulse (bit 1) and dark region (bit 0). The dark counts here are subtracted after the data acquisition for an accurate extinction ratio measurement of the optical pulse. The power limiter used here has a length of 101.6 mm and a diaphragm width of 750 m. An average input power of 14.49 dBm and-19.72 dBm are tested to demonstrate the cases when the input power is close to and far below the power limiting threshold, respectively. The schematic of the signal controls are shown in Fig. [\[fig_qber_i\]](#fig_qber_i){reference-type="ref" reference="fig_qber_i"} (b). The resulting counts as a function of delay is shown in Fig. [\[fig_qber_i\]](#fig_qber_i){reference-type="ref" reference="fig_qber_i"} (c) and (d). For the input power and the cases with and without the power limiter, the resulting extinction ratios are all above 35 dB, indicating a QBER of less than 0.032%. Therefore, we conclude that the introduction of the proposed power limiter will not introduce any significant noise to QKD systems based on time-bin encoding. For the phase encoding scheme, the experimental setup is shown in Fig. [\[fig_qber_p\]](#fig_qber_p){reference-type="ref" reference="fig_qber_p"} (a). The input CW laser is modulated using a phase modulator switching between 0 and \(\pi\) phase with 50 MHz frequency. The laser output power is 10.28 dBm. Schematics of the signal controls are shown in Fig. [\[fig_qber_p\]](#fig_qber_p){reference-type="ref" reference="fig_qber_p"} (b). The modulated signal is then decoded using an asymmetric Mach-Zehender interferometer (AMZI) with a path delay of around 10 ns. Moreover, a phase shifter is added in one of the paths of the AMZI to lock the relative phase. As such, the interference visibility as well as the QBER can be obtained. Finally the output is attenuated to 0.1 photon per gate and measured by an APD. The counts as a function of delay are shown in Fig. [\[fig_qber_p\]](#fig_qber_p){reference-type="ref" reference="fig_qber_p"} (c) and (d), which corresponds to the case with and without power limiter installed, respectively. The interference visibility \(V\) is shown in Fig. [\[fig_qber_p\]](#fig_qber_p){reference-type="ref" reference="fig_qber_p"} (e) as \((1-V)\) for a clear view. The maximum visibility with and without power limiter are 0.9844 and 0.9836, corresponding to a QBER of 0.78% and 0.82%, respectively. Thus like in the case of time-bin encoding, we conclude that the proposed power limiter device is also suitable for phase-encoding QKD systems. Finally, we study the impact of the device on polarization encoding. The experimental setup is shown in Fig. [\[fig_qber_pol\]](#fig_qber_pol){reference-type="ref" reference="fig_qber_pol"}, where a CW laser with an output power of 11.41 dBm is used and polarization is manually tuned with a polarization controller. The attenuated output goes through a polarization beam splitter (PBS) and the outputs are measured by two APDs. The polarization extinction ratio is calculated from the ratio between the two APD counts. The result shows a polarization extinction ratio of 30.1 dB and 32.6 dB for the case with and without the power limiter, corresponding to QBERs of 0.098% and 0.055%, respectively. This clearly shows that the power limiter will not significantly disturb the state of polarisation of the photon. All in all, we experimentally confirmed that our power limiter device does not introduce any significant noise (in terms of the QBER) to standard QKD systems based on time, phase, and polarization encoding schemes. However, it should be noted that the power limiter does introduce extra losses (insertion loss) to the signal so the photon collection efficiency would decrease when it is deployed on the receiver side. In our experiment, a minimum insertion loss of-5.1 dB is measured, which is equivalent to an transmission efficiency of around 31%, or a transmission distance of 25.5 km(assuming single mode fiber with a transmission loss of 0.2 dB/km). We note that this issue could be mitigated by using materials with higher TOC values so that smaller amount of light absorption is required to trigger the power limiting effect. # Applications and countermeasures {#sect4} ## Security against THAs {#subsect4} As an application of our proposed power limiter, we consider a phase-encoding MDI QKD protocol  with energy constrained THAs. A schematic of our system is shown in Fig. [\[fig5\]](#fig5){reference-type="ref" reference="fig5"}, where Alice and Bob are distant quantum transmitters and supposed to prepare the required phase-encoding coherent states, then send them to Charlie for Bell-state measurement. The protocol is outlined below: Alice and Bob randomly prepare one of the four coherent states \(\{\ket{e^{ix\frac{\pi}{2}}\alpha}\}\) and \(\{\ket{e^{iy\frac{\pi}{2}}\beta}\}\), where \(x,y\in\{0,1,2,3\}\) are the classical information of Alice and Bob, respectively. Then Alice and Bob send the quantum states to Charlie via the quantum channel for Bell-state measurement. The distance between Alice and Bob is contributed by the two fiber spools combined. Charlie interferes the incoming states from Alice and Bob using a 50-50 beam-splitter and measures the outputs using single-photon detectors. Thereafter, he announces the measurement result \(z\in\{L,R,\varnothing\}\) through the authenticated classical channel, which corresponds to the left detector clicks, the right detector clicks, and none of the detector clicks or both detectors click. Alice and Bob repeat the state preparation and measurement for \(N\) rounds. Upon receiving the Bell-state measurement results from Charlie, Alice and Bob only keep data of those rounds give \(z = L, R\). Besides, Bob flips the value of \(y\) if \(z=R\). Alice and Bob then obtain the statistics of all the state combinations of Alice and Bob, conditioned on \(z=L,R\). Particularly, for rounds with \(x,y=0,2\), Alice and Bob keep the data for extracting the secret keys. Alice and Bob then implement parameter estimation and apply error correction and privacy amplification thereafter to extract a pair of identical and secure keys. To take THAs into consideration, different models for Trojan horse states have been proposed. For example, in Ref., the Trojan horse state is modeled as a pure coherent state with a fixed phase and intensity. However, this model might be too restrictive as Eve can send other states. In practice, she could send a mixture of coherent states with different intensities or other states that could potentially leak more information. Another model that can address potential THAs is presented in Refs.. There, the non-vacuum component of the Trojan horse state is modeled by an arbitrary state that lives outside the qubit space in which the legitimate parties encode the information. While this model is very general and could take into accounts of any source side-channels, the resulting bound can be overly pessimistic, since in the worst-case scenario the leakages might correspond to orthogonal quantum states and hence would leak full information about the modulation (key information). In our analysis, we take the intermediate step and allow Eve to send any Trojan horse state in a given optical mode. However, because the modulators in Alice's and Bob's labs are trusted, the resultant Trojan horse states will not be orthogonal after the modulation. As such, the THA will not leak complete information about Alice's and Bob's key information. Without loss of generality, the Trojan horse state can be written as \[\label{eq4} \ket{\] where \(\ket{n},\ket{m}\) are the Fock states injected into Alice's and Bob's apparatus, respectively. \(\ket{\mathcal{E}_{nm}}\) is an ancilla that is kept in Eve's lab. The coefficients \(c_{nm}\) are the quantum amplitudes of the Fock states. Note that the state of the form [\[eq4\]](#eq4){reference-type="eqref" reference="eq4"} includes Trojan horses that are mixed (after tracing out Eve's ancilla) and may even be entangled. The states \(\ket{n}\) and \(\ket{m}\) will accumulate some phases introduced by Alice's and Bob's modulators and hence they would leak some information about \(x\) and \(y\). On the other hand, the states \(\ket{\mathcal{E}_{nm}}\) will not accumulate any phase since it is kept in Eve's lab. After gathering the modulation information from the modulators, the output THA state thus with the form \[\label{eq5} \ket{\] Both the quantum states prepared by Alice and Bob and the THA state will be sent to Charlie via the quantum channel. Thus, the untrusted measurement can be modeled by a quantum-to-classical map, which can be described by an isometry \(\mathcal{U}\) (with an appropriate purification): \[\begin{aligned} \label{eq6} \ket{\phi_{xy}}&=\ket{e^{ix\frac{\pi}{2}}\alpha}\ket{e^{iy\frac{\pi}{2}}\beta}\ket{ &\stackrel{\mathcal{U}}{\longrightarrow}\sum_{z}{\ket{\mathrm{e}^z_{xy}}\ket{z}}. \end{aligned}\] Therefore, given the fact that the Gram matrix \(G\) based on Eq. ([\[eq6\]](#eq6){reference-type="ref" reference="eq6"}) is positive semi-definite and linearly constrained, a tight upper bound of the phase error rate can be obtained by solving the dual problem of a semi-definite program (SDP), similar to the security analysis presented in Ref. . The asymptotic secret key rate can thus be obtained using the so-called Shor-Preskill key rate formula : \[\label{eq8} R \geq \max\{0,P_{\rm pass} [1-h_2(e_{\rm ph})-h_2(e_{\rm bit})] \},\] where \(e_{\rm bit}(e_{\rm ph})\) is the bit (phase) error rate of the system, \(P_{\rm pass}\) represents the probability of successful Bell state measurement when Alice and Bob choose the key generation basis, and \(h_2(\cdot)\) is the binary entropy function. A detailed security analysis is given in the supplemental material. To restrict information leakage, the mean photon-number, \(\nu\), of the THA state should be much less than one. This requirement can be achieved using the proposed power limiter together with an optical attenuator. These devices can be readily implemented in standard quantum transmitters as shown in Fig. [\[fig5\]](#fig5){reference-type="ref" reference="fig5"}. To be more specific, based on the power limiting threshold obtained in Section. [3](#sect3){reference-type="ref" reference="sect3"}, a maximum photon number of injected eavesdropping light can be strictly constrained by the proposed optical power limiter. Then, the injected light will go through the attenuator twice before being collected by Eve, while the quantum state for QKD has just been attenuated once. Consider a QKD system working at a frequency of 1 GHz, with a power limiting threshold of 1 mW and an ideal phase modulator that does not introduce any extra insertion loss. In this case, an attenuation of 69 dB is sufficient to guarantee an average energy output of \(\nu=10^{-7}\). At the same time, the laser output can be adjusted to optimize the intensity \(\mu\) for QKD, where an averaged optical power of 23 W can be used to generate quantum states with \(\mu=0.0183\). This is similar to the optimized intensity for MDI QKD with a detector efficiency of \(\eta_\text{det} = 85\%\), dark count rate \(p_\text{dc} = 10^{-7}\), and a 100 km transmission distance. Comparing to Ref.  where the 12.8 W optical fiber damage threshold was used as the upper bound, the proposed power limiter could limit the power by 4 to 5 orders of magnitude lower. As a result, the requirement for attenuator and optical isolator is significantly reduced. Also, removing the need to have isolators could benefit future chip-based integration of such MDI QKD systems. As mentioned, due to the finite response time of the power limiter, only the average power of the THA (instead of the maximum power of the THA pulses) can be bounded. To this end, we develop a general proof technique (see the supplemental material) that uses only the average photon number information of the THA. In particular, the security proof takes into account attacks where Eve employs a mixture of bright Trojan horse pulses with the vacuum (where the probability of sending a bright light is small enough such that the energy constraint is satisfied). As such, the proposed optical power limiter can be used to ensure that the assumptions of the security proof are enforced during the protocol. To benchmark the performance of the protocol, we simulate the achievable asymptotic key rate with two sets of parameters: (1) detector's efficiency \(\eta_\text{det} = 10\%\), dark count rate \(p_\text{dc} = 10^{-5}\), (2) detector's efficiency \(\eta_\text{det} = 85\%\), dark count rate \(p_\text{dc} = 10^{-7}\). For both sets of parameters, misalignment error \(e_{\text{ali}}\) is set to be \(2\%\), and the transmission loss of optical fiber is set to be 0.2 dB/km. We also assume that the central node is equidistant to Alice and Bob and \(\mu_A = \mu_B = \mu\), which has been optimized over the simulation. As for the THA intensity, we set \(\nu_A=\nu_B=\nu\). The results of the simulation are shown in Fig. [\[fig6\]](#fig6){reference-type="ref" reference="fig6"}. The results indicate Alice and Bob can get a promising key rate without being affected much by the Trojan horse attack if the energy of the THA is properly upper bounded. ## Potential countermeasures ### Bright illumination attacks Laser damage attacks are a particularly powerful class of bright illumination attacks. In Ref. , it is shown that the detectors and optical components are prone to permanent changes and damages when Eve sends in a bright damaging laser with power in the order of Watts. This is crucial because the security of most QKD systems depend on the integrity of their devices---that they behave according to design specifications. Another class is detector blinding attacks . By exploiting the implementation knowledge of single-photon detectors and the imperfect detector performances, Eve can send in a relatively strong eavesdropping light to change the working condition of the detector and get partial (or even full) control over the outcomes . For illumination-related attacks, a common feature is that Eve must send in relatively bright light pulses. Hence, by restricting the input optical power using the proposed power limiter, it is expected that some of these attacks could be thwarted. To illustrate this possibility, we sketch out a method that could prevent the bright illumination attack presented in Ref. ; see Fig. [\[fig_blind\]](#fig_blind){reference-type="ref" reference="fig_blind"} (a). To start with, we note that standard single-photon detectors based on APD typically require low-temperature operation to minimize the detectors' background noise, i.e., to limit the dark count rate. To cool the detectors, thermoelectric coolers (TECs) are used but these have limited cooling capacity. In Ref. , it is shown that injection of bright light pulses can create a situation in which the generated heat fails to dissipate completely. This leads to the breakdown voltage of the APD going above the predetermined value, which consequently puts the detector into the *linear* mode (instead of *Geiger* mode); see Fig. [\[fig_blind\]](#fig_blind){reference-type="ref" reference="fig_blind"} (b). In this case, the detector is no longer sensitive to single-photon input (i.e., *blinded*) and Eve can manipulate its outcome by sending in a control light pulse superimposed on the bright light pulse, as depicted in Fig. [\[fig_blind\]](#fig_blind){reference-type="ref" reference="fig_blind"} (c). According to Ref. , a bright CW light with an optical power of around 10 mW is required to blind the commercial QKD detectors, and a control light pulse with a peak power of around 1 mW is sufficient to fully control the detector's outcome. If the power limiter is in place, as shown in Fig. 7 (a), the input light power can be limited below than this blinding threshold, which would prevent the temperature of detector from raising and hence the detector from being blinded (see Fig. [\[fig_blind\]](#fig_blind){reference-type="ref" reference="fig_blind"} (d)). For example, we can use an acrylic prism with length of 50.8 mm and a diaphragm width of 380 m to provide a power limiting threshold of 6.03 dBm (with-6.02 dB insertion loss) to prevent such attack. It's important to note that in normal working conditions, quantum signals (i.e., optical signal with small energy levels) in principle will experience a small amount of loss while passing through the power limiter device, since the power limiting effect hasn't been triggered. As such, the introduction of our power limiter are not expected to greatly reduce the overall performance of practical QKD systems. As with our current design, we can expect a smaller insertion loss as well as a stronger power limiting effect, for example, by using material with a higher TOC. ### Plug-and-play QKD with untrusted light sources {#sect_twowaycomm} Plug-and-play QKD is a two-way communication configuration  that aims to simplify implementation requirements such as polarization compensation and reference frame calibration. This approach is especially useful for practical MDI QKD systems since it naturally guarantees near-perfect mode matching for the required two-photon interference . However, in using external (untrusted) light sources instead of trusted light sources, plug-and-play systems are prone to transmitter-based attacks . Again, the central issue here is that Eve can inject bright light pulses to break the working assumptions of QKD. To overcome this issue, one popular approach is to monitor the energy of the incoming light with a classical detector . However, it has been shown that such active monitoring methods are not entirely robust and the classical detectors can still be hacked by exploiting their electrical circuitry, e.g., see Refs. . In light of the above, it is thus interesting to explore alternative countermeasures that are based on passive devices instead of active devices such as detectors. To this end, we propose to replace (or augment) the active power monitoring device with a passive power limiter as shown in Fig. [\[fig_pnp\]](#fig_pnp){reference-type="ref" reference="fig_pnp"}. Similar to the arguments provided in Section. [5.1](#subsect4){reference-type="ref" reference="subsect4"}, the power limiter would limit the energy of the outgoing light and hence Eve's knowledge about the key information as well; we leave a more careful security analysis to future work. In addition, it is worthwhile to add that existing methods to limit incoming light energy are typically based on isolators/circulators and laser damage threshold of devices . These are however one-directional and add additional attenuation on the propagating direction of the eavesdropping light. In the case where quantum signal has the same propagation as Eve's light, i.e., plug-and-play QKD or quantum receivers to resist against bright-illumination attacks, they may either pessimistically estimate Eve's information---since the actual input power significantly deviates from the device damage threshold, which will be used for security analysis, or introduce large insertion loss so the system performance will be greatly affected. As a comparison, the proposed power limiter is shown to be able to provide an adjustable power limiting threshold on the output optical power, and capable of protecting the system where the eavesdropping light and quantum signal have the same propagation direction. # CONCLUSION {#sect5} In this report, we have proposed and demonstrated a passive power limiter design based on the thermo-optical defocusing effect of an acrylic prism. By numerical simulations and the experimental demonstration, we rigorously studied the feasibility and performance of our power limiter design. In our experiment, the lowest optical power limiting threshold of-27.9 dBm with an insertion loss of-34.0 dB is measured. With a different setting, a low insertion loss of-5.1 dB is achieved with a 10.3 dBm power limiting threshold. The values are adjustable according to different system requirements. It is possible to further reduce the insertion loss at a certain power threshold by switching to a material with higher TOC values or/and reduce the beam width. Besides, our design possess desirable features like compactness, robustness, plus polarization and spectrum-dimension independence. To illustrate the applicability of our proposed power limiter, we have quantitatively developed a general security analysis that allows for arbitrary of Trojan-horse states. By properly limiting the THA energy leakage in a MDI QKD system, a desirable secure key rate and transmission distance can be achieved. Moreover, based on the previous evidences, we remarked that the power limiter can be useful for deterring bright illumination attacks in a quantum cryptography system. We took the thermal CW-blinding attack on the APD detectors as an example, and show how the power limiter can be designed to prevent such an attack. We further discussed the possibility of using a power limiter to secure the plug-and-play QKD systems without active elements. As demonstrated in our paper, by simply limiting the incoming/outgoing optical energy, a broad class of QKD protocols can be practically protected without introducing cumbersome device modification. Beyond these, one can also expect such a power-limiting device to find applications in securing semi-device-independent quantum protocols based on energy constraints , line-topology or ring-topology multiparty quantum communication systems . As such, we believe it will attract much interest and possess the potential to become a standard tool for quantum cryptography applications.
{'timestamp': '2021-03-03T02:25:39', 'yymm': '2012', 'arxiv_id': '2012.08702', 'language': 'en', 'url': 'https://arxiv.org/abs/2012.08702'}
null
null
# INTRODUCTION Although interest in topological data analysis has grown sharply in recent years, most of the important developments have appeared outwith the statistical literature. We suggest that a consequence is that the potential benefits of adapting some established statistical methods to topological data may not have been fully exploited. In this paper we argue that event history methods are highly suitable for the analysis of data on certain topological features, that the use of such methods can increase the power and effectiveness of topological data analyses, and in turn that exploitation of topological features can bring added value to statistical analyses. We use Fig. [\[fig:intro1\]](#fig:intro1){reference-type="ref" reference="fig:intro1"} and Fig. [\[fig:intro2\]](#fig:intro2){reference-type="ref" reference="fig:intro2"} to illustrate, at the cost of preempting Section 3, where they will be explained more fully. Figure [\[fig:intro1\]](#fig:intro1){reference-type="ref" reference="fig:intro1"} shows four simulated stationary and isotropic random fields, each on a \(60\times 60\) discrete lattice. They are simulated to have correlation functions that are indistinguishable for practical purposes. All four have standard N(0,1) marginal distributions. Panel (a) is a simulation from a Gaussian random field, panels (b) and (c) are independent realisations of one particular non-Gaussian random field, and panel (d) is a realisation of a second non-Gaussian random field. Panel (d) is visually quite different from the others, but we see no obvious differences between (b) or (c) and the Gaussian random field (a). Figure [\[fig:intro2\]](#fig:intro2){reference-type="ref" reference="fig:intro2"} however shows simple Nelson-Aalen plots based on topological features of these data, to be described in Section 3. Now the differences are stark. Given that all four have the same marginal and correlation properties, we know of no other method that can draw out higher order differences so readily. Further, panel (a) is seen to be consistent with a Gaussian random field while the other panels are not. Topological data analysis is in part founded on persistent homology. Important early contributions include , and, particularly,, who introduced the idea of persistence of features along filtrations. However, the earliest appearance of the expression "topological data analysis" seems not to have been until work by and. Later, was key in the popularisation of topological data analysis, demonstrating how ideas from topology could solve many of the issues faced when applying geometric methods to complex data. Other developments are described by. In Section 2 we give an introduction to the key constructs and concepts underpinning persistent homology and topological data analysis, aimed at a statistical reader. In Section 3 we develop the idea of Nelson-Aalen plots for topological features of random fields, as already seen in our introductory example. We apply the methods in two application areas, one being properties of climate model residuals on a sphere, and the other the distribution of neutral atomic hydrogen [H]{.upright} i in the interstellar medium. In Section 4 we consider topological methods for embedded metric trees and propose Cox regression methods as a simple way to deal with potentially censored tree data. This method is applied to vascular structures in fundus images of the human eye, where it has potential to be an effective screening tool for the early detection of diseases. # TOPOLOGICAL DATA ANALYSIS Topology is the study of features in a space that are invariant under continuous deformation. We will concentrate on topological data analysis methods that are based on persistent homology, which is the most popular variant of topological data analysis. Detailed descriptions are provided by, inter alia, , , and, with an excellent computational description given by. Other variants of topological data analysis are summarised by. We assume we have a metric space and inherited distance function. Dealing with arbitrary features in a space is complicated, and so a starting point is to give a representation in a common form. One such is a simplicial complex, which is a collection of vertices, edges, triangles, tetrahedra and higher dimensional equivalents. Thus the letters T, D, and A when written on a page could be represented by four vertices connected by three edges (T), a triangle (D) and a triangle with two extra external edges to two extra vertices (A). Simplicial complexes are not unique but they facilitate the use of linear algebra for the computation of topological invariants, which are features that do not change when the underyling space is bent, stretched or otherwise deformed, but without gluing or tearing. The most important topological invariants are the homology groups, which are formally algebraic constructs, one per natural number, that collect together invariant features at each dimension. The ranks of these groups are called Betti numbers. The zero-dimension homology group \(H_0(\mathcal{X})\) of a simplicial complex \(\mathcal{X}\) consists of the disjoint elements, often referred to as connected components. For example, if the letters T, D, and A are written on a page then there are three connected components and the zero-order Betti number is \(\beta_0=3\). In three dimensions, if we take for example letter balloons of T, D and A, there are still three connected components. The next homology group \(H_1(\mathcal{X})\) consists of holes constructed from one-dimensional edges. These are loops or cycles that cannot be shrunk to a single point. For T, D, and A on a page there are two, so \(\beta_1=2\). For T, D, and A as letter balloons we have \(\beta_1=4\). This is because the D and the A are each homologous to a torus. The hole through the centre of the torus is obvious: the other hole arises because a loop around the circle of revolution that forms the torus cannot be shrunk to a point without leaving the surface. The second-dimension homology group \(H_2(\mathcal{X})\) consists of two-dimensional cycles which enclose an empty three-dimensional space, often called a void. For T, D, and A in balloon form there are three, with one per connected component. For T, D, and A on a page there are none. We now turn to persistent homology, which begins with a filtration of a space or simplicial complex \(\mathcal{X}\). This is a nested sequence of subsets \[\emptyset = \mathcal{X}_0 \subseteq \mathcal{X}_1 \subseteq \cdots \subseteq \mathcal{X}_d \cdots \subseteq \mathcal{X}_n = \mathcal{X}, \label{eqn:filtration}\] indexed by a parameter \(d\) that can be discrete or continuous. Each subset is itself a valid simplicial complex, with associated homology groups. Panel (a) of Fig. [\[fig:trees\]](#fig:trees){reference-type="ref" reference="fig:trees"} illustrates. It shows a rooted metric tree embedded in two dimensions, and is a simplified version of the metric trees we will consider in Section 4. There are no cycles and so no holes. In this example the feature of interest is the connectivity of the tree as we move towards the root, filtering inward by radial distance. So \(\mathcal{X}_d\) consists of the subset of \(\mathcal{X}\) that is outside a circle of radius \(r=1/d\) from the root. The plot shows two examples. The complex outside the outer circle consists of just one connected component. The complex outside the inner circle consists of nine connected components. In persistent homology the appearance and disappearance of features is tracked as we move through the filtration. A feature is said to be born when it appears and to die when it disappears or merges with another feature. Thus if we start with \(r=\infty\) in Fig. [\[fig:trees\]](#fig:trees){reference-type="ref" reference="fig:trees"} there are no features. This continues as \(r\) is decreased until it reaches the point on the tree that is furthest from the root, at radius \(r_{\rm max}\) say. The first component is born at this level. As \(r\) is decreased further, additional components are born at vertices that have only inward facing edges. Existing components merge at vertices with two outward facing edges. In these cases, by convention the component that was born first is assumed to continue, and the component that was born second is said to die at this radius. The process continues until the root is reached and the tree consists of a single connected component. The birth and death levels of components are often represented by a persistence diagram, as in panel (b) of Fig. [\[fig:trees\]](#fig:trees){reference-type="ref" reference="fig:trees"}. This is a plot of birth times and death times of features as we move through the filtration. In the example we have plotted against \(r_{\rm max}-r\) so that the first component to be born is on the left of the horizontal axis. Points near the diagonal are short-lived, points further from the diagonal are longer-lived. In the example we have two subtrees with common root, which merge only at \(r=0\) and so there are two points with the same maximum death time. A common way to represent a topological space is through a point cloud, as in panel (c) of Fig. [\[fig:trees\]](#fig:trees){reference-type="ref" reference="fig:trees"}. In these cases a filtration is usually defined by growing balls of increasing diameter, centred on the points. There are different ways of forming simplicial complexes in these cases, the most common of which is the Vietoris-Rips complex, which defines a subset of points to be a simplex in \(\mathcal{X}_d\) when all pairwise distances between points are less than \(2d\). The persistence diagram in panel (d) relates to the birth and death of holes for this example. The grey broken lines indicate the ball radius shown in (c). We see that a medium sized hole is about to be born towards the upper right and this will have modest persistence. A large hole in the centre will be born when the ball radius is increased a little more. This will be the last hole to die and is represented by the highest point in panel (d). Topological data analysis is often used when there is a real-valued function \(z_x\) associated with each point \(x\) in a space \(\mathcal{X}\). A lower level set \(\mathcal{X}_t\) is defined as \[\mathcal{X}_t= \{x: z_x\leq t, x \in \mathcal{X} \}, \label{eqn:levelset}\] and upper level sets can defined similarly. A filtration is defined by increasing or decreasing the threshold \(t\) and persistence of topological features in the level sets is tracked. Figure [\[fig:levsets\]](#fig:levsets){reference-type="ref" reference="fig:levsets"} illustrates. In panel (a) we show a two-dimensional image on a discrete \(20 \times 20\) grid. We assume that pixels that share an edge are connected but those that share only a vertex are not. Panels (b) and (c) show two level sets: pixels with image values less than \(t=-1\) and less than \(t=0\) respectively, marked as dark squares. In panel (b) there are \(\beta_0=6\) connected components. There are also two regions in that panel that are not in the level set and are completely separated by connected components. Hence \(\beta_1=2\). The level set has expanded by \(t=0\) in (c) and the six previous components have merged, along with others, to form one large component. One new component has appeared to the lower left, and a small single-pixel component is close by, so \(\beta_0=3\). Five holes are evident. The final panel of Fig. [\[fig:levsets\]](#fig:levsets){reference-type="ref" reference="fig:levsets"} shows a so-called barcode for connected components for the image in panel (a). This is an alternative to a persistence diagram for the presentation of lifespans of topological features as we filter through the level sets. There is one line per feature, starting at the birth level and ending at the death level. In the example the lowest field value is in the dark region to the top right. This corresponds to the first pixel to appear in the level set, which by convention is the last to die, giving the long line at the bottom of the barcode in (d). The second component to be born is at a local minimum toward the top-left of the image. This component also has the second-longest lifetime until it merges with the first at around \(t=-0.25\). The third-longest lifetime corresponds to the cluster at the lower left of the figure, which is relatively late to be born but quite isolated from other components and hence persists for some time. A variety of approaches for the analysis of persistence diagrams and barcodes have been proposed. Wasserstein or bottleneck distances can be used to measure the difference between two persistence diagrams, but these measures are not calibrated to any interpretable scale. There remains no useful equivalents of, say, means or variances for persistence diagrams, which would be needed for inference. , and showed how to obtain a Fréchet mean for a group of persistence diagrams, but unfortunately this is not unique. An alternative is to base inference on summaries such as the landscape functions of , which essentially consider nested profiles of the point patterns, or on counts of points over subregions, possibly with smoothing to produce the persistent images of, for example, . Other proposals include a form of parametric bootstrap suggested by and the accumulated persistence suggestion of. provides a recent review. Our approach is quite different. # NELSON-AALEN FOR RANDOM FIELDS ## Method Let \(\mathcal{Z}\) be a zero-mean real-valued random field defined on a finite discrete space \(\mathcal{X}\). We assume a discrete space because in the applications we have in mind the field will often be an image, and invariably pixellated. Let \(z_x\) be the field value at location \(x \in \mathcal{X}\). We assume \(z_x\) is drawn from a continuous distribution with no jump discontinuities and that there are no ties. We will require cor\((z_x,z_{x^\prime})<1\) for all \(x \neq x^\prime\) in \(\mathcal{X}\). Our filtration corresponding to [\[eqn:filtration\]](#eqn:filtration){reference-type="eqref" reference="eqn:filtration"} will be the nested sequence of sub-level sets ([\[eqn:levelset\]](#eqn:levelset){reference-type="ref" reference="eqn:levelset"}). But instead of tracking the persistence of features, which underpins most published applications of topological data analysis, we will take a counting process approach based on the birth levels of new features in the filtration. As well as being computationally much more simple, the approach leads naturally to the use of methods that are familiar in event history analysis, with level playing the role of time and with negative values allowed. As features of interest we will concentrate here on connected components within \(\mathcal{X}_t\), namely the \(0\)-dimensional features. A component is born at location \(x\) at level \(t\) if \(z_x=t\) and \(x\) corresponds to a local minimum of \(\mathcal{Z}\). To define a local minimum in the discrete space \(\mathcal{X}\) we need to define the neighbours \((x)\) of each location \(x\). We are free to do this as we wish, though shared edges or nearest neighbours seem sensible for pixellated or lattice-based fields. Let \(N_x(t)\) count the number of components that are born at location \(x\) up to and including level \(t\), and let \(Y_x(t)\) be the associated predictable at-risk indicator. This is an indicator of whether, given the evolution of level sets to just before level \(t\), it is possible for location \(x\) to hold a local minimum at \(t\). So \[N_x(t) = \left\{ \begin{array}{ll} 1\;\;\;\; & z_x\leq t,\;\; z_{(x)}> z_x 1_x,\\ \\ 0& {\rm otherwise}, \end{array} \right. \;\;\;\;\;\;\ Y_x(t) = \left\{ \begin{array}{ll} 1\;\;\;\; & z_x \geq t,\;\; z_{(x)}> t 1_x,\\ \\ 0 & {\rm otherwise}, \end{array} \right. \label{eqn:counts}\] where \(1_x\) is a unit vector of the same length as \(z_{(x)}\). Define \(N(t)=\sum_xN_x(t)\) and \(Y(t)=\sum_xY_x(t)\). Now let \[\hat{A}(t) = \int_{-\infty}^t \frac{dN(u)}{Y(u)}. \label{eqn:nelaal}\] This is an analogue of the Nelson-Aalen estimator of the cumulative hazard for a survival time variable. If preferred, we can redefine the level scale \(t\) to \(t^\ast=\exp(t)\) so as to be a more familiar non-negative argument. Like the Nelson-Aalen estimator, \(\hat{A}(t)\) is defined for all \(t\) and has a finite number of discontinuities at the observed birth times. It is non-negative and uniformly bounded for fixed \(\mathcal{X}\). It is a cadlag process, meaning continuous to the right with left limits. However, the standard Nelson-Aalen variance estimator \[{\hat{\rm{var}}\{\hat{A}(t)}\} = \int_{-\infty}^t \frac{dN(u)}{Y^2(u)} \label{eqn:var}\] does not in general apply, for a variety of reasons. One is possible non-independence between counting processes at different locations given non-independence of the underlying field values. Another, related, reason is informative censoring: knowledge that location \(x\) falls out of the risk set at level \(u\) provides information about other locations. And a third reason is that we have not constructed a martingale with respect to the observed data filtration. We propose such Nelson-Aalen estimators for topological features as tools for comparing properties of fields beyond marginal and correlation structures, for comparing observed field data or model residuals with an assumed parametric model, and as a diagnostic for assumed or fitted correlation structures. We allow either a single field \(\mathcal{Z}\) or independent and identically distributed replicates \(\mathcal{Z}_1, \mathcal{Z}_2, \ldots,\mathcal{Z}_N\) defined on a common space \(\mathcal{X}\). ## Asymptotics If \(\mathcal{X}\) is fixed and there are \(N\) independent replicates \(\hat{A}_1(t), \ldots, \hat{A}_N(t)\), then as each \(\hat{A}_i(t)\) is non-negative and bounded above, for each level \(t\) the variance of \(\hat{A}_i(t)\) is finite and the classic central limit theorem applies. Hence pointwise inference for large \(N\) is straightforward, based on the sample mean \(\bar{A}(t)\) and associated sample standard deviation. For simultaneous confidence bounds we need to be a little careful because of the discontinuities in \(\hat{A}_i(t)\). for instance points out that there can be uniformly bounded cadlag processes for which no central limit theorem applies, depending upon properties of their jumps. provide sufficient conditions under which \(\surd N\bar{A}(t)\) converges weakly to a Gaussian process with finite variance and smooth sample paths in \((0,\tau)\), for any arbitrarily large \(\tau\) for which pr\(\{Y(\tau)>0\}>0\). These conditions are verified in Supplementary Material. Hence a functional central limit theorem applies. Further, for fixed \(\mathcal{X}\) we can show that \(\bar{A}(t)\) is consistent in \(N\) for \[A(t) = \displaystyle\int_{-\infty}^t J(u)\frac{ \sum_x {\rm pr}(z_{(x)}> u 1_x \mid z_x=u) f_x(u)}{\sum_x {\rm pr}(z_x>u, \;z_{(x)}> u 1_x)} du, \label{eqn:limit}\] where \(f_x(.)\) is the marginal density of \(z_x\) and \(J(u)=1\) if \(E\{Y(u)\}>0\), zero otherwise. If \(N=1\) and there is just a single realisation, the estimator \(\hat{A}(t)\) is also consistent for ([\[eqn:limit\]](#eqn:limit){reference-type="ref" reference="eqn:limit"}), but this time as the cardinality of \(\mathcal{X}\) increases, provided cor\((z_x, z_{x^\prime})\) approaches zero as the distance between \(x\) and \(x^\prime\) increases. ## Inference For inference, we need to distinguish between the single and multiple replication situations. We will begin by assuming multiple replications: \(\hat{A}_1(t), \ldots, \hat{A}_N(t)\). We can consider the replicates \(\hat{A}_i(t)\) as functional data. It is helpful to discretise the time/level scale of the estimator ([\[eqn:nelaal\]](#eqn:nelaal){reference-type="ref" reference="eqn:nelaal"}) to a grid of \(M\) distinct levels \(\tau_1=t_1,\ldots,t_M=\tau_2\). This is a common assumption in functional data analysis and deals effectively with the discontinuities in our estimators, which with probability one will not occur at measurement points. There are then a huge array of analysis techniques immediately available: see for example the excellent review by for general approaches, and for a specific example of treating discretised hazards as functional data. With our applications in mind, we will mention only the construction of simultaneous confidence bands. This problem has had attention for functional data that are either sparse or dense. Given that our discretisation is by design, a dense functional data approach is appropriate. Let \(\hat{A}_{ij}\) be the Nelson-Aalen estimator for field \(\mathcal{Z}_i\) at level \(t_j\). Let \(\bar{A}_j\) and \(\hat{\sigma}_j^2\) be the sample mean and sample variance of the estimators at \(t_j\), and let \(\hat{\rho}_{jk}\) be the estimated correlation between \(\hat{A}_{.j}\) and \(\hat{A}_{.k}\). establishes that for fixed \(\tau_1\) and \(\tau_2\), as both \(N\) and \(M\) increase \[\bar{A}_j\pm c_\gamma\hat{\sigma}_j/\surd N \label{eqn:ci}\] has asymptotic coverage \(1-\alpha\), where \(c_\alpha\) is the upper \(\alpha\)-quantile of the maximum absolute value over \((\tau_2-\tau_1)/\tau_2\) of a Gaussian process with standard margins and with correlation function equal to an appropriately scaled limit of \(\hat{\rho}_{jk}\). The threshold \(c_\gamma\) needs to be obtained numerically: software is available in the R package `SCBmeanfd`. Turning to the case of a single replication only, we assume a parametric model \(F_\theta\) is available for the random field \(\mathcal{Z}\) and we propose a parametric bootstrap approach. Parametric and more general bootstrap methods for functional data have been studied empirically and theoretically by, for example,. We require a consistent estimator \(\hat{\theta}\) of the parameter vector \(\theta\). We then generate \(B\) simulated realisations of \(\mathcal{Z}\) on \(\mathcal{X}\) from \(F_{\hat{\theta}}\), and obtain the bootstrap Nelson-Aalen estimators \(\hat{A}_b(t)\) for \(b=1,\ldots,B\). Pointwise intervals that have correct coverage asymptotically in \(B\) and \(\mid \mathcal{X} \mid\) can be obtained from the bootstrap quantiles or a Normal approximation justified by the central limit theorem. For simultaneous confidence bands we suggest a Monte Carlo method used by that avoids explicit estimation of the correlation function. We again discretise the original and bootstrap estimators \(\hat{A}_b(t)\) to a dense grid of \(M\) points over a fixed range of levels \((\tau_1, \tau_2)\). Let \(\hat{A}_j\) be the Nelson-Aalen estimate ([\[eqn:nelaal\]](#eqn:nelaal){reference-type="ref" reference="eqn:nelaal"}) at level \(t_j\) obtained from the original data, and let \(\hat{A}_{bj}\) be corresponding value from bootstrap replicate \(b\). Let \(\bar{A}_j\) and \(\hat{\sigma}_j\) be the bootstrap mean and estimated standard deviation at \(t_j\). Define \[G_b= \max_j\{ \mid \hat{A}_{bj}-\bar{A}_j \mid/\hat{\sigma}_j \},\] and take \(\hat{d}_\alpha\) to be the upper \(\alpha\)-quantile of the empirical distribution of \(G_1, \ldots, G_B\). Then for large \(M\) an approximate simultaneous confidence band for \(A(t)\) over \((\tau_1, \tau_2)\) is \[\hat{A}_j\pm \hat{d}_\alpha \hat{\sigma}_j \hspace*{1cm} j=1,\ldots, M.\] ## Simulation studies We consider random fields on \(d\times d\) lattices and investigate three models. The first, M1, is a stationary and isotropic Gaussian random field with standard N(0,1) marginals and Matérn correlation function. If locations \(x\) and \(x'\) are separated by Euclidean distance \(u\) then \[\mbox{cor}\left(z_x,z_{x'}\right)= \frac{2^{1-\nu}}{\Gamma(\nu)}\left(\sqrt{2\nu}u/\eta\right)^\nu K_\nu\left(\sqrt{2\nu} u/\eta\right),\] where \(K_\nu(.)\) is a modified Bessel function of the third kind. Let \(\theta_1=(\eta, \nu)\). The second model, M2, is a marginally transformed \(\chi^2_1\) field. We simulate from the Gaussian random field model M1, with parameters \(\theta_2\). Values are then squared to give \(\chi^2_1\) margins. Let \(y_x\) be the value at location \(x\). We next marginally transform to N(0,1) using \(z_x=\Phi^{-1}\{F_1(y_x)\}\), where \(\Phi(.)\) and \(F_1(.)\) are the N(0,1) and \(\chi^2_1\) cumulative distribution functions, respectively. The third model, M3, is a marginally transformed \(F_{3,3}\) field. We begin by constructing two independent \(\chi^2_3\) fields, each from the sum of three squared independent Gaussian random fields M1 with Matérn parameters \(\theta_3\). The ratio of these \(\chi^2_3\) fields has \(F_{3,3}\) distribution and we again marginally transform back to N(0,1). All simulated fields are mean-corrected to help with the comparisons. The purpose of the marginal transformations is to generate fields that are not Gaussian random fields but which have Gaussian N(0,1) marginal distributions. This is so that we can assess the added value of topological methods over and above simple comparisons of marginal distributions. Similarly, in our simulations, for each choice of correlation \(\theta_1\) for model M1 we choose \(\theta_2\) and \(\theta_3\) so as to match as closely as we can the correlation of the final M2 and M3 fields to Matérn with parameters \(\theta_1\). Details of this are presented in Supplementary Material. Again, the point is to show that differences between fields are not explained by differences in correlation functions. We have no particular interest in M2 and M3 other than as easily generated non-Gaussian random fields to be used as comparators. The previously-presented Fig. [\[fig:intro1\]](#fig:intro1){reference-type="ref" reference="fig:intro1"} gives in panel (a) an example simulation from M1 on a \(60 \times 60\) lattice with \(\theta=(5,1).\) Panels (b) and (c) provide two examples of M3, and panel (d) an example of M2, with matched correlations. The topological Nelson-Aalen plots for these fields are in Fig. [\[fig:intro2\]](#fig:intro2){reference-type="ref" reference="fig:intro2"}. The solid line is the limiting value [\[eqn:limit\]](#eqn:limit){reference-type="eqref" reference="eqn:limit"}, which we obtained using the multivariate Gaussian distribution function routine in the R package `mvtnorm`. Table [1](#tab:cov1){reference-type="ref" reference="tab:cov1"} shows coverage of nominal 95% confidence intervals and bands based on Nelson-Aalen plots for connected components from Gaussian random fields M1 simulated on a 60\(\times\)`<!-- -->`{=html}60 lattice. Pointwise coverage is evaluated at selected percentiles of the at-risk distributions, ie levels \(t\) satisfying \(E\{Y_x(t)\}=p\) for five different values of \(p\). The simultaneous confidence bands cover the central 90% of the at-risk distributions, discretised to a grid of 200 equally spaced points. For each parameter combination we give results for three methods. The first, for reference, is a naive approach that assumes standard methods based on the variance estimator ([\[eqn:var\]](#eqn:var){reference-type="ref" reference="eqn:var"}) can be applied and using for simultaneous confidence bands. The second method assumes we have a single replication and uses a parametric bootstrap with \(B=200\) simulated Gaussian random fields, generated with Matérn correlation parameters taken as the maximum likelihood estimates from the sole replicate. The third method assumes we have replicates. The standard and parametric bootstrap results are based on 1000 single simulations, the results with replications are from 1000 batches of \(N=40\) replicates, which matches an application in the next subsection. There is severe undercoverage at times for the standard confidence intervals, but the other methods both produce good results. Simulation results for M2 and M3 are provided in Supplementary Material, along with further simulations to assess size and power when using our method to test for a Gaussian random field. ::: # DISCUSSION There are a number of areas for further work. In Section 3 we suggested empirical variances for the Nelson-Aalen estimator when there are repeated samples of random fields, as in the climate example, and parametric bootstrap estimators when there was interest in a particular model, such as a Gaussian random field. In Supplementary Material, an adjusted parametric bootstrap assuming local misspecification as in is suggested and provides a conservative approach for the case of a single sample and no model. However, it would be useful formally to develop a non-parametric variance estimator. In both Section 3 and Section 4 we concentrated on the birth times of connected components. We might also consider death times, though the identification of risk sets is less straightforward in this case, which in turn means that limiting properties will be harder to derive. For complexes in two or higher dimensions, including the random fields of Section 3, we could consider higher order features. In two-dimensions it will be particularly simple to use our methods to investigate death times of holes, which as a result of Alexander duality can be analysed in the same manner as births of components simply by reversing the direction of the filtration.
{'timestamp': '2020-12-17T02:13:09', 'yymm': '2012', 'arxiv_id': '2012.08810', 'language': 'en', 'url': 'https://arxiv.org/abs/2012.08810'}
# [\[Introduction\]]{#Introduction label="Introduction"}Introduction Although FL is born for high efficient distributed model building, it's not as efficient enough as we thought. Many existing methods may perform well for IID data setting, but non-ideal for non-IID data setting. In these methods,thier continuous global model sharing strategy, which makes them over focusing on global data distribution fitting but ignoring local data distribution. In FL, the methodology for this kind of problem is called personalization. To improve the personalization performance of FL, we bring the double head design in this paper. This idea is inspired from the multi-task learning, where multiple heads design is introduced to remember the model info from history missions. Similarly, we expect our double head design will achieve a good balance for model optimization between global and local data distribution. Communication efficiency is another concerned topic in FL. Here we create the gradual sharing design to handle it. We get this idea from the analysis of model convergence rules. As we know, clients' models share a similar convergence direction during their initial rounds of training. So it is not necessary to share model in this stage during this stage. In addition, we notice that once a frozen model restarts to share, it could recover to the normal performance effectively. All this gives us confidence to try the gradual sharing design instead of always model sharing in FL to save communication cost. We summarize three main contributions of our method as below. - We propose a double head design for FL, which makes our FL model benefit from the local and global data simultaneously. - We introduce a gradual model sharing strategy for FL to save its communication cost greatly. - We split the data distribution setting over train and test data, which contributes to better evaluation for FL methods over various data distribution settings. The rest of our paper is organized as follow. In Sec.[\[RelatedWork\]](#RelatedWork){reference-type="ref" reference="RelatedWork"} we overview existing methods towards FL efficient problems. In Sec.[\[OurDesign\]](#OurDesign){reference-type="ref" reference="OurDesign"} we introduce our creative designs in detail. In Sec.[\[Experiments\]](#Experiments){reference-type="ref" reference="Experiments"} extensive experiments are made to evaluate our method. Finally, in Sec.[\[Conclusion\]](#Conclusion){reference-type="ref" reference="Conclusion"}, we summarize our method. # [\[RelatedWork\]]{#RelatedWork label="RelatedWork"}Related Work Since the concept of FL was proposed by Google, personalization effectiveness and communication efficiency have always been concerned by researchers. ## Personalization Effectiveness As mentioned before, the classic FL method has the drawback of handling non-IID data. Roughly speaking, the principle idea for this problem is located at heterogeneous model parameter optimization, which is attempting to adapt a global model by fine-tuning, data-sharing or model-mixture. For the fine-tuning method, a global model is given to each client in FL, then each cliect retrains the model with a new objective function based on their local data.. In the data-sharing method, some researchers try to upload a small part of local data to the server to tackle the non-IID problem, although it's an obvious violation of data privacy. Other researchers attempt to build a generative model to cope with clients' sample insufficient problem under the non-IID setting. As to the model-mixture method, researchers try to optimize the FL's overall performance on global and local data distributions by ensembling models on server and clients. Other researchers attempt to achieve this by freezing data sharing on the last layer of clients' model. Currently, most of methods achieve better personalization performance at the price of more complicated computation cost and a sacrifice of performance on the IID data setting. ## Communication Efficiency In the field of multi-task learning, some researchers aim to alleviate communication cost by compressing the communication content or reducing model update frequency. Similar ideas continue in the FL area. At first, researchers propose to compress the model through a combination of quantization, subsampling, or encoding before sending it to the server. Then, other researchers try to implement knowledge distillation to save communication cost for the model aggregation. Recently, besides choosing sketched info to communicate over clients and server, more researchers start to optimize the communication efficient in FL by only synchronizing sub-model of the base model. Several methods bear similar ideas with us. In method, the last layer of the model is locked while training. As for method, the local model is divided into local and global part, the local part's model sharing is forbidden while training. In our method, we take similar measures of constraining the model sharing across layers, while our specific freeze strategy is quite different from them. In addition, our method achieves better stable performance across various data distribution settings than those two methods. The method also has a layer-wise model sharing strategy, which seems like our gradual sharing design. However, it is optimized for the probabilistic model and can be seen as an extension for the bayesian nonparametric FL in CNN and LSTM setting. As a contrast, our method aims for a general model setting, and owns a completely different communication saving strategy. # [\[OurDesign\]]{#OurDesign label="OurDesign"}Our Design ## Double Head As discussed before, our double head design is originated from the multiple head design in multi-task learning. These two heads are responsible for fitting the global and local data distribution respectively. For the sake of convenience, we take a sketch map of a classification task's network as an example to illustrate our theory in the follow-up, as shown in Figure [\[fig:DoubleHeadDesign\]](#fig:DoubleHeadDesign){reference-type="ref" reference="fig:DoubleHeadDesign"}. In our design, the network of the model could be divided into two main parts: the base part and the specific part.In the specific part, there're two tracks of network structure, each of which is consisted with several full connected layers and a softmax layer. These tracks are called the global and the local head respectively. Only the local head is forbidden model sharing while training, other parts of the model will always join model sharing. We formula the global and local heads' output as \[f_g(\overrightarrow{u})_i = \frac{e^{u_i}}{\sum_{j=1}^Ce^{u_j}}, \mbox{ for } i = 1,..., C \mbox{ and } j = 1,..., C\] \[f_l(\overrightarrow{v})_i = \frac{e^{v_i}}{\sum_{j=1}^Ce^{v_j}}, \mbox{ for } i = 1,..., C \mbox{ and } j = 1,..., C\] where the \(f_g\) and \(f_l\) are the output of a client model's global and local head. \(\overrightarrow{u}\) and \(\overrightarrow{v}\) represent the penultimate output from the two heads. \(u_i\) and \(v_i\) mean the \(i\)-th element of vector \(\overrightarrow{u}\) and \(\overrightarrow{v}\). Parameter \(i\) and \(j\) are index of classes range from \(1\) to \(C\). The final prediction result of the model is extracted from the output of these two heads' softmax layers. We take the index of max value in the two output vectors as result, which is formulated as \[{pred} = \mathop{\arg\max}_i(f_g(\overrightarrow{u})_i \oplus f_l(\overrightarrow{v})_i)\] where \(f_g\), \(f_l\), \(\overrightarrow{u}\) and \(\overrightarrow{v}\) bear the same meaning as in previous formulas; \(\oplus\) represents for the concatenation operation. The complete pseudo-code of our double head design is given in Algorithm [\[algorithmDHFL\]](#algorithmDHFL){reference-type="ref" reference="algorithmDHFL"}, where \(K\) is clients' quantity in out FL system, \(T\) is the round number of model training, \(E\) is the number of local epochs, \(\eta\) represent the learning rate, \(w\) is the weight of server's model, \(wb, wg\) represent for the model weights of the base part and the global part, and \(w'\) is the weight of clients' model. ## Gradual Sharing Unlike other FL methods' full size model sharing, our method implements a new gradual sharing design, which is actually a model gradual sharing strategy for FL. This design helps us achieve more communication saving without hurting FL's accuracy performance. As shown in Figure [\[fig:GradualSharingDesign\]](#fig:GradualSharingDesign){reference-type="ref" reference="fig:GradualSharingDesign"}, we will freeze clients sharing model with the server in initial training stages. Then, along with the training, clients could be allowed to share their model in layer-wise manner from shallower to deeper at certain frequency. Similarly, to better illustrate our idea, we give its pseudo-code in Algorithm [\[algorithmGSFL\]](#algorithmGSFL){reference-type="ref" reference="algorithmGSFL"}, in which \(K, E, \eta, w, w'\) are same to Algorithm [\[algorithmDHFL\]](#algorithmDHFL){reference-type="ref" reference="algorithmDHFL"}, and \(P\) indicates the current model sharing phase, which is calculated from the gradual sharing frequency, with value ranges from 1 to number of layers. # [\[Experiments\]]{#Experiments label="Experiments"}Experiments ## Experimental Detail #### Datasets Two challenge datasets are used here to evaluate our method: the FEMINIST dataset and the TCP Traffic Classification (hereinafter called the 'TTC') dataset. FEMINIST is a public dataset of image classification, containing over 800k samples of 62 classes. Each sample (\(28 \times 28 \times 1\) pic) has its own writers and there are more than 3k writers in the dataset. Its data characteristics like: with plentiful enough classes; samples of the same class with various label types, are quite suitable for federated learning simulation. As for TTC dataset, it is a proprietary dataset from Huawei for traffic classification task. There are about 900k samples (\(10 \times 1\) vector) of 34 classes in it. It offers TCP traffic data which is captured and desensitized from two various data scenarios. This makes the evaluation on it more believable for industrial application. According to industrial scenarios might met, we set three kinds of data distribution: - The **IID** setting: dataset distribution across clients is same. For FEMINIST, each client owns a dataset with the same amount of every writer's samples. For TTC, each client is equally allocated data from two scenarios. - The **non-IID** setting: dataset distribution over clients is different, but each client's data could cover the whole labels. For FEMINIST, clients are given whole label included data from different writers. For TTC, clients' dataset are distributed from different data scenarios. - The **dispatch** setting: different clients own samples of uncrossed classes. This is a relative extreme non-IID setting for FL, but it is common for industrial scenario and discriminative enough for FL methods evaluation. It's worth noting that, for most of current FL methods, the test data distribution will follow as the train data. But in real industrial scenarios, future data distribution is unknown, thus makes us to extend our test data into two basic modes, as follows. - The global mode: a new added test mode, where the distribution of test data will be close to the combination of all training data, and all clients model share the same test data. - The local mode: the classic test mode, where the distribution of test data on each client will inherit their local train data, and therefore each client's test data is different. #### Implementations To simplify compuation, we take a 5 layer network as the basic network, consisted of 2 convolution (conv) layers, 2 fully connected (fc) layers and a softmax layer in sequential. In our method, the first two conv + pooling layers are set as the base part and the rest layers are duplicated twice as the specific part. As a contrast, we take the Google's FedAvg method as baseline, and also make a comparison with the HDAFL method, who also declared itself better than FedAvg over non-IID data setting. All methods are implemented by Tensorflow v1.14 on Ubuntu 16.04. All models will be trained for over 400 rounds, and communication frequency is set at every 2 model iterations. In FEMINIST dataset, we simulate 10 clients, each has 10k samples. In TCC dataset, we have 2 clients, each owns around 200k samples. ## Double Head Effect We firstly explore the advantages of double head design. As shown in Figure [\[fig:DBHeadGIid\]](#fig:DBHeadGIid){reference-type="ref" reference="fig:DBHeadGIid"} and [\[fig:DBHeadGNonIid\]](#fig:DBHeadGNonIid){reference-type="ref" reference="fig:DBHeadGNonIid"}, under the global test mode, with IID and non-IID data setting, our method has similar accuracy performance with FedAvg and performs better than HDAFL. This result can be explained by the global test data includes all clients' data distribution. Methods with more global model sharing power will gain more effective info while training. Likewise, method with less global sharing ability will achieve less in this setting.The result for IID and non IID data setting under local test mode is shown in Figure [\[fig:DBHeadLIid\]](#fig:DBHeadLIid){reference-type="ref" reference="fig:DBHeadLIid"} and [\[fig:DBHeadLNoniid\]](#fig:DBHeadLNoniid){reference-type="ref" reference="fig:DBHeadLNoniid"}. Our method performs a bit worse than HDAFL, but better than FedAvg. This might due to local test data mode setting, where methods with stronger fitting for local data distribution could perform better. In Figure [\[fig:DBHeadGDispatch\]](#fig:DBHeadGDispatch){reference-type="ref" reference="fig:DBHeadGDispatch"} and [\[fig:DBHeadLDispatch\]](#fig:DBHeadLDispatch){reference-type="ref" reference="fig:DBHeadLDispatch"}, the result of the dispatch data setting further supports above conclusions. In global test mode, FedAvg gets much better performance than others. While on local test mode, our method and HDAFL have similar performance and outperform FedAvg greatly. All this turns out our double head design enhance FL's fitting power for global and local data distribution simultaneously. Although it didn't get best accuracy result in all data settings, it performs more stable than other methods, which is more favorable in industry. After all, in industrial application, a better generalization performance is foremost, especially when future data distribution is unknown. ## [\[GradualSharingEffect\]]{#GradualSharingEffect label="GradualSharingEffect"}Gradual Sharing Effect We further explore the effectiveness of our gradual sharing design for FL. First of all, we want to evaluate the impact of gradual sharing frequency. For FEMNIST dataset, according to our preliminary estimate, client's model may reach convergence status after around 400 rounds of training. Accordingly, we set three types of sharing frequencies: release one layer every 10 rounds, every 20 rounds, and every 80 rounds respectively. Results in Figure [\[fig:GradualSharingEffect\]](#fig:GradualSharingEffect){reference-type="ref" reference="fig:GradualSharingEffect"} has shown that, no matter in what kind of data setting or test mode, the gradual sharing applied model would resume to the normal accuracy performance quickly, although there would be a temporary decline once a layer sharing was relaxed. It's worth noting that the frequency is an experimental parameter ranges from 0 to N (various according to dataset scenario). Once it's set too big, the model would be risky to resume to the normal accuracy within limited training rounds. We also provide the comparison results for communication saving evaluation. In Figure [\[fig:GSEffectTransmissionRate\]](#fig:GSEffectTransmissionRate){reference-type="ref" reference="fig:GSEffectTransmissionRate"}, our method could achieve over 50% communication saving than other two methods when gradual sharing frequency is set at 80 rounds/layer. This proves that our gradual sharing design would help FL system to save communication cost greatly without obvious accuracy performance decline. ## [\[ComprehensiveCompareInTTCDataset\]]{#ComprehensiveCompareInTTCDataset label="ComprehensiveCompareInTTCDataset"}Evalutaion on TTC dataset The TTC dataset is extracted from the telecom scenario, so an evaluation on this dataset could give a better reflect of our method's performance in real industrial scenarios. The quantitative results in Table [1](#tab:QCOfModelAccPerfOverTTCDataset){reference-type="ref" reference="tab:QCOfModelAccPerfOverTTCDataset"} show that our method's good accuracy performance across different data settings. And the result in Figure [\[fig:TTCGSEffectTransmissionRate\]](#fig:TTCGSEffectTransmissionRate){reference-type="ref" reference="fig:TTCGSEffectTransmissionRate"} further proves that our method have an obvious advantage in communication saving. Besides, our method even performs better in TTC dataset than it is in FEMNIST dataset. This might due to its bigger model complexity induced by the double head design, which improves model's ability to tackle a complex dataset like TTC. # [\[Conclusion\]]{#Conclusion label="Conclusion"}Conclusion Improving the personalization effectiveness and the communication efficient are always the research focus in FL. In this paper, we propose the double head design and the gradual sharing design to tackle these challenges. Our experimental results show that the double head design effectively enhance FL's accuracy performance under the non-IID data setting. And the gradual sharing design could save communication cost hugely without impeding model convergence. Although our method didn't get the best accuracy result over all data settings, it achieves a more stable performance across various test data settings compared to other SOTAs. This helps it to be more industry attractive.
{'timestamp': '2020-12-17T02:13:02', 'yymm': '2012', 'arxiv_id': '2012.08809', 'language': 'en', 'url': 'https://arxiv.org/abs/2012.08809'}
# Introduction The classical Kida's formula relates the \(\la\)-invariants of CM-extensions of cyclotomic \(\Zp\)-extensions of number field (see; also see ). An analogue of this formula for Selmer groups of elliptic curves was later discovered by Hachimori-Matsuno. Subsequently, this has been generalized to Selmer groups of ordinary modular forms and more general Galois representations (for instances, see ). A common phenomenon in deriving such a formula is that one has to assume an appropriate \(\mu=0\) assumption. It is then natural to ask if such a formula still holds without the \(\mu=0\) assumption. Indeed if the Galois representation possess a Galois-invariant lattice whose Selmer group satisfies \(\mu=0\) hypothesis, one does have an analogous formula (see ). However, this observation cannot be carried out for more general situation. Indeed, the work of Drinen (also see ) has exhibited examples of Galois representations whose Galois-invariant lattices do not satisfy the \(\mu=0\) assumption. The aim of this paper is to at least provide a conceptual (but conjectural) explanation to the validity of Kida's formula when \(\mu\neq 0\). We briefly explain the idea behind our approach here, leaving the details to the body of the paper. Let \(F_{\infty}\) be a strongly admissible pro-\(p\) extension of \(F\), where we write \(H=\Gal(F_{\infty}/F^{\cyc})\) and \(\Ga=\Gal(F^{\cyc}/F)\). Suppose for now we are in the \(\mu=0\) situation. In other words, our dual Selmer group \(X(A/F^{\cyc})\) is finitely generated over \(\Zp\) (for simplicity of exposition here, we assume our Galois module has coefficients in \(\Zp\); see the body of the paper for a more general context). A by-now standard argument then shows that the dual Selmer group \(X(A/F_{\infty})\) is finitely generated over \(\Zp\ps{H}\) (for instances, see or ). Furthermore, there is a well-known formula relating the \(\Zp\ps{H}\)-rank of \(X(A/F_{\infty})\) with \(\Zp\)-rank of \(X(A/F^{\cyc})\) (see or ). There are two approaches towards proving this formula. The first approach is via a descent argument comparing the cyclotomic Selmer groups under a finite \(p\)-base change. This approach made heavy usage of Kida's formula (see or ). A second approach is a homological descent argument due to Howson (cf. ). We emphasize that Howson's approach avoids use of Kida's formula. An important observation, which does not seem to be written down in literature (although the author believes this might be known) is that the above said rank formula can be used to recover Kida's formula. We briefly say a few words on this observation. For a subgroup \(H'\) of \(H\) with finite index, one has an equality \(|H:H'|\rank_{\Zp\ps{H}}\big(X(A/F_{\infty})\big) = \rank_{\Zp\ps{H'}}\big(X(A/F_{\infty})\big)\). As seen above, the quantity \(\rank_{\Zp\ps{H}}\big(X(A/F_{\infty})\big)\) is related to \(\Zp\)-rank of \(X(A/F^{\cyc})\), and on the other hand, \(\rank_{\Zp\ps{H'}}\big(X(A/F_{\infty})\big)\) can be related to \(\Zp\)-rank of \(X(A/L^{\cyc})\), where \(L\) is a finite \(p\)-extension of \(F\) contained in \(F_{\infty}\) with \(L^{\cyc} = (F_{\infty})^{H'}\). Combining these three relations, we obtain Kida's formula. Now we turn to the \(\mu\neq 0\) situation. Inspired by the above discussion, the natural first step towards establishing a Kida formula is then to note that under the validity of the \(\M_H(G)\)-conjecture, Howson's proof can be adapted to establish an analogous formula relating the \(\Zp\ps{H}\)-rank of \(X(A/F_{\infty})/X(A/F_{\infty})(p)\) over \(F_{\infty}\) with \(\Zp\)-rank of \(X(A/F^{\cyc})/X(A/F^{\cyc})(p)\) (see Proposition [\[rank formula\]](#rank formula){reference-type="ref" reference="rank formula"}). Consequently, we may combine this formula with the above strategy to obtain Kida's formula (see Theorem [\[Kida formula theorem\]](#Kida formula theorem){reference-type="ref" reference="Kida formula theorem"}). Although this gives a conceptual explanation to Kida's formula, we have to confess that we are not able to establish the validity of such a formula (much less the \(\M_H(G)\)-conjecture) unconditionally. Nevertheless, we at least content ourselves with recovering the original Kida formula for the \(\mu=0\) case via the approach given here (see Theorem [\[Kida formula theorem mu=0\]](#Kida formula theorem mu=0){reference-type="ref" reference="Kida formula theorem mu=0"} and also discussion in Section [5](#elliptic review){reference-type="ref" reference="elliptic review"}). We now give a brief description of the contents of each section of the paper. Section [2](#algebra){reference-type="ref" reference="algebra"} introduces some algebraic notations and results required for the paper. In Section [3](#Selmer){reference-type="ref" reference="Selmer"}, we introduce the (strict) Selmer group following Greenberg and prove a formula relating the ranks for the dual Selmer groups of the admissible extension and cyclotomic extension. Section [4](#Kida section){reference-type="ref" reference="Kida section"} is where we prove our main result. Finally, in Section [5](#elliptic review){reference-type="ref" reference="elliptic review"}, we revisit the elliptic curve situation as illustration of our result. # Algebraic Preliminaries {#algebra} Throughout the paper, \(p\) will denote a fixed prime. Let \(\Op\) be the ring of integers of a finite extension of \(\Qp\). Fix a local parameter \(\pi\) for \(\Op\) and denote by \(k\) the residue field of \(\Op\). Let \(G\) be a compact pro-\(p\) \(p\)-adic Lie group without \(p\)-torsion. The completed group algebra of \(G\) over \(\Op\) is given by \[\Op\ps{G} = \plim_U \Op[G/U],\] where \(U\) runs over the open normal subgroups of \(G\) and the inverse limit is taken with respect to the canonical projection maps. It is well known that \(\Op\ps{G}\) is an Auslander regular ring (cf. or ) with no zero divisors (cf. ). Therefore, it admits a skew field \(Q(G)\) which is flat over \(\Zp\ps{G}\) (see or [@Lam Chapter 4, §9 and §10]). Thanks to this, we can define the notion of \(\Op\ps{G}\)-rank of a finitely generated \(\Op\ps{G}\)-module \(M\), which is in turn given by \[\rank_{\Op\ps{G}}(M) = \dim_{Q(G)} (Q(G)\ot_{\Op\ps{G}}M).\] The module \(M\) is then said to be a *torsion* \(\Op\ps{G}\)-module if \(\rank_{\Op\ps{G}} (M) = 0\). The completed group algebra \(k\ps{G}\) is defined similarly as above. By, the ring \(k\ps{G}\) is Auslander regular. Furthermore, it has no zero divisors (cf. [@AB Theorem C]). Therefore, one has a notion of \(k\ps{G}\)-rank defined as above. Similarly, we shall say that the module \(N\) is a *torsion* \(k\ps{G}\)-module if \(\rank_{k\ps{G}}(N) = 0\). For a given finitely generated \(\Op\ps{G}\)-module \(M\), denote by \(M(\pi)\) the \(\Op\ps{G}\)-submodule of \(M\) consisting of elements of \(M\) which are annihilated by some power of \(\pi\). Since the ring \(\Op\ps{G}\) is Noetherian, the module \(M(\pi)\) is also finitely generated over \(\Op\ps{G}\). Thus, there exists a sufficiently large integer \(r\) so that \(\pi^r\) annihilates \(M(\pi)\). Following, we define \[\mu_{\Op\ps{G}}(M) = \sum_{i\geq 0}\rank_{k\ps{G}}\big(\pi^i M(\pi)/\pi^{i+1}\big).\] (For another alternative, but equivalent, definition, see.) Note that the sum on the right is a finite one by the above discussion. Now if \(M\) is a finitely generated \(\Op\ps{G}\)-module, then its homology groups \(H_i(G,M)\) are finitely generated over \(\Op\) (see or ). Hence the quantity \(\rank_{\Op}\big(H_i(G,M)\big)\) is well-defined. In view of this observation, we can now state the following result of Howson (see or ). [\[Howson\]]{#Howson label="Howson"} Let \(M\) be a finitely generated \(\Op\ps{G}\)-module. Then we have \[\rank_{\Op\ps{G}}(M) = \sum_{i=0}^d(-1)^i\rank_{\Op}\big(H_i(G,M)\big),\] where here \(d\) denotes the dimension of the \(p\)-adic group \(G\). In this paper, we are mostly interested in the class of \(p\)-adic Lie groups \(G\) which contains a closed normal subgroup \(H\) such that \(G/H\cong\Zp\). The following relative formula for the \(\mu\)-invariant will be of use later. [\[mu compare Mf\]]{#mu compare Mf label="mu compare Mf"} Let \(G\) be a pro-\(p\) compact \(p\)-adic group without \(p\)-torsion which contains a closed normal subgroup \(H\) with the property that \(\Ga:=G/H\cong \Zp\). Let \(M\) be a finitely generated \(\Op\ps{G}\)-module. Then we have \[\mu_{\Op\ps{G}}(M) = \sum_{i=0}^d(-1)^i\mu_{\Op\ps{\Ga}}\big(H_i(H,M(\pi))\big).\] See. For a group \(G\) defined as above, a finitely generated \(\Op\ps{G}\)-module \(M\) is said to *satisfy the \(\M_H(G)\)-property* if \(M_f:=M/M(\pi)\) is finitely generated over \(\Op\ps{H}\). It has been conjectured for certain Galois representations coming from abelian varieties with good ordinary reduction at \(p\) or cuspidal eigenforms with good ordinary reduction at \(p\), the dual Selmer group associated to such a Galois representation satisfies the \(\M_H(G)\)-property (see ). For the subsequent discussion, we shall write \(M_H\) for the largest quotient of \(M\) on which \(H\) acts trivially. Note that \(M_H = H_0(H,M)\). We now record another useful lemma. [\[rank compare Mf\]]{#rank compare Mf label="rank compare Mf"} Let \(G\) be a pro-\(p\) compact \(p\)-adic group without \(p\)-torsion which contains a closed normal subgroup \(H\) such that \(\Ga:=G/H\cong \Zp\). Let \(M\) be a finitely generated \(\Op\ps{G}\)-module which satisfies the \(\M_H(G)\)-property and has the property that \(H_i(H,M)\) is finitely generated over \(\Op\) for all \(i\geq 1\). Then we have \[\mu_{\Op\ps{G}}(M) = \mu_{\Op\ps{\Ga}}\big(M_H\big)\] and \[\rank_{\Op}\big(H_i(H, M)\big) =\rank_{\Op}\big(H_i(H, M_f)\big)\] for every \(i\geq 1\). Taking \(H\)-homology of the following short exact sequence \[0\lra M(\pi)\lra M\lra M_f\lra 0,\] yields an exact sequence \[H_{i+1}(H, M_f)\lra H_{i}(H, M(\pi))\lra H_{i}(H, M) \stackrel{f_i}\lra H_i(H, M_f)\lra H_{i-1}(H, M(\pi))\] for \(i\geq 1\). As \(M_f\) is finitely generated over \(\Op\ps{H}\), the group \(H_i(H, M_f)\) is therefore finitely generated over \(\Op\) for every \(i\) (cf. or ). Combining this with the hypothesis that \(H_i(H,M)\) is finitely generated over \(\Op\) for all \(i\geq 1\), we see that \(H_i(H,M(\pi))\) is finitely generated over \(\Op\) for \(i\geq 1\). As noted before, there exists a sufficiently large \(r\) such that \(\pi^r\) annihilates \(M(\pi)\), and hence all the \(H\)-homology groups of \(M(\pi)\). Therefore, \(H_i(H,M(\pi))\) must be finite for \(i\geq 1\). From this and the above exact sequence, we have the second equality of the lemma. Furthermore, the finiteness implies \(\mu_{\Op\ps{\Ga}}\big(H_i(H,M(\pi))\big) =0\) for \(i\geq 1\). Putting these into Lemma [\[mu compare Mf\]](#mu compare Mf){reference-type="ref" reference="mu compare Mf"}, we obtain \[\mu_{\Op\ps{G}}(M) = \mu_{\Op\ps{\Ga}}\big(M(\pi)_H\big).\] On the other hand, from the exact sequence \[H_{1}(H, M_f)\lra M(\pi)_H\lra M_H \lra H_0(H, M_f)\lra 0,\] and the observation that each \(H_i(H,M_f)\), being finitely generated over \(\Op\), has trivial \(\mu_{\Op\ps{\Ga}}\)-invariants, we see that \[\mu_{\Op\ps{\Ga}}\big(M(\pi)_H\big) = \mu_{\Op\ps{\Ga}}\big(M_H\big).\] Combining this with the above, we obtain the first equality of the lemma. Finally, the finiteness of \(H_i(H,M(\pi))\) (for \(i\geq 1\)) immediately gives the second equality for \(i\geq 2\). For \(i=1\), it remains to verify that \(\mathrm{coker} f_1\) to be finite. But this follows from the facts that \(\mathrm{coker} f_1\) is finitely generated over \(\Op\) (being a quotient of \(H_1(H, M_f)\)) and is annihilated by \(\pi^r\) (being a submodule of \(M(\pi)_H\)). The proof of the lemma is now completed. # Selmer groups {#Selmer} Throughout this section, we let \(F\) be a number field which is further assumed to have no real primes if \(p=2\). As before, denote by \(\Op\) the ring of integers of a fixed finite extension of \(\Qp\). In this section, we define the strict Selmer groups associated to certain datum in the sense of Greenberg. As a start, we introduce the axiomatic conditions on our datum which is denoted by \(\big(A, \{A_v\}_{v|p}\big)\) and satisfies all of the following four conditions **(C1)-(C4)**. 1. \(A\) is a cofinitely generated cofree \(\Op\)-module of \(\Op\)-corank \(d\) with a continuous, \(\Op\)-linear \(\Gal(\bar{F}/F)\)-action which is unramified outside a finite set of primes of \(F\). 2. For each prime \(v\) of \(F\) above \(p\), there is a distinguished \(\Gal(\bar{F}_v/F_v)\)-submodule \(A_v\) of \(A\) which is cofree of \(\Op\)-corank \(d_v\). 3. For each real prime \(v\) of \(F\), \(A_v^+:= A^{\Gal(\bar{F}_v/F_v)}\) is cofree of \(\Op\)-corank \(d^+_v\). 4. The following equality \[\sum_{v|p} (d-d_v)[F_v:\Qp] = dr_2(F) + \sum_{v~\mathrm{real}}(d-d^+_v)\] holds. Here \(r_2(F)\) denotes the number of complex primes of \(F\). As we need to work with Selmer groups defined over a tower of number fields, we need to consider the base change of our datum which we now do. For a finite extension \(L\) of \(F\), the base change of our datum \(\big(A, \{A_w\}_{w|p} \big)\) over \(L\) is given as follows: (1) \(A\) can be viewed as a \(\Gal(\bar{F}/L)\)-module via restriction of the Galois action. (2) For each prime \(w\) of \(L\) above \(p\), we set \(A_w =A_v\), where \(v\) is the prime of \(F\) below \(w\), and view it as a \(\Gal(\bar{F}_v/L_w)\)-module via the appropriate restriction. Note that we then have \(d_w= d_v\). (3) For each real prime \(w\) of \(L\) which lies above a real prime \(v\) of \(F\), we set \(A_w^+= A^{\Gal(\bar{F}_v/F_v)}\) and write \(d^+_w = d^+_v\). We now record the following lemma which gives some sufficient conditions for equality in **(C4)** to hold for the datum \(\big(A, \{A_w\}_{w|p}\big)\) over \(L\). [\[data base change\]]{#data base change label="data base change"} Suppose that \(\big(A, \{A_v\}_{v|p}\big)\) is a datum defined over \(F\). Suppose further that at least one of the following statements holds. 1. \([L:F]\) is odd. 2. \(F\) has no real primes. Then the datum \(\big(A, \{A_w\}_{w|p}\big)\) obtained by base change satisfies **(C1)-(C4)**. In particular, we have the equality \[\sum_{w|p} (d-d_w)[L_w:\Qp] = dr_2(L) + \sum_{w~\mathrm{real}}(d-d^+_w).\] See. We shall impose one more condition on our datum. **(Fin)** \(H^0(L^{\cyc}, A^*)\) is finite for every \(L\) contained in \(F_{\infty}\). Here \(A^* = \Hom_{\cts}(T_{\pi}(A),\mu_{p^{\infty}})\), where \(T_{\pi}(A) = \plim_i A[\pi^i]\). We mention two basic examples of our datum. (i) \(A = \mathcal{A}[p^{\infty}]\), where \(\mathcal{A}\) is an abelian variety defined over an arbitrary finite extension \(F\) of \(\Q\) with good ordinary reduction at all places \(v\) of \(F\) dividing \(p\). For each \(v|p\), it follows from that we have a \(\Gal(\bar{F}_v/F_v)\)-submodule \(A_v\) characterized by the property that \(A/A_v\) is the maximal \(\Gal(\bar{F}_v/F_v)\)-quotient of \(\mathcal{A}[p^{\infty}]\) on which some subgroup of finite index in the inertia group \(I_v\) acts trivially. It is not difficult to verify that **(C1)-(C4)** are satisfied. The condition **(Fin)** is a well-known consequence of a theorem of Imai. (ii) Let \(V\) be the Galois representation attached to a primitive Hecke eigenform \(f\) for \(GL_2 /\Q\), which is ordinary at \(p\), relative to some fixed embedding of the algebraic closure of \(\Q\) into \(\Qp\). By the work of Mazur-Wiles, \(V\) contains a one-dimensional \(\Qp\)-subspace \(V_v\) invariant under \(\Gal(\bar{\Q}_p/\Qp)\) with the property that the inertial subgroup \(I_p\) acts via a power of the cyclotomic character on \(V_v\) and trivially on \(V/V_v\). By compactness, \(V\) will always contain a free \(\Op\)-submodule \(T\), which is stable under the action of \(\Gal(\bar{F} /F)\). For such an \(\Op\)-lattice \(T\), we write \(A = V/T\) and \(A_v = V_v/ (T\cap V_v)\). The condition **(Fin)** is shown in the proof of. We return to general discussion. A Galois extension \(F_{\infty}\) of \(F\) is said to be a strongly admissible pro-\(p\) \(p\)-adic Lie extension of \(F\) if (i) \(\Gal(F_{\infty}/F)\) is a compact pro-\(p\) \(p\)-adic Lie group with no \(p\)-torsion, (ii) \(F_{\infty}\) contains the cyclotomic \(\Zp\)-extension \(F^{\cyc}\) of \(F\) and (iii) \(F_{\infty}\) is unramified outside a finite set of primes. We shall always write \(G = \Gal(F_{\infty}/F)\), \(H = \Gal(F_{\infty}/F^{\cyc})\) and \(\Ga =\Gal(F^{\cyc}/F)\). By Lemma [\[data base change\]](#data base change){reference-type="ref" reference="data base change"}, the datum \(\big(A, \{A_w\}_{w|p}, \{A^+_w\}_{w|\R} \big)\) obtained by base changing to any intermediate subextension of \(F_{\infty}/F\) satisfies **(C1)-(C4)**. (Recall that when \(p=2\), our standing assumption is that \(F\) has no real primes.) We can now define the strict Selmer group associated to our datum following Greenberg. Let \(S\) be a finite set of primes of \(F\) which contains all the primes above \(p\), the ramified primes of \(A\), the ramified primes of \(F_{\infty}/F\) and all the infinite primes of \(F\). Denote by \(F_S\) the maximal algebraic extension of \(F\) unramified outside \(S\) and write \(G_S(\mathcal{L}) = \Gal(F_S/\mathcal{L})\) for every algebraic extension \(\mathcal{L}\) of \(F\) which is contained in \(F_S\). Let \(L\) be a finite extension of \(F\) contained in \(F_{\infty}\). For a prime \(w\) of \(L\) lying over \(S\), set \[H^1_{str}(L_w, A)= \begin{cases} \ker\big(H^1(L_w, A)\lra H^1(L_w, A/A_w)\big), & \text{\mbox{if} \(w\) divides \(p\)},\\ \ker\big(H^1(L_w, A)\lra H^1(L^{ur}_w, A)\big), & \text{\mbox{if} \(w\) does not divide \(p\),} \end{cases}\] where \(L_w^{ur}\) is the maximal unramified extension of \(L_w\). We then define \[J_v(A/L) = \bigoplus_{w|v}H^1_s(L_w, A),\] where \(w\) runs over the (finite) set of primes of \(L\) above \(v\) and \(H^1_s(L_w, A) = H^1(L_w, A)/H^1_{str}(L_w, A)\). If \(\mathcal{L}\) is an infinite extension of \(F\), we define \[J_v(A/\mathcal{L}) = \ilim_L J_v(A/L),\] where the direct limit is taken over all finite extensions \(L\) of \(F\) contained in \(\mathcal{L}\). For a (possibly infinite) extension \(K\) of \(F\) contained in \(F_{\infty}\), the (strict) Selmer group is defined by \[S^{str}(A/K) := \Sel^{str}(A/K) := \ker\left( H^1(G_S(K),A)\lra \bigoplus_{v\in S}J_v(A/K)\right).\] It follows from the definition that \(S^{str}(A/K) = \ilim_L S^{str}(A/L)\), where the direct limit is taken with respect to the natural maps, as \(L\) varies over all finite subextensions of the base field \(F\) in the larger extension \(K\). Write \(X(A/K)\) for its Pontryagin dual and \(X_f(A/K) =X(A/K)/X(A/K)(\pi)\). Suppose that \(X_f(A/F_{\infty})\) satisfies the \(\M_H(G)\)-property. It then makes sense to speak of the quantity \(\rank_{\Op\ps{H}}\big(X_f(A/F_{\infty})\big)\). Also, it follows from that \(X(A/F^{\cyc})\) is torsion over \(\Op\ps{\Ga}\) and so the quantity \(\rank_{\Op}(X_f(A/F^{\cyc}))\) is well-defined. We can therefore state the following. [\[rank formula\]]{#rank formula label="rank formula"} Let \(F_{\infty}\) be a strongly admissible pro-\(p\) Lie extension of \(F\). Suppose that the data \(\big(A, \{A_v\}_{v|p}, \{A^+_v\}_{v|\R} \big)\) satisfies \(\textbf{(C1)-(C4)}\) and \(\textbf{(Fin)}\). Assume that \(X(A/F_{\infty})\) satisfies the \(\M_H(G)\)-property. Then we have \[\mu_{\Op\ps{G}}\big(X(A/F_{\infty})\big) = \mu_{\Op\ps{\Ga}}\big(X(A/F^{\cyc})\big)\] and \[\rank_{\Op\ps{H}}\big(X_f(A/F_{\infty})\big) = \rank_{\Op}\big(X_f(A/F^{\cyc})\big)-\corank_{\Op}\big(A(F^{\cyc})\big) + \sum_{\substack{w\in S(F^{\cyc}), \\ \dim H_w\geq 1}}\corank_{\Op}\big(D_w(F^{\cyc}_w)\big).\] Here \(D_w\) denotes \(A/A_w\) or \(A\) accordingly as \(w\) divides \(p\) or not. Proposition [\[rank formula\]](#rank formula){reference-type="ref" reference="rank formula"} has been proved for an elliptic curve \(E\) under the stronger assumption that \(X(E/F_{\infty})\) is finitely generated over \(\Zp\ps{H}\) (see, , [@HV Theorem 3.1] and ). The approach for the proof in builds on Kida's formula which we want to avoid for our purposes. On the other hand, the proof given in does not assume the validity of Kida's formula. The goal of Proposition [\[rank formula\]](#rank formula){reference-type="ref" reference="rank formula"} is to show that Howson's approach works under the \(\M_H(G)\)-property which the remainder of the section is devoted to. As a start, we have the following lemma. [\[short exact sequences\]]{#short exact sequences label="short exact sequences"} Retaining the assumptions of Proposition [\[rank formula\]](#rank formula){reference-type="ref" reference="rank formula"}, we have short exact sequences \[0 \lra S^{str}(A/F^{\cyc})\lra H^1(G_S(F^{\cyc}), A) \lra \bigoplus_{v\in S} J_v(A/F^{\cyc})\lra 0\] and \[0 \lra S^{str}(A/F_{\infty})\lra H^1(G_S(F_{\infty}), A) \lra \bigoplus_{v\in S} J_v(A/F_{\infty})\lra 0.\] Since \(X(A/F_{\infty})\) satisfies the \(\M_H(G)\)-property, it follows from that for every finite extension \(L\) of \(F\) contained in \(F_{\infty}\), \(X(A/L^{\cyc})\) is torsion over \(\Op\ps{\Ga_L}\), where \(\Ga_L=\Gal(L^{\cyc}/L)\). In view of \(\textbf{(Fin)}\), we may apply a similar argument to that in to obtain a short exact sequence \[0 \lra S^{str}(A/L^{\cyc})\lra H^1(G_S(L^{\cyc}), A) \lra \bigoplus_{v\in S} J_v(A/L^{\cyc})\lra 0.\] In particular, this yields the first short exact sequence by taking \(L=F\). On the other hand, by taking direct limit over \(L\), we obtain the second short exact sequence. The next two lemmas are concerned with the \(H\)-homology of global cohomology groups and local cohomology groups. [\[global calculation\]]{#global calculation label="global calculation"} Retain the assumptions of Proposition [\[rank formula\]](#rank formula){reference-type="ref" reference="rank formula"}. Then \(H^i\big(H, H^1\big(G_S(F_{\infty}),A)\big)\) is cofinitely generated over \(\Op\) for every \(i\geq 1\). Moreover, we have an exact sequence \[0 \lra H^1(H, A(F_{\infty}))\lra H^1(G_S(F^{\cyc}), A) \lra H^1(G_S(F_{\infty}), A)^H\lra H^2(H, A(F_{\infty}))\lra 0\] and isomorphisms \[H^i\big(H, H^1(G_S(F_{\infty}), A)\big)\cong H^{i+2}\big(H, A(F_{\infty})\big) \mbox{ for } i\geq 1.\] Since \(X(A/F_{\infty})\) is assumed to satisfy the \(\M_H(G)\)-property, it follows from that for every finite extension \(L\) of \(F\) contained in \(F_{\infty}\), \(X(A/L^{\cyc})\) is torsion over \(\Op\ps{\Ga_L}\), where \(\Ga_L=\Gal(L^{\cyc}/L)\). Via similar arguments to those in, we have that \(H^2(G_S(F^{\cyc}),A)=0\) and \(H^2(G_S(F_{\infty}),A)=0\). Hence the spectral sequence \[H^i\big(H, H^j(G_S(F_{\infty}), A)\big)\Longrightarrow H^{i+j}(G_S(F^{\cyc}), A)\] degenerates to yield an exact sequence \[0 \lra H^1(H, A(F_{\infty}))\lra H^1(G_S(F^{\cyc}), A) \lra H^1(G_S(F_{\infty}), A)^H\lra H^2(H, A(F_{\infty}))\lra 0\] and isomorphisms \[H^i\big(H, H^1(G_S(F_{\infty}), A)\big)\cong H^{i+2}\big(H, A(F_{\infty})\big) \mbox{ for } i\geq 1.\] Finally, the \(\Op\)-cofinitely generation of the latter groups follows from the fact that the cohomology groups \(H^i(H,W)\) are cofinitely generated \(\Op\)-modules for any \(p\)-adic Lie group \(H\) and any \(\Op\)-cofinitely generated \(H\)-module \(W\). Consequently, \(H^i\big(H, H^1\big(G_S(F_{\infty}),A)\big)\) is cofinitely generated over \(\Op\) for every \(i\geq 1\). [\[local calculation\]]{#local calculation label="local calculation"} Retain the assumption of Proposition [\[rank formula\]](#rank formula){reference-type="ref" reference="rank formula"}. Then \(H^i(H, \bigoplus_{v\in S}J_v(A/F_{\infty}))\) is cofinitely generated over \(\Op\) for every \(i\geq 1\). Moreover, we have an exact sequence \[0 \lra \bigoplus_{w\in S(F^{\cyc})}H^1\big(H_w, D_v(F_{\infty,w})\big)\lra \bigoplus_{v\in S}J_v(A/F^{\cyc}) \lra \left( \bigoplus_{v\in S}J_v(A/F_{\infty})\right)^H\] \[\lra \bigoplus_{w\in S(F^{\cyc})}H^2\big(H_w, D_v(F_{\infty,w})\big)\lra 0\] and isomorphisms \[H^i\left(H, \bigoplus_{v\in S}J_v(A/F_{\infty})\right)\cong\bigoplus_{w\in S(F^{\cyc})}H^{i+2}\big(H_w, D_v(F_{\infty,w})\big) \mbox{ for } i\geq 1.\] Here \(D_v\) denotes \(A/A_v\) or \(A\) accordingly as \(v\) divides \(p\) or not. This is a local version of Lemma [\[global calculation\]](#global calculation){reference-type="ref" reference="global calculation"} with a similar proof noting that \(H^2(F^{\cyc}_w,A)=0\) and \(H^2(F_{\infty,w},A)=0\) by. We can now give the proof of Proposition [\[rank formula\]](#rank formula){reference-type="ref" reference="rank formula"}. By Lemma [\[short exact sequences\]](#short exact sequences){reference-type="ref" reference="short exact sequences"}, we have the following commutative diagram \[\entrymodifiers={!! <0pt,.8ex>+} \SelectTips{eu}{} 0 \ar[r]^{} & S^{str}(A/F^{\cyc}) \ar[d]_{\al} \ar[r] & H^1(G_S(F^{\cyc}), A) \ar[d]_{\be} \ar[r] & \displaystyle\bigoplus_{v\in S}J_v(A/F^{\cyc}) \ar[d]_{\ga} \ar[r] & 0 &\\ 0 \ar[r]^{} & S^{str}(A/F_{\infty})^H \ar[r]^{} & H^1(G_S(F_{\infty}), A)^H \ar[r] & \ \displaystyle\bigoplus_{v\in S}J_v(A/F_{\infty})^H \ar[r] & H^1\big(H, S^{str}(A/F_{\infty})\big) \ar[r] & \cdots }\] with exact rows. To simplify notation, we write \(W_{\infty}= H^1(G_S(F_{\infty}), A)\) and \(J_{\infty} = \displaystyle\bigoplus_{v\in S}J_v(A/F_{\infty})\). From the commutative diagram, we have a long exact sequence \[\ba{c} 0\lra \ker\al \lra \ker \be \lra \ker \ga \lra \coker \al \lra \coker \be \\ \lra \coker\ga \lra H^1\big(H, S^{str}(A/F_{\infty})\big) \lra H^1(H, W_{\infty}) \lra H^1(H, J_{\infty})\lra \cdots \\ \cdots\lra H^{i-1}(H, J_{\infty}) \lra H^i\big(H, S^{str}(A/F_{\infty})\big) \lra H^i(H, W_{\infty}) \lra H^i(H, J_{\infty})\lra \cdots.\ea\] By Lemmas [\[global calculation\]](#global calculation){reference-type="ref" reference="global calculation"} and [\[local calculation\]](#local calculation){reference-type="ref" reference="local calculation"}, the groups \(\ker \be\), \(\ker \ga\), \(\coker \be\), \(\coker\ga\), \(H^i(H, W_{\infty})\) (for \(i\geq 1\)) and \(H^{i}(H, J_{\infty})\) (for \(i\geq 1\)) are cofinitely generated over \(\Op\). Thus, combining this observation with the above exact sequence, we have that \(\ker \al\), \(\coker \al\) and \(H^1\big(H, S(A/F_{\infty})\big)\) (for \(i\geq 1)\) are cofinitely generated over \(\Op\). Therefore, we have \[\mu_{\Op\ps{G}}\big(X(A/F_{\infty})\big) = \mu_{\Op\ps{\Ga}}\big(X(A/F_{\infty})_H\big) = \mu_{\Op\ps{\Ga}}\big(X(A/F^{\cyc})\big),\] where the first equality follows from Lemma [\[rank compare Mf\]](#rank compare Mf){reference-type="ref" reference="rank compare Mf"} and the second follows from the facts that \(\ker \al\) and \(\coker \al\) are cofinitely generated over \(\Op\). This establishes the first equality of the proposition. Moreover, we have \[\ba{c} \corank_{\Op}(\ker\al)-\corank_{\Zp}(\coker\al)= -\displaystyle\sum_{i\geq 1}(-1)^i\corank_{\Op}H^i(H,S^{str}(A/F_{\infty}))\hspace{2in} \\ \hspace{1in}+\displaystyle\sum_{i\geq 1}(-1)^{i}\corank_{\Op}H^i(H, A(F_{\infty}))-\displaystyle\sum_{\substack{w\in S(F^{\cyc}), \\ \dim H_w\geq 1}}\left(\sum_{i\geq 1}(-1)^{i}\corank_{\Op}H^i(H_w, D_v(F_{\infty,w}))\right), \ea\] where here \(D_v\) denotes \(A/A_v\) or \(A\) accordingly as \(v\) divides \(p\) or not. Applying Proposition [\[Howson\]](#Howson){reference-type="ref" reference="Howson"} and Lemma [\[rank compare Mf\]](#rank compare Mf){reference-type="ref" reference="rank compare Mf"}, the right hand side is just \[-\displaystyle\sum_{i\geq 1}(-1)^i\rank_{\Op}H_i(H,X_f(A/F_{\infty}))-\corank_{\Op}H^0(H, A(F_{\infty})) +\displaystyle\sum_{\substack{w\in S(F^{\cyc}), \\ \dim H_w\geq 1}}\corank_{\Op}H^0(H_w, D_v(F_{\infty,w})).\] Now consider the following commutative diagram \[\entrymodifiers={!! <0pt,.8ex>+} \SelectTips{eu}{} & X(A/F_{\infty})(p)_H \ar[d]_{h'} \ar[r] & X(A/F_{\infty})_H \ar[d]_{\al^{\vee}} \ar[r] & X_f(A/F_{\infty})_H \ar[d]_{h''} \ar[r]& 0 \\ 0 \ar[r]^{} & X(A/F^{\cyc})(p) \ar[r]^{} & X(A/F^{\cyc}) \ar[r] & \ X_f(A/F^{\cyc}) \ar[r] & 0 }\] with exact rows. From this, we have a long exact sequence \[\ker h' \lra \ker (\al^{\vee}) \stackrel{f}{\lra} \ker h'' \lra \coker h' \lra \coker (\al^{\vee}) \lra \ker h''\lra 0.\] Since \(X(A/F_{\infty})\) satisfies \(\M_H(G)\)-property, it follows from Nakayama's lemma that \(X_f(A/F_{\infty})_H\) is finitely generated over \(\Op\). But \(X_f(A/F^{\cyc})\) is also finitely generated over \(\Op\) by. Hence \(\ker h''\) and \(\coker h''\) are finitely generated over \(\Op\), and we have \[\rank_{\Op} (\ker h'')-\rank_{\Op}(\coker h'')= \rank_{\Op}\big(X_f(A/F_{\infty})_H\big)-\rank_{\Op}(X_f(A/F^{\cyc}))\] On the other hand, as already seen above, \(\ker (\al^{\vee})\) and \(\coker (\al^{\vee})\) are finitely generated over \(\Op\). Hence so are \(\ker f\) and \(\coker h'\). But since these latter groups are \(\pi\)-primary, they must be finite. Thus, we have \[\rank_{\Op} (\ker (\al^{\vee}))-\rank_{\Op}(\coker (\al^{\vee}))= \rank_{\Op}\big(X_f(A/F_{\infty})_H\big)-\rank_{\Op}(X_f(A/F^{\cyc})).\] Combining this with the above calculations and applying Proposition [\[Howson\]](#Howson){reference-type="ref" reference="Howson"} for \(X_f(A/F_{\infty})\), we obtain the required formula. # Kida's formula {#Kida section} We are in position to prove the main theorem of the paper. [\[Kida formula theorem\]]{#Kida formula theorem label="Kida formula theorem"} Let \(F_{\infty}\) be a strongly admissible pro-\(p\) Lie extension of \(F\) and \(L\) a finite extension of \(F\) contained in \(F_{\infty}\) with \(F^{\cyc}\cap L= F\). Let \(\big(A, \{A_v\}_{v|p}, \{A^+_v\}_{v|\R} \big)\) be a datum satisfying \(\textbf{(C1)-(C4)}\) and \(\textbf{(Fin)}\). Assume that \(X(A/F_{\infty})\) satisfies the \(\M_H(G)\)-property. Then we have \[\mu_{\Op\ps{\Ga_L}}\big(X(A/L^{\cyc})\big) = [L:F]\mu_{\Op\ps{\Ga}}\big(X(A/F^{\cyc})\big)\] and \[\rank_{\Op}(X_f(A/L^{\cyc})) = [L:F]\rank_{\Op}(X_f(A/F^{\cyc})) + \corank_{\Op}(A(L^{\cyc}))-[L:F] \corank_{\Op}(A(F^{\cyc}))\] \[+ \sum_{w\in R(L^{\cyc}/F^{\cyc})}\left([L:F]\corank_{\Op}\big(D_w(F^{\cyc}_w)\big)-\sum_{u|w}\corank_{\Op}\big(D_w(L^{\cyc}_{u})\big) \right).\] Here \(D_w\) denotes \(A/A_w\) or \(A\) accordingly as \(w\) divides \(p\) or not, and \(R(L^{\cyc}/F^{\cyc})\) is set of primes of \(F^{\cyc}\) consisting of all the primes above \(p\) and all the ramified primes in \(L^{\cyc}/F^{\cyc}\). For a \(\Op\ps{G}\)-module \(M\), one has the observation that \(\mu_{\Op\ps{G}}(M) = [G:G']\mu_{\Op\ps{G'}}(M)\). Combining this with the first equality in Proposition [\[rank formula\]](#rank formula){reference-type="ref" reference="rank formula"}, we obtain the first equality of the theorem. On the other hand, one also has \(\rank_{\Op\ps{H}}(M) = [H:H_L]\rank_{\Op\ps{H_L}}(M)\). Applying this to \(X(A/F_{\infty})\) and combining with Proposition [\[rank formula\]](#rank formula){reference-type="ref" reference="rank formula"}, we have \[\rank_{\Op}(X_f(A/L^{\cyc}))-\corank_{\Op}(A(L^{\cyc})) + \sum_{\substack{u\in S(L^{\cyc}), \\ \dim H_{L,u}\geq 1}}\corank_{\Op}\big(D_u(L^{\cyc}_u)\big) =\] \[[L:F]\left(\rank_{\Op}(X_f(A/F^{\cyc}))-\corank_{\Op}(A(F^{\cyc})) + \sum_{\substack{w\in S(F^{\cyc}), \\ \dim H_w\geq 1}}\corank_{\Op}\big(D_w(F^{\cyc}_w)\big)\right).\] Now since \(L^{\cyc}/F^{\cyc}\) is a finite extension, it follows that for each \(w\in S(F^{\cyc})\) and \(u\in S(L^{\cyc})\) which lies above \(w\), we have \(\dim H_{L,u} \geq 1\) if and only \(\dim H_{w} \geq 1\). Hence the summation \(\displaystyle\sum_{\substack{u\in S(L^{\cyc}) \\ \dim H_{L,u}\geq 1}}\) can be rewritten as \(\displaystyle\sum_{\substack{w\in S(F^{\cyc})\\ \dim H_{w}\geq 1}}\sum_{u|w}\). Now, upon rearranging the terms, we obtain \[\rank_{\Op}(X(A/L^{\cyc})) = [L:F]\rank_{\Op}(X(A/F^{\cyc})) + \corank_{\Op}(A(L^{\cyc}))-[L:F] \corank_{\Op}(A(F^{\cyc}))\] \[+ \sum_{w\in S(F^{\cyc})}\left([L:F]\corank_{\Op}\big(D_w(F^{\cyc}_w)\big)-\sum_{u|w}\corank_{\Op}\big(D_w(L^{\cyc}_{u})\big) \right).\] Hence the required equality of this theorem will follow once we show that the summation \(\displaystyle\sum_{w\in S(F^{\cyc})}\) can be rewritten as \(\displaystyle\sum_{w\in R(L^{\cyc}/F^{\cyc})}\). Clearly \(R(L^{\cyc}/F^{\cyc})\subseteq S(F^{\cyc})\). Thus, it suffices to show that the term in the summand is zero when \(w\in S(F^{\cyc})\setminus R(L^{\cyc}/F^{\cyc})\). But since such a prime does not divide \(p\) and is not ramified in \(L^{\cyc}/F^{\cyc}\), it must therefore split completely in \(L^{\cyc}/F^{\cyc}\). Hence for each such prime \(w\), we have \(D_w(L^{\cyc}_u) = D_w(F^{\cyc}_w)\) for every \(u|w\), where there are \([L:F]\) of these \(u\)'s. Consequently, the term in the sum for this prime \(w\) is zero. Thus, we have proven our result. For the remainder of this section, we discuss how the above theorem can be used to recover Kida's formula for the \(\mu=0\) case. Before doing so, we record the following preliminary observation. [\[burn-ven\]]{#burn-ven label="burn-ven"} Let \(F\) be a number field which contains a primitive \(p\)-th root of unity and \(L\) a finite \(p\)-extension of \(F\). Then there exists a strongly admissible pro-\(p\) Lie extension \(F_{\infty}\) of \(F\) containing \(L\). This can be proven similarly to that in. We now apply Theorem [\[Kida formula theorem\]](#Kida formula theorem){reference-type="ref" reference="Kida formula theorem"} to recover Kida's formula for the \(\mu=0\) case. [\[Kida formula theorem mu=0\]]{#Kida formula theorem mu=0 label="Kida formula theorem mu=0"} Let \(F\) be a number field which contains a \(p\)-th root of unity and \(L\) a finite \(p\)-extension of \(F\). Let \(\big(A, \{A_v\}_{v|p}, \{A^+_v\}_{v|\R} \big)\) be a datum satisfying \(\textbf{(C1)-(C4)}\) and \(\textbf{(Fin)}\). Suppose that \(X(A/F^{\cyc})\) is finitely generated over \(\Op\). Then \(X(A/L^{\cyc})\) is finitely generated over \(\Op\) and \[\rank_{\Op}(X(A/L^{\cyc})) = [L:F]\rank_{\Op}(X(A/F^{\cyc})) + \corank_{\Op}(A(L^{\cyc}))-[L:F] \corank_{\Op}(A(F^{\cyc}))\] \[+ \sum_{w\in R(L^{\cyc}/F^{\cyc})}\left([L:F]\corank_{\Op}\big(D_w(F^{\cyc}_w)\big)-\sum_{u|w}\corank_{\Op}\big(D_u(L^{\cyc}_{u})\big) \right),\] where \(R(L^{\cyc}/F^{\cyc})\) is set of primes of \(F^{\cyc}\) consisting of primes above \(p\) and the primes that are ramified in \(L^{\cyc}/F^{\cyc}\). Let \(F_{\infty}\) be a strongly admissible pro-\(p\) Lie extension \(F_{\infty}\) of \(F\) containing \(L\) which is obtained via Lemma [\[burn-ven\]](#burn-ven){reference-type="ref" reference="burn-ven"}. By a similar argument to that in or, \(X(A/L^{\cyc})\) is finitely generated over \(\Op\). Also, it follows from that \(X(A/F_{\infty})\) is finitely generated over \(\Op\ps{H}\), where \(H=\Gal(F_{\infty}/F^{\cyc})\). In particular, \(X(A/F_{\infty})\) satisfies the \(\M_H(G)\)-property. Thus, Theorem [\[Kida formula theorem\]](#Kida formula theorem){reference-type="ref" reference="Kida formula theorem"} applies to yield the required conclusion. # Review of elliptic curves {#elliptic review} In this section, we revisit Kida's formula for the elliptic curve of Hachimori-Matsuno and show that our theorem specializes to recover their theorem. For simplicity, we shall assume that \(p\geq 5\). Let \(E\) be an elliptic curve defined over a number field \(F\) such that for every prime \(v\) of \(F\) above \(p\), \(E\) has either good ordinary reduction or split multiplicative reduction at \(v\). We shall also assume that \(F\) contains all the \(p\)th roots of unity. Recall that by, for each prime \(v\) of \(F\) above \(p\), we have a short exact sequence \[0\lra C_v\lra E(p) \lra D_v\lra 0\] of discrete \(\Gal(\bar{F}_v/F_v)\)-modules which is characterized by the facts that \(C_v\) is divisible and \(D_v\) is the maximal quotient of \(E(p)\) by a divisible subgroup such that the inertia group acts on \(D_v\) via a finite quotient. In fact, by our assumptions (also see ), \(D_v\) has the following description \[D_v =\begin{cases} \widetilde{E}_v(p),& \mbox{if \(E\) has good ordinary reduction at \(v\)}, \\ \Qp/\Zp, & \mbox{if \(E\) has split multiplicative reduction at \(v\)}.\end{cases}\] Here \(\widetilde{E}_v\) is the reduced curve \(E\) at \(v\). The following finiteness result of \(\widetilde{E}_v(F^{\cyc}_w)(p)\) for a good ordinary prime \(v\) is well-known but for a lack of reference, we include a proof here. [\[finiteness\]]{#finiteness label="finiteness"} Let \(E\) be an elliptic curve over \(F\) with good ordinary reduction at the prime \(v\) which lies above \(p\). Then for every prime \(w\) of \(F^{\cyc}\) above \(v\), we have that \(\widetilde{E}_v(F^{\cyc}_w)(p)\) is finite. The long cohomology exact sequence of \[0\lra C_v\lra E(p) \lra \widetilde{E}_v(p)\lra 0\] gives rise to an exact sequence \[E(F^{\cyc}_w)(p)\lra \widetilde{E}_v(F^{\cyc}_w)(p)\lra H^1(F^{\cyc}_w, C_v)\lra H^1(F^{\cyc}_w, E(p)) \lra H^1(F^{\cyc}_w, \widetilde{E}_v(p)) \lra 0,\] where the final zero follows from that fact that \(H^2(F^{\cyc}_w,C_v)=0\) (cf. ). Since our elliptic curve has good ordinary reduction at the prime \(v\), Imai's theorem asserts that \(E(F^{\cyc}_w)(p)\) is finite. On the other hand, a local Euler characteristics argument (cf. ) shows that \(\corank_{\Zp}(H^1(F^{\cyc}_w, E(p))) = \corank_{\Zp}(H^1(F^{\cyc}_w, C_v)) + \corank_{\Zp}(H^1(F^{\cyc}_w, \widetilde{E}_v(p))\). Putting this information into the exact sequence, we see that the \(\widetilde{E}_v(F^{\cyc}_w)(p)\) has trivial \(\Zp\)-corank. Now for the local terms, we have \[\corank_{\Zp}\big(D_w(F^{\cyc}_w)\big) = \begin{cases} 1,& \mbox{if \(E\) has split multiplicative reduction at \(w\)}, \\ 2, & \mbox{if \(w\nmid p\) and \(E\) has good reduction at \(w\) with \(E(F^{\cyc}_w)[p]\neq 0\)}, \\ 0, & \mbox{otherwise,}\end{cases}\] where we have made use of for the primes not dividing \(p\). Let \(L\) be a finite \(p\)-extension of \(F\). By Lemma [\[burn-ven\]](#burn-ven){reference-type="ref" reference="burn-ven"}, one can find a strongly admissible pro-\(p\) \(p\)-adic Lie extension \(F_{\infty}\) of \(F\) which contains \(L\). Denote by \(P_0(F^{\cyc})\) the set of primes of \(S(F^{\cyc})\), whose decomposition group of \(H\) at \(w\) has dimension \(\geq 1\). Let \(M(F^{\cyc})\) (resp., \(P_1(F^{\cyc})\)) be the set of split multiplicative primes of \(E\) in \(P_0(F^{\cyc})\) which lie above \(p\) (resp., do not lie above \(p\)). Let \(P_2(F^{\cyc})\) be the primes \(w\) of \(P_0(F^{\cyc})\) at which \(w\nmid p\) and \(E\) has good reduction at \(w\) with \(E(F^{\cyc}_w)[p]\neq 0\). Assuming that \(X(E/F_{\infty})\) satisfies the \(\M_H(G)\)-conjecture, Theorem [\[Kida formula theorem\]](#Kida formula theorem){reference-type="ref" reference="Kida formula theorem"} then reads as \[\rank_{\Zp}(X_f(E/L^{\cyc})) = [L:F]\rank_{\Zp}(X_f(E/F^{\cyc})) + \sum_{w\in M(F^{\cyc})\cup P_1(F^{\cyc})}\left([L:F]-\sum_{u|w}1\right)\] \[+ 2\sum_{w\in P_2(F^{\cyc})}\left([L:F]-\sum_{u|w}1 \right),\] where the \(u\)'s denote the primes in \(S(L^{cyc})\), and noting that \(E(F^{\cyc})(p)\) and \(E(L^{\cyc})(p)\) are finite by a result of Ribet. One can see that the above agrees with that in and. One can also check that our Theorem [\[Kida formula theorem\]](#Kida formula theorem){reference-type="ref" reference="Kida formula theorem"} (or Theorem [\[Kida formula theorem mu=0\]](#Kida formula theorem mu=0){reference-type="ref" reference="Kida formula theorem mu=0"}) recovers and. We end by discussing an example taken from. Let \(E\) be the elliptic curve defined by \[y^2 = x^3-24z^7\sqrt{z+3} x^2 +zx,\] where \(z= \frac{\sqrt{5}-1}{2}\). This elliptic curve is defined over \(\Q(\sqrt{z+3})\) and has good ordinary reduction at the prime above \(5\). Let \(F\) be the field \(\Q(\zeta_{20})\) and \(F_{\infty}\) the \(\Z_5^5\)-extension of \(F\). It is shown in that the \(\mu\)-invariant of \(X(E/F^{\cyc})\) is positive. Thus, if we assume that \(\M_H(G)\)-conjecture holds for \(X(E/F_{\infty})\), then it follows from the above discussion that for every finite extension \(L\) of \(F\) contained in \(F_{\infty}\), we have \[\rank_{\Zp}(X_f(E/L^{\cyc})) = [L:F]\rank_{\Zp}(X_f(E/F^{\cyc})).\] Unfortunately, we do not have a way of establishing \(\M_H(G)\)-conjecture for \(X(E/F_{\infty})\) as yet (but see and for some partial results in this direction). It could be of interest to at least verify the above rank equality numerically (for certain \(L\)). We however do not know how to approach this problem at this point of writing. # Remarks on the classical case We give a sketch how the discussion of Section [4](#Kida section){reference-type="ref" reference="Kida section"} specializes to the classical case. From now on, \(F\) will denote a totally real number field. Write \(\Delta= \Gal(F(\mu_p)/F)\). Let \[\kappa: \Gal(F(\mu_{p^\infty})/F)\lra \mathrm{Aut}(\mu_{p^\infty})\cong \Zp^{\times}\] be the cyclotomic character. Writing \(d=|\Delta|\), we define \[e_{i} = \frac{1}{d}\sum_{\sigma\in \Delta} \kappa^{-i}(\sigma)\sigma^i \in \Zp[\Delta].\] Let \(i\) be an even integer such that \(0\leq i\leq d\). Set \(A=\Qp/\Zp(\kappa^{-i})\) and \(A_v=\Qp/\Zp(\kappa^{-i})\) for all \(v|p\), where \(\Qp/\Zp(\kappa^{-i})\) is \(\Qp/\Zp\) as \(\Zp\)-module with a Galois action by \(\sigma\cdot x = \kappa^{-1}(\sigma) x\). Then one can check that \[S^{str}(A/F(\mu_{p^{\infty}})) = H^1\big(G_S(F(\mu_{p^{\infty}})),A\big) \cong \big(e_iG_S(F(\mu_{p^{\infty}}))^{ab}(p)\big)^{\vee}.\] Here \(G_S(F(\mu_{p^{\infty}}))^{ab}\) is the abelianization of the group \(G_S(F(\mu_{p^{\infty}}))\). Note that \(e_iG_S(F(\mu_{p^{\infty}}))^{ab}(p)\) is a torsion \(\Zp\ps{\Ga}\)-module by, where \(\Ga=\Gal(F^\cyc/F)\). We may proceed as in the previous section to obtain a Kida formula for \(S^{str}(A/F(\mu_{p^{\infty}}))\) for every even \(i\) under the assumption of the \(\M_H(G)\)-conjecture. Summing over these \(i\)'s, we obtain. Upon combining this with, we obtain the classical Kida's formula for the minus class groups. We should mention that Hachimori-Sharifi has proven the classical Kida's formula under a slight weakening of the usual \(\mu=0\) assumption (cf. ). However, it would seem that their approach cannot be extended to prove the general case (see ). Of course, we should mention that in this classical situation, Iwasawa has conjectured that \(\mu=0\) always holds, although this has only been verified for abelian number fields ().
{'timestamp': '2020-12-17T02:07:14', 'yymm': '2012', 'arxiv_id': '2012.08699', 'language': 'en', 'url': 'https://arxiv.org/abs/2012.08699'}
# Introduction In the present paper, we shall begin with introducing one-dimensional weighted Hardy's inequalities with sharp remainders under one-sided boundary condition. As weights we shall deal with the so-called non-doubling weights in addition to usual doubling ones. Then we shall establish \(N\)-dimensional weighted Hardy's inequalities with non-doubling weights of the distance \(\delta(x):= { \rm dist}(x,\partial\Omega)\) to the boundary \(\partial\Omega\), where \(\Omega\) is a \(C^2\) class bounded domain of \(\mathbf R^N\, ( N\ge 2)\). A positive [ continuous]{style="color: black"} function \(w(t)\) on \((0,\infty)\) is said to be a doubling weight if there exists a positive number \(C\) such that we have \[C^{-1} w(t)\le w(2t)\le C w(t) \quad (0<t<\infty),\label{doubling}\] where \(C\) is independent of each \(t \in (0,\infty)\). When \(w(t)\) does not possess this property, \(w(t)\) is said to be a non-doubling weight in the present paper. In one-dimensional case we typically treat a weight function \(w(t)\) that may vanish or blow up in infinite order such as \(e^{-1/t}\) or \(e^{1/t}\) at \(t=0\). In such cases the limit of ratio \(w(t)/w(2t)\) as \(t\to +0\) may become \(0\) or \(+\infty\), and hence they are regarded as non-doubling weights according to our notion. Let \(\eta>0\). By \(C_c^1((0,\eta])\) we denote the set of all \(C^1\) functions with compact supports in \((0,\eta]\). Then one-dimensional Hardy's inequalities with one-sided boundary condition in this paper are typically represented by the followings. Proposition [\[Prop\]](#Prop){reference-type="ref" reference="Prop"} will be established as Corollary [\[cor2.2\]](#cor2.2){reference-type="ref" reference="cor2.2"} to Theorem [\[T3.1\]](#T3.1){reference-type="ref" reference="T3.1"}. When \(u(\eta)=0\), these inequalities are a variant of classical weighted Hardy's inequalities (see ). It is interesting that both coefficients \(\Lambda_{p}\) and \((\Lambda_{p})^{1/p'}\) appearing in ([\[DD\]](#DD){reference-type="ref" reference="DD"}) and ([\[GG\]](#GG){reference-type="ref" reference="GG"}) are best, even though the inequalities contain two parameters \(\eta\) and \(\mu\). To see the sharpness of ([\[DD\]](#DD){reference-type="ref" reference="DD"}) and ([\[GG\]](#GG){reference-type="ref" reference="GG"}), by the density argument it suffices to employ \(u_\varepsilon(t)= \left( \mu+ \int_t^\eta e^{1/s}\,ds\right)^{1/p'-\varepsilon}\) and \(u_\varepsilon(t)= \left( \int_0^t e^{-1/s}\,ds\right)^{1/p'+\varepsilon}\) for test functions (\(\varepsilon \to +0\)) respectively. (For the detail see Subsection 4.2 (Part 1).) Our first purpose in this paper is not only to establish a general version of Proposition [\[Prop\]](#Prop){reference-type="ref" reference="Prop"} but also improve it by adding sharp remainder terms. By \(W(\mathbf R_+)\) we denote a class of functions \[\{ w\in C^1({\bf R}_+): w>0, \lim_{t\to+0}w(t)=a\, \text{ for some }\,a\in [0,\infty] \}\] with \(\mathbf R_+=(0,\infty)\). As weights we adopt functions \(W_p(t)=w(t)^{p-1}\) with \(w(t)\in P(\mathbf R_+) \cup Q(\mathbf R_+)\), where \[\begin{cases}&P(\mathbf R_+)= \{ w(t)\in W(\mathbf R_+): \, w(t)^{-1} \notin L^1((0,\eta)) \, \text{ for some} \, \eta >0\},\\ &Q(\mathbf R_+) =\{ w(t)\in W(\mathbf R_+): \, w(t)^{-1}\in L^1((0,\eta)) \, \text{ for any } \, \eta >0 \}. \end{cases}\] Clearly \(W(\mathbf R_+)=P(\mathbf R_+) \cup Q(\mathbf R_+)\), \(e^{-1/t} \in P(\mathbf R_+)\) and \(e^{1/t} \in Q(\mathbf R_+)\) for \(t>0\) ( For the precise definitions see Section 2 ). By virtue of Proposition [\[Prop\]](#Prop){reference-type="ref" reference="Prop"}, it is clearly seen that our results on this matter essentially depend on whether \(w\) belongs to \(P(\mathbf R_+)\) or \(Q(\mathbf R_+)\). In particular when \(w(t)\in P(\mathbf R_+)\), it follows from Proposition [\[ct1\]](#ct1){reference-type="ref" reference="ct1"} that \[\inf_{u\in V_\eta} \int_0^\eta |u'(t)|^p W_p(t)\,dt =0, \label{C}\] where \(V_\eta= \{ u\in C^1([0,\eta]): u(0)=0, u(\eta)=1\}.\) Nevertheless we have sharp Hardy type inequalities ([\[nct1\]](#nct1){reference-type="ref" reference="nct1"}) and ([\[nct2\]](#nct2){reference-type="ref" reference="nct2"}) in Theorem [\[T3.1\]](#T3.1){reference-type="ref" reference="T3.1"}. As an important application, in Theorem [\[CT3\]](#CT3){reference-type="ref" reference="CT3"} we shall establish \(N\)-dimensional Hardy's inequalities with weights being functions of the distance \(\delta (x)=\rm{ dist}(x,\partial\Omega)\) to the boundary \(\partial\Omega\). In this task it is crucial to establish sharp weighted Hardy's inequalities in the tubler neighborhood \(\Omega_\eta\) of \(\Omega\), which are reduced to the one dimensional inequalities in Theorem [\[T3.1\]](#T3.1){reference-type="ref" reference="T3.1"}. To this end, \(\Omega\) is assumed to be a bounded domain of \(\mathbf R^N\) ( \(N\ge 2\) ) whose boundary \(\partial\Omega\) is a \(C^2\) compact manifolds in the present paper. We prepare more notations to describe our results. For \(W_p(t) = w(t)^{p-1}\) with \(w(t)\in W(\mathbf R_+)\), we define a weight function \(W_p(\delta(x))\) on \(\Omega\) by \[W_p(\delta(x))=(W_p\circ\delta)(x).\] By \(L^p(\Omega; W_p(\delta))\) we denote the space of Lebesgue measurable functions with weight \(W_p(\delta(x))\), for which \[\| u \|_{ L^p(\Omega; W_p(\delta))} = \bigg( \int_{\Omega}|u(x)|^p W_p(\delta(x))\,dx\bigg ) ^{1/p} < +\infty.\label{2.1}\] By \(C_c^\infty(\Omega)\) we denote the set of all \(C^\infty\) functions with compact supports in \(\Omega\). \(W_{0}^{1,p}(\Omega,W_p(\delta))\) is given by the completion of \(C_c^\infty(\Omega)\) with respect to the norm defined by \[\| u\|_{W^{1,p}_{0}(\Omega; W_p(\delta)) } = \| |\nabla u| \|_{ L^p(\Omega; W_p(\delta))} + \| u\|_{ L^p(\Omega; W_p(\delta))}. \label{2.2}\] Then \(W^{1,p}_{0}(\Omega; W_p(\delta))\) becomes a Banach space with the norm \(\| \cdot\|_{W^{1,p}_{0}(\Omega; W_p(\delta)) }\). Under these preparation we will establish \(N\)-dimensional weighted Hardy's inequality as Theorem [\[CT3\]](#CT3){reference-type="ref" reference="CT3"}, which is the counter-part to Theorem [\[T3.1\]](#T3.1){reference-type="ref" reference="T3.1"}. In particular for \(w(t)\in Q(\mathbf R_+)\), as in Corollary [\[NCC1\]](#NCC1){reference-type="ref" reference="NCC1"} we have a simple inequality which is a generalization of classical Hardy's inequality: \[\label{HI} \int_\Omega |\nabla u|^p W_p(\delta(x)) \,dx\ge \gamma \int_\Omega \frac{|u|^pW_p(\delta(x))}{F_\eta(\delta(x))^p}\,dx, \quad \forall u\in W^{1,p}_{0}(\Omega; W_p(\delta)),\] where \(\eta\) is a sufficiently small positive number, \(\gamma\) is some positive constant and \(F_\eta(\delta(x))=(F_\eta\circ \delta)(x)\) is a nonnegative function defined in Definition [\[D2\]](#D2){reference-type="ref" reference="D2"}. If \(w=1\), then \(F_{\eta}(t)=t \, (t\le \eta)\); \(\eta\,(t\ge \eta)\) and ([\[HI\]](#HI){reference-type="ref" reference="HI"}) is a well-known Hardy's inequality [having \(\left(\min(\delta(x),\eta)\right)^{-p}\) as the Hardy potential,]{style="color: black"} which is valid for a bounded domain \(\Omega\) of \(\mathbf R^N\) with Lipschitz boundary (cf. ). Further if \(\Omega\) is convex, then \(\gamma = \Lambda_{p}\) holds for arbitrary \(1<p<\infty\) (cf. ). It is worthy to remark that ([\[HI\]](#HI){reference-type="ref" reference="HI"}) is never valid in the case that \(w(t)\in P(\mathbf R_+)\) by ([\[C\]](#C){reference-type="ref" reference="C"}) (see also Proposition [\[ct1\]](#ct1){reference-type="ref" reference="ct1"} and Proposition [\[CT1\]](#CT1){reference-type="ref" reference="CT1"}). Nevertheless, in this case we shall establish weighted Hardy's inequalities with a switching function in Theorem [\[CT3\]](#CT3){reference-type="ref" reference="CT3"} and Corollary [\[NCC1\]](#NCC1){reference-type="ref" reference="NCC1"}, which correspond to Theorem [\[T3.1\]](#T3.1){reference-type="ref" reference="T3.1"} and its corollaries. We remark that these Hardy's inequalities with a compact perturbation are closely relating to the so-called weak Hardy property of \(\Omega\). In fact, if \(w(t) \in P(\mathbf R_+)\), then a constant \(\gamma^{-1}\) in ([\[2.7\]](#2.7){reference-type="ref" reference="2.7"}) concerns the weak Hardy constant, but in this case the strong Hardy constant is \(+\infty\) ( see for the detail). In, we have improved Hardy's inequalities adopting \(\delta(x)^{\alpha p}\) ( powers of the distance \(\delta(x)\) to the boundary \(\partial\Omega\) ) as weight functions instead of \(W_p(\delta)\). In the present paper, some inequalities of Hardy type in and will be employed with minor modifications, especially when \(1<p<2\) (see also ). We remark that our results will be applicable to variational problems with critical Hardy potentials in a coming paper (c.f. ) and also applicable to the Caffarelli-Kohn-Nirenberg type inequalities with non-doubling weights in the coming paper. This paper is organized in the following way: In Section 2 we introduce a class of weight functions \(W(\mathbf R_+)\) and two subclasses \(P(\mathbf R_+)\) and \(Q(\mathbf R_+)\) together with functions such as \(F_\eta(t)\) and \(G_\eta(t)\), which are crucial in this paper. Further a notion of admissibilities for \(P(\mathbf R_+)\) and \(Q(\mathbf R_+)\) is introduced. In Section 3, the main results are described. The results are divided into two cases (one-dimensional case and \(N\)-dimensional case), which are described in Subsection 3.1 and Subsection 3.2, respectively. Theorem [\[T3.1\]](#T3.1){reference-type="ref" reference="T3.1"} and Theorem [\[T3.2\]](#T3.2){reference-type="ref" reference="T3.2"} are established in Section 4. Theorem [\[CT3\]](#CT3){reference-type="ref" reference="CT3"} together with Corollary [\[NCC1\]](#NCC1){reference-type="ref" reference="NCC1"} are proved in Section 5. The proof of Theorem [\[NCT2\]](#NCT2){reference-type="ref" reference="NCT2"} is given in Section 6 and the proofs of Proposition [\[ct1\]](#ct1){reference-type="ref" reference="ct1"} and Proposition [\[CT1\]](#CT1){reference-type="ref" reference="CT1"} are given in Section 7. In Appendix the proof of Lemma [\[lemma4.4\]](#lemma4.4){reference-type="ref" reference="lemma4.4"} is provided. Some auxiliary inequalities are also given as Lemma [\[l2\]](#l2){reference-type="ref" reference="l2"}. # Preliminaries First we introduce a class of weight functions which is crucial in this paper. In the next we define two subclasses of this rather large space. Here we give some fundamental examples: In the next we define functions such as \(F_\eta(t)\) and \(G_\eta(t)\), which are crucial in considering variants of the Hardy potential like \(F_\eta(\delta(x))^{-p}\) in ([\[HI\]](#HI){reference-type="ref" reference="HI"}). By using integration by parts we see the followings: In a similar way we define the following: Now we introduce two admissibilities for \(P(\mathbf R_+)\) and \(Q(\mathbf R_+)\). Here we give typical examples: By integrating ([\[2.13\]](#2.13){reference-type="ref" reference="2.13"}), we have for \(0<t<\eta\) \[\begin{cases}&G_\eta (t)= \log \left( \int_t^\eta { w(s)}^{-1}\,ds +\mu\right)-\log \mu + \mu, \quad \text{ if } w\in P(\mathbf R_+),\\ \\ &G_\eta (t)= \log \left( \int_0^\eta { w(s)}^{-1}\,ds \right)-\log\left(\int_0^t { w(s)}^{-1}\,ds \right) + \mu ,\quad \mbox{ if } w\in Q(\mathbf R_+). \end{cases}\] Hence the inequality ([\[2.10\]](#2.10){reference-type="ref" reference="2.10"}) with positive numbers \(\eta\) and \(K\) is equivalent to \[\begin{cases}& \int_t^\eta { w(s)}^{-1}\,ds\le \mu( e^{ {K}/{\sqrt t}-\mu}-1)\quad (0<t<\eta), \quad \text{ if } w\in P_A(\mathbf R_+),\\ \\ &\int_0^t {w(s)}^{-1}\,ds \ge e^\mu \int_0^\mu {w(s)}^{-1}\,ds \,e^{-{K}/{\sqrt t}}\quad (0<t<\eta),\quad \mbox{ if } w\in Q_A(\mathbf R_+). \end{cases} \label{2.10'}\] Here we note that for each \(\mu>0\), \(\eta>0\) and \(w\in Q(\mathbf R_+)\) there exist some positive numbers \(K_1\), \(K_2\) and \(K_3\) such that \(K_1\le K_2\le K_3\) and we have \[\begin{cases}& e^{ {K_1}/{\sqrt t} } \le \mu( e^{ {K_2}/{\sqrt t}-\mu}-1) \le e^{ {K_3}/{\sqrt t}} \quad (0<t<\eta)\\ &\\ & e^{-{K_3}/{\sqrt t}}\le e^\mu \int_0^\mu {w(s)}^{-1}\,ds \,\,e^{-{K_2}/{\sqrt t}} \le e^{-{K_1}/{\sqrt t}} \quad (0<t<\eta).\end{cases}\] Therefore the assertion is now clear. \(\Box\) # Main results ## Results in the one dimensional case We introduce function spaces to state the results in one dimensional case: By \(L^p((0,\eta]; W_p)\) we denote the space of Lebesgue measurable functions with weight \(W_p(t)\), for which \[\| u \|_{ L^p((0,\eta]; W_p)} = \bigg( \int_0^\eta|u(t)|^p W_p(t)\,dt\bigg ) ^{1/p} < +\infty.\label{2.1'}\] By \(C_c^\infty((0,\eta])\) we denote the set of all \(C^\infty\) functions with compact supports in \((0,\eta]\). \(W_{0}^{1,p}((0,\eta]; W_p)\) is given by the completion of \(C_c^\infty((0,\eta])\) with respect to the norm defined by \[\| u\|_{ W_{0}^{1,p}((0,\eta]; W_p)} = \|u' \|_{ L^p((0,\eta]; W_p)} + \| u\|_{ L^p((0,\eta]; W_p)}. \label{2.2'}\] Then \(W_{0}^{1,p}((0,\eta]; W_p)\) becomes a Banach space with the norm \(\| \cdot\|_{ W_{0}^{1,p}((0,\eta]; W_p)}\). We also define a switching function: We state one-dimensional Hardy's inequalities with one-sided boundary condition. The following is a direct consequence from this theorem. We remark that \(C_c^1((0,\eta])\) is densely contained in \(W_{0}^{1,p}((0,\eta]; W_p)\). : In Theorem [\[T3.1\]](#T3.1){reference-type="ref" reference="T3.1"} we set \(W_p(t)=w(t)^{p-1}= t^{\alpha p}\). Then \(w(t)\in P(\mathbf R_+)\) for \(\alpha \ge1/p'\), and \(w(t)\in \textcolor{black}{ Q}(\mathbf R_+)\) for \(\alpha <1/p'\). For \(R>e\) we set \[\mu = \begin{cases}& (\Lambda_{p}/ \Lambda_{\alpha,p})^{1/p} \eta^{(p-1-\alpha p)/(p-1)}, \quad \text{ if }\alpha>1/p', \\ & \log R, \qquad\quad \qquad \quad\quad \quad \qquad\quad \text{ if }\alpha=1/p'. \end{cases}\] When \(\alpha \neq 1/p'\) we have \[F_\eta(t)= (\Lambda_{p}/ \Lambda_{\alpha,p})^{1/p} \, t \quad\mbox{and}\quad f_\eta(\eta)= \mu.\] When \(\alpha =1/p'\) we have \[F_\eta(t)=t \log (R\eta/t)\quad\mbox{and}\quad f_\eta(\mu)= \mu.\] Then the assertions ([\[F\]](#F){reference-type="ref" reference="F"}), ([\[E\]](#E){reference-type="ref" reference="E"}) and ([\[B\]](#B){reference-type="ref" reference="B"}) follow from ([\[nct1\]](#nct1){reference-type="ref" reference="nct1"}).0◻ In order to establish Hardy's inequalities in a bounded domain of \(\mathbf R^N\) as an application, we need a further refinement of the previous results. Lastly we state a fundamental result which will be useful in the subsequent. ## Results in a domain of \(\mathbf R^N \,(N\ge 2)\) As an important application of one dimensional Hardy's inequalities in the previous section, we describe Hardy's inequalities in a bounded domain \(\Omega\) of \(\mathbf R^N \,(N\ge 2)\). Let \(\delta(x):= { \rm dist}(x,\partial\Omega)\). For each small \(\eta >0\), \(\Omega _\eta\) denotes a tubular neighborhood of \(\partial \Omega\) and \(\Sigma_\eta\) denotes the boundary of \(\Omega\setminus \Omega_\eta\), namely \[\Omega_\eta = \{ x\in \Omega: \delta(x)<\eta \}\quad\mbox{and} \quad \Sigma_\eta = \{ x\in \Omega: \delta(x)=\eta \}.\label{NBD}\] For the sake of simplicity, by \(W_p(\delta)\), \(F_\eta(\delta)\) and \(G_\eta(\delta)\) we denote \(W_p(\delta(x))\), \(F_\eta(\delta(x))\) and \(G_\eta(\delta(x))\) respectively. The proofs of Theorem [\[CT3\]](#CT3){reference-type="ref" reference="CT3"} and Corollary [\[NCC1\]](#NCC1){reference-type="ref" reference="NCC1"} will be given in Section 5. Theorem [\[NCT2\]](#NCT2){reference-type="ref" reference="NCT2"} will be proved in Section 6. Moreover we have the followings: # Proofs of Theorem [\[T3.1\]](#T3.1){reference-type="ref" reference="T3.1"} and Theorem [\[T3.2\]](#T3.2){reference-type="ref" reference="T3.2"} ## Lemmas First we prepare the following fundamental inequalities which are established in as Lemma 2.1 for \(X>-1\). **Proof.** By Taylar expansion we have ([\[3.0\]](#3.0){reference-type="ref" reference="3.0"}) with \(q=2\). For \(p>1\), we note that \[\lim_{X\to 0} \frac{|1+X|^p-1-pX}{X^2}=\frac{p(p-1)}{2}, \quad \lim_{|X|\to \infty} \frac{|1+X|^p-1-pX}{|X|^p} =1. \label{Add}\] Therefore ([\[3.0\]](#3.0){reference-type="ref" reference="3.0"}) is valid for any \(q\in [2,p]\) for a small \(c(p)>0\). If \(X>-1\), then ([\[3.1\]](#3.1){reference-type="ref" reference="3.1"}) also follows from Taylar expansion and ([\[Add\]](#Add){reference-type="ref" reference="Add"}). If we choose \(c(p)\) sufficiently small, then it remains valid for \(X\le-1\). \(\Box\) For \(u\in C_c^1((0,\eta])\) let us set \[u(t)= g_\eta(t) v(t),\] where \(g_\eta(t)\) is given by Definition [\[fg\]](#fg){reference-type="ref" reference="fg"}. Clearly \(v(t)\in C_c^1((0,\eta])\) and \(u(t)'= g'_\eta(t) v(t)+g_\eta(t) v'(t)\). We define \[X(t)= \begin{cases}&\frac{g_\eta(t)}{g'_\eta(t)} \frac{ v'(t)}{v(t)}=p'F_\eta(t) \frac{ v'(t)}{v(t)} \textcolor{black}{s(w)} \quad \text{if } v(t)\neq 0,\\ & 0\,\,\quad\qquad\qquad\qquad\qquad\qquad\text{ if } v(t)= 0. \end{cases}\] Then we have \[u'(t)= g'_\eta(t) v(t)\left( 1+ X(t)\right), \quad \text{ if } v(t)\neq 0.\] Then it follows immediately from Lemma [\[lem3.1\]](#lem3.1){reference-type="ref" reference="lem3.1"} that we have the following. Now we prepare the following lemma, recalling a switching function; \[s(w)= \begin{cases}-1 \quad & \text{if } \quad w\in P(\mathbf R_+),\\ \,\,1\quad & \text{if } \quad w\in Q(\mathbf R_+).\end{cases}\] Proof of ([\[4.13\]](#4.13){reference-type="ref" reference="4.13"}): By Definition [\[fg\]](#fg){reference-type="ref" reference="fg"} (2) we see \[g'_\eta= (p')^{-1/p } (f_\eta)^{-1/p } w^{-1} s(w). \label{4.18}\] Then we have ([\[4.13\]](#4.13){reference-type="ref" reference="4.13"}). Proof of ([\[4.14\]](#4.14){reference-type="ref" reference="4.14"}): Using ([\[4.13\]](#4.13){reference-type="ref" reference="4.13"}) together with \[p |v|^p |g_\eta'|^p X = s(w) (|v|^p)' |g'_\eta|^{p-1} g_\eta, \label{4.19}\] we have ([\[4.14\]](#4.14){reference-type="ref" reference="4.14"}). Proof of ([\[4.15\]](#4.15){reference-type="ref" reference="4.15"}): Noting that \(p+p'=pp'\) and \((p')^{-p}= \Lambda_p\), we have \[|v|^p|g_\eta'|^p=\frac{|u|^p}{ g^{p+p'}_\eta w^p}=\frac{|u|^p}{ g^{pp'}_\eta w^p}=\Lambda_p \frac{|u|^p}{ F_\eta^p}. \label{4.20}\] Proof of ([\[4.16\]](#4.16){reference-type="ref" reference="4.16"}): Using ([\[4.18\]](#4.18){reference-type="ref" reference="4.18"}) and \(2-(p-2)/(p-1)= p'\), we have \[|v|^p |g_\eta'|^p |X|^2 W_p=|v|^{p-2} (v')^2 |g'_\eta|^{p-2}g_\eta^2 W_p= \frac{4p'}{p^2} | (v^{p/2})'|^2 F_\eta.\] Proof of ([\[4.17\]](#4.17){reference-type="ref" reference="4.17"}): Using ([\[4.18\]](#4.18){reference-type="ref" reference="4.18"}) and \(g_\eta^p= (p' f_\eta)^{p-1}\) we have \[|v|^p |g_\eta'|^p |X|^p W_p= |v'|^p g_\eta^pW_p= (p')^{p-1} |v'|^p F_\eta^{p-1}.\] \(\Box\) By the definition of \(\Lambda_p\) we have the following. By virtue of Lemma [\[prop4.1\]](#prop4.1){reference-type="ref" reference="prop4.1"}, Lemma [\[lemma4.2\]](#lemma4.2){reference-type="ref" reference="lemma4.2"} and Lemma [\[lem4.4\]](#lem4.4){reference-type="ref" reference="lem4.4"} , we have the following: This follows from ([\[1.lemma4.2\]](#1.lemma4.2){reference-type="ref" reference="1.lemma4.2"}) of Lemma [\[prop4.1\]](#prop4.1){reference-type="ref" reference="prop4.1"}, ([\[4.13\]](#4.13){reference-type="ref" reference="4.13"}), ([\[4.14\]](#4.14){reference-type="ref" reference="4.14"}), ([\[4.15\]](#4.15){reference-type="ref" reference="4.15"}), ([\[4.16\]](#4.16){reference-type="ref" reference="4.16"}) of Lemma [\[lemma4.2\]](#lemma4.2){reference-type="ref" reference="lemma4.2"} and Lemma [\[lem4.4\]](#lem4.4){reference-type="ref" reference="lem4.4"}. By using ([\[4.17\]](#4.17){reference-type="ref" reference="4.17"}) instead of ([\[4.16\]](#4.16){reference-type="ref" reference="4.16"}), the alternative inequality follows. This follows from ([\[2.lemma4.2\]](#2.lemma4.2){reference-type="ref" reference="2.lemma4.2"}) of Lemma [\[prop4.1\]](#prop4.1){reference-type="ref" reference="prop4.1"}, ([\[4.13\]](#4.13){reference-type="ref" reference="4.13"}), ([\[4.14\]](#4.14){reference-type="ref" reference="4.14"}), ([\[4.15\]](#4.15){reference-type="ref" reference="4.15"}), ([\[4.16\]](#4.16){reference-type="ref" reference="4.16"}), ([\[4.17\]](#4.17){reference-type="ref" reference="4.17"}) of Lemma [\[lemma4.2\]](#lemma4.2){reference-type="ref" reference="lemma4.2"} and Lemma [\[lem4.4\]](#lem4.4){reference-type="ref" reference="lem4.4"}. 0◻ ## Proof of Theorem [\[T3.1\]](#T3.1){reference-type="ref" reference="T3.1"} Assume that \(w\in W(\mathbf R_+)= P(\mathbf R_+)\cup Q(\mathbf R_+)\). It follows from Lemma [\[prop4.2\]](#prop4.2){reference-type="ref" reference="prop4.2"}, we clearly have the inequality ([\[nct1\]](#nct1){reference-type="ref" reference="nct1"}) in Theorem [\[T3.1\]](#T3.1){reference-type="ref" reference="T3.1"}. Hence we proceed to the proof of optimality of the coefficients \(\Lambda_p\) and \((\Lambda_p)^{1/p'}\) in the right-hand side of ([\[nct1\]](#nct1){reference-type="ref" reference="nct1"}). By the density argument, we can adopt as test functions \[\begin{aligned} u_\varepsilon(t) = f_\eta(t)^{1/p'+s(w)\varepsilon } \qquad (0<\varepsilon). \end{aligned}\] We note that \[u'_\varepsilon(t)= \left( 1/p' +s(w)\varepsilon\right) f_\eta(t)^{s(w)\varepsilon-1/p} {s(w)}{w}^{-1}.\] Then the left-hand side becomes \[\begin{aligned} \int_0^\eta|u_\varepsilon'(t)|^pW_p(t)\,dt&= \left( 1/p' +s(w)\varepsilon\right)^p\int_0^\eta f_\eta(t)^{s(w)\varepsilon p-1}{w(t)}^{-1}\,dt \notag\\ &= \left( 1/p' +s(w)\varepsilon\right)^p {f_\eta(\eta)^{s(w) \varepsilon p}}({p\varepsilon})^{-1}. \end{aligned}\] In a similar way the right-hand side becomes \[\begin{aligned} \Lambda_p &\int_0^\eta \frac{|u_\varepsilon(t)|^p W_p(t)}{F_\eta(t)^p }\,dt+ s(w) \Lambda_p^{1/p'} \frac{|u_\varepsilon (\eta)|^p}{f_\eta(\eta) ^{p-1}}\notag\\ &= \left( 1/{p' }\right)^{p}\int_0^\eta f_\eta(t)^{s(w)\varepsilon p-1}w(t)^{-1}\,dt+ s(w) \Lambda_p^{1/p'} \frac{|u_\varepsilon (\eta)|^p}{f_\eta(\eta) ^{p-1}} \notag\\ &= \left( 1/p' \right)^{p} {f_\eta(\eta)^{s(w) \varepsilon p}}({p\varepsilon})^{-1} + s(w) \Lambda_p^{1/p'} \frac{|u_\varepsilon (\eta)|^p}{f_\eta(\eta) ^{p-1}}. \end{aligned}\] Finally we reach to \[\left(\left( 1/p' +s(w)\varepsilon\right)^p-\left( 1/{p' } \right)^{p}\right) \ge s(w) \Lambda_p^{1/p'}p\varepsilon \qquad (0<\varepsilon ),\] and this inequality is clear from the convexity. \(\Box\) In order to establish the inequality ([\[nct2\]](#nct2){reference-type="ref" reference="nct2"}) in Theorem [\[T3.1\]](#T3.1){reference-type="ref" reference="T3.1"} we shall estimate the term involving \(|(|v|^{p/2})'|^2 F_\eta^{}\) from below and use a positive term involving \(|v'|^p F_\eta^{p-1}\) to absorb negative error terms. To this end we need more notations: For \(u,v \in C^1_c((0,\eta])\), we retain \[u(t)= g_\eta(t) v (t)\quad \mbox{and }\quad X(t)= \frac{g_\eta(t)}{g'_\eta(t)} \frac{ v'(t)}{v(t)}=p'F_\eta(t) \frac{ v'(t)}{v(t)} s(w)\quad \textcolor{black}{(v(t)\neq0)}.\] By Remark [\[density\]](#density){reference-type="ref" reference="density"}, it suffices to assume in the proof that \(u\) and \(v\) belong to the class \(\textcolor{black}{G((0,\eta])}\) defined by the following: The following lemma will be established in Appendix. If \(p\ge 2\), then for any \(u\in G((0,\eta])\) we have by using ([\[4.32\'\]](#4.32'){reference-type="ref" reference="4.32'"}) of Lemma [\[lemma4.4\]](#lemma4.4){reference-type="ref" reference="lemma4.4"} \[\begin{aligned} \int_0^\eta |u'(t)|^p W_p(t)\,dt &\ge s(w)\frac{ (\Lambda_p)^{1/p'}} {f_{\eta}(\eta)^{p-1}} |u(\eta)|^p+ \Lambda_p \int_0^\eta \frac{ |{u(t)}|^p W_p(t)\,dt }{F_\eta(t)^p}\\ & +d(p)\left(-\frac{ (\Lambda_p)^{1/p'}} {2\mu f_{\eta}(\eta)^{p-1}} |u(\eta)|^p +\frac{1}{4(p')^{p-1}}\int_0^\eta\frac{|u(t)|^pW_p(t)}{F_\eta(t)^pG_\eta(t)^2}\,dt\right) \notag\\ &= s(w)\frac{ (\Lambda_p)^{1/p'}} {f_{\eta}(\eta)^{p-1}} \left( 1-s(w)\frac{d(p)}{2\mu}\right) |u(\eta)|^p +\Lambda_p \int_0^\eta \frac{ |{u(t)}|^p W_p(t)\,dt }{F_\eta(t)^p}\,dt\notag \\ &+\frac{d(p)}{4(p')^{p-1}}\int_0^\eta \frac{|u(t)|^pW_p(t)}{F_\eta(t)^pG_\eta(t)^2}\,dt.\notag \end{aligned}\] Here we assume that \(d(p)\) is so small that \(d(p)/\mu<1\) if \(w\in Q(\mathbf R_+)\). Then we get ([\[nct2\]](#nct2){reference-type="ref" reference="nct2"}) with \[\begin{cases}&L= { (\Lambda_p)^{1/p'}} {f_{\eta}(\eta)^{1-p}} \left( 1-s(w) {d(p)}/({2\mu})\right),\\ &\\& C={d(p) (\Lambda_p)^{1/p'}}/{4}.\end{cases}\] If \(1<p<2\), then for any \(u\in G((0,\eta])\) and \(M\ge 1\) we have \[\begin{aligned} & \int_0^\eta |u'|^p W_p\,dt \ge s(w)\frac{ (\Lambda_p)^{1/p'}} {f_{\eta}(\eta)^{p-1}} |u(\eta)|^p+ \Lambda_p \int_0^\eta \frac{ |{u(t)}|^p W_p(t)\,dt }{F_\eta(t)^p}\\ & +c(p)(p')^{p-1}\int_{B(v,M)} |v'(t)|^p F_\eta(t)^{p-1} \,dt+ M^{p-2}d(p)\int_{A(v,M)} |(|v(t)|^{p/2})'|^2 F_\eta \,dt. \notag \end{aligned}\] Here \(c(p)\) is a positive number independent of each \(u\) and \(d(p)= c(p) 4p'/p^2\). For the last term we use ([\[4.32\]](#4.32){reference-type="ref" reference="4.32"}) of Lemma [\[lemma4.4\]](#lemma4.4){reference-type="ref" reference="lemma4.4"}, then we have \[\begin{aligned} & \int_0^\eta |u'(t)|^p W_p(t)\,dt \ge \frac{ s(w)(\Lambda_p)^{1/p'}} {f_{\eta}(\eta)^{p-1}} \left( 1-s(w) \frac{d(p)M^{p-2}}{2\mu}\right) |u(\eta)|^p \\&+\Lambda_p \int_0^\eta \frac{ |{u(t)}|^p W_p(t)\,dt }{F_\eta(t)^p} +c(p)(p')^{p-1}\left( 1-\frac{2}{\mu(p-1)M} \right) \int_{B(v,M)} |v'(t)|^p F_\eta(t)^{p-1} \,dt \\& +\frac{d(p)M^{p-2} (\Lambda_p)^{1/p'}}{2}\left( \frac12\int_{A(v,M)} \frac{|u(t)|^pW_p(t)}{F_\eta(t)^pG_\eta(t)^2}\,dt+ \int_{B(v,M)} \frac{|u(t)|^pW_p(t)}{F_\eta(t)^pG_\eta(t)^2}\,dt\right). \notag \end{aligned}\] Then we take a sufficiently large \(M\) so that we have \(1-{2}/({\mu(p-1)M}) >0\) and \({d(p)M^{p-2} }/({2\mu})<1\) if \(w\in Q(\mathbf R_+)\). Then \[\begin{aligned} &\int_0^\eta |u'(t)|^p W_p(t)\,dt \ge s(w)L |u(\eta)|^p +\Lambda_p \int_0^\eta \frac{ |{u(t)}|^p W_p(t)\,dt }{F_\eta(t)^p} +C \int_0^\eta \frac{|u(t)|^pW_p(t)}{F_\eta(t)^pG_\eta(t)^2}\,dt, \end{aligned}\] where \[\begin{cases}&L= { (\Lambda_p)^{1/p'}} {f_{\eta}(\eta)^{1-p}} \left( 1-s(w) {d(p)M^{p-2}}/({2\mu})\right),\\ &\\& C={d(p)M^{p-2} (\Lambda_p)^{1/p'}}/{4}.\end{cases}\] 0◻ ## Proof of Theorem [\[T3.2\]](#T3.2){reference-type="ref" reference="T3.2"} Let \(v\in G((0,\eta])\). Recall that \(u(t)= g_\eta(t) v(t)\), \(u'(t)= g'_\eta(t) v(t)\left( 1+ X(t)\right)\) \((v\neq0)\) and \[X(t)= \frac{g_\eta(t)}{g'_\eta(t)} \frac{ v'(t)}{v(t)}=p'F_\eta (t)\frac{ v'(t)}{v(t)}\textcolor{black}{s(w)}\quad (v(t)\neq 0); 0\quad (v(t)=0).\] Then we have two elementary lemmas. Since \(u'(t)= g'_\eta(t) v(t)\left( 1+ X(t)\right)\), we get \[|u'(t)|^pW_p(t)\le |g'_\eta(t)|^pv(t)^p|\,1+X(t)|^p \textcolor{black}{W_p(t).}\] If \(|X(t)|\le M\), then from Lemma [\[lemma4.7\]](#lemma4.7){reference-type="ref" reference="lemma4.7"} and ([\[4.15\]](#4.15){reference-type="ref" reference="4.15"}) we get the desired estimate. If \(|X(t)|\ge M\), then from Lemma [\[lemma4.7\]](#lemma4.7){reference-type="ref" reference="lemma4.7"} and ([\[4.17\]](#4.17){reference-type="ref" reference="4.17"}) we get the desired one.\(\Box\) By [ Proposition [\[prop2.1\]](#prop2.1){reference-type="ref" reference="prop2.1"} ]{style="color: black"} we have the following. For a sufficiently small \(\eta>0\), temporally we set [\[Q_{ L}(u)= \int_0^\eta |u'(t)|^p W_p(t)\,dt -\Lambda_p \int_0^\eta \frac{ |{u(t)}|^p W_p(t)\,dt }{F_\eta(t)^p}-s(w) {L}|u(\eta)|^p,\]]{style="color: black"} where \(L\) is a positive constant independent of each \(u\), [which will be specified later]{style="color: black"}. In order to prove Theorem [\[T3.2\]](#T3.2){reference-type="ref" reference="T3.2"}, it suffices to control three terms below by \(Q_{L}(u)\) : \[\int_0^\eta \frac{ |u(t)|^p W_p(t) \,dt}{ F_\eta(t)^p G_\eta(t)^2}, \quad \int_0^\eta \frac{ u(t)^pW_p(t)}{ F_\eta(t)^p}\, t\,dt \quad\text{and} \quad \int_0^\eta |u'(t)|^p W_p(t) \, t\,dt.\] It follows form Theorem [\[T3.1\]](#T3.1){reference-type="ref" reference="T3.1"} ([\[nct2\]](#nct2){reference-type="ref" reference="nct2"}) that we have for \(D=C^{-1}\) \[\int_0^\eta \frac{ |u(t)|^p W_p(t) \,dt}{ F_\eta(t)^p G_\eta(t)^2}\le D\cdot Q_L(u),\] where \(L=L(w,p,\eta,\mu)\) is the same constant in ([\[nct2\]](#nct2){reference-type="ref" reference="nct2"}). From this and Lemma [\[lemma4.9\]](#lemma4.9){reference-type="ref" reference="lemma4.9"} we also have \[\int_0^\eta \frac{ u(t)^pW_p(t)}{ F_\eta(t)^p}\, t\,dt \le K^2 D\cdot Q_L(u).\] By using Lemma [\[lemma4.8\]](#lemma4.8){reference-type="ref" reference="lemma4.8"} we see that \[\begin{aligned} \int_0^\eta |u'(t)|^p W_p(t) \, t\,dt &\le \Lambda_p(1+M)^p\int_{|X|\le M} \frac{ u(t)^pW_p(t)}{ F_\eta(t)^p}\, t\,dt \\&+2^p\Lambda_p^{1/p-1}\int_{|X|> M}|v'(t)|^p F_\eta(t)^{p-1}\, t\,dt.\end{aligned}\] Then, the first term in the right-hand side can be controlled by the same \(Q_L(u)\). Now we claim that for some positive number \(K'\) \[\int_{|X|> M}|v'(t)|^p F_\eta(t)^{p-1}t\,dt\le K'\cdot Q_{L}(u), \label{4.43}\] where \(L= {(\Lambda_p)^{1/p'}}{f_\eta(\eta)^{1-p}}\). First we assume that \(p\ge 2\). By ([\[4.222\]](#4.222){reference-type="ref" reference="4.222"}) of Lemma [\[prop4.2\]](#prop4.2){reference-type="ref" reference="prop4.2"} with the last term replaced by \[c(p)(p')^{p-1}\int_0^\eta |v'(t)|^p F_\eta(t)^{p-1} \,dt,\]we see that ([\[4.43\]](#4.43){reference-type="ref" reference="4.43"}) is valid, provided that \(\eta\) is sufficiently small (See also Remark [\[rem4.2\]](#rem4.2){reference-type="ref" reference="rem4.2"}). Secondly we assume that \(1<p<2\). Then in a similar way the assertion follows from ([\[4.23\]](#4.23){reference-type="ref" reference="4.23"}) of Lemma [\[prop4.2\]](#prop4.2){reference-type="ref" reference="prop4.2"}. As a result we have the desired inequality ([\[c1\]](#c1){reference-type="ref" reference="c1"}) for some positive numbers \(C_0, C_1\) and \(L\) which are independent of each \(u\). \(\Box\) # Proofs of Theorem [\[CT3\]](#CT3){reference-type="ref" reference="CT3"} and Corollary [\[NCC1\]](#NCC1){reference-type="ref" reference="NCC1"} We establish Theorem [\[CT3\]](#CT3){reference-type="ref" reference="CT3"} and Corollary [\[NCC1\]](#NCC1){reference-type="ref" reference="NCC1"} using Theorem [\[T3.2\]](#T3.2){reference-type="ref" reference="T3.2"}. Let us prepare some notations and fundamental facts. Define \(\Sigma = \partial \Omega\) and \(\Sigma_t =\{ x\in \Omega: \delta(x)= t\}\). Since \(\Sigma\) is is of class \(C^2\), there exists an \(\eta_0>0\) such that we have a \(C^2\) diffeomorphism \(G: \Omega_\eta \mapsto (0,\eta)\times \Sigma\) for any \(\eta\in (0,\eta_0)\). By \(G^{-1}(t, \sigma) \, ((t,\sigma) \in (0,\eta_0) \times \Sigma)\) we denote the inverse of \(G\). Let \(H^{}_t\) denote the mapping \(G^{-1}(t, \cdot)\) of \(\Sigma\) onto \(\Sigma_t\). This mapping is also a \(C^2\) diffeomorphism and its Jacobian is close to \(1\) in \((0,\eta_0)\times \Sigma\). Therefore, for every non-negative continuous function \(u\) on \(\overline{\Omega_\eta}\) with \(\eta\in (0,\eta_0)\) we have \[\begin{aligned} & \int_{\Omega_\eta}u = \int _0^\eta \,dt \int_{\Sigma_t} u \,d\sigma_t =\int _0^\eta \,dt \int_\Sigma u( H_t(\sigma)) ( \rm{Jac}\, H_t )\,d\sigma, \label{5.1}\\ & | \rm{Jac}\, H_t (\sigma)-1|\le ct, \quad \mbox{ for every } (t,\sigma)\in (0,\eta_0)\times \Sigma, \label{5.2} \end{aligned}\] where \(c\) is a positive constant independent of each \((t,\sigma)\), \(d\sigma\) and \(d\sigma_t\) denote surface elements on \(\Sigma\) and \(\Sigma_t\) respectively. Then we have \[\begin{aligned} & \int_\Sigma u( H_\eta(\sigma)) ( 1-c\eta)\,d\sigma \le \int_{\Sigma_\eta}u\,d\sigma_\eta\le \int_\Sigma u( H_\eta(\sigma)) ( 1+c\eta)\,d\sigma. \label{4.2} \end{aligned}\] Again for the sake of simplicity, we denote \(W_p(\delta(x))\) and \(F_\eta(\delta(x))\) by \(W_p(\delta)\) and \(F_\eta(\delta)\) respectively, and the symbol \(dx\) is often abbreviated. Then we immediately have for \(v=u(H_t(\sigma))\) \[\begin{aligned} \int_{\Sigma} \,d\sigma \int_0^\eta \left |\frac{\partial v}{\partial t} \right |^p (1-ct) & W_p(t) \,dt \le \int_{\Omega_\eta}|\nabla u|^p W_p(\delta)\,dx, \notag\\ \int_{\Sigma} \,d\sigma \int_0^\eta \frac{| v|^pW_p(t) }{F_\eta(t)^p} (1-ct) \,dt &\le \int_{\Omega_\eta}\frac{| u|^pW_p(\delta)\,dx }{F_\eta(\delta)^p}\le \int_{\Sigma} \,d\sigma \int_0^\eta\frac{| v|^pW_p(t) }{F_\eta(t)^p} (1+ct) \,dt. \notag \end{aligned}\] Under these consideration, ([\[2.11\]](#2.11){reference-type="ref" reference="2.11"}) is reduced to the following one dimensional Hardy's inequality. Setting \(v(t) =u(H_t(\sigma))\) and \(v'= \partial v/\partial t\) we have \[\begin{split} \int_0^\eta & |v'(t)|^p W_p(t)(1-ct)\,dt \ge \Lambda_{p} \int_0^\eta \frac{|v(t)|^p W_p(t)}{F_\eta(t)^p} (1+ct)\,dt \\ &+ C \int_0^\eta \frac{|v(t)|^p W_p(t)}{F_\eta(t)^p \textcolor{black}{G_\eta(t)^2} }(1+ct)\,dt + s(w) L' |v(\eta)|^p W_p(\eta)(1+s(w)c\eta). \end{split}\] Equivalently we have \[\label{5.7} \begin{split} \int_0^\eta & \left( |v'(t)|^p-\frac{|v(t)|^p}{F_\eta(t)^p} \left(\Lambda_{p} + \frac{C }{G_\eta(t)^2}\right)\right) W_p(t)\,dt \\ &\ge c \int_0^\eta \left( |v'(t)|^p + \frac{|v(t)|^p}{F_\eta(t)^p} \left(\Lambda_{p} + \frac{C }{G_\eta(t)^2}\right) \right) W_p(t)\, t \,dt \\& +s(w) L' |v(\eta)|^p W_p(\eta)(1+s(w)c\eta). \end{split}\] Assume that \(0<\eta\le 1/(2c)\). Then \(1-c\eta\ge 1/2\) and ([\[5.7\]](#5.7){reference-type="ref" reference="5.7"}) clearly follows from Theorem [\[T3.2\]](#T3.2){reference-type="ref" reference="T3.2"} with \(C_0=C\), \(C_1=c\) and \(L =L'W_p(\eta)(1+s(w)c\eta)\). \(\Box\) First we treat the case that [\(w\in P_A(\mathbf R_+)\)]{style="color: black"}. Assume that Hardy's inequality ([\[2.7\]](#2.7){reference-type="ref" reference="2.7"}) does not hold. Then there exists a sequence of functions \(\{u_k\} \subset W^{1,p}_{0}(\Omega; W_p(\delta)) \cap C(\Omega)\) such that \[\begin{cases}&\lim_{k\to \infty}\left(\int_{\Omega} |\nabla u_k|^pW_p(\delta)\,dx + \int_{\Sigma_\eta}|u_k|^p W_p(\delta)\,d\sigma_\eta\right)=0,\\ & \int_{\Omega} {|u_k|^pW_p(\delta)}/{F_\eta^p(\delta)}\, dx =1 \quad (k=1,2,\cdots). \end{cases} \label{5.8}\] For a sufficiently small \(\eta>0\), let \(W^{1,p}(\Omega\setminus \overline{\Omega_\eta}; W_p(\delta))\) be given by the completion of \(C^\infty(\Omega\setminus \overline{\Omega_\eta} )\) with respect to the norm defined by \[\| u\|_{W^{1,p}(\Omega\setminus \overline{\Omega_\eta}; W_p(\delta)) } = \| |\nabla u| \|_{ L^p(\Omega\setminus \overline{\Omega_\eta}; W_p(\delta))} + \| u\|_{ L^p(\Omega\setminus \overline{\Omega_\eta}; W_p(\delta))}.\] Since \(W_p(\delta)>0\) in \(\overline{\Omega\setminus{\Omega_\eta}}\), \(W^{1,p}(\Omega\setminus \overline{\Omega_\eta}; W_p(\delta))\) is well-defined and becomes a Banach space with the norm \(\| \cdot\|_{W^{1,p}(\Omega\setminus \overline{\Omega_\eta}; W_p(\delta)) }\). We note that \(\int_{\Sigma_\eta}|u_k|^p W_p(\delta)\,d\sigma_\eta\) \((k=1,2,3\ldots)\) is bounded, because the trace operator \(T: W^{1,p}(\Omega\setminus \overline{\Omega_\eta}; W_p(\delta))\) \(\mapsto\) \(L^p(\Sigma_\eta; W_p(\eta) )\) is continuous. By Theorem [\[CT3\]](#CT3){reference-type="ref" reference="CT3"} we have \[\begin{aligned} &\int_{\Omega} |\nabla u_k|^pW_p(\delta)\,dx = \int_{\Omega_\eta} |\nabla u_k|^pW_p(\delta) \,dx + \int_{\Omega\setminus \Omega_\eta} |\nabla u_k|^pW_p(\delta)\,dx \\ &\ge \Lambda_{p}\left( 1- \int_{\Omega \setminus \Omega_\eta}\frac{ {|u_k|^p W_p(\delta)}}{F_\eta^p(\delta)}\,dx\, \right) + \int_{\Omega\setminus \Omega_\eta} |\nabla u_k|^pW_p(\delta)\,dx-L' \int_{\Sigma_\eta} |u_k|^pW_p(\delta) \,d\sigma_\eta. \end{aligned}\] Since \(\delta \ge \eta\) in \(\Omega\setminus \Omega_\eta\), by the standard argument we have \(u_k\to C \,( constant)\) in \(W^{1,p}(\Omega\setminus \overline{\Omega_\eta}; W_p(\delta))\) as \(k\to \infty\). By ([\[5.8\]](#5.8){reference-type="ref" reference="5.8"}) we have \(C=0\). Hence we see \(0 \ge \Lambda_{p}\), and we reach to a contradiction. Secondly we treat the case that \(w\in Q(\mathbf R_+)\). In this case we assume that \[\begin{aligned} &\lim_{k\to \infty}\int_{\Omega} |\nabla u_k|^pW_p(\delta)\,dx=0, \quad \int_{\Omega} \frac{|u_k|^pW_p(\delta)}{F_\eta^p(\delta)}\,dx =1 \quad (k=1,2,\cdots). \label{5.9} \end{aligned}\] Then, by Theorem [\[CT3\]](#CT3){reference-type="ref" reference="CT3"} we have \[\begin{aligned} &\int_{\Omega} |\nabla u_k|^pW_p(\delta)\,dx = \int_{\Omega_\eta} |\nabla u_k|^pW_p(\delta)\,dx + \int_{\Omega\setminus \Omega_\eta} |\nabla u_k|^pW_p(\delta) \,dx \label{5.10}\\ &\ge \Lambda_{p}\left( 1- \int_{\Omega \setminus \Omega_\eta}\frac{ {|u_k|^p W_p(\delta)}}{F_\eta^p(\delta)}\,dx \right) + \int_{\Omega\setminus \Omega_\eta} |\nabla u_k|^pW_p(\delta)\,dx+L' \int_{\Sigma_\eta} |u_k|^pW_p(\delta)\,d\sigma_\eta. \notag \end{aligned}\] Again we have \(u_k\to C \,( constant)\) in \(W^{1,p}(\Omega\setminus \overline{\Omega_\eta}; W_p(\delta))\) as \(k\to \infty\). By ([\[5.9\]](#5.9){reference-type="ref" reference="5.9"}) and ([\[5.10\]](#5.10){reference-type="ref" reference="5.10"}) we have \(C=0\). Hence we see \(0 \ge \Lambda_{p}\), and this is a contradiction. \(\Box\) # Proof of Theorem [\[NCT2\]](#NCT2){reference-type="ref" reference="NCT2"} By virtue of Corollary [\[NCC1\]](#NCC1){reference-type="ref" reference="NCC1"} and its proof, it suffices to show the implication \(1\to 2\). Since \(F_\eta^{-1}\notin L^1((0,\eta))\), for an arbitrary \(\varepsilon>0\) we have \(G_\eta (\delta)^{-1} <\varepsilon\) in \(\Omega_\eta\) provided that \(\eta\) is sufficiently small. Therefore we assume that \(C=0\) without the loss of generality. Here we introduce a Banach space \({W_0^{1,p}(\Omega_\eta; W_p(\delta)) }\) which corresponds to \(W_{0}^{1,p}((0,\eta]; W_p)\) defined in Subsection 3.1. Let \(\tilde{C}_c^\infty(\Omega_\eta)= \{ u|_{\Omega_\eta}: u\in C_c^\infty(\Omega)\}\), where by \(u|_{\Omega_\eta}\) we denote the restriction of \(u\) to \(\Omega_\eta\). Let \(W_0^{1,p}(\Omega_\eta; W_p(\delta))\) be given by the completion of \(\tilde{C}_c^\infty(\Omega_\eta)\) with respect to the norm defined by \[\| u\|_{W_0^{1,p}(\Omega_\eta; W_p(\delta)) } = \| |\nabla u| \|_{ L^p(\Omega_\eta; W_p(\delta))} + \| u\|_{ L^p( \Omega_\eta; W_p(\delta))}.\] Then, \(W_0^{1,p}(\Omega_\eta; W_p(\delta))\) is a Banach space with the norm \(\| \cdot\|_{W^{1,p}_{0}(\Omega_\eta; W_p(\delta)) }\). Then we prepare a lemma on extension: Admitting this for the moment, we prove Theorem [\[NCT2\]](#NCT2){reference-type="ref" reference="NCT2"}. First we treat the case that \(w\in P(\mathbf R_+)\). Then we see that \(W_p/F_\eta^p\in L^1(0,\eta)\). In fact we have \(\int_0^\eta W_p(t)/F_\eta(t)^p\,dt= \mu^{1-p}/(p-1).\) Now we assume that Hardy's inequality ([\[2.11\]](#2.11){reference-type="ref" reference="2.11"}) with \(C=0\) does not hold. Then there exists a sequence of functions \(\{u_k\} \subset W_0^{1,p}(\Omega,W_p(\delta))\cap C(\Omega)\) satisfying \[\begin{cases}&\lim_{k\to \infty}\left(\int_{\Omega_\eta} |\nabla u_k|^pW_p(\delta)\,dx + \int_{\Sigma_\eta}|u_k|^p W_p(\delta)\,d\sigma_\eta\right)=0,\\ & \int_{\Omega_\eta} {|u_k|^pW_p(\delta)}/{F_\eta^p(\delta)}\,dx =1 \quad (k=1,2,\cdots). \end{cases} \label{6.1}\] By \(w_k=u_k|_{\Omega_\eta}\) we denote the restriction of \(u_k\) to \(\Omega_\eta\). Then \(E(w_k) \in W_0^{1,p}(\Omega;W_p(\delta))\) for \(k=1,2,\ldots\). On the other hand, it follows from ([\[6.1\]](#6.1){reference-type="ref" reference="6.1"}) that \(w_k=u_k\to C\) a.e. in \(\Omega_\eta\) for some constant \(C\) as \(k\to\infty\). From ([\[6.1\]](#6.1){reference-type="ref" reference="6.1"}) we have \(C=0\). Then, by the assumption 1 and the continuity of the trace operator \(T: W^{1,p}(\Omega\setminus \overline{\Omega_\eta}; W_p(\delta)) \mapsto L^p(\Sigma_\eta; W_p(\delta ) )\) for a small \(\eta>0\), we have \[\begin{aligned} 1 &\le \int_\Omega \frac{|E(w_k)|^pW_p(\delta)}{F_\eta^p(\delta)}\,dx \label{6.2}\\& \le \gamma^{-1}\left( \int_\Omega |\nabla E(w_k)|^pW_p(\delta)\,dx + L' \int_{\Sigma_\eta} |w_k|^pW_p(\delta)\,d\sigma_\eta \right) \notag\\ & \le \gamma^{-1}C'\Big( \||\nabla u_k| \| _{L^p (\Omega_{\eta/2}; W_p(\delta) )} + \textcolor{black}{ \|u_k\|_{{W^{1,p}}(\Omega_\eta \setminus \overline{\Omega_{\eta/2}};W_p(\delta))} }\Big)^{\textcolor{black}{p}} \to 0, \quad\text{ as } k\to\infty,\notag \end{aligned}\] where \(C'\) is some positive number independent of each \(u_k\). But this is a contradiction. Secondly we treat the case that \(w\in Q(\mathbf R_+)\). Since \(\int_0^\eta W_p(t)/F_\eta(t)^p\,dt= +\infty\), we see that \(W_p/F_\eta^p\notin L^1(0,\eta)\). There is a sequence of functions \(\{u_k\} \subset W_0^{1,p}(\Omega; W_p(\delta))\cap C(\Omega)\) satisfying \[\begin{aligned} &\lim_{k\to \infty}\int_{\Omega_\eta} |\nabla u_k|^pW_p(\delta)\,dx =0, \quad \int_{\Omega_\eta} \frac{|u_k|^pW_p(\delta)}{F_\eta^p(\delta)} \,dx =1 \quad (k=1,2,\cdots). \label{6.3} \end{aligned}\] As before we see that \(u_k\to C\) (constant) in \(\Omega_\eta\). From ([\[6.3\]](#6.3){reference-type="ref" reference="6.3"}) we have \(C=0\). Then, by the assumption 1 and the continuity of the trace operator \(T\), we have \[\begin{aligned} 1 &\le \int_\Omega \frac{|E(w_k)|^pW_p(\delta)}{F_\eta^p(\delta)}\,dx \label{6.4}\\ &\le \gamma^{-1}\left( \int_\Omega |\nabla E(w_k)|^pW_p(\delta) \,dx-L' \int_{\Sigma_\eta} |w_k|^pW_p(\delta) \,d\sigma_\eta \right)\\ & \le \gamma^{-1}C'\Big( \| |\nabla u_k| \|_{L^p (\Omega_{\eta/2}; W_p(\delta) )} + \textcolor{black}{ \|u_k\|_{{W^{1,p}} (\Omega_\eta \setminus \overline{\Omega_{\eta/2}}; W_p(\delta))}} \Big)^{\textcolor{black}{p}}\to 0, \quad\text{ as } k\to\infty,\notag \notag \end{aligned}\] where \(C'\) is some positive number. But this is a contradiction. \(\Box\) Since \(\eta\) is small and \(\delta\) is Lipschitz continuous, \(\partial \Omega_\eta\) and \(\partial \Omega_{\eta/2}\) are Lipschitz compact manifolds. By the standard theory ( Theorem 1 in Section 5.4 of for example ) we have an extension operator \(\tilde{E}: W^{1,p} (\Omega_\eta \setminus \overline{\Omega_{\eta/2}}; W_p(\delta))\mapsto W^{1,p}(\Omega\setminus \overline{\Omega_{\eta/2}}; W_p(\delta))\) such that \(\tilde E(u)= u\) a.e. in \(\Omega_\eta \setminus \overline{\Omega_{\eta/2}}\), and \[\| |\nabla \tilde{E}( u)|^p\|_{L^p(\Omega\setminus \overline{\Omega_{\eta/2}}; W_p(\delta))} \le C(\eta) \textcolor{black}{ \|u\|_{{W^{1,p} }(\Omega_\eta \setminus \overline{\Omega_{\eta/2}};W_p(\delta))}}.\] Define for \(u\in W_0^{1,p}(\Omega_\eta; W_p(\delta))\) \[{ E}(u) = u, \, (x\in \overline{\Omega_{\eta/2}},); \quad \tilde{E}(u), \, (x \in \Omega\setminus \overline{\Omega_{\eta/2}} ).\] Then the assertion follows. \(\Box\) # Proofs of Propositions [\[ct1\]](#ct1){reference-type="ref" reference="ct1"} and [\[CT1\]](#CT1){reference-type="ref" reference="CT1"} Proposition [\[ct1\]](#ct1){reference-type="ref" reference="ct1"} is known in a more general fashion. In fact a variant is seen in Maz'ya ( Lemma 2, p144). For the sake of reader's convenience we give an elementary verification. We note that Proposition [\[CT1\]](#CT1){reference-type="ref" reference="CT1"} is a direct consequence of Proposition [\[ct1\]](#ct1){reference-type="ref" reference="ct1"}. For \(w\in P(\bf R_+)\) and \(\overline\varepsilon \in (0,\eta/2)\), define \[\varphi_{\overline\varepsilon}= \,\, 0 \,\,\,( 0\le t\le \overline\varepsilon); \,\,\, \frac {f_\eta(\overline\varepsilon)-f_\eta(t) }{f_\eta(\overline\varepsilon)-f_\eta(\eta/2) }\, \,\,(\overline\varepsilon \le t\le \eta/2);\,\,\, 1\, \,\,(\eta/2 \le t \le \eta). \label{7.1}\] Noting that \(f_\eta(\overline\varepsilon)= \mu+ \int_{\overline\varepsilon}^\eta 1/w(s)\,ds\to +\infty\) as \(\overline\varepsilon\to +0\), we see that \(\int _0^\eta|\varphi_{\overline\varepsilon} '|^p W_p(t)\,dt=( f_\eta(\overline\varepsilon)-f_\eta(\eta/2))^{1-p} \to 0 \, \mbox{ as } \overline\varepsilon\to +0.\) On the other hand we have \(\varphi_{\overline\varepsilon}(0)=0, \varphi_{\overline\varepsilon} (1)=1\) and hence the assertion is now clear. Further we note that \[\int_{\overline\varepsilon}^\eta |\varphi_{\overline\varepsilon}|^p \frac{W_p(t)}{F_\eta(t)^p}\,dt \ge \int_{\eta/2}^\eta \frac{W_p(t)}{F_\eta(t)^p}\,dt= \frac{f_\eta(\eta)^{1-p}-f_\eta(\eta/2)^{1-p}}{p-1} >0 \quad \mbox{ as } \overline\varepsilon\to +0.\] 0◻ If a positive number \(\eta_0\) is sufficiently small, then one can assume that \(\delta\in C^2(\Omega_{\eta_0})\), \(|\nabla \delta|=1\) in \(\Omega_{\eta_0}\) and a manifolds \(\{ x\in \Omega; \delta =\eta\}\) is of \(C^2\) class for \(\eta \in (0,\eta_0]\). Let \(\varphi_{\overline\varepsilon}\) be defined by ([\[7.1\]](#7.1){reference-type="ref" reference="7.1"}). By virtue of ([\[4.2\]](#4.2){reference-type="ref" reference="4.2"}) we have \[\int_{\Omega_\eta}|\nabla \varphi_{\overline\varepsilon}(\delta(x))|^p {W_p(\delta(x))}\,dx\le \int_{\Sigma} \,d\sigma \int_0^\eta \left | \varphi'_{\overline\varepsilon}(t) \right |^p {W_p(t)} (1+ct) \,dt,\] hence the assertion follows from Proposition [\[ct1\]](#ct1){reference-type="ref" reference="ct1"}.0◻ # Appendix ## Proof of Lemma [\[lemma4.4\]](#lemma4.4){reference-type="ref" reference="lemma4.4"} Let \(v\in G((0,\eta])\). We recall that \[g_\eta=( p' f_\eta)^{{1}/{p'}},\quad F_\eta= w f_\eta, \quad G_\eta= \mu+ \int_t^\eta\frac{ds}{F_\eta(s)}\quad\mbox{and}\quad u= g_\eta \nu.\] Let us prepare more notations. Let us set \[v^{{p}/{2}}=z,\quad z= a\varphi \quad\mbox{and}\quad a=(G_\eta)^{1/2},\] where \(\varphi\) is some function in \(C^1((0,\eta])\) with \(\varphi(0)=0\). Then we have \[\begin{aligned} z' &= \varphi' a + \varphi a'\quad\mbox{and}\quad |z'|^2 = (\varphi')^2 a^2 + \frac 12 (\varphi^2)' (a^2)' + \varphi^2 (a')^2. \end{aligned}\] Noting that \(a^2= G_\eta, \,(a^2)' =-{1}/{F_\eta}\,\)and \(\, a' =-{1}/({2 F_\eta a}),\) we have \[\begin{aligned} |z'|^2F_\eta= (\varphi')^2F_\eta G_\eta-\frac12 (\varphi^2)' + \frac{\varphi^2}{ 4F_\eta G_\eta} \ge-\frac12 (\varphi^2)' + \frac{\varphi^2}{ 4F_\eta G_\eta}, \end{aligned}\] and we also have \[\varphi^2=\frac{v^p}{a^2}= \frac{ u^p}{g_\eta^pG_\eta} = \textcolor{black}{ \frac{1}{(p')^{p-1}}}\frac{u^p W_p}{ F_\eta^{p-1} G_\eta}.\] As a result, we have the following that is valid for any measurable set \(S\subset[0,\eta]\). [ By using Lemma [\[lemma8.1\]](#lemma8.1){reference-type="ref" reference="lemma8.1"} with \(S= [0,\eta]\) we immediately have ([\[4.32\'\]](#4.32'){reference-type="ref" reference="4.32'"}).]{style="color: black"} Then we proceed to ([\[4.32\]](#4.32){reference-type="ref" reference="4.32"}). We assume that \(A=A(v,M)\) and \(B=B(v,M)\) are defined by Definition [\[df4.3\]](#df4.3){reference-type="ref" reference="df4.3"}. As for the first term of the right-hand side, we have \[\begin{aligned} -\frac12 \int_A(\varphi(t)^2)' \,dt &=-\frac12 \int_0^\eta(\varphi(t)^2)'\,dt +\frac12 \int_B(\varphi(t)^2)' \,dt\\& =-\frac12 \varphi(\eta)^2-\int_B\frac{z(t)^2 a'(t)}{a(t)^3} +\int_B\frac{z(t) z'(t)}{a(t)^2}. \end{aligned}\] Moreover we see that: 1. \[\varphi(\eta)^2=\frac{z(\eta)^2}{a(\eta)^2}=\frac{1}{\mu} \frac{|u(\eta)|^p}{g_\eta(\eta)^p} = \frac{|u(\eta)|^p}{\mu(p')^{p-1} f_\eta(\eta)^{p-1}}.\] 2. \[-\int_B\frac{z(t)^2 a(t)'}{a(t)^3}\,dt= \frac12 \int_B\frac{z(t)^2 }{a(t)^4 F_\eta(t)}\,dt=\frac{1}{2(p')^{p-1}}\int_B\frac{u(t)^p W_p(t)}{ F_\eta(t)^p G_\eta(t)^2}\,dt.\] 3. Noting that \(zz'= p v^{p-1}v'/2\), \(|v|\le {p'}|v'|F_\eta /{M}\) in \(B\) and \(G_\eta\ge \mu\), we have \[\begin{aligned} \left|\int_B\frac{z(t)z'(t) }{a(t)^2 }\,dt\right| &\le \frac{p}{2}\int_B \frac{\left(\frac{p'}{M} |v'(t)| F_\eta(t)\right)^{p-1}|v'| }{G_\eta(t)} \,dt\\ & \le \frac{p}{2\mu} \left(\frac{p'}{M} \right)^{p-1} \int_B |v'(t)| ^{p}F_\eta(t)^{p-1}\,dt. \end{aligned}\] Finally we get the desired inequality ([\[4.32\]](#4.32){reference-type="ref" reference="4.32"}) which proves Lemma [\[lemma4.4\]](#lemma4.4){reference-type="ref" reference="lemma4.4"}. \(\Box\) ## Auxiliary inequalities in the noncritical case If we restrict ourselves to the case that \(w\in Q(\mathbf R_+)\), then Hardy's inequality ([\[8.10\]](#8.10){reference-type="ref" reference="8.10"}) follows from the next simple lemma which is provided in for \(p=2\) and \(W_p=w=1\). Without loss of generality we assume that \(f\ge 0\), \(f(\eta)=1\), and \(u\ge0\). Define \(g= 1-f\). Then \(g\ge 0\) and \(g'\le 0\). Noting that \(u\in C^1_c((0,\eta])\) and \[\frac d{dt}\left(\int_0^t\frac 1{w(s)}\,ds \right)^{1-p}= (1-p)\frac{W_p(t)}{F_\eta(t)^p},\] by integration by parts we have \[\begin{aligned} & (p-1)\int_0^\eta \frac{u(t)^p W_p(t)}{F_\eta(t)^p} g\,dt \\ &= \int_0^\eta u(t)^p \left( \int_0^t \frac1{w(s)}\,ds\right)^{1-p} g'(t)\,dt + p \int_0^\eta u(t)^{p-1} u'(t) g(t)\left( \int_0^t \frac1{w(s)}\,ds\right)^{1-p}\,dt. \end{aligned}\] Since \(g'=-f'\le 0\) and \(g\ge 0\), \[\begin{aligned} \frac1{p'} \int_0^\eta \frac{u(t)^p W_p(t)}{F_\eta^p(t)} g(t)\,dt \le \int_0^\eta u(t)^{p-1} u' (t) g(t) \left( \int_0^t \frac1{w(s)}\,ds\right)^{1-p}\,dt. \end{aligned}\] By Hölder's inequality, we have \[\begin{split} \int_0^\eta u(t)^{p-1} u' (t) g(t) &\left( \int_0^t \frac1{w(s)}\,ds\right)^{1-p}\,dt\\ &\le \left( \int_0^\eta \frac{u(t)^p W_p(t)}{F_\eta(t)^p} g(t)\,dt \right)^{1/{p'}} \left( \int_0^\eta |u'(t) |^p W_p (t)g(t)\,dt\right)^{1/p}. \end{split}\] Hence we have \[\begin{aligned} \frac1{p'}\left( \int_0^\eta \frac{u(t)^p W_p(t)}{F_\eta(t)^p} g(t)\,dt \right)^{1/p} \le \left( \textcolor{black}{\int_0^\eta} |u'(t) |^p W_p (t)g(t)\,dt\right)^{1/p}. \end{aligned}\] Using \(g=1-f\) and the definition of \(\Lambda_{p}\), we have ([\[3.2\]](#3.2){reference-type="ref" reference="3.2"}). \(\Box\) The author would like to thank the referee for the precise advice in completing this paper.
{'timestamp': '2022-06-28T02:15:57', 'yymm': '2012', 'arxiv_id': '2012.08766', 'language': 'en', 'url': 'https://arxiv.org/abs/2012.08766'}
null
null
# Introduction Considerable efforts are being made to detect the Warm-Hot Intergalactic Medium (WHIM) in various bands of the electromagnetic spectrum. Detecting radio synchrotron emission from intercluster filaments or bridges could provide a new probe of the WHIM and could also shed light on mechanisms of particle acceleration and magnetic fields in a poorly studied environment. The magnetic field in the WHIM is less likely to be affected by a small-scale dynamo or by outflows from galaxies and active galactic nuclei (AGN). This field could therefore be a tracer of magnetic fields from an earlier epoch in the Universe that has subsequently been merely compressed by structure formation processes. Moreover, interacting galaxy clusters produce diffuse radio sources by accelerating electrons via shocks or turbulence. Giant radio halos are diffuse radio synchrotron sources found in galaxy clusters that have recently suffered a merger, as indicated by a disturbed intracluster medium (ICM) or other indicators of the cluster's dynamical state. Cluster radio shocks or radio relics are arc-shaped, diffuse sources that appear to be related to shock waves in the ICM. Moreover, there is a class of sources that trace old radio plasma from AGN that has been re-energised through processes in the ICM. Low-frequency radio observations are starting to show more of these types of sources. The common properties of these sources are the AGN origin of the plasma and their ultra-steep radio spectra. Radio phoenices and gently reenergised tails (GReETs) are examples of such sources (see e.g. for a recent review).\ The cluster Abell 3395 (hereafter A3395) is double-peaked, both in its galaxy distribution as well as in its X-ray emission, first observed with the Einstein satellite. It is accompanied to the north by A3391 at a separation of about 3 Mpc. The mean redshift of A3395 (\(z=0.0518\)) and A3391 (\(z=0.0555\)) is \(\langle z\rangle =0.053\). In between the clusters lies a galaxy group called ESO 161-IG 006 (\(z=0.0520\), Alvarez et al. 2018). Both clusters have masses of around \(M_{200}\sim 2\times 10^{14} M_\odot\), and X-ray temperatures of around \(kT\sim5\) keV. ASCA, ROSAT, Planck, and Suzaku observations have confirmed that A3395 and A3391 are connected by a gas bridge. Diffuse radio emission from pairs of galaxy clusters is rare. The first known bridge of low surface brightness connecting a radio halo and radio relic was found in the Coma cluster, first reported by and further studied afterwards (e.g. @1990AJ.....99.1381V, @2011MNRAS.412....2B). A moderate correlation between radio and X-ray brightness has also been found in the Coma bridge. This correlation suggests that the radio and X-ray emission originate from the same volume and that the correlation is not produced by projection effects. The bridges detected so far have different sizes and are observed in systems that are believed to be in a state preceding the merger. Currently, the best examples are the merging galaxy clusters Abell 399 and Abell 401, which are separated by about 5 Mpc. Diffuse synchrotron emission was detected in the region connecting the two clusters using the Low Frequency Array (LOFAR) at \(140\) MHz. X-ray observations of A399-A401 have revealed a hot (6-7 keV) filament of plasma in the region between the two clusters. Their masses are \(5.7\times 10^{14}M_\odot\) and \(9.3\times 10^{14}M_\odot\), respectively, and so the system is more than three times as massive as the A3391/5 system. The redshift of Abell 399 is 0.0718, while that of Abell 401 is 0.0736. Here, both clusters host a radio halo. The presence of a bridge was confirmed through the Sunyaev-Zeldovich effect but it is not seen in the GaLactic and Extragalactic All-Sky MWA (GLEAM) low-frequency radio survey. Integrating the average surface brightness over the Abell 399/401 bridge region, namely \(\langle I \rangle_{140\,{\rm MHz}} = 2.75 \pm 0.08\) mJy beam\(^{-1}\) (or 0.38 \(\upmu\)Jy arcsec\(^{-2}\)), over an area of \(3 \times 1.3\) Mpc\(^2\) and excluding the emission from the two halos, obtain a total flux density of \(S_{140\,{\rm MHz}} = 822 \pm 24\) mJy. This flux density corresponds to a radio power of \(L_{140\,{\rm MHz}} = 1.0 \times 10^{25}\) W Hz\(^{-1}\) and a mean radio emissivity of \(\langle J \rangle_{140\,{\rm MHz}} = 8.6 \times 10^{-44}\) W Hz\(^{-1}\) m\(^{-3}\). discovered a radio bridge in the pre-merging galaxy clusters A1758N and A1758S, which are 2 Mpc apart. The bridge is clearly detected in the LOFAR image at 144 MHz and tentatively detected at 53 MHz. The clusters A1758N and A1758S also host radio halos but the mean radio emissivity in the bridge is more than one order of magnitude lower than that of the halos. Interestingly, radio and X-ray surface brightness are found to be correlated in the bridge. The short lifetime for relativistic electrons emitting at 140 MHz limits the maximum distance that these relativistic electrons can travel in their lifetime to \(<\)`<!-- -->`{=html}0.1 Mpc. Hence, the sizes of radio bridges combined with the short cooling time of the synchrotron-emitting electrons suggest that relativistic particles are accelerated in situ. The large area filling factor, that is, a very smooth radio surface brightness, observed in the radio bridge of A399-A401 clearly disfavours shock acceleration as the main source of the observed radio emission. The origin of radio synchrotron emission in radio bridges is not understood. Using cosmological simulations, proposed that the synchrotron emission could come from electrons re-accelerated by weak shock waves provided there exists a volume-filling population of pre-accelerated electrons in the bridge. However, this would not produce a radio-X correlation because shocks cover at most 10 percent of the volume of the bridge. Also, concluded that the steep radio spectrum challenges this scenario for the origin of the radio synchrotron bridge. Recently, proposed that stochastic acceleration of relativistic electrons by turbulence could explain the radio emission observed in the system A399-A401. According to this model, the emission is expected to be volume-filling and with a steep spectrum[^1] (\(\alpha <\)-1.3). Their model also predicts a natural correlation between radio and X-ray surface brightness. Moreover, it is expected that the radio emission gets clumpier at higher frequencies. In this paper, we present the results of our search for diffuse radio synchrotron emission in the bridge of thermal gas between A3395 and A3391 that was recently observed with eROSITA. Moreover, we present an inventory of interesting radio sources in this field around this cluster merger. The outline of this paper is as follows: In Sect. [2](#sec:xray){reference-type="ref" reference="sec:xray"} we give a short overview of the eROSITA observations that are published in an accompanying paper (Reiprich et al. 2020). In Sect. [3](#sec:radio){reference-type="ref" reference="sec:radio"} we describe ASKAP and MWA observations. Results are presented in Sect. [4](#sec:results){reference-type="ref" reference="sec:results"} and we present our conclusions in Sect. [5](#sec:conclusions){reference-type="ref" reference="sec:conclusions"}. Throughout this paper, we use the fiducial cosmology \(H_0 = 70\) km s\(^{-1}\) Mpc\(^{-1}\), \(\Omega_M = 0.3\), and \(\Omega_\Lambda = 0.7\). At the mean redshift of A3395 and A3391, 1 arcsec on the sky corresponds to \(\sim 1.04\) kpc. # X-ray observations {#sec:xray} On July 13, 2019, eROSITA (extended ROentgen Survey with an Imaging Telescope Array) was successfully launched and made its way into an L2 halo orbit. During its Performance Verification (PV) phase, eROSITA surveyed the A3391-A3395 system as part of its first light observations. Reiprich et al. (2020) present the first results from four eROSITA PV phase observations of A3395-A3391. These cover a total area of about 15 deg\(^2\), or about half the size of the accompanying Australian Square Kilometre Array Pathfinder field, with at least 30 s exposure (\(\sim\)`<!-- -->`{=html}10 deg\(^2\) with at least 1000 s). The resulting X-ray image is shallower than the XMM-Newton observation of the A3395-A3391 system but covers a much wider area. Also, owing to its better response to soft X-rays, in between A3395 and A3391, Reiprich et al. (2020) observe warm gas in emission in the bridge, which may constitute a WHIM detection. Emission along this bridge includes the galaxy group ESO 161-IG006, which produces only a small fraction of the total emission. While most gas in the bridge appears hot, these latter authors discover hints for cool primordial gas between the clusters. Moreover, several clumps of matter around the merging system were discovered. This is enabled by the X-ray hot gas morphologies and radio jet and lobe structures of their central AGN. Finally, Reiprich et al. (2020) discover a filamentary emission region north of and well beyond the virial radius of A3391 connecting to an apparently infalling cluster and a connected emission filament towards the south of A3395, suggesting a total length of the filament of \(\sim\)`<!-- -->`{=html}15 Mpc (\(\sim\)`<!-- -->`{=html}4 degrees). The Planck SZ Y-maps, as well as galaxy density maps from DECam observations, appear to confirm this new filament. For more information we refer the reader to Reiprich et al. (2020). # Radio observations {#sec:radio} ## ASKAP observations The A3391-A3395 system was observed as part of the Evolutionary Map of the Universe survey Early Science observations which use the new ASKAP telescope in Australia to make a census of radio sources in the sky south of +30\(^\circ\) declination; see Fig. [\[fig:overlay\]](#fig:overlay){reference-type="ref" reference="fig:overlay"} for an X-ray radio overlay. Our ASKAP observations reach a depth of 25--35 \(\mu\)Jy/beam root mean square (rms) at a spatial resolution of \(\sim\)`<!-- -->`{=html}10 arcsec in the frequency range 846.5--1134.5 MHz. These latter are therefore 15 times deeper than the NRAO VLA Sky Survey, and have a five times better angular resolution (we note that the A3391-A3395 field is not covered by NVSS). The ASKAP early science data covering A3395-A3391 are from Scheduling Block (SB) 8275 observed on March 22, 2019, and are publicly available at the [CSIRO ASKAP Science Data Archive](https://data.csiro.au/collections/#domain/casdaObservation/search/) (CASDA; [@2017ASPC..512...73C]). SB8275 contains 36 separate measurement sets corresponding to 36 separate beams, each with a unique phase-tracking centre. Each beam covers \(\sim\)`<!-- -->`{=html}1 deg\(^{2}\) on the sky and all beams were observed simultaneously, giving an instantaneous field of view (FOV; after accounting for beam overlap) of \(\sim\)`<!-- -->`{=html}30 deg\(^{2}\). Of the 36 ASKAP antennas, 35 were used for the observations, with a minimum baseline of \(\sim\) 22 m and maximum baseline of \(\sim\) 6.4 km. Each measurement set covers a bandwidth of 288 MHz with a central frequency of 990.5 MHz. These data were processed through the official ASKAP processing pipeline (ASKAPsoft; [@2019ascl.soft12003G]). The steps implemented in the ASKAPsoft pipeline will be described in an upcoming system description paper, but we refer the reader to the [CSIRO ASKAPsoft documentation](https://www.atnf.csiro.au/computing/software/askapsoft/sdp/docs/current/pipelines/introduction.html) for further details. ASKAP forms beams electronically through a chequerboard Phased Array Feed at the prime focus of each antenna. Individual beams are then correlated between antennas. The ASKAP correlator generates 15552 spectral-line channels, which are then averaged to 288 1-MHz channels. Beam measurement sets are bandpass calibrated using a standard calibrator (PKS B1934--638)[^2]. The calibration observations occurred in a preceding scheduling block wherein PKS B1934--638 was placed at the centre of each beam for 200 seconds. The derived bandpass solutions also account for the other fundamental interferometric calibration terms, such as the flux-density, delay, and phase-referencing solutions. One cycle of frequency-independent, direction-independent, phase-only self-calibration is also applied for each beam as part of the imaging pipeline. Individual calibrated measurement sets are imaged and deconvolved separately with imaging weights determined by Wiener pre-conditioning. These weights have a setting equivalent to a Brigg's robustness value of 0.0, which was determined to provide an optimal combination of resolution, sensitivity, and point spread function (PSF) quality. The \(w\)-projection technique is used to account for the non-coplanarity of the sky, using a total of 557 w-planes. Multi-term deconvolution (with two terms) is used to model variation in source flux over the synthesised bandwidth and multi-scale deconvolution (with six scales) is used to improve the modelling of extended sources. Beam images are then averaged with the same weight to form a mosaic in the image plane. Primary beam correction is applied during the linear mosaic process using circular Gaussian models whose size is determined by holography observations. Although the beams differ in shape and are coma-distorted at the edge of the FOV, an average value is used for all 36 beams with an estimated error of 10%. As part of the routine ASKAP/EMU validation procedures, a preliminary source catalogue was created from the mosaic image and compared with other large-area radio survey catalogues. For these data, compact radio sources were crossmatched with the Sydney University Molonglo Sky Survey catalogue, resulting in 111 matches. The median astrometric offset of \(\sim 1.3\) arcsec between these matches is consistent with zero offset given the dispersion in this measurement. The median flux ratio of the ASKAP sources versus their SUMSS counterparts is 0.81 overall but is approximately 1.0 for the brightest matches. Given that this flux comparison is complicated by the large difference in spatial resolution and a modest difference in frequency (for which we assume a spectral index of-0.8) we do not interpret this result as evidence for a systematic flux error. However, there is one additional concern that contributes to the flux uncertainty in these data and that is the lack of a common restoring beam among the images. Because the individual beam images are processed independently, the beams can have different UV coverage (e.g. because of flagging or declination) and therefore different PSFs. Gaussian fits to each of the individual 36 PSFs yielded beam sizes with geometric means (i.e. \(\sqrt{b_{\rm maj}\,b_{\rm min}}\)) ranging from 9.8 to 11.1 arcsec. As we were unable to propagate these individual beam sizes to the final linear mosaic image, we assumed a constant beam size of 11.2 \(\times\) 9.5 arcsec at a position angle of 87 degrees (a geometric mean of 10.3 arcsec). The difference between the true and assumed PSF size will lead to a systematic error in integrated flux measurements, which is typically only \(\sim\)`<!-- -->`{=html}3% but could be as large as 10% in some places in the mosaic. The resulting images of the beams covering A3395-A3391, as well as the full ASKAPsoft mosaic image of SB8275, show artefacts that mainly emanate from two bright and extended radio galaxies at the centres of the clusters: sources N1 and S1 (see Fig. [\[fig:overlay\]](#fig:overlay){reference-type="ref" reference="fig:overlay"} and [\[fig:ASKAPradiomap\]](#fig:ASKAPradiomap){reference-type="ref" reference="fig:ASKAPradiomap"}). Negative bowl-like artefacts are present around the radio galaxies, with larger-scale positive and negative rings extending up to \(\sim 1\) deg from their centres. The cause of these artefacts is currently being investigated and will be addressed in an upcoming technical paper (Wilber et al. in prep). In an attempt to improve the image quality, recently tested direction-dependent calibration and imaging on ASKAP early science and pilot survey observations. These latter authors report a significant reduction in artefacts around bright, compact sources after implementing further data processing via the third-generation software packages KillMS (kMS) and DDFacet (DDF), which are officially being used for data products of the LOFAR Two-Metre Sky Survey (LoTSS; [@2017A&A...598A.104S]). As part of their testing, developed a direction-dependent ASKAP pipeline, which was used to create a mosaic image of SB8275. This direction-dependent mosaic image is referred to as the ASKAP-DD image hereafter and is used to measure flux densities of radio sources. We refer the reader to and an upcoming paper, Wilber et al. in prep, for details of the ASKAP direction-dependent pipeline and specific processing steps. Finally, the convention for naming sources discovered with EMU is EMU NA JHHMMSS.s+DDMMSS where 'N' will be replaced with 'E' for 'early science' or 'P' for 'pilot survey', and 'A' is 'S' for 'source', 'C' for component, or 'D' for 'diffuse emission'. ## Murchison Widefield Array observations \ *Notes.* \(^\text{a}\) Only used to create lower right panel in Fig. [\[fig:mwa2\]](#fig:mwa2){reference-type="ref" reference="fig:mwa2"}. The A3391-95 system has been observed with the Murchison Widefield Array Phase 2 in its 'extended' configuration. The observations cover five frequencies: 88, 118, 154, 185, and 216 MHz, each with 30 MHz bandwidth. Full processing details for this form of MWA-2 data are described by, but we briefly describe this process here. Observations for the MWA-2 are taken in two-minute snapshot observing mode, with each snapshot calibrated and imaged independently; imaged snapshots are linearly stacked to create deep mosaic images. Calibration is performed using a sky model generated from the GLEAM extra-galactic catalogue using the full-Jones `Mitchcal` algorithm as described by and full-embedded element primary beam model. For this work, imaging is performed with 'Briggs' weighting with robust parameters between \(+0.5\) and \(+1.0\) with additional Gaussian tapering applied to the 154-, 185-, and 216-MHz datasets to ensure a consistent PSF and \(u\)--\(v\) sampling across the full MWA band. We use the multi-scale CLEAN algorithm within the widefield imager `WSClean` for deconvolution. We make a wideband (\(\Delta\nu = 60\) MHz) image centred on 200 MHz by stacking the 185-and 216-MHz mosaics made with robust \(0.0\) weighting with no tapering as a higher-resolution reference image but note that at this weighting a significant fraction of flux is lost for extended sources. A separate CLEAN component model and residual mosaics are also created and are used for flux-density measurements, with a factor of \(\sim0.6\) (dependent on the source size) applied to integrated residual flux density to account for a difference in CLEAN and dirty flux. Image details are presented in Table [1](#tab:obs:mwa){reference-type="ref" reference="tab:obs:mwa"}. GLEAM and MWA-2 images are shown in Fig. [\[fig:mwa2\]](#fig:mwa2){reference-type="ref" reference="fig:mwa2"}. # Results {#sec:results} In the ASKAP image (Fig. [\[fig:ASKAPradiomap\]](#fig:ASKAPradiomap){reference-type="ref" reference="fig:ASKAPradiomap"}), a radio bridge is not detected, although the short spacings allow us to retain sensitivity up to scales of \(\sim\)`<!-- -->`{=html}1 degree, significantly larger than the X-ray bridge. In our image after direction-dependent calibration, artefacts on the largest scales as well as negative bowl artefacts are reduced. The noise in the image ranges from \(\sim20~\mu\)Jy to \(\sim50~\mu\)Jy per beam where the strongest artifacts emanate from the brightest cluster galaxies at the centre of Abell 3391 and Abell 3395. There does not appear to be any radio emission coincident with the bridge detected by eROSITA. No radio bridge is seen in the MWA-2 or GLEAM data (Fig. [\[fig:mwa2\]](#fig:mwa2){reference-type="ref" reference="fig:mwa2"}). We note that the GLEAM data may show faint large-scale emission around bright, complex sources, but this is due to residual un-deconvolved sidelobes of the PSF characteristic of MWA data. As with the ASKAP data, the bright, complex radio galaxies in each cluster limit the sensitivity that can be achieved in this region. We note that MWA-2 and GLEAM data, despite the expected steep spectra of the bridge synchrotron emission, may not achieve better surface brightness sensitivity than ASKAP. At the same time, the merging cluster system contains several nearby radio galaxies with extended features that may be interacting with the intracluster environments. In the following sections we report on the upper limit of the non-detection of the radio bridge and report flux densities for radio galaxies within the cluster field. ## Upper limit on the radio bridge There seems to be a consensus that the following physical conditions need to be met in order for a radio-synchrotron emission bridge to exist: (1) seed electrons (either from earlier structure formation shocks or from AGN), (2) a magnetic field, (3) an ongoing acceleration mechanism as described in Sect. 1, and finally (4) sufficient time for the acceleration to have produced a sufficient number of electrons of the required Lorentz factors. In order to compute the flux values in the intercluster region, we placed a square box of 1120 arcsec per side on the bridge region and then compared it to 36 other such boxes outside of the bridge region. We then blanked areas with flux densities above 0.4 mJy and calculated the mean and rms in the boxes. Subsequently, we subtracted the mean of the 36 boxes outside of the bridge from the mean of the box on the bridge, and calculated the scatter in the means between the boxes (an appropriate measure of the uncertainty of the flux in each box). The mean (residual) flux in the bridge box is then 39 mJy, and the scatter between boxes is 25 mJy, meaning a non-detection. The 25 mJy scatter between boxes is approximately 7.5 times larger than the fluctuations on a smaller scale caused by large-scale ripples in the image. The resulting upper limit on the emissivity is given by \(\langle J \rangle_{1\,{\rm GHz}} =4\pi d_L^2 S/V\), where \(V\) is the volume of the emitting region and \(d_L\) the luminosity distance, which is \(d_L\sim 237\) Mpc. For \(S\) we take the \(3\sigma\), that is, 75 mJy. The boundary of the bridge is difficult to define. If we assume that the bridge roughly follows the emission detected by eROSITA, the radius of the bridge is about 600 kpc or \(10'\), and its length is about 1.3 Mpc or \(21'\) (see Fig. [\[fig:region\]](#fig:region){reference-type="ref" reference="fig:region"}). If we assume a cylindrical volume of dimensions 1.3 Mpc \(\times \pi\, (0.6\) Mpc)\(^2\), we obtain \[\begin{aligned} \langle J \rangle_{1\,{\rm GHz}} &<& \frac{ 7.5\times 10^{-28} {\rm W}\,{\rm Hz}^{-1}{\rm m}^{-2}\times 4\pi\times 5.4\times 10^{49}{\rm m}^{2}}{4.3\times 10^{67} {\rm m}^{-3}} \nonumber \\ &<& 1.2 \times 10^{-44} {\rm W}\, {\rm Hz}^{-1} {\rm m}^{-3}. \end{aligned}\] If we take \(\alpha\sim-1.3\) as in, one would expect an emissivity at 140 MHz of \(\langle J \rangle_{140\,\text{MHz}}=1.5\times10^{-43}\) W Hz\(^{-1}\)m\(^{-3}\), which is a factor 1.7 higher than the emissivity derived for the A399-A401 system. The reasons for a non-detection of synchrotron emission from the bridge region at the level of A399-401, for example, may lie in the absence of any one of the four points mentioned at the beginning of this section. If we assume that the relation between thermal gas density and magnetic field strength found in galaxy clusters is also valid in the intercluster region, we can estimate the magnetic field strength using the observed scaling \(B\propto n_e ^{0.5}\). In cluster centres with electron number densities of \(n_e\sim 0.1\) cm\(^{-3}\), typical field values of 1-10 \(\mu\)G are observed. Consequently, the thermal gas density in the bridge region of A3395-A3391 is \(n_e\sim 1.5 \times 10^{-4}\) cm\(^{-3}\) as inferred from SZ-observations, which would correspond to a magnetic field strength of \(B\sim 0.03-0.3\,\mu\)G. We note that a similar value for the electron density, \(n_e= 1.08 \times 10^{-4}\) cm\(^{-3}\), was inferred from X-ray observations with Chandra and XMM-Newton by. In comparison, the electron density inferred for the intercluster filament in the A399-A401 system is \(n_e\sim 2.5-3.3 \times 10^{-4}\) cm\(^{-3}\), which is very close to the estimate for A3395-A3391. Also, \(B=0.1-0.2\, \mu\)G was found by in their simulations of A399-401 and \(B=0.5\, \mu\)G was found by including dynamo amplification. From the limit on the surface brightness of \(I_0\sim 0.3\,\mu\)Jy arcsec\(^{-2}\), one can derive an upper limit on the equipartition magnetic field \(B_{\rm eq}=(24\pi u_{\rm min}/7)^{1/2}\), where \[\begin{aligned} u_{\rm min} & \sim & 2.7\times10^{-11}(1+k)^{4/7}(\nu/\mathrm{GHz})^{-4\alpha/7} \nonumber\\ & &(I_0/\mathrm{(mJy/arcsec}^2))^{4/7} (d/\mathrm{kpc})^{-4/7}\mathrm{erg\, cm}^{-3}. \end{aligned}\] For \(\alpha=-1.3\), a proton-to-electron energy ratio of \(k=1\), and a source depth of \(d_s=800\) kpc, we get \(u_{\rm min}\sim 8.1\times 10^{-14} \mathrm{erg\, cm}^{-3}\), and consequently \(B_{\rm eq} = 0.9\, \mu\)G. If we were to detect the bridge at the level of our upper limit then the equivalent equipartition field would be 0.9 \(\mu\)G. This is higher than derived from our density-scaling argument, and so it is possible that the magnetic fields are simply too low to be detected. However, we note that the electron density for A399-401 is only slightly higher, \(n_e=2.5-3 \times 10^{-4}\) cm\(^{-3}\), but the observed surface brightness of its bridge requires much higher fields than the scaled values. suggest that radio bridges originate from second-order Fermi acceleration of electrons interacting with turbulence. The complex dynamics of substructures associated with massive filaments connecting cluster pairs can generate turbulence even before the two clusters undergo their central merger. Specifically, they explored the role of solenoidal turbulence using a mechanism proposed by where particles interact with magnetic field lines diffusing into super-Alfvenic incompressible turbulent flows. Provided that the acceleration mechanism in A3391-A3395 is Fermi-II acceleration, the non-detection would imply that the average acceleration time for electrons is longer than the average cooling time; as shown by, this is independent of the magnetic field in the bridge region. The implication would be that either the turbulent injection scale is larger in A3391-A3395 than in A399-A401 or the turbulent velocity is smaller. We consider the latter to be the most likely because the turbulent injection length should be similar for systems of similar sizes while the turbulent velocity can vary significantly. A smaller turbulent velocity in A3391-A3395 could be motivated by the smaller mass of the system and by the fact that these two systems are separated by a greater distance (in terms of virial radius of the clusters) than that separating A399-A401, possibly meaning that the merger is in a less advanced stage. Also, the A3391-A3395 clusters are less massive than either A1758 or A399-A401. Furthermore, as also briefly mentioned in paper 1, we cannot know the true three-dimensional distance between the systems. It is possible that A3391 and 3395 are much further apart than what is implied by their projection, as is indeed suggested by the X-ray analysis in Reiprich et al. (2020). This would likely result in lower estimates of electron densities, and might also explain the absence of giant radio halos in the constituent clusters, as the occurrence of giant radio halos depends strongly on mass. Given their similarity to A399-A401 in other aspects (both premerging, similar gas densities in the bridge region), the A3391-A3395 system is a promising target for deeper radio observations. For a more detailed study of the implications of the non-detection, dedicated MHD simulations are needed, such as those recently presented in Locatelli et al. (2020). These latter infer upper limits in LOFAR observations of two cluster pairs, RXCJ1659.7+3236-RXCJ1702.7+3403 and RXCJ1155.3+2324-RXCJ1156.9+2415, yielding upper limits on the magnetic field in the intercluster region of \(B<0.2\, \mu\)G. Using cosmological simulations, these latter authors infer primordial magnetic fields of less than 10 nG. ## Other notable radio features In addition to the absence of diffuse emission in the intercluster bridges, the environment of this unusual cluster-pair field shows a number of very interesting sources that are worth cataloguing given the potential impact of the cluster system. By no means is this a complete sample, as it was compiled by identifying extended objects by eye. The field contains a number of candidates for diffuse radio emission that will need to be followed up with deeper X-ray and radio observations. In addition, the field contains a number of Giant Radio Galaxies (GRGs) of which all but one lie in the background of this cluster pair. The exception is the FR I radio galaxy J0621--5647 in the far south, at the same \(z\) as the cluster pair. Polarisation measurements of these GRGs could be interesting for rotation-measure studies of the magnetic fields in the double cluster region. Finally, there are some other notable radio galaxies that show signs of interaction with the ICM of A3391-A3395, such as the wide-angle tail source F2 as well as the radio galaxy F1. The latter shows lobes that are transversally advected, which may be caused by the galaxy falling into the cluster (see Fig. [\[fig:overlay\]](#fig:overlay){reference-type="ref" reference="fig:overlay"}).\ Table [\[tab:flux\]](#tab:flux){reference-type="ref" reference="tab:flux"} lists the measurements of flux density, \(S\), and spectral index, \(\alpha\), for radio sources in the A3391-A3395 cluster field. Flux density was measured within a region marking the 3\(\sigma\) contour line using a local rms value for \(\sigma\). To measure the spectral index of specific sources or source regions (except for S3), we convolved the ASKAP-DD image to the same resolution as our tapered MWA-2 observations. For S3, to ensure S2 and S3 were resolved enough for flux-density measurements, we use the native resolution ASKAP-DD image and the robust 0.0 MWA-2 images. We do not measure S2 directly with the MWA-2 data as the diffuse emission becomes resolved out in the robust 0.0 MWA-2 images. We used [fluxtools.py](https://gist.github.com/Sunmish/198ef88e1815d9ba66c0f3ef3b18f74c) to measure the flux density and error on the flux density when considering the rms. The uncertainties are calculated taking into account the image noise and flux-scale errors as follows, \[\Delta S = \sqrt{\Delta S^2_\text{image} + \Delta S^2_\text{fluxscale} }= \sqrt{N\times \sigma^2 + (f \times S)^2},\] where \(N\) is the number of independent beams covering the source, \(f=10\%\) is the flux-scale error for the EMU observation, and \(f=9\%\) for the MWA-2 observations. The spectral index is estimated by fitting the flux densities of the sources to a power law as a function of the observed frequency.\ ### Source N1 (EMU ES J0626--5341) The bright radio galaxy EMU ES J0626--5341 (EMU ES: Evolutionary Map of the Universe Early Science Source) is located in the centre of the Abell 3391 cluster and extends over 4.5 arcmin (see Fig. [\[fig:mainsource\]](#fig:mainsource){reference-type="ref" reference="fig:mainsource"}). It is also located at the centre of the X-ray emission (see Fig. [\[fig:xrayover\]](#fig:xrayover){reference-type="ref" reference="fig:xrayover"}). Its host is the elliptical galaxy 2MASX J06262045--5341358 (\(PA\) = 54), which is the eastern component of ESO 161-G008, with a redshift of \(z\) = 0.055. We estimate a linear projected radio size of 290 kpc. The radio lobes show numerous twists possibly due to density variations in the ICM. ### Source S1 (EMU ES J0626--5432) The bright radio galaxy EMU ES J0626--5432 (PKS 0625--545) is a Fanaroff-Riley class I (FR I) source located in the centre of the A3395 cluster and extends over 5.5 arcmin (see Fig. [\[fig:mainsource\]](#fig:mainsource){reference-type="ref" reference="fig:mainsource"}). Its host galaxy is WISEA J062649.57--543234.4 (\(z\) = 0.052). Radio fluxes from 145 MHz to 8.5 GHz as well as 148 GHz are listed in NED. The SUMSS 843 MHz flux is catalogued as \(\sim\)`<!-- -->`{=html}5 Jy and the Australia Telescope Compact Array (ATCA) 1.4 GHz flux as \(\sim\)`<!-- -->`{=html}3.1 Jy. To the south, just as it starts to exit the denser X-ray gas (see Fig. [\[fig:chandra_s1\]](#fig:chandra_s1){reference-type="ref" reference="fig:chandra_s1"}), the tip of the radio jet starts to expand spherically and the brightness of the emission drops. This could be the onset of the formation of an X-ray cavity. Comparison with the eROSITA data also shows that the BCG is offset from the centroid of the X-ray emission (see Fig. [\[fig:xrayover\]](#fig:xrayover){reference-type="ref" reference="fig:xrayover"}). This was studied by for example. In X-ray groups in COSMOS, we showed that BCGs can be offset from the group centre. This has also been studied in HIFLUGCS clusters. The interaction of the radio source with the surrounding ICM can be seen in more detail in a Chandra X-ray image of the region. After reprocessing the Chandra observation (OBSID 4944), images and exposure maps were created, and point sources were masked. Figure [\[fig:chandra_s1\]](#fig:chandra_s1){reference-type="ref" reference="fig:chandra_s1"} shows the smoothed exposure-corrected image, the fractional difference from a model created from the radial average, and an edge-filtered X-ray image made using using the GGM algorithm. There is some indication of a depression in the X-ray surface brightness in the region of the round, southern tip, but it is of low significance. The northern tip appears to end where there is an excess of emission in the smooth model residual map. The edge-filtered map confirms that the two ends of the radio source are located where there are steep gradients in the X-ray surface brightness. There is also a clear connection between the structure within the radio source and the X-ray gradient filtered image. ## Source S2+S3 The sources S2 and S3 form a complex conglomerate of radio galaxies and interconnected diffuse emission (see Fig. [\[fig:mainsource\]](#fig:mainsource){reference-type="ref" reference="fig:mainsource"}). The integrated spectral index between 88 MHz and 1013 MHz is \(\sim-1\). Figure [\[fig:mainsource\]](#fig:mainsource){reference-type="ref" reference="fig:mainsource"} shows an overlay of the S2-S3 complex over the optical DSS2 R-band image. The L-shaped source S2 is fed by the radio galaxy 2MASX J06261051-5432261 that fans out into two arms towards the north and the west that are roughly perpendicular to one another. The arms extend for about 4 arcmin. There are further faint filaments of emission that stretch out to the source S3. From the brightest spot close to the galaxy 2MASX J06255706-5427502, the source S3 extends to the northwest before it turns to form a faint, linear source that extends for about 6 arcmin towards the southwest. This could be a radio relic or phoenix that shows re-acceleration of plasma that may originate from an AGN. Interestingly, the southern part of this linear feature lies in a high-temperature region as indicated by the oxygen-to-softband ratio in the eROSITA data (see Fig. 18 in Reiprich et al. 2020). It is not clear whether this region corresponds to a shock or is merely a region of higher pressure that could boost the synchrotron emission from old radio plasma that may have come from a radio galaxy. ## Source F1 (EMU ES J0622--5334) EMU ES J0622--5334 (PMN 0622--5334) is a large, rather asymmetric radio galaxy with Fanaroff-Riley class I morphology in Abell S0584 (see Fig. [\[fig:mainsource\]](#fig:mainsource){reference-type="ref" reference="fig:mainsource"}). Its host galaxy is WISEA J062255.56--533434.5 at \(z\) = 0.0567. The radio lobes extend over \(\sim\)`<!-- -->`{=html}6 arcmin, corresponding to \(\sim\)`<!-- -->`{=html}400 kpc. The SUMSS 843 MHz flux of PMN 0622--5334 is catalogued as \(75 \pm 6\) mJy, likely not including the low-surface brightness emission. The 4.85 GHz flux is catalogued as \(47 \pm 8\) mJy. ## Source F2 (EMU ES J0621--5241) EMU ES J0621--5241 (PKS 0620--52) is a large wide-angle tail (WAT) radio galaxy (see Fig. [\[fig:mainsource\]](#fig:mainsource){reference-type="ref" reference="fig:mainsource"}) which is located far beyond the virial radius of A3391 and could be infalling into the system. Its host galaxy is 2MASX J06214330--5241333 at \(z\) = 0.0511. It is associated with RX J0621.6--5241. The two radio lobes have extents of 4 arcmin (NE; 240 kpc) and 2.5 arcmin (NW; 150 kpc). ## Source F3 (EMU ES J0632--5404) EMU ES J0632--5404 is a GRG with an FR II morphology extending 5.8 arcmin (see Fig. [\[fig:mainsource\]](#fig:mainsource){reference-type="ref" reference="fig:mainsource"}) along a position angle of \(PA \sim 60\). Its host galaxy is the quasi-stellar object (QSO) WISEA J063201.16--540457.4, 6dFGS gJ063201.2--540458, SWIFT J0632.1--5404 for which measured a redshift of \(z=0.193\), while measured \(z=0.2036\). Comparing both spectra we believe the former redshift (0.193) to me more reliable, and therefore find an LLS of 1.12 Mpc. measure a 843 MHz flux of 694 mJy. This source is also GLEAM J063153-540527 with a low-frequency spectral index of-0.88, and so ASKAP may show more of the extended emission as the spectrum seems to flatten above 800 MHz. The 4.85 GHz flux from PMN (source J0631-5405) is \(0.155 \pm 0.011\) Jy, resulting in a spectral index of \(\alpha^{1013}_{4850}=-0.85\), in agreement with low frequencies. The host is also listed as blazar BZQ J0632-5404 by. ## Large and Giant Radio Galaxies Based on visual inspection of the whole 30 deg\(^2\) field for radio galaxies, we identified close to 200 objects larger than \(\sim\)`<!-- -->`{=html}1 arcmin. Of these, 27 are GRGs with linear projected sizes greater than 1 Mpc (7 of these are presently still candidate GRGs). Only a single one was already known, namely J0632-5404, published as SGRS J0631--5405 by. A further 30 radio galaxies not listed in the present paper are larger than 700 kpc (of which 7 are candidate GRGs). Giant Radio Galaxies are thought to reside in low-density environments where the jets face little resistance. However, about 10 percent of GRGs have now been found to reside in cluster environments. According to, about 820 GRGs larger than 0.7 Mpc are known to date. However, owing to their large extent and low surface brightness, they are notoriously difficult to detect. Using Data Release 1 of LoTSS, found 239 GRGs (there, defined as galaxies with LLS \(>0.7\) Mpc) in 424 deg\(^2\) of sky, albeit in a frequency range of 120--168 MHz. For galaxies with LLS \(>0.7\) Mpc, we obtain a sky density of \(\approx 1.7\) deg\(^{-2}\), while found 239/424 = 0.55 deg\(^{-2}\), three times less than our value. Those GRGs larger than 1 Mpc that we identify in this field are listed in Table [\[tab:RGs\]](#tab:RGs){reference-type="ref" reference="tab:RGs"}. The GRGs in the area of the ASKAP field covered also by eROSITA are marked in Fig. [\[fig:large_overlay2\]](#fig:large_overlay2){reference-type="ref" reference="fig:large_overlay2"}, and radio-optical overlays for a subset of GRGs are shown in Fig. [\[fig:radiogal\]](#fig:radiogal){reference-type="ref" reference="fig:radiogal"}. Photometric redshifts were taken from and from. We measured the flux densities, \(S\), of the GRGs listed in Table [\[tab:RGs\]](#tab:RGs){reference-type="ref" reference="tab:RGs"} within a region marking the 2\(\sigma\) contour line using the local rms for \(\sigma\). We used [fluxtools.py](https://gist.github.com/Sunmish/198ef88e1815d9ba66c0f3ef3b18f74c) to measure the flux density and error on the flux density when considering the rms. During our search we also identified a number of relics and cluster halos (see Table [\[tab:relics\]](#tab:relics){reference-type="ref" reference="tab:relics"}). In order to identify the respective host galaxies we used optical and infrared surveys, in particular the Dark Energy Survey (DES; ), 2MASS (), and WISE (). In the following we briefly describe some of the most remarkable objects. ### EMU ES J0621--5217 EMU ES J0621--5217 is an FR I-type radio galaxy with LAS\(\sim15\) arcmin with a radio core of 18.2 mJy/beam peak brightness, inner twin jets, and evidence for precession given the shape of its outermost lobes (see Fig. [\[fig:radiogal\]](#fig:radiogal){reference-type="ref" reference="fig:radiogal"}, left panel). It is highly asymmetric, likely due to projection effects, with the western lobe much brighter and closer to the core than the eastern lobe. We identify the host galaxy as WISEA J062112.81--521700.6 (\(z\) = 0.042816; 6dF ). The projected linear extent of J0621--5217 is \(\sim\)`<!-- -->`{=html}760 kpc. This galaxy is located in the foreground of A3395-A3391. ### EMU ES J0644--5152 EMU ES J0644--5152 has the largest LLS of all GRGs catalogued in this field with radio lobes extending nearly 5 arcmin and FR II morphology. Its host galaxy is SMSS J064437.48--515205.5, possibly a QSO, with a photometric redshift of \(z \sim 0.75\) as estimated from the WISE colours (see Fig. 2 in @2018ApJS..235...10K). We estimate its largest linear size (LLS) as 2.15 Mpc. ### EMU ES J0639--5455 EMU ES J0639--5455 is a GRG with a rather unusual, WAT-like morphology (see Fig. [\[fig:radiogal\]](#fig:radiogal){reference-type="ref" reference="fig:radiogal"}, right panel). Its host galaxy (2MASX J06391009--5455156, WISEA J063910.02--545515.2) is located at the radio-brightest spot in the far WSW and has a photometric redshift of \(\sim\)`<!-- -->`{=html}0.142, thus well behind A3391-A3395. We measure an angular extent of 7.15 arcmin, corresponding to a projected linear extent of 1.07 Mpc, a size very rarely seen for sources of this radio morphology. ### EMU ES J0621--5647 EMU ES J0621--5647 is a FR I-type GRG, possibly extending at least \(\sim\)`<!-- -->`{=html}15 arcmin and possibly \(\sim\)`<!-- -->`{=html}32 arcmin (see Fig. [\[fig:radiogal\]](#fig:radiogal){reference-type="ref" reference="fig:radiogal"}). Higher radio sensitivity is required to confirm the presence and extent of its faint radio lobes due ESE and WNW. We identify 2MASX J06215057--5647566 as the host galaxy at a redshift of \(z=0.05391\) (6dF). EMU ES J0621--5647 lies at the southern edge of the ASKAP field, but at the same redshift as A3391/3395. If the outer lobes are confirmed, the LLS of J0621--5647 is \(\sim\)`<!-- -->`{=html}2 Mpc. ### Summary of Giant Radio Galaxy properties In Table [\[tab:RGs\]](#tab:RGs){reference-type="ref" reference="tab:RGs"} we list the basic properties of the 20 GRGs (LLS\(>\) 1 Mpc) and 7 candidate GRGs found in the ASKAP field. Here we compare some of these properties with 213 GRGs larger than 1 Mpc as compiled from the literature by. While the median redshift of the latter GRGs is 0.248, our 27 GRGs have a median of 0.6, albeit with the caveat that only two of them have spectroscopic redshifts. We adjust the 1.4-GHz radio luminosities listed in to the ASKAP observing frequency of 1.0 GHz by assuming an average radio spectral index of \(\alpha=-0.8\), which implies a 1-GHz flux 1.3 times larger than the 1.4-GHz flux, or \(\log P_{\rm 1GHz} = \log P_{\rm 1.4GHz}+0.12\). While the 213 GRGs from the literature have a median \(\log P_{\rm 1GHz}\)\[W/Hz\]=25.6, our 27 GRGs have a median \(\log P_{\rm 1GHz}\)\[W/Hz\]=25.5, and the two distributions are statistically indistinguishable, ranging from \(\sim\)`<!-- -->`{=html}23.3 to \(\sim\)`<!-- -->`{=html}27.4. Consistent with the literature sample we find no trend for the median linear size or the median radio luminosity to change with redshift. Together with the fact that our much smaller sample has a much larger median redshift, we conclude that there is no evidence for cosmological evolution of the population of GRGs. If we exclude four GRGs with complex or hybrid radio morphologies from our sample of 27 and divide the rest into three classes of radio morphology, we find median values of \(\log P_{\rm 1GHz}\)\[W/Hz\]=24.0 for the 3 FR Is, 24.5 for 7 FR IIs with remnant-type lobes, and 26.1 for the 15 clear-cut FR IIs. ## Diffuse radio sources We discovered a number of candidate diffuse radio sources in the ASKAP field which are listed in Table [\[tab:relics\]](#tab:relics){reference-type="ref" reference="tab:relics"}. The data are not sufficient for a reliable classification but we discuss the most interesting sources below. The diffuse sources in the cluster A3404 are the subject of a forthcoming paper and are not discussed here. ### Abell S0592 detected a giant radio halo in the nearby cluster Abell S0592 (\(z\) = 0.2216), also known as SPT CL J0553--3342 and MACS J0553.4--3342, using the same Early Science data used here. The radio halo has a diameter of about 1 Mpc and an integrated flux density of \(S_{\rm 1013 MHz} = 9.95 \pm 2.16\) mJy. The diffuse emission is also seen in ATCA data at 2.215 GHz. ### Abell 3395E We find extended radio emission associated with the bright elliptical galaxy ESO 161-G008 (\(z\) = 0.0486), the central galaxy of A3395E. This could be diffuse emission from a radio halo, although image artefacts in that area make the full size of the structure difficult to assess. Three other cluster ellipticals in the area also have radio emission with significant tails: WISEA J062744.63--542644.4 (PGC 019090; \(z\) = 0.044281) has a tail of 2 arcmin in length towards the east, while DES J062719.2--542515.24 (\(z\) = 0.0456) has a tail of 1 arcmin pointing north and 2MASS J06274388--5424266 (\(z\) = 0.044971) has a short tail in the NW direction. The aforementioned galaxies lie within the X-ray cocoon of the cluster, which is aligned with and centred on ESO 161-G008. There are at least 40 known cluster members within 5 arcmin of ESO 161-G008. ### Abell 3385 We find diffuse emission in Abell 3385 (\(z\) = 0.1245; 6df) also known as 1RXS J061747.8--520132. This emission lies right at the NW edge of the eROSITA FOV. North of the 1RXS position is a bright radio source that appears to connect to two faint strands of radio emission that run from the NW to the SE. The angular length of the filaments is 2 arcmin which corresponds to 270 kpc. The flux density of this diffuse source is \(S_{\rm 1013 MHz} = 13.7 \pm 2.3\) mJy. This source is likely to be a radio relic. Finally, on the right (W) half of the bottom-right panel in Fig. [\[fig:halos\]](#fig:halos){reference-type="ref" reference="fig:halos"} we see the regular and straight FR II source hosted by DES J061722.22-515919.1, a likely member of A3385, with \(z_{\rm ph}\sim 0.128\), LAS\(\sim 4.0'\), and LLS\(\sim 550\) kpc. ### Abell 3397 A3397 is a poorly studied galaxy cluster that is located north of A3391-A3395 with no published redshift, but the 6dF redshift survey shows seven galaxies with mean measured redshift \(\langle z\rangle =0.715\) (A3397A) and four others with \(\langle z \rangle=0.1063\) (A3397A) within one Abell radius (1.7\('/z\)) from the Abell centre. One more galaxy, 2MASX J062940.23-521418.5, with a redshift measured by, makes a total of eight spectroscopic members of A3397A with a velocity dispersion of \(750 \pm 80\) km s\(^{-1}\) based on the BIweight scale of ROBUST. The eROSITA image shows an extension towards the west that is indicative of a merger in the east--west direction. The X-ray image also shows an extension towards the north. An extended radio source lies on the western side of the X-ray peak with hints of diffuse emission (see Fig.  [\[fig:halos\]](#fig:halos){reference-type="ref" reference="fig:halos"}, top right panel) and appears to be composed of several components; its LAS is 1.4 arcmin which corresponds to an LLS of 600 kpc at \(z=0.715\). The flux density of this source is \(S_{\rm 1013 MHz} = 0.23 \pm 0.04\) Jy. The nature of the source is unclear. ### EMU ED J0624-5414 The source sits in a patch of diffuse radio emission whose angular extent is about 4 arcmin. The redshift of WISEA J0624-5414 is \(z=0.045\). It appears as two connected bars of emission that stretch from the SE to the NW. The main blob in the northern part of the structure extends for about 1.8 arcmin before it fades quite abruptly. The flux density of this source is \(S_{\rm 1013 MHz} = 0.13 \pm 0.019\) Jy and there is no counterpart in the eROSITA image. This source is likely to be a radio halo (see Fig. [\[fig:halos\]](#fig:halos){reference-type="ref" reference="fig:halos"}, upper left panel). # Conclusions {#sec:conclusions} We present 1 GHz radio observations of the pre-merging system of galaxy clusters A3391-A3395 with ASKAP/EMU. Accompanying eROSITA observations of this system yield the best large-scale X-ray characterisation of the emission bridge between A3391 and A3395 to date (Reiprich et al., submitted). We do not detect diffuse radio emission in the X-ray bridge between these two clusters. Provided that the acceleration mechanism is Fermi-II acceleration, the non-detection implies that the turbulent velocity in this system is smaller than in the A399-401 system, possibly because of the smaller mass. This is something that can be verified with the future ATHENA X-ray mission. Moreover, we find a plethora of other interesting radio sources in a 30 deg\(^2\) field around A3391-A3395. We identified around 200 objects extending over more than 1 arcmin. Of these, we present a list of 27 that are GRGs with linear projected sizes of greater than 1 Mpc (see Table [\[tab:RGs\]](#tab:RGs){reference-type="ref" reference="tab:RGs"}). This surface density is four times that found by who find about 0.2 GRGs (LLS \(>1\) Mpc per deg\(^2\) based on LoTSS DR1. For galaxies with LLS \(>0.7\) Mpc, we obtain a sky density of \(\approx 1.7\) deg\(^{-2}\), three times higher than previously reported. The 1.4-GHz luminosities of our sample of GRGs are consistent with distributions found in the literature. Our sample shows no evidence in support of cosmological evolution of the GRG population. Finally, we identify seven candidates for radio relics and halos, which we list in Table [\[tab:relics\]](#tab:relics){reference-type="ref" reference="tab:relics"} together with previously published examples. It will be important to follow these up with deeper observations and to make spectral index maps in order to classify the sources and understand their origin. This will be the subject of future work. [^1]: We define the spectral index \(\alpha\) as \(S \propto \nu^\alpha\). [^2]: Reynolds J. E., 1994, Technical report, A Revised Flux Scale for the AT Compact Array. ATNF, Epping
{'timestamp': '2020-12-17T02:11:21', 'yymm': '2012', 'arxiv_id': '2012.08775', 'language': 'en', 'url': 'https://arxiv.org/abs/2012.08775'}
# Introduction Asymptotic freeness in the large dimension limit of independent GUE random matrices is a fundamental phenomenon discovered by Voiculescu in the nineties. It allows us to understand the spectrum of non-commuting polynomials in independent random matrices in the limit of large dimensions and under very general assumptions. Subsequently, Voiculescu proved that independent Haar unitary random matrices are almost surely asymptotically free as the dimension goes to infinity. While the above result addresses unitary groups, i.e. the group of symmetries of a Euclidian space, it is natural to consider other groups of symmetries, and in particular, of a finite set, i.e., symmetric groups. Here, the counterpart of Voiculescu's results was solved by Nica in. Asymptotic freeness for random permutations notably provides fine spectral information for operators acting on a random Schreier graph or random coverings of a fixed graph. It has also become folklore that some specific non-random permutations' asymptotic freeness can be achieved easily by explicitly exhibiting a sequence of finite quotients of a free group whose kernels intersect with its trivial subgroup. As soon as compact matrix groups are involved, the joint asymptotic behavior of independent random variables can legitimately be expected to depend on which representation of the group is being considered, and for example, although the above results are conclusive examples of asymptotic freeness, irrespective of the representation in the case of the symmetric group, we are not aware of any complete result in this direction for unitary or orthogonal groups, and the initial results deal instead with the very particular case of the fundamental representation. In a recent development by the second author, together with Gaudreau Lamarre and Male, addressed part of the problem in, when a signature is fixed. However, although asymptotic freeness describes the macroscopic spectrum of non-commuting polynomials in the generators in large dimension efficiently, it is not enough to analyze the existence of eigenvalues away from the limiting spectrum. The absence of such eigenvalues (also known as outliers) is a difficult problem whose positive answer corresponds to strong asymptotic freeness. We refer to Section [2](#sec:main){reference-type="ref" reference="sec:main"} for a formal definition of strong asymptotic freeness. The first breakthrough in this direction was achieved in where the authors proved strong asymptotic freeness of independent GUE matrices, and it was followed by many improvements. A notable progress was strong asymptotic freeness of Haar unitaries in. Later, both authors in showed that strong asymptotic freeness holds for random independent permutations (i.e., Haar unitaries on the symmetric group) when viewed as \(n\times n\) matrices. To continue the parallel between asymptotic freeness and strong asymptotic freeness, let us point out here that all results on strong asymptotic freeness involving independent copies of Haar measure on groups are basically only valid with respect to the fundamental representation---with the notable exception of , where we show that we can also extend the result to the tensor product of two fundamental representations. For particular operators, though, partial results have also been obtained in the context of quantum expanders, see. In other words, there is no hint at the fact that the same strong asymptotic freeness would hold if one were considering all representations simultaneously---or equivalently, for our purposes, the left regular representation. This seems, however, to be a very natural question, as there exist sequences of permutations (such as those of the Ramanujan graphs, ) for which a simple polynomial---the sum of generators---is known to behave well for all nontrivial irreducible representations. This prompts us to state a question: given an integer \(n\), consider a nontrivial signature \(\rho\), and the irreducible representation \(V_{n,\rho}\) of \(\mathbb{U}_n\) associated with the signature. We consider the quotient \(\mathbb{U}_{n,\rho}\) of \(\mathbb{U}_n\) viewed as a matrix subgroup of \(\mathbb{U}(V_{n,\rho})\). In particular, the Haar measure on \(\mathbb{U}_{n,\rho}\) has 'less randomness' than the Haar measure on the full unitary group \(\mathbb{U}(V_{n,\rho})\), in the sense that the group is of a much smaller dimension---say, as a manifold. Then the question is: *for which sequence of pairs \((n,\rho )\) is it true that \(d\) independent Haar random variables of \(\mathbb{U}_{n,\rho}\) are strongly asymptotically free?* As a trivial observation, \(\dim (V_{n,\rho})\) must tend to infinity because freeness does not occur in finite dimension, so either \(n\) or \(\rho\) must tend to infinity. Fixing \(n\) and letting \(\rho\) tend to infinity seems to be a fascinating problem to which we do not have an answer. Our main theorem is an answer to this theorem when \(\rho\) is fixed, and \(n\) tends to infinity. Our result is that strong asymptotic freeness holds as soon as \(\rho\) is nontrivial. It can be made uniform, provided that \(\rho\) varies slowly as a function of \(n\). The precise statement can be found in Corollary [\[cor:main\]](#cor:main){reference-type="ref" reference="cor:main"}. The above corollary is a consequence of our main theorem, Theorem [\[th:main\]](#th:main){reference-type="ref" reference="th:main"}. This result establishes strong asymptotic freeness for tensor products of the fundamental representation and of the contragredient representation on the orthogonal of fixed points. We believe the main theorem to be of independent interest in mathematical physics and quantum information theory, but for the purpose of this introduction, let us note that, as explained in Section [2](#sec:main){reference-type="ref" reference="sec:main"}, thanks to elementary results in representation theory and a few classical facts of operator algebras, Corollary [\[cor:main\]](#cor:main){reference-type="ref" reference="cor:main"} and Theorem [\[th:main\]](#th:main){reference-type="ref" reference="th:main"} are equivalent. Our main result, Theorem [\[th:main\]](#th:main){reference-type="ref" reference="th:main"}, can be interpreted as a \(0\)-\(1\) law over natural sequences of irreducible representations: either it is trivial (if the sequence of representations is one-dimensional) or strongly asymptotically free (in all other cases). In other words, this quantifies very precisely the fact that the sole known obstructions to strong asymptotic freeness are the fixed points of a representation. Hence, there does not seem to be intermediate behavior between strong asymptotic freeness and triviality. Let us digress a bit to hint at the fact that strong asymptotic freeness can naturally be expected to be much harder to achieve than plain asymptotic freeness. To be more specific, let us try to investigate whether the operator norm of a non-commutative linear function of independent copies of Haar-distributed variables could be bounded above uniformly (which must happen in the case of strong asymptotic freeness thanks to the Haagerup inequality). A naive attempt could consist of a combination of a net argument and a union bound---and this attempt would succeed in the case of the context of the fundamental representation. For this purpose, for \(\varepsilon, \eta >0\), let us observe that the size of an \(\eta\)-net of vectors in the unit ball of \(V_{n,\rho}\) is of the order of \((C/\eta)^{\dim(V_{n,\rho}) }\), whereas for any \(1\)-Lipschitz function, the likelihood of being \(\varepsilon\)-away from the median is of order \(\exp (-c\varepsilon^2 n)\); this follows from Gromov's comparison theorem, see. The involved exponential speeds \(n\) and \(\dim(V_{n,\rho})\) are comparable as \(n\) grows iff \(V_{n,\rho}\) is the fundamental representation or its contragradient. In all other cases \(\dim (V_{n,\rho})\gg n\) and it is impossible, given \(\eta\), to fix \(\varepsilon\) such that \((C/\eta)^{\dim(V_{n,\rho}) }\cdot \exp (-c\varepsilon^2 n)\) remains small uniformly over the dimension. Hence, we might expect that 'soft' geometric techniques such as those exposed in the monograph are not of use here and make it less obvious that strong asymptotic must hold. Likewise, analytic proofs extending and are not handy in this case because of the tensor structure of the objects--there is no prospect for an easy folding trick like in or a Schwinger-Dyson equation like in because of the tensor structure. Because of this lack of geometric or analytic methods, a natural approach turns out to be based on moments, which is the core technology of this paper. It is implemented with the help of an operator-valued non-backtracking theory. The non-backtracking theory was observed by a few authors to be very powerful in studying outliers in the context of graph theory, see, e.g.,. A version of the non-backtracking theory with non-commuting weights was developed further in to prove strong asymptotic freeness of random permutations. Here, to achieve our goal, we generalize this theory even further, beyond the case of permutation operators, to the case of all bounded operators. The results are gathered in Section [4](#sec:SAFNB){reference-type="ref" reference="sec:SAFNB"}. However, moment methods require a good understanding of the moments of the random objects under consideration. While moment estimates for random permutations boil down to combinatorial formulas, the situation is more involved for random unitary or orthogonal matrices. In these cases, formulas for moments require Weingarten calculus, as developed in. One of our key results relies on the comparison of moments of unitary random matrices and Gaussian random matrices, which extends the line of research of and others. Our main result in this direction is Theorem [\[theorem-with-brackets\]](#theorem-with-brackets){reference-type="ref" reference="theorem-with-brackets"}, which quantifies how well unitary random matrices can be estimated by Gaussian matrices. A critical preliminary result to achieve this goal is to develop a systematic method to handle centering, for which we use a bracket notation. This is based on another notion of lattices, and a similar moment theoretical work was initiated in . Our main result here is Theorem [\[lemma:unitary-Wg-expansion3\]](#lemma:unitary-Wg-expansion3){reference-type="ref" reference="lemma:unitary-Wg-expansion3"}. The paper is organized as follows. This introduction is followed by Section [2](#sec:main){reference-type="ref" reference="sec:main"}, which states the main results and describes the steps of the proof and its applications. Section [3](#sec:Wg){reference-type="ref" reference="sec:Wg"} contains the necessary new developments on uniform centered Weingarten functions. Section [4](#sec:SAFNB){reference-type="ref" reference="sec:SAFNB"} describes the non-commutative non-backtracking theory in full generality. Section [5](#sec:trace){reference-type="ref" reference="sec:trace"} is devoted to trace estimates based on the previous sections and the completion of the proof of the main theorems. We finish the paper with Section [6](#sec:appendix){reference-type="ref" reference="sec:appendix"}, which is an appendix in which we provide a constructive proof of Pisier's unitary linearization trick, on which this paper relies heavily. # Strong asymptotic freeness for random unitary tensors {#sec:main} ## Main result In the sequel, for an integer \(k \geq 1\), we set \(\INT{k} = \{1, \ldots, k \}.\) For any compact group, there exists a unique probability measure that is left-and right-invariant under translation; it is called the normalized Haar measure. In this paper, we are interested in the case of the unitary group \(\mathbb{U}_n\) and the orthogonal group \(\mathbb{O}_n\). We focus on the unitary case to keep the paper to a reasonable length. The orthogonal case boils down to technical modifications of the unitary case, which we summarize in Subsection [3.5](#subsec:orthogonal-variations){reference-type="ref" reference="subsec:orthogonal-variations"}. Let \(d \geq 2\) be an integer and let \(U_1, \cdots,U_{d}\) be independent Haar-distributed random unitary matrices in \(\mathbb{U}_n\). For \(d+1 \leq i \leq 2d\), we set \(U_i = U_{i-d}^*\). We consider the involution on \(\INT{2d}\), defined by \(i^* = i+d\) for \(1 \leq i \leq d\) and \(i^* = i-d\) for \(d+1 \leq i \leq 2d\). We thus have \(U_{i^*} = U_i^*\) for all \(i \in \INT{2d}\). If \(M \in M_n(C)\) and \(\varepsilon \in \{\cdot,-\}\), we set \(M^{\varepsilon} = M\) for \(\varepsilon = \cdot\) and \(M^\varepsilon = \bar M\) for \(\varepsilon =-\). We fix a triple of integers \(q = q_-+ q_+ \geq 1\). For each \(i \in \INT{2d}\), we introduce the unitary matrix in \(\mathbb{U}_{n^q}\), \[\label{eq:defVi} V_i = \bar U_i^{\otimes q_-} \otimes U_i^{\otimes q_+} = U_i^{\varepsilon_1} \otimes \cdots \otimes U_i^{\varepsilon_{q}},\] where \((\varepsilon_1,\ldots, \varepsilon_{q } )\in \{.,-\}^ q\) is the symbolic sequence: \(\varepsilon_p =-\) for \(p \leq q_-\) and \(\varepsilon_p = \cdot\) otherwise. We recall the following fact: Although this result is classical and its proof is elementary, it is not very well referenced in our specific context, so we include an outline for the sake of being self-contained, see also. We refer to Subsection [3.2](#subsec:Wg){reference-type="ref" reference="subsec:Wg"} for a method to compute \(\mathbf {E} V\). For example if the vector \((\varepsilon_1,\ldots, \varepsilon_{q } )\) is not balanced, that is \(q_-\ne q_+\) then \(\mathbf {E} V = 0\). We set \[\label{eq:bracket} [V_i] = V_i-\mathbf {E} V_i = V_i-P_{H}.\] For a fixed integer \(r \geq 1\), let \((a_0, a_1, \ldots, a_{2d})\) be matrices in \(M_r(\mathbb {C})\). We introduce the following matrix on \(\mathbb {C}^r \otimes \mathbb {C}^{n^q}\): \[\label{eq:defA} A = a_0 \otimes 1 + \sum_{i=1}^{2d} a_i \otimes V_i,\] where \(1\) is the identity. From what precedes, the vector space \(H_r = \mathbb {C}^r \otimes H\) is an invariant subspace of \(A\) and its adjoint \(A^*\). We denote by \(H_r ^\perp\) the orthogonal of \(H_r\) and denote by \(A_{|H_r^\perp}\) the restriction of \(A\) to this vector space. Our goal is to describe the spectrum of \(A_{|H_r^\perp}\) as \(n\) goes to infinity. To this end, the key observation is the following. Consider the unitary representation of the free group \({\mathbb{F}_d}\) on \(\mathbb {C}^{n^q}\) defined by \(\pi(g_i) = V_i\), where \((g_i)_{i \in \INT{2d}}\) are the free generators and their inverses: \(g_{i^*} = g_i ^{-1}\). Note that this representation \(\pi\) is random and depends implicitly on \(n\) and \((q_-,q_+)\). The matrix \(A\) is the image by \(\pi\) of the following operator in \(\ell^2({\mathbb{F}_d})\) in the (left)-group algebra on \({\mathbb{F}_d}\): \[\label{eq:defAfree} A_\star = a_0 \otimes 1 + \sum_{i=1}^{2d} a_i \otimes \lambda(g_i),\] where \(g \mapsto \lambda (g)\) is the left-regular representation (that is, left multiplication by group elements). The main technical result of this paper is the following theorem. In the sequel \(\| \cdot \|\) denotes the operator norm of an operator in a Hilbert space: \(\| T \| = \sup_{x \ne 0} \| Tx \|_2 / \|x \|_2\) where \(\| x\|_2\) is the Euclidean norm in the Hilbert space. Thanks to the "linearization trick\" of the theory of operator algebras (see Pisier and the monograph by Mingo and Speicher for an accessible treatment), Theorem [\[th:main\]](#th:main){reference-type="ref" reference="th:main"} has an apparently much more general corollary that we describe in the sequel of this subsection. Although Pisier's linearization trick is enough for our paper, we include, for the convenience of the reader, an appendix in Section [6](#sec:appendix){reference-type="ref" reference="sec:appendix"}, which provides a self-contained constructive proof of the linearization theorem. A reader interested in linearization tricks might find this section of independent interest. In the simplest case where \(r=1\), all \(a_i\)'s are equal to one and \(q_-= q_+\), then Theorem [\[th:main\]](#th:main){reference-type="ref" reference="th:main"} is contained in. In this case, a more direct method of moments based on Schwinger-Dyson equations can be performed. Let us start with some basic notation of representation theory. For any \(n\), let \(\rho = \rho (n)\) be a signature (to lighten the notation, we omit the dependence in \(n\)). More precisely, \(\rho\) is a pair of Young diagrams: two pairs of non-negative integer sequences \(\lambda =(\lambda_1,\lambda_2,\ldots)\) and \(\mu= (\mu_1,\mu_2,\ldots)\) satisfying the following properties: \(\mu_i \geq \mu_{i+1}\), \(\lambda_i\geq \lambda_{i+1}\) and \(\sum_i\lambda_i+\mu_i<\infty\). We introduce \(l(\lambda)=\max\{i, \lambda_i>0\}\) and \(|\lambda |=\sum_i\lambda_i\) (and likewise for \(\mu\)). For notation, we refer, for example to. If \(n\ge l(\lambda)+l(\mu)\) we call \(V_{n,\rho}\) the Hilbert space such that the group homomorphism \(\tilde \rho: \mathbb{U}_n \to \mathbb{U}(V_{n,\rho})\) is the irreducible representation of \(\mathbb{U}_n\) whose highest weights are \[\lambda_1\ge\cdots\ge\lambda_{l(\lambda )}\ge 0\ge \cdots \ge 0 \ge-\mu_{l(\mu)}\ge\ldots \ge-\mu_{1}.\] The signature formulation is a reformulation of the highest weight theory, but it is convenient as it allows to define simultaneously representations for all unitary groups \(\mathbb{U}_n\) with \(n\ge l(\lambda)+l(\mu)\). We call \(\mathbb{U}_{n,\rho}=\tilde\rho (\mathbb{U}_n)\). It is the quotient of \(\mathbb{U}_n\) under the above representation map. We view it as a matrix subgroup of \(\mathbb{U}(V_{n,\rho})\). Letting \(U_i\) be a Haar-distributed random matrix in \(\mathbb{U}_n\), we call \(W_i:=\tilde\rho (U_i)\) its image under the irreducible representation map associated with \(\rho\). Since the map is surjective, \(W_i\) is Haar-distributed according to \(\mathbb{U}_{n,\rho}\). Consider any operator on \(\mathbb {C}^r \otimes \ell^2 ({\mathbb{F}_d})\) of the form \[P_\star = \sum_{g \in {\mathbb{F}_d}} a_g \otimes \lambda (g),\] where for all \(g \in {\mathbb{F}_d}\), \(a_g\) is a matrix in \(M_r(\mathbb {C})\). We assume that \(a_g\) is non-zero for a finite number of group elements. In other words, \(P_\star\) is a matrix-valued non-commutative polynomial. The image of \(P_\star\) by the representation \(\pi\) is denoted by \(P\): \[P = \sum_{g \in {\mathbb{F}_d}} a_g \otimes W(g),\] where \(W(g) = W_{i_1} \ldots W_{i_k}\) if \(g = g_{i_1} \ldots g_{i_k}\). Obviously, \(H_r\) and \(H_r^\perp\) are again invariant subspaces of \(P\) and \(P^*\). The operator \(P_\star\) (and thus \(P\)) is self-adjoint if the following condition is met: \[\label{eq:symP} a_{g^{-1}} = a_g^* \quad \hbox{ for all } g \in {\mathbb{F}_d}.\] The following result is a corollary of Theorem [\[th:main\]](#th:main){reference-type="ref" reference="th:main"}. The reason why Theorem [\[th:main\]](#th:main){reference-type="ref" reference="th:main"} is sufficient to allow general polynomials in the above Corollary [\[cor:main\]](#cor:main){reference-type="ref" reference="cor:main"} follows from. This is a consequence of. Details can also be found in the appendix of section [6](#sec:appendix){reference-type="ref" reference="sec:appendix"}. As for the fact that we can replace tensors with irreducible representation, this follows from the following two facts: (i) contracting by an orthogonal projection does not increase the operator norm, and (ii) there exists an orthogonal projection \(Q\) that commutes with all \(V_i\)'s such that on \(\Im(Q)\), \(W_i=QV_iQ\), when \(q_+=|\lambda |, q_-=|\mu|\). We refer, for example, to for details on the tools involved, such as Schur-Weyl duality. Corollary [\[cor:main\]](#cor:main){reference-type="ref" reference="cor:main"} establishes the almost-sure strong asymptotic freeness of unitary representations of independent Haar-distributed unitary matrices provided that the unitary representation is a sub-representation of a tensor product representation of not too large dimension. We observe that this last point is critical. Indeed, the determinant is a representation of dimension \(1\) (which is a sub-representation of the tensor product representation with \(q = n\)), and there is no freeness in nontrivial finite-dimensional spaces. ## Overview of the proof We now explain the strategy behind the proof of Theorem [\[th:main\]](#th:main){reference-type="ref" reference="th:main"}. The strategy is the same as the one used in for permutation matrices. The model in is, however, very different, and new technical achievements were necessary for tensor products of unitary matrices. First of all, from, it is enough to prove that, for any \(\varepsilon > 0\), we have \[\label{eq:tbdA} \| A_{|H_r^\perp} \| \leq \| A_\star \| + \varepsilon,\] with high probability. To achieve this, it is possible to restrict ourselves to self-adjoint operators. Indeed, the operator norm of an operator \(M\) is also the square root of the right-most point in the spectrum of the non-negative operator \[\begin{pmatrix} 0 & M \\ M^*& 0 \end{pmatrix} = E_{12} \otimes M + E_{21} \otimes M^*,\] where \(E_{ij}\) is the \(2 \times 2\) canonical matrix whose entry \((i,j)\) is equal to \(1\) all other entries are equal to \(0\). In particular, if \(A\) is of the form [\[eq:defA\]](#eq:defA){reference-type="eqref" reference="eq:defA"}, at the cost of changing \(r\) in \(2r\), we may assume without loss of generality that \[\label{eq:symA} a_{i^*} = a_{i}^* \quad \hbox{for all \(i \in \INT{2d}\)}.\] For such a given operator \(A\), we will define a family of companion operators, denoted by \(B_\mu\) and indexed by a real parameter \(\mu\), with the property that if, for all \(\varepsilon >0\), with high probability, for all \(\mu\), we have \[\label{eq:tbdB} \rho( B_\mu) \leq \rho((B_\star)_\mu) + \varepsilon\] then [\[eq:tbdA\]](#eq:tbdA){reference-type="eqref" reference="eq:tbdA"} holds. In the above expression, \((B_\star)_\mu\) is the companion operator of \(A_\star\) defined in [\[eq:defAfree\]](#eq:defAfree){reference-type="eqref" reference="eq:defAfree"} and \(\rho(M) = \sup \{ |\lambda|: \lambda \in \sigma(M)\}\) is the spectral radius. These operators \(B_\mu\) are called the non-backtracking operators. This will be explained in Section [4](#sec:SAFNB){reference-type="ref" reference="sec:SAFNB"}. This part is an extension of in a more general setting. It is not a priori obvious why the claim [\[eq:tbdB\]](#eq:tbdB){reference-type="eqref" reference="eq:tbdB"} is easier to prove than claim [\[eq:tbdA\]](#eq:tbdA){reference-type="eqref" reference="eq:tbdA"}. A reason is that the powers of \((B_\star)_\mu\) are much simpler to compute than the powers of \(A_\star\). In Section [5](#sec:trace){reference-type="ref" reference="sec:trace"}, we prove that [\[eq:tbdB\]](#eq:tbdB){reference-type="eqref" reference="eq:tbdB"} holds by using the expected high trace method popularized by Füredi and Komlós in random matrix theory. It can be summarized as follows: assume that we aim at an upper bound of the form \(\rho(M) \leq ( 1 + o (1)) \theta\) for some \(\theta >0\) and \(M \in M_n (\mathbb {C})\) random. We observe that for any \(\ell\) integer, \[\rho ( M)^{2\ell} \leq \| M^{\ell} \|^2 = \| M^\ell (M^*)^\ell \| \leq {\rm tr} ( M^\ell (M^*)^\ell).\] Moreover, at the last step, we lose a factor at most \(n\) (and typically of this order). If we can prove that \[{\mathbf{E}} {\rm tr} ( M^\ell (M^*)^\ell) \leq n \theta^{2\ell},\] then we will deduce from Markov's inequality that the probability that \(\rho(M) \leq n^{1/(2\ell)} ( 1+ \delta) \theta\) is at least \(1-(1+ \delta)^{-\ell}\). In particular, if \(n^{1/(2\ell)} \to 1\), that is \(\ell \gg \ln(n)\), then this last upper bound is sharp enough for our purposes. A usual strategy to evaluate \({\mathbf{E}} {\rm tr} ( M^\ell (M^*)^\ell)\) is to expand the trace and the powers as the sum of product matrix entries and then use the linearity of the expectation. We thus need to combine two ingredients: (i) a sharp upper bound on the expectation of the product of matrix entries in terms of combinatorial properties of the entries and (ii) a counting machinery to estimate the number of entries in the trace that have the given combinatorial properties. In our setting, the matrix \(M\) is the non-backtracking matrix \(B_\mu\) and \(\theta = \rho( (B_\star)_\mu)\) for a fixed \(\mu\). Among the difficulties, the value of \(\theta\) is unknown exactly, and also, a probabilistic control of an event where all \(\mu\) are considered is needed in [\[eq:tbdB\]](#eq:tbdB){reference-type="eqref" reference="eq:tbdB"}. These issues were already present in. Here, the presence of the tensor products will also create a significant complication in the counting arguments of ingredient (ii). An important step for ingredient (i) is performed in Section [3](#sec:Wg){reference-type="ref" reference="sec:Wg"}, where we prove a new estimate on the expectation of the product of a large number of entries of a Haar unitary matrix. This will be done by developing recent results on Weingarten calculus. # High order Gaussian approximation for random unitarymatrices {#sec:Wg} This section aims to develop an efficient machinery to compare the expectation of products of entries of a Haar-distributed unitary matrix with the average of the same product when we replace the unitary matrix with a complex Gaussian matrix. The main results of these sections are Theorem [\[theorem-warmup\]](#theorem-warmup){reference-type="ref" reference="theorem-warmup"} and Theorem [\[theorem-with-brackets\]](#theorem-with-brackets){reference-type="ref" reference="theorem-with-brackets"} below. ## Wick calculus In this subsection, we recall the classical Wick formula. We then introduce a centered version which is new. ### Wick formula Let \(V\) be a real vector space of real centered Gaussian variables. It is called a real Gaussian space. Similarly, let \(W\) be a complex vector space of complex centered Gaussian variables. It is called a complex Gaussian space. In both cases, the addition is the regular addition of real (respectively complex) valued random variables, and likewise for the scaling. Let \((x_i)_{i \in I}\) be iid real centered Gaussian variables indexed by a countable set \(I\). Then \(\mathrm{span} ((x_i)_{i \in I})\) is a real vector space, and any real vector space can be realized in this way. Finally, a real Gaussian vector space comes with the scalar product \((x,y)\mapsto {\mathbf{E}}(xy)\) and similarly, a complex Gaussian vector space comes with the Hilbert product \((x,y)\mapsto {\mathbf{E}}(\overline{x}y)\). Wick's Theorem asserts that the scalar product is enough to recover the structure of the Gaussian space completely, in other words, there is a one-to-one correspondence (in law) between Gaussian spaces and their Hilbert structure; see Janson. Everything relies on a moment formula (which, in the case of Gaussian variables, determines the distribution). In the real case, \[{\mathbf{E}}(x_1\ldots x_k)=\sum_{p\in P_k} {\mathbf{E}}_p(x_1,\ldots, x_k),\] where \(P_k\) is the collection of pair partitions of \(\INT{k}\), typically denoted by \[\label{eq:notep} p= \{ p_1, \ldots, p_{k/2} \} = \{\{i_1,j_1\},\ldots, \{i_{k/2},j_{k/2}\}\}\] with \(i_l<j_l\) and \(i_{l}<i_{l+1}\) (obviously \(P_k\) is empty when \(k\) is odd), and, under this notation, \[{\mathbf{E}}_p(x_1,\ldots, x_k)={\mathbf{E}}(x_{i_1}x_{j_1})\ldots {\mathbf{E}}(x_{i_{k/2}}x_{j_{k/2}}).\] In the complex case, \[\label{eq:WickC} {\mathbf{E}}(g_1\ldots g_k \overline h_1\ldots \overline h_k)=\sum_{\sigma\in S_k} {\mathbf{E}}_{\sigma} ( g_1,\ldots, g_k, h_1, \ldots , h_k).\] where \(S_k\) is the permutation group on \(\INT{k}\) and \[{\mathbf{E}}_{\sigma} ( g_1,\ldots, g_k, h_1,\ldots , h_k) = \prod_{l=1}^k {\mathbf{E}}(g_l \overline h_{\sigma(l)}).\] Note that the complex case can be deduced directly from the real case thanks to the real structure of complex Gaussian spaces (\(S_k\) appears as a subset of \(P_{2k}\) by identifying a permutation \(\sigma \in S_{2k}\) with the partition \(p = \{p_1, \ldots, p_{k} \}\) of \(P_{2k}\) with \(p_l = \{ l, k + \sigma(l) \}\)). As for the real case, the formula is trivial when the \(x_i\)'s are all the same (this is the formula for the moments of a Gaussian). For the general case, after observing that both the right-hand side and the left-hand side are \(k\)-linear and symmetric, we conclude by a polarization identity. ### Centered Wick formula If \(X\) is a vector valued integrable random variable, we call \([X]\) the centered random variable \[\label{eq:defbracket} [X] = X-{\mathbf{E}}(X).\] For integer \(T \geq 1\), the Wick formula can be extended as follows: if \(\pi = (\pi_t)_{t\in \INT{T}}\) is a partition of \(\INT{k}\), we have, for real Gaussian variables, \[{\mathbf{E}} \PAR{ \prod_{t=1}^T \big[ \prod_{i \in \pi_t} x_{i} \big] } = \sum_{p \in P_{ k}(\pi)} {\mathbf{E}}_p(x_1,\ldots, x_k),\] where \(P_{k}(\pi)\) is the subset of \(P_k\) of pair partitions \(p=\{p_1,\ldots ,p_{k/2}\}\) with the following property: for each block \(\pi_t\) of the partition, there exists at least one \(j\) such that the pair \(p_j\) of \(p\) has one element in \(\pi_t\) and one element outside. Although this formula is not mainstream in probability theory, it follows directly from standard inclusion-exclusion-type formulas (see Lemma [\[le:gaussiansieve\]](#le:gaussiansieve){reference-type="ref" reference="le:gaussiansieve"} below for the complex case). A similar formula holds for a complex Gaussian space: \[{\mathbf{E}} \PAR{ \prod_{t=1}^T \big[ \prod_{i \in \pi_t} g_{i} \bar h_i \big]}=\sum_{\sigma\in S_k(\pi)} {\mathbf{E}}_{\sigma} ( g_1,\ldots, g_k, h_1, \ldots , h_k),\] where \(S_k(\pi)\) is the subset of \(S_k\) of permutations \(\sigma\) such that for each block \(\pi_t\), there exists at least one \(i \in \pi_t\) such that \(\sigma(i) \notin \pi_t\). We will use these results in the proof of Theorem [\[theorem-with-brackets\]](#theorem-with-brackets){reference-type="ref" reference="theorem-with-brackets"} when we compare Gaussian moments and unitary moments. ## Weingarten calculus with brackets {#subsec:Wg} ### Unitary Weingarten formula In the sequel, if \(x= (x_1, \ldots, x_k)\) and \(y = (y_1, \ldots, y_k)\) are multi-indices in \(\INT{n}^k\), for \(\sigma\in S_k\) we set \[\delta_{\sigma}(x,y) = \prod_{l=1}^k \delta_{x_l,y_{\sigma (l)}},\] where \(\delta_{i,j}\) is the usual Kronecker delta (\(1\) if \(i=j\) and \(0\) otherwise). Similarly, if \(k\) is even and \(p \in P_k\) is a pair partition, \(\delta_{p}(x)\) is a generalized Kronecker delta: namely, \(\delta_{p}(x)\) takes the value \(1\) if the map \(i\mapsto x_i\) is constant on each block of \(p\) and zero in all other cases. This is a product of \(k/2\) such deltas. We start by recalling the analogue of Wick calculus for the normalized Haar measure on the unitary group \(\mathbb{U}_n\). We refer, for example, to for early versions of this result. The sequel of this subsection is devoted to providing a modern description of \(\mathrm{Wg}\). It follows from commutativity that \(\mathrm{Wg}(p,q,n)\) actually only depends on the conjugacy class of \(pq^{-1}\) so in the unitary case we will write \(\mathrm{Wg}(pq^{-1},n)=\mathrm{Wg}(p,q,n)\), so \(\mathrm{Wg}\) becomes a central function on \(S_k\). Let \(\sigma\in S_k\). We denote by \(|\sigma| = k-\ell(\sigma)\) where \(\ell(\sigma)\) is the number of disjoint cycles in the cycle decomposition of \(\sigma\). Classically, \(|\sigma|\) is also the minimal number \(m\) such that \(\sigma\) can be written as a product of \(m\) transpositions. In particular \((-1)^{|\sigma|}\) is the signature of \(\sigma\). For \(l \geq 0\), we call \(P(\sigma,l)\) the collection of solutions of \[\label{hurwitz} \sigma= (i_1,j_1)\cdots (i_{|\sigma|+l}, j_{|\sigma|+l}),\] where \(j_p\le j_{p+1}\) and \(i_p<j_p\). Note that \(P(\sigma,l) = 0\) unless \(l = 2g\) is even (since composing by a single transposition negates the signature). The following theorem is a combination of Theorem 2.7 and Lemma 2.8 in (beware that the definition of the map \(l \to P(\sigma,l)\) is shifted by \(|\sigma|\) in this reference), see also. In the statement below and in the sequel, if \(S\) is a finite set, we denote by \(|S|\) its cardinal number (not to be confused with \(|\sigma|\) for \(\sigma \in S_k\)). Since the poles of \(n\to \mathrm{Wg} (\sigma,n)\) are known to be in the set \(\{-k+1,\ldots, k-1\}\), it follows that the power series expansion is convergent as soon as \(n\ge k\). The following result can be found in; it is an estimate of the number of solutions of [\[hurwitz\]](#hurwitz){reference-type="eqref" reference="hurwitz"}. It allows subsequently to give estimates on the Weingarten function. For our purposes, we will need the following corollary: ### The centered case For a symbol \(\varepsilon \in \{ \cdot,-\}\) and \(z \in \mathbb {C}\), we take the notation that \(z^{\varepsilon}=z\) if \(\varepsilon=\cdot\) and \(z^{\varepsilon}=\overline z\) if \(\varepsilon =-\). Our goal is to compute, for \(U = (U_{ij})\) Haar-distributed on \(\mathbb{U}_n\), expressions of the form \[\label{eq:prodbraex} {\mathbf{E}} \PAR{\prod_{t=1}^T \big[ \prod_{l = 1}^{k_t} U_{x_{tl} y_{tl }}^{\varepsilon_{tl}} \big]},\] where we have used the bracket defined in [\[eq:defbracket\]](#eq:defbracket){reference-type="eqref" reference="eq:defbracket"}--and then to estimate it in a useful way. The polynomial to be integrated can be expanded into \(2^T\) terms for which the Weingarten formula can be applied each time. However, such an approach does not yield good estimates because the sum is signed, and additional cancellations occur, which results in the items to be summed not having the correct decay in the large dimension. On the other hand, for a given pairing of indices, one can group the \(2^T\) (signed) Weingarten functions into one single more general Weingarten function whose expansion turns out to be non-signed and, therefore, much more suitable for more sophisticated asymptotics. The following proposition addresses this issue. We now give an analogue of Theorem [\[lemma:unitary-Wg-expansion1\]](#lemma:unitary-Wg-expansion1){reference-type="ref" reference="lemma:unitary-Wg-expansion1"}. We consider the setting of Proposition [\[weingarten-centered\]](#weingarten-centered){reference-type="ref" reference="weingarten-centered"}. Let \(\varepsilon \in \{\cdot,-\}^k\) be a balanced sequence and \(\pi\) be a partition of \(\INT{k}\). Recall that we identify pair partitions \(p,q \in P_k^\varepsilon\) with bijections from the \(i\)'s such that \(\varepsilon_i = \cdot\) to the set of \(i\)'s such that \(\varepsilon_i =-\). For \(p,q \in P^\varepsilon_k\), we call \(P[\pi] (p,q, l)\) the collection of solutions of \[\label{hurwitz-centered} p= (i_1,j_1)\ldots (i_{|p q^{-1}|+l}, j_{|p q^{-1}| + l})q\] where \(j_r\le j_{r+1}\), \(i_r<j_r\) and that satisfies the following property: the solution can be restricted to *no single block* of \(\pi\) in the sense that if there exists a block \(b\) of \(\pi\) such that \(p,q\) and each transposition \((i_r,j_r)\) leave \(b\) invariant, then the solution is not in \(P[\pi] (p ,q, l)\), otherwise, the solution is in \(P[\pi] (p ,q, l)\). These notations allow us to reformulate combinatorially the centered Weingarten function used in Proposition [\[weingarten-centered\]](#weingarten-centered){reference-type="ref" reference="weingarten-centered"}: Out of this, we are able to propose the key estimate for the centered Weingarten function. In the statement below, if \(p\) and \(q\) are two partitions of \(\INT{k}\) then \(p \vee q\) is the finest partition coarser than both \(p\) and \(q\). Before we supply the proof, we give the main idea, which is quite simple: since in Theorem [\[lemma:unitary-Wg-expansion3\]](#lemma:unitary-Wg-expansion3){reference-type="ref" reference="lemma:unitary-Wg-expansion3"}, we realize Weingarten functions as unsigned sums, it is enough to estimate each summand separately, In turn, our estimate is quite blunt and relies solely on the inclusion \(P[\pi](p,q, l) \subset P(p,q ,l)\). In other words, an estimate good enough for our purposes is achieved just because a partial connectedness condition kills the first terms of a series. ## From Weingarten calculus to Wick calculus ### Case without brackets We start with \(x, y\) in \(\INT{n}^k\) and a balanced sequence \(\varepsilon \in \{\cdot,-\}^k\). If \(U = (U_{ij})\) is Haar-distributed on \(\mathbb{U}_n\), we want to compare \(|{\mathbf{E}}(U_{x_1y_1}^{\varepsilon_1}\ldots U_{x_ky_k}^{\varepsilon_k} )|\) with the matrix \(U\) replaced by \(G_{ij} / \sqrt n\), where \(G_{ij}\) are independent complex standard Gaussian variables. We need a new definition. Let \(x,y \in \INT{n}^k\). If \(u \in [n]\), we define the number of *left arms* of \(u \in [n]\) in \((x,y)\) as \(\sum_i \IND (x_i = u)\) and the number of *right arms* as \(\sum_i \IND ( y_i = u)\). The pair \((x,y)\) is called an *even sequence* if for any \(u \in [n]\), the number of left and right arms are even. Our result is as follows: ### Case with brackets We now move to the case with brackets. If \(U = (U_{ij})\) is Haar-distributed on \(\mathbb{U}_n\), we want to compare expectations as in Equation [\[eq:prodbraex\]](#eq:prodbraex){reference-type="eqref" reference="eq:prodbraex"} with the matrix \(U\) replaced by \(G_{ij} / \sqrt n\), where \(G_{ij}\) are independent complex standard Gaussian variables. The main result in this direction is: We start by evaluating the average of products of brackets of shifted Gaussian variables. The proof is elementary and closely related to the proof of Theorem [\[lemma:unitary-Wg-expansion3\]](#lemma:unitary-Wg-expansion3){reference-type="ref" reference="lemma:unitary-Wg-expansion3"}; therefore, we omit it. ## Moment bounds for a product of unitaries We conclude this section with a corollary of Theorem [\[theorem-with-brackets\]](#theorem-with-brackets){reference-type="ref" reference="theorem-with-brackets"}. Let \(x,y\) be two sequences in \(\INT{n}^k\). The *multiplicity* of \(e = (a,b) \in \INT{n}^2\) is defined as \(\sum_{i} \IND ( (x_{i},y_{i} ) = e )\). The set of pairs of multiplicity at least one is the set of visited pairs \(\cup_i \{ (x_i,y_i) \}\). Moreover if \(\pi = (\pi_t)_{t \in \INT{T}}\) is a partition of \(\INT{k}\), we say that \(\pi_t\) is an *isolated* block of \((x,y)\) if for all \(i \in \pi_t\), for all \((x_{i},y_{i}) \ne (x_{j}, y_{j})\) for all \(j \in \INT{k} \backslash \pi_t\) (in other words, \((x_{i},y_{i})\) is of multiplicity \(0\) in the sequence \((x_{j},y_{j})_{j \in \INT{k} \backslash \pi_t}\)). ## The orthogonal case {#subsec:orthogonal-variations} This paper focuses on random unitary matrices; however, as we claim in the introduction, the obvious variant of our results works precisely the same way for sequences of orthogonal groups. This subsection outlines how to adapt the above statements on the unitary group to the orthogonal case. Firstly, there exists a counterpart of Proposition [\[weingarten-centered\]](#weingarten-centered){reference-type="ref" reference="weingarten-centered"}, which can be stated as follows: Intriguingly, this formula seems to be simpler. Indeed, there is no need to consider conjugates, specify matchings, or balancing conditions since the entries \(O_{ij}\) of a random orthogonal matrix are all real. Its proof is based on the existence of the orthogonal Weingarten function and then repeats the argument of Proposition [\[weingarten-centered\]](#weingarten-centered){reference-type="ref" reference="weingarten-centered"}. The subsequent estimate is the orthogonal counterpart of Theorem [\[thm:centered-wg-estimate\]](#thm:centered-wg-estimate){reference-type="ref" reference="thm:centered-wg-estimate"}. Without entering details, the proof is essentially the same as the proof of Theorem [\[thm:centered-wg-estimate\]](#thm:centered-wg-estimate){reference-type="ref" reference="thm:centered-wg-estimate"}. The main input is an analogue of Theorem [\[lemma:unitary-Wg-expansion1\]](#lemma:unitary-Wg-expansion1){reference-type="ref" reference="lemma:unitary-Wg-expansion1"} and Proposition [\[combinatorial-estimate\]](#combinatorial-estimate){reference-type="ref" reference="combinatorial-estimate"} given in by Theorem 4.6 and Theorem 4.9. We note that in, these two results are slightly more difficult to prove than their unitary counterpart. This yields an orthogonal version of Theorem [\[theorem-with-brackets\]](#theorem-with-brackets){reference-type="ref" reference="theorem-with-brackets"} and Corollary [\[cor:WG2\]](#cor:WG2){reference-type="ref" reference="cor:WG2"}. # Strong asymptotic freeness through non-backtracking operators {#sec:SAFNB} This section aims to extend to general bounded operators in Hilbert spaces. ## Spectral mapping formulas We consider \((b_1, \ldots, b_\ell)\) elements in \(\mathcal B(\mathcal H)\) where \(\mathcal H\) is a Hilbert space. We assume that the set \(\INT{\ell}\) is endowed with an involution \(i \mapsto i^{*}\). The non-backtracking operator associated with the \(\ell\)-tuple of matrices \((b_1, \ldots, b_\ell)\) is the operator on \(\mathcal B(\mathcal H \otimes \mathbb {C}^\ell)\) defined by \[\label{eq:defBB} B = \sum_{j \ne i^*} b_j \otimes E_{ij},\] where \(E_{ij} \in M_\ell( \mathbb {R})\) are the canonical matrix elements. We also define the left non-backtracking operator as \[\label{eq:defBBl} \widetilde B = \sum_{j \ne i^*} b_i \otimes E_{ij}.\] Note that if the \(b_i\)'s are invertible, then \(B\) and \(\widetilde B\) are conjugate \[\widetilde B = D B D^{-1}\] with \(D = \sum_i b_i \otimes E_{ii}\). The non-backtracking operators are used in this paper to give an alternative description of the spectrum of an operator of the form [\[eq:defA\]](#eq:defA){reference-type="eqref" reference="eq:defA"}. We start with a result in the reverse direction. In the sequel for shorter notation, the identity operator in \(\mathcal H\) is denoted by \(1\), and if \(a\) is in \(\mathcal B(\mathcal H)\) and \(\lambda \in \mathbb {C}\), we write \(a-\lambda\) in place of \(a-\lambda 1\). We now consider the situation where the Hilbert space \(\mathcal H\) is of the form \(\mathbb {C}^r \otimes \mathcal K\), where \(\mathcal K\) is a Hilbert space and \[b_i=a_i\otimes V_i\] with \(a_i \in M_r(\mathbb {C})\) and \(V_i\) unitary operator on \(\mathcal K\) such that for all \(i \in \INT{\ell}\), \[V_{i^*} = V_i^*.\] Moreover, we assume that \(\ell = 2 d\) and the involution \(i^*\) is as in Section [2](#sec:main){reference-type="ref" reference="sec:main"}. In this specific case, we have \[\label{eq:defB0} B = \sum_{i \ne j^*} a_j \otimes V_j \otimes E_{ij} \quad \mathrm{ and } \quad \widetilde B = \sum_{i \ne j^*} a_i \otimes V_i \otimes E_{ij}.\] The operator \(A^{(\lambda)}\) in [\[def_AM0\]](#def_AM0){reference-type="eqref" reference="def_AM0"} is given by \[\label{def_AMU} A^{(\lambda)} = a_0 ( \lambda) \otimes 1 + \sum_{i=1}^{2d} a_i (\lambda) \otimes V_i\] with \[\qquad a_i (\lambda) = \lambda a_{i} ( \lambda^2-a_{i^*} a_{i} )^{-1} \quad \mathrm{ and } \quad a_0 ( \lambda) =-1-\sum_{i=1}^{2d} a_{i}( \lambda^2-a_{i^*} a_i )^{-1} a_{i^*}.\] If \(\mathcal K=\ell^2(X)\) with \(X\) countable and \(V_i\) a permutation operator, then Proposition [\[prop:nonbackgeneral\]](#prop:nonbackgeneral){reference-type="ref" reference="prop:nonbackgeneral"} recovers Proposition 9 of up to the minor point that \(B\) is slightly modified into \(B = \sum_{j \ne i^*} a_j\otimes S_i \otimes E_{ij}\), but it is easy to check that both \(B\) are conjugate to each other, so they have the same spectrum. It follows that all results of can be extended to this more general setting. We now review two key results that will be used in the sequel. We take \(\ell = 2d\). We start with a kind of converse of Proposition [\[prop:nonbackgeneral\]](#prop:nonbackgeneral){reference-type="ref" reference="prop:nonbackgeneral"}, in the sense that for a given self-adjoint operator \(A\) of the form \[\label{eq:defA0} A = a_0 \otimes 1 + \sum_{i=1}^{2d} a_i \otimes V_i,\] satisfying the symmetry condition [\[eq:symA\]](#eq:symA){reference-type="eqref" reference="eq:symA"} and a real number \(\mu\), we look for a non-backtracking operator \(B_\mu\) which detects if \(\mu \in \sigma(A)\). To perform this, we need to introduce the resolvent of the operator \(A_\star\) defined in [\[eq:defAfree\]](#eq:defAfree){reference-type="eqref" reference="eq:defAfree"}. For \(\mu \notin \sigma( A_\star)\), we set \[G(\mu) = ( \mu-A_\star )^{-1}.\] For \(x,y\in {\mathbb{F}_d}\), we define \(G_{xy} (\mu) \in M_r(\mathbb {C})\) as the matrix \(P_x G(\mu) P^*_y\) where \(P_x\) is the projection onto the vector space \(\mathbb {C}^r \otimes \delta_x\). We denote by \(o\) the neutral element of \({\mathbb{F}_d}\) for its group structure and \(g_i\) the \(i\)-th generator of \({\mathbb{F}_d}\). Finally, if \(D\) is a bounded set in \(\mathbb {C}\), the convex hull of \(D\) is denoted by \(\mathrm{hull}( D )\). This statement is extended for a general Hilbert space and general unitaries \(V_i\)'s. The same proof applies in this case thanks to Proposition [\[prop:nonbackgeneral\]](#prop:nonbackgeneral){reference-type="ref" reference="prop:nonbackgeneral"}. ## Spectral radius of non-backtracking operators We conclude this section with a sharp criterion to guarantee in terms of non-backtracking operators that the spectrum of an operator \(A\) is in a neighborhood of the spectrum of the operator \(A_\star\). The following result is. Again, thanks to the improvement of Proposition [\[prop:nonbackgeneral\]](#prop:nonbackgeneral){reference-type="ref" reference="prop:nonbackgeneral"}, we can now state it in a more general context. The theorem is a simple consequence of the following two claims: \[\hbox{for any \((b_1,\ldots,b_{2d})\) in \(M_r(\mathbb {C})^{2d}\), } \quad \rho(B_\star) = \sup \{ \lambda \geq 0: \lambda \in \sigma(B_\star) \},\] and \[\label{eq:src} \hbox{the map from \(M_r(\mathbb {C})^{2d}\) to \(\mathbb {R}\): \((b_1,\ldots,b_{2d}) \mapsto \rho(B_\star)\) is continuous.}\] We refer to for details. # Expected high trace of non-backtracking matrices {#sec:trace} In this section, we prove Theorem [\[th:main\]](#th:main){reference-type="ref" reference="th:main"} by computing the spectral radius of the non-backtracking matrices associated to the random matrix \(A\) defined in [\[eq:defA\]](#eq:defA){reference-type="eqref" reference="eq:defA"}. ## Main technical statement We now come back to the setting of Theorem [\[th:main\]](#th:main){reference-type="ref" reference="th:main"}. Let \(U_1, \ldots,U_d\) be independent Haar-distributed random unitary matrices in \(\mathbb{U}_n\). We define \(V_i\) as in [\[eq:defVi\]](#eq:defVi){reference-type="eqref" reference="eq:defVi"} and its centered version \([V_i]\) as in [\[eq:bracket\]](#eq:bracket){reference-type="eqref" reference="eq:bracket"}. The left non-backtracking operator associated to the weights \((a_1 \otimes [V_1],\ldots,a_{2d}\otimes [V_{2d}])\) is \[\label{eq:defBV2} B = \sum_{i \ne j^*} a_i \otimes [V_i] \otimes E_{ij}.\] Note that we have omitted the tilde in [\[eq:defBBl\]](#eq:defBBl){reference-type="eqref" reference="eq:defBBl"} for shorter notation. The main technical result of this section is an upper bound on the spectral radius of \(B\) in terms of the spectral radius of the corresponding operator on the free group \({\mathbb{F}_d}\): \[\label{eq:defBstar} B_\star = \sum_{i\ne j^*} a_i \otimes \lambda(g_i) \otimes E_{ij},\] where \(\lambda(g)\) is the left-regular representation of \(g \in {\mathbb{F}_d}\). Let \(\rho (B_\star)\) be the spectral radius of the \(B_\star\). Recall that \(\rho(B) \leq \| B^\ell \|^{1/\ell}\) for all integer \(\ell \geq 1\) and the sequence \(\| B^\ell \|\) is sub-multiplicative in \(\ell\). In the following subsection, we prove Theorem [\[th:FKB\]](#th:FKB){reference-type="ref" reference="th:FKB"}. In the last subsection, we deduce Theorem [\[th:main\]](#th:main){reference-type="ref" reference="th:main"} from Theorem [\[th:FKB\]](#th:FKB){reference-type="ref" reference="th:FKB"}. ## Proof of Theorem [\[th:FKB\]](#th:FKB){reference-type="ref" reference="th:FKB"} In the sequel, an entry of the matrix \([V_i]\) will be denoted by \[[V_i]_{x y} = [\prod_{p=1}^q U^{\varepsilon_{q}}_i]_{x_p y_p},\] with \(x = (x_1, \ldots, x_q) \in \INT{n}^q\) and \(y = (y_1, \ldots, y_q)\in \INT{n}^q\). We also set \[\vec E = \INT{n}^q \times \INT{2d}.\] In analogy with usual non-bactracking matrices, an element \(e = (x,i)\) of \(\vec E\) is thought as the directed edge attached to \(x\) associated to the \(i\)-th unitary matrix \(V_i\). If \(e = (x,i), f = (y,j) \in \vec E\), the matrix-valued entry \((e,f)\) of \(B\) defined in [\[eq:defBV2\]](#eq:defBV2){reference-type="eqref" reference="eq:defBV2"} is \[\label{eq:defBV20} B_{ef} = a_i [V_i]_{xy} \IND_{i \ne j^*} \in M_r(\mathbb {C}).\] We start with the Weyl formula for the spectral radius. If \(o\) is the unit of \(F_{d}\), we set \[\rho_k = \PAR{ \max \| B_\star^k \varphi\otimes \delta_e \| }^{\frac {1 }{k }},\] where the maximum is over all \(e = (o,i), i \in \INT{2d}\) and \(\varphi \in \mathbb {C}^r\) of unit Euclidean norm. From the Weyl formula, \(\rho_k\) converges to \(\rho( B_\star)\) as \(k\) goes to infinity (see for example ). In the remainder of the proof, we fix \(\varepsilon >0\), then there exists an integer \(k_0\) large enough such that for all \(k \geq k_0\), \[\label{eq:defrho} \rho_k \leq \rho = \rho (B_\star) + \varepsilon.\] Let \(\ell\) be an integer. We fix an integer \(\theta\). To get a good probabilistic estimate, we will upper bound the expectation of \(\NRM{ B ^ {\ell}}^{2\theta}\) for \(\theta\) large enough. We write \[\NRM{ B ^ {\ell}}^{2\theta} = \NRM{ B ^ {\ell} ( B ^ {\ell })^* }^{ \theta } = \NRM{ \PAR{ B ^ {\ell} (B ^ {\ell })^* }^{\theta}}.\] In particular, if \({\rm tr}_{\mathbb {C}^r}\) denotes the partial trace on \(\mathbb {C}^r\) for operators on \(\mathbb {C}^r \otimes \mathbb {C}^{\vec E}\), we get \[\NRM{ B ^ {\ell}}^{2\theta}\leq {\rm tr} \BRA{ {\rm tr}_{\mathbb {C}^r} \BRA{ \PAR{ B ^ {\ell} (B ^ {\ell })^* }^{\theta} }}.\] We expand the trace in terms of the matrix-valued entries of \(B\): \[\begin{aligned} {\rm tr}_{\mathbb {C}^r} \BRA{ \PAR{ B ^ {\ell} (B ^ {\ell })^* }^{\theta} } &=& \sum_{e_\alpha \in \vec E, \alpha \in \INT{2\theta}} \prod_{\alpha=1}^{\theta} (B ^ { \ell} )_{e_{2\alpha-1} e_{2\alpha}} ((B ^ { \ell} )^ *)_{e_{2\alpha}e_{2\alpha+1}}, \end{aligned}\] with \(e_{2\theta +1} =e_1\). We expand further and use that \((B^*)_{ef} = (B_{fe})^*\), we obtain \[\begin{aligned} {\rm tr}_{\mathbb {C}^r} \BRA{ \PAR{ B ^ {\ell} (B ^ {\ell })^* }^{\theta} } & =& \sum_{\gamma} \prod_{\alpha=1}^{2 \theta} \prod_{t=1}^\ell B^{\varepsilon_\alpha}_{\gamma^\alpha_{t} \gamma^\alpha_{t+1}}, \end{aligned}\] with \(B_{ef}^{\varepsilon_\alpha}\) is equal to \(B_{ef}\) for odd \(\alpha\) and \((B_{fe})^*\) for even \(\alpha\) and the sum is over all \(\gamma = (\gamma^1,\ldots,\gamma^{2\theta})\), \(\gamma^\alpha = (\gamma^\alpha_1,\cdots,\gamma^\alpha_{\ell+1})\) in \(\vec E^{\ell+1}\) with the boundary conditions, for all \(\alpha \in \INT{\theta}\), \[\label{eq:bdcond} \gamma^{2\alpha}_1 = \gamma^{2\alpha+1}_1 \quad \mathrm{ and } \quad \gamma^{2\alpha}_{\ell+1} = \gamma^{2\alpha-1}_{\ell+1},\] with the convention \(\gamma^{2\theta +1} = \gamma^1\) Let us write \(\gamma^\alpha_t = (x^\alpha_t,i^\alpha_t)\), \(x^\alpha_t \in \INT{n}^q\) and \(i^\alpha_t \in \INT{2d}\). From [\[eq:defBV20\]](#eq:defBV20){reference-type="eqref" reference="eq:defBV20"}, we find \[{\rm tr}_{\mathbb {C}^r} \BRA{ B ^ { \ell} (B ^ { \ell} )^* } = \sum _{\gamma \in P_{\ell,\theta}} \prod_{\alpha=1}^{2\theta} \prod_{t=1}^\ell a_{i^\alpha_t}^{\varepsilon_\alpha} [V_{i^\alpha_t}]^{\varepsilon_\alpha}_{x^\alpha_t x^\alpha_{t+1}} ,\] where \((a^{\varepsilon_\alpha}_i,[V_{i}]_{xy}^{\varepsilon_\alpha})\) is equal to \((a_i, [V_i]_{xy})\) or \((a_i^* ,[\bar V_i]_{xy})\) depending on the parity of \(\alpha\) and \(P_{\ell,\theta}\) is the set of all \(\gamma = (\gamma^1,\ldots ,\gamma^{2\theta})\) as above which are also non-backtracking, that is, for all \(t \in \INT{\ell}\) and \(\alpha \in \INT{2\theta}\), \[\label{eq:NBi} i^\alpha_{t+1} \ne {i^{\alpha}_t}^*.\] (Note that \([\bar V_i]_{xy} = [V_{i^*}]_{yx}\) by construction). We finally take the expectation and find: \[\label{eq:tr1} \mathbf {E} \NRM{ B ^ {\ell}}^{2\theta} \leq r \sum_{\gamma \in P_{\ell,\theta}} a(\gamma) p(\gamma),\] where we have introduced the algebraic and probabilist weights of an element \(\gamma \in P_\ell\) defined as \[a(\gamma) = \prod_{\alpha = 1}^{2\theta} \NRM{ \prod_{t=1}^\ell a^{\varepsilon_\alpha}_{i^\alpha_t} } \quad \hbox{ and } \quad p(\gamma) = \left| \mathbf {E} \BRA{ \prod_{\alpha = 1}^{2 \theta}\prod_{t=1}^\ell [V_{i^\alpha_t}]^{\varepsilon_\alpha}_{x^\alpha_t x^\alpha_{t+1}}} \right|.\] We organize the terms on the right-hand side of [\[eq:tr1\]](#eq:tr1){reference-type="eqref" reference="eq:tr1"} by introducing the following equivalence class on elements of \(P_{\ell,\theta}\). We write \(\gamma \sim \gamma'\) if there exist a permutation \(\tau\) on \(\INT{n}\) and a family of permutations \((\beta_x)_{x \in \INT{n}}\) on \(\INT{2d}\) such that the image of \(\gamma = (x^\alpha_{t,p},i^\alpha_{t,p})\) by these permutations is \(\gamma' = ((x^\alpha_{t,p})',(i^\alpha_{t,p})')\). More precisely, if for all \(\alpha \in \INT{2\theta}\), \(t \in \INT{\ell}\) and \(p \in \INT{q}\), \(\beta_{x^\alpha_{t,p}}(i_t^\alpha) = (i_t^\alpha)' = \beta_{x^\alpha_{t+1,p}} ((i_t^\alpha )^*)^*\) and \(\tau(x^\alpha_{t,p}) = (x^\alpha_{t,p})'\). In more combinatorial language, if \(P_{\ell,\theta}\) is seen as a collection of labeled paths where the labels are the vertex entries in \(\INT{n}\) and the edge colors in \(\INT{2d}\); an equivalence class is the corresponding unlabeled path. We will use colored graphs defined formally as follows. We now define a colored graph naturally associated with an element \(\gamma \in P_{\ell,\theta}\). We write \(x^{\alpha}_t = (x^{\alpha}_{t,1}, \ldots,x^{\alpha}_{t,q}) \in \INT{n}^q\) and define the colored graph \(G_\gamma = (V_\gamma,E_\gamma)\) with color set \(\INT{2d}\), \(V_\gamma = \{ x^\alpha_{t,p}: \alpha \in \INT{2\theta}, t \in \INT{\ell+1}, p \in \INT{q}\} \subset [n]\) and \(E_\gamma = \{ [ x^\alpha_{t,p} ,i^\alpha_t, x^\alpha_{t+1,p}]: \alpha \in \INT{2\theta}, t \in \INT{\ell}, p \in \INT{q} \}\). The *multiplicity* of an edge \(e \in E_\gamma\) is defined as \(m(e) = \sum_{t\in \INT{\ell},\alpha \in \INT{2\theta},p\in \INT{q}} \IND ( [ x^\alpha_{t,p} ,i^\alpha_t, x^\alpha_{t+1,p}] = e )\). If \(e = |E_\gamma|\), \(e_1\) is the number of edges of multiplicity one and \(e_{\geq 2}\) is the number of edges of multiplicity at least two, we have \[e = e_1 + e_{\geq 2} \quad \mathrm{ and } \quad e_1 + 2 e_{\geq 2} \leq 2 q \ell \theta.\] We deduce that \[\label{eq:bdee1} e \leq q \ell\theta + e_1 /2.\] Moreover, for each \(p \in \INT{q}\) and \(\alpha \in \INT{2\theta}\), the sequence \(\gamma^\alpha_p = ((x^\alpha_{t,p},i^\alpha_{t,p},x^\alpha_{t+1,p}))_{t \in \INT{\ell}}\) is a path in \(G_\gamma\). Besides, from the boundary condition [\[eq:bdcond\]](#eq:bdcond){reference-type="eqref" reference="eq:bdcond"}, for fixed \(p \in \INT{q}\), the sequence of paths \((\gamma^\alpha_p), \alpha \in \INT{2\theta},\) are connected by their ends. It follows that the graph \(G_\gamma\) has at most \(q\) connected components. If \(v =|V_\gamma|\), we deduce that \[\label{eq:genus0} e-v + q \geq 0.\] In particular, combining the last two inequalities, for any \(\gamma \in P_{\ell,\theta}\), \[\label{eq:genus} \chi = q (\ell \theta+1) + e_1/2-v \geq 0.\] For integers \(v, e_1\) such that [\[eq:genus\]](#eq:genus){reference-type="eqref" reference="eq:genus"} holds, we denote by \(P_{\ell,\theta} (v,e_1)\) the set of elements in \(P_{\ell,\theta}\) with \(v\) vertices and \(e_1\) edges of multiplicity one. Note that if \(\gamma \sim \gamma'\), the number of vertices and the number of edges with a given multiplicity are equal. It follows that we may define \(\mathcal {P}_{\ell,\theta} (v,e_1)\) as the set of equivalence classes with \(v\) vertices and \(e_1\) edges of multiplicity one. Our first lemma is a rough bound on \(\mathcal {P}_{\ell,\theta} (v,e_1)\). We now estimate the probabilistic weight \(p(\gamma)\). To this end, we introduce a finer partition of the set \(P_{\ell,\theta}\). Let \(\gamma \in P_{\ell,\theta}\) with \(\gamma^{\alpha}_t = (x^{\alpha}_t,i^{\alpha}_t), t \in \INT{\ell+1}\). We define a *bracket* as a colored edge \([x, i ,y]\) on \(\INT{n}^q\) with color set \(\INT{2d}\) (in the sense of Definition [\[def:colorgraph\]](#def:colorgraph){reference-type="ref" reference="def:colorgraph"}). We associate to \(\gamma\) the sequence of brackets \(([x^{\alpha}_t, i^{\alpha}_t ,x^{\alpha}_{t+1}])\), \(t \in \INT{\ell}, \alpha \in \INT{2\theta}\). We say that a bracket \([x^{\alpha}_t, i^\alpha_t ,x^{\alpha}_{t+1}]\) of \(\gamma\) is *isolated* if for all \(p \in \INT{q}\), the colored edge of \(G_\gamma\), \(e = [x^{\alpha}_{t,p}, i^{\alpha}_t ,x^{\alpha}_{t+1,p}]\) is not visited at a different time: that is for all \((t',\alpha',p') \in \INT{\ell}\times \INT{2\theta}\times \INT{q}\) with \((t',\alpha') \ne (t,\alpha)\), we have \(e \ne [x^{\alpha'}_{t',p'}, i^{\alpha'}_{t'} ,x^{\alpha'}_{t'+1,p'}]\). For integer \(b\), we denote by \(P_{\ell,\theta} ( v,e_1,b)\) the set of \(\gamma \in P_{\ell,\theta} (v,e_1)\) with \(b\) isolated brackets. Our final lemma is the estimation of \(\sum a(\gamma)\) where the sum is over an equivalence class. This is our main combinatorial ingredient. We start with a preliminary lemma. We may now prove Lemma [\[le:agamma\]](#le:agamma){reference-type="ref" reference="le:agamma"}. All ingredients are gathered to prove Theorem [\[th:FKB\]](#th:FKB){reference-type="ref" reference="th:FKB"}. ## Proof of Theorem [\[th:main\]](#th:main){reference-type="ref" reference="th:main"} The orthogonal projection of \(A\) defined in [\[eq:defA\]](#eq:defA){reference-type="eqref" reference="eq:defA"} onto \(H_r^\perp\) can be written as \[\label{eq:def[A]} [A] = a_0 \otimes 1 + \sum_{i=1}^{2d} a_i \otimes [V_i].\] We fix \(\varepsilon >0\) and let \(\delta = \delta(\varepsilon)\) be as in Theorem [\[prop:edgeAB\]](#prop:edgeAB){reference-type="ref" reference="prop:edgeAB"}(ii). In view of Theorem [\[prop:edgeAB\]](#prop:edgeAB){reference-type="ref" reference="prop:edgeAB"}, the event \[\BRA{ \| A_{|H_r^\perp} \| \geq \| A_\star \| + \varepsilon }\] is contained in the event \[{\mathcal{E}}_\varepsilon = \bigcup_{a = (a_1,\ldots a_{2d}) \in S^{2d}_\varepsilon} {\mathcal{E}}_{\delta}(a),\] where \[{\mathcal{E}}_\delta (a) = \{ \rho(B) \geq \rho(B_\star) + \delta \},\] with \(B = B(a)\) is an in [\[eq:defBV2\]](#eq:defBV2){reference-type="eqref" reference="eq:defBV2"}, \(B_\star(a) = B_\star\) is as in [\[eq:defBstar\]](#eq:defBstar){reference-type="eqref" reference="eq:defBstar"} and \[S_\varepsilon = \{ b \in M_r(\mathbb {C}): \| b \| \leq \varepsilon^{-1} \}.\] To prove Theorem [\[th:main\]](#th:main){reference-type="ref" reference="th:main"} it is thus sufficient to check that for any \(\varepsilon >0\), for all \(n\) large enough, \[\label{eq:tdb0} \mathbb{P} ( {\mathcal{E}}_\varepsilon) \leq n^{-2}.\] To prove [\[eq:tdb0\]](#eq:tdb0){reference-type="eqref" reference="eq:tdb0"}, we need to use a net on \(S_\varepsilon^{2d}\). A similar argument appears in. Due to the lack of uniform continuity of spectral radii, we perform the net argument with operator norms. From [\[eq:defBV2\]](#eq:defBV2){reference-type="eqref" reference="eq:defBV2"}, for \(a \in M_r(\mathbb {C})^{2d}\), the map \(a \mapsto B(a)\) is linear and \(\| B(a ) \| \leq (2d-1) \| a \|\), where \[\| a \| = \sum_{i =1}^{2d} \| a_i \|.\] Let \(\ell = \lfloor C q \rfloor\) be as in Theorem [\[th:FKB\]](#th:FKB){reference-type="ref" reference="th:FKB"}. The map \(a \mapsto B^\ell (a)\) satisfies a deviation inequality \[\begin{aligned} \| B^{\ell} (a )-B^{\ell} (a') \| & \leq & \ell \max( \| B (a) \|, \|B (a') \| )^{\ell-1} \| B (a-a') \| \nonumber \\ &\leq &\ell (2d-1)^\ell \max( \| a \|, \| a' \| ) ^{\ell-1} \| a-a' \|. \label{eq:LIPB} \end{aligned}\] For a given \(\eta >0\), the net \(N_\eta\) of \(S_\varepsilon^{2d}\) is built as follows. First, since all matrix norms are equivalent and \(M_r( \mathbb {C}) \simeq \mathbb {R}^{2r^2}\), there exists a subset \(N^1 _{\eta} \subset \{ b \in M_r(\mathbb {C}): \| b\| \leq \varepsilon^{-1}\}\) of cardinality at most \(( c / (\varepsilon \eta) )^{2r^2}\) such that for any \(b \in S_\varepsilon\), there exists \(b' \in N_\eta\) with \(\| b-b' \| \leq \eta\) (the constant \(c\) depends on \(r\)). We set \(N_\eta = (N^1_\eta)^{2d}\). From [\[eq:LIPB\]](#eq:LIPB){reference-type="eqref" reference="eq:LIPB"}, for some new constant \(c >0\) (depending on \(\varepsilon,r,d\)), for any \(a \in S_\varepsilon\), there exists \(a' \in N_\eta\) such that \[\| B^{\ell} (a )-B^{\ell} (a') \| \leq \ell (2d-1) \PAR{\frac{ 2d-1}{ \varepsilon}}^{\ell-1} \eta \leq c^\ell \eta.\] Besides, from [\[eq:src\]](#eq:src){reference-type="eqref" reference="eq:src"}, for all \(\eta \leq \eta_0\) small enough, \[\label{eq:contrhoB} \left| \rho(B_\star(a))-\rho(B_\star (a')) \right|\leq \frac \delta 3,\] If \(\eta=\min(\eta_0, (\delta / 3 c)^\ell )\) and \(\mathcal E_{\delta / 3} (a')\) does not hold, we deduce that \[\begin{aligned} \| B^{\ell} (a) \| & \leq & \| B^{\ell} (a')\| + \| B^{\ell} (a )-B^{\ell} (a') \| \\ & < & \PAR{ \rho(B_\star (a')) + \frac \delta 3 }^\ell + \PAR{\frac \delta 3 }^\ell \\ & < & \PAR{ \rho(B_\star (a')) +\frac {2\delta} 3 }^\ell \\ & < & \PAR{ \rho(B_\star (a)) +\delta }^\ell, \end{aligned}\] where we have used [\[eq:contrhoB\]](#eq:contrhoB){reference-type="eqref" reference="eq:contrhoB"} at the last line. We find that, for our choice of \(\eta\), \[{\mathcal{E}}_\varepsilon = \bigcup_{a \in S_\varepsilon^{2d}} \mathcal E_\delta (a) \subset \bigcup_{a \in N_\eta} \mathcal E _{\delta / 3} (a),\] and, for some \(c_1 >0\) (depending on \(\varepsilon\), \(r\) and \(d\)), \[\label{eq:epsnet} | N_\eta| \leq c_1 ^\ell.\] We may now use the union bound to obtain an estimate of [\[eq:tdb0\]](#eq:tdb0){reference-type="eqref" reference="eq:tdb0"}: \[\begin{aligned} \mathbb{P} \PAR{ \mathcal E_\varepsilon } & \leq & \sum_{a \in N_\eta} \mathbb{P}\PAR{ \mathcal E _{\delta / 3} (a)} \\ & \leq & |N_\eta | C \exp (-(\ln n)^2 ), \end{aligned}\] where at the second line, we have used Theorem [\[th:FKB\]](#th:FKB){reference-type="ref" reference="th:FKB"} (the constant \(C\) depends on \(\varepsilon,d,r\)). For our choice of \(\ell\), we have \(|N_{\eta}| \leq c_1^\ell \leq n\) for all \(n\) large enough. The bound [\[eq:tdb0\]](#eq:tdb0){reference-type="eqref" reference="eq:tdb0"} follows. 0◻ # Appendix: Effective linearization for unitaries {#sec:appendix} To prove the strong convergence, we rely on the following variant of a Theorem by Pisier: In particular, it means that given a non-commutative polynomial in \(U_i\), its norm is determined by the collection of all \(\{||\sum_{i=-d}^da_i\otimes U_i||,a_i\in M_k(\mathbb {C}),i\in\{-d,\ldots, d\}, k\in\mathbb{N}_*\}\). However, the theorem does not make this dependence explicit. This section aims to make this dependence explicit and robust enough to allow concrete estimates for convergence speeds for any non-commutative polynomial. Before, let us outline how we use Theorem [\[thm-pisier\]](#thm-pisier){reference-type="ref" reference="thm-pisier"}. We replace \(A\) by a sequence of unital \(C^*\)-algebras \(A^{(n)}\) and \(U_i\) by \(U_i^{(n)}\). Let \(\mathbb{C}[{\mathbb{F}_d}]\) be the \(*\)-algebra of the free group and \(P\in \mathbb{C}[{\mathbb{F}_d}]\), where the canonical generators of \({\mathbb{F}_d}\) are \(u_1,\ldots, u_d\). The map \(u_i\mapsto U_i\) generates a \(*\)-homomorphism \(\mathbb{C}[{\mathbb{F}_d}]\to A\) which we denote by \(P\mapsto P_U\). Likewise, we have a \(*\)-homomorphism \(\mathbb{C}[{\mathbb{F}_d}]\to A\) which we denote by \(P\mapsto P_V\). If, for any \(k\in\mathbb{N}_*\) and for any \(a_{-d},\ldots ,a_d\in M_k(\mathbb {C})\), \[\lim_n||\sum_{i=-d}^da_i\otimes U_i^{(n)}||=||\sum_{i=-d}^da_i\otimes V_i||,\] then \[\lim_n||P_{U^{(n)}}||=||P_V||.\] Indeed, if consider the \(C^*\)-algebra \(A=\prod_{n\ge 1}A^{(n)}/\mathcal{I}\) where \(\mathcal{I}\) is the two-sided ideal of sequences of elements in \(A^{(n)}\) whose norm tends to zero as \(n\to \infty\), and call \(U_i\) the image of \((U_i^{(n)})_{n\ge 1}\) under taking the quotient. Then, since finite-dimensional matrix algebras are exact, the \(C^*\) subalgebra of \(A\) generated by \(U_i\) satisfies the hypotheses of Pisier's proposition. Thus, the isomorphism of the conclusion and the definition of \(A\) ensures that \(\lim_n||P_{U^{(n)}}||=||P_V||\) for any \(P\in \mathbb{C}[{\mathbb{F}_d}]\). As mentioned above, Pisier's theorem is non-constructive. Let us outline the idea of its proof. In the language of operator spaces, the map \(U_i\to V_i\) is a completely contractive map from the operator space \(\text{span} (U_i)\) to \(\text{span} (V_i)\). Therefore, the Arveson-Wittstock extension theorem applies and yields an unital completely contractive map from \(A\) to \(B\). The classification of completely contractive maps from \(A\) to \(B\) (Stinespring theorem) and the fact that the generators are unitaries implies that this complete contraction must be an isometric homomorphism, which concludes the proof. Let us digress and compare with Haagerup and Thorbjørnsen's result in, where the first statement of a linearization argument can be found for selfadjoint elements. Two remarks are in order. As for Pisier's result, the initial version is not constructive. A constructive version has been found later, see, e.g.,, Chapter 10 for a comprehensive explanation. Interestingly, Pisier's assumptions are simpler because only an equality on the norm of linear pencils is required. In contrast, for Haagerup and Thorbjørnsen, an equality of spectrum is needed (which looks stronger at first sight). As far as we can tell, a constructive proof of Pisier has not been given yet. We fill in this gap by providing a linearization. It is to be noted that this linearization does not require knowledge about the inverse of matrices. The first lemma proves that it is enough to restrict to selfadjoint pencils and that the result also extends to all rectangular matrix coefficients. The second lemma proves that it is enough to restrict to positive pencils. We also need the following crucial technical lemma Following notations of operator systems, we call \[S_k(U)=\text{span} \{\sum_{i=-d}^da_i\otimes U_i, a_i\in M_k(\mathbb {C})\},\] and \(S_k(U)^{(l)}\) the vector space spanned by the product of all \(l\)-tuples of elements in \(S_k(U)\). By definition, \(S_k(U)=S_k(U)^{(1)}\). In addition, one checks that \(S_k(U)^{(l)}\subset S_k(U)^{(l+1)}\) and \(\cup_{l\ge 1} S_k(U)^{(l)}\) is \(M_k(\mathbb {C})\) tensored by the \(*\)-algebra generated by \(U_i\). For what follows, we extend the homomorphism \(\mathbb{C}[F_d]\to A\) by tensorising by matrices, and we keep the same notation \(P\mapsto P_U\) (resp. \(P\mapsto P_V\) for the homomorphism \(M_k(\mathbb {C} )\otimes\mathbb{C}[{\mathbb{F}_d}]\to M_k(\mathbb {C} )\otimes A\)). The following lemma concludes the proof Two remarks are in order. Firstly, the above argument is specific to unitaries. Indeed, if one replaces unitaries with selfadjoint elements, the proof of the lemma [\[lem-specific-to-unitaries\]](#lem-specific-to-unitaries){reference-type="ref" reference="lem-specific-to-unitaries"} breaks down. For example, it does not a priori allow to construct \(X_1^2-X_2^2 +c1\) as a square of polynomials. Secondly, by following the same reasoning, the lemma can be quantitatively improved as follows. If instead of an equality, assume we have an inequality of the following type: there exists \(\varepsilon_n >0\) tending to zero as \(n\to\infty\) such that \(||P_{U^{(n)}}||\le ||P_V||(1+\varepsilon_n)\). Then, \(||Q_U+c1_A|| \le ||Q_V+c1_B||(1+\varepsilon_n)^2\). Since an upper bound on an appropriate \(c\) can be given as a function of the norm of each matrix coefficient attached to a group element, there exists a constant \(C\) that depends explicitly on \(P\in M_k(\mathbb {C} )\otimes\mathbb{C}[{\mathbb{F}_d}]\) (and on nothing else) such that for \(n\) large enough, \[||Q_{U^{(n)}}|| \le ||Q_V||(1+C \varepsilon_n).\] Naturally, an inequality in the opposite direction can be obtained similarly. Iterating, we obtain the following In addition, uniform bounds in the \(a_i\)'s on the speed of convergence of \(||\sum_{i=-d}^da_i\otimes U_i^{(n)}||\) are not needed, and the final estimate \(||P_{U^{(n)}}||-||P_V||=O(\varepsilon_n)\) can be made explicit as a function of \(P\) and the \(a_i\)'s.
{'timestamp': '2022-11-22T02:19:55', 'yymm': '2012', 'arxiv_id': '2012.08759', 'language': 'en', 'url': 'https://arxiv.org/abs/2012.08759'}
null
null
# Abstract {#abstract .unnumbered} The Generalised Differential Image Motion Monitor (GDIMM) was proposed a few years ago as a new generation instrument for turbulence monitoring. It measures integrated parameters of the optical turbulence, i.e the seeing, isoplanatic angle, scintillation index, coherence time and wavefront coherence outer scale. GDIMM is based on a fully automatic small telescope (28cm diameter), equipped with a 3-holes mask at its entrance pupil. The instrument is installed at the Calern observatory (France) and performs continuous night-time monitoring of turbulence parameters. In this communication we present long-term and seasonnal statistics obtained at Calern, and combine GDIMM data to provide quantities such as the equivalent turbulence altitude and the effective wind speed. # INTRODUCTION {#par:intro} The Generalized Differential Image Monitor (GDIMM) is an instrument designed to monitor integrated parameters of the atmospheric turbulence above astronomical observatories. It provides the seeing \(\epsilon_0\), the isoplanatic angle \(\theta_0\), the scintillation index \(s_0\), the coherence time \(\tau_0\) and the spatial coherence outer scale \({\cal L}_0\). The 3 parameters \(\epsilon_0\), \(\theta_0\) and \(\tau_0\) are of fundamental importance for adative optics (AO) correction. The scintillation has a strong impact on photometric signals from astronomical sources as well as on optical telecommunications with satellites. The outer scale \({\cal L}_0\) has a significant effect for large diameter telescopes (8m and above) and impacts low Zernike mode such as tip-tilt. The GDIMM is at the moment the only monitor to provide simultaneously all these parameters. GDIMM was proposed in 2014 to replace the old-generation turbulence monitor GSM. It is a compact instrument very similar to a DIMM, with 3 sub-apertures of different diameters. GDIMM observes bright single stars up to magnitude \(V\sim 2\), at zenith distances up to 30\(^\circ\). After a period of developpement and tests in 2013--2015, the GDIMM is operational since the end of 2015, as a part of the Calern atmospheric Turbulence Station (Côte d'Azur Observatory--Calern site, France, UAI code: 010, Latitude=\(43^\circ 45' 13''\) N, Longitude=\(06^\circ 55' 22''\) E). GDIMM provides continuous monitoring of 5 turbulence parameters (\(\epsilon_0\), \(s_0\), \(\theta_0\), \(\tau_0\) and \({\cal L}_0\)) above the Calern Observatory. Data are displayed in real time through a website (`cats.oca.eu`), as a service available to all observers at Calern. The other objective is that Calern becomes an operational on-sky test platform for the validation of new concepts and components in order to overcome current limitations of high angular resolution existing systems. Several activities regarding adaptive optics are operated at the MéO and C2PU telescopes and they benefit of the data given by the CATS station. The present communication is an update of previous papers. We describe last improvements and the present status of the instrument in Sect. [2](#par:obs){reference-type="ref" reference="par:obs"}. Long-term statistics (5 years) of turbulence above the Plateau de Calern are presented in Sect. [3](#par:stats){reference-type="ref" reference="par:stats"}. # OBSERVATIONS AND DATA PROCESSING {#par:obs} GDIMM is based on a small commercial telescope (diameter 28cm) equipped with a 3 apertures pupil mask. 2 sub-pupils have a diameter of 6cm and are equipped with glass prisms oriented to give opposite tilts to the incident light. The 3rd sub-aperture is circular, its diameter is 10cm and it has a central obstruction of 4cm: this particular geometry is required to estimate the isoplanatic angle from the scintillation index. At the focus of the telescope images are recorded by a fast camera allowing a framerate of 100 frames per second. Turbulence parameters are estimated on data cubes containing 2048 images. The first half of these cubes are taken with an exposure time of 5ms, the second half with 10ms, to allow compensation of the bias due to the exposure time. A set of parameter is calculated every 2mn and sent to a database accessible worldwide via a web interface (`cats.oca.eu`). More details are given in previous papers. The dataset analyzed here covers the period March 2015 to September 2020. The number of data points collected each month of the period is displayed in Fig. [\[fig:nbdata\]](#fig:nbdata){reference-type="ref" reference="fig:nbdata"} (left). As the robotization of the instrument progressed during the years 2015--2016, the number of data increased. At the beginning of 2019, for a few months, we reduced the delay between successive acquisitions from 2 mn to 1mn, this resulted in a larger number of data (up to \(\sim 10^4\) in Februrary 2019). Fig. [\[fig:nbdata\]](#fig:nbdata){reference-type="ref" reference="fig:nbdata"} (right) shows the total number of measurements per month. Two periods in the year present a smaller number of data: April-May and November. They correspond to technical failures or adverse weather (in particular the spring 2018 was very bad and rainy, and the gap in April 2020 was due to the covid-19 lockdown). # STATISTICS AT THE CALERN OBSERVATORY {#par:stats} ::: We collected about 148 000 turbulence parameter sets during the 5 year period. The number for the outer scale \({\cal L}_0\) is lower (54 000): this parameter is sensitive to telescope vibrations and a reliable value is not always available. Statistics are presented in Table [1](#table:paramstat){reference-type="ref" reference="table:paramstat"} for the 5 turbulence parameters (\(\epsilon_0\), \(s_0\), \(\theta_0\) \(\tau_0\), \({\cal L}_0\)). Note that the scintillation index \(s_0\) is measured through a 10cm diameter sub-pupil: this causes a low-pass spatial filtering and values are lower than the actual scintillation defined for a zero-diameter pupil. We also provide values for the equivalent turbulence altitude \(\bar h\) and the effective wind speed \(\bar v\) (weighted average of the wind speed over the whole atmosphere). A definition of these quantities can be found in papers by Roddier, and we estimated them by the following equations: \[\bar{v}=0.31 \frac{r_0}{\tau_0}\] and \[\bar{h}=0.31 \frac{r_0}{\theta_0}\] Histograms are displayed in Fig. [\[fig:paramshisto\]](#fig:paramshisto){reference-type="ref" reference="fig:paramshisto"} and show a classical log-normal shape for all parameters. We did not display the scintillation histogram since is is directly deduced from \(\theta_0\) by an exact analytic relation. A comparison with other astronomical sites in the world (examples for Paranal, La Silla and Mauna Kea are given in Table [1](#table:paramstat){reference-type="ref" reference="table:paramstat"}) show that the Calern plateau is an average site. Fig. [\[fig:params_vs_month\]](#fig:params_vs_month){reference-type="ref" reference="fig:params_vs_month"} displays the monthly evolution of parameters. The seeing is slightly lower in summer, we measured a median value of \(1.06''\) in July and August (the median winter seeing during the period November--March is 1.34\(''\)). As a consequence, the median coherence time is higher in summer (2.24ms in July--August, 1.78ms in November--March). Also, Fig. [\[fig:hourlyseeingtau0\]](#fig:hourlyseeingtau0){reference-type="ref" reference="fig:hourlyseeingtau0"} shows that, in Summer, there is a dependence of \(\epsilon_0\) and \(\tau_0\) with time. The median seeing decreases below 0.8\(''\) at the end of the night (while the coherence time increases). Nothing similar was observed during the winter. The isoplanatic angle and the outer scale didn't show any noticeable time dependence, both in summer and winter. The outer scale \({\cal L}_0\) has values similar to other sites such as Mauna Kea or La Silla. Sequences of several hours of good seeing were sometimes observed, which is a good point for this site (and already known by "old" observers on interferometers during the 80's and 90's). An exemple is shown on Fig. [\[fig:seeingtsgood\]](#fig:seeingtsgood){reference-type="ref" reference="fig:seeingtsgood"}. It is a time series recorded on Jan. 1st, 2020, showing a seeing below 1\(''\) during 12 hours, the median seeing for that night was 0.69\(''\). Fig. [\[fig:histseeingfit\]](#fig:histseeingfit){reference-type="ref" reference="fig:histseeingfit"} displays seasonal seeing histograms, calculated for the summer (July and August) and the winter (November--March). They appear to be well modelled by a sum of two log-normal functions (they appear as dashed curves on the plots, their sum is the solid line). This is an evidence of the existence of two regimes: a "good seeing" distribution \(\phi_1\) with a median value \(\epsilon_1\) and a "medium seeing" distribution \(\phi_2\) with a median value \(\epsilon_2\). In summer, we have \(\epsilon_1=0.68''\) (the good seeing distribution contains 20% of the data) and \(\epsilon_2=1.04''\) (80% of the data). In winter we have \(\epsilon_1=0.76''\) (21% of the data) and \(\epsilon_2=1.25''\) (79% of the data). The time series displayed in Fig. [\[fig:seeingtsgood\]](#fig:seeingtsgood){reference-type="ref" reference="fig:seeingtsgood"} corresponds to a realisation of the good seeing distribution, during 12 hours. ## Temporal stability of parameters {#temporal-stability-of-parameters .unnumbered} The stability of turbulence parameters is an important concern. Temporal fluctuations were studied by different authors. The characteristic time of stability is generally of a few minutes for temperate sites (e.g. Mauna Kea and La Silla). We define here an interval of stability as a continuous period of time \(t_s\) in which a parameter is *better* than a given threshold \(x_0\). The term *better* means *lower* for the seeing, as low values of the seeing correspond to high Strehl ratio. It means *higher* for the coherence time and isoplanatic angle. In this interval, we allow the parameter to be better than \(x_0\) during a few minutes (we took 4 mn, i.e. two sampling intervals of parameter time series). For a given value of \(x_0\), we calculate the distribution of \(t_s\) on the whole dataset. Its median value gives the characteristic time of stability. This approach was the one used for the site characterization of Dome C by means of DIMMs and Single Star Scidar. We performed this analysis for the 3 parameters \(\epsilon_0\), \(\tau_0\) and \(\theta_0\), for the summer and the winter periods. We could not obtain results for the outer scale, since it is not always measurable because of telescope vibrations (data sequences show large gaps that hamper the calculation of \(t_s\)). Results are displayed in Fig [\[fig:stability\]](#fig:stability){reference-type="ref" reference="fig:stability"}. For the seeing, the characteristic time increases with the seeing value and saturates. It is of the order of 20mn for seeing values around \(1''\), and is longer during the summer. For \(\tau_0\) and \(\theta_0\) we observe that \(t_s\) decrease with the threshold \(x_0\), down to a value of \(\sim\)`<!-- -->`{=html}10mn. Here again, summer conditions appear to be slightly more stable. Note that the curves are likely to be biased by interruptions of the observations (change of target star, clouds, day-night cycle). But the mean value of uninterrupted sequences duration is \(\sim 150\)mn, much larger than the characteristic stability times. # CONCLUSION We have presented statistics of optical turbulence parameters above the plateau de Calern, measured for five years with the GDIMM monitor. GDIMM is a part of the CATS station which aims at monitoring atmospheric turbulence parameters and vertical profiles on the site of Calern. The station is fully automatic, using informations from a meteo station and an All-Sky camera to replace human interventions. Seeing and isoplanatic measurements are given by differential motions and scintillation, according to well known techniques. The coherence time is derived from AA structure functions. The method is simple and has proven to give satisfactory results. It may be used as well with a classical DIMM providing that the acquisition camera is fast enough (typically 100 frames/sec) to properly sample the AA correlation times. The outer scale is derived from ratios of absolute to relative AA motions. This parameter is the most sensitive to telescope vibrations, and requires a good stability of the telescope mount and pillar. Simultaneous observations of GDIMM and another instrument, the Profiler of Moon Limb, which estimates the vertical profile of turbulence, gave concordant results. A portable version of the GDIMM has been developped in parallel to the Calern one, to perform turbulence measurements at any site on the world. Discussions with the ESO (European Southern Observatory) are currently in progress to make observations at Paranal and Armazones.
{'timestamp': '2020-12-18T02:21:29', 'yymm': '2012', 'arxiv_id': '2012.08818', 'language': 'en', 'url': 'https://arxiv.org/abs/2012.08818'}
# Introduction Many generations of astronomers have been seraching for the possible existence of exoplanets before the end of twentieth century (Briot & Schneider 2018) with the discovery of 51 Peg b (Mayor & Queloz 1995). Since then, exoplanetary science has witnessed a boom that has made it one of the most studied branches of astronomy. Although the initial success in discovering exoplanets came from the results of the Doppler method, the transit method has played the most dominating role in discovering new exoplanets. This is due to space-based surveys like Kepler (Borucki et al 2010), K2 (Howell et al. 2014), Convection, Rotation and planetary Transits (CoRoT, Baglin et al. 2006) and also, the recently launched Transiting Exoplanet Survey Satellite (TESS, Ricker et al. 2015). However, transit surveys from ground-based observing facilities have also contributed significantly in discovering transiting exoplanets owing to the surveys such as the Hungarian-made Automated Telescope Network (HATNet, Bakos et al. 2004), The Hungarian-made Automated Telescope Network-South (HATSouth, Bakos et al. 2013), Trans-Atlantic Exoplanet Survey (TrES, Alonso et al. 2004), Super Wide Angle Search for Planets (SuperWASP, Pollacco et al. 2006), Kilodegree Extremely Little Telescope (KELT, Pepper et al. 2007), Qatar Exoplanet Survey (QES, Alsubai et al. 2013), Multi-site All-Sky CAmeRA (MASCARA, Talens et al. 2017) survey to name a few. These surveys preferably detect short period, close-in planets. Ground-based telescopes also provide follow-up observations to confirm the transiting nature of exoplanets discovered from space surveys. The additional contributions from ground-based telescopes are to cover a large field-of-view and to carry out extensive follow-up observation programs which improve the orbital parameters of a planetary system. These observations can also be used for the analysis of the transit timing variations (TTVs) over a longer time baseline. In essence, a TTV is the transit time deviation from a linear ephemeris which provides clues about the existence of another planet in the system (Agol et al. 2005, Agol & Fabrycky 2017, Sun et al. 2017, Linial et al. 2018, Baştürk et al. 2019). In fact, TTVs have not only led to the discoveries of new exoplanets (Nesvorný et al. 2012, Ioannidis et al. 2014, Fox & Wiegert 2019, Sun et al. 2019), but also become a tool to characterize the bulk composition of exoplanets (Jontof-Hutter et al. 2015, Kipping et al. 2019). Motivated by these important results, Holczer et al. (2016) constructed a transit timing catalog of 2599 Kepler Objects of Interest, which will be very useful for further TTV studies. As discussed by Baştürk et al. (2019), Saturn mass planets are interesting for their densities and orbital properties. HAT-P-12b is a low-density, moderately irradiated, sub-Saturn mass (\(m_p= 0.211\pm0.012 M_J\)) transiting exoplanet whose discovery was reported by Hartman et al. (2009) using the HAT-5 telescope (located in Arizona) of HATNet (Bakos et al. 2004). HAT-P-12b orbits a moderately bright (\(V\sim12.8\)), metal-poor K4 dwarf within a period of \(\sim\)`<!-- -->`{=html}3.21 days (Hartman et al. 2009). By the time of its discovery, it was the least massive H/He-dominated gas giant planet. Because the above characteristics are very different from Jupiter-mass close-in exoplanets, HAT-P-12b has been studied through the methods of photometric transit observations, radial velocity measurements, and transmission spectroscopy by many groups. Lee et al. (2012) used follow-up observations to improve the ephemeris of the system. Likewise, Sada et al. (2012) published \(J\)-band transit light curves for HAT-P-12b. Todorov et al. (2013) observed the secondary eclipses using the IRAC instrument on the *Spitzer Space Telescope*. They did not detect eclipses at either 4.5 \(\mu\)m or 3.6 \(\mu\)m wavelengths. The radial velocity measurements of the planet were produced by Kunston et al. (2014) and Ment et al. (2018). Mancini et al. (2018) used HARPS-N high-precision radial velocity measurements to analyze the Rossiter-McLaughlin effect. They determined the sky-projected obliquity (\(\lambda=-54^{\circ}\,^{+41^{\circ}}_{-13^{\circ}}\)) for HAT-P-12b. Sada & Ramon-Fox (2016) combined publicly available light curves with radial velocity measurements and determine physical and orbital parameters for HAT-P-12b. Spectroscopically, Line et al. (2013) presented an NIR transmission spectrum for the system using HST WFC-3. They found a lack of water absorption feature for a hydrogen-dominated atmosphere. Alexoudi et al. (2018) performed a homogeneous analysis which included published data from Sing et al. (2016) and their own data and obtained a transmission spectrum with a low-amplitude spectral slope. The above discussion shows that the determination of updated orbital parameters is very important as small deviations in these values could lead to different physical parameters and structures of exoplanets. Motivated by this, through a homogeneous long baseline TTV analysis, here we present a comprehensive study of HAT-P-12b with observations combining our new observations with the publicly available published light curves. We include the light curves from the discovery paper of HAT-P-12b (Hartman et al. 2009), up to very recent observations, in order to cover a large range of 1160 epochs, where the entire data has a time baseline of \(\sim10.2\) years. The data used in this work and its basic reduction procedure are given in Section [2](#OBS){reference-type="ref" reference="OBS"}. The analysis of the light curves using Markov-Chain Monte-Carlo (MCMC) techniques is described in Section [3](#TAP){reference-type="ref" reference="TAP"}. Section [4](#TTV){reference-type="ref" reference="TTV"} describes a new ephemeris using linear fitting as well as a frequency analysis and corresponding \(O-C\) diagrams. Section [5](#dynamics){reference-type="ref" reference="dynamics"} presents the dynamical two-planet model. Finally, the conclusions of this study are presented in Section [6](#CONC){reference-type="ref" reference="CONC"}. # The Data and Reduction Procedures {#OBS} Among our data, we used three transit observations from the 60 inch telescope (P60) installed at the Palomar Observatory in California, USA. Two light curves were observed with 32 inch telescope at Tenagra Observatory in Arizona, USA. The Purple Mountain Observatory's 40 inch Near-Earth Object Survey Telescope at the Xuyi Station provided another light curve's data used in this study. The log of the observations is listed in Table [\[log\]](#log){reference-type="ref" reference="log"}. The 'run' in the table is in accordance to the date of observation. The observed CCD images first went through some standard procedures such as bias subtraction, flat-fielding, dark frames (when needed) and cosmic rays removal with Image Reduction and Analysis Facility (IRAF[^1]). Before conducting photometry of the images, the images were first aligned using the 'xregister' task of IRAF. The photometry of the 'cleaned' images is conducted using the 'apphot' task in the 'digiphot' routine. The initial step in aperture photometry is to find/detect the stars in the image. IRAF task 'daofind' finds stars in the image and lists them in a file. The next step in aperture photometry gives the flux value of the stars. IRAF task 'phot' serves this purpose. Once we have the fluxes of stars, we conduct differential photometry. In differential photometry, the target star's flux (or magnitude) is presented with respect to one or multiple comparison stars (e.g. Sariya et al. 2013, Jiang et al. 2013, 2016). The selected comparison stars should not be of a variable nature. Differential photometry cancels out the corrections required for the airmass and exposure time. It is also useful when the observing conditions are not the best. For the HAT-P-12b data, we selected the comparison stars having the same instrumental magnitude and neighboring position to the target star (HAT-P-12) in the CCD frames. For the TTV analysis, it is always best to include the published light curves with the new observations as a longer time baseline assures a better ephemeris. We have, therefore, used three light curves from Hartman et al. (2009), three light curves from Lee et al. (2012), ten light curves from Mancini et al. (2018) and nine light curves from Alexoudi et al. (2018). The total time duration covered by the data thus becomes slightly more than a decade. We did not simply use the mid-transit times for the published light curves given in the respective papers. Instead, we applied the same procedure on those light curves that we applied to our data. This approach removes any systematics while performing parameter fitting and provides more consistent inputs for the TTV analysis. The light curves were then processed through a normalization routine to get rid of the effects caused by the airmass. For this purpose, we adopted the procedure described by Murgas et al. (2014) wherein a third degree polynomial is used to model the airmass. The observed flux of a light curve \(F_0(t)\) can be represented as: \[F_0(t)=F(t)\mathcal{P}(t),\] where \(F(t)\) is the normalized flux of the light curve which will be used in the further analysis and \(\mathcal{P}(t) = a_0 + a_1 t + a_2 t^2+ a_3 t^3\) is a third degree polynomial. A python code is used to numerically calculate the best values of the parameters \(a_0\), \(a_1\), \(a_2\), and \(a_3\) so that the out-of-transit part of \(F(t)\) is close to unity. As for the timing scheme for the light curves, we took the time from the headers of the individual images. To make sure that the criterion used for the time is uniform, first we calculated observation time for the mid-exposure for every image. Further, it is essential to bring all the mid-exposure times to a common time stamp for a consistent fitting. Hence, all the individual times of observations were converted to the Barycentric Julian Date in Barycentric Dynamical Time (BJD\(_{TDB}\)) following Eastman et al. (2010). # The Light-Curve Analysis {#TAP} The transit light curves (6 new+25 published) were analyzed using the Transit Analysis Package (TAP, Gazak et al. 2012). TAP has previously been used by our group for TrES-3b (Jiang et al. 2013, Mannaday et al. (2020), WASP-43b (Jiang et al. 2016) and Qatar-1b (Su et al., *submitted*). TAP is an IDL based graphical user-interface driven software package which employs the MCMC approach to fit the light curves using the analytic model given by Mandel & Agol (2002) and wavelet-based likelihood function by Carter & Winn (2009). TAP involves a set of nine parameters that the user has to input. These parameters are: orbital period of the planet (\(P\)), orbital inclination on the sky plane (\(i\)), scaled semi-major axis (\(a/R_{\ast}\)), the planet-to-star radius ratio (\(R_{\rm p}/R_{\ast}\)), the mid-transit time (\(T_{\rm m}\)), the linear limb darkening coefficient (\(u_1\)), the quadratic limb darkening coefficient (\(u_2\)), orbital eccentricity (\(e\)) and the longitude of periastron (\(\varpi\)). For the input parameters mentioned above, one has to define one of the three conditions while running the MCMC chain of TAP. According to the conditions, a parameter can be one of the following: (1) completely free (2) completely locked, or (3) varying according to a Gaussian function. As discussed in Section [2](#OBS){reference-type="ref" reference="OBS"}, we dropped the first publicly available light curve from Hartman et al. (2009). So, the epoch zero in this study was defined by the second of the four publicly available light curves from Hartman et al. (2009). In order to define the initial input values, we considered most of the values mentioned in Hartman et al. (2009), as their paper presents the maximum number of required input parameters and it is better for the consistency to use input parameters from the same source. For the eccentricity, we considered the initial input value from Knutson et al. (2014). The orbital period (\(P\)) was defined as 3.2130598 with a Gaussian penalty of 0.0000021. The scaled semi-major axis (\(a/R_{\ast}\)) and the planet-to-star radius ratio (\(R_{\rm p}/R_{\ast}\)) were chosen to be completely free and their input values were 11.77 and 0.1406, respectively. We also allowed the mid-transit time (\(T_{\rm m}\)) to be completely free and did not input any value for it. The longitude of periastron (\(\varpi\)) was set to 0\(^\circ\) and was completely locked. Also set with a Gaussian penalty, the orbital inclination on the sky plane was set as 89\(^\circ\) with a sigma of 0.4\(^\circ\). The value of eccentricity is listed as 0.026\(^{+0.026}_{-0.018}\) by Knutson et al. (2014), where we input the value (\(e\)=0.026) as a Gaussian with a sigma of 0.022, where the sigma was calculated by taking the mean of errors in positive and negative directions. The values of limb darkening coefficients were chosen to be Gaussian with a sigma (\(\sigma\)) value of 0.05. Table [\[input\]](#input){reference-type="ref" reference="input"} contains the information about the input parameters and the condition chosen for them while running the MCMC chains. The limb darkening is a filter dependent quantity. All of our new light curves are in the Cousin \(R\) band, except one light curve being in the Sloan \(r\) band. However, the light curves we use from the published literature come from various filters. These filters include Johnson \(B\), Cousin \(RI\), Sloan \(griz\), Gunn \(gr\) and Strömgren \(u\) band. But the issue is that the published papers do not always provide the numerical values of limb darkening coefficients they used. Because we want to determine the mid-transit time values using TAP instead of directly taking them from the concerned papers, we decided to calculate the limb darkening coefficients even for the published light curves. We used the EXOFAST routine (Eastman et al. 2013) which incorporates the quadratic limb darkening tables of Claret & Bloemen (2011). This tool requires some input values which were picked from Hartman et al. (2009) as: effective temperature (\(T_{\rm eff}\)) = 4650 K, surface gravity (log\(g\)) = 4.61 \({\rm cm/s^{2} }\) and metallicity \([Fe/H] =-0.29\). The values of the resulting limb darkening coefficients are listed in Table [\[LD\]](#LD){reference-type="ref" reference="LD"}. As mentioned previously, these values were defined with a Gaussian penalty and a \(\sigma\) of 0.05 while running the MCMC chains. EXOFAST did not output the values of limb darkening coefficients for the Gunn-\(g\) and Gunn-\(r\) bands. So, for these filters, we used the limb darkening coefficients obtained for the Sloan-\(g\) and Sloan-\(r\) bands instead. One can also choose a parameter to be 'linked' among different light curves if it is not completely locked. In the present study, we have some light curves that represent the same transit event, and hence, the same epoch. We have linked the light curves representing the same epoch together while calculating the mid-transit time for such light curves. If the filters were different for those light curves, we defined the values of limb darkening coefficients accordingly. For each individual TAP run, five MCMC chains were calculated and were added together to provide the final results. The results from TAP for the mid-transit times are given in Table [\[TAPresults\]](#TAPresults){reference-type="ref" reference="TAPresults"}. Please remember that all the light curves corresponding to the same transit event are represented by a single epoch in the table. Epoch numbers 346, 446 and 1144 represent multiple light curves (see Table [\[TAPresults\]](#TAPresults){reference-type="ref" reference="TAPresults"} for more information). Owing to this reason, Table [\[TAPresults\]](#TAPresults){reference-type="ref" reference="TAPresults"} contains 25 epochs for the 31 light curves we have used. The errors in the mid-transit time determined in this study for the published light curves are consistent with the errors mentioned in Mallonn et al. (2015) and Alexoudi et al. (2018) for the common light curves. We also present the results for the photometric parameters \(a/R_{\ast}\) and \(R_{\rm p}/R_{\ast}\) in Table [\[TAPresults\]](#TAPresults){reference-type="ref" reference="TAPresults"} for individual epochs. These parameters are also in agreement with the literature values. Using radial velocity observations, Knutson et al. (2014) listed the value of planet's mass \(m_P\), where they mention to have used the sky-plane inclination \(i\) from Hartman et al. (2009). Using those, we calculated the corresponding value of \(m_P {\rm sin} i\) for Knutson et al. (2014). Using this \(m_P {\rm sin} i\) and our TAP outputs for inclination during TAP runs, we obtained the results of planet's mass according to our analysis. Table [\[TAPresults\]](#TAPresults){reference-type="ref" reference="TAPresults"} contains the TAP results for eccentricity, inclination and planet's mass. Our normalized observational light curves and the corresponding TAP fitting with \(x-\)axis adjusted for the mid-transit time are shown in Fig. [\[lightcurves\]](#lightcurves){reference-type="ref" reference="lightcurves"}. The light curves are in the sequence of the 'run' defined in Table [\[log\]](#log){reference-type="ref" reference="log"}. A few lines of our photometric observations with \(BJD_{TDB}\) and normalized relative flux are given in Table [\[ourdata\]](#ourdata){reference-type="ref" reference="ourdata"}. The full version of this table will be provided in the machine readable format with this paper. # The TTV Analysis {#TTV} ## The Linear Fit and a New Ephemeris Once we have all the mid-transit times in BJD\(_{TDB}\), we can determine a new ephemeris by \(\chi^2\) minimization of the following linear relation: \[T^C_{\rm m} (E)=T_0+PE,\] where \(P\) and \(E\) are period and epoch. The reference time \(T_0\) was arbitrarily chosen to be at epoch \(E=0\). For an individual epoch \(E\), \(T^C_{\rm m} (E)\) is the calculated mid-transit time. Using linear fitting, we obtain \(T_{0} = 2454216.773311 \pm 0.000293\) (\(BJD_{TDB}\)) and \(P = 3.21305762 \pm 0.00000036\) (day). If \(\sigma_i\) is the mean of the error in the positive and negative directions of an observed mid-transit time given by TAP, then using observed and calculated values of mid-transit times, the \(\chi^2\) of the fitting is determined using the formula:\ \[\chi^2 =\sum_{i=1}^{N} \frac{({O}_i-{C}_i)^2}{{\sigma}_i^2},\] where \({O}_i\) is an observed mid-transit time, \({C}_i\) is a calculated mid-transit times, and \(N\) is the number of included epochs. The value of the \(\chi^2\) for the linear fitting is 182.49. There are 23 degrees of freedom in our model, so the reduced \(\chi^2\) becomes, \(\chi^2_{red}(23)\) = 7.93. This large value of the \(\chi^2_{red}\) in the linear fitting can be indicative of the presence of TTVs. Ideally, when there is no TTV, the time between any two adjacent transit events should be exactly equal to the orbital period. The \(O-C\) diagram for the linear fitting is presented in Fig. [\[OCLinear\]](#OCLinear){reference-type="ref" reference="OCLinear"}, which shows deviation between the observed mid-transit time and the one predicted by a simple two-body orbit. ## The Frequency Analysis {#FREQ} We searched for possible frequencies which might be causing variation in the data using generalized Lomb-Scargle periodogram (Lomb 1976, Scargle 1982, Zechmeister & Kuerster 2009). This procedure considers the error bars while determining the periodogram. The periodogram is shown in the Fig. [\[periodogram\]](#periodogram){reference-type="ref" reference="periodogram"}. If \(f\) is the frequency related to the highest peak of power in the periodogram, then the possible TTVs are tested by \(\chi^2\) minimization of the following equation that consists of both linear and sinusoidal terms: \[T_S (E) = P E+b+z\sin(2\pi f E-\phi).\] In the equation above, the predicted mid-transit time at a given epoch \(E\) is \(T_S (E)\) while \(P, b,\) amplitude \(z\) and phase \(\phi_1\) are the fitting parameters. The frequency corresponding to the highest power peak (\(f= 0.00790059461\) epoch\(^{-1}\), allows us to determine the fitting parameters: \(P= 3.21305803 \pm 0.00000019\) day, \(b= 2454216.773065 \pm 0.000145\) day, \(z=-0.000754 \pm 0.000080\) day, and \(\phi= 4.163 \pm 0.109\) rad. The value of the \(\chi^2\) is 88.02. For 25 data points, we are determining four parameters from fitting. This model has 21 degrees of freedom, where the value of the reduced \(\chi^2\) decreases to 4.19. The \(O-C\) diagram as a function of epoch \(E\), for one frequency scenario is given in Fig. [\[sinefitallfreq\]](#sinefitallfreq){reference-type="ref" reference="sinefitallfreq"}. The \(O-C\) value shown in the curve depicts the value of \(T_S (E)\) minus the linear term (\(P E+b\)). The data points representing the light curves are also adjusted according to the fitting and are shown in the figure. The false-alarm probability (FAP) was determined following the procedure explained in Press et al. (1992). As can be seen in Fig. [\[periodogram\]](#periodogram){reference-type="ref" reference="periodogram"}, the FAP for the frequency with maximum power is 61%. Only the peaks with a significantly high signal-to-noise power ratio should be considered from a periodogram (Breger et al. 1993; Kuschnig et al. 1997). Since no other peak shown in Fig. [\[periodogram\]](#periodogram){reference-type="ref" reference="periodogram"} has a high S/N ratio, we did not consider any other peak for frequnecy analysis. To conclude, considering that the \(\chi^2_{red}\) value is around 4 and the FAP is large, the possible TTVs are probably of the non-sinusoidal nature. # The Two-Planet Model {#dynamics} The values of \(\chi^2_{red}\) in the above analysis indicate possible non-sinusoidal TTVs in HAT-P-12 planetary system. In order to probe a physical scenario for the explanation of these TTVs, we explore the possibility to have an additional exoplanet (HAT-P-12c) in this system (see, Nesvorný et al. 2012 for example). In the approach we used, by feeding some assumed initial input values of the parameters for both the planets, HAT-P-12b and HAT-P-12c, the theoretical TTVs are produced through the dynamical calculations of the *TTVFast* code (Deck et al. 2014). These theoretical TTVs are used to fit our observational mid-transit times. The best-fit model can be obtained through a MCMC sampling code *MC3* (Cubillos et al. 2017). Before running the MCMC sampling, we first need to set the distributions and the ranges of numerical values of photometric parameters for both planets. For HAT-P-12b, the parameters are already determined in the previous sections of this paper. So, these parameters were set as either fixed values or with a certain range around the previously determined values. For example, since the orbital period can vary slightly during the orbital integration, we provide a total interval width of 0.2 day for the orbital period of HAT-P-12b. The orbital eccentricity and inclination of HAT-P-12b are taken as the mean values of the results shown in Table [\[TAPresults\]](#TAPresults){reference-type="ref" reference="TAPresults"}. In order to search for the best-fit model for the new exoplanet HAT-P-12c, the initial input values were set within larger ranges and are set to be uniformly distributed. Also note that the mass of central star (HAT-P-12) is set to be 0.733 \(M_\odot\) according to Hartman et al. (2009). Table [\[MC3input\]](#MC3input){reference-type="ref" reference="MC3input"} gives a summary of the input parameters for *TTVFast*. For the parameters with a defined range of input values, the values are given inside the brackets, \[ \]. # Conclusions {#CONC} Using the telescopes from three observatories, we present six new light curves of the transiting exoplanet HAT-P-12b. These observations were combined with 25 light curves from published papers to further enrich the baseline of data to 1160 epochs. A self-consistent homogeneous analysis was carried out for all the light curves to make sure that our TTV results are not affected by any systematics. The photometric parameters determined by us are in agreement to their values in earlier published works. We determined new ephemeris for the HAT-P-12b system by a linear fit and sinusoidal curve fitting for different frequencies. The values of reduced \(\chi^2\) from the linear fitting is 7.93 while from the sine-curve fitting for the highest power frequency, the value of \(\chi^2_{red}\) is obtained as 4.19. These values and the large FAP indicate that the TTV could be non-sinusoidal. Finally, through a MCMC sampling, a two-planet model is found to be able to produce a theoretical TTV which could explain the observations to a satisfactory level with a value of \(\chi^2_{red}\) = 2.09. Therefore, a scenario with a non-transiting exoplanet might explain the TTV of HAT-P-12b. To conclude, our results show the existence of non-sinusoidal TTVs. Though a two-planet model could lead to a better fitting, the validation of a new exoplanet is out of the scope and not provided here. Hopefully, the nature of this system could be further understood in the future. [^1]: IRAF is distributed by the National Optical Astronomical Observatory which is operated by the Association of Universities for Research in Astronomy, under contact with the National Science Foundation.
{'timestamp': '2020-12-17T02:13:26', 'yymm': '2012', 'arxiv_id': '2012.08820', 'language': 'en', 'url': 'https://arxiv.org/abs/2012.08820'}
null
null
null
null
null
null
null
null
null
null
# Introduction ## Mobile Edge Computing {#MEC} The exponential growth in smart device adoption is accelerating the ubiquitous Internet of Things (IoT), and catalyzing the development of computation-intensive applications, including augmented reality (AR), face recognition, interactive online gaming, and autonomous driving. However, a computationally tedious task is unlikely to be executed at the local mobile device due to its resource constraint. Instead, such tasks can be offloaded to the remote cloud with abundant computation, storage, and energy resources. Despite the computational efficiency, the long communication distance between smart devices and the remote cloud inevitably introduces a high transmission latency, resulting in an unsatisfactory user quality of experience (QoE), especially for numerous real-time delay-sensitive applications. To enable computationally intensive applications with sensitive delay requirements, mobile edge computing (MEC) has recently emerged as a promising paradigm. Compared with its cloud counterpart, MEC pushes the computing and storage capability to the network edge that is much closer to devices. As a result, a device can offload its tasks to a proximal MEC server at a base station (BS) or access point (AP), and then collect the subsequent results from the MEC server. This generates the benefits of low latency and reduced mobile device energy consumption. Essentially, task offloading involves joint radio-and-computation resource allocation among multiple users. A variety of specific task offloading policies have been designed in recent years. Most of them are focused on small-scale synchronous MEC systems, where tasks for a limited number of different users arrive simultaneously. In this context, the computational resources are relatively abundant, and the policy design was usually formulated as a static centralized optimization problem, where the energy consumption and latency serve as the principal performance indicators. For example, to minimize the weighted sum of energy consumption and end-to-end delay, the authors in  formulated the task offloading problem into a non-convex quadratically constrained quadratic program (QCQP), and semi-definite relaxation and randomization mapping based algorithms were proposed to achieve a near-optimal offloading performance. A joint radio and computational resource allocation scheme was investigated in, and the offloading was formulated as a mixed-integer nonlinear programming problem (MINLP). A game theory-based approach was proposed to handle this problem. Recently, the offloading problem was formulated in  as a nonconvex optimization one, which aimed to maximize the weighted sum computation efficiency by imposing the constraints on local computation capability and energy resources. ## Task Offloading for Large-Scale Asynchronous MEC A wide range of emerging massive machine type communication applications, such as industrial automation, and smart transportation , introduce the concept of large-scale asynchronous MEC systems. Typically, these applications involve a variety of tasks each with its own execution deadline. Furthermore, task arrival patterns for a massive number of users exhibit notable stochasticity, featured by random and asynchronous task arrivals, distinct workloads, and diverse deadlines (see Fig. [\[fig: system state\]](#fig: system state){reference-type="ref" reference="fig: system state"}). Due to the deadline constraints on tasks and limited computational resources (with respect to a massive number of users), task offloading policy design for large-scale asynchronous MEC systems becomes extremely challenging. Task offloading policy should focus on the user selection and be implemented on a dynamic and real-time basis, considering both the task criticality and energy consumption. To the best of our knowledge, the offloading policy design in a large-scale asynchronous MEC system is still an open challenge. [ In this paper, we aim to address this challenge and propose an index-based task offloading policy. To adapt to the dynamic nature of task arrivals, we deviate from the classical static centralized optimization techniques with hard constraints, and turn to the bandit theory to capture the stochastic behavior in tasks. We formulate the offloading policy design as a restless multi-armed bandit (RMAB) problem. Mathematically, MAB is a sequential decision model with a set of arms to choose from for the total reward maximization . At each round, only a subset of arms can be selected and their states will change, while the others remain frozen. Removing such restrictions in the MAB, the RMAB allows the states of all arms to evolve over time regardless of the actions. In our setting, we treat each user as an independent restless arm, and the arm state is represented by user task criticality including the remaining number of subtasks and remaining time to deadline. We then design a reward function to strike a promising balance between two conflicting goals, i.e., minimizing the energy consumption and maximizing the task completion ratio. In this case, "playing\" an arm at each time slot is equivalent to selecting a user to offload its tasks. ]{style="color: black"} Our goal is to maximize the total discounted reward over the time horizon for the formulated RMAB, resulting in a new task offloading policy. However, the RMAB is generally PSPACE-hard and intractable . To address this issue, we develop a novel method based on Whittle index (WI) , so that multiple arms can be decoupled and the original \(N\)-dimensional problem reduces to \(N\) independent \(1\)-dimensional ones. The key advantage of our WI offloading policy lies in its excellent scalability and low computational complexity, enabling fast user selection in task offloading. At each time slot, each user only needs to separately calculate its scalar WI in closed form which provides a proxy to measure its task criticality. Each user then reports its WI to the BS, and the users with the highest indices are selected for task offloading. Besides, the WI policy can be implemented in a totally distributed manner. Specifically, we first consider the scenario where the perfect knowledge of the user offloading energy consumption is available at users. We exploit the WI theory and rigorously establish the indexability of the RMAB through the inductive method, which theoretically guarantees the existence of WI for our RMAB. On this basis, we derive a closed-form expression in terms of the task state and energy consumption for the WI computation. Furthermore, when the task completion ratio becomes the focus, the shorter slack time less remaining workload (STLW) priority rule is introduced into the WI offloading policy for performance improvement, referred to as STLW-WI policy. On the other hand, when the knowledge of user offloading energy consumption is not available prior to the offloading, the WI policy can not be directly applicable. To address this challenge, we develop Bayesian learning-enabled WI policies. In specific, we first integrate the WI policy with the maximum likelihood estimation (MLE) technique. Then, to further improve the performance, we propose a novel Bayesian learning with WI policy (BL-WI) given the conjugate prior. Finally, a refinement mechanism (PSBL-WI) based on prior-swapping is proposed for a fast inference given the non-conjugate prior. It is verified by simulation that the proposed WI policy can achieve much better performance in terms of the total discounted reward, compared with several existing offloading policies. For the completion ratio-oriented task offloading, our STLW-WI policy achieves a higher task completion ratio. When the user offloading energy consumption is unknown, our Bayesian learning-enabled WI policy can also achieve a favorable performance compared to the original WI policy. ## Contribution The main contributions of this paper can be summarized as follows. - We develop an RMAB framework to enable task offloading for large-scale asynchronous MEC in a realistic setting. We propose a novel WI offloading policy through establishing the WI indexability and deriving a scalable solution with closed-form expression. When the knowledge of user offloading energy consumption is unknown prior to offloading, novel MLE-WI, BL-WI and PSBL-WI offloading policies from the Bayesian learning perspective are developed. - The developed WI method offers a potential low-complexity solution to a series of communication/computation resource scheduling problems (e.g., scheduling in a power-aware server farm ), which typically involves complicated combinatorial optimizations. The developed WI method also addresses a challenging general RMAB problem in a dynamic environment with heterogeneous rewards and non-identical transition probabilities. ## Related Work In addition to the work introduced in Section [1.1](#MEC){reference-type="ref" reference="MEC"}, task offloading policy for MEC has been extensively studied in the literature. Two comprehensive surveys on various task offloading policy designs were provided in. The work in designed a new MEC system to satisfy the ultra-reliable low-latency requirements in mission-critical applications. Specifically, a two-timescale association between user and server was proposed by utilizing the Lyapunov optimization and matching theory. For both time division multiple access (TDMA) and orthogonal frequency division multiple access (OFDMA), corresponding offloading policies have been developed in, aiming to minimize the user weighted sum energy consumption given the constraints of the user average latency. As a special case of reinforcement learning, the stateless MAB techniques have been applied to MEC systems. In stateless MAB, the arms do not have any specific state. Each arm, when played, offers an i.i.d random reward drawn from a distribution with an unknown mean. The authors in developed an energy-aware mobility management scheme based on MAB to perform MEC selection. In, an adaptive learning task offloading policy was proposed for vehicle edge computing based on the MAB theory. In, the authors considered an edge service replacement problem, where they applied contextual combinatorial MAB to estimate users' demand based on side information. An MAB online learning algorithm referred to as utility-table learning was proposed in to determine the optimal workload balance among MEC servers. In, the authors proposed an online task offloading policy based on the non-stationary MAB model, aiming to minimize the long-term total costs including latency, energy consumption and switching cost. Under the MAB framework, a two-stage resource sharing and task offloading strategy were developed in. By contrast, the RMAB in this paper can be categorized into the stateful bandit model, where every arm is associated with some finite state space and the state evolves as a Markov process. When an arm is selected, the reward is drawn from some stationary distributions based on the current arm state. There are several other works leveraging the WI theory first established in. According to, the WI solution in does not hold in general, and there is no unified solution that can cover all the RMAB problems. Consequently, the establishment of indexability needs to be studied for the individual problem. For example, the problem formulation in suits a restless Bernoulli bandit with a two-state Markov chain, and the establishment of indexability highly depends on the transition probability of wireless channel occupancy. In contrast, the formulation in suits an RMAB problem with a static reward and identical state transition probability for each arm. In this paper, we aim to solve a new RMAB problem with heterogeneous rewards and a non-identical transition probability for each arm. ## Organization The rest of the paper is organized as follows. In Sections [2](#section2){reference-type="ref" reference="section2"} and [3](#sec: RMAB Formulation){reference-type="ref" reference="sec: RMAB Formulation"}, we discuss the MEC system model and formulate the offloading problem as an RMAB, respectively. In Section [\[sec: WI\]](#sec: WI){reference-type="ref" reference="sec: WI"}, we establish the indexability of the RMAB and develop a WI offloading policy. A Bayesian learning enabled WI offloading policy is proposed in Section [\[sec: learning\]](#sec: learning){reference-type="ref" reference="sec: learning"}. Simulation results are presented in Section [\[sec: Numerical Results\]](#sec: Numerical Results){reference-type="ref" reference="sec: Numerical Results"} followed by conclusions in Section [\[section 7\]](#section 7){reference-type="ref" reference="section 7"}. *Notation*: \(\mathcal{N}(\mu,\Sigma)\) denotes the Gaussian distribution with a mean \(\mu\) and a variance \(\Sigma\). \(\Gamma(\cdot)^{-1}\) denotes the Gamma inverse function. \(x^{+} = \max(x,0)\). \(\mathbbm{1}(\cdot)\) is the indicator function. \(\binom{N}{M}\) denotes the combinations of selecting distinct \(M\) items out of \(N\). For convenience, we also list most important symbols in Table . # System Model {#section2} ## Large-Scale Asynchronous Task Arrival Model [Consider a large-scale asynchronous MEC system consisting of a BS and \(N\) static users (indexed by \(i \in \left\{1, \cdots, N\right\}\)) shown in Fig. [\[fig: system state\]](#fig: system state){reference-type="ref" reference="fig: system state"}, where \(N\) is reasonably large. The system operates in a time-slotted structure, indexed by \(t\). The BS is equipped with \(M (M < N)\) independent MEC servers, and we assume that each MEC server can serve at most one user at each time slot. Each user is running computation-intensive and delay-sensitive tasks with stochastic arrival patterns to be elaborated later. Each task is relatively large and can be further partitioned into a number of subtasks to be processed sequentially. It is assumed that the local computation capability of each user is not powerful enough to complete a task on time. Therefore, a user seeks assistance from the MEC server by offloading some subtasks for faster execution. As we only have \(M\) MEC servers (limited computational resources), at most \(M\) users can be selected to perform task offloading at each time slot. The number of possible combinations is \(\binom{N}{M}\), which is usually extremely huge to handle[^1].]{style="color: black"} Next, we specify the asynchronous task arrival pattern with an example shown in Fig. [\[fig: system state\]](#fig: system state){reference-type="ref" reference="fig: system state"} (a more detailed example is shown in Fig. [\[fig: offloading result\]](#fig: offloading result){reference-type="ref" reference="fig: offloading result"}). The task arrival time and its deadline vary for each user. For the \(i\)-th user, at the \(t_{i,j}^{a}\)-th time slot, a new task \(j\) arrives and reveals the number of subtasks \(B_{i,j}\) and the task deadline \(t_{i,j}^{d}\). Without loss of generality, a user's subtasks are assumed to have equal size (\(l_i\) bits). Upon arrival, the task starts to be processed and will be removed from the user buffer at the end of the \(t_{i,j}^{d}\)-th time slot. It is worth noting that \(t_{i,j}^{a}\), \(t_{i,j}^{d}\), and \(B_{i,j}\) are discrete random variables. At the beginning of the \(t\)-th time slot, if the \(i\)-th user is idle, a new task will arrive with the probability \(Q_i\). ## Computation Model Each user is assumed to be able to locally process one subtask in each time slot. For the \(i\)-th user, the number of CPU cycles required to process \(1\) bit data is denoted by \(C_i\), which may be different for various users . We denote the CPU frequency of the \(i\)-th user by \(U_i\), then the local execution cycles for one subtask with \(l_i\) bits can be calculated by \(C_{\text{loc}} = C_i l_i / U_i\). Since the user is usually operating at a constant \(U_i\) for the sake of energy efficiency , the computing power for each CPU cycle can be calculated as \(P_{0,i} = \lambda U_i^2\), where \(\lambda\) is a power coefficient depending on the chip architecture . In this case, the local computing energy consumption \(E_{\text{loc}, i}\) for the \(i\)-th user to process one subtask can be calculated as \[E_{i}^{\text{loc}} = \lambda U_i C_i l_i.\] For MEC servers, we assume that their CPU frequency is a constant \(U_{s}\). Accordingly, \(k_i = \left \lfloor \frac{U_s}{U_i} \right \rfloor\) is the number of subtasks which can be processed in each time slot by an MEC server. That is, if the \(i\)-th user is selected to perform task offloading, it can transmit \(k_{i}\) subtasks to the server. ## Communication Model Following , the offloading process at each time slot can be divided into three steps: 1) a selected user uploads some subtasks to the MEC server; 2) the MEC server processes the subtasks; 3) the results are transmitted back to the user. As the results are usually of small size , the downloading time and associated energy consumption can be omitted. Therefore, in the whole process, the user offloading energy consumption mainly comes from the uploading phase. As at most \(M\) users can be selected at each time slot, we adopt OFDMA scheme for data transmission. For the \(i\)-th user during the \(j\)-th task, the achievable transmission rate can be calculated as \[r_{i,j} = W_i \log_2\left(1+\frac{P_{i}^{tx} h_{i,j}}{N_0 W_i}\right),\] where \(W_i\) is the bandwidth, \(P_{i}^{tx}\) is the transmission power, \(N_0 W_i\) is the noise power. In addition, \(h_{i,j} = \kappa_{i,j} g_0 (d_0/d_{i,j})^{\iota}\) denotes the channel gain of the \(i\)-th user  with \(\kappa_{i,j}\) being the small-scale fading channel power gain. In this paper, we adopt a widely used block fading channel model , and \(\kappa_{i,j}\) keeps constant during the \(j\)-th task but varies independently from task to task, where \(g_0\) is the path-loss constant, \(\iota\) is the path-loss exponent, \(d_0\) is the reference distance, and \(d_{i,j}\) is the transmission distance between the \(i\)-th user to the BS. Therefore, the required transmission time \(t\) for sending \(k_i\) subtasks can be calculated as \(t_i = (k_i) l_i / r_{i,j}\). We assume that the length of a time slot is relatively large, so that it is always larger than the transmission time \(t_i\). As a result, the offloading energy consumption of the \(i\)-th user during the \(j\)-th task is calculated as \[E_{i, j}^{\text{off}} = t_i P_{i, j}^{tx} = \frac{k_i l_i}{r_{i,j}} P_{i, j}^{tx}.\] We need to consider both the task completion ratio and user's energy consumption under the limited computational resource (\(M < N\)). At this point, our goal is to strike a promising balance between energy consumption and task completion ratio. Furthermore, the large-scale stochastic task arrivals require the offloading policy to perform user selection dynamically at each time slot with a low computational complexity, which is quite challenging. # Restless Multi-armed Bandit Formulation {#sec: RMAB Formulation} To address the above challenges, we develop a novel WI policy that enables fast user selection at each time slot, in which offloading priorities are indicated by the value of WI. For the specific implementation, we first formulate the offloading policy design as an RMAB to capture the randomness in tasks arrivals, workload and their deadlines. Essentially, we treat the remaining number of subtasks and remaining time to deadline of each task as the state of an arm. The restless nature of the state naturally follows, because the state will also change even though the user is not selected for offloading. Under this formulation, we also create a new reward function as the performance metric, taking into account both deadline requirements and user offloading energy consumption. In the following subsections, we elaborate on the RMAB with five key factors, including the system state, action, state transition, reward function, and objective function. ### System State For the \(i\)-th user, its state \(s_{i,t}\) is represented by its current \(j\)-th task state at the beginning of the \(t\)-th time slot, i.e., \(s_{i,t} = (\tau_{i,t}, b_{i,t})\), where \(\tau_{i,t} \triangleq t_{i,j}^{d}-t + 1\) is the remaining time slots to the task deadline \(t_{i,j}^{d}\), and \(b_{i,t}\) is the number of the unfinished subtasks. If there is no task, then \(s_{i,t} = (0,0)\). Accordingly, \(s_{i,t}\) can be written in a compact form as \[s_{i,t} = \begin{cases} (0,0), & \mbox{no task}; \\ (\tau_{i,t}, b_{i,t}), & \mbox{otherwise}. \end{cases} \label{eq:state}\] Collecting the states of \(N\) users, the system state \({\bf{S}}_t\) at the \(t\)-th time slot is denoted by \({\bf{S}}_t \triangleq \left(s_{1,t}, \cdots, s_{N,t}\right)\). ### Action At the beginning of each time slot, the action taken by the BS determines \(M\) users (among \(N\)) which could offload their subtasks to the MEC. We define the action as \({\bf{u}}_t = \left(u_{1,t}, \ldots, u_{N,t}\right)\), where \(u_{i,t}\in \left\{0,1\right\}\). [^1]: For example, when \(M=30\), \(N=100\), we have \(\binom{N}{M} \approx 3 \times 10^{25}\).
{'timestamp': '2020-12-17T02:08:18', 'yymm': '2012', 'arxiv_id': '2012.08718', 'language': 'en', 'url': 'https://arxiv.org/abs/2012.08718'}
null
null
# Introduction In all areas, such as banks, government applications, the pharmaceutical sector, military organisations, educational establishments, etc., security issues are growing today. Government institutions set guidelines, pass regulations, and compel organizations and agencies to conform with these standards, with wide-ranging implications of non-compliance. In these various and varied industries with a common weak link being passwords, there are many challenges when it comes to security issues. To verify the identity of the user, most applications today rely on static passwords. These keys, though, come with serious security issues for administrators. Users prefer to use easy-to-guess passwords, use different accounts with the same password, write passwords or save them on their computers unencrypted. Moreover, although dedicated systems, called password managers, can offer secure password storage and retrieval, only a small fraction of users use them. In addition, hackers have the choice of using many password stealing methods, such as shoulder surfing, snooping, sniffing, guessing, etc. Several best practices have been suggested for the use of passwords. Some of them are very difficult to use and others do not fulfill the security needs of the organization. To overcome the password problem, two factor authentication using devices such as tokens and ATM cards has been suggested and has been shown to be difficult to hack . There are several limitations of two-factor authentication, including the cost of purchasing, issuing, and handling tokens or cards. From the point of view of the user, having more than one two-factor authentication methods demands the purchase of several tokens/cards that are likely to be misplaced or stolen. Traditionally, cell phones have been considered a device for making phone calls. But today, the use of cell phones has been generalized to send calls, review addresses, shop contacts, etc., provided the developments in hardware and software. Also, opportunities for smartphone access have expanded. Cell phones combine infra-red, Bluetooth, 3G, and WLAN connectivity, on top of normal GSM connectivity. For contact purposes, most of us, if not all of us, hold cell phones. Several accessible mobile banking services take advantage of mobile computer enhancement capabilities. From the ability to collect account balance information in the form of SMS messages to the use of WAP and Java along with GPRS to allow fund transfers between accounts, stock trading, and direct payment confirmation through the phone's micro browser. The principle of using passwords and smart cards to authenticate customers is an old idea going back 40 years now. Since then many systems with two-factor authentication mechanisms were developed. However since the smart card may be intercepted and the data contained in the smart card may be duplicated, the reliability of two-factor authentication may be breached, and the number of potential passwords can be limited and users could forget or lose their passwords. Biometric authentication was adopted to authenticate users by using their biometric characteristics due to those issues. Scholars have suggested biometric authentication system since back in 1999 which enhances some facets of two-factor authentication since biometric features have greater entropy and can not be missed and are rarely lost. One drawback, though is that biometric characteristics are not entirely confidential since one can \"steal\" biometric characteristics from others for example, the fingerprint can be retrieved from a mug used by the suspect and the facial features can be obtained from an image of a user. Combining all these three variables together is a way to mitigate these concerns. This technique is often referred to as three-factor authentication, and has been greatly adapted by cloud-based applications. SIM cards are available in varying storage sizes. Related memory utilization of the SIM card connected with it plays a part in deciding the effectiveness of cloning the SIM card, more memory stored on the original SIM card than the longer the Ki A8 algorithm cracking process on the SIM card. Problems resulting from the above perspective relating to the inclusion of the A8 algorithm inserted in any SIM card used by telecommunications users to duplicate or replicate the SIM card are detrimental to the privacy and protection of cell phone users on either side. The purpose of the SIM card cloning research is to provide an alert to consumer safety and provide a dedicated SIM card to tackle SIM card cloning criminal investigations along with their abuse of data.Subscriber Authentication Based on IMSI (Stored on SIM) and Andom Number Generator/RAND (Provided by Network), SIM card cloning authentication will be further investigated by comparing the network login response of the customer to the mobile service network. The Random Number Generator (RAND) includes an algorithm A3 (Provided by Network) such that RAND participates in the process of cloning the SIM card in order to adapt the algorithms contained in the SIM card A8 to A3 algorithms contained in the user data of the connected network authentication. Scholars have already demonstrated that by launching a cross-platform infection attack, an attacker is able to compromise another device, either a PC or a cell phone. Prototypes of proof-of-concept demonstrate that such attacks are feasible and thus it is not fair to preclude them from the mobile 2FA scheme adversary model. The intruder will snatch all authentication tokens and impersonate the rightful user when both 2FA devices are infected, regardless of what individual smartphone 2FA instantiation is used.We carry out attacks against various instantiations of mobile 2FA schemes implemented by banks and common Internet service providers to help our argument. Schemes with 2FA OTPs created on the client side, such as Google Authenticator (GA), depend on pre-shared secrets. The configuration process of the GA app, used by hundreds of providers, including Google Mail, Facebook and Outlook.com, was evaluated. When the user allows GA-based authentication in his account settings, the GA initialization begins. A QR code is created by the service provider and shown to the user (on the PC) and scanned by the user's smartphone. All the information required to initialize GA with user-specific account details and pre-shared secrets is stored in the QR code. During the initialization process, scholars analysed the QR code submitted by Facebook and Google and defined the structure of the QR code. This includes information such as the scheme sort (counter-based vs. time-based), the service and account identifier, the counter (counter-based mode only the generated OTP duration and the mutual secret identifier. In addition, all this material is provided in plain text. To check if GA supports any alternate initialization system, scholars reverse engineered the app with the JEB Decompiler and evaluated the internal apps. We have not found any alternate initialization routines, suggesting that this initialization protocol is used by all 32 service providers using GA. The initialization message may be intercepted by a PC-residing malware (clear text encoded as an QR code). The attacker will then initialize its own version of the GA and can produce legitimate OTPs. The use of 'honeywords' was introduced in order to detect whether or not the password file was stolen, i.e. a series of false passwords that are combined with the original password of the user and the hash values of these passwords (real passwords and honeywords) are contained in the password file. The adversary also does not know which one is the true password if this file is corrupted and all the hash values in the file are cracked. Note that LS identity and password are submitted by the customer or the adversary to request login.LS then checks if a password submitted is among the honeywords of a user, but even if this search succeeds, LS needs to review another protected component, HC, to see if the index of the honeyword retrieved corresponds to the actual password of the user. HC warns the administrator otherwise, as a honeyword signal has been detected that the password file might have been corrupted. Based on these findings and trying to combine the strengths of honeywords and 2FAs while at the same time keeping the system simple and easily integrated in any existing platform or system, we present in this paper a prototype of a novel security mechanism. We develop and propose an innovative security mechanism for web applications that produces both passwords and QR codes covering different login modes. The proposed system entitled \"Two-Factor HoneyToken Authentication (2FHA)\", combines the strengths of two-factor authentication and Honeyword technologies. In the developed prototype a sms with 3 OTP passwords that correspond to 3 QR codes is sent to the user. Only one of these three elements is the correct token that can be used in order to continue. This induces an extra layer of security adding more safety to the system. The proposed system offers enhanced security to the user while at the same time is simple and doesn't impose additional overhead during login. The rest of the article is structured as follows. Section [2](#2FA){reference-type="ref" reference="2FA"} presents two-factor authentication principles and limitations. Section [3](#sec:honey){reference-type="ref" reference="sec:honey"} discusses honeywords principles. Section [4](#sec:prototype){reference-type="ref" reference="sec:prototype"} presents the proposed system architecture and protopype and Section [5](#sec:concl){reference-type="ref" reference="sec:concl"} concludes the article and discusses future work. # Two factor authentication {#2FA} Two-factor authentication (2FA) is a security mechanism in which users use two separate authentication keys to validate themselves, often referred to as two step verification or dual-factor authentication. This process is undertaken to help secure both the credentials of the user and the tools that can be used by the user. Two-factor authentication offers a higher degree of protection than one-factor authentication (SFA)-dependent authentication systems, in which the user only provides one factor, normally a password or passcode. Two-factor authentication strategies rely on a password-providing mechanism, as well as a second factor, typically either a safety token or a biometric factor, such as a fingerprint or facial scan. Two-factor authentication brings to the authentication process an extra layer of security by making it more difficult for criminals to obtain access to computers or online accounts of an individual since it is not enough to know the victim's password alone to pass the authentication check. To monitor access to confidential applications and files, two-factor authentication has long been used and online service providers are gradually using 2FA to secure the identities of their customers from being used by hackers who have compromised a password database or used phishing campaigns to acquire user passwords. ## What are authentication factors? There are many different ways in which more than one authentication mechanisms are used to authenticate anyone. Most authentication mechanisms usually rely on factors of information, such as a traditional password, whereas two-factor authentication methods incorporate either a possession factor or a factor of inherence. Authentication factors, listed in approximate order of adoption for computing, include the following: 1. A knowledge factor is when The user knows something, such as a password, a personal identification number (PIN) or some other sort of mutual secret. 2. A possession factor is when a user has To accept authentication requests, the user has something, such as an ID card, a protection key, a cell phone, a mobile computer or a smartphone app. 3. An inherence factor refers to anything intrinsic to the physical self of the individual is more generally considered a biometric element. This may be personal characteristics, such as fingerprints authenticated by a fingerprint scanner, are mapped to physical features. Facial and speech recognition are other widely used inherence variables. There are also the biometrics of behavior, such as keystroke dynamics, variations of gait or voice. 4. A location factor typically denoted by the location from which an authentication attempt is made, can be implemented by restricting authentication attempts to specific devices in a specific location or more commonly, by monitoring the geographical source of an authentication attempt based on the Internet Protocol (IP) source address or some other geolocation detail, such as data from the Global Positioning System (GPS), 5. A time factor limits user authentication to a fixed time frame where it is allowed to log in and limits access to the device beyond that window. It should be remembered that the vast majority of two-factor authentication mechanisms rely on the first three authentication factors, while multifactor authentication (MFA), which may rely on two or more separate passwords for more reliable authentication, can be used by systems that demand greater security. ## How does two-factor authentication work? In this section we briefly describe the process of a typical two factor authentication system. - The user is asked by the program or by the website to log in. - The user enters what he or she knows---usually a username and password. Then a match is made by the site's server and the user is remembered. - The website creates a special authentication key for the user for processes that don't need passwords. The authentication function processes the key and it is checked by the site's server. - Then the site asks the user to start the second stage of login. While a variety of ways can be taken through this step, users must show that they only have what they will have, such as an identification key, ID card, smartphone or other mobile device. This is the factor for ownership. - During phase four, the user enters a one-time code created. - The customer is authenticated and given access to the program or website after supplying all variables. In technical terms, two authentication factors are required to obtain access to a device or facility at any point. Using two variables from the same group, though, would not constitute 2FA; for instance, it is always called SFA to require a password and a mutual secret since both belong to the same class of authentication factor: information. The user ID and password are not the most reliable as far as SFA services. One concern with password-based authentication is that generating and recalling good passwords requires awareness and diligence. Passwords need protection against many internal attacks, such as carelessly kept login credential sticky notes, old hard drives and vulnerabilities in social engineering. Passwords are often vulnerable to external threats, such as hackers using brute-force, dictionary or rainbow table attacks. An intruder will typically break password-based protection mechanisms and steal corporate data, including personal information of users, provided ample time and money. Because of their low cost, ease of execution and familiarity, passwords have remained the most common type of SFA. Depending on how they are applied, several challenge-response questions can provide more security, and stand-alone biometric authentication approaches can also provide a more reliable SFA process. ## Types of two-factor authentication products There are several different 2FA deployment equipment and utilities --- from tokens to radio frequency identification (RFID) cards to applications for smartphones. It is possible to separate two-factor authentication devices into two categories: tokens that are provided to users to use while signing in and infrastructure or software that detects and authenticates entry for users who correctly use their tokens. Physical devices, such as key fobs or smart cards, may be authentication keys, or they may exist in applications like mobile or web apps that produce authentication PIN codes. These authentication codes are normally created by a server, often known as one-time passwords (OTPs), and can be recognized by an authentication system or app as authentic. The authentication code is a short sequence connected to a specific computer, user or account that can be used once as part of an authentication process. To accept, process and authorize --- or reject --- access to users who authenticate with their tokens, organisations need to install a framework. This may be implemented in the form of cloud applications, a dedicated hardware server, or supplied by a third-party provider as a service. An significant feature of 2FA is ensuring that the authenticated user is granted access to all services the user is allowed for --- and only those resources. As a consequence, one of 2FA's main functions is to connect the authentication method with the authentication data of an entity. Microsoft offers some of the required infrastructure for Windows 10 2FA service organisations through Windows Hello, and will work with Microsoft accounts, as well as authenticate users with Microsoft Active Dii. ## How 2FA hardware tokens work Hardware tokens for 2FA are available that support numerous authentication approaches. The YubiKey, a small Universal Serial Bus (USB) system that supports OTPs, public key encryption and authentication, and the Universal 2nd Factor (U2F) protocol developed by the FIDO Alliance, is a common hardware token. YubiKey tokens are sold by Palo Alto, California-based Yubico Inc. When YubiKey users log in to an OTP-supported online site, such as Gmail, GitHub, or WordPress, they insert their YubiKey into their device's USB port, enter their password, select the YubiKey field, and then tap the YubiKey icon. YubiKey produces and inputs an OTP into the field. The OTP is a 44-character, single-use password; a special ID defining the authentication key associated with the account is the first 12 characters. The remaining 32 characters contain information that is encrypted using a key only known to the computer and the servers of Yubico that was generated during the initial registration of the account. An OTP is submitted from an online service to Yubico for verification of authentication. The Yubico authentication server sends back a message verifying that this is the correct token for this user until the OTP is checked. Two authentication criteria have been given by the user: the information factor is the password, and the possession factor is the YubiKey. ## Two-factor authentication for mobile device authentication For 2FA, smartphones provide a number of possibilities, encouraging organizations to choose what suits best for them. A built-in camera can be used for face recognition or iris detection, and the microphone can be used for speech recognition. Certain applications are able to recognise fingerprints. GPS-equipped smartphones will check the location as an extra consideration. Also, Speech or Short Message Service (SMS) may be used as an out-of-band authentication channel. For receiving authentication codes by text message or automatic phone call, a trustworthy phone number may be used. To participate in 2FA, a person needs to check at least one trustworthy phone number. Both applications that support 2FA are available for Apple iOS, Google Android and Windows 10, allowing the phone itself to function as the physical interface to satisfy the ownership aspect. Duo Defense, headquartered in Ann Arbor, Mich., and acquired for \$2.35 billion by Cisco in 2018, is a 2FA software provider whose solution allows 2FA consumers to use their trusted products. Before checking that the mobile device can still be trusted to authenticate the customer, Duo's platform first determines that a user is trusted. The need to acquire an authentication code through text, voice call or email is replaced by authenticator apps. For example, users type in their username and password to access a website or web-based application that supports Google Authenticator --- a knowledge factor. Users are then asked to type a number of six digits. Instead of having to wait a few seconds to answer a text message, an Authenticator produces the number for them. Every 30 seconds, these numbers alter and are different with every login. Users complete the authentication process by entering the correct number and show custody of the correct unit --- an ownership element. ## Is two-factor authentication secure? There are several limitations of two-factor authentication, including the cost of purchasing, issuing, and handling tokens or cards. From the point of view of the user, having more than one two-factor authentication method allows several tokens/cards to be held that are likely to be misplaced or stolen. Although two-factor authentication improves security---because access privileges are no longer dependent solely on a password's strength,---two-factor authentication systems are just as reliable as their weakest part. Hardware tokens, for instance, depend on the security of the issuer or manufacturer. In 2011, when the technology firm RSA Security announced its SecurID authentication tokens had been stolen, one of the most high-profile examples of a compromised two-factor device occurred. If it is used to circumvent two-factor authentication, the account recovery mechanism itself can often be subverted because it sometimes resets the existing password of a user and e-mails a new password to allow the user to log in again, bypassing the 2FA process. The corporate Gmail accounts of the chief executive of Cloudflare were compromised in this way. Although 2FA is cheap, simple to implement and user-friendly based on SMS, it is vulnerable to multiple attacks. In its special publication 800-63-3, the National Institute of Standards and Technology (NIST) has discouraged the use of SMS in the 2FA services. Due to cell phone number portability attacks, such as the Signaling System 7 hack, against the mobile phone network and malware, such as Eurograbber, that can be used to intercept or divert text messages, NIST concluded that OTPs sent via SMS are too vulnerable.From all the above factors the idea of 2HFA is created. # Honeywords {#sec:honey} The fundamental principle behind the Honeywords scheme is to adjust the password storage mechanism in such a way that a password and a series of false passwords are associated with each account. The phony passwords are called honeywords. Sweetwords are the union of both honeywords and the password. As soon as the password is entered during the authentication process, the password database is immediately detected to have been compromised. Therefore unlike traditional schemes, implementations focused on honeywords can effectively detect violations of password databases. The method of Honeyword is as follows. During the authentication process, users select a username and a password, as with many traditional schemes. The Login Server (LS) then produces honeywords for the password and maintains a record in the database of passwords. The ordering of the sweetwords is randomly selected by the LS in each record. In addition, LS sends the corresponding user ID and actual password index to Honeychecker (HC), the auxiliary server built to store the password index. Let ui and H() denote respectively the user name of user I and the hash function used in the method. H(swi,j) denotes the hash of user i. jth sweetword. A standard example of a table of qualifications is illustrated in Figure [\[fig:honey1\]](#fig:honey1){reference-type="ref" reference="fig:honey1"}. HC saves the user IDs and the password index between the honeywords. During the authentication, no username or password itself is sent to HC. In comparison, HC is built as a hardened server that can only be reached by LS. A standard structure of the HC data is seen in Figure [\[fig:honey2\]](#fig:honey2){reference-type="ref" reference="fig:honey2"}. Notice that only two kinds of messages are accepted by HC: Check and Set To verify **if j=ci, check(i, j)** implies that uf j=ci, HC returns True, otherwise False is returned and a warning is activated. The command set is structured as: **Set (I j) indicates setting ci=j**. The user submits its username and password.LStries during the authentication process to locate the corresponding record for that username in the credentials database. If a record exists, LS computes the hash of the password sent and attempts to find a match in the sweetword hashes. If no match occurs, then the password sent is incorrect and access is refused. LS sends the respective user ID and the corresponding index to HC if there is a match. First, HC seeks the record that fits the user ID and compares the index value obtained with the one stored in its database. If the outcome is valid, then access is provided. Otherwise the HC returns incorrect, generates an alert and notifies the administrators of the device policy. Originally, the Honeywords scheme was constructed with the expectation that the opponent could steal the hashed passwords and invert the hashes to obtain the passwords. It is therefore presumed that both LS and HC will not be abused by the attacker within the same time frame. The Honeywords mechanism defends passwords from brute-force and dictionary attacks mentioned in Section [2](#2FA){reference-type="ref" reference="2FA"}. The method attempts to prevent violations of the password database and seeks to prevent only offline dictionary attacks where the adversary is believed to have taken the hashes of the password and abandoned the system. # The proposed Two-Factor HoneyToken Authentication (2FHA) Mechanism {#sec:prototype} In this article we introduce an alternative authentication method, for enhancing systems' security. The system combines two factor authentication with honeywords in order to make impossible for an attacker to bypass the authentication mechanism of the system. Even in the occasion that the attacker has access to the device that receives the token, e.g. by sim cloning, the proposed 2FHA method makes the authentication bypass unfeasible if not impossible. In order to demonstrate the proposed system we created a website that includes a login page and have developed a prototype. The user in order to enter the system must fill the correct username and password, which is the first authentication factor. Then the system sends to the user a number \(M\) that indicates the token that is correct on every login attempt in the future. When logging into the system from a new device, the user must enter the correct OTP. The user receives a number of tokens \(N\). He can choose with what platform wants to be alerted for the token, to get it (e-mail, sms, phone call etc.). Then we must enter the second authentication factor. The prototype of the 2FHA mechanism produces 3 qrcodes, each one of those is represented with a password and sends an sms message to the mobile phone of the user. The sms includes all 3 OTPs (One Time Password) passwords corresponding to each of the qrcodes. One is the correct and the others 2 are fake. The user now has to choose what it's more suitable method for him to continue in order to fill the OTP box and proceed in the website. We ahve to highlight here that the number of produced tokens is kept to 3 only for demonstrating purposes but can be generalized to a number \(N\). If the user chooses to scan the qrcodes, the process is simple. He scans the correct qrcode and then he fills the OTP box. The qrscanner is free software and most of them are suitable for any device. If the user doesn't have qrscanner then the option of sms is more convenient for him. The sms message as presented in Figure [\[fig:SMS\]](#fig:SMS){reference-type="ref" reference="fig:SMS"}, will be sent to the user the time he logins to the system. As you can see in Figure [\[fig:SMS\]](#fig:SMS){reference-type="ref" reference="fig:SMS"} the message contains 3 OTP passwords(OTP, OTP1, OTP2). These are the produced from the qr codes. Each user knows that only one of the 3 qrcodes is the correct while the other 2 are fake. If the user fills the OTP box correctly, he will continue to the system. If not, then he will be sent back to the initial login page and has to follow the procedure again. Also for precaution reasons the account of the user can be suspended. The OTPs must follow some rules when created; they can't be very similar among them in order to avoid mispelling mistakes. # Conclusion-Discussion {#sec:concl} In this paper we have taken actions to strengthen the security of a system against stolen tokens and penetration attempts. The proposed mechanism combines 2FA and Honeyword principles and can be integrated in any existing platform or web application. We plan to improve the system in the future by producing a higher number of qrcodes and passwords that will increase the security. In the prototype of the proposed system OTP's are sent them through SMS. In the near future we plan to integrate the proposed 2FHA with google and microsoft authenticators. We also plan to enhance the registration phase in order to make it more secure by encrypting the initial information.
{'timestamp': '2021-01-22T02:02:36', 'yymm': '2012', 'arxiv_id': '2012.08782', 'language': 'en', 'url': 'https://arxiv.org/abs/2012.08782'}
# Introduction At the end of this year, the largest national optical telescope, Big Telescope Azimuthal (BTA), with a 6-meter primary mirror marks its 45th anniversary, counting from the date of signature of the certificate by the interagency acceptance committee on December 30, 1975. Figure 1 shows the copies of the first images that were obtained with the BTA and confirmed the compliance of its parameters with the design characteristics. Until 1993, the BTA had been the largest telescope in the world, now it remains among the top twenty largest instruments. It is still the country's largest telescope and a joint-use instrument for Russian and foreign scientists. During its operation, the telescope has been constantly developed and upgraded. In the first decades, the main manufacturers of the telescope, among them LOMO (Leningrad Optical Mechanical Association), LZOS (Lytkarino Optical Glass Plant), and GOI (Vavilov State Optical Institute), had been providing assistance and patronage; recently, this task has almost completely fallen on the SAO RAS personnel. Among the main results that contributed to maintaining a high level of research at the BTA, we can highlight the creation of the new automated control system (BTA ACS), introduction of remote observations for most scientific equipment units, implementation of a program for the creation of modern light detectors, and, finally, the development of observing methods that cover the entire spectrum of scientific problems solved with the telescope. Summing up the intermediate results, we should also note a number of our failures, among those a technological error in the primary mirror repolishing procedure and the lack of methods for observing in the infrared range at the BTA. Among the reasons that had a negative impact are insufficient funding for complex technological projects, technological gap in the Russian industry, and the deficit of human resources. Rather a modest place of our telescope in the current world rankings, new large ground-based projects expected in this decade---the Extremely Large Telescope (39.3-m mirror, consortium of European countries) and the Giant Magellan Telescope (25.4 m, consortium led by the USA)---force us to search for a niche where our telescopes are going to be in demand and competitive at the world level. It can be argued that in recent decades the BTA has not been able to compete with new-generation world telescopes in addressing most challenging observational problems. In addition to purely technological reasons---the absence of active and adaptive optics on the telescope in the presence of a "thick" glass mirror with an average, by contemporary standards, diameter---there is the astroclimate, which is dramatically inferior to the best foreign sites both in seeing and in the number of clear nights. Nevertheless, the search for our "ecological niche" does not seem to us a hopeless venture. The BTA remains a fairly large instrument, it has a unique geographical location in latitude and longitude among the world's telescopes. Not least, the telescope is equipped and is constantly being reequipped with modern scientific instruments and light detectors, which allows astronomers to obtain world-class scientific results. In addition, an essential function of SAO RAS is the preservation of personnel potential, the staff of highly qualified specialists having experience in creating original research and observing methods and their implementation at a large telescope. # Scientific Equipment and Methods of Observation The history of the observatory and the BTA is inextricably associated with development of observing methods and scientific equipment. We can say with confidence that the current observing methods used at the telescope are organically related to the scientific interests of SAO RAS scientists, and thus already reflect BTA characteristics and naturally denote a niche for our research. It can be designated as (1) conducting research by classical means: high and low resolution spectroscopy and photometry of objects difficult to access for other large instruments and (2) the use of technically sophisticated and not widely used methods: high-accurate spectropolarimetry, fast photometry, panoramic spectroscopy, and speckle interferometry. Of course, the development and support of such methods should be continued in the future. ## Spectroscopy and Photometry of Faint Objects The multipurpose spectrographs of the BTA primary focus: SCORPIO-1 and SCORPIO-2, developed in the Laboratory of Spectroscopy and Photometry of Extragalactic Objects under the leadership of Chief Researcher V. L. Afanasiev, implement classical methods of spectroscopy and photometry of faint objects in a \(6'\times6'\) field of view in the whole visible wavelength range (from 360 to 1000 nm) with resolution \(R=\lambda/\Delta\lambda\) from 500 to 2500. SCORPIO-2 (shown in Fig. 2) perform in addition highly accurate polarimetric and spectropolarimetric observations and is equipped with a set of scanning Fabry--Perot interferometers with resolution \(R\) in the interval from 250 to 16 000, allowing panoramic spectroscopy in the same wide field (\(6'\times6'\)) but in a narrow spectral range (smaller than 10 nm). The developers also intend to introduce an integral-field spectroscopy unit, which is going to implement spectroscopy of extended objects with angular resolution better than \(1''\) and spectral resolution \(R\) in the range of 1000--2800 within a \(16''\times16''\) field. SCORPIO-1 and SCORPIO-2 are equipped with large-format light detectors based on CCDs up to \(2048\times4600\) pixels, manufactured in recent years by the Advanced Design Laboratory (ADLab) of SAO RAS. ## Stellar Spectroscopy The list of scientific equipment designed to obtain stellar spectra at the BTA with resolution greater than 10 000 is represented by two instruments: the Nasmyth Echelle Spectrograph (NES), created under the leadership of V. E. Panchuk in the Astrospectroscopy Laboratory, and the Main Stellar Spectrograph (MSS), the only instrument that remained in the BTA equipment out of those created by LOMO and GOI during the construction of the telescope. NES obtains spectra of stars up to \(10^m\) with\(R\sim40\,000\)--\(50\,000\) and a simultaneously recorded spectral range of about nm. To increase efficiency, the spectrograph has 3-fragment image slicers with slit widths of \(0\farcs4\) and \(0\farcs6\), there are also classical (\(0\farcs6\times2\farcs5\)) and adjustable (\(0\farcs2\)--\(2''\times0''\)--\(40''\)) slits. The instrument is equipped with two interchangeable cross-dispersers for operation in the \(\lambda\) ranges of 305--600 nm and 480--1000 nm. Figure 3 shows an example of a NES spectrum obtained in the near infrared wavelength range. The Main Stellar Spectrograph has been repeatedly upgraded by V. E. Panchuk, G. A. Chountonov, and I. D. Naidenov in order to install large-sized diffraction gratings, introduce CCD systems, and implement spectropolarimetry (circular polarization analyzers). The spectrograph obtains spectra of stars brighter than \(12^m\) with resolution up to \(R\sim15\,000\) and simultaneously recorded ranges of 55 nm for wavelengths shorter than 500 nm and more than 80 nm for the 560-900 nm range. The instrument operates mainly in the spectropolarimetric mode with a circular polarization analyzer combined with an image slicer producing 7 fragments for each polarization. Both spectrographs are equipped with large-format light detectors developed in SAO RAS ADLab based on the \(2048\times4608\) px E2V CCD42-90 chips. ## Speckle Interferometry with the Diffraction-Limited Angular Resolution The Group of High Resolution Methods in Astronomy led by Yu. Yu. Balega has been developing and constantly improving the speckle interferometry method since the 80s. The method is aimed at studying binary and multiple star systems, single stars, asteroids, and other celestial bodies with an angular resolution close to the diffraction limit of the telescope. This can be achieved by Fourier analysis of interference patterns from sub-apertures of the primary mirror, detected with exposures of 5--30 ms (the time of "freezing" of atmospheric fluctuations). The instrument operates in the 500-900 nm range with a set of narrow interference filters, its field of view with the currently used \(512\times512\) px Andor EMCCD iXon Ultra 897 light detector is 4, 7, or 28 depending on a microlense used, the limiting magnitude is \(15^m\), the angular resolution is \(0\farcs02\). ## Superfast Photometry For studies of optical variability of astrophysical objects with high temporal resolution (up to 1 ms), i.e., stellar mass black hole candidates, pulsars, flare stars, etc., the Group of Relativistic Astrophysics under the leadership of Leading Researcher G. M. Beskin designed the Multimode Panoramic Photopolarimeter. The method can use two types of detectors depending on required temporal resolution: either two position-sensitive detectors (to achieve a temporal resolution of the order of 1 ms) or an EMCCD camera with charge amplification (for times of the order of 0.1 s). The field of view is \(1'\) in the \(UBVR\) panoramic photometry mode, there is also a slit mode with adjustable slit widths and heights (\(0''\)--\(10''\times10''\)--\(60''\)). Linear polarization measurements (using a double Wollaston prism) and spectral modes with an Abbe prism and a diffraction grating are available. ## Light Detectors The Advanced Design Laboratory began development of optical light detectors for telescopes in the 80s under the leadership of Ph.D. in Engineering Science S. V. Markelov, and since the beginning of the 90s, as technical characteristics improved, the detectors began to be introduced into regular BTA observations, gradually replacing, where possible, photographic plates and detectors based on image intensifiers. Improvement of the quality of semiconductor crystals and development of the signal processing technique allowed us by the turn of the century to move from \(256\times256\) px systems with quantum efficiency of 30%--40% in the red part of the spectrum and additional noises of the order of hundreds of electrons to \(2048\times2048\) px systems with quantum efficiency of almost 90% and noises of several electrons. For the last 15 years, SAO telescopes have almost everywhere used systems sized from \(2048\times2048\) px to greater formats, and all further development followed mainly the path of increasing the stability of signal detection, expanding the spectral range to the red part, and eliminating effects of light interference in detector layers. To date, the observatory has mastered the production of detection systems based on the E2V \(4096\times4096\) chips, which have almost ideal properties: high quantum efficiency and a low level of interference noise in the near IR range. As part of joint work with Russian enterprises, ADLab has developed a technology for creating mosaic detection systems of an almost arbitrary format limited only by price and the size of the cryostat. Figure 4 shows a CCD system designed to equip the BTA fiber-fed spectrograph. # BTA Projects under Development Among the equipment at various stages of implementation, the appearance of which is expected in the near future, we can name: - Fiber-fed optic spectrograph for the BTA. It was manufactured as part of the SAO RAS project "Evolution of Stars from Their Birth to the Origin of Life" supported by the Russian Science Foundation in 2014--2018. The spectrograph is installed on the telescope and equipped with a light detector, test observations are carried out with a temporary optical camera, first results have been obtained, the manufacturer is adjusting the permanent optical camera. - Photospectropolarimeter in the Nasmyth-1 focus. The instrument is intended for operating in the semi-automatic mode for observations of alert transients. A \(1024\times1024\) px Andor EMCCD system with subsecond temporal resolution is planned as a detector. - To increase the recording rate in panoramic observations at the BTA,SAO RAS ADLab started in 2019 the development of systems based on CMOS sensors within the project "Development of the Large Unique Scientific Facility Big Telescope Alt-Azimuthal" supported by the Ministry of Science and Higher Education in 2019-2020 within the federal target program "Research and Development in Priority Areas of Development of the Scientific and Technological Complex of Russia for 2014--2020." The laboratory have created a prototype of a fast photodetector based on the CMOS sensor Gpixel GSENSE4040CMN and developed design documentation for a photodetector based on the astronomical-class large-format back-illuminated sensor GSENSE6060. - The BTA Multiobject Fiber Spectrograph (MOFS) is being upgraded. It is planned to develop a new camera, improve the technology for making masks, upgrade the control computer and software of the instrument. - The observatory is planning to introduce the first, experimental, adaptive system in the BTA Nasmyth-2 focus, which should improve the seeing in observations with high spectral resolution methods. The purchased adaptive system for correction of large-scale wavefront aberrations will perform aberration correction up to the 4th order at a frequency of 200 Hz with an accuracy of \(\lambda/15\). - The work on upgrading the BTA Echelle Spectropolarimeter for Primary Focus (ESPriF) continues; the instrument is planned to be equipped with a \(2048\times2048\) px Andor iKon-L 936 light detector. # The BTA As a Unique Scientific Facility The status of Russia's "Unique Scientific Facilities" held by the BTA andRATAN-600 of SAO RAS has in recent years become increasingly important in maintaining the provision of regular observations and financial stability of the observatory as a whole. Before the reform of the state academies of sciences in Russia, this status often remained nominal without significantly affecting the terms of funding. With a new regulatory framework and after the transfer of economic and administrative management functions from the Russian Academy of Sciences to the jurisdiction of the Federal Agency for Scientific Organizations in 2013, the situation with shared research facility centers (SRFCs) and the unique scientific facilities (USFs) has drastically changed. For instance, the basic funding of SAO RAS is calculated without taking into account the needs of the telescopes, as for an average scientific institute, and even allowing for the regional location (which, for example, reduces the estimated amount of the salary fund). In this situation, the USF status and the presence of external users make it possible to request and receive additional funds for operation of the telescopes, as well allowing participation in project competitions of the Ministry of Science and Higher Education to attract additional funding for development and renovation of scientific equipment. The loss of the USF status will inevitably lead to the loss of funds for operation of the telescopes. Among the main target indicators established by a special decree of the Russian Government on the requirements for SRFCs and USFs are the equipment workload (the ratio of the actual USF operating time to the maximum possible operating time per year), which must be 70% at least, the presence of external users, the number of organizations applying for a USF, and publications in indexed journals. Therefore, SAO RAS is extremely interested in maintaining high efficiency of the telescopes and attracting external users. In 2019, the BTA workload was 96%, the workload in the interests of external users 36%, we had 13 applying organizations, 41 papers were published based on observations obtained with the telescope in the journals indexed in the Web of Science. Even though it should be said that the principles of financing the science in Russia are far from ideal---for example, the specific character of development and production of unique scientific equipment is poorly taken into account, most project competitions are aimed at instant scientific return, amid significant investments in ensuring the work of scientists, inadequate attention is paid to the support of scientific and technical personnel---in general, the government aims at development of the scientific sphere, invests heavily in science and even, to some extent, provides feedback communication, which gives hope for gradual improvement of policy in this area. # The BTA in the SAO RAS Development Program until 2024 In conclusion, we present some points of the SAO RAS development program for 2019--2023 created in the framework of the implementation of the national "Science" project. Surely, the percentage of completion of these plans will be determined by the availability of funding, but the program shows well the directions along which SAO RAS scientists are going to progress in the coming years. The observatory supposes to develop the existing and create new effective methods for dealing most topic astronomical problems: studying the large-scale structure of the Universe, active galactic nuclei, detecting fast radio bursts, identifying optical transients associated with gamma-ray bursts and gravitational events, and exoplanet research. In particular, the development of the BTA complex involves the following projects: - development of new scientific instruments to increase technical capabilities of the BTA and expand the observed electromagnetic range: a near-infrared spectrograph for the 0.8--2.5 m wavelength interval and new-generation 2D spectrographs and spectropolarimeters for the primary focus; - development of new high-speed large-format light detectors and mosaic systems for optical telescopes; - development of adaptive optics for partial compensation of atmospheric distortions and vibrations of the telescope mount; - creation of a system for photometric control of the reflective layer in applying the coating onto the BTA primary mirror.
{'timestamp': '2020-12-17T02:10:08', 'yymm': '2012', 'arxiv_id': '2012.08754', 'language': 'en', 'url': 'https://arxiv.org/abs/2012.08754'}
null
null
null
null
null
null
# Introduction Machine learning models are shown to be susceptible to various types of adversarial attacks targeted to degrade the performance of machine learning models. Research in adversarial machine learning has mostly focused on targeting accuracy as a measure. However, with the advancement of research in fair machine learning, attention has geared toward fairness measures and their importance. A broad area of research has arisen by proposing different fairness measures and definitions. It is important to have systems that are away from discriminatory behavior as these systems can be used in sensitive environments, such as courts to make bail decisions; thus, crucial to have measures and standards to ensure that artificial intelligence (AI) systems are fair. Similar to accuracy, fairness measures are important in machine learning research and can be targeted by adversaries for malicious intent. For instance, adversaries can attack models used in government and other sensitive agencies to make them appear unfair in order to depreciate their values and credibility. Some adversaries can even gain profit with such attacks off of biasing decisions for their benefit, in credit or loan applications for instance; therefore, thinking about ways these attacks could happen for designing more robust systems in the future is crucial. The goal is to have systems that are robust to fairness attacks; thus, it is important to consider attacks targeted toward fairness. **Our contributions.** In this work, we propose data poisoning attacks that are able to target fairness. We propose two families of poisoning attacks. Those that target fairness only without having noticeable effects on accuracy to make them more subtle and undetectable, and those that affect both fairness and accuracy by injecting poisoned points during train time. Some adversaries may want to harm systems with regards to fairness and accuracy at the same time, while others might only consider fairness. In light of this, we introduce anchoring attack and influence attack on fairness techniques. In anchoring attack, we target fairness only without harming accuracy as much, while in influence attack on fairness, we target both accuracy and fairness measures by incorporating a loss function maximizing and attacking which would degrade fairness and accuracy. Through experimentation on three different datasets with different fairness measures and definitions, we show the effectiveness of our attacks in achieving the desired goal of either affecting fairness only without significant harm on accuracy or accuracy and fairness at the same time. In addition, we incorporate different baseline models to evaluate different aspects of our attacks. We demonstrate that original data poisoning attacks designed to attack accuracy are not suitable for fairness attacks; thus, highlighting the importance of attacks designed for fairness specifically. We also compare our methods against concurrent work on adversarial attacks on fairness and show the effectiveness of our methods over them. # Conclusion and Future Work In this work, we introduced two families of poisoning attacks that can target fairness. We showed the effectiveness of these attacks through experimentation on different real world datasets with different measures. Our influence attack on fairness (IAF) used the attack strategy as in influence attack. As an extension, we modified the loss function so that it can harm fairness as well as accuracy. Furthermore, we explore an attack strategy called the "anchoring attack" that harms fairness by placing poisoned points near target points in order to bias the outcome. Our paper also introduced two ways of sampling these target points. A direct extension of this approach is to explore other methods of sampling points to increase the effectiveness of this attack. The introduced attacks each have their own advantages and disadvantages. The goal was to design attacks that can complement each other. For instance, influence attack on fairness which is gradient-based can be slow. Anchoring attack, however, does not use gradients and is considerably faster. Further, while influence attack on fairness targets fairness harshly, anchoring attack is more subtle. And if anchoring attack can not explicitly control for accuracy fairness trade-off, influence attack on fairness can control this trade-off. This work points out several important angles for future research. Some important extensions are as follows: what other ways can machine learning systems be harmed by data poisoning attacks? How can we design and adapt defenses that can be effective against malicious attacks targeting fairness? Another question worth pursuing is from the perspective of the defender. Can current defenses against accuracy attacks be useful against the types of attacks that target fairness. If not, how do we adapt defenders so that they can prevent fairness attacks? These questions can help us design more fair, and accurate models that are robust to poisoning attacks. By extension, one can also think about stronger attacks against fairness than ours. We anticipate that continuing to blend the fields of adversarial and fair machine learning can create interdisciplinary ideas that can help us develop more robust and fair machine learning models. # Evaluation In our experiments, we evaluate our attacks with regards to different measures, such as accuracy and foundational fairness measures: statistical parity, and equality of opportunity differences. We also utilize three real world datasets in our experiments, introduced below. We compare against a suite of baselines that test our attacks' performance with regards to accuracy and fairness. Our results indicate that our attacks, the anchoring attack and influence attack on fairness, are effective in terms of affecting fairness aspects of the model. ## Datasets We use three different real world datasets in our experiments with gender as the sensitive attribute. The data was split into an 80-20 train and test split.\ **German Credit Dataset.** This dataset comes from UCI machine learning repository. It contains the credit profile about individuals with 20 attributes associated to each data person. In our experiments, we utilized all the 20 attributes from this dataset. The classification goal is to predict whether an individual has good or bad credit.\ **COMPAS Dataset.** Propublica's COMPAS dataset contains information about defendants from Broward County. We utilized the features in Table [2](#compas_features){reference-type="ref" reference="compas_features"} as our prediction features. The classification goal is to predict whether an individual will recommit a crime within two years.\ **Drug Consumption Dataset.** This dataset comes from the UCI machine learning repository. It contains information about individuals. We utilized the features listed in Table [2](#compas_features){reference-type="ref" reference="compas_features"} as our prediction features. The classification goal is to predict whether an individual has consumed cocaine or not in their lifetime. ## Measures In addition to accuracy, we have utilized two well-known fairness measures to analyze the performance of different attacks with regard to fairness, detailed below.\ **Statistical Parity Difference** Statistical parity is a well-known measure (definition) introduced in. We utilize this measure as one of our metrics for fairness. It captures the predictive outcome differences between different (advantaged and disadvantaged) demographic groups. The measure is defined below and is referred to as statistical parity throughout our paper. \[SPD = |p(\hat{Y}=+1|x \in \mathcal{D}_a)-p(\hat{Y}=+1|x \in \mathcal{D}_d)|\] **Equality of Opportunity Difference** Equality of opportunity is another well-known fairness definition introduced in. We utilized the equality of opportunity difference as another fairness metric. It captures differences in the true positive rate between different (advantaged and disadvantaged) demographic groups. The measure is defined below and is addressed as equality of opportunity throughout this paper. \[\begin{aligned} EOD = |p(\hat{Y}=+1|x \in \mathcal{D}_a, Y=+1) \\-p(\hat{Y}=+1|x \in \mathcal{D}_d, Y=+1)| \end{aligned}\] ## Methods To evaluate our attacks, we compared them against an attack that does not consider fairness and only considers accuracy to show that such attacks are not necessarily effective for fairness, motivating the need for fairness attacks. Also, we compared our attacks in terms of how they attack accuracy as a measure versus attacks that are specifically designed to target accuracy. We also compared our attacks to an attack that is optimized for fairness. The evaluated methods are listed below. In our experiments, the poisoned points are inversely proportional to class balance as also suggested in, so we made \((|\mathcal{D}_{c}^+|\epsilon)\) copies from the negative poison instance (\(\mathcal{I}_{-}\)) and \((|\mathcal{D}_{c}^-|\epsilon)\) copies from the positive poison instance (\(\mathcal{I}_{+}\)) in which \(|\mathcal{D}_{c}^+|\) and \(|\mathcal{D}_{c}^-|\) denote the number of positive and negative points in the clean data respectively. Hinge loss was used to control for accuracy for all the methods in our experiments as in.\ **Influence Attack on Fairness (IAF)** In this paper, our influence attack on fairness is where the attack tries to maximize the covariance between the signed distance of feature vectors from the decision boundary to the sensitive features, which would then cause the attack to target and degrade fairness. In our experiments we set \(\lambda =1\). **Random Anchoring Attack (RAA)** The anchoring attack where a target point is picked at random. In this new set of attacks, the goal is to place poisoned points in the vicinity of the target points in which the poisoned and target points have the same demographic group but different labels. In our experiments we set \(\tau=0\) indicating the closest vicinity. **Non-random Anchoring Attack (NRAA)** This attack builds upon the random anchoring attack; however, in this attack, the target point is not chosen randomly. In this attack, the point with the most neighbors similar to it (with the same demographic group and label) is chosen as the target point so that we can infect as many similar points to the target point as possible. This can be effective because we are infecting more targeted points; however, in some cases it might be less effective since more poisoned points may be needed in order to achieve the goal of infecting many points and shifting the decision boundary. In our experiments we set \(\tau=0\). **Influence Attack (Koh et al.)** This is a type of attack that is targeted only toward affecting accuracy. The reason we include this type of attack along with attacks targeted toward fairness is that it can help us understand how attacks targeting only accuracy affect fairness measures. Attacks of this nature can also serve as a good comparison because they show the effect of attacks on accuracy; because this attack is specifically designed to target accuracy, it can be a strong method to compare against. **Poisoning Attack Against Algorithmic Fairness (Solans et al.)** In, the authors propose a loss function that claims to target fairness measures. We utilized the loss introduced in this paper as depicted below in equation [\[baseline_loss\]](#baseline_loss){reference-type="eqref" reference="baseline_loss"} in the influence attack from and compared it to our proposed attacks. The goal of was to incorporate the loss in [\[baseline_loss\]](#baseline_loss){reference-type="eqref" reference="baseline_loss"} into an attack strategy that would maximize the loss; thus, we incorporated this loss into the influence attack, which we found to be a strong attack strategy in maximizing the loss and also the same attack strategy used in our influence attack on fairness. In our experiments, we utilized the same \(\lambda\) value as proposed in to balance the class priors. \[\begin{aligned} L_{adv}(\hat{\theta};\mathcal{D}_{test}) = &\underbrace{\sum_{k=1}^p \ell(\hat{\theta};x_k,y_k)}_\text{disadvantaged} + \lambda \underbrace{\sum_{j=1}^m \ell(\hat{\theta};x_j,y_j)}_\text{advantaged} \\ & where \;\; \lambda = \frac{p}{m}. \numberthis \label{baseline_loss} \end{aligned}\] ## Results The results in Figure [\[attack_results\]](#attack_results){reference-type="ref" reference="attack_results"} demonstrate that the influence attack (Koh et al.), although performing remarkably well in attacking accuracy, does not attack fairness well. The results also confirm that our influence attack on fairness method outperforms (Solans et al.) in affecting fairness measures, and anchoring attack outperforms (Solans et al.) in affecting fairness measures in most of the cases. One can observe that influence attack on fairness is the most effective amongst all the attacks in attacking fairness measures. Due to the nature of our influence attack on fairness loss function and its controlling parameter on accuracy and fairness, it can be utilized in scenarios where the adversary wants to maliciously harm the system in terms of accuracy, or fairness, or both. On the other hand, anchoring attacks can be utilized in places where the adversary wants to subtly harm accuracy with an effective harm on fairness. These types of attacks can be used by, e.g., adversaries who would want to gain profit off of biasing decisions for their benefit; thus, to remain less detectable they do not harm accuracy. Although it is possible that anchoring attack can harm accuracy to a higher degree, as shown empirically in our results, it is less likely that anchoring attack is able to degrade accuracy by a large amount in practice for real world datasets. In addition, in Figure [\[lambda_attack_results\]](#lambda_attack_results){reference-type="ref" reference="lambda_attack_results"} we demonstrate the effect of our regularized loss in the influence attack on fairness. The results show that with the increase of lambda the attack affects fairness measures more as expected from the loss; however, for the lower lambda values the attack acts similar to the original influence attack targeted towards accuracy. The results also show that higher epsilon values highlight the behavior of the loss more as expected such that for high epsilon value of 1 the changes are more significant with modifications to the lambda value in the loss function, while less subtle for lower epsilon values such as 0.1. # Related Work Here, we cover related work from both fair machine learning as well as adversarial machine learning research. ## Adversarial Machine Learning Research in adversarial machine learning is mostly focused on designing defenses and attacks against machine learning models. Ultimately, the goal is for machine learning models to be robust toward malicious activities designed by adversaries. Thus, it is important to consider both sides of the spectrum in terms of designing the attacks and defenses that can overcome the attacks. In adversarial machine learning, different types of attacks, such as data poisoning and evasion attacks, exist. In evasion attacks, the goal is to come up with adversarial examples that are imperceptible to human eye but can deceive benign machine learning models during test time. On the other hand, in data poisoning attacks, the goal is to manipulate the training data--via adding, removing, or changing instances--so that the learned model is malicious. Different algorithms and approaches have been proposed for poisoning attacks focusing on accuracy as the performance measure. In this paper, we also focused on data poisoning attack while considering fairness as a performance measure in addition to accuracy. ## Fair Machine Learning Research in fair machine learning has gained attention recently, with many active research areas. For instance, some work introduces new definitions and measures for fairness. has a complete list of the definitions on fairness. Other work utilizes these definitions and tries to design and learn fair classification, regression, and representations. The battle to mitigate unfairness can happen in different phases. Some target making the data more fair, while others target the algorithms. These mitigation techniques can also vary in when and how they are applied. For instance, some approaches are pre-processing techniques in which the focus is to remove discrimination from the data before the learning phase. Others try to impose fairness during training via incorporation of fair loss functions or other approaches during the training phase, known as in-processing, while some are post-processing approaches in which the model is treated as a black box system and discrimination removal is performed on the output of the model. performs a literature review of fair machine learning research in different subject domains, which can be referenced for more detail. In our work, we utilize some of the definitions and measures widely used in fair machine learning research in measuring the performance of our attacks with regard to fairness. We were also inspired by some loss functions introduced in fair classification tasks in one of our attacks. ## Adversarial Fair Machine Learning The rapid and significant growth of research in algorithmic fairness highlights the importance of machine learning models being fair and robust toward any unfair behavior. To this end, it is important to think about attacks that can make models unfair in order to strengthen models against such attacks. This recent and interesting line of work combines the two fields of fair and adversarial machine learning. The only work we are aware of that proposes poisoning attacks against algorithmic fairness is. In, the authors propose an attack that targets fairness. We compared this attack with our two newly proposed attacks using three real world datasets. Our anchoring attack does not rely on any loss function making it different in nature with the previous work. In our influence attack on fairness we introduce a new loss function different than the previous work which is more in line with fairness literature and work done in fairness domain making our attack more intuitive. In addition, our influence attack on fairness is able to control a fairness-accuracy trade-off with the hyper-parameter involved in its loss function which is also shown in Figure [\[lambda_attack_results\]](#lambda_attack_results){reference-type="ref" reference="lambda_attack_results"} as an additional experimental result. This line of work can bring researchers from both fields closer and inspire new and interesting research problems. Another interdisciplinary research field combining concepts from fairness and privacy includes the differential privacy line of work. # Ethics Statement This paper furthers ethics in the machine learning community in two major ways: - Despite extensive research in adversarial machine learning, not much attention has been given to scenarios where fairness is a possible target of deliberate attacks. We suggest that fairness metrics are as important as accuracy, because they can be manipulated in sensitive environments to achieve malicious goals. Our work points out potential vulnerabilities of machine learning models against fairness-targeting attacks. This line of research can raise awareness, and motivate researchers to introduce methods to mitigate harmful effects of adversarial attacks on fairness. The attacks proposed in this paper are meant to ensure the robustness of fairness in machine learning applications. Nevertheless, we acknowledge that in the wrong hands these type of tools could enable an attacker to harm fairness in extant machine learning systems. - Fairness and adversarial machine learning are both very important research areas with major safety, security, and ethics implications both within and beyond on the AI/machine learning community. This work combines ideas from both adversarial and fair machine learning, and will hopefully facilitate collaboration among researchers from both communities, eventually leading to more robust and fair machine learning models. # Introduction With proliferation of machine learning (ML) applications in everyday life, it is imperative that ML algorithms underlying those applications do not discriminate, especially when it comes to potentially sensitive and consequential decisions, such as bail decisions . Thus, recent research has looked into possible biases present in ML algorithms, and proposed different measures and definitions for characterizing fairness. Despite this interest, not much is known about the robustness of various fairness measures with respect to random, or perhaps malicious, perturbations. Indeed, it is known that machine learning models can be susceptible to various types of adversarial attacks targeted to degrade the performance of machine learning models. However, research in adversarial machine learning has mostly focused on targeting accuracy. We argue that, like accuracy, fairness measures can be targeted by malicious adversaries as well. For instance, adversaries can attack models used by a government agency with the goal of making them appear unfair in order to depreciate their value and credibility. Some adversaries can even profit from such attacks by biasing decisions for their benefit, e.g., in credit or loan applications. Thus, one should consider fairness when assessing the robustness of ML systems. **Our contributions.** In this work, we propose data poisoning attacks that target fairness. We propose two families of poisoning attacks: *anchoring* and *influence*[^1]. In anchoring attacks the goal is to place poisoned points to affect fairness without modifying the attacker loss. On the other hand, our influence attack on fairness can affect both fairness and accuracy by injecting poisoned points during train time via a specific adversarial loss that regularizes between fairness and accuracy losses. Some adversaries may want to harm systems with regard to fairness and accuracy at the same time, while others might only consider one that can be achieved by this regularization. In the anchoring attack, we place poisoned points to bias the decision boundary; in the influence attack, we target fairness measures by incorporating a loss function maximizing and attacking which can degrade fairness by maximizing the covariance between the decision outcome and sensitive attributes. Through experimentation on three different datasets with different fairness measures and definitions, we show the effectiveness of our attacks in achieving the desired goal of affecting fairness. In addition, we incorporate different baseline models to evaluate different aspects of our attacks. We demonstrate that original data poisoning attacks designed to attack accuracy are not suitable for fairness attacks, thus highlighting the importance of attacks designed for fairness. We also compare our methods against concurrent work on adversarial attacks on fairness and show the effectiveness of our methods in comparison. # Background on Poisoning Attacks Consider a supervised learning problem characterized by a loss function \(\mathcal{L}(\theta;\mathcal{D})\) and an adversarial loss \(L_{adv}(\hat\theta;\mathcal{D})\), where \(\hat\theta\) is the set of learnable parameters and \(\mathcal{D}\) is a labeled dataset. Let \(\mathcal{D}_{train}\) be the training dataset. We assume that the adversary can poison a fraction of those data points, so that \(\mathcal{D}_{train}=\mathcal{D}_{c} \cup \mathcal{D}_{p}\), where \(\mathcal{D}_{c}\) and \(\mathcal{D}_{p}\) are the set of clean and poisoned data points, respectively. We assume that \(|\mathcal{D}_{p}|= \epsilon |\mathcal{D}_{c}|\). Furthermore, \(\mathcal{D}_{p} \subseteq \mathcal{F}_{\beta}\) where \(\mathcal{F}_{\beta}\) is the feasible set, which is a set selected by a defense mechanism based on anomaly detection techniques, containing elements that the defender considers as sanitized data to train its model. The existence of the feasible set in the objective helps the poisoned points to blend with the natural data and make it more difficult for anomaly detector techniques to detect them. A data poisoning attack can be written as the following optimization problem (over the set of poisoned data points): \[\begin{aligned} \underset{\mathcal{D}_p}\max & \; L_{adv}(\hat\theta;\mathcal{D}_{test}) \\ s.t. \;\; & |\mathcal{D}_p| = \epsilon |\mathcal{D}_{c}| \\ & \mathcal{D}_{p} \subseteq \mathcal{F}_{\beta} \qquad \qquad \\ \text{where} \;\; & \hat\theta = \argmin_{\theta} \; \mathcal{L}(\theta;\mathcal{D}_{c} \cup \mathcal{D}_{p}). \numberthis \label{objective} \end{aligned}\] In essence, the adversary attempts to maximize its test loss \(L_{adv}\) by carefully selecting poisoned data points. These types of attacks are shown to be powerful against defenders that are trying to minimize their own loss \(\mathcal{L}\), while the attacker is trying to harm the defense. In, authors propose to sample a positive \((\Tilde{x}_+,+1)\) and a negative \((\Tilde{x}_-,-1)\) instance and make \(\epsilon |\mathcal{D}_c|\) copies from these sampled instances to serve as poisoned data points inversely proportional to the class balance such that there are \((|\mathcal{D}_{c}^+|\epsilon)\) copies from the negative poison instance \((\Tilde{x}_-,-1)\) and \((|\mathcal{D}_{c}^-|\epsilon)\) copies from the positive poison instance \((\Tilde{x}_+,+1)\) in which \(|\mathcal{D}_{c}^+|\) and \(|\mathcal{D}_{c}^-|\) represent the number of positive and negative points in the clean data respectively. # Poisoning Attacks against Fairness Now that we have discussed poisoning attacks, we will discuss how these attacks can be extended to fairness. We follow a common fairness setup where there are two groups: advantaged and disadvantaged. An example of advantaged and disadvantaged groups can be male and female in the job market where males could have advantage over females in getting hired in certain jobs. We assume that all poisoned points belong to either the advantaged or disadvantaged group, \(\mathcal{D}_{p} \subseteq (\mathcal{D}_{a} \cup \mathcal{D}_{d})\), in which \(\mathcal{D}_{a}\) represents data points from the advantaged demographic group and \(\mathcal{D}_{d}\) represents data points from the disadvantaged demographic group. ## Influence Attack on Fairness For the influence attack on fairness, we use the influence attack introduced in, with a modification that includes the demographic information, in which the attack tries to maximize a given loss. We then incorporate a loss function maximizing which using the influence attack can harm fairness. In, authors propose a loss function for fair classification with a constraint involving the covariance between the sensitive features (\(z\)) and the signed distance from feature vectors to the decision boundary (\(d_{\theta}(x)\)) formalized as: \[Cov(z,d_{\theta}(x)) \approx \frac{1}{N} \sum_{i=1}^N (z_i-\Bar{z})d_{\theta}(x_i).\] By combining the above constraint with the original classification loss and maximizing it, the attacker can harm both fairness and accuracy at the same time via a regularization term, \(\lambda\), that controls the trade-off between these two terms. Thus, the loss in our influence attack on fairness contains two parts: \(\ell_{acc}\) and \(\ell_{fairness}\) in which \(\ell_{acc}\) controls for accuracy and \(\ell_{fairness}\) controls for fairness constraints. \[\begin{aligned} L_{adv}(\hat\theta;\mathcal{D}_{test}) & = \ell_{acc} +\lambda \ell_{fairness} \\ where \;\; \ell_{fairness} & = \frac{1}{N} \sum_{i=1}^N (z_i-\Bar{z})d_{\hat\theta}(x_i). \numberthis \label{hard_biasing_loss} \end{aligned}\] In other words, the influence attack on fairness would try to harm the fairness constraint and affect a model with respect to disparate impact . This loss can affect a model in terms of both fairness and accuracy with the regularization term \(\lambda\) that controls the trade-off. In order to maximize the loss in [\[hard_biasing_loss\]](#hard_biasing_loss){reference-type="eqref" reference="hard_biasing_loss"}, we use the influence attack strategy with changes that would incorporate demographic information as shown in Algorithm [\[hard_biasing_influence\]](#hard_biasing_influence){reference-type="ref" reference="hard_biasing_influence"}. Similar to the convention in, we sample one positive and one negative instance uniformly at random and make copies of the sampled instances that serve as our poisoned points. However, since we now have to take demographics into consideration for maximizing the bias and harming fairness, we sample the positive instance from \(\mathcal{D}_{a}\) and the negative instance from \(\mathcal{D}_{d}\). Notice that the opposite is also possible if an adversary wants to skew the disadvantaged group into being advantageous; however, for the goals of this paper and showing how our methods can increase the bias and harm fairness, we follow the aforementioned sampling procedure. ## Anchoring Attack We now describe a simple generic anchoring attack that can work with any loss function. Our results indicate that the proposed attack harms the model with regard to fairness. The anchoring attack works as follows (details in Algorithm [\[soft_biasing_alg\]](#soft_biasing_alg){reference-type="ref" reference="soft_biasing_alg"}). First, the attacker samples a target \(x_{target}\) that belongs to the clean data, \(x_{target} \in \mathcal{D}_c\). Next, the attacker generates poisoned data point \(\Tilde{x}\) in the vicinity of \(x_{target}\), so that this new point has the same demographic but the opposite label, \(demographic(x_{target})=demographic(\Tilde{x})\) and \(y_{target}\neq \Tilde{y}\). The general idea of the attack is to target some points (\(x_{target}\)) and cloud their labels through poisoned points that have opposite labels, which would lead to a skewed decision boundary, change in predictive labels of clean target points, and more biased outcomes. The right plot in Figure [\[attack_disc\]](#attack_disc){reference-type="ref" reference="attack_disc"} depicts an anchoring attack in which the poisoned points colored in black are placed to lie close to the target points that have the same demographic group but opposite label to bias the predictive outcome (black advantaged poisoned points with label +1 are targeting advantaged point with label-1, and black disadvantaged poisoned points with label-1 are targeting disadvantaged point with label +1). This placement of poisoned points in the space during the learning procedure will lead the decision boundary to change and, as a result, will cause more advantaged points to have a predictive outcome of +1 and more disadvantaged points to have a predictive outcome of-1, which is biasing the model's prediction. \(\mathbf{x_{target}}\) can be sampled in several ways. We introduce two ways, *random* and *non-random*, for sampling \(\mathbf{x_{target}}\). **Random Anchoring Attack.** In random anchoring attack, \(\mathbf{x_{target}}\) is sampled uniformly at random for each demographic group. **Non-random Anchoring Attack.** In the non-random anchoring attack, we choose popular \(\mathbf{x_{target}}\) as our target for each demographic group. Here, popular \(\mathbf{x_{target}}\) means the point that is close to more similar instances \(x_i\), eligible to serve as targets, such that \(demographic(x_i) = demographic(x_{target})\) and \(y_i = y_{target}\). By doing this, we can ensure to affect as much as points similar to \(\mathbf{x_{target}}\) as possible to maximize our biasing goal. Pick \(x\) with \(max(c)\) as \(x_{target}\) where \(c\) is calculated for each \(x\) as follows: \(\forall x_i\) if \(demographic(x_i) = demographic(x)\) and \(y_i = y\) and \(||x_i-x || < \sigma\) then increase \(c\) for \(x\). [^1]: https://github.com/Ninarehm/attack
{'timestamp': '2020-12-17T02:08:27', 'yymm': '2012', 'arxiv_id': '2012.08723', 'language': 'en', 'url': 'https://arxiv.org/abs/2012.08723'}
# Introduction {#sec-introduction} Until recently, the most accurate methods for time series classification were limited by high computational complexity. While there have been considerable advances in recent years, computational complexity and a lack of scalability remain persistent problems. [Rocket]{.smallcaps} achieves state-of-the-art accuracy with a fraction of the computational expense of any method of comparable accuracy by transforming input time series using random convolutional kernels, and using the transformed features to train a linear classifier. We show that it is possible to reformulate [Rocket]{.smallcaps}, making it up to \(75\) times faster on larger datasets, and making it almost entirely deterministic (and optionally, with additional computational expense, fully deterministic), while maintaining essentially the same accuracy. We call this method [MiniRocket]{.smallcaps} (for **MINI**mally **R**and**O**m **C**onvolutional **KE**rnel **T**ransform). Like [Rocket]{.smallcaps}, [MiniRocket]{.smallcaps} transforms input time series using convolutional kernels, and uses the transformed features to train a linear classifier. However, unlike [Rocket]{.smallcaps}, [MiniRocket]{.smallcaps} uses a small, fixed set of kernels, and is almost entirely deterministic. [MiniRocket]{.smallcaps} maintains the two most important aspects of [Rocket]{.smallcaps}: dilation and PPV, i.e., 'proportion of positive values' pooling. [MiniRocket]{.smallcaps} exploits various properties of the kernels, and of PPV, in order to massively reduce the time required for the transform. [MiniRocket]{.smallcaps} demonstrates that, while random convolutional kernels are highly effective, it is possible to achieve essentially the same accuracy using a mostly-deterministic and much faster procedure. Figure [\[fig-rank-ucr109\]](#fig-rank-ucr109){reference-type="ref" reference="fig-rank-ucr109"} shows the mean rank of [MiniRocket]{.smallcaps} in terms of accuracy versus other state-of-the-art methods over 30 resamples of 109 datasets from the UCR archive of benchmark time series. On average, [MiniRocket]{.smallcaps} is marginally more accurate than [Rocket]{.smallcaps}, and slightly less accurate than the most accurate current methods. Figure [\[fig-transform-time-minirocket-vs-rocket\]](#fig-transform-time-minirocket-vs-rocket){reference-type="ref" reference="fig-transform-time-minirocket-vs-rocket"} shows total transform time (training and test) for [MiniRocket]{.smallcaps} versus [Rocket]{.smallcaps}, for the same 109 datasets. On average, [MiniRocket]{.smallcaps} is more than \(30\) times faster than [Rocket]{.smallcaps} (the advantage is even greater for larger datasets: see Section [4.2](#subsec-scalability){reference-type="ref" reference="subsec-scalability"}). Restricted to a single CPU core, total compute time for [Rocket]{.smallcaps} over all 109 datasets is 2 hours 2 minutes (1h 55m transform time), versus just 8 minutes for [MiniRocket]{.smallcaps} (2m 30s transform time). To put this in context, total compute time for [MiniRocket]{.smallcaps} for all 109 datasets is less than the compute time for [Rocket]{.smallcaps} for just one of those datasets. (Compute times are averages over 30 resamples, run on a cluster using Intel Xeon E5-2680 v3/4 and Xeon Gold 6150 CPUs, restricted to a single CPU core per dataset per resample.) While only broadly comparable due to hardware and software differences, total compute time for the same 109 datasets using a single CPU thread is approximately 13 hours for cBOSS, more than a day for CIF, more than two days for TDE, approximately a week for Proximity Forest, more than two weeks for HIVE-COTE, and several weeks for TS-CHIEF. Total compute time for InceptionTime (using GPUs, and for the original training/test splits rather than resamples) is more than 4 days. [MiniRocket]{.smallcaps} represents a significant advance in accuracy relative to computational cost. [MiniRocket]{.smallcaps} is significantly faster than any other method of comparable accuracy (including [Rocket]{.smallcaps}), and significantly more accurate than any other method of even roughly-similar computational expense. The rest of this paper is structured as follows. In Section [2](#sec-related-work){reference-type="ref" reference="sec-related-work"}, we review relevant related work. In Section [3](#sec-method){reference-type="ref" reference="sec-method"}, we detail the changes from [Rocket]{.smallcaps} to [MiniRocket]{.smallcaps}. In Section [4](#sec-experiments){reference-type="ref" reference="sec-experiments"}, we present experimental results for [MiniRocket]{.smallcaps} in terms of accuracy and scalability, as well as a sensitivity analysis in relation to key parameter choices. # Related Work {#sec-related-work} ## Current State of the Art Recent advances in accuracy have largely superseded the most accurate methods originally identified in. According to, the most accurate current methods for time series classification are HIVE-COTE and its variants, TS-CHIEF, InceptionTime, and [Rocket]{.smallcaps}. However, while accuracy has improved, with some exceptions computational complexity and a lack of scalability remain persistent problems. TS-CHIEF builds on Proximity Forest, an ensemble of decision trees using distance measures as splitting criteria. In addition to distance measures, TS-CHIEF uses interval-based and spectral-based splitting criteria. InceptionTime is an ensemble of convolutional neural networks based on the Inception architecture, and is the most accurate convolutional neural network model for time series classification. The Temporal Dictionary Ensemble (TDE) is a recent dictionary method based on the frequency of occurrence of patterns in time series. TDE combines aspects of earlier dictionary methods including cBOSS, a more scalable variant of BOSS. Catch22 is a transform based on 22 predefined time series features, used in combination with a decision tree or random forest. On its own, catch22 is fast, but highly inaccurate: see. The Canonical Interval Forest (CIF) is a recent method which adapts the Time Series Forest (TSF) to use catch22 features. CIF is significantly more accurate than either catch22 or TSF. HIVE-COTE is an ensemble of other methods including BOSS and TSF. Two recent variants of HIVE-COTE, namely HIVE-COTE/TDE (using TDE in place of BOSS) and HIVE-COTE/CIF (using CIF in place of TSF) have been shown to be significantly more accurate than HIVE-COTE, or any other existing method for time series classification. These variants are, in turn, based on an updated 'base' version of HIVE-COTE. While state of the art in terms of accuracy, with the exception of cBOSS these methods are limited by high computational complexity, requiring days or even weeks to train on the datasets in the UCR archive. While more scalable, cBOSS is significantly less accurate than most of the other methods. ## [Rocket]{.smallcaps} [Rocket]{.smallcaps} achieves state-of-the-art accuracy, matching the most accurate methods for time series classification (with the exception of the most recent variants of HIVE-COTE), but is considerably faster and more scalable than other methods of comparable accuracy. [Rocket]{.smallcaps} transforms input time series using random convolutional kernels, and uses the transformed features to train a linear classifier. Each input time series is convolved with \(10{,}000\) random convolutional kernels. [Rocket]{.smallcaps} applies global max pooling and PPV (for 'proportion of positive values') pooling to the resulting convolution output to produce two features per kernel per input time series, for a total of \(20{,}000\) features per input time series. The transformed features are then used to train a linear classifier: a ridge regression classifier, or logistic regression trained using stochastic gradient descent (for larger datasets). The kernels are random in terms of their length, weights, bias, dilation, and padding: see Section [3.1](#subsec-removing-randomness){reference-type="ref" reference="subsec-removing-randomness"}. The two most important aspects of [Rocket]{.smallcaps} in terms of achieving state-of-the-art accuracy are the use of dilation, sampled on an exponential scale, and the use of PPV. [Rocket]{.smallcaps} forms the basis for [MiniRocket]{.smallcaps}. The differences between [Rocket]{.smallcaps} and [MiniRocket]{.smallcaps} are detailed in Section [3](#sec-method){reference-type="ref" reference="sec-method"}. ## Other Methods The use of a small, fixed set of kernels differentiates [MiniRocket]{.smallcaps} from both [Rocket]{.smallcaps}, which uses random kernels, and convolutional neural networks such as InceptionTime, which use learned kernels. It also differentiates [MiniRocket]{.smallcaps} from other methods with at least superficial similarities to [Rocket]{.smallcaps}, such as random shapelet methods as in, and other random methods such as those based on. In using kernels with weights constrained to two values (see Section [3.1.2](#subsubsec-weights){reference-type="ref" reference="subsubsec-weights"}), there are obvious similarities with binary and quantised convolutional neural networks. [MiniRocket]{.smallcaps} makes use of at least two advantages of binary/quantised kernels, namely, the ability to perform the convolution operation via addition, as well as efficiencies arising from the relatively small number of possible binary kernels of a given size, e.g.,. However, while the kernels used in [MiniRocket]{.smallcaps} are binary in the sense of having only two values, these values are *not* \(0\) and \(1\) (or \(-1\) and \(1\)). In fact, the actual values of the weights are not important: see Section [3.1.2](#subsubsec-weights){reference-type="ref" reference="subsubsec-weights"}. [MiniRocket]{.smallcaps} does not use bitwise operations, and the input and convolution output are used at full precision. The optimisations used in [MiniRocket]{.smallcaps} are similar in motivation to several optimisations developed for convolutional neural networks, i.e., broadly speaking, to reduce the number of operations (especially multiplications) required to perform the convolution operation, e.g.,. In precomputing the product of the kernel weights and the input, and using those precomputed values to construct the convolution output (see Sections [3.2.3](#subsubsec-factoring-out){reference-type="ref" reference="subsubsec-factoring-out"} and [3.2.4](#subsubsec-all-kernels-at-once){reference-type="ref" reference="subsubsec-all-kernels-at-once"}), the optimisations used in [MiniRocket]{.smallcaps} bear some resemblance to highly simplified versions of shift-based methods, where conventional convolutional kernels are replaced by a combination of \(1 \times 1\) convolutions and spatial shifts in the input, and lookup-based methods, where the convolution operation is performed via linear combinations of the precomputed convolution output for a small 'dictionary' of kernels. However, the optimisations used in [MiniRocket]{.smallcaps} are much simpler than these methods. [MiniRocket]{.smallcaps} uses a fixed set of kernels, and uses the convolution output for these kernels directly, rather than through a learned linear combination, c.f., e.g.,. The optimisations arise as a natural result of using this fixed set of kernels, rather than being general-purpose optimisations. Several things further distinguish [MiniRocket]{.smallcaps} (and [Rocket]{.smallcaps}) from most approaches involving convolutional neural networks. The features produced by the transform are all independent of each other (there is no hidden layer). Neither the convolution output nor the pooled features are transformed through, e.g., a sigmoid function or rectified linear unit (ReLU). As such, the classifier learns a direct linear function of the features produced by the transform. [MiniRocket]{.smallcaps} is also distinguished by its use of dilation (similar to using many different dilations in a single convolutional layer, with dilations taking any integer value not just powers of two), and PPV. # Method {#sec-method} [MiniRocket]{.smallcaps} involves making certain key changes in order to remove almost all randomness from [Rocket]{.smallcaps} (Section [3.1](#subsec-removing-randomness){reference-type="ref" reference="subsec-removing-randomness"}), and exploiting these changes in order to dramatically speed up the transform (Section [3.2](#subsec-optimising-the-transform){reference-type="ref" reference="subsec-optimising-the-transform"}). In tuning kernel length, weights, bias, etc., we have restricted ourselves to the same 40 'development' datasets as used in, with the same aim of avoiding overfitting the entire UCR archive. (Note, however, that it is not necessarily the aim of [MiniRocket]{.smallcaps} to maximise accuracy *per se*, but rather to balance accuracy with parameter choices which remove randomness and are conducive to optimising the transform.) The procedures for setting the parameter values and performing the transform are set out in `[pseudo-fit]` and `[pseudo-transform]` in Appendix [\[sec-appendix-pseudocode\]](#sec-appendix-pseudocode){reference-type="ref" reference="sec-appendix-pseudocode"}. As for [Rocket]{.smallcaps}, we implement [MiniRocket]{.smallcaps} in Python, compiled via Numba. We use a ridge regression classifier from scikit-learn, and logistic regression implemented using PyTorch. Our code is available at: <https://github.com/angus924/minirocket>. ## Removing Randomness {#subsec-removing-randomness} [\[table-changes-rocket-to-minirocket\]]{#table-changes-rocket-to-minirocket label="table-changes-rocket-to-minirocket"} [Rocket]{.smallcaps} uses kernels with lengths selected randomly from \(\{7,9,11\}\), weights drawn from \(\mathcal{N}(0, 1)\), bias terms drawn from \(\mathcal{U}(-1, 1)\), random dilations, and random paddings. Two features, PPV and max, are computed per kernel, for a total of \(20{,}000\) features. [MiniRocket]{.smallcaps} is characterised by a number of key changes to the kernels in terms of length, weights, bias, dilation, and padding, as well as resulting changes to the features, as summarised in Table [1](#table-changes-rocket-to-minirocket){reference-type="ref" reference="table-changes-rocket-to-minirocket"}. ### Length [MiniRocket]{.smallcaps} uses kernels of length 9, with weights restricted to two values, building on the observation in that weights drawn from \(\{-1, 0, 1\}\) produce similar accuracy to weights drawn from \(\mathcal{N}(0, 1)\). In order to maximise computational efficiency, the set of kernels should be as small as possible: see Section [3.2.2](#subsubsec-reusing-output){reference-type="ref" reference="subsubsec-reusing-output"}. The set of possible two-valued kernels grows exponentially with length. There are \(2^{3} = 8\) possible kernels of length 3, but \(2^{15} = 32{,}768\) possible kernels of length 15. With more than two values, the set of possible kernels grows even faster with length. For example, there are \(3^{15} \approx 14\text{ million}\) possible three-valued kernels of length 15. There are \(2^{9} = 512\) possible two-valued kernels of length 9. [MiniRocket]{.smallcaps} uses a subset of 84 of these kernels, a subset which balances accuracy with the computational advantages of using a small number of kernels: see Section [4.3.1](#subsubsec-sensitivity-kernels){reference-type="ref" reference="subsubsec-sensitivity-kernels"}. (A length of 9 is also consistent with the average length used in [Rocket]{.smallcaps}.) ### Weights {#subsubsec-weights} Kernels with weights restricted to two values, \(\alpha\) and \(\beta\), can be characterised in terms of the number of weights with the value \(\beta\) (or, equivalently, the number of weights with the value \(\alpha\)). In this sense, the full set of two-valued kernels of length 9 includes the subset of kernels with 1 value of \(\beta\) (e.g., \([\alpha,\alpha,\alpha,\alpha,\alpha,\alpha,\alpha,\alpha,\beta]\)), the subset of kernels with 2 values of \(\beta\) (e.g., \([\alpha,\alpha,\alpha,\alpha,\alpha,\alpha,\alpha,\beta,\beta]\)), and so on. [MiniRocket]{.smallcaps} uses the subset kernels with 3 values of \(\beta\): \[\begin{gathered} \\ [\alpha,\alpha,\alpha,\alpha,\alpha,\beta,\alpha,\beta,\beta] \\ [\alpha,\alpha,\alpha,\alpha,\beta,\alpha,\alpha,\beta,\beta] \\ ... \end{gathered}\] For [MiniRocket]{.smallcaps}, we set \(\alpha =-1\) and \(\beta = 2\). However, the choice of \(\alpha\) and \(\beta\) is arbitrary, in the sense that the scale of these values is unimportant. For an input time series, \(X\), kernel, \(W\), and bias, \(b\), PPV is given by \(\text{PPV}(X * W-b) = \frac{1}{n} \sum [X * W-b > 0]\) or, equivalently, \(\text{PPV}(X * W) = \frac{1}{n} \sum [X * W > b]\), where '\(*\)' denotes convolution, and \([X \in a]\) denotes the indicator function. As such, computing PPV is essentially equivalent to computing the empirical cumulative distribution function. Accordingly, the scale of the weights is unimportant, because bias values are drawn from the convolution output, \(X * W\) (see Section [3.1.3](#subsubsec-bias){reference-type="ref" reference="subsubsec-bias"}), and so by definition match the scale of the weights and the scale of the input. (Hence, in contrast to [Rocket]{.smallcaps}, it is not necessary to normalise the input.) It is only important that the sum of the weights should be zero or, equivalently, that \(\beta =-2 \alpha\). Otherwise, the values of \(\alpha\) and \(\beta\) are not important. This constraint---that the weights sum to zero---ensures that the kernels are only sensitive to the relative magnitude of the values in the input, i.e., that the convolution output is invariant to the addition or subtraction of any constant value to the input, i.e., \(X * W = (X \pm c) * W\). As PPV is bounded between 0 and 1, in computing PPV for a given kernel, \(W\), we get an equivalent feature for the inverted kernel, \(-W\), 'for free': see Section [3.2.1](#subsubsec-computing-ppv){reference-type="ref" reference="subsubsec-computing-ppv"}. Accordingly, there is no need to use both the set of kernels with weights \(\alpha =-1\) and \(\beta = 2\), and the corresponding inverted set of kernels with weights \(\alpha = 1\) and \(\beta =-2\), as we get these inverted kernels 'for free'. The set of 84 kernels of length 9 with three weights with the value \(\beta = 2\), and six weights with the value \(\alpha =-1\), has the desirable properties of being a relatively small, fixed set of kernels---conducive to the optimisations pursued in Section [3.2](#subsec-optimising-the-transform){reference-type="ref" reference="subsec-optimising-the-transform"}---and producing high classification accuracy. However, we stress that there is not necessarily anything 'special' about this set of kernels. Other subsets of kernels of length 9, and kernels of other lengths, produce similar accuracy: see Section [4.3.1](#subsubsec-sensitivity-kernels){reference-type="ref" reference="subsubsec-sensitivity-kernels"}. This is in addition to the observations in, i.e., that kernels (of various lengths) with weights drawn from \(\mathcal{N}(0, 1)\), or from \(\{-1, 0, 1\}\), are also effective. ### Bias {#subsubsec-bias} Bias values are drawn from the convolution output, and are used to compute PPV as set out above in Section [3.1.2](#subsubsec-weights){reference-type="ref" reference="subsubsec-weights"}. By default, for a given kernel/dilation combination, bias values are drawn from the quantiles of the convolution output for a single, randomly-selected training example. For a given kernel, \(W\), and dilation, \(d\), we compute the convolution output for a randomly-selected training example, \(X\), i.e., \(W_{d} * X\). We take, e.g., the \([0.25, 0.5, 0.75]\) quantiles from \(W_{d} * X\) as bias values, to be used in computing PPV. We use a low-discrepancy sequence to assign quantiles to different kernel/dilation combinations. The selection of training examples for the purpose of sampling bias values is the only stochastic element of [MiniRocket]{.smallcaps}. Further, while the choice of training example is random, in drawing bias values from the convolution output, we are selecting values produced by an otherwise entirely deterministic procedure. This is why we characterise [MiniRocket]{.smallcaps} as 'minimally random'. For the deterministic variant of [MiniRocket]{.smallcaps}, bias values are drawn from the convolution output for the entire training set, rather than a single, randomly-selected training example. This is the only substantive difference between the default and deterministic variants, and the difference in accuracy between the two variants is negligible: see Section [4.1](#subsec-ucr-archive){reference-type="ref" reference="subsec-ucr-archive"}. The advantage of using the entire training set is an entirely deterministic transform, for applications where this is desirable. However, this comes at additional computational cost, which is unlikely to be practical for larger datasets. Crucially, however, it demonstrates that the accuracy of [Rocket]{.smallcaps} is achievable using an entirely deterministic transform. In practice, using a single, randomly-selected training example has little impact in terms of accuracy. A variant of [Rocket]{.smallcaps} using the same method for sampling bias values as [MiniRocket]{.smallcaps} is slightly more accurate than default [Rocket]{.smallcaps} but, overall, the difference is relatively minor: see Section [4.1](#subsec-ucr-archive){reference-type="ref" reference="subsec-ucr-archive"}. ### Dilation {#subsubsec-dilation} Dilation is used to 'spread' a kernel over the input. For dilation, \(d\), a given kernel is convolved with every \(d^{\text{th}}\) element of the input. Each kernel is assigned the same fixed set of dilations, adjusted to the length of the input time series. We specify dilations in the range \(D = \{\lfloor 2^{0} \rfloor,..., \lfloor 2^{\text{max}} \rfloor\}\), where the exponents are uniformly spaced between 0 and \(\text{max} = \log_2 ( l_{\text{input}}-1 ) / ( l_{\text{kernel}}-1 )\), where \(l_{\text{input}}\) is input length and \(l_{\text{kernel}}\) is kernel length (i.e., 9), such that the maximum effective length of a kernel, including dilation, is the length of the input time series. The count of each unique integer dilation value in \(D\) determines the number of features to be computed per dilation (scaled according to the total number of features), ensuring that, as in [Rocket]{.smallcaps}, exponentially more features are computed for smaller dilations. As time series length increases, the number of possible dilation values increases. This means that, for a fixed number of features, the number of features computed per dilation decreases (unless constrained in some way), making the transform less efficient: see Section [3.2.2](#subsubsec-reusing-output){reference-type="ref" reference="subsubsec-reusing-output"}. Hence, by default, we limit the maximum number of dilations per kernel to 32. While technically an additional hyperparameter, this has little effect on accuracy (see Section [4.3.5](#subsubsec-sensitivity-dilation){reference-type="ref" reference="subsubsec-sensitivity-dilation"}), and is intended to be kept at its default value. ### Padding {#subsubsec-padding} Padding is alternated for each kernel/dilation combination such that, overall, half the kernel/dilation combinations use padding, and half do not. As for [Rocket]{.smallcaps}, [MiniRocket]{.smallcaps} uses standard zero padding. In effect, zeros are added to the start and end of each input time series such that the convolution operation begins with the 'middle' element of the kernel centered on the first element of the time series, and ends with the 'middle' element of the kernel centered on the last element of the time series. ### Features {#subsubsec-features} Given the other changes, there is no longer any benefit in terms of accuracy in using global max pooling in addition to PPV: see Section [4.3.3](#subsubsec-sensitivity-features){reference-type="ref" reference="subsubsec-sensitivity-features"}. Accordingly, [MiniRocket]{.smallcaps} 'drops' global max pooling and uses only PPV. We do not replace global max pooling with additional PPV features. As for [Rocket]{.smallcaps}, the number of features represents a tradeoff between accuracy and computational expense. [MiniRocket]{.smallcaps} with \(10{,}000\) features already matches [Rocket]{.smallcaps} in terms of accuracy, and there is little or no benefit in terms of accuracy to increasing the number of features beyond \(10{,}000\): see Section [4.3.4](#subsubsec-sensitivity-num-features){reference-type="ref" reference="subsubsec-sensitivity-num-features"}. Accordingly, by default, [MiniRocket]{.smallcaps} uses \(10{,}000\) features (or, more precisely, the nearest multiple of 84---the number of kernels---less than \(10{,}000\), i.e., \(9{,}996\)). While technically a hyperparameter, this is intended to be kept at its default value. ## Optimising the Transform {#subsec-optimising-the-transform} [MiniRocket]{.smallcaps} takes advantage of the properties of the small, fixed set of two-valued kernels, and of PPV, to significantly speed up the transform through four key optimisations: 1. computing PPV for \(W\) and \(-W\) at the same time; 2. reusing the convolution output to compute multiple features; 3. avoiding multiplications in the convolution operation; and 4. for each dilation, computing all kernels (almost) 'at once'. ### Computing PPV for \(W\) and \(-W\) at the Same Time {#subsubsec-computing-ppv} For \(C = X * W-b\), PPV is given by \(\text{PPV}(C) = \frac{1}{n} \sum [c > 0].\) PPV is bounded between 0 and 1. By definition, the proportion of negative values (or PNV) is the complement of PPV, i.e., \(1-\text{PPV}(X * W-b) = \text{PNV}(X * W-b).\) That is, by computing PPV, we also implicitly compute PNV and vice versa. In this sense, PPV and PNV are equivalent. Further, the convolution operation is associative, such that \(X *-W =-(X * W)\). Accordingly, by computing PPV for a given kernel, \(W\), we unavoidably also compute an equivalent feature (i.e., PNV) for \(-W\), that is, \(\text{PPV}(X * W-b) = 1-\text{PPV}(b-(X * W)).\) This relationship is illustrated in Figure [\[fig-diagram-ppv-inverse\]](#fig-diagram-ppv-inverse){reference-type="ref" reference="fig-diagram-ppv-inverse"}. This means that, for the purposes of PPV, it is unnecessary to compute both \(X * W\) and \(X *-W\). In fact, it would be redundant to do so. This means that, in practice, for a given set of kernels where each kernel, \(W\), is matched by a corresponding inverted kernel, \(-W\), we only need to perform the convolution operation for \(W\), i.e., for half of the kernels. We get \(-W\) 'for free'. Accordingly, as set out in Section [3.1.2](#subsubsec-weights){reference-type="ref" reference="subsubsec-weights"}, [MiniRocket]{.smallcaps} only uses a set of kernels with weights \(\alpha =-1\) and \(\beta = 2\), as it is unnecessary to also use the corresponding set of inverted kernels with weights \(\alpha = 1\) and \(\beta =-2\). ### Reusing the Convolution Output {#subsubsec-reusing-output} For [MiniRocket]{.smallcaps}, the same kernel/dilation combination is used to compute multiple features, at least for smaller dilations (exponentially fewer features are computed for larger dilations: see Section [3.1.4](#subsubsec-dilation){reference-type="ref" reference="subsubsec-dilation"}). For a given kernel, \(W\), and dilation, \(d\), we compute \(C = X * W_{d}\) and then reuse the convolution output, \(C\), to compute multiple features, i.e., for multiple different bias values. This has the effect that multiple features are computed with the computational cost of a single convolution operation, plus the much lower cost of computing PPV for each bias value. ### Avoiding Multiplications {#subsubsec-factoring-out} Restricting the kernel weights to two values allows us to, in effect, 'factor out' the multiplications from the convolution operation, and to perform the convolution operation using only addition. For input time series \(X = [x_{0}, x_{1},..., x_{n-1}]\), and kernel \(W = [w_{0}, w_{1},..., w_{m-1}]\), with dilation, \(d\), the convolution operation can be formulated as: \[X * W_{d} = \sum_{j=0}^{m-1} x_{i-(\lfloor \frac{m}{2} \rfloor \cdot d) + (j \cdot d)} \cdot w_{j}, \forall i \in \{0, 1,..., n-1\}.\] Equivalently, the convolution operation can be thought of as the column sums of a matrix, \(\boldsymbol{\hat{C}}\), where each row corresponds to the input time series multiplied by the appropriate kernel weight, and the alignment of the rows corresponds to dilation (values of 0 in \(\boldsymbol{\hat{C}}\) represent zero padding), e.g.: \[\hat{\boldsymbol{C}} = \begin{bmatrix} 0 & 0 & 0 & 0 & w_{0} x_{0} & \cdots \\ 0 & 0 & 0 & w_{1} x_{0} & w_{1} x_{1} & \cdots \\ 0 & 0 & w_{2} x_{0} & w_{2} x_{1} & w_{2} x_{2} & \cdots \\ \vdots & \vdots & \vdots & \vdots & \vdots & \ddots \\ w_{m-1} x_{4} & w_{m-1} x_{5} & w_{m-1} x_{6} & w_{m-1} x_{7} & w_{m-1} x_{8} & \cdots \end{bmatrix}\] The result of the convolution operation is given by the column sums of \(\boldsymbol{\hat{C}}\), i.e., \(C = X * W = \boldsymbol{1}^{\top}\boldsymbol{\hat{C}}\), where \(\boldsymbol{1}\) is a vector, \([1,1...,1]^{\top}\), of length \(n\). Where the weights of the kernels are restricted to two values, \(\alpha\) and \(\beta\), we can 'factor out' the multiplications by precomputing \(A = \alpha X\) and \(B = \beta X\) and then, for a given kernel, e.g., \(W = [\alpha, \beta, \alpha,..., \alpha]\), completing the convolution operation by summation using \(A = [a_{0}, a_{1},..., a_{n-1}]\) and \(B = [b_{0}, b_{1},..., b_{n-1}]\): \[\hat{\boldsymbol{C}} = \begin{bmatrix} 0 & 0 & 0 & 0 & a_{0} & \cdots & a_{n-5} \\ 0 & 0 & 0 & b_{0} & b_{1} & \cdots & b_{n-4} \\ 0 & 0 & a_{0} & a_{1} & a_{2} & \cdots & b_{n-3} \\ \vdots & \vdots & \vdots & \vdots & \vdots & \ddots & \vdots \\ a_{4} & a_{5} & a_{6} & a_{7} & a_{8} & \cdots & 0 \end{bmatrix}\] In other words, it is only necessary to compute \(\alpha X\) and \(\beta X\) once for each input time series, and then reuse the results to complete the convolution operation for each kernel by addition. ### Computing All the Kernels (Almost) 'At Once' {#subsubsec-all-kernels-at-once} We can take further advantage of using only two values for the kernel weights in order to perform most of the computation required for all 84 kernels 'at once' for each dilation value. More precisely, as [MiniRocket]{.smallcaps} uses kernels with six weights of one value, and three weights of another value, we can perform \(\frac{6}{9} = \frac{2}{3}\) of the computation for all 84 kernels 'at once' for a given dilation. This is possible by treating all kernel weights as \(\alpha =-1\), precomputing convolution output, \(C_{\alpha}\), and later adjusting \(C_{\alpha}\) for each kernel. Per Section [3.2.3](#subsubsec-factoring-out){reference-type="ref" reference="subsubsec-factoring-out"}, \(C_{\alpha}\) can be thought of as the column sums of a matrix with 9 rows, where each row corresponds to \(\alpha X =-X\), aligned according to dilation. For example, for a dilation of 1: \[\hat{\boldsymbol{C}}_{\alpha} = \begin{bmatrix} 0 & 0 & 0 & 0 &-x_{0} & \cdots &-x_{n-5} \\ 0 & 0 & 0 &-x_{0} &-x_{1} & \cdots &-x_{n-4} \\ 0 & 0 &-x_{0} &-x_{1} &-x_{2} & \cdots &-x_{n-3} \\ \vdots & \vdots & \vdots & \vdots & \vdots & \ddots & \vdots \\ -x_{4} &-x_{5} &-x_{6} &-x_{7} &-x_{8} & \cdots & 0 \end{bmatrix}\] For [MiniRocket]{.smallcaps}, the kernel weights are \(\alpha =-1\) and \(\beta = 2\). Let \(\gamma = 3\), noting that \(2 =-1 + 3\). As for \(\hat{\boldsymbol{C}}_{\alpha}\), we then form \(\hat{\boldsymbol{C}}_{\gamma}\), where each row corresponds to \(\gamma X = 3X\), aligned according to dilation. For each kernel, \(C_{\gamma}\) is equivalent to the column sums of those rows in \(\hat{\boldsymbol{C}}_{\gamma}\) corresponding to the position of the \(\beta\) weights in the given kernel. For example, for kernel \(W = [\beta, \alpha, \beta, \alpha, \beta, \alpha, \alpha, \alpha, \alpha]\): \[\hat{\boldsymbol{C}}_{\gamma}^{(W)} = \begin{bmatrix} 0 & 0 & 0 & 0 & 3x_{0} & \cdots & 3x_{n-5} \\ 0 & 0 & 3x_{0} & 3x_{1} & 3x_{2} & \cdots & 3x_{n-3} \\ 3x_{0} & 3x_{1} & 3x_{2} & 3x_{3} & 3x_{4} & \cdots & 3x_{n-1} \end{bmatrix}\] The final convolution output for a given kernel is then given by \(C = C_{\alpha} + C_{\gamma}\). In other words, we can reuse \(C_{\alpha}\), computed once for a given dilation, to compute the convolution output for all 84 kernels for that dilation. For each kernel, computing \(C\) only involves adding \(C_{\gamma}\) to \(C_{\alpha}\). In performing the convolution operation in this way, we only have to compute \(C_{\gamma}\) for each kernel, i.e., \(\frac{1}{3}\) of the computation otherwise required. ## Classifiers Like [Rocket]{.smallcaps}, [MiniRocket]{.smallcaps} is a transform, producing features which are then used to train a linear classifier. We use the same classifiers as [Rocket]{.smallcaps} to learn the mapping from the features to the classes, i.e., a ridge regression classifier or, for larger datasets, logistic regression trained using Adam. As for [Rocket]{.smallcaps}, we suggest switching from the ridge regression classifier to logistic regression when there are more training examples than features, i.e., when there are more than approximately \(10{,}000\) training examples. ## Complexity Fundamentally, the scalability of [MiniRocket]{.smallcaps} remains the same as for [Rocket]{.smallcaps}: linear in the number of kernels/features (\(k\)), the number of examples (\(n\)), and time series length (\(l_{\text{input}}\)) or, formally, \(O(k \cdot n \cdot l_{\text{input}})\). While [MiniRocket]{.smallcaps} uses a smaller number of kernel/dilation combinations, and computes multiple features for each kernel/dilation combination, complexity is still proportional to the number of kernels/features. Similarly, while [MiniRocket]{.smallcaps} 'factors out' multiplications from the convolution operation, the number of addition operations is still proportional to the number of kernels and time series length, and while [MiniRocket]{.smallcaps} performs the majority of the computation required for all 84 kernels 'at once', the remaining computation is still proportional to the number of kernels/features. However, within this broad class of complexity, the various optimisations pursued in Section [3.2](#subsec-optimising-the-transform){reference-type="ref" reference="subsec-optimising-the-transform"} make [MiniRocket]{.smallcaps} significantly faster in practice. ## Memory Compared to [Rocket]{.smallcaps} (which does not store any intermediate values), [MiniRocket]{.smallcaps} temporarily stores up to 13 additional vectors, namely, \(A =-X\), \(G = \gamma X = 3X\) (plus 9 variants of \(G\) pre-aligned for the given dilation), \(C_{\alpha}\), and \(C\): see Sections [3.2.3](#subsubsec-factoring-out){reference-type="ref" reference="subsubsec-factoring-out"} and [3.2.4](#subsubsec-all-kernels-at-once){reference-type="ref" reference="subsubsec-all-kernels-at-once"}. This is equivalent to storing 13 additional copies of a single input time series (approx. \(1{,}000{,}000 \times 4 \times 13 = 52 \text{MB}\) for time series of length 1 million), which should be negligible in almost all cases. When transforming the training set, the deterministic variant stores the convolution output for a given kernel/dilation combination for the entire training set, which is equivalent to storing one additional copy of the entire training set. This is impractical for larger datasets, which is why it is avoided by default. # Experiments {#sec-experiments} We evaluate [MiniRocket]{.smallcaps} on the datasets in the UCR archive (Section [4.1](#subsec-ucr-archive){reference-type="ref" reference="subsec-ucr-archive"}), showing that, on average, [MiniRocket]{.smallcaps} is marginally more accurate than [Rocket]{.smallcaps}, and not significantly less accurate than the most accurate current methods for time series classification. We demonstrate the speed and scalability of [MiniRocket]{.smallcaps} in terms of both training set size and time series length (Section [4.2](#subsec-scalability){reference-type="ref" reference="subsec-scalability"}), showing that [MiniRocket]{.smallcaps} is up to \(75\) times faster than [Rocket]{.smallcaps} on larger datasets. We also explore the effect of key parameters in relation to kernel length, bias, output features, and dilation (Section [4.3](#subsec-sensitivity-analysis){reference-type="ref" reference="subsec-sensitivity-analysis"}). ## UCR Archive {#subsec-ucr-archive} We evaluate [MiniRocket]{.smallcaps} on the datasets in the UCR archive. We compare [MiniRocket]{.smallcaps} against the most accurate current methods for time series classification, namely, HIVE-COTE/TDE (representative of HIVE-COTE and its variants), TS-CHIEF, InceptionTime, and [Rocket]{.smallcaps}, as well as TDE, CIF, cBOSS and Proximity Forest. For consistency and direct comparability with the most recent published results for other state-of-the-art methods, we evaluate [MiniRocket]{.smallcaps} on 30 resamples of 109 datasets from the archive. We use the same 30 resamples (including the default training/test split) as in. (Full results are available in the accompanying repository.) Figure [\[fig-rank-ucr109\]](#fig-rank-ucr109){reference-type="ref" reference="fig-rank-ucr109"} on page shows the mean rank of [MiniRocket]{.smallcaps} versus the other state-of-the-art methods. Methods for which the pairwise difference in accuracy is not statistically significant, per a Wilcoxon signed-rank test with Holm correction (as a post hoc test to the Friedman test), are connected with a black line. [MiniRocket]{.smallcaps} is, on average, marginally more accurate than [Rocket]{.smallcaps}, and somewhat less accurate than the most accurate current methods, namely TS-CHIEF and HIVE-COTE/TDE, although the differences in accuracy are not statistically significant. However, as noted in Section [1](#sec-introduction){reference-type="ref" reference="sec-introduction"}, the total compute time for [MiniRocket]{.smallcaps} on these datasets is a tiny fraction of the total compute time required by the other methods (even [Rocket]{.smallcaps}, which is already considerably faster than even the fastest of the other methods). #### [MiniRocket]{.smallcaps} versus [Rocket]{.smallcaps}. Figure [\[fig-pairwise-minirocket-vs-rocket\]](#fig-pairwise-minirocket-vs-rocket){reference-type="ref" reference="fig-pairwise-minirocket-vs-rocket"} shows the pairwise accuracy of [MiniRocket]{.smallcaps} versus [Rocket]{.smallcaps} for the same 109 datasets. Overall, [MiniRocket]{.smallcaps} and [Rocket]{.smallcaps} achieve very similar accuracy. [MiniRocket]{.smallcaps} is more accurate than [Rocket]{.smallcaps} on 61 datasets, and less accurate on 45 datasets, but the differences in accuracy are mostly small. The large difference in accuracy between [MiniRocket]{.smallcaps} and [Rocket]{.smallcaps} on one dataset, *PigAirwayPressure*, appears to be due to the way the bias values are sampled. We also evaluated a variant of [Rocket]{.smallcaps} which uses the same method of sampling bias values as [MiniRocket]{.smallcaps}. Overall, this variant is slightly more accurate than default [Rocket]{.smallcaps}, but the difference is relatively minor, with a win/draw/loss of 50/6/53 against [MiniRocket]{.smallcaps}. #### Deterministic variant. Figure [\[fig-pairwise-minirocket-vs-minirocket-dv\]](#fig-pairwise-minirocket-vs-minirocket-dv){reference-type="ref" reference="fig-pairwise-minirocket-vs-minirocket-dv"} shows the pairwise accuracy of default [MiniRocket]{.smallcaps} vs the deterministic variant (or [MiniRocket]{.smallcaps}\(_{\text{DV}}\)) for the same 109 datasets. Overall, the deterministic variant produces essentially the same accuracy as the default variant. ## Scalability {#subsec-scalability} ### Training Set Size [\[table-scalability-training-set-size\]]{#table-scalability-training-set-size label="table-scalability-training-set-size"} We demonstrate the speed and scalability of [MiniRocket]{.smallcaps} in terms of training set size on the three largest datasets in the UCR archive, namely, *MosquitoSound* (\(139{,}780\) training examples, each of length \(3{,}750\)), *InsectSound* (\(25{,}000\) training examples, each of length \(600\)), and *FruitFlies* (\(17{,}259\) training examples, each of length \(5{,}000\)). These recent additions are significantly larger than other datasets in the archive. For this purpose, following, we integrate [MiniRocket]{.smallcaps} (and [Rocket]{.smallcaps}) with logistic regression, trained using Adam. Training details are provided in Appendix [\[sec-appendix-training-details\]](#sec-appendix-training-details){reference-type="ref" reference="sec-appendix-training-details"}. The experiments were performed on the same cluster as noted in Section [1](#sec-introduction){reference-type="ref" reference="sec-introduction"} and, again, both [Rocket]{.smallcaps} and [MiniRocket]{.smallcaps} are restricted to a single CPU core. Figure [\[fig-scalability\]](#fig-scalability){reference-type="ref" reference="fig-scalability"} shows training time vs training set size for [MiniRocket]{.smallcaps} and [Rocket]{.smallcaps}. Training time includes the transform for both validation and training sets, and classifier training. Table [2](#table-scalability-training-set-size){reference-type="ref" reference="table-scalability-training-set-size"} shows test accuracy and total training time (for the full training set). [MiniRocket]{.smallcaps} is slightly more accurate on one of the datasets, and slightly less accurate on two of the datasets. This is consistent with the small differences in accuracy observed on the other datasets in the UCR archive: see Section [4.1](#subsec-ucr-archive){reference-type="ref" reference="subsec-ucr-archive"}. However, [MiniRocket]{.smallcaps} is considerably faster than [Rocket]{.smallcaps}: \(43\) times faster on *InsectSound*, \(66\) times faster on *FruitFlies*, and \(75\) times faster on *MosquitoSound*. The accuracy of [Rocket]{.smallcaps} and [MiniRocket]{.smallcaps} on the *InsectSound* and *MosquitoSound* datasets appears to be broadly comparable to reported results for other methods for these datasets or versions of these datasets, although some deep learning approaches are significantly more accurate on *MosquitoSound*. ### Time Series Length We demonstrate the scalability of [MiniRocket]{.smallcaps} in terms of time series length on the dataset in the UCR archive with the longest time series, *DucksAndGeese* (\(50\) training examples, each of length \(236{,}784\)). This recent addition has significantly longer time series than other datasets in the archive. Figure [\[fig-scalability\]](#fig-scalability){reference-type="ref" reference="fig-scalability"} shows training time versus time series length for both [Rocket]{.smallcaps} and [MiniRocket]{.smallcaps}. Training time includes the transform and classifier training. (With only 50 training examples, we use the ridge regression classifier.) While both [Rocket]{.smallcaps} and [MiniRocket]{.smallcaps} are linear in time series length, [MiniRocket]{.smallcaps} is considerably faster for a given length. With more training examples, we would expect the difference in training time to be considerably larger. With only 50 training examples, the overhead of sampling bias values (which is unrelated to training set size) constitutes a significant proportion of the total training time for [MiniRocket]{.smallcaps}. ## Sensitivity Analysis {#subsec-sensitivity-analysis} We explore the effect of key parameter choices on accuracy: - kernel length; - sampling bias from the convolution output versus \(\mathcal{U}(-1, 1)\); - using only PPV versus both PPV and global max pooling; - the number of features; and - limiting the maximum number of dilations per kernel. We perform the analysis using the 40 'development' datasets (default training/test splits). Results are mean results over 10 runs. ### Kernels {#subsubsec-sensitivity-kernels} Figure [\[fig-sensitivity-kal\]](#fig-sensitivity-kal){reference-type="ref" reference="fig-sensitivity-kal"} shows the effect of kernel length on accuracy. For kernels of length 9, a subscript refers to a particular subset of kernels in the sense discussed in Section [3.1.2](#subsubsec-weights){reference-type="ref" reference="subsubsec-weights"}. (E.g., \(9_{\{3\}}\) refers to kernels with three weights of one value, and six weights of another value.) The total number of features is kept constant (to the nearest multiple of the number of kernels less than \(10{,}000\): see Section [3.1.6](#subsubsec-features){reference-type="ref" reference="subsubsec-features"}), such that more features are computed per kernel for smaller sets of kernels and vice versa. Kernels of length 9 are most accurate, but kernels of length 7 or 11 are not significantly less accurate. This is consistent with the findings in in relation to [Rocket]{.smallcaps}. The actual differences in accuracy between kernels of different lengths is very small. Crucially, however, as noted in Section [3.1.2](#subsubsec-weights){reference-type="ref" reference="subsubsec-weights"}, the \(9_{\{3\}}\) subset is nearly as accurate as the full set of kernels of length 9. This is a relatively small subset of kernels, and is particularly well suited to the optimisations pursued in Section [3.2](#subsec-optimising-the-transform){reference-type="ref" reference="subsec-optimising-the-transform"}. ### Bias {#subsubsec-sensitivity-bias} Figure [\[fig-sensitivity-bias\]](#fig-sensitivity-bias){reference-type="ref" reference="fig-sensitivity-bias"} shows the effect in terms of accuracy of sampling bias from the convolution output versus from \(\mathcal{U}(-1, 1)\) as in [Rocket]{.smallcaps}. [MiniRocket]{.smallcaps} is significantly less accurate when sampling bias from \(\mathcal{U}(-1,1)\). The change to sampling bias from the convolution output is critical to matching the accuracy of [Rocket]{.smallcaps}. ### Features {#subsubsec-sensitivity-features} Figure [\[fig-sensitivity-ppv\]](#fig-sensitivity-ppv){reference-type="ref" reference="fig-sensitivity-ppv"} shows the effect of using only PPV versus both PPV and global max pooling. With the other changes to [MiniRocket]{.smallcaps}---in particular, with the change to sampling bias from the convolution output---there is no advantage to using global max pooling in addition to PPV. In fact, using global max pooling in addition to PPV is less accurate than just using PPV, although the difference is not statistically significant. ### Number of Features {#subsubsec-sensitivity-num-features} Figure [\[fig-sensitivity-num-features\]](#fig-sensitivity-num-features){reference-type="ref" reference="fig-sensitivity-num-features"} shows the effect of different numbers of features between \(84\) and \(99{,}960\) (the nearest multiple of 84 less than 100, 500, \(1{,}000\),\...). Increasing the number of features noticeably increases accuracy up to approximately \(10{,}000\) features. There is little or no benefit to increasing the number of features beyond \(10{,}000\), at least for shorter time series, because there is little benefit in computing PPV for many more than \(l_{\text{input}}\) bias values for time series of length \(l_{\text{input}}\) (more and more features will be the same). For \(49{,}980\) and \(99{,}960\) features, we have endeavoured to avoid this limitation as much as possible by setting the maximum number of dilations per kernel to 119 (see Section [3.1.4](#subsubsec-dilation){reference-type="ref" reference="subsubsec-dilation"}) and, where necessary, sampling bias values from multiple training examples. ### Dilation {#subsubsec-sensitivity-dilation} Figure [\[fig-sensitivity-dilation\]](#fig-sensitivity-dilation){reference-type="ref" reference="fig-sensitivity-dilation"} shows the effect in terms of accuracy of different values for the maximum number of dilations per kernel. The total number of features is kept constant, such that more features are computed per dilation for a smaller number of maximum dilations per kernel and vice versa: see Section [3.1.4](#subsubsec-dilation){reference-type="ref" reference="subsubsec-dilation"}. There is little difference in accuracy between values of 16 and 119 (119 being the largest possible number of dilations per kernel for the default number of features, i.e., \(\lfloor 10{,}000 / {84} \rfloor = 119\)). A value of 32 balances accuracy with the computational advantage of limiting the number of dilations per kernel, as discussed in Section [3.1.4](#subsubsec-dilation){reference-type="ref" reference="subsubsec-dilation"}. # Conclusion We reformulate [Rocket]{.smallcaps} into a new method, [MiniRocket]{.smallcaps}, making it up to \(75\) times faster on larger datasets. [MiniRocket]{.smallcaps} shows that it is possible to achieve essentially the same accuracy as [Rocket]{.smallcaps} using a mostly-deterministic and much faster procedure. [MiniRocket]{.smallcaps} represents a significant advance in accuracy relative to computational cost. [MiniRocket]{.smallcaps} is much faster than any other method of comparable accuracy (including [Rocket]{.smallcaps}), and far more accurate than any other method of even roughly-similar computational expense. Accordingly, we suggest that [MiniRocket]{.smallcaps} should be considered and used as the default variant of [Rocket]{.smallcaps}. We provide a naïve facility for applying [MiniRocket]{.smallcaps} to multivariate time series (available through the accompanying repository). In future work, we propose to investigate more sophisticated approaches to multivariate time series, to explore the integration of [MiniRocket]{.smallcaps} with nonlinear classifiers, and the use of [MiniRocket]{.smallcaps} beyond time series data.
{'timestamp': '2021-07-15T02:18:44', 'yymm': '2012', 'arxiv_id': '2012.08791', 'language': 'en', 'url': 'https://arxiv.org/abs/2012.08791'}
# Introduction {#sec:intro} Criminal activities have become a major social problem due to their adverse effect on human life, economy and safety. The availability of crime data in recent years has enabled researchers to develop models for crime prediction. The government and responsible authorities can take preventive measures if they know about a crime event in advance. Knowing the insight behind the prediction of a crime occurrence would allow them to plan preventive measures appropriately and keep the society safe from the happening of the crime. Interpretable predictions ensure the transparency and accountability of the model. Thus, both accuracy and interpretability are two essential and desired properties for a crime prediction model. We propose an *[A]{.ul}ttention-based [I]{.ul}nterpretable [S]{.ul}patio [T]{.ul}emporal Network (AIST)*, an interpretable deep learning model for crime prediction. Crime events exhibit spatial and temporal correlations and external features (e.g., taxi flow) often have influence on the crime occurrence. **Spatial Correlation.** Spatially nearby regions show a similar crime distribution and the extent of this similarity varies across regions and time. Figure [\[Fig:chicago_map\]](#Fig:chicago_map){reference-type="ref" reference="Fig:chicago_map"} shows the communities (i.e., regions) of Chicago and Figure [\[Fig:sp_cor\]](#Fig:sp_cor){reference-type="ref" reference="Fig:sp_cor"} shows an example on January, 2019 Chicago crime data. Regions 8 and 32 show strong spatial correlation while Regions 8 and 7 do not, though both of them are spatially nearby. Also, the spatial correlation between Regions 8 and 32 changes with time. **Temporal Correlation.** Crime occurrences of a region show both short and long term temporal correlations and these correlations vary with crime categories. Fig [\[Fig:tem_cor\]](#Fig:tem_cor){reference-type="ref" reference="Fig:tem_cor"} shows an example for Region 8: deceptive practice (C0) and theft (C1) peak during mid night, whereas robbery (C5) peak during late night or early morning. There is also a significant difference of crime distributions across different crime categories: deceptive practice (C0) and theft (C1) occur at regular intervals whereas robbery is not so common for Region \(8\). Besides, the crime distributions of the same category differ throughout the week. **External Features.** Functionalities and urban characteristics of a region like points of interests (POIs), traffic flow have direct influence on its crime occurrences. The influence of these external features on the crime occurrences tend to vary from time to time and region to region. Figure [\[Fig:ext_cor\]](#Fig:ext_cor){reference-type="ref" reference="Fig:ext_cor"} shows such an example in Region \(8\), where the distribution of deceptive practice (C0) (Figure [\[Fig:ext_cor_1\]](#Fig:ext_cor_1){reference-type="ref" reference="Fig:ext_cor_1"}) and theft (C1) (Figure [\[Fig:ext_cor_2\]](#Fig:ext_cor_2){reference-type="ref" reference="Fig:ext_cor_2"}) have a strong correlation with taxi flows, whereas robbery (C5) (Figure [\[Fig:ext_cor_3\]](#Fig:ext_cor_3){reference-type="ref" reference="Fig:ext_cor_3"}) comparatively shows a weaker correlation with taxi flows. Modeling these diverse spatio-temporal correlations and learning meaningful external features and their probable influence on crime are challenging tasks. Traditional interpretable machine learning and data mining methods  cannot model these non-linear spatio-temporal correlations and thus fail to predict the crime occurrences accurately. Recent deep learning models  capture this non-linear spatial and temporal dependencies to some extent and improve the accuracy of traditional models. They still have major limitations: To overcome the limitations, we develop AIST that captures dynamic spatio-temporal correlation for crime prediction and provides quantitative insights based on external features behind a prediction. We develop two novel variants of graph attention networks (GAT) , \(hGAT\) and \(fGAT\) to learn the crime and feature embedding of the nodes (regions), respectively at each time step. These embedding are then fed to three sparse attention based-LSTMs (SAB-LSTMs)  for modeling recent, daily and weekly crime trends. Finally, AIST applies a location-based attention mechanism to identify the significance of different trends to make a prediction. GAT does not consider the hierarchical information of nodes. However, in real-world scenarios nodes tend to form clusters and belong to different hierarchies based on similar characteristics. In urban context, nodes (regions) that belong to a same hierarchy shares similar functionalities and crime distributions. We propose \(hGAT\) that incorporates this prior knowledge of hierarchical information into GAT's architecture to produce a better crime embedding of nodes. Concatenating the feature vectors with spatial  or temporal view  either directly or after a linear transformation is a common practice for incorporating the external features into the model. However, it fails to fully utilize the features and generate insights for a model's prediction. We propose \(fGAT\) that replaces the additive self-attention mechanism of GAT with a novel scaled dot product self-attention mechanism  to learn crime and region specific relevant feature embedding. The unique challenge of a crime prediction problem that does not apply to other spatio-temporal prediction problems (e.g., traffic flow prediction, crowd flow prediction, passenger demand prediction) is the fact that crime data is spatially, temporally and categorically extremely sparse. AIST utilizes the feature embedding learned from fGAT to tackle the sparseness of crime data. On top of that, it is also necessary to keep the crime prediction model's architecture reasonably interpretable, which makes the tasks even harder than building a spatio-temporal model that does not consider interpretability . AIST is interpretable because it takes transparent decisions at each prediction step based on the different attention modules used in the model architecture. To explain a prediction, we first find whether the prediction is based on recent occurrences or any recurring trend and then identify the previous time steps that are given the most importance. Our model knows why a time step is given importance as the input at each time step is an interpretable spatial embedding. Hence, if we backtrack we can find the most important regions and features for a specific time step. Even though attention as a form of explanation is not new in spatio-temporal literature , simply using an attention module does not make a model interpretable . Keeping this in mind, unlike existing spatio-temporal literature the model architecture of AIST is designed so that it complies with the conditions presented in  under which attentions can be regarded as faithful explanations. Besides inherent interpretable architectures , recently post-hoc local explanation techniques  that provide approximate explanations to a model's decision making have been explored to imitate the behavior of deep learning black box models. However, they are not well received considering the fact that if these explanations had been adequate enough, there would be no need for the original model . Hence, we keep AIST architecture inherently interpretable while ensuring its accuracy. In summary, the contributions of this paper are as follows: The remaining of the paper is organized as follows. We discuss the related work in Section [2](#Sec:relatedWork){reference-type="ref" reference="Sec:relatedWork"} and formulate the crime prediction problem in Section [3](#Sec:problemFormulation){reference-type="ref" reference="Sec:problemFormulation"}. We present our model, \(AIST\) in Section [4](#sec:model){reference-type="ref" reference="sec:model"}. Section [5](#Sec:experimentalResult){reference-type="ref" reference="Sec:experimentalResult"} presents the experimental results and evaluates the accuracy and the interpretability of AIST. Section [6](#sec:conclusion){reference-type="ref" reference="sec:conclusion"} concludes the paper. # Related Work {#Sec:relatedWork} Data-driven crime prediction problems have received wide attention from the researchers for decades. Existing studies on crime prediction can be divided into following categories: (i) *crime rate inference* that predicts the crime rate of a region, (ii) *crime hotspot detection* that finds the locations where crimes are clustered, and (iii) *crime occurrence prediction* that forecasts the occurrence of a crime category for a location at a future timestamp. Our work falls in the third category. In Sections [2.1](#sec:crimeModels){reference-type="ref" reference="sec:crimeModels"} and [2.2](#sec:interpretableModels){reference-type="ref" reference="sec:interpretableModels"}, we elaborate existing crime prediction models and interpretable models, respectively. In Section [2.3](#spatio-temporal){reference-type="ref" reference="spatio-temporal"}, we discuss the deep learning methods used for spatial-temporal prediction. ## Crime Prediction Models {#sec:crimeModels} **Statistical and Classic Machine Learning Methods.** Recent studies  used statistical and classic machine learning methods (e.g., linear regression, negative binomial regression, geographically weighted regression, random forest) for crime rate inference problem. In , the authors studied the effect of point of interest (POI) (e.g., a restaurant or a shopping mall) and taxi flow information along with the traditional demographics features of a region while in , the authors utilized FourSquare check-in data for estimating the crime rate of a particular region. Researchers have also employed kernel density estimation (KDE)  for predicting hot-spot maps. However, these works only take spatial features and dependencies into account ignoring the temporal dynamics of crime. To address the temporal dynamics, time-series models such as autoregressive integrated moving average (ARIMA)  have been proposed for one-week ahead crime occurrence prediction. In , the authors implemented a self-exciting point process similar to one used by the seismologists in the context of urban crime to understand the temporal trends of burglary. Even though these models acknowledge the temporal dynamics, they do not incorporate the spatial context of crimes. Both spatial and temporal information have been also explicitly modeled in the literature. In , the authors proposed an algorithm that constructs a global crime pattern from local crime cluster distributions, and employed it for predicting residential burglary. In , the authors employed STKDE, a variant of KDE for mapping transient and stable crime clusters. The work in  used analytic and statistical techniques to identify the spatio-temporal crime patterns. In , spatio-temporal correlations like intra-region temporal correlation and inter-region spatial correlation have been considered for crime occurrence prediction. However, all of these methods cannot fully model the complex non-linear relation of space and time and the dynamicity of spatial-temporal correlation. Besides spatio-temporal features, incorporating additional data (e.g. Twitter, demographics data) improve the accuracy of existing crime prediction models. The authors in   added Twitter-based features extracted from topic based modeling for improving the prediction of models. In , the authors used fuzzy association rule mining to find consistent crime patterns using population demographics information of communities. Another line of work  explores the heterogeneous and task-specific division of spatial regions over traditional grid and community based division which helps improve the accuracy of the crime prediction. **Deep Learning Methods.** Deep learning models have recently been shown to be very effective in domains like computer vision, speech recognition and natural language processing. Recent deep learning models have also attempted to capture the non-linear spatio-temporal dependencies of crime. DeepCrime , a hierarchical recurrent framework with attention mechanism, considers temporal correlation, its inter-relation with ubiquitous data and category dependencies for future crime prediction. However, DeepCrime does not consider spatial correlations of crimes. In , the authors applied ST-ResNet architecture  for crime intensity prediction while in , the authors developed MiST, a LSTM based neural network architecture with attention mechanism to model spatio-temporal and cross-categorical correlation for crime prediction. None of these models can capture dynamic spatial correlation and identify the impact of external features on crime predictions. Besides, these models are not interpretable. DeepCrime and MiST employ attention based RNNs which lack interpretability because of the recurrence on the hidden states generated by RNNs and their non-sparse attention weights for longer sequences. ST-ResNet uses deep residual units with hundreds and thousands of CNNs stacked altogether which makes it harder to interpret the model's prediction. ## Interpretable Models {#sec:interpretableModels} The statistical and classic machine learning models have an advantage over deep learning models in terms of interpretability. However, they cannot model the complex non-linearity of space and time and thus lacks accuracy. On the other hand, though neural networks can capture the spatial-temporal non-linear relationship, they are not interpretable. Attention-based models focus on the most relevant information while performing a certain task. These models have become very popular in image processing  and natural language processing , and health-care predictions  for ensuring interpretability. Similar to the statistical and classic machine learning models, despite of having a self-explanatory structure, simply using an attention based model does not make an explanation of a prediction faithful. The model architecture of AIST provides faithful explanations, which is also validated by our experiment results. The other category of interpretable models is post-hoc models, where a separate model is used for explanation. Examples of post-hoc models include LIME , SHAP , rule-based learning  and saliency visualizations . ## Deep Learning for Spatio-temporal Prediction {#spatio-temporal} Deep learning methods have become popular in recent years in the domain of spatial temporal prediction. A common approach is to use the convolution based architecture (CNN)  for finding the spatial correlation and the recurrent based architecture  for finding the temporal correlation. In , the authors used both CNN and attention-based LSTM to capture the dynamic spatio-temporal dependencies for traffic prediction. In , the authors proposed a multi-level attention mechanism along with a recurrent layer and a fusion module to incorporate the external features for geo-sensory time prediction. Recent literature  has also started exploring the graph neural networks for such prediction. In , the authors proposed a pure convolutional structure in the form of a graph convolution in the spatial dimension and a general convolution in the temporal dimension to model the traffic flows. In , several temporal views are fed to their respective graph convolution layers and then fused altogether along with semantic views to model the crowd flows. In , the authors modeled traffic flows with a graph convolutional network (GCN) followed by a recurrent layer and a transformer to capture the local and global temporal correlation, respectively. Both these models  incorporate geospatial position of nodes into the GCN to better model the spatial dependencies. In , the authors proposed STCGA that combines multiple self-attention, graph attention, and convolutional residual networks to predict the traffic flow.  proposes DIGC and a pre-trained binary classifier, both of which consists of a GCN followed by an LSTM to extract the spatio-temporal and latent incident crime features, respectively for traffic speed prediction. None of these spatio-temporal prediction models are designed to handle the sparseness of crime data. The finer the spatial, temporal or categorical resolution gets, the sparser the crime data becomes; which makes it even harder to model the crime. Hence, the spatio-temporal prediction models fail to perform well for crime prediction tasks. Unlike existing spatio-temporal literature, AIST chooses a handful of region and crime category specific external features, and applies fGAT to learn a more stable and faithful feature embedding of the target region as a substitute of the sparse crime data. This learned feature embedding along with the crime embedding learned by hGAT allows AIST to capture the slightest of changes in the feature or crime embedding of the target region over time and make predictions accordingly. Our experiment results also show that AIST outperforms the high-performance spatio-temporal prediction models. # Problem Formulation {#Sec:problemFormulation} In this section, we introduce some notations[^1] and formulate crime prediction problem as a regression task. Table [\[symbols\]](#symbols){reference-type="ref" reference="symbols"} summarizes the notations used in the paper. **Region.** We model a city with an undirected graph \(G = (V, E)\), where \(V\) represents a set of \(N\) regions \(\{r_1, r_2, r_3,\ldots, r_N\}\) and \(E\) represents a set of edges connecting them. In this study, a region denotes a community area: a pre-defined administrative boundary that serves various planning and statistical purposes. For a region \(r_{i}\) to be connected to region \(r_{i'}\) they must share a common boundary. **Crime Occurrence.** Let \(x_{i, t}^k \in \mathbb{R}\) represent the number of crimes reported of category \(k\) (e.g. theft) at region \(r_i\) during \(t\)-th time step[^2]. If \(\mathbf{x}_{i, t} = [x_{i, t}^1, x_{i, t}^2, x_{i, t}^3, \ldots, x_{i, t}^K] \in \mathbb{R}^{K}\) denotes the reported crimes of all \(K\) categories at region \(r_i\) during \(t\)-th time step and \(\mathbf{X}_{t} = (\mathbf{x}_{1, t}, \mathbf{x}_{2, t}, \mathbf{x}_{3, t}, \ldots, \mathbf{x}_{N, t}) \in \mathbb{R}^{K\times N}\) denotes the reported crimes of all categories at all \(N\) regions during \(t\)-th time step, then the crime occurrences of the whole city for \(T\) time steps can be denoted as \(\mathcal{X} = (\mathbf{X}_1, \mathbf{X}_2, \ldots, \mathbf{X}_T) \in \mathbb{R}^{K\times N\times T}\). **External Feature.** We use POI information, traffic inflow and traffic outflow as external features for improving the model's prediction accuracy. The external features of the city during \(T\) time steps are denoted as \(\mathcal{F} = (\mathbf{F}_1, \mathbf{F}_2, \ldots, \mathbf{F}_T) \in \mathbb{R}^{J\times N\times T}\) for \(J\) external features, where \(\mathbf{F}_{t} = (\mathbf{f}_{1, t}, \mathbf{f}_{2, t}, \mathbf{f}_{3, t}, \ldots, \mathbf{f}_{N, t}) \in \mathbb{R}^{J\times N}\) denotes the external features of the city during \(t\)-th time step, \(\mathbf{f}_{i, t} = [f_{i, t}^1, f_{i, t}^2, f_{i, t}^3, \ldots, f_{i, t}^J] \in \mathbb{R}^{J}\) denotes the external features of a region \(r_i\) during time step \(t\) and \(f_{i, t}^j \in \mathbb{R}\) denotes the \(j\)-th external feature of a region \(r_i\) during time step \(t\). **Problem Definition.** Given past crime occurrences \(\mathcal{X}\) and external features \(\mathcal{F}\) for last \(T\) time steps, predict \(\hat{\textbf{Y}}_{T+1}\), the crime occurrences of the city during \((T+1)\)-th time step. # Model Description {#sec:model} The key idea behind our model's high prediction accuracy is that we exploit (i) hierarchical information of regions, (ii) external features, and (iii) short, long term crime patterns to capture the dynamic spatio-temporal dependencies while keeping the model's architecture reasonably interpretable. Given the crime occurrences of category \(k\) at region \(r_i\) during time steps \([1..T]\), we find the crime embedding \(\mathbf{c_{i, t}^k}\) and feature embedding \(\mathbf{e_{i, t}^k}\) of \(r_i\) using our proposed hGAT and fGAT, respectively, and concatenate them to produce spatial representation \(\mathbf{s_{i, t}^k}\) for each of these time step. These embedding are then fed to three SAB-LSTMs for capturing recent, daily and weekly trends which outputs the hidden states \(\mathbf{h_{T+1}^r}, \mathbf{h_{T+1}^d}, \mathbf{h_{T+1}^w}\), respectively. After applying an attention mechanism on these hidden states, a context vector, \(\mathbf{c_{T+1}}\) is generated to predict the crime occurrence at \((T+1)\)-th time step, \(\hat{y}_{i, T+1}^k\). Figure [\[Fig:overview\]](#Fig:overview){reference-type="ref" reference="Fig:overview"} gives an overview of the model. In Section [4.1](#spatial){reference-type="ref" reference="spatial"}, we elaborate on how we generate crime embedding using hGAT and feature embedding using fGAT to produce spatial representation (Figures [\[Fig:overview\]](#Fig:overview){reference-type="ref" reference="Fig:overview"}a-- [\[Fig:overview\]](#Fig:overview){reference-type="ref" reference="Fig:overview"}c). In Sections [4.2](#temporal){reference-type="ref" reference="temporal"} and [4.3](#prediction){reference-type="ref" reference="prediction"}, we discuss our crime trend generation and prediction steps, respectively (Figure [\[Fig:overview\]](#Fig:overview){reference-type="ref" reference="Fig:overview"}d). ## Spatial View {#spatial} Convolutional neural networks (CNNs)  and its variants  have been applied to model spatial correlation between regions in spatio-temporal prediction. Though CNNs learn meaningful features on regular grid structured data, they do not perform well on irregular graph data because the number of nodes in a graph and their neighbor counts are variables. Urban crime data exhibit a clear graph structure considering the correlation between regions and other external features. Modeling them as grid structured data results in incomplete information and makes it hard to learn meaningful information. To address this issue, graph convolutional networks (GCNs)  have gained popularity in recent times. GCNs learn a node's embedding as an aggregation of its neighbor's features and calculate their contribution with predefined Laplacian Matrix, which is the difference of the degree matrix and the adjacency matrix of the graph. Since the contributions of neighbor nodes are static, GCNs can not capture the dynamic spatial correlation between regions. Based on these observations, we choose GAT as the base architecture to capture the spatial dependencies for crime prediction. Similar to GCN, GAT learns a node's embedding as an aggregation of its neighbor's features but uses a self-attention mechanism to learn their contributions instead. GAT does not require any costly matrix operation and knowledge about the graph structure upfront, which allows GAT to learn dynamic spatial correlation between regions. We use two GAT variants: hGAT and fGAT to learn the crime and feature embedding of a target region as follows. ***Crime Embedding.*** The city of Chicago is divided into \(77\) communities (regions) and the communities are grouped into \(9\) districts or sides forming a containment hierarchy. Communities under the same side tend to share similar socio-economic, demographic and urban features, which result in similar crime distribution than those under different sides. Hence, while aggregating the node (community) information in GAT, prioritizing the nodes that fall under the same side with the target node over others may help to learn better crime representation of a target node. From this intuition, we propose \(hGAT\) to amplify the signals of the nodes that fall under the same side with the target node than those which do not. Since almost every city can be divided into multiple partitions at different spatial resolutions, this idea can be generalized to other cities as well. Figure [\[Fig:region_structure\]](#Fig:region_structure){reference-type="ref" reference="Fig:region_structure"} represents a scenario where the first-order neighbors of target region \(8\) are \(\{7, 8, 24, 28, 32\}\) and target region \(8\) along with region \(32\) and \(33\) fall under the same side (represented as grey circles in Figure [\[Fig:region_structure\]](#Fig:region_structure){reference-type="ref" reference="Fig:region_structure"}). It is evident from Figure [\[Fig:hgat_cor_total\]](#Fig:hgat_cor_total){reference-type="ref" reference="Fig:hgat_cor_total"} that R8 is strongly correlated to R32 than other nearby regions (R7, R24) in terms of crime distribution and external features (POI and taxi flows). Similarly, R24 shows a stronger correlation with R28 than R8. Thus, it is expected that the target region 8 is influenced more by region \(32\) which is not only a first-hop neighbor but also falls under the same side, whereas regions \(7, 24\) or \(28\) do not. To be clear, we do not consider the influence of regions such as \(33\) that falls under the same side with the target region 8, but is not a first-hop neighbor. We only want to amplify the signal from those regions which satisfy both conditions: falls under the same side and is a first-hop neighbor. hGAT considers two sets of features for each node (\(r_i\)): (i) node level features: crime occurrences at community level during time step \(t\): \(x_{i, t}^k\), (ii) parent level features: crime occurrences at district/side level during time step \(t\): \(z_{i, t}^k\) as input to GAT and an additional attention layer to capture the similarity between nodes based on parent level features. Let the parent node of a region \(r_i\) be \(p_j = Parent(r_i)\). Then the parent feature of node \(r_i\) is calculated as \(z_{i, t}^k = \sum_{\forall r_{n} Parent(r_{n})=p_j}x_{n, t}^k\). Basically, we sum the crime occurrences of category \(k\) across the nodes whose parent node is \(p_j\) to create the parent feature of target node \(r_i\). Traditional GAT considers only node level features. Hence, it can not model hierarchical information into a node's embedding. For hGAT, we use two transformation matrix, (i) \(\mathbf{w_x}\in \mathbb{R}^{F}\) to learn the similarities between a target region and its neighbor's node level features, and (ii) \(\mathbf{w_z}\in \mathbb{R}^{F'}\) to learn similarities between their parent-level features. Based on these information two separate feed-forward attention layer computes two sets of pair-wise unnormalized attention scores between the target region and its first-hop neighbors: \(e_{ii'}^c\) and \(e_{ii'}^p\), respectively. For clarity, we omit the indices of crime categories (\(k\)) and time step (\(t\)). \[\begin{aligned} e_{ii'}^c &= \text{LeakyReLU}(\mathbf{a_x}^T[\mathbf{w_x}x_{i} \mathbin\Vert \mathbf{w_x}x_{i'}]) \\ e_{ii'}^p &= \text{LeakyReLU}(\mathbf{a_z}^T[\mathbf{w_z}z_{i} \mathbin\Vert \mathbf{w_z}z_{i'}]) \end{aligned}\] We perform an element-wise addition to combine these two sets of unnormalized attention scores and apply softmax over them to generate final attention scores, where \(\mathcal{N}_i\) denotes first order neighbors including itself. \[e_{ii'} = e_{ii'}^c + e_{ii'}^p\] \[\alpha_{ii'} = \text{softmax}_{i'}(e_{ii'}) = \frac{exp(e_{ii'})}{\sum_{i'' \in \mathcal{N}_i}exp(e_{ii''})}\] Finally, we use this combined attention score to update the crime embedding \({c}_{i, t}^k\) of target region \(r_i\). \[\label{eq:1} \mathbf{{c}}_{i, t}^k = \sigma\left(\sum_{i' \in \mathcal{N}_i}\alpha_{ii'}\mathbf{w_x}x_{i', t}^k\right)\] Figure [\[Fig:overview\]](#Fig:overview){reference-type="ref" reference="Fig:overview"}a gives an overview of generating the crime embedding. ***Feature Embedding.*** Besides historical crime observations, external features have been shown to be useful in crime prediction problems . We propose \(fGAT\) that replaces additive self-attention mechanism with a novel scaled dot product self-attention mechanism  to learn category specific feature embedding of regions. The feature embedding of a target region is formulated as an aggregation of its neighbors' features based on their possible influence on the crimes of the target region. The intuition behind finding a possible influential feature is-if two regions having similar features experience similar crime occurrences at a specific time step then the features might influence crimes or serve as proxies for crime prediction in addition to the crime occurrences. We compute the query vector \(\mathbf{q}_{ii'}\) by multiplying the concatenated crime occurrences of a target region (\(r_i\)) and its neighbor region (\(r_{i'}\)) with weight matrix \(\mathbf{W_q} \in \mathbb{R}^{d_q\times 2}\) to learn their crime distribution similarities. For preparing the key vector \(\mathbf{k}_{ii'}^j\) for feature \(j\), we multiply the concatenated features of \(r_i\) and \(r_{i'}\) with weight matrix \(\mathbf{W_k} \in \mathbb{R}^{d_k\times 2}\) to learn their feature similarities. Here, \(d_q\) and \(d_k\) represents the dimension of the query and key vector, respectively. \[\begin{aligned} \mathbf{q}_{ii'} = \mathbf{W_q}([x_{i, t}^k \mathbin\Vert x_{i', t}^k])\\ \mathbf{k}_{ii'}^j = \mathbf{W_k}([f_{i, t}^j \mathbin\Vert f_{i', t}^j]) \end{aligned}\] Then, the attention weight of \(j\)-th feature of \(r_{i'}\) is calculated using the dot-product attention mechanism. \[\beta_{ii'}^{j} =\text{softmax}_{j}(\frac{\mathbf{q}_{ii'}{\mathbf{k}_{ii'}^j}^T}{\sqrt{d_k}})\] Once the attention weights of individual features are found, the feature embedding \({e}_{i, t}^k\) of \(r_i\) is formulated as follows. \[\label{eq:2} \mathbf{{e}}_{i, t}^k = \sigma\left(\sum_{i' \in \mathcal{N}_i}\left( \alpha_{ii'} \sum_{j=1}^{J}\beta_{ii'}^{j} \mathbf{w_v}f_{i', t}^j\right)\right)\] Here \(\beta_{ii'}^{j}\mathbf{w_v} f_{i', t}^j\) represents the contribution of \(j\)-th feature of \(r_i'\) on the feature embedding of \(r_i\) and \(\mathbf{w_v} \in \mathbb{R}^{F}\). Figure [\[Fig:overview\]](#Fig:overview){reference-type="ref" reference="Fig:overview"}b gives an overview of generating the feature embedding. Finally, We concatenate the crime embedding, \(\mathbf{{c}}_{i, t}^k\) and feature embedding, \(\mathbf{{e}}_{i, t}^k\) to find spatial embedding \(\mathbf{s}_{i, t}^k\) of target region \(r_i\) at \(t\)-th time step for crime category \(k\). This spatial embedding \(\mathbf{s}_{i, t}^k\) is fed as input to a SAB-LSTM cell for time step \(t\) as shown in Figure [\[Fig:overview\]](#Fig:overview){reference-type="ref" reference="Fig:overview"}c. \[\mathbf{s}_{i, t}^k = [\mathbf{{c}}_{i, t}^k \mathbin\Vert \mathbf{{e}}_{i, t}^k]\] ## Temporal View {#temporal} LSTM and GRU are two popular recurrent neural networks (RNNs) that capture temporal correlations. However, besides being non-interpretable they suffer from vanishing gradient problem for long sequences. To address these issues, attention-based RNNs are proposed that use attention mechanism to focus on relevant hidden states. These attention weights are difficult to interpret because of the recurrence on the hidden states generated by LSTMs . They are also not sparse enough to be meaningful for long sequence. SAB-LSTM  back-propagates across only a selected small subset instead of all hidden states, which are selected using a sparse and hard attention mechanism. Thus it mitigates the gradient vanishing problem and is also interpretable. In this section, first we give a brief overview of a SAB-LSTM cell and then discuss how we apply them in predicting crimes. At each time step \(t\) the underlying LSTM of SAB-LSTM takes the spatial embedding of region \(r_i\), \(\mathbf{s}_{i, t}^k\) and the previous hidden state \(\mathbf{h_{t-1}}\) as inputs for crime category \(k\). It produces a new cell state \(\mathbf{c_t}\) along with a provisional hidden state \(\mathbf{\hat{h}_t}\). \[\mathbf{\hat{h}}_{t}, \mathbf{c_{t}} = \text{LSTM}(\mathbf{s}_{i, t}^k, \mathbf{h_{t-1}})\] The provisional hidden state, \(\mathbf{\hat{h}_t}\) is concatenated with all the vectors stored in memory \(\mathcal{M} = [\mathbf{h}_1^{mem}, \mathbf{h}_2^{mem}, \ldots, \mathbf{h}_{|\mathcal{M}|}^{mem}]\) and passed through a feed-forward neural network to generate unnormalized attention weights \((e_m)\) for each vector stored in the memory. Memory \(\mathcal{M}\) contains a set of hidden states selected arbitrarily (after each \(k_{att}\) time step) for comparison with the generated provisional hidden state. \[e_m = \mathbf{W_m}tanh(\mathbf{\hat{h}}_{t} \mathbin\Vert \mathbf{h}_m^{mem})\] Then, SAB-LSTM subtracts the \((k_{top}+1)\)-th highest attention score from all the attention scores and use normalization to generate \(k_{top}\) sparse attention weights to select only \(k_{top}\) memory cells. \[\alpha_{m} =\frac{e_{m}-e_{k_{top}+1}}{\sum_{m^{''} \in \mathcal{M}} (e_{m^{''}}-e_{k_{top}+1})}\] Once the attention weights (\(\alpha_{m}\)) are obtained, it calculates a summary vector \(\mathbf{sum_t}\) by summing over the \(k_{top}\) memories. This summary vector is then concatenated to the previously generated hidden provisional state \(\mathbf{\hat{h}_t}\) to get the final hidden state, \(\mathbf{h_t}\). \[\begin{aligned} \mathbf{sum_t} &= \sum_{m \in \mathcal{M}}\alpha_{m}\mathbf{h}_m^{mem}\\ \mathbf{h_t} &= \mathbf{\hat{h}}_t + \mathbf{sum_t} \end{aligned}\] The hidden state generated at time step \(t\) has two contributing factors. First, the provisional hidden vector \((\mathbf{\hat{h}_t})\) which is the output of a traditional LSTM at time \(t\) and non-interpretable. Second, the summary vector \(\mathbf{sum_t}\) which is the summation of dynamic, sparse hidden states aligned with current state and interpretable. For crime prediction task we omit the first contributing factor and only use the summary vector \(\mathbf{sum_t}\) as our output hidden state \(\mathbf{h_t}\). Even though the accuracy is slightly compromised but this makes SAB-LSTM more interpretable. \[\label{eq:3} \mathbf{h_t} = \mathbf{sum_t} = \sum_{m \in \mathcal{M}}\alpha_{m}\mathbf{h}_m^{mem}\] We use three SAB-LSTMs for our crime prediction task (Figure [\[Fig:overview\]](#Fig:overview){reference-type="ref" reference="Fig:overview"}d). \(\text{SAB-LSTM}_r\) captures recent crime trends based on a target region's spatial embedding during past \(T\) time steps. \(\text{SAB-LSTM}_d\) captures daily trends based on spatial embedding at the same time step as the predicted time step but on previous days. Finally, \(\text{SAB-LSTM}_w\) captures weekly trends based on the the spatial embedding at the same time step as the predicted time step but on previous weeks. We formulate them as follows. For simplicity of representation, we omit region-index \(i\) and crime category-index \(k\). \[\begin{aligned} \mathbf{h}_{T+1}^r &= \text{SAB-LSTM}_r(\mathbf{s}_{t}) \\ \mathbf{h}_{T+1}^d &= \text{SAB-LSTM}_d(\mathbf{s}_{(T+1)-t_{d}*m}) \\ \mathbf{h}_{T+1}^w &= \text{SAB-LSTM}_w(\mathbf{s}_{(T+1)-t_{w}*7*m}) \end{aligned}\] Here, \(t = [1..T], t_d = [1..T_{d}], t_w = [1..T_{w}], m = 24/\tau\), \(T_d = T/m\), \(T_w = T/(m*7), \tau = \text{length of each time step}\). \(\mathbf{h}_{T+1}^r, \mathbf{h}_{T+1}^d, \mathbf{h}_{T+1}^w \in \mathbb{R}^H\), \(H = \text{hidden state dimension}\). ## Prediction After calculating the final hidden states of all three SAB-LSTMs we use location-based attention mechanism  to capture the contribution (\(\alpha_a\)) of the recent, daily and weekly trends. Then, a context vector is calculated using the generated attention weights. Here, \(\mathbf{W_h} \in \mathbb{R}^{H\times A}, \mathbf{b_h} \in \mathbb{R}^A\) are learnable parameters, \(A\) = attention dimension and \(a=\{r, d, w\}\). \[\alpha_a = \text{softmax}_{a} (\text{tanh}(\mathbf{W_h}^{T}\mathbf{h}_{T+1}^a + \mathbf{b_h})\] \[\label{eq:4} \mathbf{c}_{i, T+1}^k = \sum_a \alpha_a \mathbf{h}_{T+1}^a\] Finally, the context vector is fed to a fully connected layer for predicting the crime occurrence at time step (\(T+1\)) for region \(r_i\) and crime category \(k\) where, \(\mathbf{w} \in \mathbb{R}^{H}, \mathbf{b} \in \mathbb{R}\) are learnable parameters. We add the previously omitted region-index \(i\) and crime category-index \(k\) below. \[\label{eq:5} \hat{y}_{i, T+1}^k = \text{tanh}(\mathbf{w}\mathbf{c}_{i, T+1}^k + b)\] Figure [\[Fig:overview\]](#Fig:overview){reference-type="ref" reference="Fig:overview"}d gives an overview of generating the context vector and prediction. # Experiment {#Sec:experimentalResult} ## Experimental Settings ### Data-sets We evaluate our model on publicly available 2019 Chicago crime data , following the state-of the-art . Chicago is one of the most violent cities of United States and the crime concentration of Chicago is very diverse; it has both some of the safest and some of the most crime prone neighborhoods. We use 2019 Chicago taxi trip data  and POI information as external features. We collect POI information from FourSquare API while Chicago crime and taxi data are publicly available. - **Chicago-Crime** (2019). We select 152720 crime records of four crime categories: theft, criminal damage, battery, narcotics from \(1/1/2019\) to \(31/12/2019\) and extract these information of each record: timestamp, primary category of crime, community area where it occurred. - **Chicago-POI** We select 89324 POIs of \(10\) categories: food, residence, travel, arts & entertainment, outdoors & recreation, education, nightlife, professional, shops and event. - **Chicago-Taxi** (2019). We select 29110097 taxi trips from \(1/1/2019\) to \(31/12/2019\) and extract these information of each record: pickup timestamp, drop-off timestamp, pickup community area, drop-off community area. ### Data Preprocessing We consider Chicago crime data of first 8 months as training set and 10% and 90% of the remaining last 4 months as validation set and test set, respectively. We use taxi inflow (F1), outflow (F2) and POI category: food (F3), residence (F4), travel (F5), arts & entertainment (F6), outdoors & recreation (F7), education (F8), nightlife (F9), professional (F10), shops (F11) and event (F12) as external features. We use Min-Max normalization to scale the crime events to \[-1, 1\] and later denormalize the prediction to get the actual number of crime events. Following , we do not scale the external features. ### Parameter Settings We optimize the hyperparameters of AIST using a grid search strategy. The search space for every hyperparameter is presented in Table [\[table:exp_hyperparameter\]](#table:exp_hyperparameter){reference-type="ref" reference="table:exp_hyperparameter"} and the selected value in the search space is shown in bold. For simplicity, we use the same parameter settings across all crime categories and regions. AIST is trained using the Adam optimizer with batch size = 42 and initial learning rate = 0.001. We set the duration of each time step, \(\tau = 4\) hours. We set the number of recent (\(T\)), daily (\(T_d\)) and weekly (\(T_w\)) time steps to 20, 20 and 3, respectively. *hGAT & fGAT settings.* Both hGAT and fGAT are single layer GATs consisting of single attention head for computational efficiency. We set the output size (\(F\)) of both hGAT and fGAT to 8. For fGAT, we set \(d_q, d_k=40\). Dropout with \(p=0.5\) is applied to unnormalized node-level (\(e_{ii'}^c\)), unnormalized parent-level (\(e_{ii'}^p\)), normalized combined attention weights (\(\alpha_{ii'}\)) in hGAT, and dropout with \(p=0.5\) is applied to normalized dot-product attention weights (\(\beta_{ii'}^j\)) in fGAT. *SAB-LSTM settings.* All 3 SAB-LSTMs are single layered with hidden dimension \(H=40\). For \(SAB-LSTM_{r}\) and \(SAB-LSTM_{d}\), we set \(k_{att}=5, k_{top}=5, trunc_{length} = 5\). For \(SAB-LSTM_w\) we set \(k_{att}=1, k_{top}=5, trunc_{length} = 1\). Dropout with \(p=0.2\) is applied to each output of 3 SAB-LSTMs. Finally, we set the attention dimension of location based attention as \(A=30\). ## Prediction Performance {#SubSec:pred} ### Comparison with baselines. The performance of the baselines and AIST is shown in Table [\[table:exp_result\]](#table:exp_result){reference-type="ref" reference="table:exp_result"}. The baselines include both high-performance crime prediction models (e.g., DeepCrime, Mist) and high-performance spatio-temporal prediction models (e.g., customized GeoMAN, STGCN, customized MVGCN). All the baselines have been tuned optimally to produce the best prediction result. In general, AIST outperforms all baselines by achieving the lowest MAE and MSE scores across all crime categories (except the MSE scores for crime category Criminal Damage (C2) and Narcotics (C4)). - AIST learns the time varying spatial dependencies, diverse temporal correlation and crime relevant dynamic context to perform crime prediction tasks. Other competing deep learning models such as MVGCN\*, STGCN, GeoMAN\*, MiST, Att-RNN do not learn the crime and region specific relevant context; DeepCrime, Att-RNN do not consider the spatial correlation and MVGCN\* do not consider the temporal correlation. As a result, in general these models fail to perform better than AIST for crime prediction tasks. - Aside from AIST, GeoMAN\* has the second best MAE and MSE scores across all crime categories. On top of that, it has better MSE scores than AIST for category Criminal Damage (C2) and Narcotics (C4). C2 lacks periodical temporal properties and the surrounding context has less influence on C4. Since, GeoMAN\* does not consider daily or weekly temporal properties and the influence of region specific context on a crime category, it performs better than AIST for these crime categories in terms of MSE scores. - Other attention-based neural network architectures: DeepCrime and MiST perform considerably worse than GeoMAN\* because they do not consider the spatial correlation and external features, respectively. Though DeepCrime and MiST have similar MAE scores, MiST is better than DeepCrime in terms of the MSE score. This is because DeepCrime only captures the temporal correlation and region-category dependencies, whereas MiST captures both spatio-temporal and cross-categorical correlation of crimes. - STGCN has the third best MSE score across all crime categories. Only AIST and GeoMAN\* have better MSE score than STGCN. Having a lower MSE score than those of other attention-based deep learning models such as Att-RNN, DeepCrime and MiST, STGCN is more likely to capture the sudden changes in crime distribution. However, in terms of the MAE score STGCN shows a poor performance in comparison with AIST and others such as GeoMAN\*, MiST, DeepCrime, and Att-RNN. - Att-RNN, a plain recurrent neural network architecture that only considers the recent temporal correlation is behind DeepCrime and MiST, but above STGCN in terms of the performance based on the MAE score. However, in terms of the MSE score its performance is quite similar to DeepCrime. For category Criminal Damage (C2), Att-RNN performs better than AIST supporting our claim that periodical information is not helpful for predicting this category of crime. - MVGCN\*, despite being a top performing architecture in crowd flows prediction, performs worst among the competing deep learning models in the crime prediction task based on MSE scores. Because of the sparsity of crime distributions, careful exploration of available crime data and context are an absolute necessity for capturing the sudden change in the crime distribution. However, the large MSE scores of MVGCN\* mean that the graph convolution and fully connected layers in MVGCN\* used to model the spatial correlation and the influence of the external features lack the ability to do so. Hence, it fails to compete with others. - Traditional time series analysis and machine learning methods such as ARIMA and DTR though interpretable, lack the ability to model the non-linear and complex crime patterns. This is because ARIMA only considers a fixed temporal pattern, whereas DTR does not consider the temporal properties of crime at all. Hence, in general they show poor performance than the deep learning models across all crime categories. ### Effectiveness of different spatial components of AIST We consider the following variants of AIST to understand the influence of different spatial components on its prediction performance. Figure [\[Fig:eval_self\]](#Fig:eval_self){reference-type="ref" reference="Fig:eval_self"} shows a comparative performance analysis of these spatial variants of AIST. - \(\text{AIST}_{g}.\) hGAT is replaced with traditional graph attention networks to learn crime embedding; fGAT is omitted from the spatial module. - \(\text{AIST}_{h}.\) hGAT is used to learn crime embedding; fGAT is omitted from the spatial module. - \(\text{AIST}_f.\) hGAT is used to learn crime embedding and the crime embedding is concatenated with the external features to produce the final spatial embedding; fGAT is omitted from the spatial module. - \(\text{AIST}_{f'}.\) GAT (in place of hGAT) and fGAT constitute the spatial module. \(\text{AIST}_h\) has a better MAE score across all crime categories than \(\text{AIST}_g\) which justifies the selection of hGAT over GAT for learning the crime embedding. Specifically, from Fig [\[Fig:eval_model7\]](#Fig:eval_model7){reference-type="ref" reference="Fig:eval_model7"} it is evident that hGAT learns a better crime embedding of category Narcotics compared to other categories, which indicates the existence of strong narcotics networks in certain parts of Chicago. Besides, the fact that AIST consistently performs better than \(\text{AIST}_{f'}\) shows the superiority of the spatial embedding learned by hGAT alongside fGAT over \(\text{AIST}_{f'}\). For categories Theft (C1) and Battery (C3), the concatenation of external features improves the prediction performance of \(\text{AIST}_h\), which indicates the impact of contextual information for the crime prediction task, specially for these categories. However, the prediction performance of \(\text{AIST}_f\) deteriorates significantly for category Narcotics (C4) and remains almost same as \(\text{AIST}_h\) for category Criminal Damage (C2), which suggest its inability to constantly differentiate the influential features from noise across all crime categories. The significant performance improvement of AIST over \(\text{AIST}_f\) in predicting crime events across all categories suggests that careful extraction and learning of crime relevant feature embedding by fGAT is a necessity while performing crime prediction tasks. ### Effectiveness of different temporal components of AIST Figure [\[Fig:tmodel\]](#Fig:tmodel){reference-type="ref" reference="Fig:tmodel"} shows a comparative performance analysis of different temporal components of AIST. - \(\text{AIST}_{r}.\) \(\text{SAB-LSTM}_{d}\) and \(\text{SAB-LSTM}_{w}\) are omitted from the temporal module. - \(\text{AIST}_{d}.\) \(\text{SAB-LSTM}_{w}\) is omitted from the temporal module. - \(\text{AIST}_{w}.\) \(\text{SAB-LSTM}_{d}\) is omitted from the temporal module. - \(\text{AIST}_{l}.\) All three \(\text{SAB-LSTMs}\) are replaced by traditional LSTMs. The significant decrease in the MAE scores of \(\text{AIST}_{d}\) and \(\text{AIST}_{w}\) over \(\text{AIST}_{r}\) for Theft (C1), Battery (C2) and Narcotics (C4) suggest that both daily and weekly trends are instrumental in crime prediction tasks. Between these two, \(\text{AIST}_{w}\) has better MAE scores over \(\text{AIST}_{d}\) across all crime categories indicating the dominance of weekly trends over daily trends. Above all, the better MAE scores of AIST over \(\text{AIST}_{l}\) for all crime categories justify the selection of SAB-LSTMs over traditional LSTMs for the crime prediction tasks. Contrary to the general observation discussed above, \(\text{AIST}_{r}, \text{AIST}_{d}, \text{and AIST}_{w}\) show similar performance for category Criminal Damage (C2) (Figure [\[Fig:tmodel2\]](#Fig:tmodel2){reference-type="ref" reference="Fig:tmodel2"}), which suggests that it does not follow any daily or weekly trend. ### Effect of Parameters Different parameters like number of recent (\(T\)), daily (\(T_d\)) and weekly (\(T_w\)) time steps, dimension of SAB-LSTM hidden states (\(H\)), output size of hGAT and fGAT (\(F\)), dimension of query (\(d_q\)), key (\(d_k\)) vectors and location attention (\(A\)) have impact on the performance of AIST. To better understand the crucial parameters of AIST and their effect on its prediction performance, we run several experiments and present the results in  . To observe the effect of a parameter, the value of the parameter is varied within its range, and other parameters are set to their default values as presented in Table [\[table:exp_hyperparameter\]](#table:exp_hyperparameter){reference-type="ref" reference="table:exp_hyperparameter"}. Figures [\[Fig:param_T\]](#Fig:param_T){reference-type="ref" reference="Fig:param_T"}, [\[Fig:param_TD\]](#Fig:param_TD){reference-type="ref" reference="Fig:param_TD"}, and [\[Fig:param_TW\]](#Fig:param_TW){reference-type="ref" reference="Fig:param_TW"} suggest that AIST is sensitive to the number of recent (\(T\)), daily (\(T_d\)) and weekly (\(T_w\)) time steps, which are being fed to the three SAB-LSTMs as input. AIST shows poor performance for both smaller and larger \(T, T_d\) due to the lack of data for learning temporal dependencies and the absence of long temporal correlation, respectively. Somewhere in between, when \(T, T_d = 20\), AIST in general performs best by capturing the recent and periodic properties of the crime. On the contrary, AIST performs well when the number of weekly time steps \((T_w)\) is relatively small (Figure [\[Fig:param_TW\]](#Fig:param_TW){reference-type="ref" reference="Fig:param_TW"}). However, unlike other categories, AIST performs best for category Theft (C1), when the number of recent and weekly time steps are comparatively larger (Figure [\[Fig:param_T1\]](#Fig:param_T1){reference-type="ref" reference="Fig:param_T1"}, [\[Fig:param_TW1\]](#Fig:param_TW1){reference-type="ref" reference="Fig:param_TW1"}). This signifies the existence of long term temporal dependencies for category Theft. AIST is also sensitive to the dimension \((H)\) of the hidden states of SAB-LSTMs (Figure [\[Fig:param_H\]](#Fig:param_H){reference-type="ref" reference="Fig:param_H"}) and output size \((F)\) of hGAT and fGAT (Figure [\[Fig:param_F\]](#Fig:param_F){reference-type="ref" reference="Fig:param_F"}). Limited spatial and temporal information make the training hard for AIST. As a result, the performance of AIST deteriorates. On the other hand, a larger output size and dimension of the hidden state make it easier for AIST to overfit the data. Hence, we set \(F=8\) and \(H=40\) so that AIST can generalize well by learning sufficient spatial and temporal information. It is evident from Figures [\[Fig:param_Q\]](#Fig:param_Q){reference-type="ref" reference="Fig:param_Q"} and [\[Fig:param_A\]](#Fig:param_A){reference-type="ref" reference="Fig:param_A"} that the query and key dimensions \((d_q, d_k)\) and location attention dimension \((A)\) follow the same trend as the other hyperparameters discussed above. Based on the performance of AIST across different crime categories, we set \(d_q, d_k = 40\) and \(A = 30\). ### Effect of Train/Test Ratio We run several experiments to learn the effect of the train-test ratio on the prediction performance of AIST. We consider the first \(n \in \{6, 7, 8, 9, 10\}\) months of Chicago crime data (2019) as training set. We take 10% of the remaining data of last \((12-n)\in \{6, 5, 4, 3, 12\}\) months for the validation set and use the rest as the test set. Table [\[table:tt_ratio\]](#table:tt_ratio){reference-type="ref" reference="table:tt_ratio"} shows the prediction performance of AIST across all crime categories against different train-test ratio. Similar to the most deep learning models, fewer training samples cause AIST to overfit the data and as a result AIST shows poor prediction performance. This is evident from the reported MAE and MSE scores of AIST when only 6 months of data is used for training. Once we gradually increase the size of the training data, the prediction performance of AIST improves significantly and reaches its peak when the size of the training data is 8 months. Adding additional training data beyond 8 months again deteriorates the prediction performance of AIST. [\[table:tt_ratio\]]{#table:tt_ratio label="table:tt_ratio"} ## Evaluation of Interpretability The notion of interpretability mainly comes down to two points: i) plausibility: how understandable it is to humans, and ii) faithfulness: how accurately it refers to the true reasoning process of a model. Besides human evaluations [@DBLP:conf/chi/KaurNJCWV20; @DBLP:conf/iui/EhsanTCHR19; @DBLP:conf/naacl/MullenbachWDSE18], explanations that align directly with the input have been considered as plausible explanations . Attentions are plausible explanations because they assign importance weights to the inputs while making a prediction  . Since AIST interprets the importance of different regions, features, time steps and trends on the crime prediction based on four attention modules, the interpretation of AIST is *plausible*. A recent study  shows the conditions under which attentions can be regarded as faithful explanations, and nullifies the claim  that criticizes attention as a form of faithful explanation due to its weak correlation with other feature importance metrics and the existence of alternate adversarial attention weights. Specifically,  proposes a series of extensive experiments based on dataset and model properties: i) train on uniform attention weights: the attention distribution is frozen to uniform weights to validate whether the attention is actually necessary for a better performance, ii) calibration of variance: the model is trained with different initializing seeds to generate base variance for attention distributions, iii) train an MLP (multilayer perceptron): the LSTM cells are replaced by MLP and are trained separately and iv) train an adversary: the model is trained to provide similar predictions as the base model while keeping the attention distributions distant from the actual ones for ascertaining exclusivity. We evaluate the attention weights generated by AIST by performing these experiments (except iii since the attention modules used in AIST are either feed-forward neural networks or sparse which do not comply with the experimental settings) to validate their *faithfulness*. Since the faithfulness varies across model, tasks and input space, both  emphasize that the faithfulness should be evaluated in grayscale instead of a binary term, i.e., faithful or not faithful. Following , we consider the degree of faithfulness as it allows to identify the interpretation that is sufficiently faithful to be useful in practice. Our process to generate the adversarial attention weights to establish the exclusivity, hence the faithfulness of the model is as follows. We train an adversarial model (\(\mathcal{M}_{adv}\)) with the objective of minimizing the prediction differences from our AIST model (\(\mathcal{M}_{AIST}\)) along with a divergent attention distribution for an instance \(i\). \[\mathcal{L}(\mathcal{M}_{AIST}, \mathcal{M}_{adv}) = \text{TVD}(\hat{y}_{AIST}^{(i)}, \hat{y}_{adv}^{(i)})-\lambda \; \text{KL}(\alpha_{AIST}^{(i)}, \alpha_{adv}^{(i)})\] Here, \(\lambda\) is a hyperparameter that controls the tradeoff between TVD and JSD, where TVD is the levels of prediction variance and JSD (Jensen-Shannon Divergence) quantifies the difference between two attention distributions. In Figure [\[Fig:eval_int_adv\]](#Fig:eval_int_adv){reference-type="ref" reference="Fig:eval_int_adv"}, we present the TVD between the predictions of the adversarial and AIST model against the increasing JSD between their attention distributions for a selected number of regions on specific crime categories. We believe the graphs in Figure [\[Fig:eval_int_adv\]](#Fig:eval_int_adv){reference-type="ref" reference="Fig:eval_int_adv"} to be representative of all \(4\) crime categories across \(77\) regions as they show all of the possible three cases: not faithful, moderately faithful and concretely faithful. Fast increase in the prediction difference concurs that the attention scores are not easily manipulable and exclusive. Hence, they can be used as faithful explanations. We also include the scores of uniform model variant () and random seed initialization () in these TVD vs JSD graphs. Figure [\[Fig:eval_int_adv_24_1\]](#Fig:eval_int_adv_24_1){reference-type="ref" reference="Fig:eval_int_adv_24_1"},  [\[Fig:eval_int_adv_27_1\]](#Fig:eval_int_adv_27_1){reference-type="ref" reference="Fig:eval_int_adv_27_1"},  [\[Fig:eval_int_adv_31_1\]](#Fig:eval_int_adv_31_1){reference-type="ref" reference="Fig:eval_int_adv_31_1"},  [\[Fig:eval_int_adv_70_3\]](#Fig:eval_int_adv_70_3){reference-type="ref" reference="Fig:eval_int_adv_70_3"},  [\[Fig:eval_int_adv_43_3\]](#Fig:eval_int_adv_43_3){reference-type="ref" reference="Fig:eval_int_adv_43_3"} establish attentions as faithful explanations for the specified regions and crime categories as the increase in JSD comes at a high price of the increased TVD (at different rates). However, Figure [\[Fig:eval_int_adv_0\_1\]](#Fig:eval_int_adv_0_1){reference-type="ref" reference="Fig:eval_int_adv_0_1"} shows an example where the attention distributions generated by AIST can not be deemed faithful as it is easy to manipulate the attentions without losing much of the prediction performance. We include the predictions of the best adversarial models with instance-average JSD \> 1 in Table [\[table:exp_result_int\]](#table:exp_result_int){reference-type="ref" reference="table:exp_result_int"}. Table [\[table:exp_result_int\]](#table:exp_result_int){reference-type="ref" reference="table:exp_result_int"} shows the superiority of the base model (AIST) across all four crime categories over its uniform variant and adversarial models. Substantial increase of MAE scores of the uniform model suggests that attention is indeed a necessary component for better performance in the crime prediction. Similarly, a higher MAE score of the adversarial models ascertain the exclusivity of the predictions generated by AIST model. ::: ## Case Study We select three communities for exploration: (i) R8 (Near North Side): situated in downtown Central Chicago and experiences high crime distribution, (ii) R25 (Austin): situated on the Western side of Chicago and is not as busy as R8, but has a high crime distribution and (iii) R72 (Beverly): located in Southern Chicago and is a quiet residential community with low crime rate. For each community, we randomly select 200 samples from test set and present the contribution of neighbor regions, POI and taxi flow features, trends and important time steps as a heat map in Figure [\[Fig:case_8\_25\]](#Fig:case_8_25){reference-type="ref" reference="Fig:case_8_25"}. We denote crimes category Theft, Criminal Damage, Battery and Narcotics with C1, C2, C3 and C4, respectively. From Equation [\[eq:1\]](#eq:1){reference-type="ref" reference="eq:1"}, the contribution coefficient of the crime occurrences of region \(r_i'\in\mathcal{N}_i\) to the crime embedding of target region \(r_i\) during time step \(t\) can be calculated as, \(\phi(\mathbf{{c}}_{i, t}^k, x_{i', t}^k) = \alpha_{ii'}\mathbf{w_x}{x_{i', t}^k}\). From Equation [\[eq:2\]](#eq:2){reference-type="ref" reference="eq:2"}, the contribution coefficient of feature \(j\) on target region can be calculated as \(\phi(\mathbf{{e}}_{i, t}^k, f_{t}^j) = \beta_{ii'}^{j} \sum_{i' \in \mathcal{N}_i}\alpha_{ii'} \mathbf{w_v}f_{i', t}^j\). Similarly, \(\phi(\hat{y}_{i, T+1}^k, {h}_{T+1}^a) =\alpha_a \mathbf{w}\mathbf{h}_{T+1}^a\) denotes the contribution coefficient of recent, daily and periodic trends (Equations [\[eq:4\]](#eq:4){reference-type="ref" reference="eq:4"}, [\[eq:5\]](#eq:5){reference-type="ref" reference="eq:5"}). For R8, professional POIs (F10) made the highest contribution. R8 is a business region with thousands of jobs and has a large number of professional POIs. Thus it is expected that those POIs have large impact on it's crime embedding. On the other hand, R25 and R72 are residential regions. POI Shop (F11) contributed most for R25 and R72. Besides F11, Residence (F4) POIs also contributed for R72 for all categories except C4. Hence, our model learns both region and category specific influential features. An interesting observation for R8 is that though R8 has a large number of Food and Shop POIs, their contribution is almost none which signifies the quality of our model's prediction. C1 shows strong long term temporal correlation for R8, whereas none of the crime category shows long term temporal correlation for R72 as the crime number for R72 is low. C3 in R25 shows a strong periodic correlation and unlike R8 and R72, it does not depend on recent crimes. C4 hardly present any long term correlation, which is intuitive. C2 shows daily periodicity in R8 and R25. R7 and R24 have the most similar crime distribution as R8. However, these similarities vary with crime categories, e.g. for C1 and C3, R7 is given more attention whereas for C4, the attention shifts to R24 and R28. This is because both R24 and R28 experience large number of C4 crimes and have greater influence than R7. For R25, R18 is the most influential region across all crime categories. Unlike R8, the contribution of its neighboring regions are almost same except for R23 which is given less importance compared to other neighbors. The fact that R23 shares its boundary with different regions of different districts/sides makes their crime distribution less similar. R72 gives equal importance to each of its neighbors except R71. R71 has a higher number of crime occurrences than R72 and their crime distribution is quite different for all crime categories except C4. Thus, our model is able to capture diverse spatial correlation. # Conclusion {#sec:conclusion} We propose AIST, a novel interpretable deep learning framework for crime prediction. AIST captures the dynamic spatio-temporal correlations based on the past crime occurrences, external features (e.g., traffic flow and POI information) and the recent and periodic crime trends. We develop two novel variants of GAT, \(hGAT\) and \(fGAT\) that allows AIST to improve prediction accuracy and provide the insights behind a prediction. Experiments and case studies on real-world Chicago crime data show that AIST outperforms the baseline models in terms of prediction accuracy and we can exploit attention weights associated with different parts of the model to interpret its prediction. On average, AIST shows a decrease of \(8.3\)% on MAE and \(20.98\)% on MSE over the state-of-the-art for crime prediction tasks. AIST also outperforms the high-performance spatio-temporal models  developed for solving different domain of tasks (e.g., geo-sensory time series, traffic or crowd flow prediction). On average, AIST shows a decrease of \(4.1\%\) on MAE and \(7.45\%\) on MSE, when we customize these models for the crime prediction task. Though we evaluate AIST for the crime prediction problem, AIST has the ability to learn an arbitrary function over the spatio-temporal-semantic space and can be adapted for any other spatio-temporal problem (e.g. traffic, citywide passenger demand, taxi demand prediction) that can benefit from incorporating semantically relevant information and knowing the interpretation of the prediction. [^1]: Bold letters, e.g. **\(A, a\)** denote matrices and vectors respectively and small letters, e.g. \(a\) denote scalars [^2]: We use time step and time interval synonymously.
{'timestamp': '2021-11-23T02:23:42', 'yymm': '2012', 'arxiv_id': '2012.08713', 'language': 'en', 'url': 'https://arxiv.org/abs/2012.08713'}
# Introduction {#sec.Introduction} Age-of-Information (AoI) is a performance metric that captures the freshness of the information from the perspective of the destination. AoI measures the time that elapsed since the generation of the packet that was most recently delivered to the destination. This performance metric has been receiving attention in the literature for its application in communication systems that carry time-sensitive data. In this paper, we consider a network with \(M\) sources transmitting time-sensitive information to the destination over \(N\) unreliable wireless channels, as illustrated in Fig. [\[fig.Network\]](#fig.Network){reference-type="ref" reference="fig.Network"}. Packets from each source are generated according to an i.i.d. stochastic process with known statistics and the state of each wireless channel (ON/OFF) varies according to an i.i.d. stochastic process with *unknown statistics*. At every time slot, the learning algorithm schedules a single pair (source, channel) and the selected source attempts to transmit its packet via the selected wireless channel. When a packet with fresh information is successfully transmitted to the destination, the AoI associated with the selected source is reduced. The goal of the scheduler is to keep the information associated with every source in the network as fresh as possible, i.e. to minimize the AoI in the network. To decide which pair to select in a time slot, the scheduler takes into account: i) the packet generation processes at the \(M\) sources; ii) the current values of AoI at the destination; and iii) the estimated reliability of the \(N\) wireless channels. In this sequential decision problem, the outcomes of previous transmission attempts are used to estimate the reliability of the wireless channels. This statistical learning problem is closely related to the stochastic multi-armed bandit (MAB) problem in which the wireless channels are the bandits that give i.i.d. rewards and the scheduler is the player that attempts to learn the statistics of the bandits in order to maximize the reward accumulated over time. The main challenge in the stochastic MAB problem is to strike a balance between exploiting the bandit that gave the highest rewards in the past and exploring other bandits that may give high rewards in the future. To evaluate the performance of different learning algorithms, we define regret. Regret is the difference between the expected cumulative reward of a *genie algorithm* (that knows the statistics of the bandits a priori) and the expected cumulative reward of the *learning algorithm* under consideration. The regret captures the penalty incurred by having to learn the statistics of the bandits over time. Some well-known order-optimal learning algorithms in terms of regret are: \(\epsilon\)-Greedy, Upper Confidence Bound (UCB), and Thompson Sampling (TS). The regret of these policies was shown to increase no more than logarithmically in time, \(O(\log T)\), and this bound was shown to be tight. We refer to our problem as the *Aging Bandit problem*. An important distinction between the stochastic MAB problem and the Aging Bandit problem is the reward structure. In the stochastic MAB problem, the player selects a bandit in each time slot and receives a reward that is i.i.d. over time and depends only on the probability distribution associated with the selected bandit. In the Aging Bandit problem, the scheduler selects a pair (source, channel) and the reward is the AoI reduction that results from a packet transmission to the destination. This reward depends on the state of the selected channel (which is i.i.d. over time), since a failed transmission gives zero reward, and it also depends on the history of previous packet deliveries and packet generations. In particular, if the selected source has recently delivered a fresh information update to the destination, then the reduction in AoI may be small. In contrast, if the selected source has not updated the destination for a long period, then the AoI reduction may be large. The reward structure of Aging Bandits is closely related to the AoI evolution (formally defined in Sec. [2](#sec.Model){reference-type="ref" reference="sec.Model"}) which is history-dependent. This intricate reward structure has significant impact on the analysis of regret and on the development of learning algorithms when compared to the analysis of the traditional stochastic MAB. The literature on MAB problems is vast, dating more than eight decades. For surveys on different types of MAB problems, we refer the readers to. Most relevant to this work are. The authors in considered the problem of minimizing the expected queue-length in a system with a single queue and multiple servers with unknown service rates. In, the authors introduced the concept of queue-length regret, developed a learning algorithm inspired by Thompson Sampling, and analyzed its regret. In, the authors used information particular to the queue evolution to develop a learning algorithm with \(O(1)\) queue-length regret. The authors in considered the problem of minimizing the average AoI in a single-hop wireless network with unreliable channels. In, the authors posed the AoI minimization problem in a network with multiple sources and *known channel statistics* as a restless MAB problem, developed the associated Whittle's Index scheduling policy, and evaluated its performance in terms of the average AoI. In, the authors considered the AoI minimization problem in a network with a single source-destination pair and unknown channel statistics, introduced the concept of AoI regret, and showed that the AoI regret of UCB and TS scale as \(O(\log T)\). In, the authors obtained similar results as in for the more challenging case of correlated wireless channels. In, the authors considered the AoI minimization problem in a network with multiple sources that generate and transmit fresh packets at every time slot through (possibly) different channels with unknown statistics. The authors in showed that the AoI regret of a UCB-based distributed learning algorithm scales as \(O(\log^2 T)\). An important modelling assumption common to is that sources generate and transmit fresh packets at every time slot. The more realistic assumptions of random packet generation and scheduled transmissions have significant impact on the AoI evolution, on the analysis of AoI regret, and on the development of learning algorithms. For example, in Sec. [\[sec.Policy\]](#sec.Policy){reference-type="ref" reference="sec.Policy"}, we leverage the random packet generation to develop a learning algorithm with \(O(1)\) AoI regret. In this paper, we study learning algorithms that attempt to minimize AoI in a network with multiple sources generating packets according to stochastic processes and transmitting these packets to the destination over wireless channels with initially unknown statistics. At every time slot, the learning algorithm schedules a single pair (source, channel) and the selected source attempts to transmit a packet through the selected channel. Note that the source policy, which selects a source at each time slot, and the channel policy, which selects the channel to be used in each time slot, can be naturally decoupled, as the optimal channel is independent of the source selected. In this paper, we focus on the exploration-exploitation dilemma faced by the channel policy. In particular, we consider learning algorithms employing the *optimal source policy* and *different channel policies*. Our main contributions include: - we analyze the performance of channel policies based on traditional MAB algorithms including \(\epsilon\)-Greedy, UCB, and TS, and show that their AoI regret scales as \(\Theta(\log T)\). These results generalize the analysis in to networks with multiple sources generating packets randomly. The analysis of the AoI regret is more challenging in this network setting since the AoI evolution depends on both the source policy and the stochastic packet generation process. These challenges are discussed in Sec. [3](#sec.Regret){reference-type="ref" reference="sec.Regret"}; - we develop a novel learning algorithm and establish that it has \(O(1)\) AoI regret. The key insight is that when packets are generated randomly, the learning algorithm can utilize times when the network has no packets to transmit, in order to learn the statistics of the channel. To the best of our knowledge, this is the first learning algorithm with bounded AoI regret. The remainder of this paper is outlined as follows. In Sec. [2](#sec.Model){reference-type="ref" reference="sec.Model"}, the network model and performance metrics are formally presented. In Sec. [3](#sec.Regret){reference-type="ref" reference="sec.Regret"}, we analyze the AoI regret of traditional learning algorithms. In Sec. [\[sec.Policy\]](#sec.Policy){reference-type="ref" reference="sec.Policy"}, we develop an order-optimal learning algorithm and analyze its AoI regret. In Sec. [\[sec.Simulations\]](#sec.Simulations){reference-type="ref" reference="sec.Simulations"}, we compare the AoI regret of different learning algorithms using simulations. The paper is concluded in Sec. [\[sec.Conclusion\]](#sec.Conclusion){reference-type="ref" reference="sec.Conclusion"}. Some of the technical proofs have been omitted due to the space constraint, and will be made available in a technical report. # System Model {#sec.Model} Consider a single-hop wireless network with \(M\) sources, \(N\) channels and a single destination, as illustrated in Fig. [\[fig.Network\]](#fig.Network){reference-type="ref" reference="fig.Network"}. Each source generates packets containing time-sensitive information and these packets are to be transmitted to the destination through one of the wireless channels. Let the time be slotted, with slot index \(t\in\{1,2,\cdots,T\}\), where \(T\) is the time horizon of this discrete-time system. The slot duration allows for a single packet transmission. We normalize the slot duration to unity. At the beginning of every slot \(t\), each source generates a packet with probability \(\lambda\in(0,1)\). Let \(a_m(t)\in\{0,1\}\) be the indicator function that is equal to \(1\) when source \(m\in\{1,2,\cdots,M\}\) generates a packet in slot \(t\), and \(a_m(t)=0\) otherwise. This Bernoulli process with parameter \(\lambda\) is i.i.d. over time and independent across different sources, with \(\mathrm{P}\left(a_m(t)=1\right)=\lambda,\forall m,t\). A packet that is generated in slot \(t\) can be transmitted during the same slot \(t\). We denote the vector of packet generations in slot \(t\) by \(\vec{a}(t) = \left[ a_1(t)\ \cdots\ a_M(t) \right]^\mathsf{T}\). Each source has a transmission queue to store its packets. Sources keep *only* the most recently generated packet, i.e. the freshest packet, in their queue. When source \(m\) generates a new packet at the beginning of slot \(t\), older packets (if any) are discarded from its queue. Notice that delivering the most recently generated packet provides the freshest information to the destination. This queueing discipline is known to optimize the AoI in a variety of contexts. After a packet delivery from source \(m\), the queue remains empty until the next packet generation from the same source. However, while the queue is empty, a *dummy packet* can be transmitted for the purpose of probing the channels. The networked system is empty during slot \(t\) if there are no data packets available for transmission, i.e. if the \(M\) queues are empty. Let \(E(t)\in\{0,1\}\) be the indicator function that is equal to \(1\) if the system is empty during slot \(t\), and \(E(t)=0\) otherwise. Notice that if there is a packet generation at the beginning of slot \(t\), then the system is nonempty during slot \(t\) and \(E(t)=0\). Recall that when the system is empty, sources can still transmit dummy packets. In a slot, the learning algorithm selects a single pair \((m,n)\), where \(m\in\{1,2,\cdots,M\}\) is the index of the source and \(n\in\{1,2,\cdots,N\}\) is the index of the wireless channel. Then, during this slot, source \(m\) transmits a packet to the destination through channel \(n\). If channel \(n\) is ON, then the packet is successfully transmitted to the destination, and if channel \(n\) is OFF, then the transmission fails. The learning algorithm does not know the channel states while making scheduling decisions, and the outcome of a transmission attempt during slot \(t\) is known at the beginning of slot \(t+1\). Let \(b_n(t)\in\{0,1\}\) be the indicator function that represents the state of channel \(n\) during slot \(t\). The channel is ON, \(b_n(t)=1\), with probability \(\mu_n\in(0,1]\), and the channel is OFF, \(b_n(t)=0\), with probability \(1-\mu_n\). The channel state process is i.i.d. over time and independent across different channels. The *reliability of channel* \(n\) is represented by the probability of this channel being ON, \(\mu_n\). Let \(\vec\mu = \left[ \mu_1\ \cdots\ \mu_N \right]^\mathsf{T}\) be the vector of channel reliabilities. Let \(\mu^*\) be the maximum channel reliability and let \(n^*\) be the index of the corresponding channel, i.e.  \(\mu^* = \max_{n} \mu_n = \mu_{n^*}\). For simplicity, we assume that the optimal channel \(n^*\) is unique. Naturally, if the channel reliabilities were known by the learning algorithm in advance, then the algorithm would select channel \(n^*\) in every slot \(t\). However, since the channel reliabilities \(\vec\mu\) are initially unknown, the learning algorithm has to estimate \(\mu_n\) using observations from previous transmission attempts, while at the same time attempting to minimize the AoI in the network. Next, we formulate the AoI minimization problem. ## Age of Information The AoI captures how old the information is from the perspective of the destination. Let \(h_m(t)\) be a positive integer that represents the AoI associated with source \(m\) at the beginning of slot \(t\). By definition, we have \(h_m(t):=t-\tau_m(t)\), where \(\tau_m(t)\) is the generation time of the latest packet successfully transmitted from source \(m\) to the destination[^1]. If the destination does not receive a fresh packet from source \(m\) during slot \(t\), then in the next slot we have \(h_m(t+1)=h_m(t)+1\), since the information at the destination is one slot older. In contrast, if the destination receives a fresh packet from source \(m\) during slot \(t\), then in the next slot the value of \(\tau_m(t+1)\) is updated to the generation time of the received packet and the AoI is reduced by \(\tau_m(t+1)-\tau_m(t)\). This difference is the "freshness gain" associated with the received packet. The evolution of \(h_m(t)\) over time is illustrated in Fig. [\[fig.AoIevolution\]](#fig.AoIevolution){reference-type="ref" reference="fig.AoIevolution"}. We define the vector of AoI in slot \(t\) as \(\vec{h}(t) = \left[ h_1(t)\ \cdots\ h_M(t) \right]^\mathsf{T}\). For capturing the information freshness of the entire network, we consider the *expected total AoI* \(\bar h(T)\), which is defined as the expected sum of the AoI over all sources and over time, namely \[\label{eq.totalAge} \bar h(T) = \mathrm{E}\left[\sum_{m=1}^{M} \sum_{t=1}^{T} h_m(t)\right] \;,\] where the expectation is with respect to the randomness in the channel states \(b_n(t)\), packet generation process \(\vec a(t)\), and scheduling decisions \((m,n)\). The learning algorithm schedules pairs \((m,n)\) over time so as to minimize the expected total AoI \(\bar h(T)\). Recall that in this sequential decision problem, the channel reliabilities \(\mu_n\) are initially unknown by the learning algorithm and should be estimated over time. Next, we discuss the class of learning algorithms considered in this paper. ## Learning Algorithm In this section, we present three important concepts associated with the learning algorithm: the channel policy, the source policy, and the AoI regret. Prior to discussing these concepts, we introduce some notation. In each slot \(t\), the learning algorithm selects a single source and a single channel. Let \(m(t)\) be the index of the source selected during slot \(t\) and let \(n(t)\) be the index of the channel selected during slot \(t\). Then, the pair selected in each slot can be denoted as \((m(t),n(t))\). Notice that the learning algorithm can be divided into two components: the source policy, which selects \(m(t)\), and the channel policy, which selects \(n(t)\). Let \(b(t)=b_{n(t)}(t)\) be the state of the channel selected during slot \(t\), and recall that \(\vec{a}(t)\) is the vector of packet generations and \(\vec{h}(t)\) is the vector of AoI in slot \(t\). Using this notation, we define the *channel policy* and the *source policy*. The *channel policy* may (or may not) take into account the status of the transmission queues at the sources (in particular \(E(t)\)) in making scheduling decisions \(n(t)\). Hence, we define two types of channel policies: queue-independent channel policies and queue-dependent channel policies. Let \(\Pi_B\) be the class of admissible *queue-independent channel policies* \(\pi_b\). In slot \(t\), an arbitrary policy \(\pi_b\in\Pi_B\) selects \(n(t)\) using information about the outcome of previous transmission attempts. In particular, the queue-independent channel history in slot \(t\) is given by \(H_B(t) = \{ n(1),b(1),\cdots,n(t-1),b(t-1) \}\). Let \(\bar\Pi_B\) be the class of admissible *queue-dependent channel policies* \(\bar\pi_b\). In slot \(t\), an arbitrary policy \(\bar\pi_b\in\bar\Pi_B\) selects \(n(t)\) using information about the outcome of previous transmission attempts and about the current status of the transmission queues. In particular, the queue-dependent channel history in slot \(t\) is given by \(\bar{H}_B(t) = H_B(t)\cup\{E(t)\}\). In Sec. [\[sec.Policy\]](#sec.Policy){reference-type="ref" reference="sec.Policy"}, we show that this small amount of information, namely \(E(t)\), can have a significant impact on the performance of the channel policy. It is easy to see that both the optimal queue-independent channel policy \(\pi^*_b\) and the optimal queue-dependent channel policy \(\bar \pi^*_b\) select the channel with highest reliability \(\mu^*\) at every slot \(t\). However, since the reliabilities \(\vec\mu\) are not known a priori, the channel policies have to estimate \(\vec\mu\) over time. In Sec. [3](#sec.Regret){reference-type="ref" reference="sec.Regret"}, we consider queue-independent channel policies and in Sec. [\[sec.Policy\]](#sec.Policy){reference-type="ref" reference="sec.Policy"}, we consider queue-dependent channel policies. The *source policies* considered in this paper are work-conserving, i.e.  policies that never transmit dummy packets when there are undelivered data packets in the system. Let \(\Pi_A\) be the class of admissible work-conserving source policies \(\pi_a\). In slot \(t\), an arbitrary source policy \(\pi_a\in\Pi_A\) selects \(m(t)\) using information about the current AoI and the generation times of the packets waiting to be transmitted at the sources' queues. In particular, the source history in slot \(t\) is given by \(H_A(t) = \{ \vec{a}(1),\vec{h}(1),\cdots,\vec{a}(t),\vec{h}(t)\}\). The optimal source policy \(\pi^*_a\in\Pi_A\) is the transmission scheduling policy that minimizes the expected total AoI in [\[eq.totalAge\]](#eq.totalAge){reference-type="eqref" reference="eq.totalAge"}. A few works in the literature have addressed the problem of finding the transmission scheduling policy that minimizes AoI in wireless networks with stochastic packet generation and unreliable channels with *known statistics*. Despite those efforts, a full characterization of the optimal source policy is still an open problem. In this paper, we consider learning algorithms \(\pi\) that are a composition of a source policy and a channel policy \(\pi=(\pi_a,\pi_b)\). Our goal is to study the exploration-exploitation dilemma faced by the channel policy. To that end, we analyze the AoI regret of learning algorithms employing the optimal source policy and different channel policies. To analyze the AoI regret of learning algorithms without the full characterization of the optimal source policy \(\pi_a^*\), we derive lower and upper bounds on the regret. These bounds are discussed in Proposition [\[p1\]](#p1){reference-type="ref" reference="p1"}, Proposition [\[t2\]](#t2){reference-type="ref" reference="t2"}, and Theorem [\[t3\]](#t3){reference-type="ref" reference="t3"}, where we assumed that the optimal source policy \(\pi_a^*\) is the same irrespective of the queue-independent channel policy \(\pi_b\) under consideration, namely \[\label{eq.independenceAssumption} \pi^*_a = \argmin_{\pi_a\in\Pi_A} \mathrm{E}\left[ \sum_{m=1}^{M} \sum_{t=1}^{T} h^{(\pi_a,\pi_b)}_m(t) \right] \;, \; \forall\pi_b\in\Pi_B \;,\] where \(h^{(\pi_a,\pi_b)}_m(t)\) denotes the AoI associated with source \(m\) in slot \(t\) when the learning algorithm \(\pi=(\pi_a,\pi_b)\) is employed. An analogous assumption is utilized for the case of queue-dependent channel policies \(\bar\pi_b\in\bar\Pi_B\). The *AoI regret* of a learning algorithm \(\pi\) with queue-independent channel policy \(\pi_b\) is defined as the difference between the expected total AoI \(\bar h^\pi (T)\) when \(\pi=(\pi_a,\pi_b)\) is employed and the expected total AoI \(\bar h^* (T)\) when the optimal algorithm \(\pi^*=(\pi_a^*,\pi_b^*)\) is employed, namely \[\label{eq.AoIregret} R^\pi(T) = \mathrm{E}\left[ \sum_{m=1}^{M} \sum_{t=1}^{T} h^\pi_m(t)-\sum_{m=1}^{M} \sum_{t=1}^{T} h^*_m(t) \right] \;,\] where the expectation is with respect to the randomness in the channel states \(b(t)\), packet generation process \(\vec a(t)\), and scheduling decisions \((m(t),n(t))\). The definition of AoI regret for a learning algorithm \(\bar\pi\) with queue-dependent channel policy \(\bar\pi_b\) is analogous to [\[eq.AoIregret\]](#eq.AoIregret){reference-type="eqref" reference="eq.AoIregret"}. Next, we analyze the AoI regret of learning algorithms with *queue-independent channel policies*. # Regret Analysis {#sec.Regret} The problem of learning channel reliabilities over time is closely related to the stochastic MAB problem. A natural class of channel policies to consider are traditional MAB algorithms such as \(\epsilon\)-Greedy, UCB, and TS. In this section, we derive bounds on the AoI regret of learning algorithms that employ *queue-independent channel policies*. Notice that the class of queue-independent channel policies \(\Pi_B\) includes traditional MAB algorithms. We describe a learning algorithm employing TS as its channel policy in Algorithm [\[alg.TS\]](#alg.TS){reference-type="ref" reference="alg.TS"}. Scheduling decisions of a learning algorithm \(\pi\) might differ from those of \(\pi^*\) both in the source and in the channel, which makes the analysis of the AoI regret \(\sum_{t=1}^T \sum_{m=1}^M \mathrm{E}[ h_m^\pi(t)-h_m^{*}(t) ]\) challenging. To alleviate this challenge, we use stochastic coupling to create *equivalent coupled channel state processes* that are simpler to analyze. Similar coupling arguments were employed in. By construction, the coupled channel states are no longer independent. In particular, if a channel is ON during slot \(t\), then all channels with higher reliability \(\mu_n\) are also ON during that slot. Notice that, in each slot \(t\), each coupled channel \(n\) has the same probability distribution as the associated original channel \(n\), namely \(\mathrm{P}\left(b_n(t)=1\right)=\mu_n,\forall n,t\). Hence, given the scheduling decision \((m(t),n(t))\) of \(\pi\) during any slot \(t\), the probability of a successful transmission attempt from source \(m(t)\) through channel \(n(t)\) is the same for both the coupled and original channel states. It follows that the probability distribution of \(h_m^\pi(t)\) also remains the same for all slots \(t\) and for all sources \(m\) and, thus, the AoI regret \(R^\pi(T)\) in [\[eq.AoIregret\]](#eq.AoIregret){reference-type="eqref" reference="eq.AoIregret"} also remains the same for both the coupled and original channel state processes. *For simplicity of analysis, henceforth in this paper, we assume that the channel state processes are coupled as described in Remark [\[r1\]](#r1){reference-type="ref" reference="r1"}*. In Proposition [\[p1\]](#p1){reference-type="ref" reference="p1"}, Proposition [\[t2\]](#t2){reference-type="ref" reference="t2"}, and Corollary [\[c3\]](#c3){reference-type="ref" reference="c3"}, we derive bounds on the AoI regret of a learning algorithm \(\pi\) with respect to its *expected number of suboptimal channel choices*, namely \[\label{eq.suboptimalChoices} \mathrm{E}[K^\pi(T)] = \mathrm{E}\left[\sum_{t=1}^T\mathbbm{1}\left\{n^\pi(t) \neq n^*\right\}\right] \;,\] where \(\mathbbm{1}\left\{n^\pi(t) \neq n^*\right\}=1\) if \(n^\pi(t) \neq n^*\), and \(\mathbbm{1}\left\{n^\pi(t) \neq n^*\right\}=0\) otherwise. We consider two classes of admissible learning algorithms \[\begin{aligned} \Pi = \left\{ \pi=(\pi_a,\pi_b): \pi_a\in\Pi_A, \pi_b\in\Pi_B \right\} \;; \label{eq.Pi}\\ \Pi^* = \left\{ \pi=(\pi_a,\pi_b): \pi_a = \pi^*_a, \pi_b\in\Pi_B \right\} \;. \label{eq.Pi_star} \end{aligned}\] Both classes employ queue-independent channel policies. The difference is that \(\Pi\) employs any admissible source policy \(\pi_a\in\Pi_A\), while \(\Pi^*\) employs the optimal source policy \(\pi_a^*\). Naturally, we have \(\Pi^*\subset\Pi\). *Proof outline.* In addition to the suboptimal channel choices, source choices \(m^\pi(t)\) of algorithm \(\pi\in\Pi\) can also differ from the source choices \(m^{*}(t)\) of \(\pi^*\). To overcome this challenge, we construct an auxiliary algorithm \(\hat\pi^*\) with optimal channel policy and a source policy that selects the same source[^3] \(m^{\pi}(t)\) as \(\pi\) in every slot \(t\). Then, we focus on the *auxiliary AoI regret* \(\sum_{t=1}^T \sum_{m=1}^M \mathrm{E}[ h_m^\pi(t)-h_m^{\hat\pi^*}(t)]\) associated with the auxiliary algorithm \(\hat\pi^*\), which we show to be not greater than the original AoI regret \(\sum_{t=1}^T \sum_{m=1}^M \mathrm{E}[ h_m^\pi(t)-h_m^{*}(t) ]\). We then observe that each suboptimal channel choice of \(\pi\) results in a penalty to the auxiliary AoI regret, and we show that this penalty is lower bounded by a constant. Using this constant, we obtain the desired lower bound on the original AoI regret in [\[eq.p1\]](#eq.p1){reference-type="eqref" reference="eq.p1"}. The details are omitted due to the space constraint. [^1]: We define \(\tau_m(t)=0\) prior to the first packet delivery from source \(m\). [^2]: \(f(t) = \Omega(g(t)) \iff \exists C>0\ \exists t_0\ \forall t>t_0: f(t)\ge C\cdot g(n)\) [^3]: Notice that if the selected source \(m^{\pi}(t)\) has no packet in its transmission queue, then the auxiliary algorithm attempts to transmit a dummy packet.
{'timestamp': '2020-12-23T02:01:37', 'yymm': '2012', 'arxiv_id': '2012.08682', 'language': 'en', 'url': 'https://arxiv.org/abs/2012.08682'}
# Introduction {#section:introduction} Transformer models  pre-trained by language modeling tasks are very powerful on a wide variety of NLP tasks . However, the convergence efficiency of language pre-training methods hasn't been improved much . Given finite amount of time and computing resources, language pre-training methods can be very under-trained . Therefore unlike most of classic deep learning tasks in which overfitting is a concern, the challenge of language pre-training is actually underfitting the training data . What makes data fitting so hard for language pre-training? Recent research shed light on this issue by interpreting the attention weights of pre-trained Transformer models or running probing tasks on pre-trained models with different situations. One common observation from such work is that pre-trained model's attention modules can be good at capturing linguistic information such as syntactic patterns, while having a hard time at fitting more complex patterns such as human commonsense and reasoning. This is probably due to that models pre-trained with language modeling tasks rely too much on word co-occurrence information. We observed similar phenomenon by manually examining the word predictions of Masked Language Model (MLM) at masked positions during pre-training. We found that even at the early stage of pre-training, the pre-trained model can surprisingly produce very fluent sentences. However, the model can have mis-predictions that semantically or logically contradict with the context through the entire pre-training. One example is, In the masked position of the sentence above, the ground-truth word is "study", which is mis-predicted as "bedroom". It is probably because the frequently co-occurring pattern between "bedroom" and "bed" that is easy to fit for the model, dominates pre-training and outruns the hard-to-fit semantics in the context. Such easy-to-fit patterns can therefore prevent the model from fitting the more sophisticated patterns, such as reasoning and rare facts, and harm the model's performance on downstream tasks. Fortunately, we believe that mis-predictions can help locate such dominating patterns the model has fitted that harm language understanding. When a mis-prediction occurs, there are likely to be some dominating patterns related to the mis-prediction in the context fitted by the model that cause this mis-prediction, for example, the frequently co-occurring word "bed" with the mis-prediction "bedroom" in the highlighted example. If we can add regularization to train the model to rely less on these dominating patterns such as word co-occurrences when a mis-prediction occurs, thus focusing more on the rest more subtle patterns, more information can be efficiently fitted at pre-training. Following this motivation, we propose a new language pre-training method, Using Mis-predictions as Harm Alerts (MPA). Specifically, in MPA, when a mis-prediction occurs during pre-training, we use its co-occurrence information to guide several heads of the self-attention modules. These self-attention heads in the Transformer modules are optimized to assign higher attention weights to the words in the input sentence that rarely co-occur with the mis-prediction while assigning lower weights to the other words. By doing so, the Transformer model is trained to rely less on the dominating co-occurring patterns of mis-predictions while focusing more on the rest of the contextual information. Empirically we find that such a simple regularization can help pre-training methods quite effectively. We conduct experiments using BERT and ELECTRA  as MPA's backbone methods. Our results show that MPA expedites the training processes of BERT and ELECTRA and improves their performances on downstream tasks. Sensitivity analysis on hyper-parameter configurations shows that MPA improves the backbone methods in a wide range of hyper-parameter settings. The ablation study also illustrates that MPA's effectiveness largely comes from the assigning appropriate attention weights to rare context of mis-predictions. # Using Mis-Predictions as Harm Alerts {#section:main} In the section, we first briefly introduce BERT (in Appendix [\[appx:preliminaries\]](#appx:preliminaries){reference-type="ref" reference="appx:preliminaries"}) and ELECTRA as preliminaries. Then we describe the proposed method, Mis-Predictions as Harm Alerts (MPA). We use ELECTRA as the backbone method to describe MPA for ease of illustration, but it is important to note that MPA can potentially be applied to other Transformer-based language pre-training methods as well. ## Preliminaries {#subsection:preliminaries} #### ELECTRA ELECTRA trains two Transformer models in parallel, one smaller BERT as generator (G) and the other normal-sized Transformer as discriminator (D). The training objective of the discriminator is to detect the mis-predicted tokens from the generator. The ELECTRA generator's training objective and loss function are the same as those of BERT, as described in the previous section and Equation [\[eq:bert-loss\]](#eq:bert-loss){reference-type="ref" reference="eq:bert-loss"}. Specifically, the input of the generator is a token sequence masked similarly as in BERT pre-training. At every iteration during training, the generator makes predictions at the masked positions of each sequence. Then the generator outputs a new token sequence with tokens at the masked positions replaced by the generator's predictions. The generator's output sequence then would be used as the input of the discriminator. If we denote the generator's output sequence as \(\mathbf{x}^r\), then the discriminator's loss function is, \[\begin{aligned} \mathcal{L}_{D}(\mathbf{x}, \mathbf{x}^{r}) &= \frac{1}{N} (\sum_{t=1}^N-\mathbf{1}(\mathbf{x}_t^{r}=\mathbf{x}_t)\cdot \log D(\mathbf{x}^{r},t) \\ &-\mathbf{1}(\mathbf{x}_t^{r}\neq \mathbf{x}_t)\cdot\log (1-D(\mathbf{x}^{r},t))). \label{eq:electra-loss} \end{aligned}\] \(N\) is the length of the input sequence \(x\). Equation [\[eq:electra-loss\]](#eq:electra-loss){reference-type="ref" reference="eq:electra-loss"} is a cross-entropy loss for the binary classification task of ELECTRA's discriminator. With this loss, the discriminator of ELECTRA is trained to detect if the token at each position of the input is a mis-prediction. The final combined loss of ELECTRA with respect to \(x\) is, \[\begin{aligned} \mathcal{L}_(\mathbf{x},\mathbf{x}^{m}, \mathbf{x}^{r}) &= \mathcal{L}_G(\mathbf{x}, \mathbf{x}^{m})+\lambda \mathcal{L}_D(\mathbf{x}, \mathbf{x}^{r}), \label{eq:electra-entire-loss} \end{aligned}\] \(\lambda\) is the hyper-parameter controlling the ratio of the two losses. With this modified task, ELECTRA improves the pre-training efficiency by providing a better sampling efficiency. ## The Proposed Method {#subsection:main} A mis-prediction usually occurs when there are dominating co-occurring patterns with the mis-prediction in the context that lead to it. In this section, we firstly describe how MPA locates such dominating and harmful patterns with the help of mis-predictions. MPA achieves this goal by preparing beforehand a context matrix \(\mathbf{S}\) with word oc-occurrence information. In context matrix \(\mathbf{S}\), for a token \(i\) and token \(j\), if \(j\) co-occurs frequently with \(i\), \(\mathbf{S}_{i,j}\) is close to \(1\) and vice versa. Details of constructing \(\mathbf{S}\) are in Appendix[\[appx:context\]](#appx:context){reference-type="ref" reference="appx:context"}. Then we describe how MPA trains the Transformer model to rely less on such patterns and rely more on the rest information with the help of this context matrix. #### Pre-training. After recording the context information of tokens in the context matrix \(S\), we start pre-training with MPA. During pre-training, given an partially-masked input sequence \(\mathbf{x}^m\), we firstly forward it to the generator and get \(\mathbf{x}^r\), same as ELECTRA. \(\mathbf{x}^r\) is the output sequence from the generator, with tokens at the masked positions replaced by the generator's predictions. Then we collect the mis-predicted positions in \(\mathbf{x}^r\) as, \[\begin{aligned} \mathcal{M}_{x} =\{1(x_t^{r} \neq x_t)\cdot t\}_{t=1}^{N_x}. \label{eq:multi-head} \end{aligned}\] \(N_x\) is the length of the input sequence \(\mathbf{x}\). As described in Equation [\[eq:attention\]](#eq:attention){reference-type="ref" reference="eq:attention"}, each query-key attention co-efficient \(a(i,j)\) is calculated by a scaled dot-product of the query \(i\) and the key \(j\). We maintain the self-attention modules the same for all the other positions in the input sequence, except the mis-predicted positions in \(\mathcal{M}_{x}\). For each mis-predicted position \(t\) in the input sequence \(\mathcal{M}_{x}\), we firstly fetch the pre-calculated context vector of the mis-predicted token \(x_t^{r}\) from \(\mathbf{S}\). We denote it as \(\mathbf{S}_{x_t^r}\). The vector \(\mathbf{S}_{x_t^r}\) consists of the context co-efficients of the mis-prediction \(x_t^{r}\) with all tokens in the vocabulary. Then from \(\mathbf{S}_{x_t^r}\), we select context coefficients of mis-prediction \(x_t^{r}\) with tokens in the input sentence \(\mathbf{x}^r\) and denote the vector as \(\mathbf{S}(t, \mathbf{x}^r)\). \(\mathbf{S}(t, \mathbf{x}^r)\) is a vector with its dimension equal to the length of \(\mathbf{x}^r\). Each element \(\mathbf{S}(t, \mathbf{x}^r)_i\) in \(\mathbf{S}(t, \mathbf{x}^r)\) is the context coefficient of token pair \((x_t^r, x_i^r)\). Figure [\[fig:fetch\]](#fig:fetch){reference-type="ref" reference="fig:fetch"} describes this process in detail with an example. With \(\mathbf{S}(t, \mathbf{x}^r)\) prepared for the input sequence \(\mathbf{x}^r\) and the mis-predicted position \(t\), MPA guides several self-attention heads in the discriminator to focus less on the frequent context and more on the other context of each mis-prediction \(x_t^{r}\). Specifically, at the mis-predicted position \(t\), for query \(\mathbf{q}_t\), the context-guided self-attention calculates the attention coefficients as, \[\begin{aligned} \mathbf{g}(\mathbf{q}_t, \mathbf{K}) = \frac{\mathbf{q}_t\mathbf{K}^T}{\sqrt{d_K}}\cdot (1-\mathbf{S}(t, \mathbf{x}^r)). \label{eq:context-guilded} \end{aligned}\] In this equation, we multiply the original pre-softmax attention co-efficients \(\frac{\mathbf{q}_t\mathbf{K}^T}{\sqrt{d_K}}\) at position \(t\) with \((1-\mathbf{S}(t, \mathbf{x}^r))\). Through this way, keys ignored by the attention module could be set a larger weight in \(\mathbf{g}(\mathbf{q}_t, \mathbf{K})\) if their context coefficients in \(\mathbf{S}(t, \mathbf{x}^r)\) are smaller compared with other tokens in the sentence. Keys at positions of frequent context of the mis-prediction would be set a smaller weight in \(\mathbf{g}(\mathbf{q}_t, \mathbf{K})\) since their context coefficients in \(\mathbf{S}(t, \mathbf{x}^r)\) is relatively large. We then use \(\mathbf{g}(\mathbf{q}_t, \mathbf{K})\) as the supervised information to train these self-attention heads at the mis-predicted position \(t\). Specifically, we minimize the L-2 loss between \(\mathbf{g}(\mathbf{q}_t, \mathbf{K})\) and the original pre-softmax attention weights from the attention module, \[\begin{aligned} \small \mathcal{L}_A = \frac{1}{N_M}\sum_{t=0}^{N_M}(\frac{\mathbf{q}_t\mathbf{K}^T}{\sqrt{d}}-\mathbf{g}(\mathbf{q}_t, \mathbf{K}))^2 \label{eq:attention_loss_2} \end{aligned}\] \(N_M\) is the total number of mis-predictions. Note that we don't back-propergate through \(\mathbf{g}(\mathbf{q}_t, \mathbf{K})\). \(\mathbf{g}(\mathbf{q}_t, \mathbf{K})\) is only used as supervised information to guide the model to focus more on conflicting context of mis-predictions. Figure [\[fig:arch\]](#fig:arch){reference-type="ref" reference="fig:arch"} in Appendix shows with an example the training of self-attention heads with this additional loss at the mis-predicted positions. The final loss function of the proposed pre-training method is, \[\begin{aligned} \small \mathcal{L}_(\mathbf{x},\mathbf{x}^{m}, \mathbf{x}^{r}) &= \mathcal{L}_G(\mathbf{x}, \mathbf{x}^{m})+\lambda \mathcal{L}_D(\mathbf{x}, \mathbf{x}^{r}) + \gamma \mathcal{L}_A (\mathbf{x}, \mathbf{x}^{r}). \label{eq:total-loss} \end{aligned}\] \(\lambda\) and \(\gamma\) and hyper-parameters controlling the ratio of the 3 losses. We present the implementation details in Appendix [\[appx:implementation\]](#appx:implementation){reference-type="ref" reference="appx:implementation"}. # Experiments {#section:experiments} To verify the efficiency and effectiveness of MPA, we conduct pre-training experiments and evaluate pre-trained models on fine-tuning downstream tasks. All codes are implemented with *fairseq* in *PyTorch*. All models are run on 8 NVIDIA Tesla V100 GPUs with mixed-precision. We describe our experiment setup in Appendix [\[appx:exp_setup\]](#appx:exp_setup){reference-type="ref" reference="appx:exp_setup"} Table [1](#tab:general){reference-type="ref" reference="tab:general"} shows the performances of all pre-trained models on every task. We can see that MPA improves the performance of both BERT and ELECTRA on each of the task tested. For fair comparison, we pre-train the two baselines, BERT and ELECTRA, with our system and data and present the results as BERT(ours) and ELECTRA(ours). We also present pre-trained models' performances on every individual sub-task of GLUE in Table [\[tab:glue\]](#tab:glue){reference-type="ref" reference="tab:glue"} and those of SuperGLUE in Table [\[tab:superglue\]](#tab:superglue){reference-type="ref" reference="tab:superglue"} in Appendix. Results show that MPA can outperform both of the backbone methods in the majority of sub-tasks. MPA also has considerable performance improvements on tasks requiring more complex semantic understanding and reasoning, such as MNLI, RTE, WiC and WSC. We also present the average GLUE score curves during the pre-training in Figure [\[fig:curve\]](#fig:curve){reference-type="ref" reference="fig:curve"} in Appendix. It shows that MPA outperforms its backbone methods throughout the entire pre-training. It also shows that MPA can reach the same average GLUE scores with fewer numbers of iterations compared with both baselines. The number of iterations required for MPA-ELECTRA is \(40\%\) less than that of ELECTRA when reaching ELECTRA's final performance. Since MPA-ELECTRA's running time per iteration is identical with ELECTRA, MPA-ELECTRA's training time is also \(40\%\) less than that of ELECTRA. Finally we present our hyper-parameter analysis and ablation study in Appendix [\[appx:ablation_study\]](#appx:ablation_study){reference-type="ref" reference="appx:ablation_study"} # Conclusion and Future Work {#section:conclusion} In this work, we propose MPA (Mis-Predictions as Harm Alerts) to improve language pre-training methods. In MPA, we train several heads of Transformer's attention modules to rely less on the dominating co-occurring patterns with mis-predictions and to focus more on the rare context of them. Experimental results show that MPA can improve both BERT and ELECTRA on the majority of GLUE downstream tasks. MPA can also make the pre-training of BERT and ELECTRA more efficient. The ablation study also confirms that MPA's effectiveness largely comes from the rare context of mis-predictions.
{'timestamp': '2021-12-06T02:26:52', 'yymm': '2012', 'arxiv_id': '2012.08789', 'language': 'en', 'url': 'https://arxiv.org/abs/2012.08789'}
# Introduction {#sec:int} As the reconfiguration of magnetic field geometry, magnetic reconnection plays an elemental role in magnetized plasma systems, e.g., the solar and stellar coronae and planetary magnetospheres, throughout the university. It is used to explain the release of magnetic energy and its conversion to other forms, such as thermal and kinetic energy. In solar physics, numerous theoretical studies of magnetic reconnection have been undertaken to explain various solar activities, such as flares, filament eruptions, coronal mass ejections, and jets. In the two-dimensional (2D) models, magnetic reconnection takes place at an X-point where anti-parallel magnetic field lines converge and reconnect. However, the process of magnetic reconnection is difficult to observe directly. In the solar corona, magnetic flux is frozen into the coronal plasma. The coronal structures, e.g., loops and filament threads, and their structural changes thus outline the magnetic field topology and its evolution. Using the remote-sensing observations, many signatures of magnetic reconnection have been reported. These include reconnection inflows, current sheets, reconnection outflows, plasmoid ejections, loop-top hard X-ray sources, supra-arcade downflows, cusp-shaped post-flare loops, and coronal structural reconfigurations. In the solar chromosphere, observational evidence of magnetic reconnection has also been presented. Using the H\(\alpha\) images from the New Vacuum Solar Telescope with high spatial and temporal resolution, signatures of magnetic reconnection are observed at an X-type configuration between a pair of interacting fibrils. During the process of magnetic reconnection, inflows and outflows of fibrils are clearly detected. In another reconnection event, oscillation of newly reconnected fibrils after reconnection in the chromosphere is reported. Magnetic reconnection between the chromospheric fibrils and filament threads is studied, and suggested to play an important role in solar eruptions by releasing the magnetic twist. Between two neighboring filaments, magnetic reconnection occurs, and forms two sets of new filaments and two-sided-loop jets. Magnetic reconnection between the emerging and pre-existing fibrils is investigated. An example of two-sided-loop jets simultaneously observed in the chromosphere, transition region, and corona is then described. Recently, a small-scale oscillatory reconnection event is presented, that leads to the formation and disappearance of a flux rope. Moreover, the disconnection of a filament caused by reconnection is revealed. Magnetic reconnection modulated by non-local solar activities has been studied theoretically. numerically simulated the interaction of fast magnetoacoustic oscillations of a non-flaring loop with a nearby magnetic null point. They found that the fast magnetoacoustic wave coming into the null point from the outside oscillating loop can trigger the magnetic reconnection. performed magnetohydrodynamic (MHD) simulations of magnetic reconnection driven by five-minute solar p-mode oscillations. They pointed out that several typical and puzzling features of the transition-region explosive events can only be explained if there exist p-mode oscillations and the reconnection site is located in the upper chromosphere. investigated the nature of nonlinear fast magnetoacoustic waves propagating in the neighborhood of a 2D magnetic X-point. They demonstrated that magnetic reconnection is naturally driven by the MHD wave propagation. However, magnetic reconnection affected by the external solar activities is rarely observed directly. In the wake of an erupting flux rope, oscillation of the current sheets caused by the neighboring filament eruption has been reported. But the evolution of magnetic reconnection is not investigated. Recently, presented that the rising flux rope pushes the overlying loops, and forms an external current sheet where magnetic reconnection takes place. In this paper, we report a reconnection event accelerated by an adjacent filament eruption. The observations and results are shown separately in Sections [2](#sec:obs){reference-type="ref" reference="sec:obs"} and [3](#sec:res){reference-type="ref" reference="sec:res"}. A summary and discussion is presented in Section [4](#sec:sum){reference-type="ref" reference="sec:sum"}. # Observations {#sec:obs} The NVST is a 1-meter ground-based solar telescope, located in the Fuxian Solar Observatory of the Yunnan Observatories, Chinese Academy of Sciences. It provides observations of the solar fine structures and their evolution in the solar lower atmosphere. On 2013 March 15, the NVST observed the active region (AR) 11696 with a field of view (FOV) of 200\(\times\)`<!-- -->`{=html}186 in the H\(\alpha\) channel, centered at 6562.8 Å with a bandwidth of 0.25 Å, from 01:20 UT to 06:40 UT. The H\(\alpha\) images have a time cadence of 12 s and spatial sampling of 0.164 pixel\(^{-1}\). They are processed first by flat field correction and dark current subtraction, and then reconstructed by speckle masking. The co-alignment of H\(\alpha\) images is carried out by a fast sub-pixel image registration algorithm. The Atmospheric Imaging Assembly onboard the Solar Dynamic Observatory is a set of normal-incidence imaging telescopes, acquiring solar atmospheric images in ten wavelength bands. Different AIA channels show plasma at different temperatures, e.g., 131 Å peaks at \(\sim\)`<!-- -->`{=html}10 MK (Fe XXI) and \(\sim\)`<!-- -->`{=html}0.6 MK (Fe VIII), 94 Å peaks at \(\sim\)`<!-- -->`{=html}7.2 MK (Fe XVIII), 335 Å peaks at \(\sim\)`<!-- -->`{=html}2.5 MK (Fe XVI), 211 Å peaks at \(\sim\)`<!-- -->`{=html}1.9 MK (Fe XIV), 193 Å peaks at \(\sim\)`<!-- -->`{=html}1.5 MK (Fe XII), 171 Å peaks at \(\sim\)`<!-- -->`{=html}0.9 MK (Fe IX), and 304 Å peaks at \(\sim\)`<!-- -->`{=html}0.05 MK (He II). In this study, we employ the AIA images in one ultraviolet (UV) channel (1600 Å) and seven extreme UV (EUV) channels (131, 94, 335, 211, 193, 171, and 304 Å) to investigate the evolution of magnetic reconnection and filament eruption. Here, the AIA images are processed to 1.5-level using "aia_prep.pro\". Then the spatial sampling of AIA images is 0.6 pixel\(^{-1}\), and the time cadences of AIA EUV and UV images are 12 s and 24 s, respectively. The Helioseismic and Magnetic Imager onboard the SDO provides line of sight (LOS) magnetograms, with a time cadence of 45 s and spatial sampling of 0.5 pixel\(^{-1}\). We use the HMI LOS magnetograms to study the evolution of surface magnetic fields underlying the reconnection region and the erupting filament. The NVST H\(\alpha\) images have been rotated to match the orientation of SDO observations. All the data from different instruments, i.e., the SDO and NVST, and passbands have been aligned with a principle of best cross-correlation between images of two passbands with the closest characteristic temperatures. # Results {#sec:res} We analyze the observations that provide signatures of how a filament eruption causes magnetic reconnection to speed-up at a different location. On 2013 March 15, a saddle-like structure, located to the northeast of AR 11696, was observed by the NVST, see Figure [\[f:general_information\]](#f:general_information){reference-type="ref" reference="f:general_information"}(a). It is created by a set of four fibrils seen in the H\(\alpha\) images, marked separately by L1, L2, L3, and L4, see the red, green, cyan, and blue dashed lines in Figure [\[f:general_information\]](#f:general_information){reference-type="ref" reference="f:general_information"}(a). A curved filament is located to the southeast of the saddle-like structure, outlined by the pink dotted line in Figure [\[f:general_information\]](#f:general_information){reference-type="ref" reference="f:general_information"}(a). We overlay the H\(\alpha\) fibrils L1-L4 and their nearby filament on an HMI LOS magnetogram in Figure [\[f:general_information\]](#f:general_information){reference-type="ref" reference="f:general_information"}(b). For better descriptions, we label the positive and negative magnetic fields as P1 and P2, and N1, N2, and N3, based on the fibril connectivity, see Figure [\[f:general_information\]](#f:general_information){reference-type="ref" reference="f:general_information"}(b). The fibrils L1, L2, L3, and L4 connect the positive and negative magnetic fields P1 and N1, P1 and N2, P2 and N2, and P2 and N1, respectively, see the red, green, cyan, and blue dashed lines in Figure [\[f:general_information\]](#f:general_information){reference-type="ref" reference="f:general_information"}(b). The central positive magnetic fields P2 and their surrounding negative magnetic fields N1, N2, and N3 constitute a fan-spine magnetic field configuration, see Figures [\[f:general_information\]](#f:general_information){reference-type="ref" reference="f:general_information"}(b) and [\[f:cartoon\]](#f:cartoon){reference-type="ref" reference="f:cartoon"}. The filament is located upon the polarity inversion line between the central positive magnetic fields P2 and the surrounding negative magnetic fields N1 and N3, see the pink dotted line in Figure [\[f:general_information\]](#f:general_information){reference-type="ref" reference="f:general_information"}(b). ## Magnetic reconnection before the filament eruption {#sec:mr1} The H\(\alpha\) fibrils L2 and L4 constitute a saddle-type structure, see Figure [\[f:mr_ha\]](#f:mr_ha){reference-type="ref" reference="f:mr_ha"}(a). They move toward each other, and reconnect. Two sets of newly reconnected fibrils L1 and L3 then form, and retract away from the reconnection region, see the online animated version of Figure [\[f:mr_ha\]](#f:mr_ha){reference-type="ref" reference="f:mr_ha"}. No current sheet is observed in the H\(\alpha\) diagnostics in the reconnection region between fibrils L2 and L4. Along the red line AB in Figure [\[f:mr_ha\]](#f:mr_ha){reference-type="ref" reference="f:mr_ha"}(c), a time slice of H\(\alpha\) images is made, and displayed in Figure [\[f:measurements_ha\]](#f:measurements_ha){reference-type="ref" reference="f:measurements_ha"}(a). Inward motions of fibrils L2 and L4, with mean speeds of \(\sim\)`<!-- -->`{=html}16-18 km s\(^{-1}\), see the green dotted lines in Figure [\[f:measurements_ha\]](#f:measurements_ha){reference-type="ref" reference="f:measurements_ha"}(a), toward the reconnection region, denoted by the red dashed line in Figure [\[f:measurements_ha\]](#f:measurements_ha){reference-type="ref" reference="f:measurements_ha"}(a), are clearly identified. Along the green line CD in Figure [\[f:mr_ha\]](#f:mr_ha){reference-type="ref" reference="f:mr_ha"}(d), another time slice of H\(\alpha\) images is obtained, and shown in Figure [\[f:measurements_ha\]](#f:measurements_ha){reference-type="ref" reference="f:measurements_ha"}(b). At the same time, outward motions of the newly reconnected fibrils L1 and L3, with mean speeds of \(\sim\)`<!-- -->`{=html}24-26 km s\(^{-1}\), see the green dotted lines in Figure [\[f:measurements_ha\]](#f:measurements_ha){reference-type="ref" reference="f:measurements_ha"}(b), away from the reconnection region, denoted by the red dashed line in Figure [\[f:measurements_ha\]](#f:measurements_ha){reference-type="ref" reference="f:measurements_ha"}(b), are evidently detected. Moreover, topological reconfiguration of the fibrils by reconnection, e.g., from fibrils L4 to L3 and L1, is observed, see Figures [\[f:mr_ha\]](#f:mr_ha){reference-type="ref" reference="f:mr_ha"}(a)-(b) and (e)-(f) and the online animated version of Figure [\[f:mr_ha\]](#f:mr_ha){reference-type="ref" reference="f:mr_ha"}. Along the pink and cyan lines EF and GH in Figures [\[f:mr_ha\]](#f:mr_ha){reference-type="ref" reference="f:mr_ha"}(b) and (e), time slices of H\(\alpha\) images are made, and illustrated in Figures [\[f:measurements_ha\]](#f:measurements_ha){reference-type="ref" reference="f:measurements_ha"}(c) and (d), respectively. The fibrils L4 reconnect with L2, and then separately turn into L3 and L1, with mean moving speeds of \(\sim\)`<!-- -->`{=html}7 km s\(^{-1}\) and \(\sim\)`<!-- -->`{=html}13 km s\(^{-1}\), see the blue dotted lines in Figures [\[f:measurements_ha\]](#f:measurements_ha){reference-type="ref" reference="f:measurements_ha"}(c)-(d). The process of magnetic reconnection is also observed by AIA, see Figure [\[f:mr_aia1\]](#f:mr_aia1){reference-type="ref" reference="f:mr_aia1"}. Four sets of coronal loops L1-L4 are recorded in AIA EUV images, forming a saddle-like structure, consistent with the H\(\alpha\) fibrils L1-L4, see Figure [\[f:mr_aia1\]](#f:mr_aia1){reference-type="ref" reference="f:mr_aia1"}(a). In the same manner, the loops L2 and L4 constitute an X-type structure, see the red dotted lines in Figure [\[f:mr_aia1\]](#f:mr_aia1){reference-type="ref" reference="f:mr_aia1"}(c). At the interface of these two loops, magnetic reconnection takes place, see the online animated version of Figure [\[f:mr_aia2\]](#f:mr_aia2){reference-type="ref" reference="f:mr_aia2"}. Along the cyan line IJ in Figure [\[f:mr_aia1\]](#f:mr_aia1){reference-type="ref" reference="f:mr_aia1"}(a), a time slice of AIA 304 Å images is made, and displayed in Figure [\[f:measurements_aia1\]](#f:measurements_aia1){reference-type="ref" reference="f:measurements_aia1"}(a). Different from the H\(\alpha\) observations, motions of the EUV loops toward the reconnection region are hard to observe, see the online animated version of Figure [\[f:mr_aia2\]](#f:mr_aia2){reference-type="ref" reference="f:mr_aia2"}. Nevertheless, the inward motion of loops L2, similar to the H\(\alpha\) fibrils L2, with a mean speed of \(\sim\)`<!-- -->`{=html}33 km s\(^{-1}\), see the blue dotted line in Figure [\[f:measurements_aia1\]](#f:measurements_aia1){reference-type="ref" reference="f:measurements_aia1"}(a), toward the reconnection region, marked by the purple dashed line in Figure [\[f:measurements_aia1\]](#f:measurements_aia1){reference-type="ref" reference="f:measurements_aia1"}(a), is still identified. In the reconnection region, a current sheet forms, denoted by green solid arrows in Figure [\[f:mr_aia1\]](#f:mr_aia1){reference-type="ref" reference="f:mr_aia1"}. In the particular snapshot, i.e., at 01:33:11 UT, it has a width of \(\sim\)`<!-- -->`{=html}2 Mm, and a length of \(\sim\)`<!-- -->`{=html}7.2 Mm in AIA 171 Å images, see Figure [\[f:mr_aia1\]](#f:mr_aia1){reference-type="ref" reference="f:mr_aia1"}(c). Here, the length of current sheet is measured between two cusp-shaped structures at the ends of current sheet, marked by red pluses in Figure [\[f:mr_aia1\]](#f:mr_aia1){reference-type="ref" reference="f:mr_aia1"}(c). For the width of current sheet, first we get the intensity profile in the AIA 171 Å channel perpendicular to the current sheet, e.g., along the purple line in Figure [\[f:mr_aia1\]](#f:mr_aia1){reference-type="ref" reference="f:mr_aia1"}(c). Employing the intensity surrounding the current sheet, we calculate the background emission, and subtract it from the intensity profile. We fit the residual intensity profile using a single Gaussian, and obtain the full width at half maximum (FWHM) of the single Gaussian fit as the current sheet width. The magnetic reconnection rate, the ratio of the width and the length of the current sheet, is thus \(\sim\)`<!-- -->`{=html}0.28. The current sheet appears in most AIA EUV channels, except the higher-temperature channels, e.g., 335 and 94 Å, see Figure [\[f:mr_aia1\]](#f:mr_aia1){reference-type="ref" reference="f:mr_aia1"} and the online animated version of Figure [\[f:mr_aia2\]](#f:mr_aia2){reference-type="ref" reference="f:mr_aia2"}. In the blue rectangle enclosing the current sheet in Figure [\[f:mr_aia1\]](#f:mr_aia1){reference-type="ref" reference="f:mr_aia1"}(e), the light curves of the AIA 304, 131, 171, 193, and 211 Å channels are calculated, and shown in Figure [\[f:measurements_aia1\]](#f:measurements_aia1){reference-type="ref" reference="f:measurements_aia1"}(c). Considering the influence of background emission, similar temporal evolution of the AIA EUV light curves are identified. They reach the peaks at almost the same time, see the blue vertical dashed line in Figure [\[f:measurements_aia1\]](#f:measurements_aia1){reference-type="ref" reference="f:measurements_aia1"}(c). The current sheet repeatedly appears and disappears, see the online animated version of Figure [\[f:mr_aia2\]](#f:mr_aia2){reference-type="ref" reference="f:mr_aia2"}, with a mean period of \(\sim\)`<!-- -->`{=html}8 minutes, obtained from the wavelet analysis of the AIA 304 Å light curve in Figure [\[f:measurements_aia1\]](#f:measurements_aia1){reference-type="ref" reference="f:measurements_aia1"}(c). Same as before, the well-developed current sheets are measured using AIA 171 Å images. They have the width of 1-2 Mm with a mean value of 1.5 Mm, the length of 5.3-7.2 Mm with a mean value of 6.4 Mm, and the reconnection rate of 0.18-0.3 with a mean value of 0.24. As the current sheet is not observed in the AIA higher-temperature channels, e.g., 94 and 335 Å, plasma at that location could be cooler than \(\sim\)`<!-- -->`{=html}2.5 MK, the characteristic temperature of AIA 335 Å channel. The current sheet in AIA 131 Å images, see Figure [\[f:mr_aia1\]](#f:mr_aia1){reference-type="ref" reference="f:mr_aia1"}(b), hence shows plasma with the lower characteristic temperature (\(\sim\)`<!-- -->`{=html}0.6 MK) of AIA 131 Å channel. Using six AIA EUV channels, including 94, 335, 211, 193, 171, and 131 Å, we analyze the temperature and emission measure (EM) of the current sheet. Here, we employ the differential EM (DEM) analysis using "xrt_dem_iterative2.pro\". The current sheet region, enclosed by the red rectangle in Figure [\[f:mr_aia1\]](#f:mr_aia1){reference-type="ref" reference="f:mr_aia1"}(b), is chosen to compute the DEM. The region out of the current sheet, enclosed by the purple rectangle in Figure [\[f:mr_aia1\]](#f:mr_aia1){reference-type="ref" reference="f:mr_aia1"}(b), is chosen for the background emission that is subtracted from the current sheet region. In each region, the DN counts in each of the six AIA channels are temporally normalized by the exposure time and spatially averaged over all pixels. The DEM curve of the current sheet region is displayed in Figure [\[f:measurements_aia1\]](#f:measurements_aia1){reference-type="ref" reference="f:measurements_aia1"}(e). Consistent with the AIA imaging observations, the DEM shows a lack of hot plasma component in the current sheet, see the black curve in Figure [\[f:measurements_aia1\]](#f:measurements_aia1){reference-type="ref" reference="f:measurements_aia1"}(e). The average DEM-weighed temperature and EM are 2 MK and 2.5\(\times\)`<!-- -->`{=html}10\(^{27}\) cm\(^{-5}\), respectively. Using the EM, the number density (\(n_{p}\)) of current sheet is estimated using \(n_{p}=\sqrt{\frac{{\textrm{EM}}}{D}}\), where \(D\) is the LOS depth of current sheet. Assuming that the depth \(D\) equals the width (\(W\)) of current sheet, then the density is \(n_{p}=\sqrt{\frac{{\textrm{EM}}}{W}}\). Employing EM=2.5\(\times\)`<!-- -->`{=html}10\(^{27}\) cm\(^{-5}\) and W=2 Mm, we obtain the density to be 3.5\(\times\)`<!-- -->`{=html}10\(^{9}\) cm\(^{-3}\). The thermal energy (TE) of current sheet is also calculated using TE=\(\frac{3}{2}\)n\(_{p}\[\cdot\)k\(_{B}\]\cdot\)V\(\cdot\[\delta\)T. Here k\(_{B}\) is Boltzmann's constant, V volume, and \(\delta\)T temperature increase from the temperature (T\(_{1}\)) of reconnection inflowing structure to that (T\(_{2}\)) of current sheet. Assuming that the current sheet is a cylinder, its volume is then V=\(\pi\)(\(\frac{W}{2}\))\(^{2}\]\cdot\)L, where L is the length of current sheet. Therefore the thermal energy is TE=\(\frac{3}{2}\)n\(_{p}\[\cdot\)k\(_{B}\]\cdot\[\pi\)(\(\frac{W}{2}\))\(^{2}\]\cdot\)L\(\cdot\)(T\(_{2}\)-T\(_{1}\)). As the reconnection inflow is observed mainly in H\(\alpha\) images and the current sheet is identified in EUV images, we obtain T\(_{1}\)=10\(^{4}\) K, the temperature of H\(\alpha\) fibrils, and T\(_{2}\) to be the average DEM-weighed temperature of current sheet. Employing n\(_{p}\)=3.5\(\times\)`<!-- -->`{=html}10\(^{9}\) cm\(^{-3}\), W=1-2 Mm, L=5.3-7.2 Mm, T\(_{2}\)=2 MK, and T\(_{1}\)=10\(^{4}\) K, we calculate the thermal energy of current sheet, and get TE=(1.9\(\pm\)`<!-- -->`{=html}1.3)\(\times\)`<!-- -->`{=html}10\(^{25}\) erg. Plasmoids appear in the current sheet, and propagate along it bi-directionally, and then further along the reconnection loops L2 and L4, see Figure [\[f:mr_aia1\]](#f:mr_aia1){reference-type="ref" reference="f:mr_aia1"}(d) and the online animated version of Figure [\[f:mr_aia2\]](#f:mr_aia2){reference-type="ref" reference="f:mr_aia2"}. Same as the current sheet, they are not observed in the AIA higher-temperature channels, e.g., 335 and 94 Å. Along the current sheet, see the green line KL in Figure [\[f:mr_aia1\]](#f:mr_aia1){reference-type="ref" reference="f:mr_aia1"}(c), a time slice of AIA 171 Å images is made, and shown in Figure [\[f:measurements_aia1\]](#f:measurements_aia1){reference-type="ref" reference="f:measurements_aia1"}(b). It indicates that the plasmoids always form in the middle of the current sheet, marked by the red dashed line in Figure [\[f:measurements_aia1\]](#f:measurements_aia1){reference-type="ref" reference="f:measurements_aia1"}(b), and then move bi-directionally with mean speeds of \(\sim\)`<!-- -->`{=html}36-48 km s\(^{-1}\), see the green dotted lines in Figure [\[f:measurements_aia1\]](#f:measurements_aia1){reference-type="ref" reference="f:measurements_aia1"}(b). Along the blue line MN in Figure [\[f:mr_aia1\]](#f:mr_aia1){reference-type="ref" reference="f:mr_aia1"}(c), another time slice of AIA 171 Å images is made, and illustrated in Figure [\[f:measurements_aia1\]](#f:measurements_aia1){reference-type="ref" reference="f:measurements_aia1"}(d). Several motions of plasmoids along the north leg of loops L2 are evidently identified, with a mean speed of \(\sim\)`<!-- -->`{=html}71 km s\(^{-1}\), see the green dotted line in Figure [\[f:measurements_aia1\]](#f:measurements_aia1){reference-type="ref" reference="f:measurements_aia1"}(d). From \(\sim\)`<!-- -->`{=html}02:30 UT, a set of higher-lying loops L6, connecting the surrounding negative magnetic fields N1-N3 and the remote positive magnetic fields, appears in most AIA EUV channels, except 304 Å, see Figure [\[f:filament_eruption\]](#f:filament_eruption){reference-type="ref" reference="f:filament_eruption"}(a). They are likely to be heated by nanoflares, as no significant activity is detected associated with the brightening of loops. The current sheet, i.e., the reconnection region, is then covered by the loops L6 in these EUV channels. It, however, still appears in AIA 304 Å images, see the online animated version of Figure [\[f:mr_aia2\]](#f:mr_aia2){reference-type="ref" reference="f:mr_aia2"}. This indicates that the reconnection between loops L2 and L4 continues to take place as before, consistent with the H\(\alpha\) observations. A set of lower-lying loops L5 overlying the filament is also detected. It connects the positive and negative magnetic fields P2 and N3, see Figures [\[f:filament_eruption\]](#f:filament_eruption){reference-type="ref" reference="f:filament_eruption"}(a) and [\[f:cartoon\]](#f:cartoon){reference-type="ref" reference="f:cartoon"}. In the AIA higher-temperature channels, e.g., 94 and 335 Å, the loops L5 and L6 gradually disappear, indicating the cooling process of heated loops. Consistent with the previous observations, the current sheet forms in the lower-temperature, e.g., 304 Å, rather than the higher-temperature channels, e.g., 94 and 335 Å, see the online animated version of Figure [\[f:mr_aia2\]](#f:mr_aia2){reference-type="ref" reference="f:mr_aia2"}. ## Filament eruption {#sec:filament_eruption} From \(\sim\)`<!-- -->`{=html}05:52 UT, the north, rather than the south, part of the filament, located to the southeast of the reconnection region, brightens, see Figure [\[f:filament_eruption\]](#f:filament_eruption){reference-type="ref" reference="f:filament_eruption"}(b), and then erupts, see Figure [\[f:filament_eruption\]](#f:filament_eruption){reference-type="ref" reference="f:filament_eruption"}(d). A partial eruption of the filament is thus observed. Along the erupting direction, see the green line PQ in Figure [\[f:filament_eruption\]](#f:filament_eruption){reference-type="ref" reference="f:filament_eruption"}(b), a time slice of AIA 304 Å images is made, and displayed in Figure [\[f:filament_eruption\]](#f:filament_eruption){reference-type="ref" reference="f:filament_eruption"}(g). The filament erupts with a mean projection speed of \(\sim\)`<!-- -->`{=html}55 km s\(^{-1}\), see the blue dotted line in Figure [\[f:filament_eruption\]](#f:filament_eruption){reference-type="ref" reference="f:filament_eruption"}(g). Assuming that the filament erupts outward along the radial direction, we obtain the corrected erupting speed to be 163 km s\(^{-1}\), using the heliographic position N13 W15 of the erupting filament. The erupting filament is prevented eventually by the higher-lying loops L5 and L6, showing a failed filament eruption, and makes the higher-lying loops bright, see Figure [\[f:filament_eruption\]](#f:filament_eruption){reference-type="ref" reference="f:filament_eruption"}(e) and the online animated version of Figure [\[f:mr_aia2\]](#f:mr_aia2){reference-type="ref" reference="f:mr_aia2"}. Moreover, the failed filament eruption may also be caused by the reconnection between the erupting filament and its overlying loops. Two flare ribbons and post-flare loops, associated with the filament eruption, appear, see Figures [\[f:filament_eruption\]](#f:filament_eruption){reference-type="ref" reference="f:filament_eruption"}(c) and (e). The south flare ribbon moves away from the polarity inversion line of the positive and negative magnetic fields P2 and N3, with a mean speed of \(\sim\)`<!-- -->`{=html}42 km s\(^{-1}\), see the green dotted line in Figure [\[f:filament_eruption\]](#f:filament_eruption){reference-type="ref" reference="f:filament_eruption"}(g). The filament eruption pushes away the higher-lying loops L6 covering the reconnection region, see Figure [\[f:filament_eruption\]](#f:filament_eruption){reference-type="ref" reference="f:filament_eruption"}(f) and the online animated version of Figure [\[f:mr_aia2\]](#f:mr_aia2){reference-type="ref" reference="f:mr_aia2"}. It thus leads to a disturbance propagating outward across the reconnection region. Along the propagating direction VW in the blue rectangle in Figure [\[f:filament_eruption\]](#f:filament_eruption){reference-type="ref" reference="f:filament_eruption"}(f), a time slice of AIA 211 Å images is measured, and shown in Figure [\[f:filament_eruption\]](#f:filament_eruption){reference-type="ref" reference="f:filament_eruption"}(h). It indicates that the loops L6 is pushed away with a mean moving speed of \(\sim\)`<!-- -->`{=html}290 km s\(^{-1}\) by the propagating disturbance caused by the filament eruption, see the blue dotted line in Figure [\[f:filament_eruption\]](#f:filament_eruption){reference-type="ref" reference="f:filament_eruption"}(h). A dimming region then forms, and the reconnection region, e.g., the current sheet, reappears in these AIA EUV channels, e.g., 171, 193, and 211 Å, see the online animated version of Figure [\[f:mr_aia2\]](#f:mr_aia2){reference-type="ref" reference="f:mr_aia2"}. ## Magnetic reconnection after the filament eruption {#sec:mr2} After the filament eruption, the current sheet between loops L2 and L4 has the width and length of \(\sim\)`<!-- -->`{=html}2 Mm and \(\sim\)`<!-- -->`{=html}3.5 Mm at 06:18:35 UT, and thus a reconnection rate of \(\sim\)`<!-- -->`{=html}0.57, see Figure [\[f:mr_aia2\]](#f:mr_aia2){reference-type="ref" reference="f:mr_aia2"}(c). Here, the width is similar to the current sheet widths (1-2 Mm), the length is, however, smaller than the current sheet lengths (5.3-7.2 Mm), and the reconnection rate is much larger than the reconnection rates (0.18-0.3), before the filament eruption. The current sheet, different from those occurring in the AIA low-temperature EUV channels before the filament eruption, appears in all AIA EUV channels, marked by the green solid arrows in Figure [\[f:mr_aia2\]](#f:mr_aia2){reference-type="ref" reference="f:mr_aia2"}. Same as in Section [3.1](#sec:mr1){reference-type="ref" reference="sec:mr1"}, in the blue rectangle enclosing the reconnection region in Figure [\[f:mr_aia2\]](#f:mr_aia2){reference-type="ref" reference="f:mr_aia2"}(e), the light curves of the AIA 94, 335, 211, 193, 171, 131, and 304 Å channels are calculated, and displayed in Figure [\[f:measurements_aia2\]](#f:measurements_aia2){reference-type="ref" reference="f:measurements_aia2"}(a). Here, the AIA 211, 193, and 171 Å light curves before the filament eruption, denoted by the red vertical dotted line in Figure [\[f:measurements_aia2\]](#f:measurements_aia2){reference-type="ref" reference="f:measurements_aia2"}(a), are not measured, because before the filament eruption the reconnection region is covered by the higher-lying loops L6 in these channels, see Section [3.1](#sec:mr1){reference-type="ref" reference="sec:mr1"}. Before the filament eruption, the AIA 94 Å and 335 Å light curves keep constant, indicating that no current sheet appears in these AIA higher-temperature channels. The AIA 304 Å and 131 Å light curves, however, evolve due to the appearance of current sheet in these lower-temperature channels. Right after the filament eruption, the AIA 335, 211, 193, and 171 Å light curves decrease evidently, showing a dimming, as the higher-lying loops L6, covering the reconnection region, are pushed away by the propagating disturbance caused by the filament eruption, see also Figures [\[f:filament_eruption\]](#f:filament_eruption){reference-type="ref" reference="f:filament_eruption"}(f) and (h). All the light curves then exhibit rapid rise and reach the peaks. Among them, the AIA 94 Å light curve reaches the peak at 06:09:37 UT, see the green vertical dashed line in Figure [\[f:measurements_aia2\]](#f:measurements_aia2){reference-type="ref" reference="f:measurements_aia2"}(a), \(\sim\)`<!-- -->`{=html}2.3 minutes later than the AIA 304 Å light curve that peaks at 06:07:19 UT, see the blue vertical dashed line in Figure [\[f:measurements_aia2\]](#f:measurements_aia2){reference-type="ref" reference="f:measurements_aia2"}(a). Affected by the brightening of higher-lying loops caused by the filament eruption, see Section [3.2](#sec:filament_eruption){reference-type="ref" reference="sec:filament_eruption"}, the AIA 335 Å light curve reaches the peak several minutes later than the other light curves. It, however, has a small peak at 06:07:26 UT, identical to the peak of the AIA 304 Å light curve, see Figure [\[f:measurements_aia2\]](#f:measurements_aia2){reference-type="ref" reference="f:measurements_aia2"}(a). In addition, a much bright reconnection region is detected simultaneously in H\(\alpha\) observations, see the online animated version of Figure [\[f:mr_ha\]](#f:mr_ha){reference-type="ref" reference="f:mr_ha"}. As the current sheet appears in all AIA EUV channels, it, therefore, may contain plasma with both of the high and low temperature. The current sheet region, enclosed by the red rectangle in Figure [\[f:mr_aia2\]](#f:mr_aia2){reference-type="ref" reference="f:mr_aia2"}(d), is chosen to compute the DEM. The region out of the current sheet, enclosed by the purple rectangle in Figure [\[f:mr_aia2\]](#f:mr_aia2){reference-type="ref" reference="f:mr_aia2"}(d), is selected for the background emission that is subtracted from the current sheet region. The DEM curve of the current sheet region is shown in Figure [\[f:measurements_aia2\]](#f:measurements_aia2){reference-type="ref" reference="f:measurements_aia2"}(c). It indicates that more plasma with higher temperature and less plasma with lower temperature is detected in the current sheet, comparing to that in Figure [\[f:measurements_aia1\]](#f:measurements_aia1){reference-type="ref" reference="f:measurements_aia1"}(e). The average DEM-weighed temperature and EM are 5.5 MK and 1.7\(\times\)`<!-- -->`{=html}10\(^{28}\) cm\(^{-5}\), respectively. Both these quantities are significantly higher than those of current sheet before the filament eruption (2 MK and 2.5\(\times\)`<!-- -->`{=html}10\(^{27}\) cm\(^{-5}\)). Similar to Section [3.1](#sec:mr1){reference-type="ref" reference="sec:mr1"}, the density of current sheet is also estimated to be 9.2\(\times\)`<!-- -->`{=html}10\(^{9}\) cm\(^{-3}\) by using the EM, under the assumption that the LOS depth (D) of the current sheet equals its width (W=2 Mm). It is larger than that of current sheet before the filament eruption (3.5\(\times\)`<!-- -->`{=html}10\(^{9}\) cm\(^{-3}\)). Using n\(_{p}\)=9.2\(\times\)`<!-- -->`{=html}10\(^{9}\) cm\(^{-3}\), W=2 Mm, L=3.5 Mm, T\(_{2}\)=5.5 MK, and T\(_{1}\)=10\(^{4}\) K, we also calculate the thermal energy of current sheet, and obtain the value to be TE=1.1\(\times\)`<!-- -->`{=html}10\(^{26}\) erg. It is also larger than that of current sheet before the filament eruption (1.9\(\pm\)`<!-- -->`{=html}1.3\(\times\)`<!-- -->`{=html}10\(^{25}\) erg). In the current sheet, plasmoids appear and move along it and the reconnection loops, see Figure [\[f:filament_eruption\]](#f:filament_eruption){reference-type="ref" reference="f:filament_eruption"}(d) and the online animated version of Figure [\[f:mr_aia2\]](#f:mr_aia2){reference-type="ref" reference="f:mr_aia2"}. The north endpoint of loops L2, enclosed by the pink circles, then brightens, see Figure [\[f:mr_aia2\]](#f:mr_aia2){reference-type="ref" reference="f:mr_aia2"}(h). Along the green line RS in Figure [\[f:mr_aia2\]](#f:mr_aia2){reference-type="ref" reference="f:mr_aia2"}(c), a time slice of AIA 171 Å images is made, and displayed in Figure [\[f:measurements_aia2\]](#f:measurements_aia2){reference-type="ref" reference="f:measurements_aia2"}(b). It shows that more plasmoids moving along the north leg of loops L2 are detected, comparing with that in Figure [\[f:measurements_aia1\]](#f:measurements_aia1){reference-type="ref" reference="f:measurements_aia1"}(d), with a similar mean speed of \(\sim\)`<!-- -->`{=html}70 km s\(^{-1}\), see the green dotted line in Figure [\[f:measurements_aia2\]](#f:measurements_aia2){reference-type="ref" reference="f:measurements_aia2"}(b). Moreover, the plasmoids, different from those appearing in the AIA lower-temperature EUV channels before the filament eruption, see Section [3.1](#sec:mr1){reference-type="ref" reference="sec:mr1"}, appear in all AIA EUV channels. More hotter plasmoids are thus generated in the current sheet after the filament eruption. Comparing all the results before and after the filament eruption, see Sections [3.1](#sec:mr1){reference-type="ref" reference="sec:mr1"} and [3.3](#sec:mr2){reference-type="ref" reference="sec:mr2"}, we conclude that the reconnection between loops L2 and L4 is significantly accelerated by the filament eruption occurring to the southeast of the reconnection region. # Summary and discussion {#sec:sum} Employing the H\(\alpha\) images from NVST, and the AIA images and HMI LOS magnetograms from SDO, we study the reconnection between fibrils (loops) L2 and L4, and its nearby filament eruption. The reconnection accelerated by the filament eruption is then reported. In H\(\alpha\) images, a saddle-like structure, consisting of four sets of fibrils L1-L4, is observed. The fibrils L2 and L4 from opposite sides of the saddle region move together, and reconnect. The newly reconnected fibrils L1 and L3 then form, and retract away from the reconnection region. In AIA EUV images, similar loops L1-L4 and their evolution are identified. At the interface of loops L2 and L4, the current sheet repeatedly forms and disappears. Magnetic reconnection takes place in the current sheet. Plasmoids appear in the current sheet, and propagate along it, and then further along the reconnection loops. A filament, located to the southeast of the reconnection region, partially erupts, and leads to a flare. It is then prevented by the overlying loops as a failed filament eruption. After the filament eruption, a hotter, shorter current sheet forms with a much larger reconnection rate, where more hotter plasmoids appear. Based on the NVST H\(\alpha\) images, and the SDO AIA EUV images and HMI LOS magnetograms, a schematic diagram of the magnetic reconnection between fibrils (loops) and its nearby filament eruption is demonstrated in Figure [\[f:cartoon\]](#f:cartoon){reference-type="ref" reference="f:cartoon"}. Here, the red star represents the reconnection point between magnetic field lines of loops L2 and L4. A small-scale reconnection event among a saddle-like structure is observed by NVST. Similar to the small-scale reconnection events previously reported, inward and outward motions of H\(\alpha\) fibrils toward and away from the reconnection region are evidently detected, see Section [3.1](#sec:mr1){reference-type="ref" reference="sec:mr1"}. The reconnection inflowing and outflowing speeds of \(\sim\)`<!-- -->`{=html}17 km s\(^{-1}\) and \(\sim\)`<!-- -->`{=html}25 km s\(^{-1}\) are consistent with those of the fast reconnection event in. Different from, in this study the current sheet appears only in the AIA EUV channels, rather than the H\(\alpha\) channel, see Section [3.1](#sec:mr1){reference-type="ref" reference="sec:mr1"}. This indicates that the current sheet is significantly heated during the reconnection process. The width (1-2 Mm) and length (3.5-7.2 Mm) of current sheets are identical to those in, but larger than those in and. Moreover, the reconnection rate (0.18-0.57) is similar to those in, but larger than those in. Many plasmoids form in the current sheet, suggesting the presence of plasmoid instabilities during the process of magnetic reconnection. They propagate along the current sheet bi-directionally, and then further along the reconnection loops with a mean speed of \(\sim\)`<!-- -->`{=html}70 km s\(^{-1}\). The moving speed here is consistent with those in and, but smaller than those in. Magnetic reconnection accelerated by nearby filament eruption is observed. After the filament eruption, the length of current sheet decreases significantly from 5.3-7.2 Mm to 3.5 Mm. The reconnection rate, however, increases largely from 0.18-0.3 to 0.57, see Sections [3.1](#sec:mr1){reference-type="ref" reference="sec:mr1"} and [3.3](#sec:mr2){reference-type="ref" reference="sec:mr2"}. The enhancements of the AIA EUV light curves in the reconnection region after the filament eruption, see Figures [\[f:mr_aia1\]](#f:mr_aia1){reference-type="ref" reference="f:mr_aia1"}(c) and [\[f:mr_aia2\]](#f:mr_aia2){reference-type="ref" reference="f:mr_aia2"}(a), suggest the increase of temperature and/or density of plasma in the current sheet. The current sheet appears in the AIA higher-temperature channels, e.g., 335 and 94 Å, after rather than before the filament eruption. It is thus heated to much higher temperature after the filament eruption. This is also supported by the DEM curves of current sheet before and after the filament eruption, e.g., the average DEM-weighed temperature of current sheet increases from 2 MK to 5.5 MK. The increase of current sheet density from 3.5\(\times\)`<!-- -->`{=html}10\(^{9}\) cm\(^{-3}\) to 9.2\(\times\)`<!-- -->`{=html}10\(^{9}\) cm\(^{-3}\) after the filament eruption shows that more plasma (n\(_{p}\[\cdot\]\pi\[\cdot\)(\(\frac{W}{2}\))\(^{2}\]\cdot\)L) from (4.7\(\pm\)`<!-- -->`{=html}3.2)\(\times\)`<!-- -->`{=html}10\(^{34}\) to 1\(\times\)`<!-- -->`{=html}10\(^{35}\) is heated to higher temperature. More thermal energy of current sheet converted by reconnection after (1.1\(\times\)`<!-- -->`{=html}10\(^{26}\) erg) than before ((1.9\(\pm\)`<!-- -->`{=html}1.3)\(\times\)`<!-- -->`{=html}10\(^{25}\) erg) the filament eruption is then achieved. In addition, more hotter plasmoids form in the current sheet after the filament eruption during the same time intervals, see Figures [\[f:measurements_aia1\]](#f:measurements_aia1){reference-type="ref" reference="f:measurements_aia1"}(d) and [\[f:measurements_aia2\]](#f:measurements_aia2){reference-type="ref" reference="f:measurements_aia2"}(b). This indicates that more plasma is accelerated during the reconnection process. More kinetic energy is hence converted by reconnection after the filament eruption. Magnetic reconnection may be accelerated by the fast MHD wave caused by filament eruption. suggested that the fast wave coming into the magnetic null point from the outside leads to the increase of electric current density. The increasing electric current then efficiently induces plasma micro-instabilities of various kinds, and hence produces anomalous resistivity, which efficiently triggers the reconnection. Fast mode MHD waves generated by filament eruptions are indeed widely reported. In this study, the higher-lying loops covering the reconnection region in the AIA EUV channels are pushed away right after the filament eruption, see Section [3.2](#sec:filament_eruption){reference-type="ref" reference="sec:filament_eruption"}. This suggests that the filament eruption leads to a disturbance propagating outward across the reconnection region, that could be related to fast mode MHD wave. Using v\(_{A}\)=\(\frac{B}{\sqrt{4 \pi n_{p} \cdot m_{p}}}\), we calculate the Alfv\(\acute{e}\)n speed near the reconnection region, where B is the magnetic field strength, and m\(_{p}\) is the proton mass. Employing the magnetic field strength B=(3\(\pm\)`<!-- -->`{=html}2) G in the corona, and the coronal density n\(_{p}\)=(1\(\pm\)`<!-- -->`{=html}0.5)\(\times\)`<!-- -->`{=html}10\(^{9}\) cm\(^{-3}\), less than the current sheet density (3.5\(\times\)`<!-- -->`{=html}10\(^{9}\) cm\(^{-3}\)) before the filament eruption, the Alfv\(\acute{e}\)n speed is obtained to be v\(_{A}\)=(272\(\pm\)`<!-- -->`{=html}216) km s\(^{-1}\). It is consistent with the propagating speed (\(\sim\)`<!-- -->`{=html}290 km s\(^{-1}\)) of the disturbance. This propagating disturbance is hence likely to represent the fast-mode MHD wave driven by the filament eruption. The fast wave comes into the current sheet, increases its electric current density, and accelerates the magnetic reconnection. It could also enhance turbulent plasma motions at the current sheet, leading to a turbulent reconnection. Additionally, the propagating disturbance may also push more magnetic flux of loops (fibrils) L4, and thus more magnetic energy, into the reconnection region. All these effects will play a role in liberating magnetic energy with a larger reconnection rate. The released magnetic energy will then be converted to other forms of energy, e.g., thermal and kinetic. The authors thank the referee for helpful comments. We are indebted to the NVST and SDO teams for providing the data. This work is supported by the Strategic Priority Research Program of Chinese Academy of Sciences, Grant No. XDB 41000000, the National Natural Science Foundations of China (12073042, 11673034, 11533008, 11790304, 11873059, 1111903050, and 11773039), and the Key Research Program of Frontier Sciences (ZDBS-LY-SLH013) and the Key Programs (QYZDJ-SSW-SLH050) of Chinese Academy of Sciences. We acknowledge the usage of JHelioviewer software and NASA's Astrophysics Data System.
{'timestamp': '2021-02-04T02:10:02', 'yymm': '2012', 'arxiv_id': '2012.08710', 'language': 'en', 'url': 'https://arxiv.org/abs/2012.08710'}
# Introduction Star-forming regions in the Galaxy are distributed in a complex web of filaments that resemble a highly hierarchical network. While open clusters are typically found in the densest parts of the structure, nearly 90% of newborn stars become gravitationally unbound soon after the birth due to their dynamic interactions. Such loose ensembles of dispersing coeval stars are observed as stellar associations that keep the kinematic imprint of their local birth site up to \(\sim\)`<!-- -->`{=html}30 Myr before they become a part of the Galactic disk. Because such groups of hundreds to thousands of stellar siblings were born from the same molecular cloud, they all have similar surface abundances. These moving groups are thus the fossil records of the Galaxy that have a potential to link together star formation sites with the larger structures of the disk. They resemble an ideal laboratory to study a wide variety of important topics, from star-and planetary formation environments, the initial mass function and sequentially triggered star formation to dynamical processes that lead to the evaporation and finally the dispersal of an association. A reliable reconstruction of stellar associations is thus of critical importance. While observations from the Hipparcos space astrometry mission allowed a major improvement in the search of overdensities in the kinematic phase space using stellar positions, parallaxes and proper motions, it is high precision measurements from the Gaia space telescope--including radial velocities for a subset of 7,000,000 stars--that is revolutionising Galactic astrophysics. It has facilitated numerous attempts to study young stars above the main sequence and identify new members of the known moving groups in the Solar neighbourhood . Additionally studied young populations on much larger Galactic scales and reported on the discovery of \(\sim\)`<!-- -->`{=html}1500 clusters. Although a selection of the candidate members of a particular moving group is often based on the cuts in the kinematic space, the true nature of these groups appear to be diffuse due to their gradual dispersal. recently described extended structures emerging as the tidal streams of the nearby Hyades cluster, while found 11,000 pre-main sequence members of the Scorpius-Centaurus OB2 association residing in both compact and diffuse populations. Kinematic cuts in such cases are prone to be biased against the low-mass stars that are most likely to evaporate first. Numerous works on young associations rely on multi-dimensional clustering algorithms. For example, report on the discovery of 1,900 clusters and comoving groups within 1 kpc with HDBSCAN (Hierarchival Density-Based Spatial Clustering of Applications with Noise described by [@campello_density-based_2013]). However, the arrival of the Gaia's high precision parallaxes and proper motions enables reliable orbital simulations for the first time. For instance, were able to model an association at its birth time using Chronostar, perform its orbital trace-forward and blindly reconstruct the known Beta Pictoris association, reliably determine its members and, importantly, its kinematic age. Stellar age is, besides the kinematics, one of the decisive parameters in the characterization of the young moving groups. Parallaxes of nearby stars with uncertainties better than 10% enable the placement of stellar populations on the color-magnitude diagram. However, due to the numerous effects including the evolutionary model uncertainties and inflated radii on low-mass end of the population, the presence of binaries, background contamination and spread due to metallicity effects, and the variability of young stars, isochronal dating techniques remain non-trivial. While gyrochronology relies on the multiple photometric measurements to determine the rotation period of a star, it is spectroscopic youth indicators that require only one observation for the estimation of stellar age. Spectroscopic features of solar-like and cooler young stars up to the solar age are straightforward to observe. They emerge from the processes related to the magnetic activity of a star and manifest themselves in the excess emission in calcium H&K lines (Ca II H&K, 3969 and 3934 Å; @2008ApJ...687.1264M), H\(\alpha\) line (6563 Å; @2005A&A...431..329L) and infrared calcium triplet (Ca II IRT; 8498, 8542 and 8662 Å; @2013ApJ...776..127Z). [@2008ApJ...687.1264M] describe an age--activity relation that estimates age from the Ca II H&K emission in the range from \(\sim\)`<!-- -->`{=html}10 Myr up to 10 Gyr, although [@2013A&A...551L...8P] has shown later that there is no decay in chromospheric activity beyond 2 Gyr. The decline of the emission rate is the fastest in the youngest stars. Despite the variable nature of magnetic activity, especially in the pre-main sequence stars, it is easy to differentiate between stars of a few 10 and a few 100 Myr. On the other hand, the presence of the lithium 6708 Å  line in GKM dwarfs directly indicates their youth and is a good age estimator for stars between 10-30 Myr--which is a typical age of a stellar association. Follow-up observations with the goal to detect the lithium line in young candidates have been performed by (who found lithium in 58 stars) while report on the lithium measurements for \(\sim\)`<!-- -->`{=html}400 stars. Over 3000 young K and M stars with a detectable lithium 6708 Å  line have recently been identified in the GALAH dataset . While the majority of young early K dwarfs in the GALAH sample have practically settled on the main sequence, young late K and M stars with a detectable lithium line still reside 1 magnitude or more above the main sequence. [@2015MNRAS.448.2737R] have kinematically and photometrically selected candidate members of the Upper-Scorpius association and discovered 237 new members by the presence of lithium absorption. In the Gaia era, the majority of stars in the Solar neighbourhood have parallaxes and proper motions precisely determined while spectroscopic age indicators and precise radial velocities are missing for a large fraction of low-mass young stars. Large spectroscopic surveys, such as GALAH, typically avoid the crowded Galactic plane where most of the young stars reside. This work aims to fill the gap and presents spectroscopic observations, their age indicators and radial velocities of 799 young star candidates within 200 pc with no pre-existing lithium measurements. Section [2](#sec.data){reference-type="ref" reference="sec.data"} describes the kinematically unbiased selection of all overluminous late K and early M stars within 200 pc. We measure equivalent widths of the lithium absorption lines and the excess flux in Ca II H&K and H\(\alpha\) lines, as described in Section [3](#sec.youth_indicators){reference-type="ref" reference="sec.youth_indicators"}. Section [4](#sec.discussion){reference-type="ref" reference="sec.discussion"} discusses age estimation and strategy success. The dataset is accompanied with radial velocities. Concluding remarks are given in Section [5](#sec.conclusions){reference-type="ref" reference="sec.conclusions"}. # Data {#sec.data} ## Selection function Candidate young stars with Gaia magnitudes \(10<G<14.5\) were selected from the *Gaia* DR2 catalogue. We focused only on the low-mass end of the distribution. The selection was based on their overluminosities in the colour-magnitude diagram. The colour index was chosen to be BP-W1 because it gives the narrowest main sequence with overluminous stars clearly standing out. BP is taken from and is described in more detail by while W1 is from. The relation used as a lower main sequence parametrisation \(G(c)\) \[G(c) = 4.717 \times 10^{-3} \; c^5-0.149 \; c^4 + 1.662 \; c^3-8.374 \; c^2 + 20.728 \; c-14.129\] where G is absolute Gaia G magnitude and \(c\)=BP-W1 is described in more detail in together with the arguments leading to the choice of BP-W1 being the best colour index for this purpose. The colour--temperature relation is determined from synthetic spectra while the temperature-spectral type relation is based on [^1]. Our criteria further exclude older stars and keep only objects that are found 1 magnitude or more above the main sequence. This approach largely avoids main sequence binaries (at most 0.75 mag above the main sequence). The sample was color cut to include only stars between 3\(<\)BP-W1\(<\)`<!-- -->`{=html}5.6. This limit corresponds to K5-M3 dwarfs with \(T_{\rm eff}=3400\)--4400 K and allows the optimisation of the observation strategy and a focus on the cool pre-main sequence objects with the fastest lithium depletion rate. The blue limit is chosen so that it minimises the contamination with subgiants but keeps most of the late K dwarfs in the sample. The red limit is set on the steep region of the lithium isochrones that divides early M dwarfs with the fast depletion processes from those cooler ones that need more than 100 Myr to show a significant change in lithium. The upper luminosity boundary \[G > G(c)-(1.33 c-3)\] rejects giants from the sample. Since all stars disperse with time in the kinematic parameter space, young objects are found only in regions with low velocities. To avoid the kinematic bias towards the pre-selected clumps of young stars in the velocity parameter space that disfavors the low-mass stars, and to remove old stars, we compute the mean \(UVW\) value of the sample and keep all objects within (\(\pm\)`<!-- -->`{=html}15, \(\pm\)`<!-- -->`{=html}15, \(\pm\)`<!-- -->`{=html}10) \(\mathrm{km\,s^{-1}}\) of the median \(UVW\) = (-11.90, 215.77, 0.19) \(\mathrm{km\,s^{-1}}\). No kinematic cut was performed on stars that have no radial velocities available in the Gaia catalogue. A declination cut with \(\delta<30\,\mathrm{deg}\) eliminated objects not visible from the Siding Spring Observatory, Australia, where the observations took place. Known young stars from the Simbad database and stars observed with the GALAH survey were removed from the list to maximise survey efficiency at detecting new young stars. This selection results in 799 candidate stars. Finally, our sample of stars described in this work includes observations of 756 candidate objects from this list. A color-magnitude diagram with all the candidates is shown in Figure [\[fig.cmd\]](#fig.cmd){reference-type="ref" reference="fig.cmd"}. Parallaxes are taken from Gaia DR2. ## Observations Observations were carried out between November 2018 and October 2019 over 64 nights with the ANU 2.3m telescope at Siding Spring Observatory. In order to achieve better radial velocity precision, 349 stars brighter than G=12.5 were observed with the slit-fed Echelle spectrograph in the Nasmyth focus, covering wavelengths between \(\sim\)`<!-- -->`{=html}3900 and \(\sim\)`<!-- -->`{=html}6750 Å  at R=24,000. Exposure times were between 600 sec for the brightest and 1800 sec for the faintest objects, resulting in a typical S/N of 20 in the order containing the H\(\alpha\) line. Blue wavelengths with the calcium H&K lines have poor S/N but clearly show strong emission above the continuum when present (Fig. [\[fig.echelle_calcium\]](#fig.echelle_calcium){reference-type="ref" reference="fig.echelle_calcium"}). The spectra were reduced as per. Wavelength calibration was provided by bracketing Thorium-Argon lamp exposures. Fainter stars (449) between \(12.5<G<14.5\) were observed with the Wide Field Spectrograph (WiFeS; @2007Ap&SS.310..255D), namely with resolving power of 3000 in the blue and 7000 in the red, covering 3500-7000 Å. We typically used a RT480 beam splitter. Typical exposure times were 5 minutes per star that resulted in the median S/N of 13 and 31 for the blue and the red band, respectively. Thorium-Argon lamp frames were taken every hour to enable wavelength calibration. WiFeS spectra were reduced with a standard PyWiFeS package, updated to be better suited for stellar reductions of a large number of nights. ## Synthetic Spectra {#sec.synthetic} For computation of radial velocities and parameter estimation, we use a template grid of 1D LTE spectra that was previously described by. Briefly, spectra were computed using the TURBOSPECTRUM code (v15.1; @1998A&A...330.1109A [@2012ascl.soft05004P]) and MARCS model atmospheres. For models with \(\log\,g > 3.5\), we use \(v_{\rm mic} = 1\,{\rm km\,s^{-1}}\); for models with \(\log\,g \le 3.5\), we use \(v_{\rm mic} = 2\,{\rm km\,s^{-1}}\) and perform the radiative transfer calculations under spherical symmetry taking into account continuum scattering. The spectra are computed with a sampling step of \(1\,\)km\(\,\)s\(^{-1}\), corresponding to a resolving power \(R\sim300\,000\). We adopt the solar chemical composition and isotopic ratios from, except for an alpha enhancement that varies linearly from \(\text[\alpha / \text{Fe}] = 0\) when \(\rm [Fe/H] \ge 0\) to \(\text[\alpha/\text{Fe}] = +0.4\) when \(\rm [Fe/H] \le-1\). We use a selection of atomic lines from VALD3 together with roughly 15 million molecular lines representing 18 different molecules, the most important of which for this work are CaH (Plez, priv. comm.), MgH, and TiO. We use this grid to generate two synthetic libraries for radial velocity determination and parameter estimation. For the WiFeS spectra, we use a coarsely sampled version of this grid, broadened to \(R\sim7000\) with \(5400 \leq \lambda \leq 7000\), \(3000 \leq T_{\rm eff} \leq 8000\,\)K, \(3.0 \leq \log g \leq 5.5\), and \(-1.0 \leq\)\[Fe/H\]\(\leq 0.5\), in steps of \(100\,\)K, \(0.25\,\)dex, and \(0.25\,\)dex respectively. For the Echelle spectra, we adopted R=24,000 for \(3000 \leq T_{\rm eff} \leq 6000\,\)K, \(4 \leq \log g \leq 5\), and \[Fe/H\]=0, in steps of \(250\,\)K and \(0.5\,\)dex, respectively. Additionally, \(\log g\) for \(T_{\rm eff}<4000\,\)K was extended to 5.5. Spectra cover wavelengths from 4800 to 6700 Å. ## Radial velocities Radial velocities for datasets from both instruments were determined with the same algorithms using synthetic spectra described in the previous section. ### WiFeS Radial velocities of the WiFeS R7000 spectra were determined from a least squares minimisation of a set of synthetic template spectra varying in temperature (see Section [2.3](#sec.synthetic){reference-type="ref" reference="sec.synthetic"} for details of model grid). We use a coarsely sampled version of this grid, computed at R\(\sim7000\) over \(5400 \leq \lambda \leq 7000\) for \(3000 \leq T_{\rm eff} \leq 5500\,\)K, \(\log g = 4.5\), and \[Fe/H\]\(= 0.0\), with \(T_{\rm eff}\) steps of \(100\,\)K for radial velocity determination. Prior to computing radial velocities, we normalise both our observed and synthetic template spectra. For warmer stars without the extensive molecular bands and opacities present in cool stars, continuum regions are typically used to continuum normalise the spectrum. For observed cool star spectra however, such regions are unavailable in the optical, so we must opt for another normalisation formalism, which we term here *internally consistent normalisation*: \[f_{\rm norm} = f_{*} \times e^{\big(a_0 + \frac{a_1}{\lambda}+\frac{a_2}{\lambda^2}\big)}\] where \(f_{\rm norm}\) is the internally consistent normalised flux vector, \(\lambda\) is the corresponding wavelength vector, and \(a_0\), \(a_1\), and \(a_2\) are coefficients of a second order polynomial fitted to the logarithm of \(f_{*}\), which is either an observed flux corrected spectrum, or a synthetic template. This functional form of normalisation has chosen to be largely independent of reddening. Once generated, a given synthetic template (initially in the rest frame) can be interpolated and shifted to the science velocity frame as follows: \[f_{\rm temp,~rvs} = f_{\rm t}\big[\lambda \times \big(1-\frac{v_r-v_b}{c}\big)\big]\] where \(f_{\rm temp,~rvs}\) is the RV shifted normalised template flux, \(f_{\rm temp}\) is the template flux in the rest frame, \(v_r\) and \(v_b\) the radial and barycentric velocities respectively, and \(c\) is the speed of light. \(v_b\) is computed using the `ASTROPY` package in `PYTHON`. Given a grid of \(k\) different synthetic template spectra, the final radial velocity value is found by finding the synthetic template that best minimises: \[R(v_r) = \displaystyle\sum_{j}^{N}\bigg(\frac{{f_{\rm obs,~j}-f_{\rm temp,~rvs,~k,~j}(v_r)}}{\sigma_{{f_{\rm obs,~j}}}}\bigg)^2 M_j\] where \(R\) is the total squared residuals as a function of radial velocity offset, \(j\) is the pixel index, \(N\) the total number of spectral pixels, \(f_{\rm obs,~j}\) is the normalised observed flux at pixel \(j\), \(\sigma_{{f_{\rm obs,~j}}}\) is the uncertainty on \(f_{\rm obs,~j}\), and \(M_j\) is a masking term set to either 0 or 1 for each pixel. This step is done twice for each template spectrum, initially masking out only pixels affected by telluric contamination (H\(_2\)O: 6270-6290\(\,\) Å, and O2: 6856-6956\(\,\) Å), but then additionally masking out further pixels with high fit residuals. This second mask has the effect of excluding any pixels likely to skew the fit such as science target emission not present in the synthetic template (such as H\(\alpha\)). Least squares minimisation was done using the leastsq function from `PYTHON`'s `SCIPY` library, implemented in the `PYTHON` package `plumage`[^2]. Statistical uncertainties on this approach are on average 430\(\,\)m\(\,\)s\(^{-1}\), however per the work of we add this in quadrature with an additional 3\(\,\)km\(\,\)s\(^{-1}\) uncertainty to account for WiFeS varying on shorter timescales than our hourly arcs can account for, and effects of variable star alignment on the slitlets. Note however that we do not employ corrections based on oxygen B-band absorption, demonstrated by @2018MNRAS.480.5099K to improve precision, as such additional precision is unnecessary for this work and is difficult for cooler stars. Comparison of radial velocities for cool dwarf standard stars (e.g. from [@2015ApJ...804...64M] and [@2012ApJ...748...93R], observed with the same instrument setup as part of Rains et al. in prep) with the Gaia catalogue shows an offset of WiFeS values for-1.7 \(\mathrm{km\,s^{-1}}\) and a standard deviation of 3.2 \(\mathrm{km\,s^{-1}}\) (Figure [\[fig.rvs\]](#fig.rvs){reference-type="ref" reference="fig.rvs"}). We suspect that most of the outliers are binary stars. Some of them are confirmed by either visual inspection or significally different radial velocities in case of repeated observations while there is not enough information available to investigate the rest of the interlopers. ### Echelle The same routine was utilized for the Echelle spectra on wavelengths between 5000 and 6500 Å  using their own synthetic library described in Sec. [2.3](#sec.synthetic){reference-type="ref" reference="sec.synthetic"}. As the correction for the blaze function and flux calibration were not performed in the data reduction step, each order within the relevant wavelength range was continuum normalized with a low order polynomial. Orders were then combined together into one spectrum in the range between 5000 and 6500 Å. To match the continua of measured and synthetic libraries, fluxed model spectra were cut into wavelengths corresponding to Echelle orders, normalized and stitched back together with the same procedure. Finally, synthetic spectra were scaled to match 90th percentile of Echelle continua. All spectra were visually inspected for any major reduction issues or other sources of peculiarity. Obvious double-lined binaries were flagged and their radial velocities are not reported in this work. Binary detection is reported in a separate column in Table [\[tab.results\]](#tab.results){reference-type="ref" reference="tab.results"}. Median internal uncertainty of derived radial velocity is 0.06 \(\mathrm{km\,s^{-1}}\), but a combination of the systematic uncertainty and radial velocity jitter characteristic to young stars account for 1.5 \(\mathrm{km\,s^{-1}}\). Most of the stars have radial velocities consistent with Gaia (Figure [\[fig.rvs_echelle\]](#fig.rvs_echelle){reference-type="ref" reference="fig.rvs_echelle"}). Mean absolute deviation for stars with difference less than 10\(\mathrm{km\,s^{-1}}\) is 0.6\(\mathrm{km\,s^{-1}}\). There are a handful of outliers, and they all have large uncertainties in Gaia values. Some of those appear to be binary stars discovered either by visual inspection or large radial velocity difference in case of the repeated measurements. At the same time, a lost of such stars show high activity level (depicted by a measure of activity in calcium HK lines) that might dominate Gaia's calcium infrared triplet region used to determine radial velocities and cause systematic offsets. All Echelle stars have been visually inspected for possible peculiarity and their match with the best-fitting template. ## Reddening {#sec.reddening} The M dwarf candidates are too close to be significantly reddened (\<200 pc), but on the other hand they could remain embedded in their birth cocoons. At the same time, the sample is contaminated with hotter stars that lie in regions of more heavy extinction within the Galactic plane. To derive an estimate for the intrinsic colour index (BP-W1)\(_0\), temperatures of the best-matching templates were used as an input in the colour-temperature relation derived from the synthetic spectral library. Although Solar values were used to calibrate the zero point, a degree of uncertainties remains (increasing with colour) and the relation is only approximate. The resulting E(BP-W1) reveals a number of interlopers with temperatures higher than 4500 K. In particular, 156 WiFeS stars have E(BP-W1)\(>\)`<!-- -->`{=html}1 (20% of the entire sample). The estimated reddening E(BP-W1) is presented in Figure [\[fig.cmd\]](#fig.cmd){reference-type="ref" reference="fig.cmd"} together with the reddening vector[^3]. Most interlopers with high reddening are found in the two regions in the Galactic plane with the highest concentration of stars in our sample: the Hyades and the Scorpius-Centaurus OB2 region (Fig. [\[fig.galaxy\]](#fig.galaxy){reference-type="ref" reference="fig.galaxy"}). Further analysis revealed that these stars do not show signs of youth and are likely located behind the local dust clouds associated with star-forming regions. # Youth indicators {#sec.youth_indicators} The following subsections address the characterization of the lithium absorption line and the excess emission in H\(\alpha\) and Ca II H&K lines for stars in our sample. A combination of all three values provides a robust indicator of the stellar youth. Algorithms used to measure the strengths of lithium and H\(\alpha\) lines in this work are similar for data from both instruments WiFeS and Echelle. Excess emission in calcium is measured differently for Echelle due to low signal in the blue. All spectra, except the WiFeS calcium region, were locally normalized so that the youth features are surrounded by the continuum at 1 (and pseudo-continuum in M dwarfs). Binaries were not treated separately in this work and we provide youth indicators regardless of stars' multiplicity. All spectra were visually inspected for multiplicity and high rotation rate. We flag such cases in the final table and emphasize that this is qualitative inspection only and it is not complete. ## Lithium The primary and most reliable spectroscopic feature sensitive to the age of the pre-main sequence dwarfs in the temperature range observed in our sample is the lithium 6708 Å  line. This absorption line is observed in low-mass pre-main sequence stars before the ignition of lithium in their interiors. Since these stars appear to be fully convective before their onset on the main sequence, the depletion of lithium throughout the entire star occurs almost instantly. Lithium is observed in F, G and early K dwarfs for up to \(\sim\)`<!-- -->`{=html}100 Myr (mass dependent), but late K and early M-type dwarfs deplete lithium much faster. For further information see and references therein. Both data and theoretical predictions show that at the age between \(\sim\)`<!-- -->`{=html}15-40 Myr there is practically no lithium left in these stars. The strength of the lithium absorption lines in this work was characterized with the equivalent widths measured within 6707.8\(\pm\)`<!-- -->`{=html}1.4 Å. Our spectra were pseudo-continuum normalized with a second order polynomial between 6700 and 6711 Å. The lithium line was excluded from the continuum fit. The equivalent width was defined to be positive for lines in the absorption and was measured from the continuum level of 1. In contrast to the emission-related features superimposed on the photospheric spectrum, the lithium absorption line shows a certain degree of correlation with the stellar rotation rate, e.g.. Fast rotators found by visual inspection are flagged in the table with results. While it appears to be fairly insensitive to the chromospheric activity it might in some cases be affected by strong veiling present in the classical T Tauri stars. Veiling is an extra source of continuum that causes absorption lines to appear weaker. However, measurements of H\(\alpha\) emission described below reveal that no classical T Tauri stars are present in the sample. Figure [\[fig.youth_indicators\]](#fig.youth_indicators){reference-type="ref" reference="fig.youth_indicators"} confirms a robust correlation between all three measures of the youth. The distribution of EW(Li) shows a concentration of stars below 0.05 Å, though we only consider positive detections in stars with values above this level. Repeated observations (45 stars) show 0.02 Å  of variation between individual measurements of the same object. ## Calcium II H&K {#sec.calcium} It has long been known that atmospheric features associated with stellar activity in solar-like dwarfs anticorrelate with their age. Empirical relations derived from chromospheric activity proxies enable age estimation of stars between \(\sim\)`<!-- -->`{=html}0.6-4.5 Gyr to a precision of \(\sim\)`<!-- -->`{=html}0.2 dex. However, a combination of saturation and high variability of activity in younger stars prevents this technique yielding reliable results before the age of \(\sim\)`<!-- -->`{=html}200 Myr. Nevertheless, a detection of a strong excess emission in the calcium II H&K lines (Ca II H&K; 3968.47 and 3933.66 Å, respectively)--a proxy for chromospheric activity--helps to distinguish between active young stars and older stars with significantly lower emission rates. A commonly used measure of stellar activity in solar-type stars is S-index introduced by [@1978PASP...90..267V] and derived as \[S = \alpha \frac{N_H + N_K}{N_V + N_R},\] where \(N_H\) and \(N_K\) are the count rates in a bandpass with a width of 1.09 Å  in the center of the Ca II H and K line, respectively. To match the definition of the first measurements obtained by a spectrometer at Mount Wilson Observatory and make the measurements directly comparable, counts are adjusted to the triangular instrumental profile as described in [@1978PASP...90..267V]. \(N_V\) and \(N_R\) are the count rates in 20 Å-wide continuum bands outside the lines, centered at 3901.07 Å  and 4001.07 Å. Constant \(\alpha\) is a calibration factor that accounts for different instrument sensitivity and is derived by a comparison with literature S values. For WiFeS we provide a linear relation that converts measured S value on a scale directly comparable with the literature. For derivation see Appendix [\[sec.appendix_s\_index\]](#sec.appendix_s_index){reference-type="ref" reference="sec.appendix_s_index"}. Since \(N_V\)+\(N_R\) has a color term due to nearby continuum shape varying with temperature, and because \(N_H + N_K\) accounts for both chromospheric and photospheric contribution, it is more convenient to use the \(\mathrm{R'_{HK}}\) index (first introduced by [@1979ApJS...41...47L]) that represents a ratio between the chromospheric and bolometric flux and enables a direct comparison of activity in different stellar types. Using the conversion factor \(C_{cf}\) that describes the colour-dependent relation between the S-index and the total flux emitted in the calcium lines, and \(\mathrm{R_{phot}}\) that removes the photospheric contribution from the total flux in calcium, \(\mathrm{R'_{HK}}\) is obtained as \[\mathrm{R'_{HK} = R_{HK}-R_{phot}}\] where \(\mathrm{R_{HK}} = 1.887 \times 10^{-4} \times C_{cf} \times S\). The constant in the equation is taken from [@2017A&A...600A..13A]. [@1982A&A...107...31M] and [@1984A&A...130..353R] provide the calibration of \(C_{cf}\) and [@1984ApJ...279..763N] and [@1984ApJ...276..254H] for \(\mathrm{R_{HK}}\) for the main sequence stars, but their relations become increasingly uncertain above B-V\(>\)`<!-- -->`{=html}1.2. [@2017A&A...600A..13A] have recently extended the relation to M6 dwarfs (B-V\(\sim\)`<!-- -->`{=html}1.9) using HARPS data and calibrated the relation for colours that are more suitable for cool stars: \[\begin{aligned} \log_{10}{C_{cf}} & =-0.005c^3 + 0.071c^2-0.713c + 0.973 \\ \log_{10}{R_{phot}} & =-0.003c^3 + 0.069c^2-0.717c-3.498. \end{aligned}\] where \(c=\)V-K was determined from a low-order polynomial fit to the relation between synthetic BP-RP and V-K from [@2018MNRAS.479L.102C]. There are 26 stars in the sample with repeated observations. In general more active stars show higher variability rates. We provide a median value of 1.1\(\times 10^{-5}\) for the \(\mathrm{R'_{HK}}\) variability. Stars with low levels of activity have measured \(\log{\mathrm{R'_{HK}}}=\)-5 or lower and we consider them inactive. Activity in the Echelle spectra was evaluated in the same way as WiFeS stars. The calibration of the S-index was done using 19 stars observed with both instruments. For more details on the calibration see Appendix [\[sec.appendix_s\_index\]](#sec.appendix_s_index){reference-type="ref" reference="sec.appendix_s_index"}. The distribution of \(\log{\mathrm{R'_{HK}}}\) is known to be bimodal for the main sequence stars in the Solar neighbourhood (e.g. [@2003AJ....126.2048G]). Figure [\[fig.rhk\]](#fig.rhk){reference-type="ref" reference="fig.rhk"} shows two peaks, but they are centered at higher levels of activity due to our focus on the pre-main sequence stars. The more active peak is found at \(\sim-4\) where \(\log{\mathrm{R'_{HK}}}\) saturates for stars with rotation rates less than 10 days. According to [@2008ApJ...687.1264M], such high activity levels occur at ages of \(\sim\)`<!-- -->`{=html}10 Myr. We also plot \(\log{\mathrm{R'_{HK}}}\) versus colour (the same figure) to confirm that the colour term is minimized. There are two sets of lines that cause strong emission in this wavelength range: calcium II H&K lines and Balmer emission lines in the youngest stars. Calcium H line is in some cases strongly blended by the Balmer emission line in the WiFeS spectra but count rate was measured within 1.09 Å  (see Fig. [\[fig.wifes_calcium_balmer\]](#fig.wifes_calcium_balmer){reference-type="ref" reference="fig.wifes_calcium_balmer"}). ## Balmer series While weak and moderate excess emission rates in the H\(\alpha\) line (6562.8 Å) are associated with chromospheric activity , strong emission in the entire Balmer series, with H\(\alpha\) being especially prominent (\(>\)`<!-- -->`{=html}10 Å), is typically observed in classical T Tauri stars that are low-mass objects younger than \(\sim\)`<!-- -->`{=html}10 Myr. It is widely accepted that there is a tight correlation between the average chromospheric fluxes emitted by the Ca II H&K and H\(\alpha\) lines. Although report that this relation is more complicated, emission in H\(\alpha\) represents a robust indicator of stellar youth. Characterisation of stellar activity from the H\(\alpha\) line is especially convenient in late-type dwarfs that only present a weak photosphere in the blue where Ca II H&K are located. The equivalent width of H\(\alpha\) lines was measured between 6555 and 6567 Å  relative to the continuum, e.g. (1 - flux) in the H\(\alpha\) region. Negative values thus indicate absorption while positive values denote emission above the continuum. Interpretation of these results is not straightforward due to a wide range of the H\(\alpha\) line profiles being strongly affected not only by the temperature but also the surface gravity. However, most of the stars show strong emission that is in any case an indicator for extreme stellar youth. We make a conservative estimate and only treat spectra with EW(Ha)\(>\)-0.5 Å  as active (see Fig. [\[fig.wifes_calcium_balmer\]](#fig.wifes_calcium_balmer){reference-type="ref" reference="fig.wifes_calcium_balmer"}). Repeated observations of 45 stars reveal a typical difference between the maximal and minimal EW(Ha) value of 0.2 Å. This uncertainty might also include a variability component of stellar activity. Based on equivalent widths of H\(\alpha\), most of the stars with excess emission belong to either weak (EW(Ha)\(<\)`<!-- -->`{=html}5 Å) or post-T Tauri stars. One third of the entire sample shows emission in the entire Balmer series. Column `Balmer` in Table [\[tab.results\]](#tab.results){reference-type="ref" reference="tab.results"} lists objects with clear Balmer emission that was detected by visual inspection. # Discussion {#sec.discussion} A combination of the three complementary youth features--excess emission in Ca II H&K and H\(\alpha\) associated with magnetic fields active but declining for billions of years, and lithium absorption line present for a few 10 Myr in late K and early M dwarfs--maximises the estimated age range and the robustness of our young star identification. This work uncovered 549 sources with at least one of the three indicators above the detection limit: EW(Li)\(>\)`<!-- -->`{=html}0.1 Å  or EW(Ha)\(>\)-0.5 Å  or \(\log{\mathrm{R'_{HK}}}>-4.75\). The strategy is thus 70% successful. In particular, there are 281 stars with all three indicators above the detection limit. There are 346 stars with a detectable lithium line (44%), 479 with \(\mathrm{EW(H}\alpha)>-0.5\) (60% of the sample) and 464 objects (60%) with a detectable calcium emission. Not surprisingly, there are 409 stars that show both calcium and H\(\alpha\) youth features, as these two indicators are well correlated due to their common origin in chromospheric activity. The lithium absorption line undergoes a different mechanism (lithium depletion in the pre-main sequence phase) and is much more short-lived. This causes an overdensity of chromospherically active stars with high H\(\alpha\) but no lithium left (Fig. [\[fig.youth_indicators\]](#fig.youth_indicators){reference-type="ref" reference="fig.youth_indicators"}). There are 10 stars in the sample that display lithium absorption but show no chromospheric activity. The figure also shows that all stars with strong lithium emit excess flux in their chromospheres. This explains the void in the bottom right part of this figure. Note that a small subset of individual stars only has one or two youth indicators measured due to noise in the respective spectral regions. All youth indicators, radial velocities and flags denoting Balmer emission, binarity and fast rotation are listed in Table [\[tab.results\]](#tab.results){reference-type="ref" reference="tab.results"}, together with their 2MASS identifiers. Even though our selection avoided known young stars, we cross-matched our catalogue with the literature. We found 15 stars in common with the list of association members described by and 6 from. We found 9 objects from our list in the work by measuring lithium lines of \(\sim\)`<!-- -->`{=html}400 objects, and 3 overlapping stars with [@2015MNRAS.448.2737R] who targeted stars from Upper Scorpius that were mostly fainter than our magnitude limit. In total, 33 unique objects out of 766 from our list (4%) are known association members or have lithium measured in the literature, and the rest are considered new detections. The occurrence rate for all youth features is color dependent (Fig. [\[fig.strategy_success\]](#fig.strategy_success){reference-type="ref" reference="fig.strategy_success"}). Cooler stars in general more likely show signs of youth. Due to their slower evolution they spend more time above the main sequence and display signs of their youth much longer. However, we observe a drop in the occurrence rate of the lithium line in M dwarfs. This is because they deplete lithium the fastest and soon fall below the detection limit. Lithium isochrones enable age estimation for late K and early M dwarfs younger than 15-40 Myr. We follow and take indicative non-LTE equivalent widths from for Solar metallicity and \(\log{g} = 4.5\). We combine them with the models of lithium depletion (assuming the initial absolute abundance of 3.26 from [@2009ARA&A..47..481A]) to compute lithium isochrones (Fig. [\[fig.isochrones\]](#fig.isochrones){reference-type="ref" reference="fig.isochrones"}). Lines indicating abundances in the plot show that EW(Li) in our temperature range practically traces any amount of lithium left in the atmosphere. There appears to be an overdensity of 278 objects above EW(Li)\(>\)`<!-- -->`{=html}0.3 Å  corresponding to the ages of 15 Myr and younger. Moreover, there are 325 stars lying above the 20 Myr isochrone and the 0.1 Å  detection limit. Figure [\[fig.youth_indicators\]](#fig.youth_indicators){reference-type="ref" reference="fig.youth_indicators"} confirms that stars with the strongest lithium have the highest \(\log{\mathrm{R'_{HK}}}\) values of-4 which corresponds to \(\sim\)`<!-- -->`{=html}10 Myr according to the [@2008ApJ...687.1264M] activity-age relation. These objects likely belong to the Scorpius-Centaurus association--especially because their \((l,b)\) location overlaps with this region in the sky. However, further kinematic analysis is needed to confirm their membership. Since our selection encompass all stars above the main sequence, the sample is contaminated with stars with bad astrometric solutions. 45% of our observed objects have *re-normalised unit weight error* (the `RUWE` parameter from the Gaia DR2 tables describing the goodness of fit to the astrometric observations for a single star) greater than 1.4. Gaia DR2 documentation suggests that such stars either have a companion or their astrometric solution is problematic. There is no detectable lithium left in these stars and they appear to be old in our context with low or zero emission in calcium and H\(\alpha\). When stars with `ruwe`\(>\)`<!-- -->`{=html}1.4 and high reddening are removed from our catalog, 80% of stars left show at least one spectroscopic sign of stellar youth. This suggests a high efficiency in selection of young stars from the Gaia catalog based on their overluminosity and a reliable astrometric single star solution. # Conclusions {#sec.conclusions} We selected and observed 766 overluminous late K and early M dwarfs with at least 1 magnitude above the main sequence and with Gaia G magnitude between 12.5 and 14.5. The kinematic cut was wide enough to avoid a bias towards higher-mass stars and include low-mass dwarfs. Observations were carried out over 64 nights with the Echelle and Wide Field Spectrographs at the ANU 2.3m telescope in Siding Spring observatory. The analysis revealed 544 stars with at least one feature of stellar youth, i.e. the lithium absorption line or excess emission in H\(\alpha\) or calcium H&K lines. The strength of the lithium absorption line indicates that 349 stars are younger than 25 Myr. This sample significantly expands the census of nearby young stars and adds 512 new young stars to the list. Only 33 out of 544 objects with at least one youth indicator are listed in external catalogs of young stars. For example, [@2018ApJ...856...23G] characterised known nearby associations and provided a list of 1400 young stars from a wide variety of sources. Our catalog has only 15 stars in common with theirs and thus expands the sample by 35%. Although a further kinematic analysis is needed to confirm their membership, it is likely that a great fraction of stars from our sample belong to the Scorpius-Centaurus association because they are found in that direction in the sky and all have lithium ages \(<\)`<!-- -->`{=html}20 Myr. However, we only find 3 stars in common with [@2015MNRAS.448.2737R] who kinematically and photometrically selected and observed mostly fainter stars in Upper-Scorpius. Strong lithium absorption lines and excess emission in calcium in these objects consistently indicate likely stellar ages of roughly 10 Myr, according to the activity--age relation and lithium isochrones (see Fig. [\[fig.isochrones\]](#fig.isochrones){reference-type="ref" reference="fig.isochrones"}). The latter reveal 325 stars with \(\mathrm{EW(Li)>0.1}\) Å  and above the 20 Myr isochrone. We report on a high success rate in search for young stars by selecting overluminous objects in the Gaia catalog. After stars with unreliable astrometry (\(\mathrm{ruwe}>1.4\) that indicates bad astrometry or multiplicity) and high reddening are removed, the success rate is 80%. Radial velocities are determined for spectra from both instruments, with average uncertainties of 3.2 \(\mathrm{km\,s^{-1}}\) for WiFeS and 1.5 \(\mathrm{km\,s^{-1}}\) for Echelle stars. This catalog of nearby young stars now has all kinematic measurements available to improve the analysis of young associations and help to find their birthplace. For example, [@2020MNRAS.499.5623Q] have recently shown that stellar associations come from different places in the Galaxy. Follow up work may include e.g. using Chronostar to provide kinematic ages, robust membership estimates and orbital models of young associations to infer the origins of this sample, as well as the extraction and analysis of rotational periods using TESS to obtain ages using gyrochronology where possible.
{'timestamp': '2020-12-17T02:10:20', 'yymm': '2012', 'arxiv_id': '2012.08756', 'language': 'en', 'url': 'https://arxiv.org/abs/2012.08756'}
null
null
null
null
# Introduction ## Astrophysical background Nearly all astrophysical objects, ranging from planets, accretion disks, stars and galaxies to the intergalactic medium, host magnetic fields coherent over the largest scales of the system. At the same time, the matter in which the magnetic fields originate, is in a vigorously turbulent state, and often the driving scale of the turbulence is at small or intermediate scales with respect to the system scale . Hence, a theoretical explanation of how these objects can sustain large-scale magnetic fields, driven by small-scale turbulence, is required. One such theoretical framework is the theory of \(\alpha \Omega\) dynamos, where helical turbulence together with large-scale non-uniformities in the rotation profile excite magnetic field at the largest scales. Here, kinetic helicity is thought to arise from stratification and rotation. Large-scale dynamos (hereafter LSD) do not necessarily need rotational non-uniformities, but can also work solely based on helical turbulence, then denoted as \(\alpha^2\) dynamos . As the \(\alpha\) effect is such a fundamental building block of LSDs, studying it in isolation has been a persistent task. Many details and questions, however, still remain open, especially at vigorously turbulent regimes, which to reach numerical models still struggle. Another dynamo instability, namely the fluctuation dynamo (or small-scale dynamo, hereafter SSD) is excited in astrophysical flows for magnetic Reynolds numbers (\(\mathrm{Re}_\mathrm{M}\)) exceeding a threshold value, which is thought to happen in most astrophysical settings . SSD generates random magnetic fields primarily below the scales of the forcing, and their growth rate is high, providing a plausible explanation for magnetic fields in galaxy clusters, or fluctuating fields seen on the solar surface. The latter, however, remains under some debate, as SSD in a low magnetic Prandtl number (\(\mathrm{Pr}_\mathrm{M}\)) environment like the Sun is notoriously hard to excite in numerical experiments. In nearly all astrophysical objects, LSD and SSD instabilities may co-exist. Their interactions, however, are poorly understood, mainly because it is very challenging numerically to include them both in one and the same model, and only quite recently, such modelling efforts have become feasible. Also, whenever turbulent enough regimes can be reached, it becomes very difficult to disentangle the two dynamos, as also LSD produces fluctuating magnetic fields by turbulent tangling of the large-scale field. One of the earliest theoretical scenarios was catastrophic quenching of the LSD by the growing magnetic fluctuations, resulting in the suppression of the \(\alpha\) effect proportional to \({\mathrm{Re}_\mathrm{M}}^{-1}\), meaning in practise that no \(\alpha\)-effect related LSD could be excited in astrophysical objects. This is now understood to be a special case, detrimentally constrained by magnetic helicity conservation, e.g. due to closed boundaries, such that helicity fluxes cannot occur. How these fluxes, which alleviate catastrophic quenching, occur in cosmic objects, however, is not known in detail. It has also been proposed that SSD can help LSD in shear dynamos in the absence of the \(\alpha\) effect, through the so-called magnetic shear-current effect, but its potential still remains debated . claimed that, in simulations of turbulent magnetoconvection, the SSD would first suppress LSD at intermediate \(\mathrm{Re}_\mathrm{M}\), but would let it recover at higher \(\mathrm{Re}_\mathrm{M}\). This result was based on measuring the strength of the large--scale field at a few \(\mathrm{Re}_\mathrm{M}\) values, but the diffusion scheme was changed in between the different runs, due to which a straightforward interpretation is difficult. Many numerical studies have been undertaken concentrating on LSDs by helical forcing or SSDs by non-helical forcing, in the former case also including unintentionally or intentionally both dynamos. demonstrated how helically driven turbulence could give rise to large-scale structures based on non-local interactions at the forcing scale. Their simulations employed isotropically driven forced turbulence with various resolutions and Reynolds numbers, to systematically demonstrate the inverse cascade of MHD-turbulence. In some of these runs both LSD and SSD were present, but even though the evolution of mean and fluctuating fields was monitored separately, no attempt to study the LSD-SSD interactions was made. In the galactic context, studied supernova-driven flows, where the magnetic Reynolds number again permitted both dynamos together. They made an attempt to separate the growth rates of SSD and LSD by using a Gaussian smoothing procedure, but their setup was too complex to derive any reliable information on the two dynamo processes. Moreover, their viscosity scheme allowed for a spatially varying \(\mathrm{Pr}_\mathrm{M}\), hence the excitation conditions for the different dynamos were more favourable in regions with hot gas, in which most likely, most of the SSD action occurred. Both dynamos together have also been seen in turbulent convection simulations, and there different growth rates were detected for mean and fluctuating magnetic fields, following a \(\mathrm{Re}_\mathrm{M}^{1/2}\) scaling. compare the results from several studies of helically and non-helically forced turbulence models, and show that the growth rate of the SSD is following the same scaling. Moreover, in helical system possessing both dynamos, the same growth rate is observed. Their data, however, is sparse, hence the \(\mathrm{Re}_\mathrm{M}\)-dependence not very certain. There is a rich literature on SSDs, studied in isolation in non-helical setups. Most of it concentrates either on high \(\mathrm{Pr}_\mathrm{M}\), relevant for ISM and intergalactic medium, or low \(\mathrm{Pr}_\mathrm{M}\), important for accretion disks and stellar convection zones. Both regimes are numerically extremely challenging, as the magnetic diffusivity has to be set to values much lower/higher than viscosity, and resolving such systems numerically is difficult. Here we avoid these complications by concentrating on the regime \(\mathrm{Pr}_\mathrm{M}=1\) and make an effort to analyze the interaction of LDS and SSD. The objective of this study is twofold. First, we aim at replicating the work of, and then at exploring a wider range of resolution and \(\mathrm{Re}_\mathrm{M}\). Second, we provide the first physical application of the multi-GPU magnetohydrodynamics code *Astaroth* which features novel methods for efficiently calculating high-order finite-difference derivatives, based on large stencils. ## Emergence of GPU computation {#sec:acbg} In the last ten years, the emergence of graphics processing units (GPUs) has enabled several times higher throughput in data-parallel tasks, compared with central processing units (CPUs) traditionally used in high-performance computing[^1]. GPUs excel in tasks, where the same operation can be executed on a very high number of data elements in parallel. In contrast to CPUs, GPUs have been designed to maximize the throughput of memory systems with the cost of higher memory access latency . Therefore, ensuring there is a sufficient amount of parallel work to hide latencies is critical for obtaining high performance. GPUs provide an attractive platform for stencil codes, where each grid point in the problem domain can be updated in parallel. Stencil codes are commonly used in, for example, finite-difference fluid simulations  and image processing . However, following the multi-core revolution and the introduction of highly-parallel accelerators to general-purpose computing, converting existing codes to use all of the capabilities of the hardware has been a significant challenge . Writing efficient programs for these architectures often requires deep knowledge in their hardware and execution models. GPUs are programmed using the stream programming model, where the programmer defines a stream of instructions to be executed in parallel on a multitude of stream processors. Each individual stream can access data from different memory locations or follow different execution paths. A notable complication in GPU programming is finding efficient caching techniques to reduce pressure onto off-chip memory. As GPUs are capable of high arithmetic throughput, it is paramount to ensure that the stream processors do not become starved of data. This is especially an issue in high-order finite-difference codes, where the ratio of arithmetic operations to bytes transferred is generally low. Because the optimal caching technique depends on several factors, such as the problem size and stencil shape, the optimal implementation for one workload does usually not carry to another. This presents a major obstacle in studying physical phenomena, or developing new mathematical models by GPUs, as a significant amount of time must be spent on writing, debugging and optimizing the code. There have been several proposals to make GPU programming more convenient, e.g. high-level language extensions, such as *OpenACC* . However, high-level programming models are argued to lack the expressiveness to translate more complex tasks, especially those that require advanced caching techniques, into efficient code . More specialized approaches have also been suggested. Frameworks focusing on solving PDEs in structured grids include *SBLOCK* , *Fargo3D*  and *Cactus* . Alternative approaches focused on achieving near hand-tuned performance and performance-portability have been demonstrated by *Lift*  and *Delite* . *Lift* translates high-level algorithmic primitives into lower-level code based on rewrite rules, while *Delite* provides an intermediate language, which can be used as a basis for building domain-specific languages (DSLs). Yet another approach is to provide a compiler for generating efficient code from sources written in a DSL. For example, *Polymage*  and *Halide*  provide a DSL and a compiler for generating two-dimensional image processing pipelines. In contrast to the above approaches, *Astaroth* has been tailored for high-order stencil computations with special consideration of caching coupled fields commonly found in multiphysics simulations, such as velocity coupled with magnetic field in MHD induction equation (See Equation [\[eq:magnetic\]](#eq:magnetic){reference-type="ref" reference="eq:magnetic"}). By caching the results of intermediate stencil operations, traffic to main memory is reduced significantly when these intermediate results are used to update multiple fields. In previous work, we have presented the *Astaroth* library . In the case of this study, we have extended it to work on multiple GPUs and utilized it to simulate resistive MHD turbulence and the emergence of dynamos. Inter-GPU communication is carried out using peer-to-peer memory copy functions provided by the CUDA API. However, as these functions do not support inter-node transfers, our implementation is limited to computations within a single node. An implementation for multiple nodes is the subject of ongoing work. # Core methods {#sec:astaroth} In this study, we use the model of magnetohydrodynamics to examine the growth of small-and large-scale dynamos (SSD and LSD respectively). Hence, the systems examined are essentially non-linear. To excite a dynamo, turbulence is a highly suitable (but not necessary) ingredient. Some properties of dynamo-capable systems can be described qualitatively: In a small-scale dynamo, the magnetic field grows through cascading turbulence and the resulting entanglements, at scales smaller than the turbulence driving scale. In such a situation merely sufficiently high magnetic Reynolds numbers are required. In a large-scale dynamo, turbulent helical flows result in growth of magnetic field at scales larger than the flow scales, in the extreme at the largest scales possible. To understand LSD action, often the perspective of mean-field theory is taken which is discussed more closely in Section [5.4](#sec:soca){reference-type="ref" reference="sec:soca"}. Because the dynamo processes are non-linear, exploring them requires direct numerical simulations (DNS). They can mimic laboratory experiments by studying how the systems react to changing parameters. For such DNS, codes are required which can support two central features. The first is resistive MHD, as a dynamo is commonly supposed to be impossible under ideal-MHD conditions because magnetic reconnections are thought to be a necessary part of the self-amplification of the magnetic field. The second important feature is a high-order numerical PDE solver to effectively minimize uncontrolled numerical diffusion and to resolve the fine structure of turbulence with high accuracy. There are many openly accessible codes which meet these requirements, such as the *Pencil Code* . However, the Pencil Code works presently only with traditional CPU-parallelism via MPI communication. GPU acceleration can significantly reduce the computational costs, and here we demonstrate the use of the GPU code *Astaroth* with similar properties as the *Pencil Code*. *Astaroth* is a software library developed for accelerating stencil computations especially in high-order accurate simulations. In such tasks, *Astaroth* has been shown to to provide higher throughput and energy-efficiency than CPU-based solvers . The *Astaroth* library consists of an application-programming interface (API), a domain-specific language (DSL), an optimizing compiler that performs source-to-source translation from DSL sources to CUDA kernels, and a toolbox for carrying out common tasks, such as executing reductions on GPUs. However, this study uses *Astaroth* in a more specific way. The *Astaroth* API is surrounded by supplementary code, like tools for purposes of input and output, testing, interfacing, data analysis and data processing. These additions allow *Astaroth* to be used as a self-sufficient MHD code. As a self-sufficient MHD code, *Astaroth* has following properties, in addition to the general features provided by the library: - Physics (with DSL) - Continuity equation. - Momentum equations, with full description of viscosity. - Resistive induction equation. - Energy equation in terms of entropy and ideal gas equation of state. (Not used in this study.) - Isotropic random forcing. - Numerical methods - 6th-order finite difference scheme for calculating derivatives. - 3rd-order 2N-Runge-Kutta time integration. - Auxiliary tools - Simulation suite for running DNS, which handles the tasks required on the CPU host side. - Autotest suite to check coherence between GPU and CPU operations. - Limited live rendering features for testing and demonstration purposes. - Python toolbox for data post-processing, visualization and analysis. What is novel about *Astaroth*, is the versatile GPU implementation. Because *Astaroth* can be directed using the Domain Specific Language (DSL), it is flexible with adding new physics operations additionally to the ones that exist without making demanding case-by-case implementations on the level of CUDA. In the following Section [3](#sec:multigpu){reference-type="ref" reference="sec:multigpu"}, we will discuss GPU implementation aspect of this work before returning to the physical problem (Sections [4](#sec:physics){reference-type="ref" reference="sec:physics"} and [5](#sec:results){reference-type="ref" reference="sec:results"}). *Astaroth* outputs time series and binary datacubes, which were reduced, Fourier transformed, imaged and fitted with *Python* using tools from the *SciPy*, *NumPy* and *Matplotlib* packages. Our analysis resulted in several values from performed post-processing, and for this, the *Pandas* tool proved to be useful. *Pandas* made it possible to store results from several post-processing routines into an extended table. This table could then be accessed to organize and cross-reference our results with relative ease. *Paraview* was utilized for 3D visualization. # Multi-GPU implementation {#sec:multigpu} Next, we describe our approach of distributing the workload to multiple GPUs on a single computational node. ## Terminology {#sec:terminology} The finite-difference method belongs to the class of stencil schemes, where data values assigned to points in a structured grid are updated by sampling the neighborhood of each grid point according to a specific pattern, called a *stencil*, see Figure [\[fig:stencils\]](#fig:stencils){reference-type="ref" reference="fig:stencils"}. The radius of a symmetric stencil is denoted as \(r\), which is the Chebyshev distance in grid indices from the center point to the furthest points of the stencil. We use the term \(k\)th-order stencil for a stencil used to calculate derivatives with \(k\)th-order accurate finite differences. The number of grid points in the computational domain is denoted by the triple \(\mathbf{N} = (N_x, N_y, N_z)\). In this work, we split the grid along the \(z\)-axis for \(p\) devices such that the size of the computational domain, local to each device is \(\mathbf{n} = (n_x, n_y, n_z) = (N_x, N_y, N_z / p)\). We use the term *device* to refer to a GPU controlled by a *host* CPU. Some stencil points, required for updating grid points near its boundaries, fall outside the local computational domain. The entirety of those points is called the halo. The total size of the grid, including the halo, is therefore \(\mathbf{m} = (n_x + 2r, n_y + 2r, n_z + 2r)\). For \(p >= 2\), some of the halo points map to the computational domain of a neighboring device. The data values at these points must be communicated between the contributing devices after each update step. The structure of the grid is visualized in Figure [\[fig:halo\]](#fig:halo){reference-type="ref" reference="fig:halo"}. To make a distinction between the halo and the area which is subject to boundary conditions (BCs), we call the latter the ghost zone. The ghost zone exists for all devices assigned to the boundaries of the global computational domain. Our discussion here focuses specifically on communicating non-ghost-zone halos between neighboring devices, which we refer to as halo exchange. Halo exchange can be easily adapted to support periodic BCs by wrapping ghost zones around the global computational domain instead of excluding them from communication. Other BCs may require an additional communication step to update the ghost zone. These are left out of scope. ## Astaroth domain-specific language {#sec:DSL} The *Astaroth* domain-specific language (DSL) is a stream programming language designed to facilitate the writing of stencil kernels for GPUs. It provides an abstraction level similar to graphics shading languages, such as GLSL . The syntax is an extended subset of C-like languages, providing basic datatypes, operators and tools for control flow, and extending the syntax by adding stream programming constructs and, for example, function type qualifiers for specifying reusable data. Precision of real numbers is not specified by the DSL, but instead passed as a compilation parameter when building the *Astaroth* executable. In previous work, we made three assumptions when designing our DSL. Firstly, we assumed that computations are carried out on a structured grid. Secondly, we assumed that each grid point is updated using the same memory access pattern. Finally, we assumed that the result of intermediate operations can be cached and used multiple times when updating a grid point. This assumption is the most significant one in terms of performance, as it avoids the repetition of expensive intermediate operations which involve reading from slow off-chip memory. In our case, for example, the current density can be reused to update velocity and entropy. *Astaroth* provides a source-to-source compiler for generating efficient CUDA kernels from functions written in the DSL. In addition to optimizations applied during code generation, an automatic optimization is performed at runtime to find the most efficient problem decomposition for the given problem size and hardware. For this work, we have written the integration kernel used for the MHD simulations solely with the DSL. For further discussion on its syntax and implementation details, we refer the reader to . ## Domain decomposition In this work, we decompose the computational domain along a single axis before distributing the subdomains to multiple GPUs. The major benefit of this approach is, that it is simple to implement, while providing sufficiently efficient scaling within a single node. The main drawback is, that one-dimensional decomposition is not suitable for large-scale applications, due to the fact that the size of the exchanged halo decreases at a much slower rate as a function of the number of devices compared with multi-dimensional decomposition schemes. The benefits of the latter for high-order stencil codes will be discussed in more detail in upcoming work. ## Functions and data dependencies In order to hide communication latency, it is critical to carry out computations in parallel with communication. For this, the computational domain must be divided into inner and outer subdomains. The inner computational domain consists of the grid points which can be updated without sampling points in the halo, hence the update can be carried out in parallel with halo exchange. The outer computational domain is formed by the remaining points which can only be updated if the data in the halos is up-to-date. The CUDA API provides concurrency primitives, called streams, which can be used to achieve parallel execution of asynchronous kernels and memory transfers. We use two buffers for storing the state of the system in order to avoid data races. During integration, we read the data from an input buffer and store the result in a separate output buffer. The buffers are swapped after each substep. A single simulation step comprises the execution of the following functions. Here we use the term *local* to refer to computations or memory operations which do not require halo exchange. The term *global* is used for operations depending on non-local data. - **Local boundary transfer**. Update the portion of the halo, which depends exclusively on data resident in the local memory system according to the BCs. - **Local update**. Advance the state of the points in the inner computational domain in time. - **Halo exchange**. Exchange a portion of the halos between neighboring devices. - **Global update**. Advance the state of the points in the outer computational domain in time. - **Buffer swap**. Swap the input and output buffers in preparation for the next substep. - **Barrier synchronization**. Synchronize the execution state of all devices. The dependencies between these functions and their execution order are visualized in Figure [\[fig:concurrency\]](#fig:concurrency){reference-type="ref" reference="fig:concurrency"}. Performance enhancements provided by this implementation are listed in Appendix [\[sec:performance\]](#sec:performance){reference-type="ref" reference="sec:performance"}. = \[rectangle, minimum width = 3cm, minimum height = 1cm, align = center, draw\] = \[draw,-latex'\] # Magnetohydrodynamical model {#sec:physics} We used the continuity, momentum and induction equations of isothermal resistive MHD, corresponding with: \[\label{eq:continuity} \frac{D \ln\rho}{D t} =-\nabla \cdot \mathbf{u}\] \[\label{eq:navierstokes} \begin{split} \frac{D \mathbf{u}}{D t} = &-c_s^2 \nabla \ln\rho + \frac{\mathbf{j} \times \mathbf{B}}{\rho} \\ & +\nu \bigg[ \nabla^2\mathbf{u} + \frac{1}{3}\nabla(\nabla \cdot \mathbf{u}) + 2 \mathbf{S} \cdot \nabla \ln \rho \bigg] + \mathbf{f} \end{split}\] \[\label{eq:magnetic} \frac{\partial \mathbf{A}}{\partial t} = \mathbf{u} \times \mathbf{B} + \eta \nabla^2 \mathbf{A},\] where, \(\rho\) is density, \(\mathbf{u}\) is velocity, \(\mathbf{A}\) is the magnetic vector potential with \(\mathbf{B} = \nabla\times\mathbf{A}\) being the magnetic field, \(\mathbf{j} = \nabla\times\mathbf{B}/\mu_0\) is the current density, \(\mathbf{S}\) is the traceless rate-of-strain tensor and \(\mathbf{f}\) is an external forcing. Of constants, \(c_s\) is the isothermal speed of sound, \(\mu_0\) the magnetic vacuum permeability, \(\nu\) the kinematic viscosity and \(\eta\) the ohmic diffusivity. Note the use of the *diffusive gauge* in for enhanced numerical stability. In the continuity we have used the high-order upwinding method of to enhance numerical stability. We included a forcing function similar to the one in Pencil Code to generate turbulence. It can be described as, \[\label{eq:forcing} \mathbf{f}(\mathbf{x},t) = \mathrm{Re}\bigg\{ N \mathbf{f}_{\mathbf{k}(t)} \exp{\big[i \mathbf{k}(t)\cdot \mathbf{x} + i \phi(t)}\big] \bigg\}.\] Here \(\textbf{k}(t) = (k_x, k_y, k_z)\) is a wave vector that changes randomly in each time step, \(\textbf{x}\) is a position on the grid and \(\phi(t)\) is a random phase in range \([-\pi, \pi]\). The normalization factor is set as \[\label{eq:fnorm} N = f_0 c_s \sqrt{\frac{k c_s}{\delta t}},\] where \(k = |\mathbf{k}|\) and \(f_0\) is a scaling factor. For each given time step we randomly generate vectors where \(4.5\le|k|\le 5.5\), such that \(k_x\), \(k_y\) and \(k_z\) are integers. We determine eigenfunctions of the curl operator as \[\label{eq:feigen} \mathbf{f}_\mathbf{k} = \frac{\mathbf{k} \times (\mathbf{k} \times \mathbf{\hat{e}})-i \sigma |\mathbf{k}|(\mathbf{k} \times \mathbf{\hat{e}})}{\sqrt{1 + \sigma^2} \mathbf{k}^2 \sqrt{1-(\mathbf{k}\cdot\mathbf{\hat{e}})^2/\mathbf{k}^2}},\] where \(\mathbf{\hat{e}}\) is a random unit vector perpendicular to \(\mathbf{k}\). The forcing function is almost identical to the one presented in. However, the factor \(\sigma \in [0, 1]\) is included to control the degree of helicity, so that with \(\sigma = 1\) we get \(\sqrt{2}\) instead of \(2\) of in the denominator of . Therefore, to match the normalizations, we have set \(f_0 = 0.08\) instead of \(f_0 = 0.1\) in our models. For the numerical domain we have adopted the size \(L_{x,y,z} = 2\pi\) so that the smallest wave number in the domain is \(k_1 = 1\), hence the unit length of \(\mathbf{x}\) was set to unity. We set the unit of velocity \(\mathbf{u}\) to be \(c_s = 1\), and the unit of density \(\rho\) to \(\rho(\mathbf{x},0)=\rho_0 = 1\), where \(\rho_0\) is the uniform initial density. For the magnetic field \(\mathbf{B}\) we choose a unit system in which \(\mu_0=1\) and hence set its unit as \(\sqrt{\mu_0\rho_0} c_s = 1\). Therefore the units are equivalent to the ones in. For describing the results, the nondimensional kinetic and magnetic Reynolds numbers, \[\label{eq:reynolds} \mathrm{Re} = \frac{u_\mathrm{rms}}{\nu k_\mathrm{f}} \quad \mathrm{and} \quad \mathrm{Re}_\mathrm{M} = \frac{u_\mathrm{rms}}{\eta k_\mathrm{f}}\] respectively, are useful. Here \(k_\mathrm{f}\) is the average wave number of the forcing function and \(u_\mathrm{rms}\) is the root mean square of the velocity. For the Reynolds numbers presented, we have used measures of \(u_\mathrm{rms}\) at the growth stage of dynamo, hereafter \(u_\mathrm{rms,0}\). In most of our simulations, \(k_\mathrm{f} = 5\) while a few have \(\kf=15\), and we keep the magnetic Prandtl number \(\mathrm{Pr}_\mathrm{M}=\nu/\eta\) at unity. Tables [\[tab:param_LSD\]](#tab:param_LSD){reference-type="ref" reference="tab:param_LSD"} and [\[tab:param_SSD\]](#tab:param_SSD){reference-type="ref" reference="tab:param_SSD"} list our helical and non-helical turbulence simulation setups. We run our forcing function with both full helicity (\(\sigma = 1\)) and without helicity (\(\sigma = 0\)). This allows us to compare effects which are either due to LSD or SSD. We started our simulations with uniform density, zero velocity and a weak Gaussian random magnetic field, which was \(\delta\)-correlated in space, as a seed field. We also run our models with multiple resolutions to monitor convergence. Apart from the forcing helicity, the other physical parameters varied were \(\nu=\eta\). At the high end, they correspond to the ones featured in. At the low end however, the limit for \(\nu\) and \(\eta\) and therefore \(\mathrm{Re}_\mathrm{M}\) is set by the maximum available resolution, limited by the available total GPU memory in a computational node. A single node with 4 Tesla P100 devices was able to support \(512^3\) grid resolution at maximum. A significant part of the analysis was dependent on global averages calculated during runtime, and the reduction method required a computational domain resolution with \(2^n\) grid points. The version of *Astaroth* used for this work did not yet provide support for multiple nodes, which would have overcome this issue. The runs with insufficient resolution tended to crash very early. However, those that kept stable after beginning would keep stable until the end. We avoided using \(512^3\) resolution unless necessary to save hard drive space in the computing cluster and for avoiding unnecessary post-processing time. In addition we set \(t_\mathrm{max} = 2000\) instead of \(4000\) for \(512^3\), which might affect our estimates related to the saturation stage. In addition, we run a smaller set of runs to \(t_\mathrm{max} = 600\) and a short snapshot interval to perform some more advanced analysis at the exponential growth stage. During the growth stage, we fit an exponential function to estimate the growth rate \(\lambda\) or \(\lambda_k\) of our models \[B_\mathrm{rms} \propto \exp{(\lambda t)} \quad \mathrm{or} \quad E_{B, k} \propto \exp{(2\lambda_k t)},\] depending on whether we estimate the growth rate of a global average (like the rms value) or of a spectral channel of \(\mathbf{B}\), \(E_{B, k}= B_k^2/2\mu_0\), where \(k\) is the wavenumber of the channel. The factor of 2 is required for both \(\lambda\) or \(\lambda_k\) to agree. Error estimates are based on Equation (10) of. For \(\lambda\) we set the time ranges for the fitting by hand, whereas for \(\lambda_k\) we find them by fitting in multiple ranges and picking the range with smallest error. Effectively the fitting errors are negligible, but \(\lambda_k\) can have some uncertainties due to automatically picked time ranges. In Section [5.4](#sec:soca){reference-type="ref" reference="sec:soca"} we show results for \(\lambda\) based on estimated mean-field turbulent transfer coefficients. # Results {#sec:results} The time development of the runs with helical forcing (see Table [\[tab:param_LSD\]](#tab:param_LSD){reference-type="ref" reference="tab:param_LSD"}; Figures [\[fig:3deta1em3\]](#fig:3deta1em3){reference-type="ref" reference="fig:3deta1em3"}, [\[fig:3deta25em4\]](#fig:3deta25em4){reference-type="ref" reference="fig:3deta25em4"} and [\[fig:timeseries\]](#fig:timeseries){reference-type="ref" reference="fig:timeseries"}) exhibits three stages: initial decay, exponential growth, and possible slow growth leading to saturation. The initial transient growth of the velocity field, and the contemporary decay of the initial magnetic field, are short for all runs. It is followed by saturation of the rms velocity and exponential growth of the magnetic field. The growing magnetic field starts eventually to quench the velocity, when their energy densities become comparable. The rms velocities then saturate at lower levels, the quenching being the strongest and taking place most slowly the lower \(\mathrm{Re}_\mathrm{M}\) is. The rms velocities used for calculated \(\mathrm{Re}_\mathrm{M}\) have been measured from the saturated values before quenching starts. Magnetic field values presented in the figures have been normalized with the equipartition magnetic field \(B_\mathrm{eq} = \sqrt{\mu_0\rho_0} u_\mathrm{rms,0}\). For helical forcing, the dynamo will always exhibit a large-scale (\(k=1\)) magnetic field. If there is no simultaneous SSD operating, this field is well visible during exponential growth and saturation, otherwise it is fully emerging only during the saturated stage, with weak signatures during exponential growth. Typical field geometries are shown in Figures [\[fig:3deta1em3\]](#fig:3deta1em3){reference-type="ref" reference="fig:3deta1em3"} and [\[fig:3deta25em4\]](#fig:3deta25em4){reference-type="ref" reference="fig:3deta25em4"} for low and high \(\mathrm{Re}_\mathrm{M}\), respectively. The presence of LSD is expected because in the helically turbulent regime, the critical dynamo number is close to unity. The emerging large-scale field is of the form of a Beltrami field, \[\mathbf{B}\big(\mathbf{x}) = (B_x \sin (k z + \phi), B_y \cos( k z + \phi), 0\big),\] for alignment along \(z\), analogously for \(x\) and \(y\); \(\phi\) is an arbitrary phase. Alignment and phase are unpredictable as due to the non--linear nature of the MHD system, even tiny differences in initial conditions or round--off errors may lead to different orientation of the Beltrami field being realized in the simulation. For non-helical forcing, magnetic field growth is not seen for all of our \(\mathrm{Re}_\mathrm{M}\) values, but only above a critical value \(\mathrm{Re}_\mathrm{M, crit} \sim 25\). Below it, the magnetic field decays exponentially. In the case of non-helical turbulence, the overall structure and geometry of the magnetic field at the saturation stage retains similar form to the growth stage, but the magnetic field strength no longer increases (such as Figure [\[fig:3deta25em4\]](#fig:3deta25em4){reference-type="ref" reference="fig:3deta25em4"}, bottom). After the exponential growth, if an LSD is present, there can be still gradual growth of the magnetic field until full saturation is reached. At low \(\mathrm{Re}_\mathrm{M}\) where our diffusivity parameters are within the same range as theirs, our results generally agree qualitatively with with the emergence of \(k = 1\) Beltrami field, however we do get generally weaker growth rates than they do for unidentifiable reason, with theirs being \(\sim 2-3 \times\) larger with the points having comparable magnetic diffusivity. --and at higher \(\mathrm{Re}_\mathrm{M}\) similar principles apply, with the large-scale magnetic field forming, despite increased randomness at smaller scales. However, despite the chaotic nature of the system, the resolution does not appear to make a significant difference. As long as \(\mathrm{Re}_\mathrm{M}\) is not too high for the given resolution, practically identical results are produced. Therefore, for the figures we have chosen representative samples from the highest resolution runs. Agreement across resolutions also indicates that any effects caused by the numerical grid are not significant. Growth and self-organization of the magnetic field can be seen at different resolutions in the animated Figures [\[fig:3deta1em3\]](#fig:3deta1em3){reference-type="ref" reference="fig:3deta1em3"} and [\[fig:3deta25em4\]](#fig:3deta25em4){reference-type="ref" reference="fig:3deta25em4"}. With increasing \(\mathrm{Re}_\mathrm{M}\) the small-scale substructures accompanying the coherent mean-field tend to get finer. As we further discuss in Section [5.3](#sec:spectra){reference-type="ref" reference="sec:spectra"}, this could be an indication that an SSD is acting in parallel with the LSD. ## Growth rates {#sec:growth} Figures [\[fig:timeseries\]](#fig:timeseries){reference-type="ref" reference="fig:timeseries"} and [\[fig:timeseries_nohel\]](#fig:timeseries_nohel){reference-type="ref" reference="fig:timeseries_nohel"} show the early exponential growth stage as well as saturation, cf. (their Fig. 1) for helical turbulence and (their Fig. 6) for non-helical turbulence. Our estimated growth rates are shown in Figures [\[fig:growthrate\]](#fig:growthrate){reference-type="ref" reference="fig:growthrate"} and [\[fig:growthrate_nohel\]](#fig:growthrate_nohel){reference-type="ref" reference="fig:growthrate_nohel"}. Those of the helically forced simulations with LSD are positive in all cases. Mildly higher values appear for \(\mathrm{Re}_\mathrm{M}=7.7,13.7\), but otherwise the normalized growth rate curve appears flat until \(\mathrm{Re}_\mathrm{M} \approx 100\). For the two highest values of \(\mathrm{Re}_\mathrm{M}\), however, the growth rates become similar to those of the non-helical cases. This is indicative of simultaneous SSD action. Our results agree reasonably well with, where they display growth rates at various \(\mathrm{Re}_\mathrm{M}\) for helical forcing, combined with data from for the non-helical forcing. Their helical growth rate curve is also flat at low \(\mathrm{Re}_\mathrm{M}\le 70\), but approaches the non-helical growth rates at \(\mathrm{Re}_\mathrm{M}=670\). The helical and non-helical growth rates shown in align with comparable numerical range to ours. However, the comparison can be problematic for two reasons. First, their results are more limited with the respect to the number of data points at with 3 points for helical and 4 for non-helical turbulence. Therefore they did not truly resolve the shape of the curve. Second, \(\mathrm{Re}_\mathrm{M}\) is varied but \(\mathrm{Re}\) is kept the same leading to variable \(\mathrm{Pr}_\mathrm{M}\), which means that our setups are not completely equal type. suspected that there is a point where a system would switch from exhibiting merely a LSD to a dynamo combined of LSD and SSD. Our results clearly support this interpretation as can been seen when comparing Figures [\[fig:growthrate\]](#fig:growthrate){reference-type="ref" reference="fig:growthrate"} and [\[fig:growthrate_nohel\]](#fig:growthrate_nohel){reference-type="ref" reference="fig:growthrate_nohel"} (see also the power spectra based growth rates in Figure [\[fig:growthrate_channel\]](#fig:growthrate_channel){reference-type="ref" reference="fig:growthrate_channel"} and magnetic field distributions in Figure [\[fig:BPDF\]](#fig:BPDF){reference-type="ref" reference="fig:BPDF"}). It should be noted that if the basic phenomenon observed by is the same as we observe, this could imply that it is more dependent on \(\mathrm{Re}_\mathrm{M}\) than \(\mathrm{Re}\). However, our results cannot substantiate this claim, as we only examine \(\mathrm{Pr}_\mathrm{M} = 1\) regime. There are two analytical predictions for the SSD growth rate: the more common \(\sqrt{\mathrm{Re}_\mathrm{M}}\) scaling in contrast to the logarithmic scaling \(\ln (\mathrm{Re}_\mathrm{M}/\mathrm{Re}_\mathrm{M, crit})\), where \(\mathrm{Re}_\mathrm{M, crit}\) is the critical Reynolds number for the SSD, and validity is restricted to low magnetic Prandtl numbers and \(\mathrm{Re}_\mathrm{M} \approx \mathrm{Re}_\mathrm{M, crit}\). In Fig. [\[fig:growthrate_nohel\]](#fig:growthrate_nohel){reference-type="ref" reference="fig:growthrate_nohel"}, the SSD growth rates appear to be highly consistent with the logarithmic scaling, except at the lowest \(\mathrm{Re}_\mathrm{M}\). In contrast, the \(\sqrt{\mathrm{Re}_\mathrm{M}}\) scaling does not really apply, apart from high \(\mathrm{Re}_\mathrm{M}\). From Figure [\[fig:growthrate_nohel\]](#fig:growthrate_nohel){reference-type="ref" reference="fig:growthrate_nohel"}, \(\mathrm{Re}_\mathrm{M, crit}\sim 25\) has been estimated, while provide \(\sim 35\). However, given the uncertainty due to their low number of \(\mathrm{Re}_\mathrm{M}\) data points, the estimates might not be significantly different. Figure 2 of shows that for incompressible turbulence with \(\mathrm{Pr}_\mathrm{M}=1\), \(\mathrm{Re}_\mathrm{M, crit} \approx 60\) based on \(k_1 = 2\pi\), or \(\approx 42\) if their \(\mathrm{Re}_\mathrm{M}\) is scaled with \(\kf/k_1 = \sqrt{2}k_1/k_1 = \sqrt{2}\) instead, as noted by. ## Saturation {#sec:saturation} Our main focus is on examining the kinematic growth stage of the SSD, with (helical forcing) and without (non-helical forcing) a co-existing LSD. Some conclusions about the saturated stage can also be drawn, but for its complete study, many of the helical runs would need to be continued longer, as the saturation of the LSD is known to occur on a resistive time scale only. Unfortunately, for the highest \(\mathrm{Re}_\mathrm{M}\), our datasets are not long enough to determine their saturation field strength. To compensate this, we performed a prolonged run with \(\nu = \eta = 1.5\dee{-4}\), \(\mathrm{Re}_\mathrm{M} = 210\), extending to one diffusion time based on the forcing scale. This was the highest \(\mathrm{Re}_\mathrm{M}\) allowing numerical stability towards saturation. However, otherwise we have to restrict our analysis on low and intermediate \(\mathrm{Re}_\mathrm{M}\). The time development of the large-scale fields can be fitted well with a function \(B_\mathrm{sat}\tanh{(t/d_0+d_1)}\), where \(d_0\) and \(d_1\) are fitting parameters, and we use it to determine the saturation magnetic field \(B_\mathrm{sat}\). Restricting to the helical runs with intermediate \(\mathrm{Re}_\mathrm{M}\), we find that \(B_\mathrm{sat}/B_\mathrm{eq}\) increases roughly logarithmically as a function of \(\mathrm{Re}_\mathrm{M}\) (See Figure [\[fig:saturation\]](#fig:saturation){reference-type="ref" reference="fig:saturation"}). The saturation values for the non-helical cases are easier to determine as they saturate quickly after their exponential growth, and compared to the helical cases, the field strengths are roughly by a factor of six smaller. Their \(B_\mathrm{sat}/B_\mathrm{eq}\) grows also in with \(\mathrm{Re}_\mathrm{M}\). For helical forcing, in both the cases with only an LSD (\(\mathrm{Re}_\mathrm{M}<40\)) and a combined LSD-SSD, \(B_\mathrm{sat}/B_\mathrm{eq}\) as a function of \(\mathrm{Re}_\mathrm{M}\) obeys a logarithmic law as shown in Figure [\[fig:saturation\]](#fig:saturation){reference-type="ref" reference="fig:saturation"}, albeit with different slopes. For combined LSD-SSD, the slope is roughly the same as in the non-helical cases. Therefore we hypothezise that the emergence of the SSD is to the disadvantage of the LSD, most likely due to a reduction of \(\alpha\), and thus prevents its saturation strength from further growing with \(\mathrm{Re}_\mathrm{M}\). Consequently, the observed growth of \(B_\mathrm{sat}/B_\mathrm{eq}\) with \(\mathrm{Re}_\mathrm{M}\) would be exclusively due to the SSD. ## Power spectra {#sec:spectra} One substantial difference between SSD and LSD consists in the scale distribution of the magnetic energy during growth and saturation. To investigate it, we have calculated magnetic power spectra \(E_B(k)\) (with normalization \(\int E_B(k) dk = \int \mathbf{B}^2 dV/2\\mu_0\) for individual simulation snapshots. Figures [\[fig:pspec_a\]](#fig:pspec_a){reference-type="ref" reference="fig:pspec_a"} and [\[fig:pspec_flat\]](#fig:pspec_flat){reference-type="ref" reference="fig:pspec_flat"} show time-dependent spectra \(E_B(k;t)\) for the highest studied \(\mathrm{Re}_\mathrm{M}\) and a low one, respectively. In the case of helical forcing (LSD) with high \(\mathrm{Re}_\mathrm{M}>\mathrm{Re}_\mathrm{M, crit}\) (Figure [\[fig:pspec_a\]](#fig:pspec_a){reference-type="ref" reference="fig:pspec_a"}, top), we witness a persistent peak at the forcing wavenumber \(\kf\) and at late times gradually growing power for \(k\gtrsim 1\), i.e. in the large-scale field. At late times, there is a typical forward energy cascade towards small scales \(k>\kf\). For SSD, (Figure [\[fig:pspec_a\]](#fig:pspec_a){reference-type="ref" reference="fig:pspec_a"}, bottom), large scales follow persistently the Kazantsev scaling \(\propto k^{3/2}\), while the spectrum peaks above \(\kf\) at \(k = 9\); beyond that a similar forward cascade exists as in LSD. Qualitatively, this picture is the same for all \(\mathrm{Re}_\mathrm{M}>\mathrm{Re}_\mathrm{M, crit}\). For high \(\mathrm{Re}_\mathrm{M}\), as shown in Figure [\[fig:pspec_a\]](#fig:pspec_a){reference-type="ref" reference="fig:pspec_a"}, even with helical forcing we can clearly see SSD-type (Kazantsev) spectra during the growth stage, which signifies the presence of SSD during the growth. The SSD-type spectra can also appear during the growth of medium \(\mathrm{Re}_\mathrm{M}\) cases, which are not too diffusive. However, at low \(\mathrm{Re}_\mathrm{M}\), SSD and LSD spectral shapes are clearly different during this stage: In helically driven systems, the spectrum is essentially flat at large scales until the emergence of the \(k=1\) mode, see Figure [\[fig:pspec_flat\]](#fig:pspec_flat){reference-type="ref" reference="fig:pspec_flat"}. This resembles the spectral growth of with a flattened curve during the growth stage and the eventual emergence of \(k=1\) mode (Their Figures 2 ans 3 respectively). As helical and non-helical growth rates converge at high \(\mathrm{Re}_\mathrm{M}\) (see Sec. [5.1](#sec:growth){reference-type="ref" reference="sec:growth"} and Figures [\[fig:growthrate\]](#fig:growthrate){reference-type="ref" reference="fig:growthrate"} and [\[fig:growthrate_nohel\]](#fig:growthrate_nohel){reference-type="ref" reference="fig:growthrate_nohel"}), we may explain this behavior by the assumption that in this range the SSD growth rate is higher than the LSD one, thus the former is dominating the latter during growth. But if SSD saturates earlier than LSD and also at lower magnitude, the spectrum has to undergo the observed change in its shape with finally dominating large scales. For medium \(\mathrm{Re}_\mathrm{M}\) the situation would be less clear. The Kazantsev scaling is kept during most of the growth stage, but the growth of the magnetic energy is more rapid than for the respective non-helical runs. Therefore helical turbulence can enhance the accumulation of magnetic energy without affecting the spectral shape during the initial growth. In an attempt to separate SSD and LSD behaviour, we have estimated the growth rates as functions of wavenumber. The resulting \(\lambda_k\), displayed in Figure [\[fig:growthrate_channel\]](#fig:growthrate_channel){reference-type="ref" reference="fig:growthrate_channel"} for \(k=1\) and \(k=9\), are in general proportional to those estimated from \(B_{\mathrm{rms}}\). Again, the growth rates of SSD and LSD merge at high \(\mathrm{Re}_\mathrm{M}\) and the SSD ones follow the logarithmic scaling. For both helical and non-helical forcing, both of the referred scales (\(k=1\) and \(k=9\)) grow at similar rates, with a mild tendency of \(\lambda_1\) being marginally higher than \(\lambda_9\). In addition, the helical runs seem to show higher growth rates at high \(\mathrm{Re}_\mathrm{M}\) than the nonhelical runs. Yet, because of fitting uncertainties, all this should be taken with caution. Figure [\[fig:psts_a\]](#fig:psts_a){reference-type="ref" reference="fig:psts_a"} displays the corresponding time development of the spectral channels \(k=1,5,9\) for the high \(\mathrm{Re}_\mathrm{M}\) helical and non-helical runs featured in Fig. [\[fig:pspec_a\]](#fig:pspec_a){reference-type="ref" reference="fig:pspec_a"}. In both cases, the exponential growth occurs at similar rates for all three channels with the \(k=5,9\) ones dominating. The only difference is that when LSD is present, the \(k=1\) channel continues to grow past the exponential growth stage, while the other channels are almost saturated, to become finally dominating. At low \(\mathrm{Re}_\mathrm{M}\), with LSD alone (Figure [\[fig:psts_flat\]](#fig:psts_flat){reference-type="ref" reference="fig:psts_flat"}), all three channels have approximately equal magnitude with minor deviations in the beginning. After the exponential growth phase the spectral channels differ with \(k=1\) becoming the strongest, as it happens in the spectra of Figure [\[fig:pspec_flat\]](#fig:pspec_flat){reference-type="ref" reference="fig:pspec_flat"}. For the sake of testing and comparison, we changed the forcing scale to \(\kf= 15\) to separate it more safely from the largest scale of the emergent mean field. During growth we see a more gradual buildup of the inverse energy cascade towards large scales, see Figure [\[fig:pspec_k15\]](#fig:pspec_k15){reference-type="ref" reference="fig:pspec_k15"}: the energy peak of the growing large-scale magnetic field moves gradually towards larger scales until reaching its largest values at \(k = 1\). This is similar to the same phenomena visible in Figure 7 of. The time development of the spectral channels \(k=1,5,9\) is shown in Figure [\[fig:psts_k15\]](#fig:psts_k15){reference-type="ref" reference="fig:psts_k15"}, indicating a clearly different growth rate of the \(k = 1\) channel. The \(k = 1\) channel curve consists of two different exponentials at concurrent stages. However, the data is too sparse in that range to produce meaningful fit estimates. There is even decay visible in the \(k=5\) channel which is explainable with the magnetic energy inverse-cascading onto larger scale over time as visible in Figure [\[fig:pspec_k15\]](#fig:pspec_k15){reference-type="ref" reference="fig:pspec_k15"}. ## Mean-field analysis {#sec:soca} For LSD, mean-field theory provides some testable predictions: First, an estimate of the growth rate based on turbulent transport coefficients. Second, quenching of the \(\alpha\)-effect as a function of \(\mathrm{Re}_\mathrm{M}\). Unfortunately, at this moment *Astaroth* is not capable of handling the test-field method or other method for measuring the turbulent transport coefficents at runtime. Therefore, we calculated estimates for the coefficients of \(\alpha\)-effect and turbulent diffusion, \(\eta_\mathrm{t}\), using results from the second-order correlation approximation (SOCA) and other closures which have proven to be surprisingly useful. According to the mean-field approximation, the growth rate of the mean field \(\overline{\mathbf{B}}\) for isotropic stationary turbulence, hence constant \(\alpha\) and \(\eta_\mathrm{t}\), is \[\label{eq:MFgrowth} \lambda = |\alpha| k-(\eta_\mathrm{t} + \eta) k^2\] where \(k\) is the wavenumber of the mean field and \(\alpha = \alpha_K + \alpha_M\). In the limit of ideal MHD, the constituents of \(\alpha\) are related to kinetic and current helicity, respectively, by \[\label{eq:alphaFOSA} \alpha_K =-\frac{1}{3} \tau \left\langle \boldsymbol{\omega} \cdot \mathbf{u} \right\rangle \quad \mathrm{and} \quad \alpha_M = \frac{1}{3} \tau \langle \mathbf{j}'\cdot \mathbf{b}' \rangle /\mu_0 \rho_0,\] with correlation time \(\tau\), and vorticity \(\boldsymbol\omega=\nabla\times \mathbf{u}\) and primes indicating the fluctuating parts. Note two possible interpretations for \(\alpha_M\): First, it reflects the contribution of a magnetic background turbulence, like that provided by an SSD, to \(\alpha\). Here, \(\alpha_M\) can be obtained already by SOCA. Second, it can be interpreted as reflecting the quenching of \(\alpha\) by \(\overline{\mathbf{B}}\) such that with its magnitude growing, \(\alpha_M\) also grows, but opposite in sign to \(\alpha_K\), resulting in a reduced total \(\alpha\). This can be obtained via closure approaches like the \(\tau\) or eddy-damped quasi-normal Markovian approximations. Turbulent diffusivity in incompressible flows is estimated as \[\label{eq:etaFOSA} \eta_\mathrm{t} = \frac{1}{3} \tau \langle {\mathbf{u}}^2 \rangle.\] If the Strouhal number \(u_{\mathrm rms}\tau/\ell\), \(\ell\) a characteristic scale of the flow, is assumed to be unity, we can estimate \(\tau = 1/\kf u_\mathrm{rms}\). To obtain the fluctuating fields \(\mathbf{b}'\), \(\mathbf{j}'\) we have removed the large scale field via filtering out the contributions of the \(k = 1\) mode from the magnetic field snapshots. We estimated the growth rates by first calculating \(\alpha\) and \(\eta_\mathrm{t}\) for individual snapshots using data from runs with high snapshot frequency during exponential growth. Then we used Equation ([\[eq:MFgrowth\]](#eq:MFgrowth){reference-type="ref" reference="eq:MFgrowth"}) to get \(\lambda\) for an individual snapshot, and subsequently time-averaged over the growth phase. We find results which are at least approximately aligned with the directly measured values with better agreement at low \(\mathrm{Re}_\mathrm{M}\), see Fig. [\[fig:socagrowth\]](#fig:socagrowth){reference-type="ref" reference="fig:socagrowth"}. Towards high \(\mathrm{Re}_\mathrm{M}\), the results begin to diverge, most strongly at the highest \(\mathrm{Re}_\mathrm{M}\). This appears to indicate that the closure estimates can work surprisingly well, but do not catch all of the details. But how does \(\alpha\) behave at the saturation stage? measured \(\alpha\) and \(\eta_\mathrm{t}\) quenching, with both decreasing as functions of \(\mathrm{Re}_\mathrm{M}\). For comparison, we calculated \(\alpha_{\rm K,M}\) from the saturation stages of our runs and discovered similar results, see Figure [\[fig:alphaquench\]](#fig:alphaquench){reference-type="ref" reference="fig:alphaquench"}. The normalized \(\alpha_K\) approaches a constant whereas \(\alpha_M\) keeps getting stronger with \(\mathrm{Re}_\mathrm{M}\). Our results are close to (their Fig. 3) within our range of \(\mathrm{Re}_\mathrm{M}\), including substantially more points though. The total \(\alpha\) decreases with growing \(\mathrm{Re}_\mathrm{M}\) reaching eventually a tentative plateau. ## Magnitude distribution of the magnetic field Next we investigate how the probability density functions (PDFs) of the magnetic field differ in the regimes where SSD or LSD alone and SSD and LSD together are acting. While spectra gave us information about the distribution of the magnetic field across different scales, PDFs can further reveal details of the structure of the field in different spatial directions. Additionally, we calculated kurtoses of these distributions using the Fisher's definition, for which the kurtosis of a normal distribution is 0. Figure [\[fig:BPDF\]](#fig:BPDF){reference-type="ref" reference="fig:BPDF"} shows the temporal evolution of the PDFs of all three components of the dynamo-generated \(\mathbf{B}\) for non-helical forcing and helical forcing with three different \(\mathrm{Re}_\mathrm{M}\). Two basic types of PDFs are obtained: A SSD produces a symmetric exponential distribution, which expands over time, but keeps otherwise the same shape and eventually stops changing at the saturation stage, with its kurtosis ranging from \(\sim 4\) to \(\sim 6\). An LSD produces a more Gaussian--shaped distribution. As a pure Beltrami field has a PDF of top-hat shape, this can result in a PDF of the total field with a both widened and flattened peak if \(\overline{\mathbf{B}}\) is strong enough. In Figure [\[fig:BPDF\]](#fig:BPDF){reference-type="ref" reference="fig:BPDF"}, such an indication of a top-hat profile is best visible in the PDFs of \(B_y\) at saturation for helically forced cases with \(\eta = 0.002\) and \(0.0005\), with their kurtoses approaching 0, whether or not the top is flattened. This is not surprising because the top hat effect happens close to the peak and the PDF has still significant tails. The widened Gaussian PDF profile of LSD appears most pronouncedly at (or just before) the saturation stage, whereas during the exponential growth stage, the LSD cases show at high and intermediate \(\mathrm{Re}_\mathrm{M}\) rather an SSD type of PDF, including similar values of the kurtosis. Even after initial growth, there is a tendency of the LSD-type PDFs to develop a sharp tip, reminiscent of the SSD type, because the emergence of fully saturated large scale Beltrami field takes time. These observations support the finding of Section [5.3](#sec:spectra){reference-type="ref" reference="sec:spectra"}, that at high \(\mathrm{Re}_\mathrm{M}\) exponential growth is seemingly dominated by the SSD, present simultaneously with the LSD. However, even with high \(\mathrm{Re}_\mathrm{M}\), where small-scale fluctuations are strong, the LSD will turn the field profile into a Gaussian type over time. In Figure [\[fig:BPDF\]](#fig:BPDF){reference-type="ref" reference="fig:BPDF"}, the highest \(\mathrm{Re}_\mathrm{M}\) simulation is not depicted at its most saturated state, but the \(k=1\) mode will keep growing mere over time and its feature will soften. # Discussion {#sec:discussion} We examined emergence and growth of both large and small scale dynamos and found that with helical forcing, approaching high \(\mathrm{Re}_\mathrm{M}\), both SSD and LSD become clearly simultaneous phenomena. This is visible both from the time evolution of the powerspectra and from the probability density functions of \(\mathbf{B}\). For high \(\mathrm{Re}_\mathrm{M}\), the growth rates of helical and non-helical cases converge, indicating the dominance of SSD in the helical ones. Under helically driven turbulence, an exact delimitation between LSD and SSD is difficult. At medium \(\mathrm{Re}_\mathrm{M} > \mathrm{Re}_\mathrm{M, crit}\), there is a tentative indication of an SSD in the powerspectra during the dynamo growth. While the growth rate is dominated by the LSD, an SSD can already be operating, so that SSD and LSD are coupled at this stage. Based on the dependency of the growth rates of the helical simulations on \(\mathrm{Re}_\mathrm{M}\), we attempt a hypothetical explanation of the interaction of the two dynamos, see Figure [\[fig:LSDvsSSD\]](#fig:LSDvsSSD){reference-type="ref" reference="fig:LSDvsSSD"}: At low \(\mathrm{Re}_\mathrm{M}\), the system is diffusive enough to prevent any presence of SSD, and the--pure LSD--growth rate increases as a function of \(\mathrm{Re}_\mathrm{M}\). In the mid range of \(\mathrm{Re}_\mathrm{M}\gtrsim 10\), the growth rate decreases as a function of \(\mathrm{Re}_\mathrm{M}\). We suggest that now SSD becomes effective and starts to inhibit the growth of the LSD by reducing \(\alpha\) via, in turn, increasing \(\alpha_M\). However, to prove this we had to show that the \(\mathrm{Re}_\mathrm{M, crit}\) of helical turbulence is smaller than that of non-helical turbulence and that \(\alpha\) is really reduced. While possible, recognizing both of these affects conclusively would require more thorough mapping of \(\alpha\) than what we have available. At high \(\mathrm{Re}_\mathrm{M}\), SSD dominates the exponential growth, which is subtantiated by our results. We can find a point of comparison in, who have reported on the effect of SSD on LSD in the context of turbulent convection in stars with a solar--like convective envelope. They state that SSD shows both inhibiting and enhancing effects to the emerging magnetic field depending on \(\mathrm{Re}_\mathrm{M}\). In their low \(\mathrm{Re}_\mathrm{M}\) case, a large-scale magnetic field emerges, but in their medium \(\mathrm{Re}_\mathrm{M}\) case, the large-scale magnetic field is suppressed, while emerging again in their high \(\mathrm{Re}_\mathrm{M}\) case. explain their medium \(\mathrm{Re}_\mathrm{M}\) case as the suppression of LSD by SSD, whereas in their high \(\mathrm{Re}_\mathrm{M}\) case the SSD would enhance the magnetic energy generation by LSD. Our hypothesis, illustrated by Figure [\[fig:LSDvsSSD\]](#fig:LSDvsSSD){reference-type="ref" reference="fig:LSDvsSSD"} would be congruent with their scenario. However, caution should be shown because our methods are not completely equivalent to theirs. We have focused on exponential growth, and we cannot compare the saturated stages with equal detail. Our limited saturation data at low, medium and high \(\mathrm{Re}_\mathrm{M}\) shows that the saturated magnetic field increases towards high \(\mathrm{Re}_\mathrm{M}\), with is a tentative indication that SSD would exclusively contribute to the the increase of saturated field strength, but with SSD being a disadvantage of the LSD itself. Another caveat with respect to the results is that their model diffusivities are implicit and their diffusion schemes changes between different simulation while ours are explicit and have an uniform scheme, which makes a direct comparison difficult. When it comes to the pure SSD, our results show that the \(\mathrm{Re}_\mathrm{M}\) dependence of the growth rate matches the logarithmic prediction of very well. In contrast, the \(\propto \sqrt{\mathrm{Re}_\mathrm{M}}\) relation does not seem functional at low \(\mathrm{Re}_\mathrm{M}\). The logarithmic scaling appears to be empirically valid, although it has been derived for low magnetic \(\mathrm{Pr}_\mathrm{M}\), whereas in our simulations \(\mathrm{Pr}_\mathrm{M}\) was unity. We also estimated the turbulent transport coefficients \(\alpha\) and \(\eta_\mathrm{t}\) based on closure approaches. We found an \(\alpha\) quenching behaviour comparable to and calculated the growth rates based on \(\alpha\) and \(\eta_\mathrm{t}\). They appear to be in a similar approximate range, but there is a number of differences when compared to the direct measurements. The difference between closure and direct estimates are a possible result of the fact that the former are very rough. To improve and check the goodness of the estimate, a more refined method such as the test-field method would be required, which is not currently supported by *Astaroth*. In addition, in further studies the number of points on the \(\mathrm{Re}_\mathrm{M}\) axis should be increased. As we are also used this study as a way for exploring the scientific potential of the *Astaroth* API, some remarks should be made on the practical aspects of computation. The work presented here has benefited significantly from the performance enhancement provided by *Astaroth*. It was feasible to perform the dynamo simulations and related tests with two computing nodes, with four Tesla P100 devices per node. This made our simulation very affordable within the limits of the ASIAA high-performance computing cluster. More discussion of GPU performance can be found in the Appendix [\[sec:performance\]](#sec:performance){reference-type="ref" reference="sec:performance"}. Additionally, it should be noted that an efficient GPU code can produce substantial amounts of data. Therefore, benefits of the performance will come in contact with the limitation of the data processing tools, that might not be as efficient and/or optimized as the GPU code. Astrophysicists rely on data analysis libraries, and we should note that for the maximal benefit of GPU performance, also connected data processing tools should be improved in efficiency. For future enhancements to this work, there are several possibilities. First, more points in the \(\mathrm{Re}_\mathrm{M}\)-space could be covered. To better understand the scenario illustrated by our hypothesis depicted in Figure [\[fig:LSDvsSSD\]](#fig:LSDvsSSD){reference-type="ref" reference="fig:LSDvsSSD"}. As the computation is efficient, this approach is basically limited by the available data storage. Second, a test-field method could be implemented to estimate the turbulent transfer coefficients \(\alpha\) and \(\eta_\mathrm{t}\) in a more precise manner. The third possibility is to increase resolution and therefore \(\mathrm{Re}_\mathrm{M}\) with the multi-node MPI implementation of *Astaroth* becoming available. # Conclusions {#sec:conclusion} In this paper, we extended the *Astaroth* library to work on multiple GPUs and applied it to study the turbulent dynamo problem. Our implementation scaled from one to four GPUs with at least \(90\%\) efficiency and exhibited a speedup of \(35\) in single-node performance on four V100-SXM2-32GB GPUs compared with *Pencil Code* runs on two 20-core Intel Xeon Gold 6230 Cascade Lake CPUs. Because of the limitations of CUDA peer-to-peer memory transfers, our implementation was restricted to a single node. Our results demonstrate that one-dimensional decomposition is sufficient to hide communication latencies within a node when carrying out computation and communication in parallel on current hardware. However, we expect that the use of MPI and multidimensional decomposition schemes are required for witnessing further scaling. We simulated helical and non-helical MHD turbulence with homogeneous random forcing, and by modifying diffusivity and viscosity within the resolution limits to investigate the dependence of the dynamo growth on the magnetic Reynolds number, while keeping the magnetic Prandtl number fixed to unity. We were able to extend the \(\mathrm{Re}_\mathrm{M}\) range to somewhat larger values than in some of the older studies, but most importantly, produce a large set of simulations to determine the dependence more accurately than before. We estimated growth rates from the simulations and saw that with helical turbulence an LSD would grow at any \(\mathrm{Re}_\mathrm{M}\gtrsim 1\), while SSD would appear only beyond a critical value \(\mathrm{Re}_\mathrm{M} \sim 25\). SSD growth rates followed a clear logarithmic \(\mathrm{Re}_\mathrm{M}\) dependence. Earlier studies have either not been able to determine a clear dependency due to the small amount of data points, or reported consistency with a \(\sqrt{\mathrm{Re}_\mathrm{M}}\) dependency. In helical simulations with \(\mathrm{Re}_\mathrm{M} >\) 25, both dynamo instabilities are evidently present simultaneously. To further inspect and separate the signatures of the SSD and LSD, we determined magnetic powerspectra. LSD spectra displayed growth at the largest scales while SSD ones showed a Kazantsev profile at low to intermediate wavenumbers, and peaked at scales smaller than the forcing scale. Spectra in the regime where both dynamo instabilities act together retains characteristic of the LSD at low wavenumbers, and those of the SSD at high wavenumbers, although there is always a peak at the forcing scale. In such circumstances, the powerspectra display SSD features during the exponential growth stage. We computed probability density functions of the magnetic field, which showed exponential shapes in the case of SSD, and a Gaussian distribution deformed by a top-hat profile from the mean (Beltrami) field for LSD. They also showed evidence for the coexistence of SSD with LSD towards high \(\mathrm{Re}_\mathrm{M}\). To explain the behaviour of the growth rate in helically driven simulations we presented a hypothesis that the growth of LSD is inhibited by a budding SSD around medium \(\mathrm{Re}_\mathrm{M}\). We analyzed LSD using closure estimates of turbulent transport coefficients. These estimated growth rates agreed at low and medium \(\mathrm{Re}_\mathrm{M}\) with the direct measurements, but diverged at high \(\mathrm{Re}_\mathrm{M}\). The closure--estimated \(\alpha\) displayed clear signs of quenching at high \(\mathrm{Re}_\mathrm{M}\). *Astaroth* is open source and available under GPL 3 license at <https://bitbucket.org/jpekkila/astaroth/>. This work utilized tools developed by the CHARMS group and high-performance computing resources and cluster in ASIAA. This research has made use of SAO/NASA Astrophysics Data System. Additional compute resources for this work were provided by CSC--IT Center for Science. Authors thank Dr. Chun-Fan Liu for an useful insight. J.P., M.J.K., and M.R. acknowledge the support of the Academy of Finland ReSoLVE Centre of Excellence (grant number 307411). This project has received funding from the European Research Council (ERC) under the European Union's Horizon 2020 research and innovation programme (Project UniSDyn, grant agreement n:o 818665). M.V., H.S., and R.K acknowledge funding support for Theory within ASIAA from Academia Sinica. H.S. acknowledges grant support from Ministry of Science and Technology (MoST) in Taiwan through 105-2119-M-001-044-MY3, and 108-2112-M-001-009-. [^1]: A Tesla V100-SXM2-32GB GPU provides an arithmetic performance of \(7.83\) TFLOPS (floating-point operations per second) and \(863\) GiB/s off-chip memory bandwidth , whereas an Intel Xeon Gold 6230 CPU has the theoretical peak performance of \(1.25\) TFLOPS and \(131\) GiB/s bandwidth . Therefore a GPU could theoretically provide roughly \(6\times\) improved throughput in data-parallel tasks.
{'timestamp': '2020-12-17T02:10:21', 'yymm': '2012', 'arxiv_id': '2012.08758', 'language': 'en', 'url': 'https://arxiv.org/abs/2012.08758'}
null
null
null
null
# Central least square estimation of level set gradients {#sec:central_least_square} The second term in equation ([\[eq:reinit_new\]](#eq:reinit_new){reference-type="ref" reference="eq:reinit_new"}) involves computation of level set gradient terms. \[\lvert \nabla \psi \rvert_i = \sqrt{\left(\frac{\partial \psi}{\partial x} \right)_i + \left(\frac{\partial \psi}{\partial y} \right)_i}\] These terms are evaluated here using central least square approach. In order to construct cell center derivatives, a stencil consisting of vertex based neighbours, as shown in Figure [\[fig:vertex_based_stencils\]](#fig:vertex_based_stencils){reference-type="ref" reference="fig:vertex_based_stencils"}, is considered. Using Taylor series expansion, the neighbour cell values, \(\psi_j\), of the level set function are expressed in terms of the value at cell \(i\), as, \[\psi_j = \psi_i + (x_j-x_i) \left(\frac{\partial \psi}{\partial x}\right)_i + (y_j-y_i) \left(\frac{\partial \psi}{\partial y}\right)_i \dots \label{eq:taylor-series}\] where, \((x_i, y_i)\) and \((x_j, y_j)\) are locations of the centroids of cell \(i\) and centroid of the neighbour cell \(j\) respectively. Upon truncating the higher order terms (after the third order term) and re-arranging, equations ([\[eq:taylor-series\]](#eq:taylor-series){reference-type="ref" reference="eq:taylor-series"}) can be written as, \[\Delta \psi = {\bf S}~\text{d}\psi \label{eq:taylor-series_matrix}\] where, The overdetermined system of equation ([\[eq:taylor-series_matrix\]](#eq:taylor-series_matrix){reference-type="ref" reference="eq:taylor-series_matrix"}) can be solved as, \[\text{d}\psi = \left({\bf S}^{\text{T}}{\bf S}\right)^{-1} {\bf S}^{\text{T}} \Delta \psi \label{eq:weighted_normal_method}\] Closed-form expressions for the derivatives can be obtained by simplifying equation ([\[eq:weighted_normal_method\]](#eq:weighted_normal_method){reference-type="ref" reference="eq:weighted_normal_method"}) as, where \[\ell_{11} = \sum_{j=1}^l (x_j-x_i)^2, \hspace{0.5cm} \ell_{22} = \sum_{j=1}^l (y_j-y_i)^2, \hspace{0.5cm} \ell_{12} = \ell_{21} = \sum_{j=1}^l (x_j-x_i) (y_j-y_i)\] \[r_{1} = \sum_{j=1}^l (x_j-x_i) (\psi_j-\psi_i), \hspace{0.5cm} r_{2} = \sum_{j=1}^l (y_j-y_i) (\psi_j-\psi_i), \hspace{0.5cm} G = \ell_{11} \ell_{22}-\ell_{12}^2\] # Conservative Level set Method The fluid-fluid interface in conservative level set method is represented in the form of an iso-contour of a hyperbolic tangent type level set function, defined as, \[\psi({\bf x}, t) = \frac{1}{1 + \exp \left(\frac{-\phi({\bf x}, t)}{\varepsilon}\right)} \equiv \frac{1}{2} \left( \tanh \left(\frac{\phi({\bf x}, t)}{2 \varepsilon} \right) + 1 \right) \label{eq:level_set_function}\] where, \(\phi({\bf x}, t)\) is the standard signed distance function defined in terms of the minimum distance \(d({\bf x}, t)\) from the interface, as, \[\phi({\bf x}, t) = \begin{cases}-d({\bf x}, t), &\text{ inside the first fluid} \\ 0, &\text{ at the fluid-fluid interface} \\ +d({\bf x}, t), &\text{ inside the second fluid} \end{cases}\] The function \(\psi\) takes a value \(0\) at regions occupied by the first fluid and \(1\) at the second fluid. Within a thin transition region between the two fluids, \(\psi\) varies smoothly from \(0\) to \(1\). Width of the transition region is dictated by the parameter \(\varepsilon\). The contour corresponds to \(\psi({\bf x},0) = 0.5\) represents the actual fluid-fluid interface. The geometric parameters associated with the interface, such as interface normal vector (\({\bf n}\)) and interface curvature (\({\kappa}\)), are obtained from the level set function as, \[{\bf n} = \frac{\nabla \psi}{\lvert \nabla \psi \rvert} \label{eq:normal}\] \[\kappa =-\nabla \cdot {\bf n} \label{eq:curvature}\] Finally, movement of the fluid-fluid interface is achieved by advecting the level set function according to the flow field, as, \[\label{eq:ls-advec} \frac{\partial \psi}{\partial t} + \nabla \cdot \left({\bf u} \psi\right) = 0\] where, \({\bf u} = u \hat{\text{i}} + v \hat{\text{j}}\), is the divergence-free velocity field. ## Artificial Compression based Reinitialization Procedure {#sec:artificial_compression} It is well known that the level set function suffers from excessive dissipation due to numerical errors . This leads the level set function to deviate from its original hyperbolic tangent type profile. An artificial compression based reinitialization is developed in reference  in order to re-establish the pre-specified thickness and the profile of the level set function. The discretized level set advection equation together with the reinitialization should satisfy the following three requirements . Firstly, the method should ensure discrete conservation of mass while advecting the level set function. Secondly, the method should not introduce any spurious oscillations. Finally, the initial properties of the level set function should be maintained throughout the simulation. The equation for reinitializing the level set function can be written as per  as, \[\frac{\partial \psi}{\partial \tau_r} + \nabla \cdot \left(\psi (1- \psi) {\bf n}_0 \right)-\nabla \cdot \left(\varepsilon \left(\nabla \psi \cdot {\bf n}_0 \right)~{\bf n}_0\right) = 0 \label{eq:reinit_htf}\] where, \({\bf n}_0 = \displaystyle \frac{\nabla \psi_0}{\lvert \nabla \psi_0 \rvert}\) is the interface contour normal vector defined before the reinitialization starts. The variable \(\tau_r\) is a time like variable and \(\psi_0\) is the level set function defined at \(\tau_r = 0\). In equation ([\[eq:reinit_htf\]](#eq:reinit_htf){reference-type="ref" reference="eq:reinit_htf"}), the second and third terms are responsible for the interface compression and diffusion respectively, which balances each other once the equation ([\[eq:reinit_htf\]](#eq:reinit_htf){reference-type="ref" reference="eq:reinit_htf"}) converges in time \(\tau_r\). In practice, the reinitialization formulation suffers from various deficiencies. As described in the introduction, the above reinitialization procedure may involve error in the \({\bf n}_0\) computation. It may also be noted, the reinitialization equation moves the interface contour based on the local curvature. In order to identify terms that have potential to move the interface contour during the reinitialization, equation ([\[eq:reinit_htf\]](#eq:reinit_htf){reference-type="ref" reference="eq:reinit_htf"}) is rewritten in non-conservative form by expanding the the compressive and diffusive terms. After rewriting equation ([\[eq:reinit_htf\]](#eq:reinit_htf){reference-type="ref" reference="eq:reinit_htf"}) in non-conservative form, a curvature dependent velocity like term, \({\bf v} = \varepsilon \kappa_0 \bigg({\bf n}_0-\displaystyle \frac{\nabla \phi}{\lvert \nabla \phi \rvert^2}\bigg)\), is isolated which is found to be responsible for undesired movement of the interface (details shown in reference ). ## Reformulation of the Reinitialization Equation {#sec:reformulation} As described above, the curvature dependent advection term moves the interface; thus it is undesired in a reinitialization procedure. Therefore, in the new formulation of the reinitialization equation, we remove this curvature dependent advection term from the reinitialization equation. It may also be noted, the reinitialization equation is sensitive towards numerical errors arising from the ill-conditioned behaviour of the contour normal vectors. In order to overcome the difficulty to deal with the these terms, in the new formulation we seek for terms that are easy to compute and are less sensitive to numerical errors arising form the ill-conditioned contour normal vectors. After some manipulations (details shown in reference ), the final reformulated reinitialization equation can be written as, \[\frac{\partial \psi}{\partial \tau_n} =-\psi (1-\psi) (1-2 \psi) + \varepsilon (1-2 \psi) \lvert \nabla \psi \rvert \label{eq:reinit_new}\] It can be easily shown that the level set function, \(\psi\), as given in equation ([\[eq:level_set_function\]](#eq:level_set_function){reference-type="ref" reference="eq:level_set_function"}), trivially satisfies the steady state form of equation ([\[eq:reinit_new\]](#eq:reinit_new){reference-type="ref" reference="eq:reinit_new"}). Furthermore, the overall behaviour of equation ([\[eq:reinit_new\]](#eq:reinit_new){reference-type="ref" reference="eq:reinit_new"}) can be described by considering each terms in the RHS individually. In the absence of the second term in RHS, equation ([\[eq:reinit_new\]](#eq:reinit_new){reference-type="ref" reference="eq:reinit_new"}) behaves like an ordinary differential equation with \(\psi = 1\) and \(\psi = 0\) as two stable equilibrium points and \(\psi=0.5\) as an unstable equilibrium point. Figure [\[fig:phase_plot\]](#fig:phase_plot){reference-type="ref" reference="fig:phase_plot"} shows the phase plot of equation ([\[eq:reinit_new\]](#eq:reinit_new){reference-type="ref" reference="eq:reinit_new"}) with only first term in the RHS. From the phase plot, it is clear that the first term results in sharpening the level set function profile. Moreover, the first term also helps in stabilizing the overshoot (\(\psi > 1.0\)) and undershoot (\(\psi < 0.0\)) issues arising in case of the use of non-TVD numerical schemes for the original level set advection equation. Nature of the second term in the RHS of equation ([\[eq:reinit_new\]](#eq:reinit_new){reference-type="ref" reference="eq:reinit_new"}) is to balance the first term. Since the \(\varepsilon\) and \(\lvert \nabla \psi \rvert\) are always positive quantities, the sign of the second term depends on the sign of \((1-2\psi)\). That is, the sign of the second term is positive when \(\psi < 0.5\) and negative when \(\psi > 0.5\). At \(\psi = 0.5\), the second term is zero. In other words, the second term drives the level set function towards a flat profile with \(\psi = 0.5\) everywhere, thus balancing the first term. With the above mentioned sharpening and balancing actions, the equation ([\[eq:reinit_new\]](#eq:reinit_new){reference-type="ref" reference="eq:reinit_new"}) reinitializes the level set function. # Conclusion A new approach to reinitialize the level set function for the CLS method is formulated in this paper. The two major drawbacks of the existing artificial compression based reinitialization procedure, namely, the unwanted movement of the interface contour and strong sensitivity towards numerical errors leading to formation of unphysical fluid patches, are resolved with the new approach. Here, the existing artificial compression based reinitialization equation is first examined carefully in order to identify the term responsible for the movement of the interface contour. After isolating and removing a curvature dependent velocity term, that is responsible for moving the interface contour, the reinitialization equation is revised. The remaining terms in the reinitialization equation are then carefully replaced with equivalent terms that do not involve contour normal vectors. Unlike the compression and diffusion fluxes present in a typical artificial compression approach, the newly reformulated approach has a level set sharpening term, responsible for the narrowing the level set profile, and a balancing term in order to counteract the effect of sharpening. The combined effect of sharpening and balancing restores the level set function without causing any unwanted movement to the interface contour. Due to the absence of terms involving contour normal vectors, the susceptibility towards formation of unphysical fluid patches during reinitialization process has been completely eliminated in the new reinitialization procedure. As result of the new reinitialization approach, there has been significant improvement in the mass conservation property. While solving the new reinitialization equation, one can choose a larger time step, approximately by a factor of \(4/h\), in comparison with the allowable time step of an artificial compression based approach. Moreover, the simplified terms also help in significantly reducing the numerical computation per reinitialization iteration, aiding an overall reduction in the computational efforts. In order to evaluate the performance of the new reinitialization scheme, three types of numerical test cases are carried out. A set of in-place reinitialization problems demonstrate that the new reinitialization approach does not unnecessarily move the interface contour even after large number of reinitialization iterations. The area and shape errors of the new approach are quantified and compared against other reinitialization schemes using a set of scalar advection based test problems. In order to evaluate the performance on more practical problems, a set of standard incompressible two-phase flow problems, starting from an inviscid test case to complex test cases involving viscous and surface tension forces, are solved. Finally, in order to demonstrate the ability to deal with complex mesh types, an incompressible two-phase flow problem is also solved on an unstructured mesh consisting of finite volume cells having triangular and quadrilateral shapes. The numerical results of the incompressible two-phase flow problems show superior results as compared to the existing approach and match very well with the reference solutions reported in literature. With the enhanced accuracy and improved ability to deal with complex mesh types, the proposed reinitialization approach can be efficiently used in solving real life incompressible two-phase flow problems. # Highlights {#highlights .unnumbered} - Developed new reinitialization procedure by reformulating the artificial compression approach. - Problems of interface movement and unphysical patch formation during reinitialization are completely resolved. - Applicable to a wide variety of meshes including unstructured hybrid meshes and computationally efficient. - Numerical results show superior mass conservation and good agreement with analytical and experimental results. # Introduction {#sec:intro} Numerical simulation of incompressible two-phase flows poses great challenges due to the presence of the fluid-fluid interface. Popular contact capturing methods, such as, Volume of Fluid (VOF) method and Level Set (LS) method, use an additional interface advection equation along with the incompressible Navier-Stokes (NS) equations. Any inaccuracy in solving the interface advection equation will significantly affect the quality of the numerical solution. Issues of the formation of jetsam/ floatsam in VOF method, violation of mass conservation in LS method are a few examples associated with errors in the computation of the interface advection equation. In order to overcome the mass conservation error in the classical LS method, a variant of the LS method, known as Conservative Level Set (CLS) method, is proposed by Olsson and Kreiss  and Olsson et al . The enhanced mass conservation property is achieved here by replacing the signed distance function used in the classical level set method with a hyperbolic tangent type level set function. This level set function is then advected using a scalar conservation law. In order to recover from the excessive numerical dissipation error, an artificial compression based reinitialization procedure is also formulated for the level set function. With the improved mass conservation property, the CLS method shows promising capabilities and provides a good alternative to the classical LS method in solving incompressible two-phase flow problems. However, in practice, the reinitialization procedure for level set function in CLS method often runs into various numerical difficulties, leading to undesirable results. Primarily, two major issues with the reinitialization procedure are reported in the literature [@Shukla2010; @Mccaslin2014; @Desjardins2008]. The first one is the undesired movement of the interface contour during reinitialization. The problem gets further aggravated with the frequent use of reinitialization. This issue arises particularly in two and three dimensions, where, the interface curvature gets involved in the computations. It is demonstrated in reference  that the degree of movement of interface contour depends upon the strength of the interface curvature. Also, a set of numerical experiments presented in reference  verifies that the frequent use of reinitialization results in substantial movement of the interface, leading to inaccuracies in the numerical solution. Several attempts to resolve this issue can be found in literature [@Yohei2012; @Mccaslin2014]. The efforts are focused mainly on localizing the reinitialization process only to a selected region of the level set field. Excessive reinitialization at less dissipated regions is thus avoided. In reference , the reinitialization is localized by defining a local coefficient based on the degree of sharpness of the level set function. Whereas, in reference , a metric which depends on the local flow conditions and the numerical diffusion errors is used. It is, therefore, clear that these methods introduce additional complexity and computational efforts in obtaining the local coefficients. The second issue of the original CLS method is the formation of unphysical fluid patches away from the interface due to the ill-conditioned behaviour of the interface contour normal vectors. The contour normal vectors decide the direction of the compression and diffusion fluxes during the reinitialization process. Far away from the fluid-fluid interface these contour normal vectors are expected to be zero, resulting in no reinitialization. However, due to their ill-conditioned nature, even far away from the interface the contour normal vectors may not necessarily be zero. This results in undesirable compression at far away region, which leads to formation of unphysical fluid patches there. Several cures for this problem can be found in literature [@Desjardins2008; @Shukla2010; @Zhao2014; @Waclawczyk2015; @Chiodi2017; @Tabar2018]. Most of the efforts are targeted towards replacing the ill-conditioned contour normal vectors with some alternatives. In the Accurate Conservative Level Set (ACLS) method, proposed in reference , the contour normal vectors are computed from an auxiliary signed distance function. The auxiliary signed distance function is constructed here from the level set function using a fast marching method. In the method proposed by Shukla et al. , a modified form of the reinitialization equation is used. Here, the level set function is replaced with a smooth function constructed from the level set function itself by employing a mapping procedure. A technique, by combining the reinitialization schemes of both the classical and conservative level set method, named as Improved Conservative Level Set (ICLS) Method, is reported in reference . In reference  and its improved version in reference , reformulations of the original reinitialization equation are presented which take care of the spurious movement of interface contour as well as the ill-conditioned behaviour of the contour normal vectors. Recently in reference , the ill-conditioned unit contour normal vectors are replaced with another normal vectors, such that, their magnitudes start to diminish away from the interface. This ensures that the reinitialization process is activated only near the interface regions. Though improvements in the contour normal vectors partially circumvent the issue of formation of unphysical fluid patches, they involve evaluation of more complicated terms adding to the overall computational cost. In the present work, a much simpler technique to reinitialize the level set function is presented. Here, the existing artificial compression based reinitialization equation is revised by isolating and removing terms that have potential to move the interface contours. The remaining terms in the modified equation are then reformulated considerably, such that, the usage of the contour normal vectors is completely avoided. With the new reformulation, issues such as, distortion of the interface contour and the unphysical patch formation away from the interface are resolved. As a consequence, the area conservation property is improved significantly. In addition, absence of a viscous dissipation like (second derivative) term in the new reinitialization equation enables one to choose a much larger time step during the reinitialization iteration. The simplified terms also help in significantly reducing the numerical computations per reinitialization time step, aiding an overall reduction in the computational efforts. In order to demonstrate the efficacy of the proposed reinitialization scheme, a set of standard two-dimensional test problems involving reinitialization of stationary level set functions (henceforth, we name it as in-place reinitialization problems), advection of level set function under predefined velocity fields and a few standard incompressible two-phase flow problems are solved. Finally, in order to demonstrate the ability to deal with complex mesh types, an incompressible two-phase flow problem is solved on an unstructured mesh consisting of finite volume cells having triangular and quadrilateral shapes. Rest of the paper is organized as follows. The original CLS method and its reinitialization scheme is briefly described in section 2. The limitations of the existing artificial compression based reinitialization approach and its new reformulation are also discussed in the same section. In section 3, the mathematical formulation of incompressible two-phase flows is briefly described. The numerical discretization of the governing equations and the new reinitialization equation are also described in section 3. Several numerical test problems are solved in section 4. Finally the conclusions are given in section 5. # Mathematical Formulation of Incompressible Two-Phase Flows ## Governing Equations A dual time-stepping based artificial compressibility approach is followed here for modelling incompressible two-phase flows. The governing system of equations describing the unsteady incompressible viscous two-phase flow can be written as, \[\frac{\partial \bf U}{\partial \tau} + I^t \frac{\partial \bf U}{\partial t} + \left[\frac{\partial {\bf (F- F_v)}}{\partial x} + \frac{\partial {\bf (G-G_v)}}{\partial y}\right] = {\bf F_g} + {\bf F_s} \label{eq:gov_eq_two_phase}\] where, where, the vector \({\bf U}\) in equation ([\[eq:gov_eq_two_phase\]](#eq:gov_eq_two_phase){reference-type="ref" reference="eq:gov_eq_two_phase"}) denotes the vector of conservative variables and the vectors \(({\bf F}, {\bf G})\) and \(({\bf F_v}, {\bf G_v})\) denote the convective and viscous flux vectors respectively. The vectors \({\bf F_g}\) and \({\bf F_s}\) denote the source terms containing gravitational and surface tension forces respectively. Here, the surface tension term is modelled using a continuum surface forces (CSF) method, proposed by Brackbill et al. . The parameter \(\sigma\) denotes the surface tension coefficient per unit length of interface and \(g_x\) and \(g_y\) denote the \(x\) and \(y\) components of the acceleration due to gravity. The variable \(p\), \(\rho\) and \(\mu\) denote the pressure, density and dynamic viscosity of the fluid respectively. The variables \(\tau\) and \(t\) appearing in equation ([\[eq:gov_eq_two_phase\]](#eq:gov_eq_two_phase){reference-type="ref" reference="eq:gov_eq_two_phase"}) denote the pseudo time and the real time respectively. The parameter \(\beta\) denotes the artificial compressibility parameter, which is usually taken as constant for a given test problem. The artificial compressibility term added in the continuity equation is similar to the one introduced by Chorin in . Once equation ([\[eq:gov_eq_two_phase\]](#eq:gov_eq_two_phase){reference-type="ref" reference="eq:gov_eq_two_phase"}) converges to a pseudo-steady state, it recovers the set of unsteady incompressible two-phase flow equations. It can be noticed that the level set advection, described by equation([\[eq:ls-advec\]](#eq:ls-advec){reference-type="ref" reference="eq:ls-advec"}), is combined here with the system of equations ([\[eq:gov_eq_two_phase\]](#eq:gov_eq_two_phase){reference-type="ref" reference="eq:gov_eq_two_phase"}), and solved simultaneously along with the Navier-Stokes equations. The density and viscosity used in equation ([\[eq:gov_eq_two_phase\]](#eq:gov_eq_two_phase){reference-type="ref" reference="eq:gov_eq_two_phase"}) are defined in terms of the level set function, as, \[\begin{aligned} \label{eq:den_lsm} \rho = \rho(\psi) = \rho_{\text{2}}\psi + (1-\psi) \rho_{\text{1}} \\ \mu = \mu(\psi) = \mu_{\text{2}}\psi + (1-\psi) \mu_{\text{1}} \label{eq:visc_lsm} \end{aligned}\] where the subscripts "1" and "2" indicate the properties corresponds to the first and the second fluids respectively. ## Numerical Discretization of Governing Equations {#sec:fv_formulation} A finite volume approach is followed here for solving the governing system of equations ([\[eq:gov_eq_two_phase\]](#eq:gov_eq_two_phase){reference-type="ref" reference="eq:gov_eq_two_phase"}). In order to proceed with finite volume discretization, the governing system of equations ([\[eq:gov_eq_two_phase\]](#eq:gov_eq_two_phase){reference-type="ref" reference="eq:gov_eq_two_phase"}) is first integrated over a control volume. The computational domain is then discretized into a finite number of non-overlapping finite volume cells. The final space discretized form of equations ([\[eq:gov_eq_two_phase\]](#eq:gov_eq_two_phase){reference-type="ref" reference="eq:gov_eq_two_phase"}) for an \(i^{\text{th}}\) finite volume cell can be written as, \[\Omega_{i} \frac{\partial {\overline{ \bf U}}}{\partial \tau} + I^t \Omega_{i} \frac{\partial {\overline{ \bf U}}}{\partial t} + R\left({ \overline{\bf U}}\right) = 0 \label{eq:fv_disc_eq}\] where, \[R\left({ \overline{\bf U}}\right) = \sum_{m=1}^{M} \left( {\bf F}~n^m_x + {\bf G}~n^m_y \right)_m \Gamma_m-\sum_{m=1}^{M} \left( {\bf F_v}~n^m_x + {\bf G_v}~n^m_y \right)_m \Gamma_m-\Omega_{i} {\overline{\bf F}_g}-\Omega_{i} {\overline{\bf F}_s},\] \(\Omega_i\) is the area, \(\Gamma_m\) and \({\bf n}^m = (n^m_x, n^m_y)\) are the length and edge normals of the \(m^{\text{th}}\) edge respectively and \(M\) is the total number of edges of the finite volume cell \(i\). The vectors \({\overline{\bf U}}\), \({\overline{\bf F}_g}\) and \({\overline{\bf F}_s}\) represent the cell averaged values of \({\bf U}\), \({\bf F_g}\) and \({\bf F_s}\) respectively. The source term vector, \({\bf \overline{F}_g}\), appearing in equation ([\[eq:fv_disc_eq\]](#eq:fv_disc_eq){reference-type="ref" reference="eq:fv_disc_eq"}) is computed by multiplying the cell averaged value of density and the acceleration due to gravity. Evaluation of the surface tension vector, \({\overline{\bf F}_s}\), involves the computation of gradient, contour normal and curvature of the level set function. The contour normal and curvature are computed from the gradient of the level set function as per equation ([\[eq:normal\]](#eq:normal){reference-type="ref" reference="eq:normal"}) and equation ([\[eq:curvature\]](#eq:curvature){reference-type="ref" reference="eq:curvature"}) respectively, where the gradient vector is evaluated using central least square method as explained in . The convective flux vector \(\left( {\bf F}~n^m_x + {\bf G}~n^m_y \right)\) and the viscous flux vector \(\left({\bf F_v}~n^m_x + {\bf G_v}~n^m_y \right)\) in equation ([\[eq:fv_disc_eq\]](#eq:fv_disc_eq){reference-type="ref" reference="eq:fv_disc_eq"}) are computed at the edges of each cell using a Roe-type Riemann solver, developed in , and a Green-Gauss integral approach over a Coirier's diamond path, described in , respectively. The real time derivatives appearing in equation ([\[eq:fv_disc_eq\]](#eq:fv_disc_eq){reference-type="ref" reference="eq:fv_disc_eq"}) are computed using a three point implicit backward differencing procedure. Finally, an explicit three stage Strong Stability Preserving Runge-Kutta (SSP-RK) method, described in , is used for iterating in pseudo-time. The time step required for the pseudo-time iteration is computed by considering the convective, viscous and surface tension effects. For faster convergence, a local time stepping approach is adopted here, in which, each cell is updated using its own \(\Delta \tau_i\). The local time step \(\Delta \tau_i\) is computed as, \[\label{eq:pseudo_dt} \Delta \tau_i = \text{min}(\Delta \tau^{\text{conv}}_i, \Delta \tau^{\text{visc}}_i, \Delta \tau^{\text{surf}}_i)\] where, \(\Delta \tau^{\text{conv}}_i, \Delta \tau^{\text{visc}}_i\) and \(\Delta \tau^{\text{surf}}_i\) are the maximum allowed time steps due to convective flux, viscous flux and surface tension force respectively. These time steps are evaluated as, \[\Delta \tau^{\text{conv}}_i = \frac{\nu ~ \Omega_{i}}{\sum_{m=1}^{M}\left(\lvert u_n \rvert + \sqrt{\left(u_n \right)^2 + \frac{\beta}{\rho_i}} \right)_m \Gamma_m } \text{;} \Delta \tau^{\text{visc}}_i = \frac{\nu ~ \Omega_{i}^2}{\left(\frac{8}{3}\right)\frac{\mu_i}{\rho_i} \sum_{m=1}^{M}\left(\Gamma_m \right)^2} \text{ and } \Delta \tau^{\text{surf}}_i = \nu ~ \sqrt{\frac{(\rho_1 + \rho_2) h^3}{4 \pi \sigma}}\] where, \(\nu\) is the Courant number, \(h\) is the average cell size and \(u_n\) is the velocity component along the edge normal direction. For stability reasons, the Courant number, \(\nu\), is always taken less than unity. The \(\Delta \tau_i\) computed using equation ([\[eq:pseudo_dt\]](#eq:pseudo_dt){reference-type="ref" reference="eq:pseudo_dt"}) is further restricted based on the real time step , as, \(\Delta \tau_i \leq \frac{2}{3}\Delta t\). Detailed descriptions of the numerical methods used for solving incompressible two-phase flows are excluded from here due to brevity reasons. One can refer  and for more details. ## Numerical Discretization of Reinitialization Equation The RHS of equation ([\[eq:reinit_new\]](#eq:reinit_new){reference-type="ref" reference="eq:reinit_new"}) consists of two terms. In order to evaluate the first term at a given cell, only the cell center values of \(\psi\) is sufficient. However, evaluation of the second term involves computation of the gradient of \(\psi\). Here, the gradient of \(\psi\) at the cell centers are evaluated using a central least square approach discussed in [1](#sec:central_least_square){reference-type="ref" reference="sec:central_least_square"}. Finally, the time integration of equation ([\[eq:reinit_new\]](#eq:reinit_new){reference-type="ref" reference="eq:reinit_new"}) is carried out using a three stage Strong Stability Preserving Runge-Kutta (SSP-RK-3) method described in section [5.3.1](#sec:ssprk-3){reference-type="ref" reference="sec:ssprk-3"}. ### Time integration for the reinitialization equation {#sec:ssprk-3} According to the SSP-RK-3 approach described in , the cell averaged value of the unknown function in equation ([\[eq:reinit_new\]](#eq:reinit_new){reference-type="ref" reference="eq:reinit_new"}) is updated as, \[\begin{array}{r@{}l@{}l@{}l@{}l@{}l@{}l} \overline{\psi_i}^{1} &{}=&{}&{}&{}\overline{\psi_i}^{n} &{}+&{} \displaystyle \frac{\Delta \tau_n}{\Omega_i}~L\left({\overline{\psi_i}}^{n}\right)\\ \overline{\psi_i}^{2} &{}= \displaystyle \frac{3}{4}&{}\overline{\psi_i}^{n} &{}+ \displaystyle \frac{1}{4} &{}\overline{\psi_i}^{1} &{}+ \displaystyle \frac{1}{4} &{}\displaystyle \frac{\Delta \tau_n}{\Omega_i}~L\left({\overline{\psi_i}}^{1}\right)\\ \overline{\psi_i}^{n+1} &{}= \displaystyle \frac{1}{3}&{}\overline{\psi_i}^{n} &{}+ \displaystyle \frac{2}{3}&{}\overline{\psi_i}^{2} &{}+ \displaystyle \frac{2}{3} &{}\displaystyle \frac{\Delta \tau_n}{\Omega_i}~L\left({\overline{\psi_i}}^{2}\right) \end{array} \label{eq:ssprk}\] where, \(\overline{\psi_i}^n\) and \(\overline{\psi_i}^{n+1}\) are the cell averaged level set function defined at \(n^{\text{th}}\) and \((n+1)^{\text{th}}\) time levels respectively, \(\overline{\psi_i}^1\) and \(\overline{\psi_i}^2\) are the intermediate values of \(\psi\) and \(L\left({\overline{\psi_i}}^{*}\right) =-\overline{\psi_i}^{*}(1-\overline{\psi_i}^{*})(1-2\overline{\psi_i}^{*}) + \varepsilon \lvert \nabla \overline{\psi_i}^{*} \rvert (1-2\overline{\psi_i}^{*})\). For the explicit time integration of equation ([\[eq:reinit_new\]](#eq:reinit_new){reference-type="ref" reference="eq:reinit_new"}), the time step is restricted based on the nature of the reinitialization equation. In order to find out the allowable time step, equation ([\[eq:reinit_new\]](#eq:reinit_new){reference-type="ref" reference="eq:reinit_new"}) is rewritten in a Hamilton-Jacobi form with a velocity like variable, \({\bf \mathcal{S}} = \varepsilon(1-2\psi) \left( \frac{1-\lvert \nabla \phi \rvert}{\lvert \nabla \phi \rvert} \right){\bf n}\). Since the solution variable \(\psi\) is updated according to the sharpening velocity vector \({\bf \mathcal{S}}\), a stable explicit time integration scheme for equation ([\[eq:reinit_new\]](#eq:reinit_new){reference-type="ref" reference="eq:reinit_new"}) is possible only with a restricted time step, \[\Delta \tau_n \leq 2h^d \label{eq:reinit_time_step}\] It may be noticed that the time step, \(\Delta \tau_n\), given in equation ([\[eq:reinit_time_step\]](#eq:reinit_time_step){reference-type="ref" reference="eq:reinit_time_step"}) is larger by a factor of \(4/h\) in comparison with the allowable time step for the artificial compression based reinitialization procedure . Presence of a viscous dissipation term in the artificial compression based approach restricts the reinitialization time step to a smaller value . # Numerical Experiments {#sec:num_exp} Performance of the new reinitialization procedure is evaluated using three types of test problems. In order to illustrate the movement of the interface contour during the reinitialization, a set of test problems involving reinitialization of stationary level set function, is carried out first in section [7.1](#sec:stationary_pblms){reference-type="ref" reference="sec:stationary_pblms"}. These problems are named here as in-place reinitialization problems. Followed to the in-place reinitialization problems, a set of scalar advection based test problems are considered in section [7.2](#sec:scalar_aadv){reference-type="ref" reference="sec:scalar_aadv"}, where, the area and shape errors during the level set advection are quantified. In the sections [7.3](#sec:db){reference-type="ref" reference="sec:db"} - [7.5](#sec:br){reference-type="ref" reference="sec:br"}, several incompressible two-phase flow test problems are presented. These problems are arranged according to their increasing levels of complexities, starting from an inviscid flow problem to problems involving viscous and surface tension forces. All test problems are solved on simple Cartesian type meshes. However, in order to demonstrate the the ability to deal with complex mesh types, the last test problem is also solved on an unstructured mesh consisting of finite volume cells having triangular and quadrilateral shapes. ## In-Place Reinitialization Problems {#sec:stationary_pblms} As illustrated in section 2.1, the reinitialization scheme often results in moving the interface contour according to the sign and strength of the interface curvature. In order to demonstrate this, a set of test problems involving reinitialization of stationary level set function, similar to the one reported in , is carried out here. In order to perform in-place reinitialization tests, a level set function, corresponds to some given geometry, is constructed first. For the present study, three standard shapes, namely, a circle with diameter of 4 units, an ellipse with 4 units and 2 units of major and minor axes respectively and a square with size 3 units, are chosen. The geometric shapes are placed at the center of a computational domain of square shaped region bounded between \(-5 \leq x \leq 5\) and \(-5 \leq y \leq 5\). The computational domain is discretized using a \(200 \times 200\) Cartesian mesh. The level set function corresponds to the given shape is then taken as the initial condition for the reinitialization equation and carried out large number of pseudo-time iterations. Under ideal situations, the reinitialization process should not result in movement of the interface contour. However, due to errors in the reinitialization scheme, this need not be satisfied always. Moreover, unlike other test problems, numerical errors associated with the advection of level set function are not present here. Therefore, these tests help in isolating the errors associated with only the reinitialization process. In the present study, the original CLS reinitialization algorithm, described in , and the newly proposed reinitialization algorithm are compared. The deformation of the interface contour in both the cases are monitored constantly during the pseudo-time iterations. Figure [\[fig:ipr_circle\]](#fig:ipr_circle){reference-type="ref" reference="fig:ipr_circle"}, [\[fig:ipr_ellipse\]](#fig:ipr_ellipse){reference-type="ref" reference="fig:ipr_ellipse"} and [\[fig:ipr_square\]](#fig:ipr_square){reference-type="ref" reference="fig:ipr_square"} show the interface contours during the in-place reinitialization compared with the initial contours in case of the circle, ellipse and square shapes respectively. The solid black curve denotes the interface contour during reinitialization and the dashed black curve denotes the initial interface contour. One can notice that, for all the three shapes, up to 10 number of reinitialization iterations no significant changes in the interface contours are visible. However, as the number of reinitialization iterations increases, the original CLS approach leads to interface contour deformations. Especially, more deformations can be observed at regions having higher curvature. Whereas, there are no visible deformations of the interface contours even after 250 iterations in case of the new reinitialization approach. This observation is in well agreement with the discussion given in section [2.1](#sec:artificial_compression){reference-type="ref" reference="sec:artificial_compression"} and [2.2](#sec:reformulation){reference-type="ref" reference="sec:reformulation"}. ## Reinitialization of Scalar Advection Problems {#sec:scalar_aadv} In order to further study the performance of the new reinitialization formulation, a set of standard two-dimensional scalar advection based test problems are considered next. In the scalar advection problems, the initial interface is placed at \((0.25,~0.5)\) on a unit square domain and advected upon a predefined velocity field. Simulations are carried out till the initial interface completes one full rotation. The area confined by the interface and the \(L^1\) and \(L^2\) error norms are monitored during the simulation. The percentage area error, at any given time \(t\), is computed as, \[\text{Area Error (\%)} = \Bigg(\frac{A^{t}-A^0}{A^0}\Bigg) \times 100 \label{eq:area_error}\] where, \(A\) is the area enclosed by the 0.5 contour of the level set function and the superscript \(t\) and \(0\) represent the data computed at time \(t\) and at the initial time, \(t=0\), respectively. Similarly, the \(L^1\) and \(L^2\) error norms are defined as, \[L^1 = \left( \frac{1}{Nx \times Ny} \right) \sum_{i=1}^{Nx}\sum_{j=1}^{Ny}\lvert \psi^{2\pi}_{ij}-\psi^0_{ij}\rvert\] and \[L^2 = \left( \frac{1}{Nx \times Ny} \right) \sqrt{\sum_{i=1}^{Nx}\sum_{j=1}^{Ny}\Big(\psi^{2\pi}_{ij}-\psi^0_{ij}\Big)^2}\] where, \(\psi^{2\pi}_{ij}\) and \(\psi^0_{ij}\) are the discretized level set functions defined at time level \(t = 2\pi\) and \(t = 0\) respectively, and \(Nx\) and \(Ny\) are the total number of cells along \(x\) and \(y\) directions respectively. In this section, the test problems are solved using the reinitialization schemes reported in [@Olsson2007; @Desjardins2008; @Waclawczyk2015; @Chiodi2017] along with the new scheme. For better clarity, the schemes are denoted here as CLS-Olsson, ACLS-Desjardins, CLS-Wacławczyk and CLS-Chiodi for references, , and respectively. ### Reinitialization of circular disc rotation problem Rotation of a circular disc, similar to the test reported in, is considered first, where, a circular disc of radius 0.15 units is advected upon a velocity field \(u = (y-0.5)\) and \(v = (0.5-x)\). Test problem is solved on four levels of Cartesian meshes starting from \(25 \times 25\) up to \(200 \times 200\). The level set contours correspond to \(\psi = 0.05, \psi = 0.5\) and \(\psi = 0.95\) for the \(100 \times 100\) case at time levels \(t = 0\), \(t = \pi/4\), \(t = \pi/2\) and \(t = 3\pi/4\) for all five reinitialization schemes are plotted in Figure [\[fig:OC_contours\]](#fig:OC_contours){reference-type="ref" reference="fig:OC_contours"}. Further, Table [1](#tab:OC_area_error){reference-type="ref" reference="tab:OC_area_error"} and [2](#tab:OC_l1_l2){reference-type="ref" reference="tab:OC_l1_l2"} show the percentage area error and error norms computed after the disc completes one full rotation (\(ie.,\) at \(t = 2 \pi\)). Moreover, the error norms are plotted against the mesh size in Figure [\[fig:OC_order_error\]](#fig:OC_order_error){reference-type="ref" reference="fig:OC_order_error"} along with reference slopes for the first and second order rate of convergence. Looking at the above figures and tables, it can be noticed that the new reinitialization shows the least error among all. [\[tab:phy_parameters\]]{#tab:phy_parameters label="tab:phy_parameters"} In both the cases, the initial velocity field is set to zero and the initial pressure field is set based on gravity. The left and right boundaries are set to free-slip boundary condition and the top and bottom walls are set to no-slip boundary condition. The artificial compressibility parameter, \(\beta\), is taken as 10000. The real-time step is taken as 0.05 s and the pseudo-time step is computed according to the Courant number 0.9. Numerical simulations are carried out up to a time level of 4 s. In order to make a quantitative comparison, three parameters, namely, the rise velocity, the location of centroid and the circularity of the bubble are reported in . These parameters are computed as, \[\text{Rise Velocity, }{v_c} = \frac{\int_{\Omega_b}{\bf u}\cdot{\bf e}_y~\text{d}\Omega_b}{\int_{\Omega_b}\text{d}\Omega_b}, \label{eq:rise_vel}\] \[\text{Centroidal Location, }y_c = \frac{\int_{\Omega_b}{\bf x}_b\cdot{\bf e}_y~\text{d}\Omega_b}{\int_{\Omega_b}\text{d}\Omega_b} \label{eq:centroid}\] and \[\text{Circularity, }\zeta = \frac{P_a}{P_b} = \frac{\text{Perimeter of area-equivalent bubble}}{\text{Perimeter of the bubble}} = \frac{\pi d_a}{\int_{\Omega}\lVert \nabla \psi \rVert \text{d}\Omega} \label{eq:circularity}\] where, \(\Omega\) is the computational domain, \(\Omega_b\) is the region occupied by the bubble, \({\bf x}_b\) is the position vector inside the bubble, \({\bf e}_y\) is the unit vector parallel to the \(y-\)axis and \(d_a\) is the diameter of a circle with area equal to that of the bubble with circumference \(P_b\). ### Case-1 {#sec:br1} For the choice of physical parameters of Case-1, the bubble does not undergo large deformation. The initial circular bubble first stretches in the horizontal direction and, finally, settles down to an ellipsoidal profile as it reaches its terminal speed. Numerical simulations are carried out on a Cartesian mesh of \(80 \times 160\) finite volume cells. The bubble profiles at different time levels for both the CLS-Olsson and the new reinitialization cases are shown in Figure [\[fig:BR_1\_bubble_profiles\]](#fig:BR_1_bubble_profiles){reference-type="ref" reference="fig:BR_1_bubble_profiles"}. One can see that the bubble profiles for the CLS-Olsson and the new reinitialization cases are quite similar and match very well with the results reported in . In order to make a close comparison, the terminal shape of the bubbles in both the cases are plotted in Figure [\[fig:BR_1\_bubble_profiles_enl\]](#fig:BR_1_bubble_profiles_enl){reference-type="ref" reference="fig:BR_1_bubble_profiles_enl"} along with the reference bubble profile of . One can see from Figure [\[fig:BR_1\_bubble_profiles_enl\]](#fig:BR_1_bubble_profiles_enl){reference-type="ref" reference="fig:BR_1_bubble_profiles_enl"} that the bubble profiles of both the CLS-Olsson and the new reinitialization schemes match very well with the reference bubble profile. The rise velocity, centroid location and the circularity of the rising bubble are plotted with respect to time in Figure [\[fig:BR_1\_parameters_plot\]](#fig:BR_1_parameters_plot){reference-type="ref" reference="fig:BR_1_parameters_plot"}. Here also, both the CLS-Olsson and the new reintialization results match closely with the reference plots. Finally, the percentage area error, computed using equation ([\[eq:area_error\]](#eq:area_error){reference-type="ref" reference="eq:area_error"}), is plotted with respect to time in Figure [\[fig:BR_1\_area_error\]](#fig:BR_1_area_error){reference-type="ref" reference="fig:BR_1_area_error"}. It can be noticed that the area error is relatively less for the new reinitialization case compared to that of CLS-Olsson. ### Case-2 {#sec:br2} Unlike the previous case, a large density ratio in this case results the bubble to deform more and acquire a dimple cap profile with thin elongated filament like structures originating from both sides. Due to the complex shape, it is relatively difficult to capture the bubble profile in Case-2 as compared to the Case-1. Numerical simulations are carried out on a Cartesian mesh of \(80 \times 160\) finite volume cells. Moreover, in order to demonstrate the ability of the new reinitialization scheme to deal with complex meshes, the problem is also solved on an unstructured mesh consisting of 23331 finite volume cells of triangular and quadrilateral shapes. Due to the clustering of cells in the bubble path, one may expect improved results in case of the unstructured mesh case. Figure [\[fig:BR_2\_meshes\]](#fig:BR_2_meshes){reference-type="ref" reference="fig:BR_2_meshes"} shows the Cartesian mesh and the unstructured meshes considered in this problem. The snapshots of bubble profiles at different time levels for all the three cases are shown in Figure [\[fig:BR_2\_bubble_profiles\]](#fig:BR_2_bubble_profiles){reference-type="ref" reference="fig:BR_2_bubble_profiles"}. One can clearly see from Figure [\[fig:BR_2\_bubble_profiles\]](#fig:BR_2_bubble_profiles){reference-type="ref" reference="fig:BR_2_bubble_profiles"} that the elongated filament structure is not captured very well in case of the CLS-Olsson case. Whereas, a better profile of the elongated filament structure is captured in case of the new reinitialization method solved on the Cartesian mesh. The bubble profiles captured using the new reinitialization approach solved on unstructured mesh, however, show a close resemblance with the fine mesh results reported in . The rise velocity, centroid location and circularity of the bubble are plotted with respect to time in Figure [\[fig:BR_2\_parameter_plots\]](#fig:BR_2_parameter_plots){reference-type="ref" reference="fig:BR_2_parameter_plots"}. One can see that the results for the new reinitialization scheme on the unstructured mesh show very good match with the reference results. Whereas, the results in case of CLS-Olsson, especially the circularity profile, are far away from the reference solution. Finally, the percentage area errors, computed using equation ([\[eq:area_error\]](#eq:area_error){reference-type="ref" reference="eq:area_error"}), are plotted in Figure [\[fig:BR_2\_area_error\]](#fig:BR_2_area_error){reference-type="ref" reference="fig:BR_2_area_error"}. One can easily see that, the area error is highest for the CLS-Olsson case. The new reinitialization scheme solved on Cartesian mesh shows much less percentage area error. Whereas, the new reinitialization method solved on unstructured mesh shows the least area error.
{'timestamp': '2020-12-17T02:09:30', 'yymm': '2012', 'arxiv_id': '2012.08747', 'language': 'en', 'url': 'https://arxiv.org/abs/2012.08747'}
null
null
null
null
# Introduction Deep neural networks (DNNs) have achieved an outstanding performance for various learning tasks such as speech recognition, image classification, and visual object recognition etc.. It is well known that DNNs can apprioximate almost any nonlinear functions and make end-to-end learning possible. Most recently, there has been a surge of interest in graph neural networks (GNNs) since they can capture the dependency of graphs by accounting for the message passing between nodes. This appealing feature has renewed interest in answering a variety of fundamental questions involving the interpretation, generalization, model selection, and convergence of GNNs (DNNs). When developing innovative GNN techniques, it is imperative to explore the physical and mathematical principles that explain the observed phenomenon, which ultimately provides guidelines for creative designs. There is a rich literature studying the effectiveness of GNNs from various aspects. [^1] For example, Scarselli et al. first showed that GNNs can approximate a large class of functions in probability. Kawamoto et al. provided a theoretical analysis of GNNs based on mean-field theory for graph partitioning tasks. Lei et al. designed a recurrent neural architecture inspired by graph kernels and discussed its equivalence between Weisfeiler-Lehman kernels. Moreover, Xu et al. proved that the expressivity of GNNs was as powerful as that of the Weisfeler-Lehman graph isomorphism test. These efforts have deepened our understanding of the expressive power of GNNs, however, general guidelines are still largely needed for designing better neural architectures and overcoming issues in the training of neural networks, such as parametric choices (e.g., width and depth), vanishing, and exploding gradient problems. Based on the previous research regarding the expressivity of DNNs, we understand that DNNs use the spatial space that offers an informational representation and evolve toward a critical state (i.e., critical points \(\bm{0}\)) as the depth increase, corresponding to increasing informational entropy. The main goal of this paper is to further study the optimal topology design on GNNs based on the criticality theorem. The main contributions of this paper can be summarized as follows: - We propose a tree-pipeline training framework involving global skeleton determination (width determination) and local topological link rewiring. - The weak improvement of current pruning algorithms is examined, in which a rank-constrained or sparsity-constrained regularization imposed on non-convex optimization will prevent the tendency toward the critical state \(\bm{0}\). - The modularity (clustering) phenomenon in network topology is utilized for erroneous weight rewiring in the weight matrix, which in turn verify the modularity phenomenon in GNNs. # Graph Neural Network and Its Critical Representation {#sec:GraphNeuralNetworks} The goal of this paper is to explore the representation capabilities of GNNs on graphs. To this end, we consider a vanilla GNN with feedforward dynamics. Suppose the input graphs are characterized by a vertex set of size \(V\) and a \(D\)-dimensional feature vector with elements \(X_{iu} (i\in V, u\in \{1,\dots, D\})\), then the state matrix \(\bm{X} =[X_{iu}]\) is given by \[\label{eq:GNNModel} X_{i u}^{t+1}=\sum_{j v} \phi\left(A_{i j} X_{j v}^{t}W_{v u}^{t}\right) +b_{i u}^{t},\] where \(\phi(\cdot)\) is a non-linear activation function, \(\bm{A}=[A_{ij}]\) is the adjacency matrix of network topology, \(\bm{W}^{t}=\left[W_{vu}^{t}\right]\) is a linear transformation of feature space, \(\bm{b}^{t}=\left[b_{i u}^{t}\right]\) is a bias term, and the layer is indexed by \(t \in \{1,\dots, T\}\). The general idea behind GNNs is that nodes can be recursively aggregated and propagated to the next layer for complex calculations. In this respect, the network structure of neural networks is typically described as graphs in which nodes act as neurons, and each edge links the output of one neuron to the input of another. Graph matching refers to a computational problem of establishing a one-to-one bijective correspondence between the vertex set of graphs. Therefore, graph matching between a pair of graphs is analogous to representing graphs using GNN. In the next, we discuss the dynamics aspects of the graph matching. Based on the Banach Fixed Point Theorem in dynamics, we know that the unique solution of differential equations in ([\[eq:GNNModel\]](#eq:GNNModel){reference-type="ref" reference="eq:GNNModel"}) can be obtained through an iterative process \[\label{eq:RecursionDynamics} {{\bf{X}}^{t + 1}} = \phi(\bm{A}\dots\phi(\bm{A}\phi\left( \bm{A}{{{\bm{X}}^1}{\bm{W}^1}} \right){\bm{W}^2})\dots{\bm{W}^t}).\] To prevent the system from being chaotic, the eigenvalue of hidden states should satisfy \(|\lambda_i(\bm{X}^t)|)<1, i\in {1,\dots,\infty}\). Assume that the weight matrix \(\bm{W}^t\) is randomly distributed. Then both forward propagation and backpropagation are the information transfer powered by dynamics from \([\lambda_1(\bm{X}^t),\dots,\lambda_i(\bm{X}^t),\dots]\) toward the critical state, i,e., critical points \(\bm{0}\), which has abundant expressivity. The results can be generalized to local topological vector spaces via Schauder fixed point theorem. The theorem illustrates that there always exists a fixed point if \(X\) is a closed convex subset of local topological space \(S\) and \(f\) is a continuous self-mapping such that \(f(X)\) is contained in a compact subset of \(X\). In this respect, training a GNN is to construct an inexact graph matching through convex-relaxation. In the next sections, we will further demonstrate this point in more detail. # The Training Issues and Global Skeleton in Graph Neural Networks {#sec:SkeletonDesign} From the Schauder fixed point theorem, to reach the critical state, one should construct a convex network structure and an input convex topological space. First, we examine the topological structure issue. The current training methods in GNNs are mainly based on backpropagation, including those gradient-based methods. However, ordinary gradient descent cannot guarantee convergence to the global minimum, since the cost function is always non-convex. Another impediment to the convex optimization is the presence of saddle points in high dimensional representation. The current network structure is pre-set before training, and usually over-parameterized, which may generate many saddle points. In addition, ([\[eq:RecursionDynamics\]](#eq:RecursionDynamics){reference-type="ref" reference="eq:RecursionDynamics"}) suggests that a global minimum in low dimension may attenuate to a saddle point \(0\) in a high dimensional setting by layer-wise multiplying \(\lambda_i\), the so-called proliferation of saddle points. Mathematically, to determine whether a solution is a local minimum, a global minimum or a saddle point, one needs to calculate the eigenvalues of its Hessian matrix at any given point. If all the eigenvalues have both positive and negative values, there will also be a zero value, corresponding to a saddle point. If all the eigenvalues are positive at any point, there exists a global minimum. Although some recent work addressed this issue either by adopting noisy stochastic gradient descent (SGD) or second-order Hessian information (e.g., Adam), they only avoided the local minimums, and the saddle point issue remains unresolved. In addition to the backpropagation, another popular method for solving non-convex optimization is the alternating direction method (e.g., PARAFAC for matrix/tensor decomposition), which is an alternating matrix optimization algorithm that solves optimization problems by breaking down the convex optimization into smaller parts. Taylor et al. pointed out that the alternating direction method of multipliers (ADMM) could overcome the gradient vanishing or explosion issue in backpropagation, and could be implemented in parallel and distributed computing environment. However, the theoretical understanding of the convergence of ADMM remains challenging when the objective function is non-convex, and simulation examples showed that ADMM could achieve high precision very slowly. To avoid the saddle points caused by over-parameterization and high-dimensional representation, it is recommended that the network structure should have a pyramid-like shrinkage property [^2]. The shrinkage characteristics refer to the situation that the width of the next layer needs to shrink down compared to the current layer. Specifically, a network structure is typically characterized by the width (i.e., the number of nodes in each layer) and the depth (measured by the number of hidden layers) of GNNs. In theory, the depth relies on the time dependence and period of data itself. Hence there is no definitive way to determine the optimal value for depth given a specific dataset, and this is usually obtained by numerical trials. Therefore we here mainly focus on estimating the width. In mathematics, given a complete input, network width can be determined by identifying the latent rank of the observable matrix. This field is called low-rank recovery (or low-rank matrix completion). By imposing a rank constraint at each layer, the network width should show a pyramid-like structure. We provide more details about low-rank recovery in Appendix, and examine the proposed hypothesis via simulation experiments. ## What is Wrong with Existing Pruning Algorithms {#sec:PruningAlgorithm} This section discuss the criticality issue by examining the current pruning algorithms. Initially, Denil et al. showed in Denil et al. that there was a considerable redundant structure in existing networks. To reduce the number of parameters and nodes, researchers have developed various network pruning algorithms to eliminate unnecessary connections or neurons without negatively affecting convergence. A typical pruning algorithm has a three-stage pipeline, i.e., 1) training a large, over-parameterized model; 2) pruning the trained over-parameterized model according to specific criteria; 3) fine-tuning the pruned model to regain the optimal accuracy. The core pruning procedure is divided into three categories: weight pruning, structured pruning, and layer pruning. Since the layer pruning depends on the matching between the model and actual data, this paper focuses on the first two pruning techniques. Weight pruning also learns networks by adding sparsity or rank constraints on GNNs, i.e., \[\bm{W}=\mathop{\arg\min}_{\bm{W}} (\bm{X}^{t+1}-\phi(\bm{A}\bm{X}\bm{W}^t)+\lVert\bm{W}^t\lVert).\] From the critical analysis, this constraint by imposing regularization will reverse the tendency toward criticality when the network approaches the critical state \(\bm{0}\). From a searching perspective, by mixing up the topology search with weight evolution in one model, the resulting algorithm cannot achieve representation with high precision. Liu et al. also showed in an experimental analysis that current pruning algorithms only gave a comparable or worse performance than training models with randomly initialized weights. They also emphasized that the pruned architecture, rather than "significant" weights, was more important in improving convergence, which is consistent with our analysis. # Robust Topological link Rewiring As mentioned earlier, the assumption in global network skeleton design is built on a complete observation of the input \(\bm{X}\). In real-world scenes, however, graphs often suffer from the missing edge or missing node features, and the inputs are incomplete. Besides, specific-task based backpropagation learn quickly from current inputs and may "forget\" the previous learning experience. As a result, the potential accumulated erroneous inputs may eventually form an erroneous topology structure. In such settings, we need to recover a complete and accurate network topology via a robust design. Therefore, this section introduces a robust topological design for potential erroneous wights. A classical approach for increasing network robustness is the use of local (geometric) topological structures. An intuitive understanding of the topological robustness is to provide path redundancy between vertices. When one path fails, communication can continue through other alternative routes. Besides, the experiments visualizing the hidden states during training also observed a growing modularity or clustering phenomenon . This phenomenon generally appears in the real-world coupled systems consisting of dynamics and local topological structures. In all, this general phenomenon implies one can rewire the possible erroneous links by exploiting the local topological structures as an informational redundancy for self-checking. The modularity presented in the network topology can be viewed as a cluster consensus that each cluster consists of multiple interacting intelligent agents, and training the network topology is a process of building consensus among each cluster. Most consensus problem would converge to the average (proof is given in the Appendix), that is, the current state of each agent is an average of local objective function \[\min \frac{1}{n} \sum_{i=1}^{n} f_{i}(x_i)=\sum_{j=1}^n A_{ij}x_j(t), i=1,\dots,n, \quad \bm{x_i} \in \mathcal{X},\\ \] where \(f_i(\cdot)\) is the loss function corresponding to agent \(i\), and \(x \in \mathcal{X}\) is an unknown state to be optimized. Since network topology in GNNs can be viewed as a graph, its convergence can be handled via graph theory. For weights in GNNs, there are both positive and negative values. For an undirected graph with all positive weights, that belongs to a class of \(Z\) matrix admitting many favorable properties, has been widely studied. For example, the spectrum of the positive weighted graph Laplacian \(\mathfrak{S}(\bm{L})\) has the form: \(\mathfrak{S}(L)=\left\{0=\lambda_{1} \leq \lambda_{2} \leq \cdots \leq \lambda_{\infty}\right\}\). The second smallest Laplacian eigenvalue \(\lambda_2(\bm{L})\) is considered as a measure of algebraic connectivity on graphs. For directed graphs, algebraic connectivity also holds (proof is given in the Appendix). The consensus can be reached when all weights within a connected graph are positive. In contrast, negative weights indicate an antagonistic or anticorrelated interaction between nodes. The existence of both positive and negative weights in the neural architecture may lead to network modularity (clustering). The consensus of a graph with negative weights relies on the specific algebraic connectivity measure. On the other hand, one can make graph cuts or graph partitioning in which the link with positively weighted edges is within one module and the negative ones are between modules. Given the modularity feature exhibited in the evolutionary dynamics, an intuitive idea is to exploit local connectivity as redundant information to fine-tune the local link during training. Since the original weights are in general randomly generated, and the algebraic connectivity increases monotonously to form clustering, one can impose the algebraic connectivity based regularization on the loss function after several epochs waiting for the cluster forming \[\label{eq:coupledConstraint} \min _{\bm{W}} \mathcal{L}\left(Y, \hat{\bm{f}}_{\bm{W}}(X)\right)+\delta \lambda_{2}(|\bm{L}|),\] where \(\bm{L}\) is the Laplacian matrix converted from the weight matrix \(\bm{W}\), \(\lambda_{2}(|\cdot|)\) is the Fielder value of the graph of each cluster, and \(\delta\) is a tuning parameter. By imposing the regularization term in the loss function, ([\[eq:coupledConstraint\]](#eq:coupledConstraint){reference-type="ref" reference="eq:coupledConstraint"}) becomes less transparent to observe the specific erroneous links. Meanwhile, the link should be pruned to exert a localized influence, i.e., the regularization imposed on the overall topology may offset the effects of local link rewiring. To achieve a better interpretation of the results, we choose to use a greedy algorithm to verify our hypothesis, rewire possible erroneous links and better understand the clustering phenomena in the training procedure. We discuss the localized link rewiring in GNNs in the next section. ## Link's Weight Rewiring to Enhance Algebraic Connectivity {#subsec:Rewiringedges} For a disconnected graph, its algebraic connectivity is \(0\), and one can increase the algebraic connectivity by rewiring links. Note that in addition to the adjacency matrix, incidence matrices can also be used to reprensent a gragh \[\label{eq:LaplacianIncidenceMatrix} \mathbf{L}=\mathbf{H} \mathbf{H}^{T}=\sum_{l=1}^{m} \mathbf{h}_{l} \mathbf{h}_{l}^{T}.\] \(\bm{H} = [\bm{h}_1, \dots, \bm{h}_m]\in \mathbb{R}^{n\times m}\) is the node-edge incidence matrix of graph \(\mathcal{G}_{\text{sub}}\), and each edge vector \(\bm{h}_l\) denotes vertex \(V_i\) joining with vertex \(V_j\) whose entries are \([h_l]_i = 1, [h_l]_j =-1\) and \(0\) elsewhere. Given an initial graph \(\mathcal{G}_0\), the connectivity of weighted Laplacian matrix \(\bm{L}_0\) can be increased by adding new edges \[\label{eq:addingEdges} \bm{L}(x)=\bm{L}_{0}+\sum_{l=1}^{L} \beta_l w_{l} \bm{h}_{l} \bm{h}_{l}^{T},\] where \(\beta_l \in \{0, 1\}\) is a boolean variable indicating whether the \(l\)th edge is selected, and \(w_l\) is the weight being added to edge \(l\). If edge \(l\) is added to graph \(\mathbb{G}\), the partial derivative of \(\lambda_2(\bm{L}(\beta))\) with respect to \(\beta_l\) gives the first order approximation of the increase of \(\lambda_2(\bm{L}(\beta))\). According to the algebraic connectivity of directed graphs in Appendix, we have \[\label{eq:derivative} \frac{\partial}{\partial \beta_l \lambda_{2}(L(\beta))}=\bm{v}^{T} \frac{\partial L(\beta)}{\partial \beta_{l}} \bm{v}.\] Substitute ([\[eq:addingEdges\]](#eq:addingEdges){reference-type="ref" reference="eq:addingEdges"}) into ([\[eq:derivative\]](#eq:derivative){reference-type="ref" reference="eq:derivative"}), we obtain \[\label{eq:ChoosingEdges} \begin{aligned} & \frac{\partial}{\partial \beta_{l}} \lambda_{2}(\bm{L}(\beta)) \\ =& \bm{v}^{T} \frac{\partial\left(\bm{L}_{0}+\sum_{l=1}^L\beta_{l} w_{l} \bm{h}_{l} \bm{h}_{l}^{T}\right)}{\partial \beta_{l}} \bm{v} \\ =& \bm{v}^{T}\left(w_{l} \bm{h}_{l} \bm{h}_{l}^{T}\right) \bm{v}=w_{l}\left(\bm{v}^{T} \bm{h}_{l}\right)\left(\bm{h}_{l}^{T} \bm{v}\right) \\ =& w_{l}\left(v_{i}-v_{j}\right)^{2}. \end{aligned}\] which indicates that the largest connected edge can be found by maximizing \(w_l(v_i-v_j)^2\), where \(v_i\) and \(v_j\) are the \(i\)th and \(j\)th items of Fielder vector \(\bm{v}\). Since the algebraic connectivity of a weighted graph can be measured with respect to each edge, we can first use the graph partitioning for GNN's node classification, then if the nodes in one classification change in the later training, we can detect them based on the greedy algorithm of algebraic connectivity, and rewire them via a link prediction method. In real-world scenes, the dynamics and local connectivity also exhibit coupling characteristics, therefore, one can use a coupling coefficient to measure their relationship. Based on the above analysis on global skeleton and local link rewiring, we now present the new GNN architecture design in Fig.[\[fig:Frameworks\]](#fig:Frameworks){reference-type="ref" reference="fig:Frameworks"}. # Experiments {#sec:experiments} This section provides some empirical evaluations for the proposed architecture design via node classification tasks (the datasets and parameters is outlined in the Appendix). ## Model Contraction we Fig. [\[fig:ActivationCompare\]](#fig:ActivationCompare){reference-type="ref" reference="fig:ActivationCompare"} show the model contraction properties, where the results are based on \(20\) Monte Carlo experiments. Subfigure(above) show the network width after automatic pruning. Here we indeed observe a layer-by-layer shrinkage width, confirming our proposed shrinkage property when the depth increases. These contraction ratios, however, seem to be relatively small. Subfigure(bottom) compare the learning rates on test datasets, we find that the convergence continues to decrease even adopting a large rate (i.e., 0.2, 0.5), which illustrates that shrinkage structure can overcome the saddle point problem, and ultimately improves the convergence. To enhance the interpretability of GNN, Fig. [\[fig:EvolutionDynamics\]](#fig:EvolutionDynamics){reference-type="ref" reference="fig:EvolutionDynamics"} demonstrates the evolutionary dynamics with respect to \(5\) prominent eigenvalues of hidden states. We observe the eigenvalues of each layer conversation from descending to ascending during the training procedure, confirming the proposed information transfer in dynamics. ## Multi-agent Consensus-based Link's Weight Rewiring {#subsec:LinkRewiring} This section investigates the performance of multi-agents consensus-based link's weight rewiring. Fig. [\[fig:LinkRewiring\]](#fig:LinkRewiring){reference-type="ref" reference="fig:LinkRewiring"} shows the effects of coupling coefficients on the convergence of test error. We see the link rewiring on Citeseer, Pubmed and CoraFull are clear, while it is not obvious on Cora datasets, since the erroneous weights are not obvious. Tab. [1](#Tab:AlgoComp){reference-type="ref" reference="Tab:AlgoComp"} shows the test accuracy of different graph classification methods. The results show our shrinkage-rewiring structure (SRGCN and SRChebNet) could greatly improve the node classification accuracy after automatic width pruning. # Related Works {#sec:RelatedWorks} More recently, many innovative GNN frameworks have been developed. Notable methods include gated GNN, GraphSAGE, message-passing neural networks, and pruning networks. In terms of architecture design on topological spaces, the most related work to ours is that Li et al., where the authors established the equivalence between GNN and graph matching, and emphasized modeling in GNN was a convex optimization process. The major difference is that their work does not provide a specific network skeleton design, while our method provides a shrinkage network skeleton. Various regularization methods performed by randomly deleting hidden weights or activations are all for forming convex sets. Zhang showed that the success of several recently proposed architectures (e.g., ResNet, Wide ResNet, Xception, SqueezeNet, and Inception) was mainly related to the fact that multi-branch structures help reduce the non-convex property of network topology.i Regarding the observed modularity (clustering) features in weight evolution, several authors suggested defining convolutional neural network or recurrent neural network modules composed of topologically identical or similar blocks to simplify the topology design. Results illustrated these methods could achieve a large compression ratio in terms of parameters with excellent performance guarantees. Compared to their works, our method offers a theoretical explanation for the observed modularity phenomenon, and further employ it as an informational redundancy to guarantee local topological accuracy. # Concluding Remarks {#sec:conclusions} This paper presents a three-pipeline training framework based on global criticality and local topological connectivity. From the critical Theorem on topological spaces, to reach the critical state, input and network structure should match to build a convex matching (optimization). In specific training, to promote the information transfer under the over-parameterized setting, we propose a layer-wise shrinkage topological structure to prevent the proliferation of saddle points in high dimensional spaces. In facing actual erroneous inputs, we give a robust topological link rewiring method based on the local connectivity required by cluster consensus, which is similar to the idea of self-supervised learning that applies structural information as redundant information for self-checking. Our work contributes by shedding light on the success of GNNs from dynamics and topological spaces aspect. Due to current topological structure constraints, this paper only involves the intra-layer erroneous weight rewiring, the inter-layer link imputation is still unresolved. Further exploiting the modularity in more general topological architecture and more complex data (e.g., attacked data) is our next concern, which may provide guidelines to approach the critical expressivity. [^1]: This field is called the interpretability or expressivity, and here we use the later terminology to encompass all efforts in this area. [^2]: Some literature calls it as model compression, here we are prone to dimensional contraction to describe the relationship between successive layers.
{'timestamp': '2020-12-17T02:08:17', 'yymm': '2012', 'arxiv_id': '2012.08717', 'language': 'en', 'url': 'https://arxiv.org/abs/2012.08717'}